Trust & Security

Security built for regulated industries.

Tailor is 100% Australian infrastructure. Your documents never leave Australian soil. Here’s how we protect them.

Infrastructure & Hosting

Azure Australia East (Sydney)

All compute, storage, and databases hosted in Microsoft Azure's Sydney region. No data leaves Australian jurisdiction.

Azure SQL Database

Fully managed relational database with automatic backups, geo-redundant storage, and point-in-time restore up to 35 days.

Azure CDN + Front Door

Content delivery via Australian edge nodes. DDoS protection included. WAF rules applied at the edge.

Encryption & Data Protection

AES-256 Encryption at Rest

All documents, metadata, and user data encrypted at rest using AES-256. Keys managed via Azure Key Vault with FIPS 140-2 Level 2 HSMs.

TLS 1.2+ in Transit

All connections encrypted with TLS 1.2 or higher. HSTS enforced. No plaintext communication permitted.

Azure Key Vault

Cryptographic keys, secrets, and certificates stored in hardware security modules. Access audited and rotated on schedule.

Compliance & Certifications

SOC 2 Type II (In Progress)

SOC 2 Type II audit initiated. Expected completion Q3 2026. Trust Service Criteria: Security, Availability, Confidentiality.

Australian Privacy Act

Fully compliant with the Australian Privacy Principles (APPs). Privacy Impact Assessment conducted. Data Processing Agreement available.

Essential Eight Alignment

Application control, patching, MFA, admin privilege restriction, Microsoft Office macro controls, user application hardening, and multi-factor authentication aligned to ASD Essential Eight maturity model.

Access Controls & Identity

SSO via Microsoft Entra ID

Enterprise single sign-on using SAML/OIDC via Microsoft Entra ID (Azure AD). No separate passwords for your team.

Role-Based Access Control

Granular permissions: document owner, reviewer, admin, viewer. PSPF classification levels and information barriers for sensitive documents.

MFA Enforcement

Multi-factor authentication enforced for all admin accounts. Configurable MFA policies for reviewer access.

Testing & Assurance

Annual Penetration Testing

Independent penetration testing conducted annually by a CREST-accredited firm. Findings remediated within SLA. Summary reports available on request.

Continuous Monitoring

Azure Monitor, Application Insights, and automated alerting for security events. 24/7 anomaly detection on authentication and data access patterns.

Security Whitepaper

Detailed architecture and compliance posture document available for IT security teams during procurement evaluation. Request via hello@tailor.au.

Need more detail?

Request our security whitepaper or schedule a call with our team to discuss your specific compliance requirements.

Tailor — AI Document Review & Consensus Platform | Tailor