1. Non-repudiation of transactions through end-to-end security systems.
2. Minimize the exposure of API Key used during exchange transactions.
3. Verify access authorization and limit access per authorization to security data.
4. Log the records for all access data and perform regular audit
5. Perform system integrity check by constantly monitoring any modifications arose within the system.
6. Implement multi-level security protocols that prohibit one system from completing a task from the beginning to the end.
7. Design each step to leave an auditing record whereby any outstanding triggers an instant alert.