Security Overview & Infrastructure

Last updated: January 1, 2025

Security at Lime Health AI

Security is foundational to everything we build at Lime Health AI. As a healthcare technology company handling protected health information, we maintain comprehensive security practices that meet or exceed industry standards.

Infrastructure Security

Our platform is hosted on secure, HIPAA-compliant cloud infrastructure with enterprise-grade security controls. We leverage the security capabilities of our cloud providers while implementing additional layers of protection specific to our healthcare use case.

Data Encryption

All data is encrypted both in transit and at rest. We use TLS 1.2+ for data in transit and AES-256 encryption for data at rest. Encryption keys are managed through dedicated key management systems with regular rotation.

Access Control

We implement role-based access control (RBAC) throughout our platform. Access to PHI is limited to authorized personnel on a need-to-know basis. All access is logged and regularly reviewed.

Application Security

Our development practices include security code reviews, automated vulnerability scanning, dependency monitoring, and regular penetration testing by independent security firms.

Monitoring and Incident Response

We maintain 24/7 security monitoring with automated alerting for suspicious activity. Our incident response plan defines clear procedures for identifying, containing, and remediating security incidents.

Vendor Management

All third-party vendors with access to our systems or data undergo security assessment. Vendors handling PHI are required to sign Business Associate Agreements and demonstrate HIPAA compliance.

Employee Security

All employees undergo background checks and receive security training. Access to production systems requires multi-factor authentication and is granted based on the principle of least privilege.

Contact

For security inquiries or to report a vulnerability, please contact security@getlimeai.com.