Defence in Depth
Security in a blockchain analytics platform carries a dual mandate. The system must protect its own infrastructure — user data, API keys, analytics results — while simultaneously handling external blockchain data that may itself be adversarial. A compromised analytics platform does not merely lose data; it loses the trust of every compliance team, developer, and regulator that depends on the accuracy and integrity of its output.
Ludopoly Analytics addresses this through a six-layer defence-in-depth model. Each layer operates independently, so the failure or bypass of any single layer does not grant an attacker access to the system's core assets. The layers are not abstract categories — they correspond to concrete infrastructure components with specific configurations, monitoring surfaces, and incident response procedures.
Perimeter and Network
The outermost layer deploys a Web Application Firewall in front of all public-facing endpoints. Rate limiting, bot detection, IP reputation scoring, and DDoS mitigation operate here before any request reaches the application stack. Behind the WAF, the network layer enforces VPC isolation and micro-segmentation — service modules can communicate only with explicitly permitted peers, and no internal service is directly reachable from the public internet.
Identity and Access
Authentication uses a combination of OAuth 2.0, OpenID Connect, and JWT tokens. API consumers authenticate with scoped API keys; dashboard users authenticate through federated identity providers or email-based credentials with mandatory multi-factor authentication on Business and Enterprise tiers. Access control combines Role-Based Access Control for coarse-grained permissions with Attribute-Based Access Control for fine-grained policy enforcement — allowing rules such as "compliance analysts in the EU region can access AML data for EU-registered projects only."
Application and Data Protection
At the application layer, input validation, output encoding, and CSRF protection follow OWASP best practices across every endpoint. All personally identifiable information undergoes tokenisation before storage, meaning that even a complete database leak would not expose raw user data.
Encryption spans the entire data lifecycle. TLS 1.3 secures data in transit. AES-256-GCM encrypts data at rest. Field-level encryption using the Poseidon hash function protects particularly sensitive attributes. Key management relies on FIPS 140-2 Level 3 certified Hardware Security Modules, with automated rotation schedules — annual for customer master keys, ninety days for data encryption keys, and 180 days for API keys.
Monitoring and Response
The innermost layer operates a Security Information and Event Management system that continuously ingests logs from every other layer, correlates anomalies, and triggers automated incident response workflows. A dedicated Security Operations Centre monitors the SIEM output around the clock. The overall control framework encompasses 63 control points across six categories, designed to satisfy SOC 2 Type II, GDPR, and MiCA regulatory requirements simultaneously.
The security model is not a static configuration — control points are reviewed quarterly, penetration tests are conducted on every major release, and the SIEM rule set evolves with the threat landscape.