Security
Last updated: 3 May 2026
Customer trust depends on us protecting the data uploaded to PeerPlacement. This page summarises the controls we have in place. We’re a young company — some controls below are in place today, others are part of a documented roadmap. Where that distinction matters to your evaluation, contact us at security@peerplacement.com and we will share current status under NDA.
1. Tenant isolation
- Each customer (“tenant”) gets a dedicated database, object-storage bucket, and encryption key.
- Application-layer requests carry a tenant context; queries are scoped to that tenant’s database connection.
- Cross-tenant access is impossible from tenant-user sessions; platform-admin access is restricted, audited, and MFA-gated.
2. Encryption
- At rest: AES-256 with per-tenant data-encryption keys, wrapped by a key management service.
- In transit: TLS 1.3 between client, edge, and origin. Internal service-to-service traffic encrypted.
- Field-level encryption for highly sensitive identifiers (e.g. passport numbers).
3. Access control
- Role-based access control (tenant_admin, staff, agent, student) with field-level permissions configurable per role.
- MFA support for all platform users; required for tenant administrators.
- Session expiry, IP logging, and anomaly alerts on suspicious sign-ins.
- Least-privilege internal access; production access is restricted to a small on-call group, MFA-required, and logged.
4. Authentication
- Supported flows: passwordless magic-link, one-time-password (OTP), and password (with MFA).
- Passwords (where used) are hashed with bcrypt at a high work factor.
- MFA secrets are encrypted at rest.
5. Audit logging
- Every state-changing action is recorded in an append-only audit log with actor, target, before/after values, IP, and user-agent.
- Customer-data deletions are logged; backups are aged out per the retention schedule.
- Audit logs are exposed to tenant administrators for review.
6. Data residency
- Default primary storage region: Australia.
- Customers may select an alternative region during onboarding.
- Cross-region transfers (e.g. for AI inference) use contractual safeguards described in our Data Processing Agreement.
7. AI and model usage
- AI features are configurable per tenant: choose between hosted models, third-party APIs (Anthropic, OpenAI), or self-hosted open-source models.
- For third-party providers, customer data sent for inference is governed by the provider’s data-handling terms; PeerPlacement does not retain inference inputs beyond what is needed to render results.
- Customers may opt out of any AI feature in tenant settings.
8. Backups and disaster recovery
- Automated, encrypted daily backups of tenant databases.
- Documented restore procedure tested on a regular cadence.
- Defined Recovery Point Objective (RPO) and Recovery Time Objective (RTO); current targets shared on request.
9. Secure development
- Code review required for all production changes.
- Dependency scanning and automated vulnerability checks in CI.
- Regular review of third-party libraries; patches applied on a defined schedule for severity bands.
10. Incident response
- Documented incident-response plan covering detection, containment, eradication, recovery, and post-incident review.
- Customer notification within 72 hours of confirming a personal-data breach affecting their tenant, where feasible.
- Public post-mortems for material incidents affecting customer-facing systems.
11. Compliance roadmap
- Designed against Australian Privacy Act / APP framework and PIPL requirements.
- SOC 2 Type II and ISO 27001 are on our compliance roadmap. Status available on request.
12. Reporting a vulnerability
Found a security issue? Email security@peerplacement.com with details. We commit to acknowledging reports within 2 business days and providing a remediation timeline. We do not pursue legal action against good-faith security researchers who follow coordinated disclosure.