Security Overview

Our commitment to protecting your data and ensuring secure codec operations

Security First Approach

At HTJ2K MetaWave, security is paramount. Our codec processes sensitive medical images and must operate with the highest security standards. This page outlines our security architecture, practices, and commitments.

Key Security Principle

Zero Trust Architecture: Our codec operates entirely offline, processing images locally on your device. No image data is transmitted to our servers, eliminating the primary attack vector for medical imaging software.

1. Software Security

1.1 Secure Development Lifecycle

We follow industry best practices for secure software development:

  • Secure Coding: OWASP Top 10 mitigation, CWE/SANS Top 25 awareness
  • Code Review: Mandatory peer review for all code changes
  • Static Analysis: Automated SAST tools (Xcode Analyzer, SwiftLint)
  • Dependency Scanning: Regular vulnerability scans of third-party libraries
  • Fuzzing: Continuous fuzz testing for codec robustness

1.2 Code Signing

All HTJ2K MetaWave binaries are signed with Apple Developer ID:

  • Notarization: Apple notarizes all releases (macOS Gatekeeper)
  • Integrity Verification: Verify code signature before execution
  • Supply Chain Security: Protects against binary tampering

Verify Code Signature (macOS)

codesign --verify --deep --strict HTMetaWave.framework
spctl --assess --verbose HTMetaWave.framework

1.3 Memory Safety

We use memory-safe languages and frameworks:

  • Swift: Automatic Reference Counting (ARC) prevents leaks
  • Metal Shading Language: GPU memory isolation
  • Bounds Checking: All array accesses validated
  • No Unsafe Code: Minimal use of unsafe pointers (audited)

1.4 Input Validation

Robust input validation prevents malicious file exploitation:

  • JPEG 2000 Header Validation: Strict parsing per ISO 15444
  • Buffer Overflow Prevention: Size limits enforced (max 16K resolution)
  • Malformed File Handling: Graceful error handling, no crashes
  • DICOM Tag Validation: Sanitize metadata before processing

2. Infrastructure Security

2.1 Website & API Security

Our web infrastructure is hardened against common attacks:

  • TLS 1.3: All connections encrypted (A+ rating on SSL Labs)
  • HSTS: HTTP Strict Transport Security enabled (max-age=31536000)
  • CSP: Content Security Policy prevents XSS
  • WAF: Web Application Firewall (Cloudflare) blocks malicious traffic
  • DDoS Protection: Cloudflare Pro with rate limiting
  • DNSSEC: DNS Security Extensions enabled

2.2 Server Infrastructure

Backend systems (license server, customer portal) hosted on AWS:

  • Encryption: AES-256 for data at rest, TLS 1.3 in transit
  • Access Control: AWS IAM with least privilege principle
  • Network Isolation: Private VPC, no public database access
  • Patch Management: Automated security patches within 24 hours
  • Logging: CloudTrail, GuardDuty for threat detection
  • Backups: Daily encrypted backups with 90-day retention

2.3 Database Security

Customer data (accounts, licenses) stored securely:

  • Encryption: AWS RDS with encryption at rest (KMS)
  • No PHI Storage: We do NOT store medical images or patient data
  • Access Auditing: All database queries logged
  • Password Hashing: bcrypt with 12 rounds
  • MFA Required: Admin access requires multi-factor authentication

3. Authentication & Access Control

3.1 Customer Portal

  • Strong Passwords: Min 12 characters, complexity requirements
  • Multi-Factor Authentication: TOTP (Google Authenticator, Authy)
  • Session Management: 30-minute idle timeout, secure cookies
  • Login Rate Limiting: 5 failed attempts = 15-minute lockout
  • Password Reset: Email verification with 1-hour expiration

3.2 License Key Security

  • Cryptographically Signed: RSA-4096 signature prevents forgery
  • Machine Binding: Tied to device hardware ID
  • Revocation: Immediate key revocation capability
  • Offline Validation: No "phone home" required for codec operation

4. Privacy & Data Minimization

4.1 No Image Data Collection

Critical Privacy Feature: HTJ2K MetaWave codec does NOT collect, transmit, or store your images or medical data. All processing occurs locally on your device.

4.2 Optional Telemetry (Privacy-Preserving)

If you opt-in, we collect anonymous performance metrics:

  • What we collect: FPS, resolution, chip type, codec version
  • What we DON'T collect: Image content, filenames, DICOM tags, patient info
  • Opt-in/Opt-out: Fully optional, disabled by default
  • Differential Privacy: Data aggregated, anonymized

5. Vulnerability Management

5.1 Security Testing

Regular security assessments:

  • Penetration Testing: Annual third-party pen test
  • Vulnerability Scanning: Weekly automated scans (Nessus, Qualys)
  • Bug Bounty Program: Responsible disclosure via HackerOne (coming Q2 2025)
  • Security Audits: Annual SOC 2 Type II audit (in progress)

5.2 Patch Management

  • Critical Vulnerabilities: Patched within 24 hours
  • High Severity: Patched within 7 days
  • Medium/Low: Included in quarterly updates
  • Notification: Security advisories emailed to all customers

5.3 Responsible Disclosure

Found a security issue? We appreciate responsible disclosure:

Report Security Vulnerabilities

Email: security@htmeta.dev
PGP Key: Download Public Key

Please include:

Response SLA: 24 hours acknowledgment, 90 days coordinated disclosure

6. Incident Response

6.1 Security Incident Plan

We maintain a comprehensive incident response plan:

  1. Detection: 24/7 monitoring via SIEM (Splunk)
  2. Triage: Security team assesses severity within 1 hour
  3. Containment: Isolate affected systems immediately
  4. Eradication: Remove threat, patch vulnerabilities
  5. Recovery: Restore services, validate integrity
  6. Communication: Notify affected customers within 24 hours
  7. Post-Mortem: Root cause analysis, prevention measures

6.2 Breach Notification

In the event of a data breach:

  • Customer Notification: Within 24 hours of discovery
  • Regulatory Reporting: HIPAA breach notification if PHI involved
  • Transparency: Public security advisory for critical issues
  • Remediation: Free credit monitoring if personal data exposed

7. Compliance & Certifications

7.1 Current Compliance Status

  • HIPAA: Security Rule compliance (local processing model)
  • GDPR: EU data protection compliance
  • CCPA: California Consumer Privacy Act
  • Apple Developer Program: Code signing and notarization
  • 🔄 SOC 2 Type II: In progress (expected Q2 2025)
  • 🔄 ISO 27001: Planned for 2026

7.2 FDA Cybersecurity

For medical device manufacturers, we align with FDA cybersecurity guidance:

  • Premarket: Cybersecurity documentation for 510(k) submissions
  • SBOM: Software Bill of Materials available
  • Vulnerability Management: Coordinated disclosure process
  • Updates: Secure OTA update mechanism (signed updates)

8. Employee Security

8.1 Personnel Security

  • Background Checks: All employees undergo background checks
  • NDA: Confidentiality agreements signed
  • Security Training: Annual HIPAA, OWASP, phishing awareness
  • Least Privilege: Access granted on need-to-know basis
  • Offboarding: Access revoked within 1 hour of termination

8.2 Device Security

  • Endpoint Protection: All employee Macs run CrowdStrike EDR
  • Disk Encryption: FileVault required on all devices
  • MDM: Jamf Pro for device management
  • Remote Wipe: Lost/stolen devices wiped remotely

9. Third-Party Security

9.1 Vendor Risk Management

We carefully vet all third-party service providers:

  • AWS (Infrastructure): SOC 2, ISO 27001, HIPAA BAA
  • Stripe (Payments): PCI DSS Level 1 certified
  • SendGrid (Email): SOC 2 Type II certified
  • Cloudflare (CDN/WAF): ISO 27001 certified

9.2 No Data Sharing

We do NOT share your data with:

10. Security Best Practices for Users

10.1 Deployment Recommendations

To maximize security when using HTJ2K MetaWave:

  • Keep macOS Updated: Install security patches promptly
  • Use FileVault: Enable disk encryption
  • Network Isolation: Run codec on isolated VLAN for medical workstations
  • Antivirus: Use CrowdStrike, SentinelOne, or built-in XProtect
  • Firewall: Enable macOS firewall (Application layer)
  • License Key Security: Store keys in macOS Keychain, not plain text

10.2 DICOM Security

  • Use TLS for DICOM networking (not unencrypted DICOM C-STORE)
  • Implement VPN for remote PACS access
  • Segregate DICOM traffic from general network
  • Audit DICOM access logs regularly

11. Contact Security Team