Security Overview
Security features and compliance information for Tasmanian Cloud
Tasmanian Cloud is built with security as a core principle. All infrastructure is designed to protect your data while maintaining compliance with Australian standards.
Certifications
| Certification | Status |
|---|---|
| ISO 27001 | 🔄 In Progress |
| Essential 8 | ✅ Aligned |
| Privacy Act 1988 | ✅ Compliant |
| ASD IRAP | 📋 Planned |
Data Sovereignty
- 100% Tasmanian - All data stored in Tasmania
- No Offshore Transfer - Data never leaves Australia
- Local Ownership - 100% Tasmanian owned and operated
Encryption
At Rest
| Service | Encryption |
|---|---|
| VM Storage | AES-256-XTS |
| Object Storage | AES-256-GCM + Post-Quantum |
| Database | AES-256-CBC |
| Backups | AES-256-GCM |
In Transit
- TLS 1.3 - All API and web traffic
- Perfect Forward Secrecy - ECDHE key exchange
- Certificate Pinning - Available on request
Post-Quantum Cryptography
Object storage uses NIST-approved post-quantum algorithms:
- Kyber-768 - Key encapsulation mechanism
- Dilithium-3 - Digital signatures
Network Security
DDoS Protection
- Cloudflare Magic Transit at edge
- 100 Tbps+ mitigation capacity
- Automatic attack detection
Firewall
Default-deny firewall with:
- Stateful packet inspection
- Geo-blocking available
- Custom rules via API
VPN
Netbird mesh VPN for private connectivity:
# Install Netbird client
curl -fsSL https://pkgs.netbird.io/install.sh | sh
# Join Tasmanian Cloud network
netbird up --management-url https://vpn.tasmanian.cloud
Access Control
Authentication
- API key-based authentication
- Optional MFA for panel access
- Session management with automatic expiry
Authorization
Role-based access control (RBAC):
| Role | Permissions |
|---|---|
| Owner | Full access |
| Admin | Manage resources, billing |
| Developer | Deploy, manage VMs |
| Viewer | Read-only access |
Audit Logging
All actions are logged:
- API requests
- Panel actions
- Resource changes
- Access attempts
Vulnerability Management
- Continuous Scanning - Weekly vulnerability assessments
- Patching - Critical patches within 24 hours
- Penetration Testing - Annual third-party testing
Incident Response
| Severity | Response Time |
|---|---|
| Critical | 15 minutes |
| High | 1 hour |
| Medium | 4 hours |
| Low | 24 hours |
Security Best Practices
For Customers
- Use API Keys - Never share credentials
- Enable MFA - Where available
- Rotate Keys - Regularly rotate API keys
- Monitor Logs - Review access logs
- Encrypt Data - Use client-side encryption for sensitive data
Example: Secure VM Access
# Disable password authentication
# Edit /etc/ssh/sshd_config
PasswordAuthentication no
PubkeyAuthentication yes
PermitRootLogin no
# Use non-standard port
Port 2222
# Restart SSH
systemctl restart sshd
Reporting Security Issues
If you discover a security vulnerability:
- Email: security@tasmanian.cloud
- PGP Key: Download
- Response time: 24 hours
Compliance Reports
Available upon request for verified customers:
- SOC 2 Type II (planned)
- ISO 27001 certificate (in progress)
- Penetration test summaries
Sub-processors
Tasmanian Cloud uses the following sub-processors to deliver services. This list is reviewed and updated annually.
Current Sub-processors
| Vendor | Service | Data Location | Purpose |
|---|---|---|---|
| Microsoft | M365 (Email) | Australia | Business email, calendar |
| Resend | Transactional Email | US | System notifications, alerts |
| Cloudflare | DNS, CDN, WAF | Global | Edge security, DNS resolution |
| Vercel | Marketing Sites | Global | Website hosting (transitioning to CF Pages) |
| Cloudflare Pages | Marketing Sites | Global | Website hosting (primary) |
| Scalar | API Documentation | US | API documentation hosting |
| Stripe | Payment Processing | US | Billing, invoicing, payments |
Self-Hosted Services
The following services are hosted on Tasmanian Cloud's own infrastructure:
| Service | Infrastructure | Location |
|---|---|---|
| Product Analytics | Self-hosted | Tasmania |
| Billing Dashboard | Paymenter on Proxmox | Tasmania |
| Bare Metal | Owned hardware | Tasmania |
| Customer Panel | Self-hosted | Tasmania |
| Object Storage | RustFS/Ceph | Tasmania |
| Compute | Proxmox VE | Tasmania |
| Kubernetes | Talos + FluxCD | Tasmania |
Sovereignty Roadmap
Our commitment is to become fully sovereign. The following initiatives are in progress:
| Initiative | Target | Status |
|---|---|---|
| Self-hosted Email | 2026 | 📋 Planned |
| Transactional Email | 2026 | 📋 Planned |
| HA Infrastructure (CF backup) | 2026 | 🔄 In Progress |
| Self-hosted PBX | 2027 | 📋 Planned |
| Marketing Sites (Vercel/CF Pages → tasmanian.cloud) | 2026 | 🔄 In Progress |
Shared Responsibility Model
| Layer | Tasmanian Cloud | Customer |
|---|---|---|
| Physical | ✅ | |
| Network | ✅ | |
| Hypervisor | ✅ | |
| Host OS | ✅ | |
| Guest OS | ✅ | |
| Application | ✅ | |
| Data | ✅ |
Last updated: February 2026