Document repository

The application is supported by a comprehensive knowledge base that offers detailed descriptions, resources, and step-by-step guidelines to help users navigate the system. This resource-rich library is designed to empower users, providing everything they need to understand and effectively use the application. Whether you’re seeking instructions, troubleshooting tips, or best practices, the knowledge base is a crucial tool for ensuring a smooth and informed experience.

Business Continuity Plan and Disaster Recovery 

  • Automated backups
  • Data storage and media disposal 
  • Restore backup

Document storage and access 

Incident response plans

  • Website not responding 
  • Application error or bug
  • Application security or privacy breach 
  • Backup and restore failure 
  • Premises access denied 

Recovery time objectives (RTO)

Software Development Life Cycle Program “SDLCP”

  • Purpose 
  • SDLCP Framework 
  • Types of works undertaken on Sm8rthealth
  • Development life cycle
  • “Secure by design” defensive measures
  • Independent assurance measures
  • Practical implementation of program 
 

Solutions Architecture 

Purpose and business context 

Sm8rtHealth – Application Overview 

  • Overview 
  • Design Criteria
  • Software Stack 
  • Underwriting Gateway API 
  • AWS Hosting View 
  • Code Integration and Deployment View 
  • Scalability 
  • Backups and Disaster Recovery 
  • Application and Workflow service Terms 

Sm8rtHealth – Design Security Principles 

  • Web Application 
  • AWS Infrastructure 

Sm8rtHealth – Application Methods of Operations 

  • Introduction
  • Raw response (Json output)
  • Launch page and run-time 
  • Question flows
  • Completed applications 
 

Sm8rtHealth – Workbench Overview 

Rule maintenance and data integrity 

  • Procedural Validation 
  • Logical and Technical Validation 

Change control management 

 

Access Controls 

Purpose and scope
Password management
Access Control – Information and remote access
  • User registration 
  • Redundant user’s

Access control – Hosting environment

  • Documentation and assets

Access control – Sm8rtHealth application

  • Claims, Roles and Permissions Matrix

Monitoring access for system usage

Access control forms 

  • Request for access to Sm8rtHealth eco-system 
  • Removal of access to Sm8rtHealth eco-system 
 

Toolbox of Assets

Glossary of terms – Business continuity 

Glossary of terms – Access control 

Staff handbook

Privacy and Security Statement 

Vulnerability Management 

Risk management framework 

Vulnerability program 

  • Vulnerability Statement 
  • Vulnerability Framework

User and administrator access control 

  • User and vendor access
  • Staff and Administrator access

AWS Network Security 

  • AWS’s shared responsibility model for security 
  • CloudTrail security configurations policy
  • Identity and Access Management (IAM) policy 
  • Hosting checklist 
  •  Backup and disaster recovery arrangements 

Data security and Management 

  • Data storage security and management
  • Data in transit 
  • Monitoring of data in storage and transit 
  • Control of data integrity 
  • Scrubbing or anonymizing data
  • Set up to protect the website (firewalls, IPS) 
Verified by MonsterInsights