Security at DisabilityProAI

Because we handle your clients' medical and legal records, security isn't an after-thought — it's baked into every layer of the platform, from the database to the browser. Below is an overview of the safeguards in place today.

1. Data Protection

Layer Safeguard What it means for you
Encryption in transit All traffic travels over TLS 1.3 with HSTS pre-loading Your data is unreadable to anyone on the wire.
Encryption at rest Database files, object storage, and backups are encrypted with AES-256 Even if disks were removed, content would remain protected.
Daily encrypted backups Automated point-in-time snapshots with 35-day retention We can restore your workspace quickly if you ever need it.

2. Application-Level Controls

Row-Level Security (RLS)
Every query is evaluated so users only see their own cases, documents, pages, and chat history.
Fine-grained Storage Policies
Private document bucket plus policies that verify both bucket and case owner before any file is read or written.
Normalized Filenames
Uploaded files are renamed to random UUIDs to prevent path or execution attacks.
Two-Factor Authentication (2FA)
Time-based one-time passwords (TOTP) are supported for all accounts; admins can require it workspace-wide.
Rate-Limiting & Brute-Force Defense
Sign-in, chat, and upload endpoints throttle repeated attempts by IP and account to stop automated attacks.
Anti-CSRF Guard
API routes validate the Origin header and reject state-changing requests that don't originate from our own domains.
XSS Hardening
All chat content is rendered from Markdown that is sanitized with an allow-list cleaner before reaching the browser.
Security Headers
Strict CSP, X-Frame-Options = DENY, Referrer-Policy = same-origin, Permissions-Policy (camera/mic/geolocation disabled).

3. Infrastructure Safeguards

  • Isolated, containerized runtime – Each deploy runs inside a dedicated container that starts as non-root and is rebuilt from an immutable image on every deployment.
  • Managed network edge – A global anycast network terminates TLS, filters malicious traffic, and enforces WAF rules before a request ever reaches our app.
  • Private database networking – The database is not addressable from the public Internet; only the application and admin bastion can connect.
  • Automatic vulnerability patching – Underlying OS images receive kernel and OpenSSL security updates as soon as they are published.

4. Monitoring & Incident Response

  • Real-time log streaming to an external SIEM for long-term retention and anomaly detection.
  • Custom alerts for failed login bursts, abnormal upload sizes, and unexpected database policy violations.
  • 24 × 7 automated health checks – If an instance becomes unhealthy, traffic is rerouted and a new node is launched automatically.
  • Quarterly disaster-recovery drills – We rehearse full-stack restores from backup to verify that every step (database, storage, DNS) is repeatable.

5. Compliance-Friendly by Design

  • HIPAA-ready architecture – Encryption everywhere, audit logging, and strict access controls form the foundation required for handling PHI.
  • Data residency – All primary and backup data stays within U.S.-based data centers.
  • Least-privilege access – Internal staff accounts are scoped to the minimum set of projects and actions they need to support you.

Our Commitment

We continually review new controls and run third-party penetration tests to keep raising the bar. If you have security questions, need our latest penetration-test summary, or want to report a vulnerability, email (PGP key available on request).

Your trust powers DisabilityProAI, and protecting that trust is our highest priority.