Modern Workplace Solutions
We offer a wide range of tech solutions tailored to meet your specific business needs.
The Entag Difference
What truly sets Entag apart is our deep-rooted culture of putting people, clients, and community at the heart of everything we do
Working With Us
Your career, your future – it's all here at Entag. Step into a world of endless possibilities, where innovation and passion drive your success. Join our talented team and make your impact!
Resources
Delve into a wide range of resources and learn more about us, from best case studies to our capabilities.
Contact

Security Attestation

Entag Achieves ISO/IEC 27001:2022 Certification
Effective Date: 1 October 2025
Last Reviewed: 1 October 2025

We are proud that Entag is ISO/IEC 27001:2022 certified, the leading international standard for information security management.
This certification demonstrates our ongoing commitment to protecting data, minimising risk, and upholding the highest standards of security for our clients, partners, and team.
 
At Entag, security isn’t just a priority, it’s embedded into everything we do. Achieving ISO/IEC 27001:2022 ensures we continue to deliver trusted, secure, and innovative technology solutions to support businesses across Australia.

Security Attestation

This Security Attestation outlines the minimum set of controls and practices implemented by Entag to protect the confidentiality, integrity and availability of its services and information assets. It is intended to provide transparency into Entag’s security posture and may be referenced in contractual agreements or vendor due diligence processes. 

Entag maintains a comprehensive Information Security Management System (ISMS), certified to the ISO/IEC 27001:2022 standard. The scope of certification includes: 

The provision of technology services, solutions and consulting. It covers the management of information and business activities that support these services, in accordance with the ISMS Statement of Applicability revision 1, dated 10th February, 2025. 

Entag has also achieved Maturity Level 3 alignment with the Australian Cyber Security Centre’s (ACSC) Essential Eight mitigation strategies, independently validated by ProcessUnity (formerly CyberGRX). 

Minimum Security Controls
01. Governance & Oversight
  • Dedicated security and compliance personnel responsible for ISMS implementation and maintenance. 
  • Regular internal audits and risk assessments reported to senior management. 
02. Access Control & Identity Management
  • Enforcement of Least Privilege and Need-to-Know principles. 
  • Multi-Factor Authentication (MFA) for privileged and remote access. 
  • Automated provisioning/deprovisioning and periodic access reviews. 
03. Data Protection & Encryption
  • Encryption of data at rest and in transit using industry-standard protocols. 
  • Logical segregation of data and role-based access controls. 
  • Secure disposal of media and assets. 
04. System & Network Security
  • Enterprise-grade firewalls and layered network architecture. 
  • Vulnerability scanning, patch management and threat protection technologies. 
  • Traffic monitoring and event correlation to detect and respond to threats. 
05. Monitoring & Logging
  • Centralised logging of system and user activity. 
  • Integration with SIEM tools for real-time alerting and analysis. 
06. Incident Management
  • Documented incident response procedures with regular testing. 
  • Root cause analysis and corrective actions following security events. 
07. Change Management
  • Formal change control processes for all material system and infrastructure changes. 
  • Configuration standards are developed in consultation with external cyber security firms and aligned with industry best practices. 
08. Physical & Environmental Security
  • Controlled access to data centres and server rooms. 
  • Environmental safeguards against fire, water, and heat damage. 
09. Third-Party Risk Management
  • Risk assessments for critical suppliers and cloud providers. 
  • Assessments are supported by engagements with independent cyber security consultancies to validate control effectiveness and identify areas for improvement. 
10. Business Continuity & Disaster Recovery
  • Documented and tested recovery procedures to ensure service continuity. 
11. Security Awareness & Training
  • Mandatory training for all staff, including phishing simulations. 
  • Annual policy reviews and updates. 
12. Human Resource Security
  • Pre-employment screening including police checks and reference verification. 
  • Mandatory onboarding training covering acceptable use, data handling, phishing, and incident reporting. 
  • Formal acknowledgement of key ISMS policies such as the Acceptable Use Policy and Data Protection Policy. 
  • Secure offboarding procedures including prompt access revocation and asset recovery. 
Entag is committed to the continual improvement of its information security management framework. This attestation will be reviewed and updated as required to reflect changes in our practices; risk landscape; regulatory and contractual obligations. 
Contact Us

For more information or to request access to ISMS policies, please contact

Download Our Capability Statement

Simply fill out the form below and get our Capability Statement delivered straight to your inbox

This field is for validation purposes and should be left unchanged.
By submitting this form, you agree to receive marketing emails from us. We value your privacy and you can unsubscribe at any time.
Are you ready for Microsoft End of Life? The countdown is on:
00
weeks
:
00
days
:
Learn More
crossmenu