Security & Trust

AusFleet's security posture is built on a foundation of trust and protection. We always start with security in mind, ensuring that your data is safeguarded at every step. Our platform is designed with advanced security protocols and industry-leading practices to keep your information safe and your trust well-placed.

We align our security measures with the Australian Signals Directorate “Essential 8” which serves as our north star. This framework guides our efforts to mitigate cyber threats and enhance our security posture continuously. Our commitment to security is not a checkbox but a continuous process. We conduct annual third-party penetration testing to identify and eliminate potential vulnerabilities, ensuring we stay ahead of evolving threats.

With over three decades of evolution, AusFleet has proven to be a safe pair of hands. Our privacy-first approach ensures that your information is handled with care and transparency. We collect only what’s necessary, give you full control over your data, and never sell or share your information… EVER. Our compliance with globally recognized standards, including ISO 27001 certification, further reinforces our commitment to security and trust.

Mechanic using ausfleet in workshop

Built for Protection. Designed for Confidence.

Security and trust are the foundation of everything we do. When it comes to managing your fleet, protecting your data, vehicles, and operations is our top priority. Our platform is built with advanced security protocols and industry-leading practices to keep your information safe—and your trust well-placed.

Privacy-First by Design

Trust is earned through transparency. That’s why we’ve adopted a privacy-first approach across our entire platform. From thoughtful data collection to user-controlled permissions, your information is handled with care and clarity. We collect only what’s necessary, give you full control over your data, and never sell or share your information. By aligning with global privacy principles and maintaining open communication, we’re committed to protecting your privacy at every step.

Ongoing Security Testing

Security isn’t a checkbox—it’s a continuous process. Our fleet application undergoes independent third-party penetration testing every year to identify and eliminate potential vulnerabilities. These assessments help us stay ahead of evolving threats, reinforce our infrastructure, and ensure we’re delivering a platform you can depend on.

Compliance You Can Trust

We take compliance seriously and are committed to aligning with globally recognized standards. While we are not yet formally certified, we work closely with partners who are:

  • Our Cybersecurity Office is ISO 27001 certified

  • Our Software Development is ISO 27001 certified organization

This ensures our processes are built with strong security and compliance practices from the ground up. We are actively working toward strengthening our internal governance and compliance posture.

In addition, we are actively aligning our security controls with the Australian Cyber Security Centre’s (ACSC) Essential Eight framework. While our current maturity level is still developing, we are taking deliberate steps to improve our implementation across all eight strategies. Strengthening our internal governance and compliance posture remains a top priority.

The Essential Eight is a recognized best practice recommended by the ACSC to help organizations build resilience against cyber threats. These eight mitigation strategies serve as a strong baseline, making it significantly more difficult for adversaries to compromise systems and are considered foundational to a robust cybersecurity posture.

mechanics fixing toyota hilux
workers using the ausfleet app clipart

Our Commitment in Action

Here's how we keep your fleet data secure, reliable, and private:

Security

  • Data encrypted in transit and at rest

  • Annual third-party penetration testing

  • Role-based access controls & multi-factor authentication

  • Real-time threat monitoring and intrusion detection

Reliability

  • 99%+ uptime with high-availability architecture

  • Scalable cloud infrastructure for seamless performance

  • Continuous system monitoring and automated failover

  • Regular, secured data backups for quick recovery

Privacy

  • Privacy-first approach in every feature

  • Transparent and minimal data collection

  • User-controlled data access and deletion options

  • No selling or sharing of customer data

Compliance

  • Cybersecurity office is ISO 27001 certified

  • Development is ISO 27001 certified.

    Ongoing alignment with information security standards such as the essential

  • Regular internal reviews to maintain information security.

different fleet modules