State Mint

Information Security Program

State Mint security controls for infrastructure, application access, incident readiness, and data protection.

Last updated: 2026-02-12 | Contact: admin@nvprodvcts.com

Published Security Program

State Mint maintains a documented information security program covering governance, control ownership, technical safeguards, and operating procedures.

  • Documented control statements for platform and operational security.
  • Periodic review and updates of security controls and responsibilities.
  • Security contact and escalation path maintained through the DPO channel.

Network Segregation and Threat Protection

Production resources are segregated from non-production workflows. Threat protection controls are used to monitor and reduce network attack risk, including perimeter controls and provider-level security telemetry.

Endpoint Protection

Company endpoints are required to run anti-malware protection and security updates to reduce malware and unauthorized access risk.

Operational Security Baseline

  • Screen lock requirements for workstations.
  • Password complexity and credential hygiene standards.
  • Multi-factor authentication for critical systems where supported.
  • Clear-desk and device handling expectations for sensitive business information.

Access Control and Least Privilege

Access to systems processing personal data is restricted to authorized personnel on a least-privilege basis, with authentication requirements and role-based boundaries.

Data Classification and Encryption

Sensitive data is classified and protected through encryption controls. Data in transit uses TLS-enabled transport. Sensitive token payloads are encrypted at rest before storage in application data stores.

Vulnerability and Threat Management

State Mint uses an ongoing vulnerability and threat management process to identify, triage, and remediate security findings based on risk.

Security Contact

Security and privacy concerns should be reported to admin@nvprodvcts.com.