SECURITY

Security Program Highlights

Checklist

Data Security

Connective Health encrypts data at rest and in transit for all of our customers. We use industry best practices for security and encryption to ensure our customers’ data is always protected..

Box

Application Security

Connective Health uses security scanning throughout our development process. This scanning includes static analysis tooling, dynamic analysis, and dependency monitoring for active threats.

Clipboard with checklist

Infrastructure Security

Connective Health uses Google Cloud Platform to host our applications. We use all security and scanning features provided by the platform to enhance the security of our applications. To limit the attack surface of our applications we utilize modern serverless architectures to eliminate entire categories of vulnerabilities.