Security

End-to-End Security Protocol for DeFi

In the world of decentralized finance, the security of your assets is paramount. EdenChain has implemented a robust security infrastructure utilizing JWT, KMS, and a proxy system to provide end-to-end security for all transactions. Our system is designed to minimize vulnerability to both external and insider attacks, safeguarding your DeFi activities with multiple layers of protection.

EdenChain’s High-Level Security System

Our security protocols satisfy seven critical requirements:

Non-repudiation of transactions through end-to-end security systems.
Minimal exposure of API keys used during DeFi protocol interactions.
Strict access authorization and limitation for security-sensitive data.
Comprehensive logging and regular auditing of all data access.
Continuous system integrity checks to monitor any modifications.
Multi-level security protocols preventing any single system from completing a task end-to-end.
Auditable design at each step, with instant alerts for any anomalies.

Protecting DeFi Users with Advanced Security Measures

EdenChain offers the highest level of security to handle the unique challenges of the DeFi ecosystem:

Protection against insider attacks, which pose a significant threat in decentralized systems.
Implementation of JWT, KMS, and a proxy system to prevent malicious data manipulation, even if an insider has knowledge of the system architecture and processes.

EdenChain Security Protocol Flowchart

Our security system operates across multiple planes:

Transaction Security Plane
Transaction Authorization Plane
Transaction Auditing Plane

Transaction Security Plane

Utilizes HSM with RSA Signing method supported by AWS KMS to prevent signing key exposure.
Performs data audits to prevent modifications between Transaction Creation and Validation Modules.

DeFi Protocol Interaction Security

Secrets Manager securely manages API keys for various DeFi protocols.
Transaction Creator Module uses API aliases to handle input commands without exposing real API keys.
Transaction Validator Module authenticates API key values and checks API alias originators.

Transaction Validator Securities

Real-time system monitoring using HIDS for any access or modifications.
Container security with CVE Scan to prevent vulnerable image releases.
Regular security checks using Inspector to catch potential threats.
Enhanced code security through C-language development and AWS SDK CPP Library.
One-way outbound network communication to prevent external intrusions.

Transaction Auditing Plane

All signing/verifying service requests and API key access services are audited via CloudTrail.
Abnormal usage detection with instant alarms for unusual activities.
Comprehensive logging of all system activities to Elastic Stack.

Transaction Authorization Plane

Granular access control, allowing specific API key access authorization down to the pod level.
Sign/Verify Key access level pods restricted to authorized services only.

At EdenChain, we understand that security is the foundation of trust in the DeFi ecosystem. Our multi-layered, end-to-end security protocols are designed to provide you with peace of mind as you navigate the exciting world of decentralized finance.
Let’s defy the limit. De-Fi with us, securely.

Author