Encryption key access restricted
PassingPrivileged access to encryption keys restricted to authorized users with documented business need.
Mesta's hybrid payment network merges real-time rails and blockchain with bank-grade controls. Our ongoing SOC 2 Type II audit preparation, continuous monitoring via Vanta, and dedicated security team keep us accountable to the highest bar.
Audit Coverage
Meeting the highest standards for security and data protection
Real-time visibility into our security posture and audit readiness
Enterprise-grade security protecting every transaction
Every access request authenticated and authorized with continuous verification.
AES-256 encryption for data at rest, TLS 1.3 for data in transit.
ML-powered anomaly detection monitors every transaction in real-time.
Hardware security keys and biometric authentication enforced across systems.
24/7 SIEM monitoring with automated alerting and incident response.
Continuous control monitoring and evidence collection via Vanta.
Built on AWS with enterprise-grade redundancy and security
Access audit reports, policies, and documentation
Complete SOC 2 Type II audit report covering Security, Availability, and Confidentiality principles.
Access document →Independent auditor engagement letter for the current SOC 2 Type II examination period.
Access document →Technical documentation of our security architecture, controls, and operational procedures.
Access document →Standard DPA template covering GDPR and data protection requirements.
Access document →Comprehensive controls across all security domains
Controls governing platform infrastructure hardening and access.
Privileged access to encryption keys restricted to authorized users with documented business need.
Production systems accessible only via approved encrypted VPN connections with MFA.
All system authentication requires unique username/password or authorized SSH keys.
Company-wide guardrails for workforce, devices, and vendors.
Endpoint protection deployed and monitored across all company devices.
All employees acknowledge Code of Conduct annually with training.
Minimum 12 characters with MFA via hardware security keys required.
Secure SDLC, testing, and continuous assurance of application layers.
All customer data encrypted at rest and in transit with industry-standard algorithms.
Security control reviews performed before major feature releases.
Annual penetration tests by third-party security firms with remediation tracking.
Governance, risk management, and vendor oversight procedures.
Quarterly board meetings include security and risk agenda items.
Annual risk assessments with quarterly reviews and mitigation tracking.
All critical vendors assessed for security posture before engagement.
Policies that protect customer data across its lifecycle.
Documented data retention periods aligned with legal and business requirements.
Automated deletion of customer data within 30 days of contract end.
Data classified as Public, Internal, Confidential, or Restricted.
Payment network controls including AML/KYC, transaction monitoring, and custody procedures.
Every ledger entry is line-item audited and tied to a control owner, evidence source, and alert path. Each order in our system follows these secured stages.
Token or fiat funds enter monitored custody accounts with AML screening, deposit reconciliation, and chain monitoring.
Liquidity providers execute currency conversions with deterministic ledger entries while segregation of funds and approval policies maintain accuracy.
Payouts are dispatched via banking or RTP partners with dual authorization, payment integrity checks, and delivery receipts.
Anomaly detection, automated reconciliation, SIEM correlation, and customer notifications finalize the order lifecycle.
Our incident response team operates 24/7 to detect, respond to, and mitigate security incidents.
Response SLA
Critical incidents: 15 minutes response time | High priority: 1 hour response time
Security Contact
security@mesta.xyzSIEM, IDS/IPS, and EDR tools provide automated threat detection.
Security Operations Center monitors systems around the clock.
Incident response playbooks for common scenarios tested quarterly.
Affected customers notified within 72 hours per GDPR requirements.
We welcome security researchers to responsibly disclose vulnerabilities.
Report Vulnerabilities To
security@mesta.xyzIn Scope
Out of Scope
Request the full SOC 2 Type II report, SIG questionnaire, bridge letter, or quarterly control updates. Our security team responds within one business day.