Security Built for
Compliance Data
AML/CTF data is among the most sensitive your firm handles. Sentine architects for security from the ground up — encryption, isolation, access control, and integrity verification at every layer.
Defence in Depth
Multiple layers of protection ensure your compliance data is secure, isolated, and tamper-evident.
Sentine doesn't treat security as a feature — it's foundational. From architecturally isolated SMR data that prevents tipping-off, to SHA-256 hashing that detects tampering, every aspect of the platform is designed to protect sensitive compliance information.
8 Layers of Security
Each layer addresses a specific aspect of compliance data protection.
Tipping-Off Prevention
SMR data is architecturally isolated from all shared surfaces. The shadow case system ensures that only AMLCO-designated users can access suspicious matter information, maintaining s123 compliance.
- SMR shadow case system stores data separately from Matter records
- Architecturally isolated — no SMR indicators on dashboards, lists, or exports
- AMLCO-only access with dedicated authentication controls
- Designed to support s123 tipping-off offence obligations under the AML/CTF Act
End-to-End Encryption
All data is encrypted at rest and in transit. Sensitive fields receive application-level encryption with separated key management to minimise exposure in the event of a breach.
- Data encrypted at rest using industry-standard encryption
- TLS encryption for all data in transit
- Application-level encryption for sensitive fields such as identity documents
- Key management separation to limit blast radius
Role-Based Access Control
Access is scoped to the matter level — users see only the matters they are assigned to. Admin and AMLCO roles provide controlled overrides, with granular permission flags for sensitive data.
- Matter-level scoping ensures users access only assigned matters
- Admin and AMLCO role overrides with full audit logging
- Granular permission flags for sensitive data access
- Role assignments managed at the firm level with per-matter overrides
Sensitive Data Flags
Separate permission flags control access to sensitive information at a granular level. Each flag can be independently assigned, ensuring users only see what their role requires.
- can_view_raw_id_docs — access to original identity documents
- can_view_provider_raw_payloads — access to raw verification provider responses
- can_view_screening_details — access to detailed sanctions, PEP, and adverse media results
- can_export_sensitive_pack — permission to export evidence packs with sensitive content included
SHA-256 Integrity Hashing
Every evidence pack version is hashed using SHA-256, enabling tamper detection and integrity verification at any future date. Hash chains provide confidence that records have not been altered.
- SHA-256 hashing applied to every evidence pack version
- Tamper detection through hash comparison on access
- Integrity verification available at any future audit date
- Hash chain provides a verifiable history of evidence pack states
Australian Data Residency
All data is stored in Australian data centres with no offshore processing. This supports data sovereignty requirements and aligns with regulatory expectations for AML/CTF record-keeping.
- All data hosted in Australian data centres
- No offshore processing or data transfer
- Aligned with regulatory expectations for AML/CTF data handling
- Data sovereignty compliance for Australian reporting entities
Immutable Audit Trail
An append-only event stream records every action taken on every matter. No edits or deletions are permitted, creating a forensic-grade record suitable for regulatory review.
- Append-only event stream — no edits or deletions permitted
- Every matter action recorded with timestamp, actor, and detail
- Forensic-grade record of all compliance decisions and changes
- Suitable for regulatory review and internal audit processes
Retention Compliance
Seven-year retention from the anchor date is managed automatically. Anchor reasons are documented, and retention periods are tracked to support your firm's record-keeping obligations.
- 7-year retention period calculated from the matter anchor date
- Automatic retention management with expiry tracking
- Anchor reason documented for each matter's retention period
- Supports AML/CTF Act record-keeping obligations
Australian Data Residency
All Sentine infrastructure is hosted in Australian data centres. We understand the regulatory expectations around AML/CTF data handling and are committed to maintaining full data sovereignty for our customers.
- All production data hosted exclusively in Australian data centres
- No offshore processing, storage, or transfer of customer or compliance data
- Infrastructure aligned with Australian regulatory expectations for AML/CTF record-keeping
- Full data sovereignty maintained — your compliance data stays in Australia
Security Principles
The foundations that guide every security decision in the platform.
Security by Design
Security is foundational, not retrofitted. Every feature is designed with data protection from the start.
Least Privilege Access
Users access only what they need. Matter-level scoping, role-based permissions, and sensitive data flags ensure minimal exposure.
Defence in Depth
Multiple layers of protection: encryption, access control, audit logging, data isolation, and integrity verification.
Your Data Deserves Better Protection
See how Sentine's security architecture protects your firm's most sensitive compliance data.
Get Started