Security Practices
At Pawanax, security is built into every aspect of our systems and operations. Learn about our comprehensive approach to protecting your data.
Infrastructure Security
Secure cloud infrastructure with multiple redundancies, regular security patches, and comprehensive network monitoring.
Application Security
Secure development practices, regular code reviews, and comprehensive security testing throughout the development lifecycle.
Data Security
End-to-end encryption for sensitive data, secure backup procedures, and strict data minimization and retention policies.
Operational Security
Security awareness training for all staff, background checks, and comprehensive incident response procedures.
Our Security Practices
Infrastructure Security
Our infrastructure security program is designed to protect our systems and data from unauthorized access, ensuring the availability, integrity, and confidentiality of our services.
- Secure Cloud Infrastructure: We use industry-leading cloud providers with robust security controls and compliance certifications.
- Network Security: We implement multiple layers of network security, including firewalls, intrusion detection systems, and network segmentation.
- Regular Patching: We maintain a rigorous patching schedule to address security vulnerabilities in a timely manner.
- DDoS Protection: Our systems are protected against distributed denial-of-service attacks to ensure availability.
- Redundancy: We implement multiple redundancies to ensure high availability and disaster recovery capabilities.
Application Security
Security is integrated throughout our development lifecycle, from design to deployment, ensuring that our applications are built with security in mind.
- Secure Development Lifecycle: We follow secure coding practices and conduct regular security training for our development team.
- Code Reviews: All code changes undergo peer review with a focus on security implications.
- Security Testing: We conduct regular security testing, including static code analysis, dynamic application security testing, and penetration testing.
- Input Validation: We implement strict input validation and output encoding to prevent injection attacks.
- Authentication & Authorization: We use strong authentication mechanisms and implement principle of least privilege for access control.
Data Security
Protecting sensitive healthcare data is our top priority. We implement multiple layers of protection to ensure the confidentiality, integrity, and availability of your data.
- Encryption: We use industry-standard encryption for data in transit (TLS 1.2+) and at rest (AES-256).
- Data Minimization: We collect and retain only the data necessary for providing our services.
- Secure Backups: We maintain secure, encrypted backups with strict access controls.
- Data Retention: We have clear data retention policies and secure data deletion procedures.
- Federated Learning: Where possible, we use federated learning techniques that keep sensitive data on local devices.
Operational Security
Our operational security practices ensure that our team members follow secure procedures and that we can respond effectively to security incidents.
- Security Awareness: All team members receive regular security awareness training.
- Access Control: We implement strict access controls based on the principle of least privilege.
- Background Checks: We conduct background checks for employees with access to sensitive systems.
- Incident Response: We have a comprehensive incident response plan that is regularly tested.
- Security Monitoring: We maintain continuous security monitoring and alerting systems.
Compliance & Certifications
We maintain compliance with relevant healthcare data protection regulations and industry standards, including:
ISO 27001
We are ISO 27001 certified, demonstrating our commitment to information security management.
HIPAA Compliance
Our systems and processes are designed to comply with the Health Insurance Portability and Accountability Act requirements.
GDPR Compliance
We adhere to the General Data Protection Regulation for processing personal data of EU residents.
SOC 2 Type II
We have completed SOC 2 Type II audits, verifying our controls related to security, availability, and confidentiality.
We also comply with local data protection regulations in the East African countries where we operate, including Kenya's Data Protection Act and similar regulations in Uganda and Tanzania.
Security Vulnerability Reporting
We take security vulnerabilities seriously and appreciate the efforts of security researchers and our user community in identifying and reporting potential issues.
Responsible Disclosure
If you discover a security vulnerability in our systems, we encourage you to report it to us through our responsible disclosure program. We commit to:
- Acknowledging receipt of your vulnerability report within 24 hours
- Providing regular updates on the progress of addressing the vulnerability
- Notifying you when the vulnerability has been fixed
- Recognizing your contribution (if desired) after the vulnerability has been addressed
How to Report
Please send your vulnerability reports to security@pawanax.com. Include the following information in your report:
- Description of the vulnerability
- Steps to reproduce the issue
- Potential impact of the vulnerability
- Any suggestions for mitigating the issue
Note: Please do not disclose the vulnerability publicly until we have had the opportunity to address it.
Have Questions About Our Security Practices?
Our security team is here to help. Contact us with any questions or concerns about our security practices.
Contact Our Security Team