← All legal documents

Wallfly Airport

Security Overview

A public overview of the infrastructure, encryption, access controls, monitoring, and incident response practices applied to Wallfly Airport.

Overview

WF Airport is hosted within a secured cloud infrastructure environment designed to protect event data and prevent unauthorised access.

Wallfly Pty Ltd applies multiple layers of technical and organisational security controls.

Infrastructure Security

  • Hosted within Amazon Web Services (AWS).
  • Systems operate within a secured Virtual Private Cloud environment.
  • Databases are not publicly accessible.
  • Network access is restricted to authorised services only.

Data Protection

  • All data is transmitted using HTTPS encryption.
  • Data is stored within secure managed database systems.
  • Encryption is applied in transit and at rest where supported.

Access Controls

  • Access to WF Airport systems is restricted to authorised personnel only.
  • Role-based access principles are applied where appropriate.
  • Administrative access is limited and controlled.

Credential Management

  • API credentials and access keys are securely stored.
  • Access credentials are not exposed publicly.
  • Credentials are managed in accordance with internal security practices.

Monitoring and Logging

  • System activity is logged.
  • Access and operational events are monitored.
  • Logs are retained to support auditing and incident investigation.

Data Minimisation

  • Only required data is accessed and processed.
  • Data exposure is limited to necessary workflows.

Third-Party Services

WF Airport integrates with trusted service providers, including:

  • AWS for infrastructure.
  • Presentation management platforms where required.

Each provider operates under its own data protection and security standards.

Incident Response

Wallfly maintains processes to:

  • Identify and respond to security incidents.
  • Contain and assess potential breaches.
  • Notify relevant parties where required under applicable laws.

Continuous Improvement

Security practices are reviewed and updated as systems evolve.