Skip to main content

Security Overview

Intelligent Locations’ INTRAX platform is built from ground up with security in mind. We follow and implement the best practices and standards recommendations in every layer of the cloud architecture and development process. We follow the ISO 27001 standard and applicable set of SOC2 Type 2 security controls (report available on demand).

For our web application, we use OWASP top10 standard recommendations, while maintaining HIPAA and SOC 2 certifications, Intelligent Locations already enforces a robust security posture, continuously improved by our internal Security Governance Process. We use Security Scorecard and Coalition Inc as external Cyber Security monitoring tools which helps us and our customers continuously monitor the current state of Security Posture.

‍The security approach employed by Intelligent Locations, defense-in-depth strategy, aims to combine multiple security controls applied at each platform layer. The following are examples of such measures:

 

1. Network Security – continuously monitoring traffic and completely isolating internal resources and development tools inside the cloud, minimizing attack surface.

  • a. Only allow access to confidential data to employees that strictly need it for their job.
  • b. Enforce encrypted connections to any cloud resources as well as MFA for corporate emails.
  • c. Virus protection and monitoring Operating System to ensure the latest security patches are installed.

2. Application Security – enforce authenticated access to all internal and customer facing applications. Follow examples of access and security measures in place:

  • a. Enforce Role Based Access Control (RBAC) to all internal and customer facing applications and end-to-end encryption for all applications’ data flows.
  • b. Encryption is applied, in transit at the transport level protocol.
  • c. Data at rest is encrypted using industry standard AES-256 encryption algorithm for both RDS (databases) and cloud storage. An extra application-level encryption layer is applied for PHI and PII data.
  • d. Intrusion detection and logging systems are in place for all applications. Based on an application’s specific functionality, we store the log files for a max of 1 year period.
  • e. AWS CloudWatch is enabled for all long-leaved log entries.
  •  f. OpenSearch service is used for operational, debugging long-leaved log entries.

3. Users  – Internal Users (Intelligent Locations employees) are subject to:

  • Policy managed onboarding and offboarding processes.
  • Cloud infrastructure access is managed by AWS IAM (identity access management).
  • Access to other internal Intelligent Locations resources is managed by Microsoft Azure Identity Server (corporate email application access, MS Teams other SSO enabled services).
  • INTRAX (customer user interface application) identity management is handled by Single-Sign On IDPs. We support locally managed identities (e.g., users managed by our internal IDP) and also customer IDPs (federated authentications) on top of SAML (preferred), OIDC, LDAP SSO protocols

Intelligent Locations is annually audited, which helps the company understand what it is doing right and what can be improved. Improvements are made regularly and plans are in place for risk events.

For exceptional events that might be unforeseen or out of Intelligent Locations’ control (Natural disasters, cyber-attacks etc.), the company maintains a Disaster Recovery Plan in order to restore the system and minimize the potential downtime for customers. Intelligent Locations’ team tests the Disaster Recovery Plan at least twice annually. Cloud services are set up such that end users face as little disruption and data loss possible, and Intelligent Locations is constantly working on improving to cover as many scenarios as possible.

In the event of a data breach, or failure in any of our policies, the Incident Response Plan is enacted.

HIPAA
Intelligent Locations is HIPAA certified. In compliance with the legal requirements defined by HIPAA laws and regulations, Intelligent Locations maintains and enforces a set of policies and keeps up with security needs to protect PHI.

SOC 2 Type 2 Certification
Intelligent Locations proudly maintains the SOC2 Type 2 certification, for which Intelligent Locations can provide on demand, a SOC2T2 Trust Report that showcases our commitment to security controls and monitoring.

Annual Pen Test
As part of the certification process, Intelligent Locations performed an in-depth external penetration test followed by a complete remediation process that allowed our engineers to proactively patch and improve the security of the application.

certification logos