FabStone Wallet logoFabStone
Security

Security & Resilience

A public summary of FabStone's security approach across product, infrastructure, access control, and operational resilience.

01

Introduction

FabStone treats security as an operating discipline integrated into product design and infrastructure choices.

02

Security approach

Security posture is designed to cover:

  • application security,
  • wallet and transaction controls,
  • infrastructure and environment security,
  • monitoring and incident handling,
  • and continuity planning.
03

Product and transaction controls

  • multi-factor authentication,
  • device/session controls,
  • suspicious activity detection,
  • thresholds and approvals for higher-risk actions,
  • and role-based controls for operational workflows.
04

Access control

FabStone applies least-privilege and role-based access controls across internal and partner-facing systems, with logging and review.

05

Infrastructure security

  • segmented environments,
  • secure hosting controls,
  • encryption where appropriate,
  • backup and recovery procedures,
  • and regular maintenance and patching.
06

Reviews, testing, and assurance

  • secure development practices,
  • code review and test coverage,
  • third-party security assessments when relevant,
  • and change-control procedures.
07

Resilience and continuity

Operational resilience includes continuity planning, incident handling, recovery procedures, and post-incident review.

08

Responsible disclosure

If you identify a potential security issue, please contact FabStone directly and avoid public disclosure before remediation review.

Security Reports

For reporting potential security issues.

security@fabstone.io
09

Important note

This page is a public summary and does not disclose all controls or guarantee feature availability in every environment.