Security & Infrastructure
How we protect your most sensitive medical data with Zero-Trust architecture
Security isn't just important to us—it's absolutely critical. We handle some of the most sensitive medical information imaginable, including patient data, and we take that responsibility seriously. Our infrastructure is purpose-built from the ground up to protect medical data with enterprise-grade security measures.
We've designed our entire system around a Zero-Trust security model, where every component is verified, encrypted, and isolated. This isn't just about compliance—it's about ensuring that your patients' most private information remains private, always.
This page provides an overview of our security infrastructure and practices. For detailed technical documentation or compliance certifications, please contact us directly.
Zero-Trust Infrastructure
docxtract operates a Zero-Trust infrastructure specifically designed for processing patient data. Our architecture ensures complete encryption at rest and in transit, isolates data optimally from each other, and minimizes the storage of sensitive patient data.
Zero Trust Principle: "Never trust, always verify." We assume that no element in the network—whether internal or external—is automatically trustworthy. Every access must be authenticated, authorized, and continuously validated, regardless of the user's or device's location.
Key Benefits:
- Every system component requires authentication
- No automatic trust, even within internal networks
- Continuous verification of all access requests
- Minimal data exposure and compartmentalization
Our Security Best Practices
Modern Encryption Standards
We use state-of-the-art encryption algorithms: Ed25519 for digital signatures and AES with 256-bit encryption for data protection. These are military-grade encryption standards that provide the highest level of security available.
Encrypt Everything by Default
We encrypt every system component by default. All internal network devices use full-disk encryption, and all data connections are protected with TLS/SSH encryption. No data exists in plain text, anywhere in our infrastructure.
No Shared Keys Policy
Encryption keys are generated per user/host using the latest algorithms and are never shared between systems or users. This ensures that if one system is compromised, others remain secure.
Minimal Exposition
We use SSH-Agent-Forwarding when working on remote servers, which minimizes the exposure of sensitive credentials and reduces the attack surface of our infrastructure.
Enterprise Password Management
All passwords and keys are securely stored in enterprise-grade password managers and must meet strict minimum requirements. We enforce 32-character passwords minimum for all systems.
KISS Design Philosophy
KISS stands for "Keep it Simple, Stupid!" This design philosophy from software engineering states that simple solutions are preferable to complex ones because they are more effective, better maintainable, and less error-prone.
KISS is one of our core principles in both technical and organizational implementation of our system. By keeping our architecture simple and focused, we reduce potential attack vectors and make our security measures more reliable and auditable.
Why Simple is Secure:
- Fewer components mean fewer potential vulnerabilities
- Easier to audit and validate security measures
- More reliable and predictable system behavior
- Faster response to security incidents
Security Updates & Transparency
Security updates are performed manually on a weekly basis by our security team. This allows us to carefully test and validate each update before deployment to ensure system stability and continued security.
Full Transparency: We manually publish every security update with timestamp on security.docxtract.ai. This provides our clients with complete visibility into our security maintenance practices.
Our Update Process:
- Weekly review of security patches and updates
- Testing in isolated staging environment
- Careful deployment to production systems
- Public documentation of all changes
Compliance & Standards
We adhere to the highest standards of medical data protection and are fully compliant with European data protection regulations including GDPR. Our security practices are designed to meet and exceed healthcare industry requirements.
GDPR Compliant
Full compliance with European General Data Protection Regulation
Medical Standards
Designed for healthcare industry data protection requirements
Security Questions?
Have specific questions about our security measures or need detailed technical documentation for your compliance team? We're here to help.
christoph@docxtract.ai