Last updated October 1, 2024
Therify implements industry-standard security measures through Supabase's enterprise-grade infrastructure, complemented by our HIPAA compliance protocols.
1. Authentication Security
Passwordless Authentication Protocol
Implementation of Supabase Auth utilizing secure passwordless authentication:
- Email-based verification system eliminating password-related vulnerabilities
- One-time magic link authentication
- Cryptographically secure token generation
- Time-limited authentication links
- Protection against email enumeration attacks
- Rate limiting on email verification attempts
- Automatic invalid token cleanup
Session Management
- Secure session tokens using JWT (JSON Web Tokens)
- Configurable session duration
- Automatic session termination upon security events
- Real-time session invalidation capabilities
- Email-based session recovery protocols
2. Data Storage and Encryption
At-Rest Encryption
- All data at rest encrypted using AES-256 encryption
- Database encryption through PostgreSQL's native encryption capabilities
- Encryption key management through AWS KMS (Key Management Service)
In-Transit Encryption
- TLS 1.2+ encryption for all data in transit
- Forced HTTPS connections
- Perfect Forward Secrecy (PFS) enabled
- Regular SSL/TLS certificate rotation
3. Infrastructure Security
Database Protection
- Row-Level Security (RLS) policies enforced at the database level
- Automated backup systems with encryption
- Regular security patches and updates
- Continuous monitoring and threat detection
Network Security
- Web Application Firewall (WAF) implementation
- DDoS protection
- IP whitelisting capabilities
- Regular security scanning and penetration testing
4. Compliance and Certification
Standards Adherence
- Continuous compliance monitoring
Data Privacy
- PHI handling in accordance with HIPAA requirements
- Data minimization principles
- Strict access controls and audit logging
- Secure data deletion protocols
5. Access Control
Administrative Controls
- Role-based access control (RBAC)
- Principle of least privilege enforcement
- Regular access review and certification
- Comprehensive audit logging of all access events
Technical Controls
- IP-based access restrictions
- Multi-factor authentication capability
- Automated account lockout procedures
6. Incident Response
Security Monitoring
- 24/7 infrastructure monitoring
- Real-time security alerts
- Regular security assessments
Incident Management
- Documented incident response procedures
- Dedicated security response team
- Regular incident response testing
- Client notification protocols
7. Business Continuity
Disaster Recovery
- Regular backup procedures
- Geographically distributed redundancy
- Documented recovery procedures
Service Reliability
- High availability infrastructure
- Automated failover capabilities
- Regular performance monitoring
- Scheduled maintenance windows
8. Updates and Maintenance
Security Updates
- Regular security patches
- Automated vulnerability scanning
- Scheduled maintenance periods
- Change management procedures
Documentation
- Regular policy reviews
- Updated security procedures
- Employee training programs