Security Best Practices
Last updated November 13, 2025 · Estimated read time: 8–10 minutes
1.1 Account Hygiene
- Use unique, high‑entropy passwords and a reputable password manager
- Rotate passwords quarterly and revoke unused sessions/devices
- Enable login alerts and review access logs regularly
1.2 Two‑Factor Authentication
- Prefer authenticator apps or hardware keys over SMS
- Store backup codes offline and test recovery paths
- For institutions, mandate FIDO2 security keys for admins
See Account Setup for step‑by‑step 2FA enablement.
1.3 Wallet Security
- Use hardware wallets for significant holdings; separate hot/cold roles
- Validate addresses, simulate transactions, and verify on-device prompts
- Maintain multi‑sig policies for treasury and operational wallets
Refer to Wallet Integration for supported devices and setup.
1.4 Operational Security
- Keep systems up‑to‑date; restrict extensions and enforce least privilege
- Use secure networks and VPNs; avoid public Wi‑Fi for administrative tasks
- Implement incident response playbooks and periodic drills
1.5 Organization Policies
- Enforce role‑based access control and separation of duties
- Require code reviews, audits, and change management for smart contracts
- Adopt a disclosure program and maintain a vulnerability intake channel
For compliance integrations, see Compliance Setup.