How We Protect Your Data

Kreddi maintains enterprise-grade security controls with a formal Information Security Management System aligned to ISO 27001:2022.

Security at a Glance

256-bit EncryptionAES-256 at rest, TLS 1.2+ in transit
SOC 2 InfrastructureIndependently audited hosting and database
PCI DSS Level 1Card data handled by certified payment processor
ASIC RegulatedCorporate Authorised Representative under ACL
Privacy Act CompliantNotifiable Data Breaches scheme
WAF ProtectedOWASP Top 10 managed rulesets
DDoS ProtectedAutomatic multi-layer mitigation
24/7 MonitoringReal-time alerts across all systems
ISO 27001 AlignedFormal ISMS with certification in progress
Formal ISMS6 core security policies

How We Protect Your Data

Encryption & Access Control

All customer data is encrypted with AES-256 at rest and TLS 1.2+ in transit. Database connections require SSL. Access is restricted to authorised personnel with multi-factor authentication enforced on every system. Row-level security ensures customers can only ever see their own data.

Monitoring & Incident Response

We run 24/7 security monitoring across application, database, and infrastructure layers with real-time alerting and defined escalation procedures. We maintain a formal incident response plan with documented playbooks, severity levels, and response SLAs. We comply with the Notifiable Data Breaches scheme and have established OAIC notification procedures.

Third-Party Security

All technology partners are independently certified -- our infrastructure providers hold SOC 2 Type 2 certification, and payment processing is PCI DSS Level 1 compliant. We never store card data. Every supplier undergoes security assessment, and we maintain Data Processing Agreements with all providers who handle personal information.

Our Compliance Journey

Completed

  • ASIC regulation
  • Privacy Act compliance
  • Platform security hardening

Current

  • ISO 27001 ISMS implementation
  • Formal policies and risk management

Next

  • Penetration testing
  • ISO 27001 certification audit

Questions?

For detailed security information or to request our full security documentation, get in touch.

Contact Us