Trust & security

Security built in, not bolted on.

Health data deserves stronger defaults than the rest of the internet. Every SmartScanPro environment ships with end-to-end encryption, per-tenant isolation, audit logging, and a dedicated on-call team watching it 24/7.

Certifications & frameworks

Where we are, and where we're going.

We publish status honestly — some things are done, some are in progress, some are on the roadmap. You'll always know which.

SOC 2 Type II

Audit in progress with a Big-Four firm. Target attestation date: 2026-Q4. Type I report is available under NDA today.

In progress

HIPAA-ready

BAAs available on enterprise tier. Technical, administrative, and physical safeguards per 45 CFR Part 164 Subpart C.

Available

GDPR

EU-region data pinning to AWS eu-west-1, Standard Contractual Clauses for transfers, and a named Data Protection Officer.

Available

ISO 27001

Planned. Gap analysis underway. Control mapping to SOC 2 means the lift is mostly documentation, not engineering.

Planned
Encryption

TLS 1.3 in transit. AES-256 at rest. No exceptions.

Every packet in and out of our edge uses TLS 1.3 with modern cipher suites only; TLS 1.0 and 1.1 are disabled at the load balancer. Every byte we persist — database rows, object storage, backups, logs — is encrypted with AES-256 using keys managed in AWS KMS.

  • TLS 1.3 with forward secrecy; HSTS preload enabled on all domains.
  • AES-256-GCM for object storage, AES-256-XTS for EBS volumes.
  • Per-tenant encryption keys for enterprise customers on request.
  • Quarterly key rotation; automated envelope encryption for all PHI fields.
TLS 1.3
In transit

AES-256
At rest

KMS
HSM-backed key management
Infrastructure

AWS, hardened — with SOC 2 inherited from the hyperscaler.

We run on AWS across two independent regions. Every workload sits in a private VPC; nothing touches the public internet except the load balancers that have to.

AWS regions

us-east-1 for North American traffic, eu-west-1 for European traffic. Data never crosses regions unless an enterprise customer explicitly enables cross-region replication for disaster recovery.

Network isolation

Three-tier VPC with public, application, and data subnets. Security groups enforce least privilege. No SSH access to production — all operations go through SSM Session Manager.

Inherited compliance

AWS SOC 1, SOC 2 Type II, ISO 27001, ISO 27018, HIPAA, and PCI DSS apply to the underlying infrastructure. Our controls layer on top of those, not in place of them.

Backups & recovery

Point-in-time restore for databases up to 35 days. Object storage uses versioning with 90-day retention. RPO 5 minutes, RTO 60 minutes for region-wide failure.

Access controls

SSO, RBAC, and MFA — enforced, not suggested.

The blast radius of a stolen password depends entirely on what controls surround it. We make sure the surround is thick.

SSO

SAML 2.0 and OIDC on enterprise tier. SCIM provisioning and de-provisioning ties your IdP directly to your workspace.

RBAC

Roles: Owner, Admin, Developer, Billing, Read-only. Fine-grained permissions can be scoped per-project on the enterprise tier.

MFA enforced

TOTP and WebAuthn (hardware keys) supported. Owners can require MFA for the entire workspace; our own staff is MFA-mandatory.

Audit logs

Every sign-in, permission change, API key rotation, and data export is logged, immutable, and exportable to your SIEM.

Data isolation

Per-tenant schemas, region-pinned by design.

We use a hybrid model: a single multi-tenant application layer reads from per-tenant database schemas. The row-level filter does not exist because the row-level surface does not exist — your data lives behind a connection string that no other tenant can reach.

  • Per-tenant Postgres schema with a unique role and search_path.
  • Per-tenant S3 prefix with bucket policies that deny cross-tenant reads.
  • Region pinning: EU data never leaves eu-west-1 without written opt-in.
  • Enterprise option: dedicated database instance and dedicated KMS key.
Your data is yours. Our database is structured so that a bug in our code cannot leak Acme's data to Widgets Inc., because the two never share a table.
— SmartScanPro platform engineering
Offensive security & response

We pay hackers to find bugs. We publish what we find.

Bug bounty (HackerOne)

Private program on HackerOne with a public-facing scope document. Rewards from USD 200 for low-severity findings up to USD 15,000 for critical ones. Average time-to-first-response: under 8 hours.

Incident response

15-minute SLA from paging to first responder on critical incidents. Public postmortems within 5 business days for any incident that impacted customer data or availability for more than 15 minutes.

Penetration testing

Annual third-party pentest by an accredited CREST / OSCP firm. Executive summary is available under NDA; remediation of all findings is tracked publicly in our changelog.

Vulnerability disclosure

Responsible disclosure welcomed at security@smartscanpro.ai — PGP key published on our /.well-known/security.txt. Safe-harbour language covers good-faith research.

Need our security package?

We keep a standard InfoSec bundle ready: SOC 2 Type I report, pentest executive summary, architecture diagram, data-flow diagram, and a pre-filled CAIQ v4. NDA goes out same-day.