Solara Health Information Security
Updated: May 2025
- Introduction
Security is a top priority for Solara Health.
We have developed a comprehensive security program, guided by a formal, documented
Information Security Management System (ISMS). This program includes policies,
standards, and procedures designed to protect Solara Health’s data, customer
information, and production systems.
- External Security Attestations, Governance, and
Compliance
- Certifications: Solara Health is finalizing SOC 2
Type 1 certification and is on track for SOC 2 Type 2 certification in June 2025.
Independent, third-party audits will be conducted annually.
- Governance: A dedicated security committee meets
weekly to oversee security initiatives, including vulnerability management and
infrastructure improvements.
- Continuous
Improvement: Solara Health partners with a virtual Chief Information
Security Officer (vCISO) to enhance its security posture continuously.
- Data Hosting
- Hosting
Environment: Solara Health’s systems are hosted within Google Cloud
Platform (GCP) secure data centers, certified under ISO 27001, SOC 1 & 2, PCI DSS
Level 1, and other standards.
- Security
Tools: We utilize GCP’s Security Command Center and Cloudflare to
monitor, alert, and protect against malicious activities.
- Human Resources and Awareness
- Background
Checks: All employees undergo pre-employment background checks.
- Security
Training: New hires complete security awareness training, with annual
refresher courses for all staff.
- Policies and
Contracts: Employees and contractors adhere to confidentiality clauses
and relevant security policies.
- Access Control
- Principle of
Least Privilege: Access is granted on a need-to-know basis.
- Account
Security: All individuals have unique usernames, and password policies
enforce complexity in line with NIST standards.
- Multifactor
Authentication (MFA): MFA and Google Single Sign-On are required for
system access.
- Endpoint Security
- Device
Management: Laptops are centrally managed with enforced security
policies, administrative restrictions, and tamper-protected anti-malware tools.
- Automatic
Locking: Devices lock after 15 minutes of inactivity.
- Remote Access
- VPN
Security: Remote access to production systems requires VPN with MFA and
role-based access controls.
- Environment
Separation: Separate paths exist for production support and development
activities.
- Network Security
- Production
Network Protection: Virtual firewalls and GCP security groups ensure
traffic is restricted to the minimum necessary.
- Logging: Administrative activities and access to
customer data are centrally logged for traceability.
- Vulnerability Management and Penetration Testing
- Regular
Scanning: External systems are scanned monthly for vulnerabilities,
while internal scanning is continuous through GCP tools.
- Third-Party
Testing: Annual independent penetration tests are conducted on
production systems.
- Secure Development
- Development
Lifecycle: The Secure Development Lifecycle (SDLC) incorporates
automated static application security testing and dependency analysis (via
Dependabot).
- Training and
Reviews: Developers complete annual secure development training. All
code changes undergo peer review and quality assurance testing.
- Encryption at Rest and in Transit
- Data
Encryption: All data at rest is encrypted using AES 256-bit standards.
Communication between systems employs TLS v1.2 or higher.
- Full Disk
Encryption: Employee laptops have enforced full-disk encryption.
- Backups
- Redundancy: Production data is backed up with
GCP’s cross-region replication capabilities.
- Testing: Business continuity and disaster recovery
plans are tested annually.
- Data Retention Policy
- Retention: Customer data remains in production
systems as long as required. Secure deletion processes are followed for data
disposal, governed by our Data Retention Policy.
- Third-Party Security Risk Management
- Vendor
Assessment: Third-party vendors are evaluated based on risk, data
sharing, and system integration before engagement.
- Ongoing
Reviews: Regular assessments ensure third-party security controls
remain effective.