Key Security features

  • Confidentiality – encryption of communication and critical data
  • Integrity – standard communication protocols and database services
  • Authentication – fixed TAN, MTAN, user-id/password
  • Role based access control – User access controls at both broad and granular levels
  • Password security policy – Hashing of passwords and strong password polices
  • Non-repudiation – hashing and checksum mechanisms on transaction data
  • Traceability – logging and history on all relevant data field updates (when, what, by whom)