Security & Privacy

Echo is built with healthcare data protection as a foundational requirement, not an afterthought.

Multi-Tenant Isolation

Each organization operates in a logically isolated tenant with header-based routing.

Tenant isolation diagram
Institutional tenants are logically isolated at the gateway and data layer. Cross-tenant data access is not permitted.

System Architecture

Microservices architecture with centralized authentication and authorization.

System architecture diagram

Security Controls

Authentication

JWT-based authentication with refresh token rotation and session management.

Authorization

Role-based access control (RBAC) with tenant-scoped permissions.

Encryption

TLS 1.3 for data in transit, AES-256 for data at rest.

Audit Logging

Comprehensive audit trails for all data access and modifications.

Compliance

HIPAA-aligned data handling practices
SOC 2 Type II controls in progress
Regular third-party security assessments

Operating Model

How the platform behaves under normal and adverse conditions.

Governance by Default
All requests pass through tenant identification, entitlement validation, and audit logging before execution.
Fail-Closed Safety
Unknown tenant state, missing entitlement, or ambiguous identity denies by default.
Evidence Over Claims
Every enforcement decision is observable, timestamped, and reviewable.
Tenant Boundaries Are Sacred
Cross-tenant data access is technically prevented at gateway and data layers.
Operational Clarity
Service health, latency, and policy enforcement events are measurable in real time.