Security and trust for
production RPC infrastructure
Magma Devs is built for teams that depend on blockchain infrastructure in production. Our security program covers access controls, monitoring, secure development, incident response, compliance readiness, and customer trust documentation.
How we approach security
Every architectural decision is measured against these.
Least privilege access
Access to production systems is restricted by role, business need, and approval.
Secure development
Code changes follow review, testing, and controlled deployment processes before production release.
Operational monitoring
We monitor infrastructure health, system activity, provider behavior, and security-relevant events.
Security controls your team will ask about
The specifics your security team will ask about.
Access
- Role-based access control
- MFA for internal systems
- Least-privilege permissions
- Access reviews
Application security
- Code review before production release
- Dependency scanning
- Secrets management
- Protected branches
Infrastructure
- Cloud infrastructure managed through controlled processes
- Environment separation
- Monitoring and alerting
- Backup and recovery procedures
Data protection
- Encryption in transit
- Encryption at rest where applicable
- Limited access to customer-related data
- Logging controls
Incident response
- Internal escalation procedures
- On-call ownership
- Customer communication process
- Post-incident review
Vendor management
- Review of critical vendors
- Subprocessor tracking
- Customer notification process where applicable
- Vendor access controls
Compliance & assurance
We publish where we are, not where we wish we were.
SOC 2 Type II
FinalizingMagma Devs is finalizing its SOC 2 Type II process. Relevant documentation may be shared with qualified customers and prospects under NDA.
ISO 27001
FinalizingMagma Devs is finalizing its ISO 27001 audit process as part of its information security management program.
DPA
AvailableA standard Data Processing Addendum is available for customers and prospects as part of vendor review.
Penetration testing
Available upon requestReport a vulnerability
If you believe you have found a security issue affecting Magma Devs, Smart Router, or our infrastructure, please contact us.
We ask researchers to act in good faith, avoid accessing customer data, avoid service disruption, and give us reasonable time to investigate and respond.
Need our full security package?
Security documentation is available to qualified customers and prospects under NDA, including current compliance status, security overview, DPA, and architecture materials.
