Everything as code
- Accounts and payments
- Auditing and compliance
- Product documentation and defenses
We employ ZeroTrust VPN and FIPS 140-2 compliant data-at-rest and data-in-transit encryption protocols and keys, which are employed with complete user lockdown and privilege controls.
We utilize CIS Level 1 hardening standards and Industry Best Practices within our AWS infrastructure. CIS benchmarks are accepted in business, industry, and government use, and require strict adherence to safety.
Any access to PHI data is logged with detailed information. In the event of a suspected breach, we have documented security protocols we quickly put into place to keep information secure.
We monitor our automation 24/7, with strict access monitoring metrics established. Any deviation for our automation or relating to access immediately triggers our alerts and response protocols.
With AKASA, you can rest easy knowing your data is still in your control and being handled as little as possible — by those who put security first.