Security
Learn about our comprehensive security measures to protect your data and your clients' information.
1. Security Overview
Security is at the core of everything we do at Coachier. We implement multiple layers of security controls to protect your data and ensure the confidentiality, integrity, and availability of our platform.
2. Data Encryption
2.1 Encryption at Rest
- Algorithm: AES-256 (Advanced Encryption Standard)
- Scope: All databases, file storage, and backups
- Key Management: AWS Key Management Service (KMS) with automated rotation
- Field-Level Encryption: Additional encryption for sensitive PHI fields
2.2 Encryption in Transit
- Protocol: TLS 1.3 (Transport Layer Security)
- Certificates: Extended Validation (EV) SSL certificates
- Perfect Forward Secrecy: Enabled for all connections
- HSTS: HTTP Strict Transport Security enforced
2.3 End-to-End Encryption
- Secure messaging with end-to-end encryption
- Encrypted file uploads and downloads
- Client data encrypted before leaving your device
3. Infrastructure Security
3.1 Cloud Infrastructure
Coachier is hosted on Amazon Web Services (AWS), leveraging enterprise-grade security:
- Data Centers: SOC 1/2/3, ISO 27001 certified facilities
- Geographic Distribution: Multi-region architecture for redundancy
- Physical Security: 24/7 monitoring, biometric access, video surveillance
- Environmental Controls: Fire suppression, climate control, power redundancy
3.2 Network Security
- Firewalls: Multiple layers of firewall protection
- DDoS Protection: AWS Shield and CloudFlare protection
- Intrusion Detection: Real-time monitoring and alerting
- Network Segmentation: Isolated networks for different components
- VPC: Private cloud network with strict access controls
3.3 Server Security
- Hardened operating systems with minimal attack surface
- Automated security patching within 48 hours of release
- No direct SSH access to production servers
- Bastion hosts for administrative access
- All changes tracked and audited
4. Application Security
4.1 Secure Development
- SDLC: Security integrated into Software Development Lifecycle
- Code Reviews: Mandatory security-focused code reviews
- Static Analysis: Automated code scanning for vulnerabilities
- Dependency Scanning: Regular checks for vulnerable libraries
- Security Training: Developers trained in secure coding practices
4.2 Vulnerability Management
- Scanning: Weekly automated vulnerability scans
- Penetration Testing: Quarterly third-party pen tests
- Bug Bounty: Responsible disclosure program
- Patching: Critical vulnerabilities patched within 24 hours
- Remediation: Risk-based prioritization and tracking
4.3 Secure APIs
- OAuth 2.0 and JWT authentication
- Rate limiting and throttling
- Input validation and sanitization
- CORS (Cross-Origin Resource Sharing) policies
- API versioning and deprecation procedures
5. Access Controls
5.1 Authentication
- Password Requirements:
- Minimum 12 characters
- Mix of uppercase, lowercase, numbers, symbols
- No common or breached passwords
- 90-day expiration for administrative accounts
- Multi-Factor Authentication (MFA):
- Available for all accounts
- Required for administrative access
- TOTP (Time-based One-Time Password) support
- Biometric authentication (fingerprint, Face ID)
- Single Sign-On (SSO):
- SAML 2.0 support for enterprise customers
- Integration with major identity providers
5.2 Authorization
- Role-Based Access Control (RBAC):
- Predefined roles: Admin, Practitioner, Staff, Client
- Granular permissions for each role
- Custom roles for enterprise accounts
- Principle of Least Privilege:
- Users granted minimum necessary access
- Regular access reviews and audits
- Automatic revocation of inactive accounts
5.3 Session Management
- Secure session token generation
- 15-minute inactivity timeout
- Session invalidation on logout
- Single active session per user (optional)
- Device fingerprinting for anomaly detection
6. Data Protection
6.1 Data Classification
| Classification | Examples | Protection Level |
|---|---|---|
| Critical (PHI) | Client health records, session notes | Highest - Encrypted, audited, restricted access |
| Confidential | Account credentials, payment info | High - Encrypted, access controlled |
| Internal | Business data, usage analytics | Medium - Access controlled |
| Public | Marketing materials, documentation | Standard - Integrity checks |
6.2 Data Backup
- Frequency: Automated daily backups
- Retention: 90-day retention period
- Encryption: All backups encrypted at rest
- Geographic Redundancy: Multiple backup locations
- Testing: Monthly backup restoration tests
- Offsite Storage: Air-gapped offline backups
6.3 Data Residency
- All PHI stored exclusively in US data centers
- Compliance with US data protection laws
- No international data transfers for PHI
- Customer choice for data center region (enterprise)
7. Monitoring and Logging
7.1 Security Monitoring
- 24/7 Monitoring: Round-the-clock security operations center
- SIEM: Security Information and Event Management system
- Threat Intelligence: Real-time threat feeds and analysis
- Anomaly Detection: AI-powered behavior analysis
- Alert Response: Automated and manual incident response
7.2 Audit Logging
- What We Log:
- User authentication events (login, logout, failed attempts)
- Data access and modifications
- Permission changes
- Administrative actions
- API requests
- System configuration changes
- Log Protection:
- Tamper-proof logging
- Encrypted log storage
- Centralized log management
- 6-year retention for HIPAA compliance
7.3 User Audit Trails
Account administrators can view detailed audit reports showing:
- Who accessed what data
- When access occurred
- From which location/device
- What actions were performed
- Any changes made to records
8. Incident Response
8.1 Incident Response Plan
Our comprehensive incident response plan includes:
- Detection: Automated alerts and 24/7 monitoring
- Triage: Rapid assessment and classification
- Containment: Immediate actions to limit impact
- Eradication: Removal of threat and vulnerabilities
- Recovery: Restoration of normal operations
- Lessons Learned: Post-incident review and improvements
8.2 Security Incident Team
- Dedicated incident response team
- 24/7 on-call security personnel
- Defined escalation procedures
- Regular incident response drills
8.3 Breach Notification
- Affected customers notified within 24 hours
- Detailed incident reports provided
- Assistance with regulatory notification requirements
- Remediation actions clearly communicated
9. Business Continuity
9.1 High Availability
- Uptime SLA: 99.9% availability guarantee
- Redundancy: No single point of failure
- Load Balancing: Automatic traffic distribution
- Auto-Scaling: Dynamic resource allocation
- Health Checks: Continuous system monitoring
9.2 Disaster Recovery
- RTO (Recovery Time Objective): 4 hours
- RPO (Recovery Point Objective): 1 hour
- Failover: Automatic failover to backup systems
- Geographic Distribution: Multi-region architecture
- Testing: Quarterly disaster recovery drills
9.3 Maintenance Windows
- Scheduled maintenance during low-usage periods
- Advance notification (minimum 7 days)
- Rolling deployments to minimize downtime
- Emergency maintenance procedures for critical issues
10. Third-Party Security
10.1 Vendor Management
- Due Diligence: Security assessment before onboarding
- Contracts: Security requirements in all vendor agreements
- BAAs: Business Associate Agreements for PHI access
- Regular Reviews: Annual security reassessments
- Limited Access: Minimum necessary principle enforced
10.2 Trusted Partners
- AWS (Cloud Hosting): SOC 1/2/3, ISO 27001, HIPAA
- Stripe (Payments): PCI DSS Level 1 certified
- SendGrid (Email): SOC 2 Type II certified
- Cloudflare (CDN/Security): ISO 27001 certified
11. Security Training and Awareness
11.1 Employee Training
- Mandatory security training for all new hires
- Annual refresher training for all employees
- Role-specific security training
- HIPAA compliance training
- Phishing awareness training
- Incident response training
11.2 Security Culture
- Security-first mindset across organization
- Regular security updates and communications
- Rewards for identifying security issues
- Clear reporting channels for concerns
12. Compliance and Certifications
12.1 Current Certifications
- SOC 2 Type II: Security, availability, confidentiality
- HIPAA: Full compliance with Privacy and Security Rules
- ISO 27001: Information security management
- GDPR: EU data protection compliance
- CCPA: California privacy law compliance
12.2 Regular Audits
- Annual SOC 2 audits by independent auditors
- Quarterly security assessments
- Monthly vulnerability scans
- Penetration testing every 3 months
- Continuous compliance monitoring
13. User Security Best Practices
We recommend the following security practices for all users:
13.1 Account Security
- Use a strong, unique password (12+ characters)
- Enable two-factor authentication (2FA)
- Never share your password
- Use a password manager
- Log out when finished
- Review account activity regularly
13.2 Device Security
- Keep devices and software updated
- Use antivirus software
- Lock your screen when away
- Use encrypted Wi-Fi connections
- Avoid public computers for sensitive data
- Enable device encryption
13.3 Data Handling
- Only access client data when necessary
- Don't download sensitive data unnecessarily
- Securely delete downloaded files
- Use secure file sharing methods
- Follow your organization's policies
14. Reporting Security Issues
14.1 Responsible Disclosure
We welcome reports of security vulnerabilities. If you discover a security issue:
- Email: security@coachier.com
- PGP Key: Available on request for encrypted communication
- Response Time: We respond within 24 hours
- Recognition: Credit in our security hall of fame
14.2 Bug Bounty Program
We operate a private bug bounty program for qualified security researchers. Contact security@coachier.com for details.
14.3 What to Include
- Detailed description of the vulnerability
- Steps to reproduce the issue
- Potential impact assessment
- Any proof-of-concept code
- Your contact information
15. Security Contact Information
For security-related questions or to report incidents:
- Security Team: security@coachier.com (24/7 monitored)
- HIPAA Inquiries: hipaa@coachier.com
- Privacy Questions: privacy@coachier.com
- General Support: support@coachier.com
- Phone: +1 (888) 555-CARE