Three non-negotiable pillars
The foundation of how we protect your operational data.
Australian Data Residency
All production data, keys, and logs reside exclusively in Microsoft Azure Australia East (Sydney). Nothing leaves Australian infrastructure.
- Primary: Australia East (Sydney)
- Backup: Australia Southeast (Melbourne)
AES-256 Encryption
Data at rest is encrypted with AES-256. In transit we enforce TLS 1.3. External system handshakes use RSA-4096 key exchange.
- Envelope encryption
- Automated key rotation
Hardware Isolation
Integration secrets and private keys are never stored in the application database. They are isolated in hardware-backed Azure Key Vault.
- Azure Key Vault integration
- Just-in-time access
Sensitive data never touches a disk
Most integration platforms store data payloads on temporary disks during processing. If that server is compromised, your operational data is exposed.
Demiton processes sensitive data exclusively in volatile memory:
- Ingestion - Data is pulled from source systems into an ephemeral RAM buffer.
- Transformation - Data is aligned, validated, and cryptographically signed in memory.
- Delivery - The buffer streams directly to the target system via an encrypted tunnel.
- Closure - Once delivery is confirmed, the memory address is zeroed and the audit trail is sealed.
Transform.Align.Encrypt()No disk I/O
Technical Controls
A detailed breakdown for your CISO or Risk Officer.
| Control Area | Implementation |
|---|---|
| Application Security | Automated dependency scanning (Snyk), static analysis (SAST), and regular penetration testing. |
| Access Control (RBAC) | Enforced multi-factor authentication (MFA). Role-based access control tied to Azure Entra ID. |
| Network Security | Azure VNet Peering, Private Link, and strict egress allow-listing for integration endpoints. |
| Audit Logging | Immutable logs of every transaction attempt, IP address, and outcome. Retained for 7 years in cold storage. |
| Disaster Recovery | Geo-redundant backups across Sydney and Melbourne zones. RPO: 5 minutes. RTO: 4 hours. |
Responsible Disclosure
If you identify a potential vulnerability, contact security@demiton.io directly. We respond to all verified reports within 48 hours.