Data Security

ZHealth Documentation always encrypts data at rest and in transit for all of our customers. We use tools like Microsoft Azure Keyvault to manage encryption keys and secrets using hardware security modules for maximum security in line with industry best practices.

Application Security

ZHealth Documentation performs third-party penetration tests twice a year to ensure our systems are secure. Our penetration testers evaluate the source code, running application, and the deployed environment. We also believe on-going monitoring and assessment is critical to providing our customers with confidence that their data is safe. To meet these goals, we use industry standard vulnerability and monitoring tools such as Microsoft Azure Defender, Blue Matador, Devo, Rapid 7, and Trend Micro Deep Security to monitor our systems 24 hours a day, 365 days a year.

Infrastructure Security

ZHealth Documentation uses Microsoft Azure to host our application and we make full use of the Azure security products embedded within the Azure ecosystem.


SOC 2 Type 1 Certified
SOC 2 Type 2 Certified