Encryption, access controls, vendor management, and incident response. The detail your CIO will want; the plain-English version your partner will read.
A written information security program ("WISP") owned by the Head of Security and reviewed quarterly by the partners.
The program is mapped to SOC 2 Trust Services Criteria and the NIST Cybersecurity Framework, with HIPAA Security Rule controls layered on for engagements that handle PHI. Policies are reviewed at least annually; exceptions require partner-level approval and are time-bound.
Encryption in transit and at rest, by default, on every system that touches client data.
Least-privilege role-based access, multi-factor on every administrative surface, no shared accounts.
Production runs on hyperscale cloud providers in US regions, with environment isolation and infrastructure-as-code change control.
Network segmentation is enforced at VPC and service-mesh layers. Private services are not internet-exposed. WAF and DDoS protection are enabled on every public endpoint. Secrets are stored in a managed vault, never in source control. All infrastructure changes flow through pull-request review and automated security scanning.
Every subprocessor that touches client data is reviewed before engagement and re-reviewed annually.
Reviews cover SOC 2 reports, data-handling commitments, breach-notification terms, and termination provisions. Subprocessors that handle PHI sign BAAs. The current subprocessor list is available to clients on request and is updated whenever a material change occurs, with 30 days’ notice.
Centralised, immutable audit logs covering authentication, privilege changes, data access, and infrastructure modification.
Logs are retained for 12 months in a write-once store and shipped to a SIEM with 24/7 alerting on the highest-risk events. Anomaly detection is layered on top of rule-based alerts. We test alerting paths quarterly with simulated events.
A documented incident-response plan with named on-call roles, escalation paths, and client-notification timelines.
Multi-region failover, tested annually. RPO 15 minutes, RTO 4 hours for tier-1 services.
Tabletop exercises are run twice a year covering ransomware, vendor outage, and key-personnel loss. Backups are tested quarterly with end-to-end restore drills, and results are reviewed by the partner group.
SOC 2 Type II audit in progress; report issuance expected Q3 2026.
Responsible disclosure is welcomed. Email security@famaash.com with details and reproduction steps.
We acknowledge receipt within 2 business days, communicate triage status within 5 business days, and remediate critical findings within 30 days. We do not pursue researchers acting in good faith under coordinated disclosure.
Email security@famaash.com for security questions, audit requests, or vulnerability reports.
For SOC 2 reports and the subprocessor list, request through your engagement partner or the security team directly.