Security & Custody

Defence-in-depth, by deliberate construction.

IronXLedger treats every layer of the stack — from key material to staff access — as an adversarial environment. We assume compromise, design for containment, and rehearse recovery before we need it.

Cold-storage majority

The substantial majority of client digital assets are held in geographically distributed, air-gapped cold-storage vaults using HSM-backed multi-signature schemes. Hot-wallet float is sized to operational withdrawal demand only and is reconciled hourly.

Key management

Signing keys are sharded under m-of-n thresholds, with shard custodians drawn from independent operational and executive control planes. No single individual — including founders — can authorise a withdrawal, restore a vault, or roll a signing ceremony unilaterally.

Account hardening

All accounts support strong password requirements, optional hardware-token (WebAuthn) second factors, withdrawal address allow-listing, and time-locked first-time withdrawals to newly registered destinations.

Production infrastructure

Our production estate is segmented into least-privilege control planes with break-glass auditing, immutable infrastructure pipelines, signed builds, and continuous configuration attestation. Engineering access is JIT-granted and recorded.

Independent assurance

We engage external firms for periodic penetration testing, smart-contract review (where applicable), and SOC-style controls assessment. Findings are tracked to remediation in a public-facing severity register for institutional clients.

Incident response

Our 24/7 security operations function maintains documented runbooks for credential compromise, key-shard incident, infrastructure breach, and counter-party failure. We commit to client notification within statutory timelines and to a written post-incident review.