Our Security PracticesTransparency

We protect healthcare organizations for a living. Here's how we protect ourselves — and you.

As a healthcare cybersecurity provider, we hold ourselves to the same standards we set for our clients. This page describes the security controls, compliance commitments, and operational practices we maintain. We believe transparency builds trust.

Data Encryption

All data is encrypted in transit and at rest.

  • -TLS 1.3 enforced on all connections — no exceptions
  • -AES-256 encryption for data at rest across all storage systems
  • -Database-level encryption with managed key rotation
  • -End-to-end encryption for client communications

24/7 Security Monitoring

We monitor our own infrastructure with the same rigor we apply to client environments.

  • -Continuous monitoring of all systems by our Security Operations Center
  • -Real-time alerting with defined escalation procedures
  • -Threat intelligence feeds integrated into detection systems
  • -Automated response playbooks for common threat patterns

Access Control

Strict least-privilege access across all systems.

  • -Multi-factor authentication required for all staff — no exceptions
  • -Role-based access control with quarterly access reviews
  • -Privileged access management for administrative operations
  • -Automatic session timeout and device compliance checks
  • -Background checks for all employees with access to client data

Infrastructure Security

Defense in depth from network edge to application layer.

  • -Network segmentation isolating client environments
  • -Web application firewall protecting all public endpoints
  • -Regular vulnerability scanning and penetration testing
  • -Patch management with critical patches applied within 24 hours
  • -DDoS protection on all internet-facing services

Compliance

We practice what we preach.

  • -HIPAA-compliant operations — we sign BAAs with all clients
  • -Annual HIPAA Security Risk Assessment on our own systems
  • -NIST Cybersecurity Framework alignment
  • -Regular third-party security assessments
  • -Documented policies and procedures covering all HIPAA safeguards

Incident Response

Tested, documented, and rehearsed.

  • -Documented incident response plan with defined roles and escalation paths
  • -Tabletop exercises conducted quarterly
  • -Client notification within 24 hours of confirmed incidents
  • -Post-incident reviews with root cause analysis and remediation tracking
  • -Coordination with law enforcement when required

Business Continuity

We stay operational so you stay protected.

  • -Geographically distributed infrastructure with automatic failover
  • -Encrypted backups with regular restore testing
  • -Disaster recovery plan with defined RTOs and RPOs
  • -Redundant monitoring — if one system goes down, coverage continues

Vendor Management

We hold our vendors to the same standards we hold ourselves.

  • -Security assessments for all third-party vendors
  • -Business Associate Agreements with every vendor handling PHI
  • -Annual vendor risk reviews
  • -Minimum security requirements enforced contractually

Business Associate Agreement

GuardsArm signs a Business Associate Agreement (BAA) with every healthcare client. We take our obligations under HIPAA seriously — your patients' data is our responsibility too.

Request Our BAA

Security Questions?

If you have questions about our security practices or need additional documentation for your vendor assessment, contact us at security@guardsarm.com or call +1 (587) 821-5997.