Business Communication
Project Evaluation
Make a Payment
Security Monitoring
Issue a Report
6 Major Monitoring Modules
36 Monitoring Contents
24h Security Service
Serial Number | Monitoring Class | Monitoring Subclass |
---|---|---|
1 | Business Baseline Security | Web Application Firewall (WAF) Monitoring |
DDoS/CC Defense Monitoring | ||
Registered Security Monitoring | ||
Login security Program | ||
Data Transmission Security Monitoring | ||
2FA Security Program | ||
Session security Program | ||
Exchange API Security Program | ||
Top-up Security Program | ||
Withdrawal Security Program | ||
Transaction Security Program | ||
Security Education | ||
Anti-phishing Program | ||
New Token Transaction Security Program | ||
KYC Security Program | ||
AML Security Program | ||
Is there a Security Audit Report issued by a third party (learn about the Exchange Audit of SlowMist Technology) | ||
2 | Production Network Security | DNS Security |
Cloud service security (cloud platform login security, cloud platform service external firewall configuration, cloud platform service internal firewall configuration, cloud platform API configuration and security) | ||
Authority security (hierarchical authorization strategy, personnel management) | ||
3 | Server Security | Basic Configuration Security |
Upgrade and Patch Program | ||
Third-party Module Security | ||
Application Services Security | ||
API Service Security | ||
Database Service Security | ||
Caching Service Security | ||
Private Key Management Service Security | ||
Node Service Security | ||
4 | Application Security | Web Security (Reference Standard: OWASP ASVS & OWASP TOP 10) |
App Security (Reference Standard: OWASP MASVS) | ||
API Security (Reference Standard: OWASP ASVS & OWASP TOP 10) | ||
5 | Private Key Security | Hot Wallet Security (private key generation, private key and security) |
Cold Wallet Security (private key generation, storage, and security) | ||
6 | Office Network Security | Office Network Security (Internet router security, intranet IoT device security, traffic security detection and defense planning, network isolation security) |
Office Terminal Security (PC terminal installs well-known antivirus software, PC terminal security upgrade strategy, unknown terminal access discovery strategy, secure Internet access program) |
Package A | Package B | Package C | Package D |
---|---|---|---|
Security Monitoring Cycle Once / 1 month |
Security Monitoring Cycle Once / 2 months |
Security Monitoring Cycle Once / 3 months |
Security Monitoring Cycle Once / 6 months |