
Security at IntuitionLabs
How we protect client data, application code, and production infrastructure — encryption, access control, secure development lifecycle, monitoring, and incident response designed for regulated life sciences engagements.
Our Security Operating Model
Security as a first-class requirement

Individually attributable access

Defence in depth

Technical Controls
A non-exhaustive list of the technical controls applied across our engagements. Exact implementation is tailored to the workload, client requirements, and regulatory classification.
TLS 1.2+ Everywhere
All public endpoints enforce TLS 1.2 or higher with modern cipher suites. Legacy protocols are disabled at the edge. HSTS with preload is enabled on production domains.
Encryption at Rest
Block storage, object storage, and managed databases use provider-managed encryption with AES-256 equivalent strength. Backups are encrypted with keys separate from live data.
Centralised Secret Management
API keys, database credentials, and signing keys live in AWS Secrets Manager, Google Secret Manager, or platform-native vaults — never in source code or build artefacts.
MFA on Every Identity
Multi-factor authentication is required for every cloud console, identity provider, source repository, and deployment pipeline. MFA bypass requires a documented, time-boxed exception.
Role-Based Access Control
Authorization is modelled as roles with explicit permission sets. Role definitions are version controlled. Access reviews happen on role change, engagement transition, and at a defined cadence.
Centralised Logging
Application, platform, and access logs are centralised with sufficient retention for forensic review and regulatory obligations. Security-relevant events are tagged for alerting.
WAF and DDoS Mitigation
Public properties are fronted by Cloudflare's enterprise edge, which provides a managed Web Application Firewall, rate limiting, bot management, and always-on DDoS mitigation.
Dependency Scanning
Every build scans for known vulnerabilities in first- and third-party dependencies. High-severity findings block merge and are triaged against defined remediation SLAs.
Static Application Security Testing
SAST runs on every pull request and on the default branch nightly. Findings are triaged by the engineering lead and patched, mitigated, or risk-accepted with documentation.
Secure Software Development Lifecycle
Security is built into every phase of delivery, from the first design sketch to the post-release retrospective. Our SDLC is aligned with NIST SSDF and OWASP ASVS, and layered with GAMP 5 lifecycle controls for regulated-system work. Security reviews are not an optional late-stage step — they are gates inside the CI pipeline.
Design-Time Threat Modelling
Code-Time Controls
Pipeline-Time Gates
Infrastructure security

Application security

Data security

Platform Providers and Inherited Controls
Client workloads ride on specialist infrastructure providers whose certified control environments we inherit at the platform layer.
AWS
Primary hosting, compute, object storage, and managed databases. Inherits ISO/IEC 27001, HIPAA-eligible, and FedRAMP-authorized controls at the underlying platform layer.
AWS compliance programsGoogle Cloud Platform
Selected AI, data pipeline, and analytics workloads. Inherits ISO/IEC 27001 and HIPAA BAA coverage where applicable to the workload.
GCP compliance programsCloudflare
Enterprise edge for all public properties — WAF, DDoS mitigation, bot management, TLS termination. Inherits ISO/IEC 27001 coverage.
Cloudflare Trust HubVercel
Next.js production deployments with immutable build artefacts and signed deployments. HIPAA-eligible platform coverage available.
Vercel securityGitHub
Source code management with branch protection, mandatory peer review, and signed commits. Inherits platform-level security controls from GitHub Enterprise.
GitHub securityIdentity and SSO
Corporate identity is centralised through an SSO provider with MFA enforcement, conditional access policies, and session monitoring.
Request control narrativeMonitoring, Detection and Response
Visibility is a security control. We invest in logging and detection so that when something goes wrong we know quickly and can act decisively.
Securing the AI supply chain

Third-party and supply-chain risk

People are part of the stack

Frequently Asked Questions
Need a deeper security review?
Book a session with our team and we will walk your security or risk function through our control narrative, inherited-control matrix, and engagement-specific safeguards.
Book a Meeting