Security
Last revised: 7/7/2023
Security is built into the fabric of Toyon Associates, Inc and the healthcare organizations we serve. We take our commitments seriously and have established policies and controls that follow industry best practices in order to exceed the needs of our clients.
Data Security
-
Data is encrypted at rest and in transit.
-
Encryption keys are managed via Amazon Web Service’s (AWS) Key Management System.
-
Physical security following industry best practices deployed at all hosted data centers.
Application Security
-
Third-party penetration tests.
-
Third-party vulnerability scans.
-
Static code analysis.
Infrastructure Security
-
Toyon uses Amazon Web Services (AWS) to host our Absolute software application.
-
We leverage AWS security products including Shield, Inspector, and Macie.
- We deploy Identity and Access Management services including AWS IAM and Okta Identity Cloud.
-
Our Absolute software application is deployed using AWS-managed services including EKS, RDS, and Redshift.
Questions
If you have any questions about Toyon’s Security policies and controls you can contact Toyon Associates, Inc by telephone at 1-888-514-9312 (toll-free) or via e-mail at info@toyonassociates.com