Our Security Commitment

Health data is among the most sensitive information that exists. PRISM employs enterprise-grade security measures and follows healthcare industry best practices to ensure your data remains protected, private, and under your control at all times.

1. Security Certifications & Standards

PRISM maintains the following security certifications and adheres to recognised standards:

ISO
ISO 27001 Information Security Management
SOC
SOC 2 Type II Security, Availability, Confidentiality
HIP
HIPAA Compliant US Healthcare Security Standards
CSA
CSA STAR Cloud Security Alliance

2. Security Architecture

Our defence-in-depth approach implements multiple layers of security controls:

Multi-Layer Security Architecture

๐Ÿ‘ค User Layer Biometric auth, 2FA, session management, device binding
๐Ÿ“ฑ Application Certificate pinning, code obfuscation, secure storage
๐Ÿ”Œ API Gateway OAuth 2.0, rate limiting, request validation, WAF
๐Ÿ—„๏ธ Data Layer AES-256 encryption at rest, field-level encryption
โ˜๏ธ Infrastructure VPC isolation, DDoS protection, intrusion detection

3. Encryption

๐Ÿ”’

Data at Rest

All stored data is encrypted using AES-256 encryption. Sensitive fields like health conditions and medications use additional field-level encryption.

๐Ÿ”

Data in Transit

All communications use TLS 1.3 with strong cipher suites. Certificate pinning prevents man-in-the-middle attacks on mobile apps.

๐Ÿ”‘

Key Management

Encryption keys are managed using hardware security modules (HSMs). Keys are rotated regularly and never stored with encrypted data.

๐Ÿงฎ

Cryptographic Standards

We use industry-standard algorithms: AES-256-GCM, RSA-4096, SHA-256, and ECDHE for perfect forward secrecy.

4. Access Control

4.1 User Authentication

4.2 Consent-Based Access

4.3 Internal Access Controls

5. Infrastructure Security

5.1 Cloud Security

5.2 Data Locality

We maintain data residency compliance by storing your data within your country or region where legally required. Supported regions include:

6. Monitoring & Detection

๐Ÿ‘๏ธ

24/7 Monitoring

Security Operations Centre monitors systems around the clock for anomalies, intrusions, and potential threats.

๐Ÿšจ

Intrusion Detection

AI-powered intrusion detection systems identify and alert on suspicious network activity in real-time.

๐Ÿ“Š

SIEM Integration

Security Information and Event Management correlates logs across all systems for comprehensive threat visibility.

๐Ÿ”

Audit Logging

Complete audit trails of all data access, changes, and administrative actions stored immutably.

7. Vulnerability Management

8. Business Continuity

8.1 Backup & Recovery

8.2 Disaster Recovery

9. Incident Response

In the event of a security incident, PRISM follows a documented incident response plan:

  1. Detection: Automated alerts or user reports trigger investigation
  2. Containment: Immediate steps to limit potential damage
  3. Eradication: Remove threat and patch vulnerabilities
  4. Recovery: Restore services and verify integrity
  5. Notification: Affected users notified within 72 hours as required by law
  6. Post-Incident: Root cause analysis and preventive measures

10. Employee Security

Report a Security Concern

If you discover a security vulnerability or have concerns about data security:

Security Team: security@prismhealth.io

Bug Bounty: bugbounty@prismhealth.io

Emergency Hotline: +1-XXX-XXX-XXXX (24/7)