Skip to main content
Enterprise security

Your data security is our priority.

We understand the sensitivity of compliance documents. Ready Set Compliant is built with enterprise-grade security to protect your organisation, staff, and participant data.

01 — Protection

Built for security — at every layer.

Every aspect of our platform is designed with security and privacy in mind.

Control 01

Data encryption

All data is encrypted in transit using TLS 1.3 and at rest via our infrastructure provider. Your documents are stored securely with industry-standard encryption.

Control 02

Secure cloud infrastructure

Your data is hosted on Supabase, a trusted cloud platform with enterprise-grade infrastructure, encryption, and data protection built in.

Control 03

Role-based access control

Granular permission controls ensure staff only see their own documents. Administrators can manage access levels to protect sensitive information.

Control 04

Audit logging

Activity logs track document verification, access events, and audit portal usage. We are continually expanding our audit trail coverage.

Control 05

Infrastructure backups

Our infrastructure provider performs automated backups with point-in-time recovery capabilities to protect against data loss.

Control 06

Secure authentication

Modern authentication with strong password requirements and secure session management. Rate limiting protects against brute-force attacks.

02 — Infrastructure

Enterprise-grade infrastructure.

Ready Set Compliant is hosted on Supabase, a trusted cloud platform with enterprise security certifications. Our infrastructure is designed for reliability, scalability, and security.

What we run
  • 01DDoS protection via infrastructure provider
  • 02Regular security updates and patches
  • 03Isolated tenant environments with row-level security
  • 04Encrypted database connections
  • 05Restricted API access with CORS origin validation
  • 06Rate limiting on authentication endpoints
  • 07Login brute-force protection
Defence in depth
L1Application layer
Authentication, authorization, input validation
L2Network layer
Firewalls, TLS encryption, secure APIs
L3Data layer
Encryption at rest, secure backups
03 — Standards

Compliance & standards.

We’re committed to meeting the highest standards for privacy and data protection.

01

Privacy Act aligned

Built to align with the Privacy Act 1988 (Cth) and Australian Privacy Principles (APPs). We implement access controls, data isolation, and secure storage practices.

02

NDIS Practice Standards

Designed to support NDIS Practice Standards for information management and privacy.

04 — Practices

Our security practices.

The disciplines we run every day to keep your data safe.

01 — Practice

Security headers & best practices

We implement industry-standard security headers including Content Security Policy (CSP), HSTS, X-Frame-Options, X-Content-Type-Options, and Referrer-Policy to protect against common web vulnerabilities.

02 — Practice

Multi-factor authentication

All accounts are protected with TOTP-based multi-factor authentication (Time-based One-Time Password). Users can enrol via QR code in their account settings for an additional layer of security.

03 — Practice

Audit logging & input validation

Comprehensive audit logging tracks all significant actions across the platform. All API requests are validated with strict schemas to prevent malformed or malicious data from entering the system.

04 — Practice

Multi-tenant data isolation

Every organisation's data is fully isolated at the database level using row-level security policies. Staff can only access their own documents.

05 — Practice

Real-time error monitoring

We use real-time error monitoring and alerting to rapidly detect and resolve issues that could impact security or availability.

06 — Practice

Data minimisation

We only collect and retain data that is necessary for providing our service, reducing exposure and risk.

07 — Practice

Incident response

We maintain a formal incident response plan aligned with the Australian Privacy Act. In the unlikely event of a security incident, we commit to prompt and transparent communication.

05 — Talk to us

Questions about security?

We’re happy to discuss our security practices in detail. Contact us for more information or to request our security documentation.