Document repository
The application is supported by a comprehensive knowledge base that offers detailed descriptions, resources, and step-by-step guidelines to help users navigate the system. This resource-rich library is designed to empower users, providing everything they need to understand and effectively use the application. Whether you’re seeking instructions, troubleshooting tips, or best practices, the knowledge base is a crucial tool for ensuring a smooth and informed experience.
Business Continuity Plan and Disaster Recovery
- Automated backups
- Data storage and media disposal
- Restore backup
Document storage and access
Incident response plans
- Website not responding
- Application error or bug
- Application security or privacy breach
- Backup and restore failure
- Premises access denied
Recovery time objectives (RTO)
Software Development Life Cycle Program “SDLCP”
- Purpose
- SDLCP Framework
- Types of works undertaken on Sm8rthealth
- Development life cycle
- “Secure by design” defensive measures
- Independent assurance measures
- Practical implementation of program
Solutions Architecture
Purpose and business context
Sm8rtHealth – Application Overview
- Overview
- Design Criteria
- Software Stack
- Underwriting Gateway API
- AWS Hosting View
- Code Integration and Deployment View
- Scalability
- Backups and Disaster Recovery
- Application and Workflow service Terms
Sm8rtHealth – Design Security Principles
- Web Application
- AWS Infrastructure
Sm8rtHealth – Application Methods of Operations
- Introduction
- Raw response (Json output)
- Launch page and run-time
- Question flows
- Completed applications
Sm8rtHealth – Workbench Overview
Rule maintenance and data integrity
- Procedural Validation
- Logical and Technical Validation
Change control management
Access Controls
Password management
Access Control – Information and remote access
- User registration
- Redundant user’s
Access control – Hosting environment
- Documentation and assets
Access control – Sm8rtHealth application
- Claims, Roles and Permissions Matrix
Monitoring access for system usage
Access control forms
- Request for access to Sm8rtHealth eco-system
- Removal of access to Sm8rtHealth eco-system
Toolbox of Assets
Glossary of terms – Business continuity
Glossary of terms – Access control
Staff handbook
Privacy and Security Statement
Vulnerability Management
Risk management framework
Vulnerability program
- Vulnerability Statement
- Vulnerability Framework
User and administrator access control
- User and vendor access
- Staff and Administrator access
AWS Network Security
- AWS’s shared responsibility model for security
- CloudTrail security configurations policy
- Identity and Access Management (IAM) policy
- Hosting checklist
- Backup and disaster recovery arrangements
Data security and Management
- Data storage security and management
- Data in transit
- Monitoring of data in storage and transit
- Control of data integrity
- Scrubbing or anonymizing data
- Set up to protect the website (firewalls, IPS)