Version: 1.0Date: May 19, 2026Classification: Public
1. Executive Summary
ORHub is an AI-powered surgical coordination agent designed for Ambulatory Surgery Centers (ASCs). Staff interact with ORHub via SMS to coordinate OR scheduling, turnover tracking, and case preparation. A web-based supervisor dashboard provides read-only operational visibility.
This document provides a transparent assessment of ORHub's security posture, HIPAA compliance controls, and infrastructure architecture. It is intended for hospital CISOs, IT directors, and compliance officers evaluating ORHub for pilot deployment.
Our approach: We distinguish clearly between controls that are implemented today, those actively in progress, and those on our roadmap. Every architectural decision β from choosing AWS Bedrock over direct API calls, to minimizing PHI in SMS β was made with HIPAA in mind from day one.
13
Controls Implemented
3
In Progress
4
Planned
365d
Log Retention
Key Security Highlights
BAA signed with AWS β covering EC2, EBS, CloudWatch, and Bedrock
Encryption everywhere β AES-256 at rest, TLS 1.2+ in transit
AI under BAA β Claude Sonnet via AWS Bedrock; no data leaves the BAA perimeter
PHI minimization β SMS contains only first names, room numbers, and times
Tamper-resistant audit trail β dual storage in Firestore + CloudWatch
Zero stored credentials β IAM instance roles for all AWS auth
Data isolation is enforced at the database layer β every Firestore document is scoped to a facilityId. Security rules prevent cross-facility access. This is logical isolation within a shared database; single-tenant deployment is available for organizations requiring physical separation.
6. Encryption
At Rest
Layer
Method
Key Management
AWS EBS Volumes
AES-256
AWS-managed
Google Firestore
AES-256
Google-managed
AWS CloudWatch
AES-256
AWS-managed
In Transit
Path
Protocol
Certificate
Client β Nginx
TLS 1.2+
Let's Encrypt (auto-renewing)
App β Firestore
TLS 1.2+
Google-managed
App β Bedrock
TLS 1.2+
AWS-managed
App β TextMagic
TLS 1.2+
TextMagic-managed
App β CloudWatch
TLS 1.2+
AWS-managed
7. Audit & Monitoring
ORHub maintains a comprehensive, tamper-resistant audit trail across two independent storage systems:
Firestore Audit Collection
Every agent interaction: inbound message, AI response, reasoning, actions, token usage
Every dashboard access: user identity, resource viewed, timestamp
Every data modification: before/after state, initiating user
Tamper resistance: Audit logs exist in two independent systems (Firestore and CloudWatch), neither on the application server. Compromising the app server does not grant ability to modify or delete audit records.
Logs can be exported from Firestore filtered by date range, facility, user, action type, or case identifier.
8. AI/ML Data Handling
How ORHub Uses AI
ORHub uses Anthropic's Claude Sonnet via AWS Bedrock β a fully managed AWS service covered under the AWS BAA. The AI coordinates surgical operations; it does not make clinical decisions.
Data Retention by the AI Model
AWS Bedrock does not retain, log, or use customer inputs or outputs to train models. Input prompts are processed and discarded. No customer data is shared with Anthropic. This is contractually guaranteed under the AWS BAA and Bedrock service terms.
Authentication
ORHub authenticates to Bedrock using an IAM instance role. No API keys or credentials are stored on disk or in environment variables. Credentials rotate automatically via AWS STS.
No Third-Party AI Providers
ORHub does not send patient data to OpenAI, Anthropic directly, Google AI, or any AI provider outside BAA coverage. All AI processing occurs within the AWS BAA perimeter.
9. Subprocessors & Third Parties
Subprocessor
Service
PHI Access
BAA
SOC 2
Location
AWS
EC2, EBS, Bedrock, CloudWatch
Yes
β Signed
Yes
us-east-1
Google Cloud / Firebase
Firestore, Auth
Yes
π In Progress
Yes
us-central1
TextMagic
SMS Gateway
Minimized
π Investigating
Varies
EU/US
Anthropic (via Bedrock)
AI Model
Transient
Covered by AWS BAA
Yes
us-east-1
10. Compliance Status Matrix
Administrative Safeguards (Β§164.308)
Requirement
HIPAA Ref
ORHub Control
Status
Security Management Process
Β§164.308(a)(1)
Risk assessment; controls per this document
β
Assigned Security Responsibility
Β§164.308(a)(2)
Founding team; dedicated officer planned
π
Workforce Security
Β§164.308(a)(3)
Key-based auth; limited access
β
Information Access Mgmt
Β§164.308(a)(4)
Facility-scoped access; deploy user separation
β
Security Awareness Training
Β§164.308(a)(5)
Formal training program
π
Security Incident Procedures
Β§164.308(a)(6)
Process exists; formal docs in progress
π
Contingency Plan
Β§164.308(a)(7)
EBS snapshots; DR plan in development
π
Evaluation
Β§164.308(a)(8)
Internal review; pen testing planned
π
BAAs with Subprocessors
Β§164.308(b)(1)
AWS signed; Firebase/TextMagic in progress
π
Physical Safeguards (Β§164.310)
Requirement
HIPAA Ref
ORHub Control
Status
Facility Access Controls
Β§164.310(a)(1)
AWS SOC-certified data centers
β (via AWS)
Workstation Use/Security
Β§164.310(b-c)
Cloud-only; no on-premise
β N/A
Device & Media Controls
Β§164.310(d)(1)
EBS encryption; no removable media
β
Technical Safeguards (Β§164.312)
Requirement
HIPAA Ref
ORHub Control
Status
Access Control
Β§164.312(a)(1)
Firebase Auth; Firestore rules; SSH keys
β
Unique User ID
Β§164.312(a)(2)(i)
Individual accounts and SSH keys
β
Emergency Access
Β§164.312(a)(2)(ii)
SSH admin access; formal procedure planned
π
Automatic Logoff
Β§164.312(a)(2)(iii)
Session timeout enforcement
π
Encryption
Β§164.312(a)(2)(iv)
AES-256 at rest; TLS 1.2+ in transit
β
Audit Controls
Β§164.312(b)
Full trail in Firestore + CloudWatch (365d)
β
Integrity Controls
Β§164.312(c)(1)
Tamper-resistant off-box dual logging
β
Authentication
Β§164.312(d)
Firebase Auth + SSH key-pair
β
Transmission Security
Β§164.312(e)(1)
TLS 1.2+ on all paths
β
11. Risk Assessment
Risk
Severity
Mitigation
Remediation
Firebase BAA not yet signed
High
Migration to Google Workspace org in progress
Q2 2026
TextMagic BAA not signed
Medium
PHI minimized in SMS (first name, room, time only)
Q2-Q3 2026
No MFA on dashboard
Medium
Firebase Auth + access logging
Q2-Q3 2026
Single EC2 instance (no HA)
Medium
systemd auto-restart; EBS snapshots
2027
No formal pen testing
Medium
Hardening, minimal surface, fail2ban
Q3-Q4 2026
No session timeout
Low
Access logging; Firebase session mgmt
Q2-Q3 2026
No formal IRP
Medium
Informal process exists
Q2-Q3 2026
Transparency note: We are an early-stage company. Certain enterprise controls (SOC 2, pen testing, HA) are on our roadmap. We mitigate through security-first architecture, PHI minimization, dual audit logging, and honesty about our current state.
Notification: Covered entity notified within 72 hours; affected individuals within 60 days per HIPAA (45 CFR Β§164.404-408)
Investigation: Full forensic trail from Firestore + CloudWatch dual logs
Remediation: Root cause analysis and control updates
13. Frequently Asked Questions
Where exactly is PHI stored?
Google Firestore (patient/schedule data, audit logs) and AWS CloudWatch (app logs). Both encrypted at rest. AWS BAA signed; Google Cloud BAA in progress.
Is the AI model seeing PHI?
Yes β it processes patient context for coordination through AWS Bedrock (BAA-covered). It does not retain or learn from the data.
Does the AI retain or learn from our data?
No. Bedrock does not store inputs/outputs or use customer data for training. Contractually guaranteed under AWS BAA.
Who has access to the production server?
A deploy user (no sudo) and an ubuntu admin user (SSH key only). Password auth and root login disabled.
What happens if the server goes down?
systemd auto-restarts the process. No HA/failover yet β planned for scale phase.
Can we get an audit log export?
Yes β Firestore audit collection, filterable by date, facility, user, action type, or case ID.
Penetration testing results?
Not yet β third-party pen test is on near-term roadmap.
Is our data isolated from other facilities?
Yes β all data scoped by facilityId with Firestore security rules. Logical isolation; single-tenant available on request.
What about physical security?
No on-premise infrastructure. AWS us-east-1 data centers maintain SOC 1/2/3 and ISO 27001 with 24/7 physical security.
Is there a mobile app?
No. SMS-based staff interface + web dashboard. No MDM/MAM concerns.