Security and Privacy at Surgical Data Science Collective
Security is at the heart of what we do — helping our customers improve their security and compliance posture starts with our own.
![Illustration Sucurity](https://cdn.prod.website-files.com/645a05a5431e2de683ad6bcf/65f30cfaeb1366fe39d8eab6_security-hero-min.webp)
![](https://cdn.prod.website-files.com/645a05a5431e2de683ad6bcf/65f30d7aedb5064acc18f66e_security-hero-decor.png)
Information Security
SDSC encrypts and protects sensitive information across the transformation and analysis process.
Access Management & Authentication
SDSC’s platform provides full control of access to all hosted information
Software Development Practices
Security processes have been fully integrated into the SDSC software development processes. In addition, processes are set up to allow for separation of duties and segmentation of platforms with development, staging, and production.
Infrastructure
Security
SDSC leverages Amazon Web Services (AWS). We utilize hardening practices from the Center for Internet Security (CIS) Benchmarks for the platform configuration. SDSC can make available all standards, AWS certifications and accreditations along with physical security controls.
Vulnerability Scanning
Daily scanning of all compute instances, clusters, and containers. Regular scanning of code repositories and libraries
Company Policies and Procedures
SDSC security, risk, and compliance processes were developed based on industry best practices and are reviewed and updated on an annual basis or upon any significant change.
Regular Third-Party Security Review
That identifies and evaluates security risks of vendors and third parties.
Get Your Early Access Now!
Free access is limited. Register and join the list of 100 people
who have received early access
![](https://cdn.prod.website-files.com/645a05a5431e2de683ad6bcf/65f30d7aedb5064acc18f66e_security-hero-decor.png)
![](https://cdn.prod.website-files.com/645a05a5431e2de683ad6bcf/65f30d7aedb5064acc18f66e_security-hero-decor.png)