Compliance & Certifications
Last updated: 22 August 2025
Our Compliance Approach
Axivus ensures compliance and security by leveraging trusted enterprise platforms and following Australian privacy laws. We build on the certifications and security standards of our infrastructure partners while maintaining our own strict policies and procedures.
Platform Security
Built on AWS and Vercel with their enterprise-grade security certifications and controls.
Privacy Compliance
Full compliance with Australian Privacy Act and education sector privacy requirements.
Australian Hosting
All data hosted in Australia with local support and compliance with data sovereignty requirements.
Infrastructure & Compliance
AWS Infrastructure
EnterpriseOur primary infrastructure runs on Amazon Web Services with their comprehensive security certifications.
- • SOC 1, SOC 2, SOC 3 certified
- • ISO 27001, ISO 27017, ISO 27018
- • FedRAMP Authorized
- • Australian data centres (Sydney, Melbourne)
Vercel Platform
EnterpriseApplication hosting and edge network with enterprise security controls and compliance.
- • SOC 2 Type II certified
- • Enterprise security controls
- • Global edge network with Australian presence
- • Automatic security updates
Azure Platform
EnterpriseSecondary cloud infrastructure with Microsoft Azure enterprise-grade security and compliance.
- • SOC 1, SOC 2, SOC 3 certified
- • ISO 27001, ISO 27017, ISO 27018
- • Australian data centres (Sydney, Melbourne)
- • FedRAMP Authorized
Australian Privacy Act
CompliantFull compliance with Australian Privacy Principles and Notifiable Data Breaches scheme.
- • Privacy impact assessments
- • Data breach response procedures
- • Individual rights management
- • Education sector compliance
Security Practices
ContinuousOngoing security practices built on industry best practices and platform capabilities.
- • Regular security assessments
- • Continuous monitoring
- • Secure development practices
- • Incident response procedures
Security & Monitoring
Platform Monitoring
- Vercel Analytics
Real-time performance and security monitoring - Uptime Monitoring
24/7 availability monitoring with alerts
Security Practices
- Regular Security Updates
Automated security patching and updates - Code Security Scanning
Automated dependency and vulnerability scanning - Access Controls
Multi-factor authentication and role-based access
Compliance Inquiries
For compliance documentation, certification verification, or security questionnaires, please contact our compliance team.