Bitlendex Trust Center

View our security posture, compliance certifications, and data protection practices. Request access to detailed security documentation below.

Overview

Bitlendex provides Bitcoin-collateralized lending services with institutional-grade security. Our cybersecurity program is designed to protect customer assets and data across every layer of our platform. For security inquiries, contact security@bitlendex.com.

Compliance

SOC 2 Type II
ISO 27001
GDPR
State MTLs
PCI DSS
CCPA

Product Security

  • Multi-signature cold storage (3-of-5) for all Bitcoin collateral
  • Hardware Security Modules (FIPS 140-2 Level 3) for key management
  • End-to-end encryption for all sensitive data flows
  • Quarterly third-party penetration testing
  • Continuous vulnerability scanning and remediation
  • Bug bounty program with rewards up to $50,000

Data Security

  • AES-256 encryption at rest for all stored data
  • TLS 1.3 encryption in transit for all communications
  • Role-based access control with least-privilege enforcement
  • Regular access reviews and automated deprovisioning
  • Data loss prevention monitoring across all environments

Infrastructure

  • Network segmentation between production, staging, and corporate
  • Enterprise-grade DDoS protection and traffic filtering
  • 24/7 Security Operations Center with real-time monitoring
  • Automated threat detection and behavioral analytics
  • Geo-redundant backups with tested recovery procedures

Privacy

  • GDPR data subject rights (access, rectification, erasure, portability)
  • CCPA compliance for California residents
  • Data processing agreements with all sub-processors
  • Privacy impact assessments for new features and integrations
  • Annual privacy training for all employees

Insurance & Reserves

  • $100M comprehensive insurance covering theft, hacking, and fraud
  • Monthly cryptographic proof of reserves (Merkle tree-based)
  • On-chain verification of reserve wallet addresses
  • Independent third-party reserve attestation (quarterly)
  • Real-time collateral ratio monitoring across all active loans

Incident Response

  • Anomaly detection within 15 minutes
  • Initial response and containment within 1 hour
  • Affected user notification within 24 hours
  • Post-incident review and transparency report
  • Responsible disclosure policy for security researchers

Have a security question?

Our security team is available to answer questions and provide additional documentation.