This policy establishes security protocols and incident response procedures to protect organizational crypto assets and respond effectively to security breaches or suspected compromises.
4.2 Security Protocols
4.2.1 Access Security
4.2.2 Device Security
4.2.3 Operational Security
| Level | Description | Examples |
|---|---|---|
| CRITICAL | Confirmed loss or active compromise | Unauthorized transaction, wallet drained, seed phrase exposed |
| HIGH | Suspected compromise or high-risk activity | Suspicious login, phishing attempt clicked, signer device stolen |
| MEDIUM | Potential vulnerability identified | Unusual activity detected, policy violation, failed login attempts |