Tailor is 100% Australian infrastructure. Your documents never leave Australian soil. Here’s how we protect them.
All compute, storage, and databases hosted in Microsoft Azure's Sydney region. No data leaves Australian jurisdiction.
Fully managed relational database with automatic backups, geo-redundant storage, and point-in-time restore up to 35 days.
Content delivery via Australian edge nodes. DDoS protection included. WAF rules applied at the edge.
All documents, metadata, and user data encrypted at rest using AES-256. Keys managed via Azure Key Vault with FIPS 140-2 Level 2 HSMs.
All connections encrypted with TLS 1.2 or higher. HSTS enforced. No plaintext communication permitted.
Cryptographic keys, secrets, and certificates stored in hardware security modules. Access audited and rotated on schedule.
SOC 2 Type II audit initiated. Expected completion Q3 2026. Trust Service Criteria: Security, Availability, Confidentiality.
Fully compliant with the Australian Privacy Principles (APPs). Privacy Impact Assessment conducted. Data Processing Agreement available.
Application control, patching, MFA, admin privilege restriction, Microsoft Office macro controls, user application hardening, and multi-factor authentication aligned to ASD Essential Eight maturity model.
Enterprise single sign-on using SAML/OIDC via Microsoft Entra ID (Azure AD). No separate passwords for your team.
Granular permissions: document owner, reviewer, admin, viewer. PSPF classification levels and information barriers for sensitive documents.
Multi-factor authentication enforced for all admin accounts. Configurable MFA policies for reviewer access.
Independent penetration testing conducted annually by a CREST-accredited firm. Findings remediated within SLA. Summary reports available on request.
Azure Monitor, Application Insights, and automated alerting for security events. 24/7 anomaly detection on authentication and data access patterns.
Detailed architecture and compliance posture document available for IT security teams during procurement evaluation. Request via hello@tailor.au.
Request our security whitepaper or schedule a call with our team to discuss your specific compliance requirements.