Security

Security Built for
Compliance Data

AML/CTF data is among the most sensitive your firm handles. Sentine architects for security from the ground up — encryption, isolation, access control, and integrity verification at every layer.

Overview

Defence in Depth

Multiple layers of protection ensure your compliance data is secure, isolated, and tamper-evident.

Sentine doesn't treat security as a feature — it's foundational. From architecturally isolated SMR data that prevents tipping-off, to SHA-256 hashing that detects tampering, every aspect of the platform is designed to protect sensitive compliance information.

Protection

8 Layers of Security

Each layer addresses a specific aspect of compliance data protection.

Tipping-Off Prevention

SMR data is architecturally isolated from all shared surfaces. The shadow case system ensures that only AMLCO-designated users can access suspicious matter information, maintaining s123 compliance.

  • SMR shadow case system stores data separately from Matter records
  • Architecturally isolated — no SMR indicators on dashboards, lists, or exports
  • AMLCO-only access with dedicated authentication controls
  • Designed to support s123 tipping-off offence obligations under the AML/CTF Act

End-to-End Encryption

All data is encrypted at rest and in transit. Sensitive fields receive application-level encryption with separated key management to minimise exposure in the event of a breach.

  • Data encrypted at rest using industry-standard encryption
  • TLS encryption for all data in transit
  • Application-level encryption for sensitive fields such as identity documents
  • Key management separation to limit blast radius

Role-Based Access Control

Access is scoped to the matter level — users see only the matters they are assigned to. Admin and AMLCO roles provide controlled overrides, with granular permission flags for sensitive data.

  • Matter-level scoping ensures users access only assigned matters
  • Admin and AMLCO role overrides with full audit logging
  • Granular permission flags for sensitive data access
  • Role assignments managed at the firm level with per-matter overrides

Sensitive Data Flags

Separate permission flags control access to sensitive information at a granular level. Each flag can be independently assigned, ensuring users only see what their role requires.

  • can_view_raw_id_docs — access to original identity documents
  • can_view_provider_raw_payloads — access to raw verification provider responses
  • can_view_screening_details — access to detailed sanctions, PEP, and adverse media results
  • can_export_sensitive_pack — permission to export evidence packs with sensitive content included

SHA-256 Integrity Hashing

Every evidence pack version is hashed using SHA-256, enabling tamper detection and integrity verification at any future date. Hash chains provide confidence that records have not been altered.

  • SHA-256 hashing applied to every evidence pack version
  • Tamper detection through hash comparison on access
  • Integrity verification available at any future audit date
  • Hash chain provides a verifiable history of evidence pack states

Australian Data Residency

All data is stored in Australian data centres with no offshore processing. This supports data sovereignty requirements and aligns with regulatory expectations for AML/CTF record-keeping.

  • All data hosted in Australian data centres
  • No offshore processing or data transfer
  • Aligned with regulatory expectations for AML/CTF data handling
  • Data sovereignty compliance for Australian reporting entities

Immutable Audit Trail

An append-only event stream records every action taken on every matter. No edits or deletions are permitted, creating a forensic-grade record suitable for regulatory review.

  • Append-only event stream — no edits or deletions permitted
  • Every matter action recorded with timestamp, actor, and detail
  • Forensic-grade record of all compliance decisions and changes
  • Suitable for regulatory review and internal audit processes

Retention Compliance

Seven-year retention from the anchor date is managed automatically. Anchor reasons are documented, and retention periods are tracked to support your firm's record-keeping obligations.

  • 7-year retention period calculated from the matter anchor date
  • Automatic retention management with expiry tracking
  • Anchor reason documented for each matter's retention period
  • Supports AML/CTF Act record-keeping obligations
Data Sovereignty

Australian Data Residency

All Sentine infrastructure is hosted in Australian data centres. We understand the regulatory expectations around AML/CTF data handling and are committed to maintaining full data sovereignty for our customers.

  • All production data hosted exclusively in Australian data centres
  • No offshore processing, storage, or transfer of customer or compliance data
  • Infrastructure aligned with Australian regulatory expectations for AML/CTF record-keeping
  • Full data sovereignty maintained — your compliance data stays in Australia
Principles

Security Principles

The foundations that guide every security decision in the platform.

Security by Design

Security is foundational, not retrofitted. Every feature is designed with data protection from the start.

Least Privilege Access

Users access only what they need. Matter-level scoping, role-based permissions, and sensitive data flags ensure minimal exposure.

Defence in Depth

Multiple layers of protection: encryption, access control, audit logging, data isolation, and integrity verification.

Your Data Deserves Better Protection

See how Sentine's security architecture protects your firm's most sensitive compliance data.

Get Started