Security & Resilience
A public summary of FabStone's security approach across product, infrastructure, access control, and operational resilience.
Introduction
FabStone treats security as an operating discipline integrated into product design and infrastructure choices.
Security approach
Security posture is designed to cover:
- application security,
- wallet and transaction controls,
- infrastructure and environment security,
- monitoring and incident handling,
- and continuity planning.
Product and transaction controls
- multi-factor authentication,
- device/session controls,
- suspicious activity detection,
- thresholds and approvals for higher-risk actions,
- and role-based controls for operational workflows.
Access control
FabStone applies least-privilege and role-based access controls across internal and partner-facing systems, with logging and review.
Infrastructure security
- segmented environments,
- secure hosting controls,
- encryption where appropriate,
- backup and recovery procedures,
- and regular maintenance and patching.
Reviews, testing, and assurance
- secure development practices,
- code review and test coverage,
- third-party security assessments when relevant,
- and change-control procedures.
Resilience and continuity
Operational resilience includes continuity planning, incident handling, recovery procedures, and post-incident review.
Responsible disclosure
If you identify a potential security issue, please contact FabStone directly and avoid public disclosure before remediation review.
Important note
This page is a public summary and does not disclose all controls or guarantee feature availability in every environment.