FundOS — Security Overview (Summary)
1. Governance & Risk
Our security program is risk-aligned and governed by policies covering access control, acceptable use, incident response, vendor management, and secure software development practices.
AI Governance: In alignment with DIFC Regulation 10 (“Reg-10”), FundOS maintains model/version inventories, evaluation summaries, output logging, change approvals, and proportionate testing for bias, accuracy, and material changes.
2. Access Management
Access controls are enforced through:
- Single Sign-On (SSO) and Multi-Factor Authentication (MFA) for console access
- Least-privilege and role-based access principles
- Periodic access reviews and automated deprovisioning workflows
3. Data Protection
- Encryption in transit (TLS) and at rest, with key management via managed KMS
- Segregated environments (production vs non-production)
- Regular backups and verified restoration testing
- Data minimisation, configurable retention, and secure deletion mechanisms
4. Application & AI Security
- Secure Software Development Lifecycle (SDLC) with peer code review and vulnerability scanning
- Dependency management and penetration testing at least annually
- AI-Specific: Prompt-injection defences, input/output validation, adversarial testing, allow-listing for connectors, output filtering, and drift or abuse monitoring
5. Logging & Monitoring
- Centralised logging and anomaly detection
- Audit trails for administrative actions and sensitive data access
- Time synchronisation across systems for event integrity
6. Incident Response
- 24×7 on-call response capability with defined triage, containment, eradication, and recovery steps
- Post-incident reviews to identify improvements and prevent recurrence
- Personal Data Breaches are notified to Controllers without undue delay and handled per DIFC DPL 2020 requirements
7. Business Continuity
- High-availability infrastructure and disaster recovery mechanisms
- Backups aligned to RPO/RTO objectives defined per Order or SLA
- Regular resilience and failover testing
8. Sub-processors
FundOS performs due diligence and continuous monitoring of all Sub-processors. Each provider is contractually bound by equivalent security and privacy terms. Material changes to Sub-processors are communicated through the Sub-processor Register.
Related Documents
- Terms & Conditions (terms)
- Privacy Policy (privacy)
- Cookie Notice (cookies)
- Sub-processor Policy (sub-processors)
