Security First

Your Health Data Deserves Enterprise-Grade Security

We take the security of your personal health information seriously. Learn about the measures we take to protect your data.

End-to-End Encryption

All sensitive health data is encrypted using AES-256 encryption, both in transit and at rest. Your data is protected from unauthorized access at every step.

Secure Authentication

We support multi-factor authentication, biometric login (Face ID, Touch ID), and secure password requirements to protect your account.

SOC 2 Type II Certified

Our infrastructure and processes are independently audited and certified to meet the highest security standards.

Privacy by Design

Security and privacy are built into every feature from the ground up, not added as an afterthought.

Certifications & Compliance

We maintain industry-leading certifications to ensure your data is protected

SOC 2 Type II

Certified

HIPAA Compliant

Compliant

GDPR Compliant

Compliant

ISO 27001

In Progress

Our Security Practices

Security is an ongoing commitment, not a one-time effort

Regular Security Audits

We conduct quarterly penetration testing and annual third-party security audits to identify and address vulnerabilities.

Bug Bounty Program

We maintain an active bug bounty program to reward security researchers who responsibly disclose vulnerabilities.

Employee Security Training

All employees undergo regular security awareness training and background checks.

Incident Response Plan

We have a comprehensive incident response plan to quickly address any security events.

Data Minimization

We only collect data that is necessary to provide our services and delete data when it's no longer needed.

Vendor Security Assessment

All third-party vendors undergo rigorous security assessments before integration.

How We Protect Your Data

Data Encryption

  • All data encrypted in transit using TLS 1.3
  • Data at rest encrypted using AES-256
  • Encryption keys managed using AWS KMS with automatic rotation

Infrastructure Security

  • Hosted on AWS with SOC 2 certified data centers
  • Network segmentation and firewalls
  • DDoS protection and WAF
  • 24/7 monitoring and alerting

Access Controls

  • Role-based access control (RBAC)
  • Multi-factor authentication required for all employees
  • Audit logging of all data access
  • Principle of least privilege

Report a Security Vulnerability

If you've discovered a security vulnerability in Serene, please report it responsibly. We appreciate your help in keeping our users safe.

We aim to respond to all reports within 24 hours