# Secure Asset Management

Secure Asset Management refers to the infrastructure, technology, and procedures Avant Protocol uses to custody, transfer, and manage all protocol-controlled assets. Our approach is founded on using institutional-grade, multi-provider custody solutions to eliminate single points of failure and enforce strict, policy-based security on all transactions.

To achieve this, Avant leverages **leading Multi-Party Computation (MPC) custody solutions**. These platforms provide the core technologies that underpin our secure asset management framework.

## **Multi-Party Computation (MPC) Wallets**

Instead of relying on traditional private keys, which can be a single point of failure, Avant secures assets using **Multi-Party Computation (MPC)** wallets.

MPC is an advanced cryptographic method where a private key is split into **multiple encrypted shares**. These shares are distributed across independent systems, and a transaction can only be signed when a required threshold of parties cooperates in a secure cryptographic protocol. A complete private key is never regenerated or held in a single location. This technology provides superior protection against both external hacks and internal threats.

## **Transaction Policy & Governance Engine**

A critical component of our security is a powerful policy engine that enforces a predefined set of rules on all outgoing transactions. This creates robust operational guardrails and minimizes the risk of human error or malicious action. Key policies include:

* **Address Whitelisting:** Strategists are only permitted to interact with smart contracts and addresses that have been carefully reviewed and pre-approved by the security team. This prevents protocol funds from ever being sent to unauthorized or potentially malicious contracts.
* **Controlled Transaction Types:** The policy engine restricts operations to specific, approved functions (e.g., certain types of swaps or deposits). This reduces the attack surface and prevents unauthorized or high-risk transactions.
* **Role-Based Access Control (RBAC):** Team members are assigned specific roles with granular permissions, ensuring they can only perform the actions necessary for their duties within the established security parameters.

## **Secure Transfer Environment**

All transactions are conducted within a secure environment that protects assets from external threats during transit.

This multi-faceted approach to asset management provides operational efficiency without compromising on the institutional-grade security required to protect user funds.
