Some of the key measures we have taken to provide maximum security include:
Regular risk assessments and vulnerability scans to identify potential security threats and vulnerabilities.
Implementation of strict access controls, including role-based access, password policies, and two-factor authentication. All accesses to important internal systems are logged and constantly monitored. Role-based access control (RBAC) model is incorporated under single Medentee domain utilizing Google-supplied technology.
Use of encryption for data in transit and at rest, including SSL/TLS, AES, and RSA encryption protocols.
Regular security awareness internal training for all employees to promote a culture of security and compliance.
Prompt incident response and disaster recovery procedures in case of any security incidents.
Continuous monitoring of our systems and infrastructure to identify and respond to any potential security threats.
Penetration testing conducted by proficient third-parties.
The Medentee infrastructure is situated in a completely secure and redundant environment, with limited access exclusively available to limited production infrastructure SysOps staff. This arrangement enables us to take advantage of complete segregation of data and access, firewall protection, and other advanced security features.
All customer data is hosted by Amazon Web Services (AWS) which itself hosts has numerous security certifications and ensures the physical security of that data.