Permissioned access
Role-based authorization governs who can access workflows, environments, and high-impact operations.
This page summarizes publication-safe security controls for procurement orientation. It intentionally avoids unsupported certification claims.
Security controls are aligned with applicable NIS2/CRA expectations and are implemented through permissioned access, end-to-end encryption, and immutable traceability. This statement is not a certification claim.
Role-based authorization governs who can access workflows, environments, and high-impact operations.
Sensitive flows are protected with encryption controls across transit and approved storage boundaries.
Clinical payload storage remains tenant-scoped with no centralized clinical payload repository.
Operational events are recorded with append-only traceability to support audit integrity and investigations.
Security issues are triaged, prioritized, and tracked through controlled remediation workflows.