Information Security Policy

Mintstone Ltd, Internal and Customer-Facing
Version 1.0  ·  Effective: 9 April 2026  ·  Owner: Technical Director  ·  Review: Annually

This policy describes Mintstone's approach to information security. It is provided to prospective and current customers as evidence of our security posture during vendor due diligence. This document may be shared with customers under a non-disclosure agreement or as part of a contract.

1. Scope and Purpose

This Information Security Policy applies to all systems, data, personnel, and third-party services that support the Mintstone platform. It sets out the controls Mintstone maintains to protect:

Mintstone is committed to implementing security controls proportionate to the sensitivity of the data it processes and the regulatory environment of its customers (UK-regulated financial institutions).

2. Governance

Mintstone's security governance structure:

RoleResponsibility
Technical DirectorOwns this policy; accountable for security posture; approves changes to security controls
All PersonnelComply with this policy; report security incidents or concerns immediately

This policy is reviewed at least annually, or following any significant security incident or material change to the platform architecture.

3. Asset Classification

Mintstone classifies its information assets as follows:

ClassDescriptionExamples
Restricted Highly sensitive; disclosure would cause material harm Customer personal data, bank transaction data, API credentials, database credentials, encryption keys
Confidential Sensitive; internal use only Source code, internal architecture documents, customer contracts, pricing
Public Approved for external disclosure Product documentation, marketing materials, this policy

4. Access Control

4.1 Principle of Least Privilege

Access to systems and data is granted on the basis of least privilege. Personnel receive only the access required for their role. Access rights are reviewed when roles change and revoked on departure.

4.2 Authentication

4.3 Customer Tenant Isolation

Customer data is isolated at the database level. All database queries are scoped to the authenticated customer's organisation ID. Cross-tenant data access is architecturally prevented.

4.4 Privileged Access

Direct database access in production is restricted to named individuals, requires authenticated sessions, and all queries are logged.

5. Data Security

5.1 Encryption in Transit

All data transmitted between users and the Platform is encrypted using TLS 1.2 or higher. HTTP connections are automatically redirected to HTTPS. API communications with third-party services use TLS.

5.2 Encryption at Rest

5.3 Secret Management

API keys, credentials, and secrets are stored exclusively as environment variables in the deployment platform (Vercel) or as AWS IAM credentials with least-privilege policies. Secrets are never committed to source code repositories.

5.4 Data Minimisation

Mintstone collects and retains only the data necessary for the provision of the Platform. Customer data retention periods are defined in the DPA.

6. Infrastructure Security

6.1 Hosting Environment

6.2 Network Controls

6.3 Vulnerability Management

6.4 Logging and Monitoring

7. Third-Party and Supply Chain Security

Mintstone engages sub-processors as listed in the DPA Schedule 3. For each sub-processor:

8. Personnel Security

9. Security Incident Management

9.1 Definition

A security incident is any event that results in, or has the potential to result in, unauthorised access to, disclosure of, modification of, or loss of customer data or Mintstone systems.

9.2 Response Procedure

  1. Detect: Incidents may be identified via monitoring alerts, customer reports, or personnel observation.
  2. Contain: Immediate action to prevent further exposure (e.g., revoke credentials, isolate affected systems).
  3. Assess: Determine the nature, scope, and likely impact of the incident.
  4. Notify: Affected customers are notified within 72 hours of Mintstone becoming aware of an incident involving their data, in accordance with the DPA.
  5. Remediate: Implement fixes, update controls, and document lessons learned.
  6. Report: Where required by UK GDPR, notify the ICO within 72 hours.

9.3 Reporting

To report a suspected security incident or vulnerability: contact@mintstone.co.uk

10. Penetration Testing and Security Assessments

Mintstone commits to:

11. Business Continuity and Disaster Recovery

See the separate Business Continuity Policy for full details. Key points:

12. Compliance

Framework / ObligationStatusNotes
UK GDPR / DPA 2018 Compliant DPA in place with sub-processors; privacy policy published; ICO registration no. ZC119192
ISO 27001 In Progress Controls aligned with ISO 27001 Annex A; formal certification on our roadmap
SOC 2 Type II Planned On our roadmap as customer base scales
Cyber Essentials (UK) Planned Application in progress