Compliance Certifications
HIPAA
Business Associate Agreement available. Full compliance with Privacy and Security Rules.
Status: Certified
Status: Certified
SOC 2 Type II
Annual audit covering security, availability, and confidentiality controls.
Status: Certified
Status: Certified
HITRUST CSF
Healthcare-specific security framework certification.
Status: In Progress
Status: In Progress
FDA 21 CFR Part 11
Electronic records and signatures compliance for SaMD applications.
Status: Compliant
Status: Compliant
BAA Available: Rubric signs Business Associate Agreements (BAAs) with all customers handling PHI. Contact your account manager or email [email protected] to execute a BAA.
Security Overview
PHI Handling
Comprehensive controls for protected health information throughout the data lifecycle.
Encryption
AES-256 encryption at rest, TLS 1.3 in transit. Customer-managed keys available.
Access Logging
Complete audit trail of all data access with tamper-evident logging.
Data Retention
Configurable retention policies with secure deletion and compliance holds.
Infrastructure Security
| Control | Implementation | Details |
|---|---|---|
| Cloud Provider | AWS GovCloud / AWS Commercial | Region selection based on data residency requirements |
| Network Security | VPC isolation, WAF, DDoS protection | Private endpoints available for enterprise |
| Compute | Hardened containers, no persistent storage | Stateless application tier |
| Database | Amazon RDS with encryption | Multi-AZ deployment, automated backups |
| Object Storage | S3 with server-side encryption | Versioning enabled, cross-region replication |
| Secrets Management | AWS Secrets Manager | Automatic rotation, audit logging |
| Identity | AWS IAM, SSO integration | Role-based access, MFA required |
Data Flow Security
Access Controls
Rubric implements role-based access control (RBAC) with predefined roles for healthcare AI workflows:| Role | Permissions | Typical Users |
|---|---|---|
| Organization Admin | Full access, user management, billing, security settings | IT administrators, compliance officers |
| Project Admin | Full project access, team management, integrations | ML team leads, project managers |
| Evaluator | Create evaluations, view results, manage datasets | ML engineers, data scientists |
| Reviewer | Submit reviews, view assigned samples | Clinicians, medical reviewers |
| Viewer | Read-only access to results and reports | Stakeholders, executives |
| API Only | Programmatic access only, no UI | Service accounts, CI/CD |
rbac_example.py
Security Best Practices
| Practice | Description |
|---|---|
| Enable Multi-Factor Authentication | Require MFA for all users accessing PHI. SSO with your IdP is supported. |
| Use Least Privilege Access | Assign minimum necessary permissions. Use project-scoped roles when possible. |
| Rotate API Keys Regularly | Set up automatic key rotation or rotate manually every 90 days. |
| Review Audit Logs | Regularly review access logs for anomalies. Set up alerts for suspicious activity. |
| Configure Data Retention | Set appropriate retention periods for your compliance requirements. |
| Use Private Endpoints | For enterprise deployments, use VPC private endpoints to avoid public internet. |
Security Documentation
Request additional security documentation for your compliance review:- SOC 2 Type II Report
- Security Architecture Whitepaper
- Penetration Test Executive Summary
- Business Associate Agreement (BAA)
- Data Processing Agreement (DPA)
- Vendor Security Questionnaire (CAIQ, SIG, Custom)
Security Review: Contact [email protected] to request security documentation or schedule a security review call with our team.
