Security at AdvoKate
Your health data deserves the highest level of protection. Here's how we keep it safe.
Data Protection
Encryption at Rest
All data stored in our systems is encrypted using AES-256 encryption. Database fields containing PHI are additionally encrypted at the application level.
Encryption in Transit
All connections to AdvoKate use TLS 1.3 with strong cipher suites. We enforce HTTPS and use HSTS headers to prevent downgrade attacks.
Key Management
Encryption keys are managed through AWS KMS with automatic rotation. Keys are never stored alongside the data they protect.
Backup & Recovery
Automated encrypted backups with point-in-time recovery. Backups are stored in geographically separate regions with the same encryption standards.
Access Control
Multi-Factor Authentication
Optional MFA for all users, required for admin accounts.
Role-Based Access
Granular permissions ensure users only access data they're authorized to see.
Session Management
Automatic session timeouts, secure token handling, and device management.
Zero Trust Architecture
Every request is authenticated and authorized, regardless of network location.
Infrastructure Security
Responsible Disclosure
We appreciate security researchers who help us keep AdvoKate safe. If you discover a vulnerability, please report it responsibly.
security@advokate.health