# Security

<figure><img src="https://786255773-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FPbHt80g53dpOidbJNLLv%2Fuploads%2FG9snhPAIWrguIpASBmIh%2Fimage%20(1).jpg?alt=media&#x26;token=09f1bb5c-84f9-4e30-948a-cef52d886267" alt=""><figcaption></figcaption></figure>

### Security: <a href="#astradex-ai-prioritizes-security-by" id="astradex-ai-prioritizes-security-by"></a>

* **Using AES-256 Encryption**: Protecting sensitive data with government-grade encryption to ensure user privacy and data integrity.
* **Employing Multi-Layered Security Protocols**: Ensuring robust defenses across all systems to prevent unauthorized access and breaches.
* **Enabling Self-Custody of Assets**: Users retain full control over their funds and private keys.
* **Real-Time Monitoring for Threats**: Continuous monitoring for vulnerabilities and anomalies, with immediate response mechanisms.
* **Leveraging AWS Security Frameworks**:
  * We ensure that our internal databases are encrypted both at rest and in transit, providing robust protection for sensitive data.
  * Strict access control policies are enforced through a comprehensive identity and access management system to regulate permissions and maintain security.
  * Sensitive parameters and configuration data are securely stored using specialized tools to prevent unauthorized access.
  * Our infrastructure and services are monitored 24/7, enabling early detection and resolution of potential issues to maintain system health and availability.
  * Advanced DNS management solutions with built-in DDoS protection are utilized to ensure secure and resilient domain name resolution.
