2026 Database Compliance Map · Post-Remediation Certified State · 18 Functional Modules · 4 Regulatory Frameworks
| Module | SOC 2 Type II Trust Service Criteria | ISO 27001:2022 Annex A Controls | GDPR Data Protection Regulation | Australian Privacy Act Privacy Principles APPs |
|---|---|---|---|---|
🔐01Security Officer — SAR |
CC6, CC7 | — | — | — |
🏢02Data Hall Occupancy Management |
CC6 | — | — | — |
🚶03Patrols Management |
CC7 | A.12.1 | — | — |
⚠️04Incidents Management |
CC6 | — | Art. 6 | — |
👁️05Visitor Management |
CC6 | — | — | — |
📋06Screening Supervisor — SAR |
CC6, CC7 | — | — | — |
📊07Dashboard & Reports |
← No dedicated tables — reads across all 18 modules → | |||
💳08Billing Access |
CC6, CC9 | — | Art. 5 | APP 11 |
🔑09Identity & Access Management |
CC6 | A.9 | Art. 17 | — |
🖥️10Data Centre Management |
— | — | Art. 5 | APP 13 |
🎫11Issue Resolution Tracking (Ticketing) |
CC6 | — | Art. 16, 5 | — |
🚪12Access Control & DCAT Management |
— | A.12.4 | Art. 5 | — |
📝13Audit & System Logs |
CC7 | A.7 | — | — |
⭐14Supervisor Audit & Quality Assurance |
— | — | — | — |
🔄15Shift Handover Intelligence |
CC6 | — | — | — |
🏭16Contractor & Vendor Lifecycle |
CC6, CC7, CC9 | — | Art. 6 | — |
🚨17Emergency & Drill Management |
CC9 | — | Art. 6 | — |
🎓18Training & Evaluation Module |
CC6 | — | Art. 6 | — |
Logical Access (CC6), System Monitoring (CC7), Risk Mitigation (CC9). MFA enforcement, brute-force detection, and complete UTC audit trail throughout.
Access Control (A.9), Cryptography (A.10), Operations Security (A.12), Compliance (A.18). AES-256-GCM secrets and schema change management.
Articles 5, 7, 15–22, 32. Full DSR workflow covering all 7 request types, consent management, anonymisation, right to erasure, and privacy by design.
APPs 1–13. Per-tenant PrivacyActApplicable flag. APP 11 security via AES-256-GCM. APP 12/13 access and correction via dedicated workflow tables.
All 197 audit findings — including 2 Critical and 10 High severity — were fully resolved prior to production approval. Zero open findings remain across all four frameworks.
✓ Pass — All Findings Closed240 foreign keys and 18 CHECK constraints enforce complete referential integrity and data validation rules across all 161 tables. 6 new foreign keys were added during this audit.
Resolved — Integrity ConfirmedMFA secrets, system configuration credentials, and payment gateway references are protected by AES-256-GCM encryption at the database level with formally documented extended properties.
AES-256-GCM · Documented