Trust Center

Security

How we protect your operational data at every layer.

Infrastructure

SuiteIQ runs entirely on Amazon Web Services (AWS) in the us-east-1 region.

  • VPC isolation — application servers, databases, and caches run in private subnets with no direct internet access
  • Security groups — defense-in-depth: ALB accepts only HTTPS; ECS accepts only from ALB; RDS and Redis accept only from ECS
  • AWS Fargate — serverless containers with no host OS to patch; container images scanned on every push
  • WAF — AWS WAFv2 with managed rulesets (OWASP common, known-bad inputs, IP reputation) and per-IP rate limiting

Encryption

  • In transit — TLS 1.2+ enforced on all public endpoints (CloudFront, ALB). HSTS headers.
  • At rest — PostgreSQL (RDS) encrypted with AWS-managed KMS keys. S3 buckets use AES-256 server-side encryption. CloudWatch logs encrypted with customer-managed KMS CMK with automatic key rotation.
  • Secrets — database credentials stored in AWS Secrets Manager; never committed to source control or logs

Authentication & Access Control

  • AWS Cognito — enterprise identity provider with SRP (Secure Remote Password) protocol; passwords never transmitted in cleartext
  • MFA — TOTP-based multi-factor authentication; mandatory in production
  • httpOnly session cookies — browser never accesses or stores JWT tokens; refresh tokens stored server-side only
  • Hospital-scoped isolation — every API call is verified against the user's hospital claim; users at one hospital cannot access another hospital's data
  • Role-based access — admin, nurse, and coordinator roles with least-privilege enforcement at the resolver level
  • Rate limiting — per-IP token bucket (100 req/s, burst 200) to prevent brute-force and abuse
  • User enumeration protection — identical error messages for invalid email and wrong password

Monitoring & Audit

  • Application audit log — append-only record of every privileged action (user management, hospital provisioning, configuration changes) with actor identity, IP address, and timestamp
  • AWS CloudTrail — management events captured across all regions with log file validation
  • Structured logging — JSON-formatted application logs with sensitive data redaction (phone numbers and emails are masked before logging)
  • Container Insights — ECS cluster performance and resource utilization monitoring

Development Practices

  • CI/CD — automated linting, testing (282 tests), and deployment via GitHub Actions
  • OIDC federation — no long-lived AWS credentials; GitHub Actions assumes an IAM role via OIDC for each deploy
  • Immutable image tags — ECR tag immutability prevents overwriting released container images
  • Distroless runtime — production containers run on a minimal base image with no shell, no package manager, no attack surface
  • GraphQL complexity limits — server rejects overly complex nested queries to prevent resource exhaustion

Responsible Disclosure

If you discover a security vulnerability, please report it to security@suiteiq.io. We take all reports seriously and will respond within 48 hours.