Last updated: 27 February 2026
Overview
This document describes the security controls in place on payment pages hosted by Camper BMS.
Card data is entered directly into hosted fields or iframes provided by the campground's configured payment gateway (e.g. eWay, Square, PIN Payments, ANZ Worldline, OnlinePay).
Camper BMS does not receive, transmit, or store cardholder data.
Script Authorisation
All scripts on payment pages are authorised using Content Security Policy (CSP) headers with unique per-request cryptographic nonces. Only scripts bearing a valid nonce are permitted to execute.
Third-party script domains are restricted to the campground's configured payment gateway and, where enabled by the campground, analytics providers (Google Analytics, Facebook Pixel).
Script Inventory
A documented inventory of all scripts that load on payment pages is maintained and reviewed quarterly. The inventory records each script's source, purpose, and authorisation method.
Tamper Detection and Alerting
CSP violation reports are captured when a browser blocks an unauthorised script or resource on a payment page. Violations are stored and an alert is generated for each new violation to enable prompt investigation.
Violation records are retained indefinitely.
Transport Security
All payment pages are served exclusively over HTTPS with TLS. HTTP Strict Transport Security (HSTS) headers are set with a one-year max-age including subdomains.
Security Headers
The following headers are applied to all production responses:
Header | Value |
Content-Security-Policy | Per-request nonce-based policy with domain allowlisting |
Strict-Transport-Security |
|
X-Content-Type-Options |
|
X-Frame-Options |
|
Referrer-Policy |
|
Permissions-Policy |
|
Supported Payment Gateways
Gateway | Integration Method |
eWay | Hosted Secure Fields |
Square | Web Payments SDK (hosted fields) |
PIN Payments | Hosted Fields |
OnlinePay (Verifone / Westpac) | Hosted checkout iframe |
ANZ Worldline | Hosted tokenisation iframe |
