DHUBiC Trust Center
Transparency about security, compliance, and infrastructure in one place.
Trust Center
DHUBiC
Build, Operate, and Grow Financial Systems — All in One Platform
DHUBiC (Digital Hubs Inter-Connected) is a next-generation enterprise-grade FinTech platform giving financial institutions full control of their data, operations, and regulatory workflows. Designed cloud-native from the ground up, DHUBiC offers modular, multi-tenant, multi-region deployment with enterprise-grade security and compliance built in. Deploy only what you need — digital onboarding, KYC/AML, transaction processing, reporting, or custom workflows.
Security Certification
ISO 27001:2022
Certified Information Security Management System (ISMS)
Deployment Model
Multi-Region
Cloud-native global deployment with tenant isolation
Support
24/7
Enterprise support for all customers
Architecture
Multi-Tenant
Isolated and secure per-tenant infrastructure
ISO/IEC 27001:2022 Certificate
CertificationsOfficial ISO 27001:2022 certificate demonstrating DHUBiC's certified ISMS.
Security Overview
SecurityTechnical overview of DHUBiC security architecture, encryption standards, access controls, audit logging, and compliance posture.
Data Processing Agreement (DPA)
LegalStandard Data Processing Agreement template covering data processing terms, security obligations, and breach notification procedures.
Acceptable Use Policy
PoliciesDefines acceptable use of DHUBiC information systems, assets, and resources by employees, contractors, and third parties.
Access Control Policy
PoliciesGoverns logical and physical access to DHUBiC systems and data. Covers RBAC, provisioning, deprovisioning, and periodic access reviews aligned with ISO 27001:2022.
Asset Management Policy
PoliciesDefines identification, classification, ownership, and lifecycle management of information assets across DHUBiC's infrastructure and operations.
Audit and Monitoring Policy
PoliciesEstablishes requirements for security monitoring, log management, audit trail integrity, and review of system activity across all environments.
Configuration Management Policy
PoliciesDefines standards for secure configuration, hardening baselines, and change control of systems, infrastructure, and software components.
Data Classification Policy
PoliciesEstablishes a data classification framework (Public, Internal, Confidential, Restricted) and handling requirements for each tier.
Data Loss Prevention (DLP) Policy
PoliciesDefines controls to detect and prevent unauthorised transmission, storage, or exposure of sensitive and classified data.
Data Masking Policy
PoliciesSpecifies requirements for masking, anonymisation, and pseudonymisation of sensitive data in non-production environments and outputs.
Data Protection Policy
PoliciesOverarching policy governing the processing, storage, and protection of personal and sensitive data in compliance with applicable privacy regulations.
Data Retention and Disposal Policy
PoliciesDefines retention schedules for all data categories and procedures for secure disposal of data and physical media at end-of-life.
ICT Continuity Policy
PoliciesEstablishes requirements for continuity of ICT services, including recovery objectives, failover procedures, and resilience of critical systems.
Incident Management Policy
PoliciesDefines incident classification, response procedures, escalation paths, notification obligations, and post-incident review requirements.
Information Security Policy
PoliciesOverarching security governance framework aligned with ISO/IEC 27001:2022. Defines security objectives, roles, responsibilities, and policy management.
Network Security Policy
PoliciesGoverns network segmentation, perimeter controls, secure remote access, wireless security, and network monitoring requirements.
Password Management Policy
PoliciesDefines password complexity, length, rotation, storage, and MFA requirements for all user and service accounts.
Physical Security Policy
PoliciesEstablishes controls for physical access to offices, data centres, and equipment. Covers visitor management, clean desk, and secure media disposal.
Risk Management Policy
PoliciesDefines the risk assessment and treatment methodology, risk appetite, risk register maintenance, and risk reporting cadence.
Software Development Security Policy
PoliciesMandates secure coding standards, threat modelling, SAST/DAST in CI/CD, dependency scanning, and security review requirements for all software releases.
Supply Chain Security Policy
PoliciesGoverns security assessment, onboarding, monitoring, and offboarding of third-party vendors and subprocessors with access to DHUBiC systems or data.
Training and Awareness Policy
PoliciesDefines mandatory security awareness training requirements, frequency, completion tracking, and phishing simulation programmes for all staff.
Vulnerability Management Policy
PoliciesEstablishes requirements for vulnerability scanning, penetration testing, severity-based remediation SLAs, and patch management across all systems.
ISO/IEC 27001:2022
Scope: Information Security Management System (ISMS) | Certified organisation | Covers product development, customer data processing, and infrastructure operations | Built and operated in full compliance with ISO/IEC 27001:2022 requirements | Publicly stated on company website
Audit year: 2025
Hosting: Cloud-native platform designed from the ground up for scalability and resilience. Multi-region deployment with high availability and resource isolation per tenant. Browser-based access — no client installation required.
Encryption: AES-256 encryption at rest | TLS 1.2+ in transit | Digitally signed workflows for transactions, approvals, and reports.
Office hours: 24/7 for enterprise customers
Keep your subprocessors list up to date to increase trust with prospects.