Security First Approach
At HTJ2K MetaWave, security is paramount. Our codec processes sensitive medical images and must operate with the highest security standards. This page outlines our security architecture, practices, and commitments.
Key Security Principle
Zero Trust Architecture: Our codec operates entirely offline, processing images locally on your device. No image data is transmitted to our servers, eliminating the primary attack vector for medical imaging software.
1. Software Security
1.1 Secure Development Lifecycle
We follow industry best practices for secure software development:
- Secure Coding: OWASP Top 10 mitigation, CWE/SANS Top 25 awareness
- Code Review: Mandatory peer review for all code changes
- Static Analysis: Automated SAST tools (Xcode Analyzer, SwiftLint)
- Dependency Scanning: Regular vulnerability scans of third-party libraries
- Fuzzing: Continuous fuzz testing for codec robustness
1.2 Code Signing
All HTJ2K MetaWave binaries are signed with Apple Developer ID:
- Notarization: Apple notarizes all releases (macOS Gatekeeper)
- Integrity Verification: Verify code signature before execution
- Supply Chain Security: Protects against binary tampering
Verify Code Signature (macOS)
codesign --verify --deep --strict HTMetaWave.framework
spctl --assess --verbose HTMetaWave.framework
1.3 Memory Safety
We use memory-safe languages and frameworks:
- Swift: Automatic Reference Counting (ARC) prevents leaks
- Metal Shading Language: GPU memory isolation
- Bounds Checking: All array accesses validated
- No Unsafe Code: Minimal use of unsafe pointers (audited)
1.4 Input Validation
Robust input validation prevents malicious file exploitation:
- JPEG 2000 Header Validation: Strict parsing per ISO 15444
- Buffer Overflow Prevention: Size limits enforced (max 16K resolution)
- Malformed File Handling: Graceful error handling, no crashes
- DICOM Tag Validation: Sanitize metadata before processing
2. Infrastructure Security
2.1 Website & API Security
Our web infrastructure is hardened against common attacks:
- TLS 1.3: All connections encrypted (A+ rating on SSL Labs)
- HSTS: HTTP Strict Transport Security enabled (max-age=31536000)
- CSP: Content Security Policy prevents XSS
- WAF: Web Application Firewall (Cloudflare) blocks malicious traffic
- DDoS Protection: Cloudflare Pro with rate limiting
- DNSSEC: DNS Security Extensions enabled
2.2 Server Infrastructure
Backend systems (license server, customer portal) hosted on AWS:
- Encryption: AES-256 for data at rest, TLS 1.3 in transit
- Access Control: AWS IAM with least privilege principle
- Network Isolation: Private VPC, no public database access
- Patch Management: Automated security patches within 24 hours
- Logging: CloudTrail, GuardDuty for threat detection
- Backups: Daily encrypted backups with 90-day retention
2.3 Database Security
Customer data (accounts, licenses) stored securely:
- Encryption: AWS RDS with encryption at rest (KMS)
- No PHI Storage: We do NOT store medical images or patient data
- Access Auditing: All database queries logged
- Password Hashing: bcrypt with 12 rounds
- MFA Required: Admin access requires multi-factor authentication
3. Authentication & Access Control
3.1 Customer Portal
- Strong Passwords: Min 12 characters, complexity requirements
- Multi-Factor Authentication: TOTP (Google Authenticator, Authy)
- Session Management: 30-minute idle timeout, secure cookies
- Login Rate Limiting: 5 failed attempts = 15-minute lockout
- Password Reset: Email verification with 1-hour expiration
3.2 License Key Security
- Cryptographically Signed: RSA-4096 signature prevents forgery
- Machine Binding: Tied to device hardware ID
- Revocation: Immediate key revocation capability
- Offline Validation: No "phone home" required for codec operation
4. Privacy & Data Minimization
4.1 No Image Data Collection
Critical Privacy Feature: HTJ2K MetaWave codec does NOT collect, transmit, or store your images or medical data. All processing occurs locally on your device.
- No network requests during codec operation
- No telemetry of image content or metadata
- No cloud processing or "AI enhancement" that uploads images
- No analytics tracking of patient data
4.2 Optional Telemetry (Privacy-Preserving)
If you opt-in, we collect anonymous performance metrics:
- What we collect: FPS, resolution, chip type, codec version
- What we DON'T collect: Image content, filenames, DICOM tags, patient info
- Opt-in/Opt-out: Fully optional, disabled by default
- Differential Privacy: Data aggregated, anonymized
5. Vulnerability Management
5.1 Security Testing
Regular security assessments:
- Penetration Testing: Annual third-party pen test
- Vulnerability Scanning: Weekly automated scans (Nessus, Qualys)
- Bug Bounty Program: Responsible disclosure via HackerOne (coming Q2 2025)
- Security Audits: Annual SOC 2 Type II audit (in progress)
5.2 Patch Management
- Critical Vulnerabilities: Patched within 24 hours
- High Severity: Patched within 7 days
- Medium/Low: Included in quarterly updates
- Notification: Security advisories emailed to all customers
5.3 Responsible Disclosure
Found a security issue? We appreciate responsible disclosure:
Report Security Vulnerabilities
Email: security@htmeta.dev
PGP Key: Download Public Key
Please include:
- Detailed description of the vulnerability
- Steps to reproduce
- Potential impact assessment
- Your contact information (for acknowledgment)
Response SLA: 24 hours acknowledgment, 90 days coordinated disclosure
6. Incident Response
6.1 Security Incident Plan
We maintain a comprehensive incident response plan:
- Detection: 24/7 monitoring via SIEM (Splunk)
- Triage: Security team assesses severity within 1 hour
- Containment: Isolate affected systems immediately
- Eradication: Remove threat, patch vulnerabilities
- Recovery: Restore services, validate integrity
- Communication: Notify affected customers within 24 hours
- Post-Mortem: Root cause analysis, prevention measures
6.2 Breach Notification
In the event of a data breach:
- Customer Notification: Within 24 hours of discovery
- Regulatory Reporting: HIPAA breach notification if PHI involved
- Transparency: Public security advisory for critical issues
- Remediation: Free credit monitoring if personal data exposed
7. Compliance & Certifications
7.1 Current Compliance Status
- HIPAA: Security Rule compliance (local processing model)
- GDPR: EU data protection compliance
- CCPA: California Consumer Privacy Act
- Apple Developer Program: Code signing and notarization
- 🔄 SOC 2 Type II: In progress (expected Q2 2025)
- 🔄 ISO 27001: Planned for 2026
7.2 FDA Cybersecurity
For medical device manufacturers, we align with FDA cybersecurity guidance:
- Premarket: Cybersecurity documentation for 510(k) submissions
- SBOM: Software Bill of Materials available
- Vulnerability Management: Coordinated disclosure process
- Updates: Secure OTA update mechanism (signed updates)
8. Employee Security
8.1 Personnel Security
- Background Checks: All employees undergo background checks
- NDA: Confidentiality agreements signed
- Security Training: Annual HIPAA, OWASP, phishing awareness
- Least Privilege: Access granted on need-to-know basis
- Offboarding: Access revoked within 1 hour of termination
8.2 Device Security
- Endpoint Protection: All employee Macs run CrowdStrike EDR
- Disk Encryption: FileVault required on all devices
- MDM: Jamf Pro for device management
- Remote Wipe: Lost/stolen devices wiped remotely
9. Third-Party Security
9.1 Vendor Risk Management
We carefully vet all third-party service providers:
- AWS (Infrastructure): SOC 2, ISO 27001, HIPAA BAA
- Stripe (Payments): PCI DSS Level 1 certified
- SendGrid (Email): SOC 2 Type II certified
- Cloudflare (CDN/WAF): ISO 27001 certified
9.2 No Data Sharing
We do NOT share your data with:
- Advertisers or marketing platforms
- Data brokers or analytics companies
- Social media platforms
- Any entity without your explicit consent
10. Security Best Practices for Users
10.1 Deployment Recommendations
To maximize security when using HTJ2K MetaWave:
- Keep macOS Updated: Install security patches promptly
- Use FileVault: Enable disk encryption
- Network Isolation: Run codec on isolated VLAN for medical workstations
- Antivirus: Use CrowdStrike, SentinelOne, or built-in XProtect
- Firewall: Enable macOS firewall (Application layer)
- License Key Security: Store keys in macOS Keychain, not plain text
10.2 DICOM Security
- Use TLS for DICOM networking (not unencrypted DICOM C-STORE)
- Implement VPN for remote PACS access
- Segregate DICOM traffic from general network
- Audit DICOM access logs regularly
11. Contact Security Team
Chief Security Officer
HTJ2K MetaWave Inc.
General Security: security@htmeta.dev
Vulnerability Reports: security@htmeta.dev (PGP available)
Security Incidents: +1 (415) 555-0911 (24/7)