How we keep your crypto safe

Optimal protection for your assets

Committed to your safety

Layered security

Your assets are kept safe in offline storage systems that use multisignature technology, role-based governance protocols, and multiple layers of biometric access controls.

Industry-leading transparency

Luno publishes monthly Proof of Reserves via Moore Audit, with added Merkel Tree technology so you can always make sure your crypto is exactly where it’s supposed to be.

Fully certified

Our systems and processes undergo regular audits and are certified to meet international standards, including ISO/IEC 27001:2022, ISO/IEC 27701:2019, and ISO 22301:2019.

Privacy first

Your personal and financial information is only stored and processed in cloud services that meet our strict infrastructure security requirements.

Stay in the know

We keep our members updated in real-time of any incidents using our Status page, which has the current status of our services, details of any current incident, and information about upcoming scheduled maintenance.

Stay in the know

We keep our members updated in real-time of any incidents using our Status page, which has the current status of our services, details of any current incident, and information about upcoming scheduled maintenance.

Stay in the know

We keep our members updated in real-time of any incidents using our Status page, which has the current status of our services, details of any current incident, and information about upcoming scheduled maintenance.

Keeping you and your crypto secure

Authorisation

Luno ensures that you first authorise any high-risk actions that are performed on your account, such as sending crypto.

Authorisation

Luno ensures that you first authorise any high-risk actions that are performed on your account, such as sending crypto.

Authorisation

Luno ensures that you first authorise any high-risk actions that are performed on your account, such as sending crypto.

Deep freeze storage

The majority of customer cryptocurrency is stored security offline and offsite in "deep freeze", which is managed by Bitgo Custody and Fireblocks, two of the world's most secure and compliant digital asset custody solutions.

Deep freeze storage

The majority of customer cryptocurrency is stored security offline and offsite in "deep freeze", which is managed by Bitgo Custody and Fireblocks, two of the world's most secure and compliant digital asset custody solutions.

Deep freeze storage

The majority of customer cryptocurrency is stored security offline and offsite in "deep freeze", which is managed by Bitgo Custody and Fireblocks, two of the world's most secure and compliant digital asset custody solutions.

Hot wallets

Multi-signature hot wallets are used to facilitate instant transactions. Backups of the keys are stored offline in geographically-dispersed safety deposit boxes. Three keys are required, with one stored by an external custodian to ensure additional security.

Hot wallets

Multi-signature hot wallets are used to facilitate instant transactions. Backups of the keys are stored offline in geographically-dispersed safety deposit boxes. Three keys are required, with one stored by an external custodian to ensure additional security.

Hot wallets

Multi-signature hot wallets are used to facilitate instant transactions. Backups of the keys are stored offline in geographically-dispersed safety deposit boxes. Three keys are required, with one stored by an external custodian to ensure additional security.

Air gaps

Private keys are stored offline, and offsite, on a machine not connected to the internet or other networks. The air gap machine is stored in a safe, inside a managed security vault, at an undisclosed offsite location.

Air gaps

Private keys are stored offline, and offsite, on a machine not connected to the internet or other networks. The air gap machine is stored in a safe, inside a managed security vault, at an undisclosed offsite location.

Air gaps

Private keys are stored offline, and offsite, on a machine not connected to the internet or other networks. The air gap machine is stored in a safe, inside a managed security vault, at an undisclosed offsite location.

Two-factor authentication

Two-factor Authentication (2FA) is supported and provides another level of authentication and protection for your account, by generating a one-time code that can only be accessed on your smartphone.

Two-factor authentication

Two-factor Authentication (2FA) is supported and provides another level of authentication and protection for your account, by generating a one-time code that can only be accessed on your smartphone.

Two-factor authentication

Two-factor Authentication (2FA) is supported and provides another level of authentication and protection for your account, by generating a one-time code that can only be accessed on your smartphone.

Infrastructure

Our infrastructure is hosted on Amazon Web Services, which offers a secure environment for Luno services to ensure the safest possible access control, data encryption, monitoring and isolation.

Infrastructure

Our infrastructure is hosted on Amazon Web Services, which offers a secure environment for Luno services to ensure the safest possible access control, data encryption, monitoring and isolation.

Infrastructure

Our infrastructure is hosted on Amazon Web Services, which offers a secure environment for Luno services to ensure the safest possible access control, data encryption, monitoring and isolation.

Firewalls

Our internal networks are protected by firewalls and not exposed to the internet. All internet traffic is also encrypted to the same standard as external services. Our firewall policies are designed to allow minimum permissions for different applications and roles to interact. All application and database servers are running inside private networks, with isolation between staging and production environments. Public-facing services are made available by dedicated load balancers that only handle HTTPS requests.

Firewalls

Our internal networks are protected by firewalls and not exposed to the internet. All internet traffic is also encrypted to the same standard as external services. Our firewall policies are designed to allow minimum permissions for different applications and roles to interact. All application and database servers are running inside private networks, with isolation between staging and production environments. Public-facing services are made available by dedicated load balancers that only handle HTTPS requests.

Firewalls

Our internal networks are protected by firewalls and not exposed to the internet. All internet traffic is also encrypted to the same standard as external services. Our firewall policies are designed to allow minimum permissions for different applications and roles to interact. All application and database servers are running inside private networks, with isolation between staging and production environments. Public-facing services are made available by dedicated load balancers that only handle HTTPS requests.

Organisational security

All Luno employees are required to use cryptographically-secure Multi-Factor Authentication such as hardware U2F keys to access internal services. Engineers do not have access to application credentials or production servers. All deployments are performed independently by a deployment server. As part of our hiring process, candidates must pass criminal background checks before becoming a Luno employee.

Organisational security

All Luno employees are required to use cryptographically-secure Multi-Factor Authentication such as hardware U2F keys to access internal services. Engineers do not have access to application credentials or production servers. All deployments are performed independently by a deployment server. As part of our hiring process, candidates must pass criminal background checks before becoming a Luno employee.

Organisational security

All Luno employees are required to use cryptographically-secure Multi-Factor Authentication such as hardware U2F keys to access internal services. Engineers do not have access to application credentials or production servers. All deployments are performed independently by a deployment server. As part of our hiring process, candidates must pass criminal background checks before becoming a Luno employee.

Bug bounty

Bug bounty

Bug bounty

We work with an active community of security researchers through our Bug Bounty Program to continually improve the security of Luno and our members' funds.

Start investing today

Your Luno app makes investing straightforward, with a clear and intuitive app experience we know you’ll love. 

Start investing today

Your Luno app makes investing straightforward, with a clear and intuitive app experience we know you’ll love. 

Start investing today

Your Luno app makes investing straightforward, with a clear and intuitive app experience we know you’ll love.