The Sovereign Standard
Our three non-negotiable pillars of data protection.
Australian Sovereignty
We guarantee Data Residency. All production data, keys, and logs reside exclusively in Google Cloud (Sydney Region).
- Region: australia-southeast1
- Backup: australia-southeast2
Military-Grade Encryption
Data is encrypted at rest using AES-256. In transit, we enforce TLS 1.3. For banking handshakes, we utilize strict RSA-4096 key exchange.
- Envelope Encryption
- Automated Key Rotation
Hardware Isolation
Banking secrets (Private Keys) are never stored in our application database. They are isolated in hardware-backed Key Management Services (KMS).
- Azure Key Vault Integration
- Just-in-Time Access
Protocol Zero:
The "Ram-Disk Enclave"
Traditional integration platforms (iPaaS) often store your file payload on a temporary disk before uploading it to the bank. This creates a "Data at Rest" vulnerability. If that server is compromised, your ABA file is exposed.
Demiton is different. We use a technique called "Pass-by-Value" via Volatile Memory.
- Ingestion: Data is pulled from Dynamics 365 directly into an ephemeral RAM buffer.
- Transmutation: The JSON data is converted to ABA/BAI2 format and cryptographically signed in memory.
- Transmission: The buffer streams directly to the Bank's SFTP server via an encrypted tunnel.
- Obliteration: Once the
226 Transfer Completesignal is received, the memory address is zeroed out.
Result: The unencrypted file never touches a hard drive.
Payload.Encrypt(RSA_4096)No Disk I/O Operations
Technical Controls Matrix
A detailed breakdown for your CISO or Risk Officer.
| Application Security | Automated dependency scanning (Snyk), Static Analysis (SAST), and regular penetration testing. |
| Access Control (RBAC) | Enforced Multi-Factor Authentication (MFA). Role-Based Access Control tied to Azure AD / Entra ID. |
| Network Security | VPC Peering, Private Service Connect, and strict Egress allow-listing for Bank IP addresses. |
| Audit Logging | Immutable logs of every transaction attempt, IP address, and outcome. Logs retained for 7 years in cold storage. |
| Disaster Recovery | Geo-redundant backups across Sydney and Melbourne zones. RPO: 5 minutes. RTO: 4 hours. |
Responsible Disclosure
Security is a community effort. We run a private bug bounty program for researchers. If you have identified a potential vulnerability, please contact security@demiton.io immediately.