Operational security
The Centrifuge team maintains production-grade security standards across development and operational workflows.
Team standards
- Every team member enforces hardware based 2-factor authentication. No SMS codes or cloud-based passkeys are permitted for critical accounts.
- All team members run endpoint firewalls configured to company baselines, blocking unauthorized outbound network connections.
- Credentials are managed through Password managers and Cloud Secrets like KMS. Passwords are never shared or reused across services.
- Full-disk encryption and automatic screen lock are enforced on all devices.
- The team completes regular security trainings, including phishing awareness exercises.
- The Centrifuge security team performs regular controlled attacks against core contributors (phising, smithing, social engineering, etc.) and launches monthly easy-to-digest trainings for all employees.
- The core team completed a third-party operational security review with OPSEK in 2025.
Operational security
- Administrative accounts are separated from day-to-day accounts and have stricter security policies. No single person holds all keys to any critical system.
- All system access follows the principle of least privilege, with quarterly access reviews and credential rotation.
- All code changes require peer review before merge. The development pipeline includes unit, integration, fuzz, and invariant testing. Most critical repositories require GPG signing to commit code.