A complete resource on how every CareStackOS platform is built, secured, and maintained to meet HIPAA requirements — with the tool grades and certifications to back it up.
Every platform we build ships with the same compliance foundation — not as an add-on tier, not as a configuration option. It's the default.
All platforms, by default
Business Associate Agreement included
Hosted on SOC 2 Type II certified cloud
Data at rest and in transit
Every action tracked and timestamped
Role-based access controls on every platform
A rule-by-rule breakdown of how every CareStackOS platform addresses each HIPAA requirement.
Every tool and infrastructure component we use is evaluated for security grade, certifications, and HIPAA eligibility before it touches your platform.
| Component | Details | Certifications | Grade |
|---|---|---|---|
| Cloud Hosting Provider | SOC 2 Type II, ISO 27001, HIPAA-eligible infrastructure. 99.99% uptime SLA. | SOC 2 Type IIISO 27001HIPAA EligibleFedRAMP | Enterprise |
| CDN & Edge Network | Global CDN with DDoS protection, WAF, and edge security. Data never cached at edge. | SOC 2 Type IIISO 27001 | A+ |
| Database Layer | Managed database with automatic backups, point-in-time recovery, and encryption at rest. | SOC 2 Type IIHIPAA Eligible | A+ |
| Component | Details | Certifications | Grade |
|---|---|---|---|
| Data Encryption (At Rest) | AES-256-GCM encryption for all stored data. Keys rotated automatically every 90 days. | FIPS 140-2NIST SP 800-57 | A+ |
| Data Encryption (In Transit) | TLS 1.3 enforced on all connections. TLS 1.0 and 1.1 disabled. HSTS with preloading. | TLS 1.3HSTS | A+ |
| Key Management Service | Enterprise KMS with hardware security modules (HSMs). No plaintext keys ever stored. | FIPS 140-2 Level 3SOC 2 | A+ |
| Component | Details | Certifications | Grade |
|---|---|---|---|
| Authentication System | Multi-factor authentication (MFA) available for all users. TOTP and SMS supported. | NIST SP 800-63B | A+ |
| Role-Based Access Control | Granular RBAC with custom roles. Principle of least privilege enforced by default. | HIPAA §164.312(a)(1) | A+ |
| Session Management | Secure session tokens with configurable expiry. Automatic logoff after inactivity. | OWASP ASVS Level 2 | A |
| Component | Details | Certifications | Grade |
|---|---|---|---|
| Audit Logging System | Immutable audit logs for every PHI access event. Tamper-evident storage with cryptographic signing. | HIPAA §164.312(b) | A+ |
| Security Monitoring | Real-time anomaly detection, intrusion detection, and automated alerting for security events. | SOC 2 CC7.2 | A |
| Vulnerability Scanning | Automated dependency scanning, SAST, and periodic third-party penetration testing. | OWASP Top 10 | A |
| Component | Details | Certifications | Grade |
|---|---|---|---|
| Email Service Provider | HIPAA-eligible email infrastructure with BAA. TLS-enforced delivery. PHI never in email body. | SOC 2 Type IIHIPAA Eligible | A |
| SMS / Messaging Provider | HIPAA-eligible SMS with BAA. Appointment reminders sent without PHI in message content. | SOC 2 Type IIHIPAA Eligible | A |
| Video / Telehealth | HIPAA-eligible video infrastructure with BAA. End-to-end encrypted sessions. | HIPAA EligibleSOC 2 Type II | A |
| Component | Details | Certifications | Grade |
|---|---|---|---|
| Database Backups | Automated backups every 6 hours. Point-in-time recovery up to 35 days. Cross-region replication. | HIPAA §164.308(a)(7) | A+ |
| Disaster Recovery Plan | Documented DRP with RTO < 4 hours and RPO < 6 hours. Tested quarterly. | HIPAA §164.308(a)(7)(ii)(C) | A |
| Business Continuity | Multi-region failover capability. Automated health checks with sub-minute failover. | SOC 2 A1.2 | A |
Not marketing language. Specific technical and operational controls we implement on every platform.
A signed Business Associate Agreement is required before any PHI touches your platform. We provide it as a standard part of every engagement — not as a premium add-on or enterprise-only feature.
The BAA covers all subcontractors and infrastructure providers we use to build and host your platform. You don't need to negotiate separate BAAs with cloud providers — ours covers the full stack.
No PHI is collected or processed until the BAA is executed. This is non-negotiable.
Our BAA extends to all infrastructure providers — cloud hosting, email, SMS, video — that handle your PHI.
The BAA specifies our obligation to notify you within 30 days of discovering a breach.
The BAA includes documented procedures for returning or destroying PHI upon contract termination.
We're happy to walk through our compliance posture in detail during your discovery call. Bring your compliance officer.
Schedule a Compliance Review