Security & Compliance
VINCTA is built with security and regulatory compliance at its core. This page outlines our security architecture, data protection measures, and compliance certifications.
Data Security
Encryption
Data at Rest
- All data encrypted using AES-256 encryption
- Database-level encryption via Supabase
- Encrypted backups with separate key management
Data in Transit
- TLS 1.3 for all API communications
- HTTPS-only connections (HSTS enabled)
- Webhook signature verification (HMAC-SHA256)
Key Management
- Secure key storage with access controls
- Regular key rotation procedures
- Separation of encryption keys per client
Data Residency
Infrastructure Location
- Primary hosting: European Union data centers
- Database: Supabase EU region
- Complies with German data sovereignty requirements
- No cross-border data transfers outside EU/EEA
Data Sovereignty
- Customer data remains within EU jurisdiction
- Meets BaFin and GDPR requirements
- Contractual guarantees for data location
Access Control
Role-Based Access Control (RBAC)
VINCTA implements granular role-based access with four primary roles:
| Role | Permissions | Use Case |
|---|---|---|
| Analyst | View cases, investigate alerts, request approvals | Front-line compliance analysts |
| Senior Analyst | All analyst permissions + escalation handling | Experienced analysts |
| Compliance Officer (MLRO) | All permissions + approve/reject actions | Money Laundering Reporting Officer |
| Administrator | Full system access + user management | System administrators |
Maker-Checker Workflow
- HIGH/CRITICAL cases require dual approval
- ALL SAR/STR filings require approval (regardless of risk level)
- Maker and checker must have different roles (GwG §25)
- Approval decisions require documented reasoning
Authentication
Passwordless Magic Links
- Secure, phishing-resistant authentication
- No password storage or management
- Email-based verification
Session Management
- Configurable session timeout (default: 30 minutes)
- Automatic logout after inactivity
- Secure session token storage
Multi-Factor Authentication (MFA)
- Available for all user accounts
- Recommended for admin and compliance officer roles
- TOTP-based (Time-based One-Time Password)
Audit & Logging
Immutable Audit Trail
What We Log
- All user actions (view, create, update, delete)
- Case status changes with timestamps
- Approval requests and decisions
- System access and authentication events
- Webhook deliveries and processing
Audit Log Features
- Immutable records (cannot be modified or deleted)
- 5-10 year retention (configurable per regulatory requirements)
- Exportable for regulatory audits
- Searchable and filterable
Compliance Requirements
- AMLD6 Article 8(1): Document all actions for review
- GwG §24: Audit trail documentation
- BaFin MaRisk AT 7.2: IT system documentation
Compliance Certifications
Current Status
GDPR Compliant
- Data protection by design and default
- Right to access, rectification, erasure
- Data portability and processing transparency
- Privacy policy and data processing agreements
BaFin MaRisk Aligned
- Risk management framework
- IT system documentation
- Change management procedures
- Data integrity controls
GwG (German AML Law) Compliant
- Internal safeguards documentation
- Record retention (5-10 years)
- Audit trail requirements
- Maker-checker workflows
In Progress
SOC 2 Type II
- Target: Q2 2025
- Security, availability, confidentiality controls
- Independent audit and certification
ISO 27001
- Target: Q3 2025
- Information security management system
- International standard for security
Vulnerability Management
Security Practices
Code Security
- Regular dependency updates
- Automated vulnerability scanning
- Secure coding standards
- Code review process
Infrastructure Security
- Regular security patches
- Network segmentation
- DDoS protection
- Intrusion detection
Incident Response
- 24/7 security monitoring
- Incident response plan
- Breach notification procedures
- Regular security drills
Responsible Disclosure
Found a security issue? Please report it responsibly:
Email: security@vincta.io
Response Time: Within 24 hours
Disclosure Policy: Coordinated disclosure after fix deployment
Data Protection
GDPR Rights
VINCTA supports all GDPR data subject rights:
- Right to Access - Export your data
- Right to Rectification - Correct inaccurate data
- Right to Erasure - Delete your data (with regulatory exceptions)
- Right to Portability - Receive data in machine-readable format
- Right to Object - Object to certain processing activities
Data Protection Officer (DPO)
Email: dpo@vincta.io
Data Processing
Legal Basis
- Contractual necessity (service delivery)
- Legal obligation (AML/KYC compliance)
- Legitimate interest (fraud prevention)
Data Minimization
- Only collect necessary data
- Regular data retention reviews
- Automated deletion of expired data
Third-Party Processors
- Supabase (database hosting)
- Vercel (application hosting)
- All processors are GDPR-compliant with DPAs in place
Regulatory Alignment
European AML Directives
AMLD6 (6th Anti-Money Laundering Directive)
- Enhanced due diligence for high-risk customers
- Risk-based approach to compliance
- Timely suspicious activity reporting
- 5-year record retention
DORA (Digital Operational Resilience Act)
- ICT risk management framework
- Incident reporting procedures
- Business continuity planning
- Third-party risk management
German Regulations
GwG (Geldwäschegesetz - German AML Law)
- Internal safeguards and controls
- Customer due diligence requirements
- Beneficial owner identification
- Transaction monitoring obligations
BaFin Requirements
- MaRisk AT 7.2: IT system documentation
- Segregation of duties (maker-checker)
- Audit trail completeness
- Data integrity guarantees
Audit Support
For Auditors
VINCTA provides comprehensive audit support:
Audit Trail Exports
- Complete case history with timestamps
- User action logs
- Approval decision records
- System access logs
Regulatory Reports
- SAR/STR filing documentation
- High-risk customer reports
- SLA compliance reports
- User activity summaries
Documentation
- System architecture documentation
- Security policies and procedures
- Data flow diagrams
- Compliance certifications
Audit Preparation
- Dedicated audit support
- Evidence gathering assistance
- Regulatory inquiry response
- Expert consultation available
Security Inquiries
For security-related questions or concerns:
General Inquiries: security@vincta.io
Compliance Questions: compliance@vincta.io
Data Protection: dpo@vincta.io
Response Time: Within 24 hours for security issues, 48 hours for general inquiries
Updates
This security documentation is reviewed and updated quarterly. Last review: December 2024.
Subscribe to security updates: Contact security@vincta.io