Security Policies

Security at 6MM is built into every layer of the system.

As an embedded perpetual trading infrastructure, 6MM applies strict security policies to protect platform stability, partner integrations, and trading operations.

These policies define how security risks are identified, mitigated, and managed across the 6MM ecosystem.


Security Design Principles

6MM follows several core security principles:

  • Defense in Depth

    Multiple layers of protection across infrastructure, application, and trading logic

  • Least Privilege

    Access rights are granted only when necessary and strictly limited in scope

  • Separation of Duties

    Critical systems, environments, and permissions are isolated

  • Fail-Safe Defaults

    Systems default to secure states under abnormal conditions


Infrastructure Security

6MM enforces security controls at the infrastructure level, including:

  • Network segmentation and access isolation

  • Encrypted communication between services

  • Continuous system monitoring and alerting

  • Redundancy and failover mechanisms

Infrastructure access is restricted and audited.


Application & Trading Engine Security

Security measures applied to the trading layer include:

  • Deterministic order matching logic

  • Real-time validation of orders and margin requirements

  • Strict input validation for APIs and SDKs

  • Rate limiting and abuse prevention

These measures ensure consistent behavior even during extreme market conditions.


Access Control & Authentication

  • Role-based access control (RBAC) is enforced internally

  • API credentials are permission-scoped

  • Session and credential lifecycles are managed securely

End-user identity and authentication remain under partner control.


Data Protection

6MM applies data protection standards such as:

  • Encryption of sensitive data at rest and in transit

  • Minimal data retention policies

  • Controlled access to operational logs

6MM does not store or manage end-user personal information.


Continuous Security Review

Security policies are maintained through:

  • Regular internal security assessments

  • Code reviews and automated testing

  • External audits and third-party reviews (when applicable)

Policies evolve alongside system architecture and threat models.


Partner Responsibilities

While 6MM secures its infrastructure and trading systems:

  • Partners are responsible for user-facing security

  • Asset custody and user account protection remain with partners

  • Secure integration practices are required

Clear responsibility boundaries help reduce systemic risk.

Last updated