Cloud security lock with global network
Security

Your Data. Our Responsibility.

Construction contracts contain some of the most commercially sensitive data in your organisation. Stact is engineered from the ground up to protect it — with enterprise-grade security, strict data isolation, and a clear path to ISO 27001 certification.

Security by Design, Not Afterthought
Stact handles sensitive contract data for construction firms across Australia. We recognise the trust that requires — and we've built every layer of our platform to honour it. From data encryption to access controls, security isn't a feature we bolted on. It's how we build.
ISO 27001

All Stact systems are designed to be ISO 27001 compliant. We are actively working towards full certification and accreditation under this internationally recognised information security management standard.

Australian Privacy Act

Stact complies with the Australian Privacy Act 1988 and the Australian Privacy Principles (APPs), ensuring your data is handled in accordance with local regulatory requirements.

How We Protect Your Data
Six foundational pillars that underpin every aspect of the Stact platform.

Encryption at Rest

All customer data is encrypted using AES-256 encryption at rest. Database volumes, backups, and file storage are all encrypted.

Encryption in Transit

All data transmission uses TLS 1.2+ encryption. No unencrypted connections are accepted at any endpoint.

Tenant Isolation

Every customer's data is logically isolated at the database level. Cross-tenant access is architecturally impossible.

Role-Based Access Control

Four-tier RBAC (Owner, Admin, Manager, Analyst) with JWT-based authentication and per-endpoint permission enforcement.

Audit Trails

Every significant action is logged with timestamp, user ID, IP address, and action detail. Audit logs are immutable and retained per policy.

Infrastructure Security

Deployed on AWS (Sydney region, ap-southeast-2). ECS Fargate containers, RDS with automated backups, and VPC network isolation.

Our Path to ISO 27001 Certification
We are committed to achieving full ISO 27001 certification. Here is our structured roadmap towards accreditation.
1

Foundation

ISMS design & gap analysis

2

Implementation

Controls & policies deployment

3

Internal Audit

Verification & remediation

4

Certification

External audit & accreditation

Have Security Questions?

Our team is available to discuss your specific security and compliance requirements.

Contact Our Team