Security that's
table stakes.
Dispatch is critical infrastructure. Hatzalah.Live is built with the controls, monitoring, and operational discipline that critical infrastructure demands.
Defense in depth, by default
Nine layers of controls protect every byte of dispatch and medical data we process.
Security as a daily practice
These are the operating routines that keep our controls effective — not just documented.
Secure development
- Peer review on code changes before they ship to production.
- Dependency vulnerability scanning integrated into the build.
- Threat-modeling for new architecture and integrations.
- Secrets stored in a managed secrets store — never committed to source.
Operations & monitoring
- Production alerting on uptime, latency, and security signals.
- Centralized log aggregation with retention configured per environment.
- Monitoring of authentication and admin actions for unusual patterns.
- Periodic access reviews for production systems and credentials.
People & process
- Background checks for personnel with production access, in accordance with applicable law.
- Security and HIPAA training for personnel with PHI access.
- Documented offboarding with prompt credential revocation.
- Designated Security Officer accountable for the program.
Found something? We want to hear about it.
We welcome reports from security researchers and the broader community. Please send a description of the issue, steps to reproduce, and any proof-of-concept material to [email protected]. We commit to acknowledging valid reports within one business day and to working with you in good faith.
Please do not access or modify customer data, disrupt service, or share details publicly until we’ve had time to investigate.
Get our full security pack.
We respond to security questionnaires (DDQ, SIG, HECVAT) within one business day.