Security & Trust
AusFleet's security posture is built on a foundation of trust and protection. We always start with security in mind, ensuring that your data is safeguarded at every step. Our platform is designed with advanced security protocols and industry-leading practices to keep your information safe and your trust well-placed.
We align our security measures with the Australian Signals Directorate “Essential 8” which serves as our north star. This framework guides our efforts to mitigate cyber threats and enhance our security posture continuously. Our commitment to security is not a checkbox but a continuous process. We conduct annual third-party penetration testing to identify and eliminate potential vulnerabilities, ensuring we stay ahead of evolving threats.
With over three decades of evolution, AusFleet has proven to be a safe pair of hands. Our privacy-first approach ensures that your information is handled with care and transparency. We collect only what’s necessary, give you full control over your data, and never sell or share your information… EVER. Our compliance with globally recognized standards, including ISO 27001 certification, further reinforces our commitment to security and trust.
Built for Protection. Designed for Confidence.
Security and trust are the foundation of everything we do. When it comes to managing your fleet, protecting your data, vehicles, and operations is our top priority. Our platform is built with advanced security protocols and industry-leading practices to keep your information safe—and your trust well-placed.
Privacy-First by Design
Trust is earned through transparency. That’s why we’ve adopted a privacy-first approach across our entire platform. From thoughtful data collection to user-controlled permissions, your information is handled with care and clarity. We collect only what’s necessary, give you full control over your data, and never sell or share your information. By aligning with global privacy principles and maintaining open communication, we’re committed to protecting your privacy at every step.
Ongoing Security Testing
Security isn’t a checkbox—it’s a continuous process. Our fleet application undergoes independent third-party penetration testing every year to identify and eliminate potential vulnerabilities. These assessments help us stay ahead of evolving threats, reinforce our infrastructure, and ensure we’re delivering a platform you can depend on.
Compliance You Can Trust
We take compliance seriously and are committed to aligning with globally recognized standards. While we are not yet formally certified, we work closely with partners who are:
Our Cybersecurity Office is ISO 27001 certified
Our Software Development is ISO 27001 certified organization
This ensures our processes are built with strong security and compliance practices from the ground up. We are actively working toward strengthening our internal governance and compliance posture.
In addition, we are actively aligning our security controls with the Australian Cyber Security Centre’s (ACSC) Essential Eight framework. While our current maturity level is still developing, we are taking deliberate steps to improve our implementation across all eight strategies. Strengthening our internal governance and compliance posture remains a top priority.
The Essential Eight is a recognized best practice recommended by the ACSC to help organizations build resilience against cyber threats. These eight mitigation strategies serve as a strong baseline, making it significantly more difficult for adversaries to compromise systems and are considered foundational to a robust cybersecurity posture.
Our Commitment in Action
Here's how we keep your fleet data secure, reliable, and private:
Security
Data encrypted in transit and at rest
Annual third-party penetration testing
Role-based access controls & multi-factor authentication
Real-time threat monitoring and intrusion detection
Reliability
99%+ uptime with high-availability architecture
Scalable cloud infrastructure for seamless performance
Continuous system monitoring and automated failover
Regular, secured data backups for quick recovery
Privacy
Privacy-first approach in every feature
Transparent and minimal data collection
User-controlled data access and deletion options
No selling or sharing of customer data
Compliance
Cybersecurity office is ISO 27001 certified
Development is ISO 27001 certified.
Ongoing alignment with information security standards such as the essential
Regular internal reviews to maintain information security.