SYSTEM R AI

Security

Security at System R AI

Last updated: March 13, 2026

System R AI handles sensitive financial data and trading operations. Security is not a feature. It is a foundational layer of the system architecture. This page describes our security practices, infrastructure, and commitment to protecting your data.

Infrastructure

Cloud Infrastructure

Hosted on AWS with ECS Fargate (serverless containers), eliminating the attack surface of managing host machines. All infrastructure is defined as code and deployed through audited CI/CD pipelines with no static credentials.

Network Isolation

Services run in private VPC subnets with strict security group rules. Only the application load balancer is publicly accessible. Internal service-to-service communication is encrypted and access-controlled.

Zero Static Keys

All deployments use OIDC federation (GitHub Actions to AWS) with short-lived, scoped credentials. No long-lived access keys exist anywhere in the pipeline. IAM roles follow least-privilege principles.

Data Protection

Encryption in Transit

All connections use TLS 1.3. HTTP Strict Transport Security (HSTS) is enforced. API endpoints only accept HTTPS traffic. Certificate management is automated through AWS Certificate Manager.

Encryption at Rest

All data stores use AES-256 encryption at rest. Database backups are encrypted. Secrets and configuration values are stored in AWS Systems Manager Parameter Store with KMS encryption.

Payment Security

Payment processing is handled entirely by Stripe, a PCI DSS Level 1 certified provider. We never store, process, or transmit credit card numbers. All payment tokens are managed by Stripe's secure infrastructure.

Credential Isolation

Broker connections use OAuth 2.0 where available. API keys are encrypted at rest and never logged. Each user's credentials are isolated. No shared credential stores.

Application Security

Authentication

Passwords are hashed using bcrypt with per-user salts. Session tokens are short-lived and rotated. Multi-factor authentication is available for all accounts. Brute-force protection with progressive rate limiting.

Authorization

Trust-level based access control gates features by account state (registered, verified, subscribed, connected, ready). API endpoints enforce authorization at the route level with domain-layer purity maintained.

Input Validation

All user input is validated and sanitized at system boundaries. API request schemas are strictly typed. SQL injection, XSS, and other OWASP Top 10 vulnerabilities are mitigated through parameterized queries, output encoding, and Content Security Policy headers.

Rate Limiting

API endpoints enforce rate limits to prevent abuse. Limits scale by subscription tier. Automated detection flags anomalous usage patterns for review.

Operational Security

CI/CD Pipeline

All code changes go through automated testing (13,000+ tests) before deployment. The staging environment mirrors production. Production deployments require all tests to pass. No manual server access is needed or permitted.

Monitoring and Logging

Comprehensive logging via CloudWatch with anomaly detection. Application metrics track error rates, latency, and authentication failures. Alerts are configured for security-relevant events.

Incident Response

We maintain an incident response procedure that includes identification, containment, eradication, recovery, and post-incident review. Users affected by a security incident will be notified within 72 hours.

Architecture Design

System R AI is built with a domain-driven, hexagonal architecture that enforces security at every layer:

  • Domain layer: Pure business logic with no external dependencies, immune to injection attacks
  • Port interfaces: Strict contracts that define what data crosses boundaries
  • Adapter layer: Isolated integrations with external services, each independently secured
  • API layer: Route-level authentication and authorization before any domain logic executes

This architecture ensures that even if one integration point is compromised, the blast radius is contained by design.

Responsible Disclosure

If you discover a security vulnerability, we ask that you report it responsibly. Please contact us directly rather than disclosing publicly. We commit to:

  • Acknowledging your report within 24 hours
  • Providing a timeline for remediation within 72 hours
  • Keeping you informed of our progress
  • Crediting you (with your permission) after the issue is resolved

Contact

For security concerns, vulnerability reports, or questions about our practices:

hello@systemr.ai