We keep the server’s operating system and applications up to date with the latest security patches.
Configuring the firewall to allow only necessary ports and protocols and blocking all others.
Restricting access to the server to only authorized personnel, using methods such as SSH keys or two-factor authentication and on some services we use ip-restricted access.
Prometheus and Grafana
Monitoring the servers and nodes for unusual activity with prometheus and grafana monitoring and alerting systems.
Backup servers/redundant services are running so we can recover nodes in the event of a hardware failure.
Our servers are not located at crowded places where the costs are lower to host blockchains. In order minimize risk of downtime for the networks we handpick the servers we use with different datacenters and online providers.
In the case you have any questions or concerns about our security practices, please contact us at [email protected] or check out our contact page for more details on how to get in touch with us.