Security & Compliance

Built for regulated healthcare from day one

Rendum meets the highest standards for healthcare data security. HIPAA compliant. SOC 2 Type II attested. Zero compromises.

HIPAA

45 CFR Control Mapping

Complete mapping of Rendum controls to HIPAA Security Rule requirements under 45 CFR Part 164.

CFR ReferenceControlStatus
164.308(a)(1)Security Management ProcessImplemented
164.308(a)(3)Workforce SecurityImplemented
164.308(a)(4)Information Access ManagementImplemented
164.308(a)(5)Security Awareness & TrainingImplemented
164.308(a)(6)Security Incident ProceduresImplemented
164.308(a)(7)Contingency PlanImplemented
164.310(a)Facility Access ControlsImplemented
164.310(b)Workstation UseImplemented
164.310(d)Device and Media ControlsImplemented
164.312(a)Access ControlImplemented
164.312(b)Audit ControlsImplemented
164.312(c)IntegrityImplemented
164.312(d)Person/Entity AuthenticationImplemented
164.312(e)Transmission SecurityImplemented
SOC 2 Type II

Trust Services Criteria

Rendum's SOC 2 Type II report covers Security, Availability, and Confidentiality trust service criteria.

Security

  • Logical and physical access controls
  • System boundary definition and monitoring
  • Change management procedures
  • Risk mitigation and vulnerability management

Availability

  • Performance monitoring and capacity planning
  • Disaster recovery and business continuity
  • Incident management and escalation
  • Backup and restoration testing

Confidentiality

  • Data classification and handling
  • Encryption at rest and in transit
  • Confidential data disposal
  • Non-disclosure agreements and access restrictions
Infrastructure

Azure cloud infrastructure

Rendum is deployed on Microsoft Azure, leveraging FedRAMP-authorized infrastructure purpose-built for healthcare workloads.

Azure Regions

Primary deployment in Azure US East with automatic failover to US West. All data stays within US borders.

Azure SQL Database

Managed database with automatic backups, point-in-time restore, and transparent data encryption (TDE).

Azure Key Vault

All encryption keys, secrets, and certificates managed through FIPS 140-2 Level 2 validated HSMs.

Azure App Service

Application layer runs on isolated App Service Environments with VNet integration and private endpoints.

Azure Monitor

Real-time monitoring, alerting, and log analytics. All access events and data operations logged for audit.

Azure DDoS Protection

Standard-tier DDoS protection with automatic traffic scrubbing and real-time attack mitigation.

Encryption Details

At Rest

AES-256 encryption for all data at rest. Database-level Transparent Data Encryption (TDE). File storage encrypted via Azure Storage Service Encryption (SSE).

In Transit

TLS 1.2+ enforced for all API connections. SFTP connections use SSH key authentication with a minimum key length of 2048 bits. No plaintext protocols supported.

Key Management

Encryption keys managed through Azure Key Vault with automatic rotation. Customer-managed keys (BYOK) available on Enterprise plans.

Incident Response

Detection

Azure Sentinel SIEM with custom detection rules for healthcare-specific threats. 24/7 automated monitoring with human-in-the-loop escalation.

Response SLA

Critical incidents: 15-minute acknowledgment, 1-hour initial response. Security incidents involving PHI: immediate notification to affected customers within 24 hours per BAA requirements.

Post-Incident

Root cause analysis published within 5 business days. Remediation plan with timeline. Annual penetration testing by independent third party.

Learn More

Request our full security documentation

Enterprise customers can request our complete SOC 2 Type II report, penetration test results, and detailed security questionnaire responses.