Skip to main content

Technical Security Measures

Updated over a month ago

Allia Health utilizes a multi-layered security architecture designed to maintain the confidentiality, integrity, and availability of clinical data. The system is engineered to mitigate unauthorized access through a combination of cryptographic controls, network isolation, and rigorous monitoring.

Data Encryption and Session Integrity

The platform implements standardized cryptographic protocols to protect data throughout its lifecycle.

  • Encryption Standards: All Protected Health Information (PHI) is encrypted at rest and in transit using AES-256 bit encryption.

  • Dynamic Session Management: Authentication triggers the creation of unique session keys that rotate at high frequency to minimize the window of potential unauthorized access.

  • Database Architecture: Allia Health utilizes enterprise-grade cloud environments on Amazon Web Services (AWS), with data layers managed via MongoDB Atlas and PostgreSQL on RDS.

Network Isolation and Access Control

System access is governed by the principle of least privilege and strict perimeter defenses.

  • Network Perimeter: Services are hosted within private networks and isolated via firewalls and granular security groups to prevent unauthorized external access.

  • Role-Based Access Control (RBAC): Administrative and system access is restricted through a strict identity management framework, ensuring that personnel only have access to the resources necessary for their specific function.

  • Audit Logging: The system maintains immutable audit trails. Every access event and data modification is logged to provide a transparent history of system interaction.

Operational Security and Monitoring

Continuous verification protocols are in place to identify and remediate potential risks.

  • Infrastructure Monitoring: Automated systems provide 24/7 surveillance of network traffic and system health to detect anomalous behavior.

  • Vulnerability Management: Allia Health performs regular automated vulnerability scans and periodic security testing to ensure the integrity of the software stack and underlying infrastructure.


Technical Documentation and Support

Security Inquiries: support@allia.health

Did this answer your question?