ecrop
offers you a reliable and regulated solution (license pending): crypto custody according to KWG
and CryptoAssetTransferV
. With our multi-level security architecture based on the principle of “Security in Depth” and incorporating state-of-the-art technologies like Hardware Security Modules (HSMs
) and Multi-Factor Authentication (MFA
), your crypto assets are optimally protected.
Why is secure custody of crypto assets so important?
Crypto assets exist exclusively as digital entries on the blockchain. The ownership and control of these entries are enabled through cryptographic keys (Private Keys). The loss or theft of these keys, or even just the loss of control over them, leads to the irrevocable loss of the associated crypto assets. The secure custody, management, and control of Private Keys are therefore crucial for protecting your digital assets. In addition to the technical challenges, the custody of crypto assets also involves regulatory risks that need to be minimized.
The ecrop
Solution: Maximum Security and Compliance through Multi-Custody Approach
ecrop
uses a multi-custody approach that combines the advantages of cold storage and state-of-the-art security technology to ensure the highest possible protection for your crypto assets while maximizing flexibility and availability for transactions. This approach allows us to meet our customers’ individual needs while maintaining the highest security standards and complying with all relevant regulatory requirements.
HSMs
). HSMs
are specialized hardware devices that offer a high degree of tamper protection and are ideal for secure storage of cryptographic keys.
RBAC
) limits access to sensitive data and functions to a minimum number of authorized persons.MFA
): MFA
requires multiple independent factors for authentication, significantly increasing security.AES-256
) and during transmission (TLS 1.3
).ecrop
fulfills all relevant regulatory requirements for crypto custody:
KWG
and CryptoAssetTransferV
.GDPR
and BDSG
.ecrop
’s custody services, they can store their assets in cold storage and benefit from maximum security and compliance.ecrop
generates unique key pairs for each customer in HSMs
using cryptographically secure random number generators (CSPRNGs
). The keys are never stored or transmitted unencrypted.HSMs
and are protected against unauthorized access.MFA
and four-eyes principle). All key data is encrypted.HSMs
provides maximum security and tamper protection for your keys.ecrop
ensures secure and efficient processing of crypto transactions.