TRUST CENTRE

We use our own platform to manage our own compliance.

CyberHeed's security posture is managed on CyberHeed. Everything we ask our customers to do, we do ourselves. Here's how we protect your data and maintain our own compliance.

ISO/IEC 27001:2022 Certified
Australian Data Residency
Per-Organisation Isolation
Annual Penetration Testing
CERTIFICATIONS

ISO/IEC 27001:2022 Certified.

Our information security management system is certified to the ISO/IEC 27001:2022 standard. We certified early — before it was commercially necessary — because it validated our own platform.

StandardISO/IEC 27001:2022
Certification BodyPrescient Security LLC
ScopeCyberHeed platform and operations
SurveillanceAnnual surveillance audits
RecertificationThree-year cycle

We chose to certify early — before customers required it. Not because it was commercially necessary, but because it validated our own platform. If CyberHeed helps organisations achieve ISO 27001, we should be able to demonstrate that it works by using it ourselves.

Our ISMS covers the entire CyberHeed platform. We manage our ISMS on CyberHeed. When we improve the platform, we experience those improvements as users first.

INFRASTRUCTURE SECURITY

Hosted in Australia. Encrypted everywhere. Protected at the edge.

Our infrastructure is designed for security, performance, and Australian data sovereignty.

AWS Cloud Infrastructure

CyberHeed runs on Amazon Web Services using ECS Fargate — serverless container infrastructure with automatic scaling, patching, and isolation. Containers are ephemeral — created for each request and destroyed after processing.

Encryption at Rest and in Transit

All data encrypted at rest using AES-256 and in transit with TLS 1.2+. Every data path encrypted. HSTS enforced to prevent protocol downgrade attacks.

Cloudflare CDN and WAF

All traffic passes through Cloudflare. DDoS protection, bot mitigation, rate limiting, and threat intelligence applied at the edge before requests reach our infrastructure.

Australian Data Residency

All customer data stored and processed within Australian borders. No data routing through international jurisdictions. A hard architectural constraint, not a configuration option.

DATA PROTECTION

Your data is isolated, controlled, and audited.

Every organisation on CyberHeed operates in its own isolated environment.

Per-Organisation Data Isolation

Each organisation's data is logically isolated at the database level. Isolation is enforced at the application layer and validated through automated testing in our CI/CD pipeline.

Evidence Storage

Evidence files are stored in encrypted S3 buckets with per-organisation key separation. Access controlled through application-layer authorisation.

Role-Based Access Control

Access governed by RBAC enforced at both application and API layers. Every permission grant and revocation is logged.

Audit Logging

All administrative actions logged in append-only, tamper-resistant storage. Logs include timestamp, actor, action, target, and outcome for every auditable event.

AI SECURITY

How we secure AI interactions with your compliance data.

Per-Organisation AI Context

AI interactions are scoped to your organisation's data only. One organisation's AI interactions cannot influence, inform, or leak into another organisation's experience.

No Model Training on Customer Data

Your compliance data is not used to train AI models. Your policies, evidence, SmartPrep conversations — none of it is used as training data.

AI Output Review

AI-generated content is always presented for human review before it becomes part of your compliance record. The AI drafts. Your team reviews, edits, and approves.

OUR COMPLIANCE PRACTICES

What we do to maintain our own security posture.

Annual Penetration Testing

Independent third-party testing covering web application, API, authentication, authorisation, data isolation, and infrastructure.

Vulnerability Scanning

Automated scanning across infrastructure and application stack. Critical vulnerabilities prioritised for immediate remediation.

Incident Response

Documented procedures covering detection, assessment, containment, eradication, recovery, and post-incident review. Managed on CyberHeed.

Security Awareness Training

All team members complete training. Phishing simulations, secure development practices, and incident reporting tracked as ISMS controls.

Supplier Security Assessment

Third-party suppliers assessed against security requirements covering data handling, access controls, and compliance posture.

Business Continuity

BCP and DR plans documented, tested, and reviewed. Backup procedures automated. RPO and RTO defined and tested regularly.

FREQUENTLY ASKED QUESTIONS

Common security questions.

Questions we hear most often from security teams evaluating CyberHeed.

All customer data is stored in Australian AWS regions. This includes compliance data, evidence files, SmartPrep conversation records, user information, and AI-generated content. There is no data routing through international jurisdictions. Australian data residency is a hard architectural constraint.
No. Each organisation operates in a fully isolated workspace. Data isolation is enforced at the application layer and validated through automated testing in our CI/CD pipeline.
No. Your compliance data, evidence, policies, and SmartPrep conversations are never used to train AI models. The AI models are pre-trained on general knowledge and fine-tuned on compliance framework content.
CyberHeed is ISO/IEC 27001:2022 certified, issued by Prescient Security LLC. We manage our own ISMS on CyberHeed and undergo annual surveillance audits with full recertification on a three-year cycle.
All data encrypted at rest using AES-256 and in transit using TLS 1.2+. This applies to all data paths. We enforce HSTS and use per-organisation key separation for evidence storage.
Yes. Independent third-party penetration testing is conducted annually covering the full application stack. Findings are triaged, remediated according to SLAs, and verified.
Yes. All your compliance data is available for export at any time. Your data is yours. CyberHeed is a tool for managing it, not a lock-in mechanism.
Data is retained for a defined period to allow for export. After the retention period, data is permanently deleted from all systems including backups. Deletion is confirmed and documented.
Yes. Contact us and we'll provide a copy of our certificate along with any additional security documentation you need for your procurement or vendor assessment process.

Questions about our security?

We're transparent about how we protect your data. If you have questions about our security practices, certifications, or data handling — we're here to answer them.