A secure IT-architecture

Ledidi Core is powered with a secure architecture design that future-proofs the increasing need to safeguard data and privacy at all steps.

Our primary focus is to safeguard the sensitive data we process on the behalf of our customers. Which means that behind the scenes at Ledidi, our platform is built on a robust architecture designed to ensure the highest levels of data security and privacy.  

Ledidi uses a defence-in-depth approach for a layered security approach that applies state-of-the-art technologies combined with operational security for optimum protection. 

Our solutions are built on the secure global infrastructure of AWS and protect the data end-to-end with encryption of data in transit and at rest in combination with confidential computing to protect data in use. Industry standards are used for encryption, multi-factor authentication, logging, network configuration, backup, data restoration and prevention of attacks.

In this article, we provide an insight into the architecture-related technologies and practices that drive Ledidi Core.

Secure Architecture: Key Facts

  • Encryption With Confidential Computing Technology

    We employ state-of-the-art encryption and confidential computing technology to process and store data in Ledidi Core. This means that your data is encrypted at rest and in transit, safeguarding it from unauthorised access.

  • Secure Network Configuration

    The components of the solutions are established and run on a separate logical network in AWS (Virtual Private Cloud), and all components are protected by configuration of AWS security groups constituting virtual firewalls. These are used on multiple levels, i.e. to restrict the number of components that need to be in the same network zones to only the ones that are required to be in that specific zone. AWS WAF is used to provide additional protection against web attacks for those resources that have to be exposed on public networks, like the APIs.

  • Data Storage Location

    All data is safely stored within the European Union. This not only complies with regional data protection regulations but also ensures that your data is stored in a secure and reliable environment.

  • How We Handle Backup and Restore

    We take data security seriously, and all data is backed up at regular intervals. Our solutions have built-in restore capabilities, including the possibility to rebuild in a separate cloud environment, ensuring data availability and recoverability.

We understand the critical nature of data security in healthcare. Our architecture reflects our unwavering commitment to safeguarding your data at every level. With encryption, multi-factor authentication, and meticulous network configurations, we strive to provide the highest standards of data protection in the industry.