LogoLogo
  • MultiSwap and MultiChain Liquidity Pool Bridge
  • 📐Architecture and Tech Stack
    • 🚩Architecture issues
    • ✏️General Architecture Overview
      • 🛠️dApp Tech Stack
      • ⚖️Core Components of MultiSwap
        • 📐Overview - Core Components of MultiSwap
        • 🪙Asset Types
          • 📐Overview - Asset Types
          • ⚒️Foundry Assets
          • ⚙️Refinery Assets
          • ⛓️Ionic Assets
        • ⚡FIBER - Ferrum Inter Blockchain Express Routing Engine
          • 📐Overview - FIBER
          • 🧠FIBER Engine
          • 🔄FIBER Router
          • 🏦Fund Manager
          • 🪙Fee Manager
          • 🗄️Asset Categorization and Route Optimization
            • 📐Overview - Asset & Route Optimization
            • 📂Example of Asset Categorization
          • 🌁Bridging and Settlement
            • 📐Overview - Bridging & Settlement
            • ⚖️MultiChain Settlement Flow (MCSF)
              • 📐Overview - MCSF
              • ⚖️Swap to & from Bridgeable Asset
            • 🌁Bridging of Assets
            • ⚖️Settlement
        • 🔥FORGE - Ferrum Optimal Routing Gas Estimation Engine
          • 📐Overview - FORGE
          • ⛽Gas Estimation
          • 🏦MultiSwap Fee Estimation
        • ⏳Future Work
      • ⚡Node Infrastructure
        • 📐Overview - Node Infrastructure
        • 🔍Generator Node
        • 🕵️Validator Nodes
        • ✒️Master Node
    • 🔏Security
  • 🗄️Resources
    • 🗃️Resources and Links
      • Mainnet Tech Stack Overview
      • Deployment Pipeline Updates
      • Connecting EVM and Non-EVM
    • 📚Glossary & Acronyms
      • 🗄️Glossary
      • 🗃️Acronyms
    • ❔FAQs
      • 📐Overview MultiSwap - FAQs
      • 💸Are there any fees for using MultiSwap?
      • 🔄Which networks are supported in MultiSwap?
      • 💰Which Wallets are supported in MultipSwap?
      • ⁉️How to get support and report bugs?
Powered by GitBook
On this page

Was this helpful?

Edit on GitHub
Export as PDF
  1. Architecture and Tech Stack

Security

PreviousMaster NodeNextResources and Links

Last updated 2 years ago

Was this helpful?

We secure our systems by ensuring all access follows the protocols. A good example of this is the segregation of accounts where the dev, QA, and UAT environments are set up vs staging and prod environments. Each account is only accessible by individuals who need to access them for their core job functionality and access to staging and prod accounts is further restricted to lead engineers. The management of user access is done in an entirely separate account, further restricting access control and adding another layer of protection against external phishing and related attacks.

📐
🔏
principle of least privilege (PoLP)