Security Architecture

How OncoSource Protects
Competitive Pricing Intelligence

Purpose-built for the security requirements of PE-backed medical device companies. Every layer of the platform is designed to protect the data that matters most — backed by continuous security operations from our cybersecurity partner, Hiro.

Last updated: April 2026

01

HIPAA Compliance by Design

OncoSource is architecturally designed to never receive, store, or process Protected Health Information (PHI).

The platform handles exclusively procurement data: product SKUs, pricing, quantities, and purchase orders. No patient names, medical record numbers, diagnoses, treatment plans, or clinical data ever enters the system.

Zero PHI fields in the database schema — compliance through data exclusion
PunchOut integrations with hospital ERPs exchange only catalog and cart data via cXML/OCI — never patient records
Hospitals can connect without triggering HIPAA BAA requirements for clinical data
Dramatically simplifies IT security review and vendor onboarding at healthcare facilities
Infrastructure providers (Supabase, Vercel) are HIPAA-eligible with BAA support for healthcare workloads
02

Data Isolation & Multi-Tenancy

Every database table is scoped by organization. Row-Level Security (RLS) policies are enforced at the PostgreSQL level — not in application code. Data isolation cannot be bypassed even with direct database access.

RLS policies active on all database tables — enforced by PostgreSQL, not application logic
Scoped admin client automatically injects org_id filters into every query, preventing cross-tenant data leaks
Competitive intelligence tables are invisible to all non-admin roles at the database level
Buyers see only their own organization's data — never other facilities' information
Service role operations are scoped by organization to prevent privilege escalation
03

AI Security Operations — Hiro

OncoSource is monitored by Hiro, an AI-powered security analyst that investigates alerts, correlates data across our security stack, and delivers actionable findings 24/7.

Hiro's founding team includes infrastructure engineers who kept Uber's platform running at global scale — the same operational discipline is now applied to automated security operations for healthcare technology.

Automated Alert Triage

Hiro acts as a tireless Tier-1 analyst — automatically investigating security detections, correlating endpoint alerts with cloud activity, and delivering clear verdicts with evidence. Investigations that took 30-60 minutes happen in seconds.

Cross-Platform Correlation

Connects the dots across our entire stack — CrowdStrike endpoint detection, AWS CloudTrail, Okta identity, Slack, Vercel deployments, Supabase database security, and GitHub. No alert exists in isolation.

Identity Intelligence

Maps human identities to their cloud sessions, SSO logins, and service accounts across the environment. Tracks over-privileged IAM roles and detects suspicious access patterns.

Security Posture Auditing

Continuously audits Supabase RLS enforcement, auth config, storage bucket exposure, branch protections, SSL enforcement, and IAM hygiene. Hiro remembers organizational context — accepted risks, architecture patterns, and known-good behaviors.

Automated Remediation

Hiro doesn't just detect — it fixes. From enabling database row-level security to opening pull requests for code vulnerabilities, updating auth configs, and making storage buckets private, Hiro takes action with human approval — closing the loop between detection and resolution.

24/7 automated investigation — no alert goes uninvestigated
Significant reduction in alert noise through intelligent triage and verdict-setting
Detection-to-resolution in minutes, not hours
Full-stack coverage: endpoint, cloud, identity, database, and code
Independent penetration test against OncoSource plus standing review on every security-sensitive diff — auth, access control, data handling, and cryptography — before merge
Annual re-test cadence; redacted summary available under NDA to qualified partners
04

Pricing Data Protection

Competitive pricing intelligence is protected by a three-layer defense system.

Layer 1: Database

PostgreSQL RLS policies ensure competitive intel tables are accessible only to CQ admin roles. Even with a valid user token, buyer accounts cannot query this data.

Layer 2: Application

Server-side middleware verifies role and MFA status before rendering any admin page. Unauthorized users are redirected before sensitive data is fetched.

Layer 3: API

Invoice analysis writes competitive intel using a privileged service role. The authenticated buyer's token cannot read back that data.

Buyers see their savings report but never aggregate competitor pricing
Admins see aggregated competitive intelligence but never individual buyer pricing tiers
Tier-specific pricing resolved server-side — client never receives other tiers' rates
No cross-organization data leakage possible at any access level
05

Authentication & Access Control

Defense-in-depth authentication with server-side MFA enforcement, invite-only admin provisioning, and session-level verification.

Multi-Factor Authentication

TOTP-based MFA (RFC 6238) enforced at AAL2 per NIST SP 800-63B. Compatible with Google Authenticator, Authy, 1Password, and Microsoft Authenticator. MFA verification checked on every admin request — not just at login.

Server-Side Enforcement

MFA is enforced in server middleware — not client JavaScript. Disabling JS or navigating directly to admin routes still triggers the MFA gate. No client-side bypass is possible.

Invite-Only Admin Access

Admin accounts can only be created by existing admins through a secure invite flow. Self-registration always assigns buyer-level access. No public endpoint can escalate privileges.

Session Security

PunchOut sessions use cryptographically random 48-character identifiers with automatic 1-hour expiry. Session validation is mandatory before any order can be placed.

06

Encryption & Infrastructure

In Transit

All traffic encrypted with TLS 1.3 enforced by Vercel's global edge network and Supabase's API gateway. No unencrypted connections accepted.

At Rest

AES-256 encryption for all database storage via Supabase (PostgreSQL on AWS). Uploaded invoices stored with per-organization namespacing.

Payment Processing

Stripe handles all payment data — PCI DSS Level 1 compliant. OncoSource never stores card numbers. Orders remain in pending state until Stripe webhook confirms successful payment.

Secret Management

Service role keys, API credentials, and payment secrets are server-side only. ERP shared secrets are bcrypt-hashed (cost factor 12) before storage. Environment variables are never prefixed for client exposure.

07

AI Data Handling

Anthropic Claude is our only AI provider, used for two purposes: invoice parsing and an authenticated product-knowledge chatbot. Anthropic does not train on commercial API inputs under our terms.

Invoice Parsing

Extracts SKUs, descriptions, quantities, and unit prices from uploaded procurement documents. No Protected Health Information is ever sent to the AI. No CQ Medical catalog pricing or competitive intelligence is included in the parsing prompt.

Role-Scoped Chatbot

Authenticated buyers and admins can query product fit, compatibility, and pricing. The catalog injection is role-scoped at the server: hospital buyers see only their own tier price plus list price — never other tiers, never the competitor mapping table. CQ admins see the full catalog. Output filtering blocks bulk-catalog extraction attempts.

Anthropic does not use API inputs or outputs for model training
No Protected Health Information is ever sent to the AI
Chatbot tier pricing is resolved server-side by role — other tiers are never injected into the buyer prompt
Competitor mapping catalog is visible only to CQ-staff roles in chatbot context
Raw content is not persisted on Anthropic servers beyond the API request lifecycle
Rate limiting enforced per user and per IP to prevent abuse of AI endpoints
08

Audit Logging & Access Monitoring

Comprehensive audit trail for all sensitive data access, aligned with HIPAA 45 CFR §164.312(b) requirements.

Every access to protected resources — invoice downloads, AI analysis requests, report distribution — is logged with the acting user, organization, IP address, user agent, and full request metadata. Audit logs are immutable and accessible only to administrators.

Dedicated audit log table with user, organization, resource, action, and timestamp
IP address and user agent captured for forensic analysis
Covers invoice downloads, AI analysis, and report email distribution
Write-only from application perspective — logs written via service role, no user can modify
Non-blocking architecture — audit logging never prevents legitimate access
6-year retention aligned with HIPAA record-keeping requirements
09

Secure Development Lifecycle

Security is enforced throughout the development pipeline — from code review to deployment. Every change to security-sensitive code requires dedicated review, automated checks, and passes through CI before reaching production.

Code Review Enforcement

CODEOWNERS requires security team approval for all changes to API routes, database migrations, authentication middleware, and CI/CD workflows. Direct pushes to main are blocked.

Branch Protection

All changes require pull requests with passing status checks. Force pushes to main are blocked. Branch protection rules enforce review requirements before any merge.

CI Security Scanning

Automated security checks on every pull request: dependency vulnerability scanning (npm audit), secret detection in source code, TypeScript strict type checking, and build verification.

Database Migrations

Schema changes deploy through an automated CI pipeline — version-tracked, reviewed, and applied consistently. No manual database modifications in production.

10

Compliance & Certifications

SOC 2

Type II — Supabase

SOC 2

Type II — Vercel

PCI DSS

Level 1 — Stripe

SOC 2

Type II — Anthropic

HIPAA-eligible infrastructure with BAA support across all providers
Immutable audit logs with user, organization, resource, and timestamp on every sensitive operation
Role-based access with full authentication audit trail
Automated security scanning on every code change via CI/CD pipeline
Continuous security monitoring and incident response via Hiro
Platform designed for healthcare IT security review with zero PHI exposure

Questions about our security architecture?

Contact security@oncosourceai.com

© 2026 OncoSource AI. RT Procurement Platform.