Skip to main content
InterScripts

Built-in Security you Can Trust.

Our security posture is built on proven frameworks, continuous monitoring, and a culture of accountability, so you can focus on outcomes, not risk.

Security Posture · LiveHealthy

Security Score

98/100

↑ All controls passing

Active Frameworks

HITRUST r2
Certified
SOC 2 Type II
Renewed
ISO 27001
Active
HIPAA
Aligned

Live Signals

Endpoints monitored24×7
Active P1 incidents0
Encryption at restAES-256
Mean time to patch<24h
Last audit · Q1 2026NIST 800-53 · CMMC

Zero Trust

Enforced

HITRUST r2

Certified

SOC 2

Type II

ISO 27001

Certified

CMMI 3

Appraised

Protecting Data. building Trust.

InterScripts Security and Privacy teams establish policies and controls, monitor compliance with those controls, and prove our security and compliance to third-party auditors. Our approach is grounded in four core principles:

1

Least Privilege Access

Access is limited to only those with a legitimate business need and granted based on the principle of least privilege.

2

Defense-in-Depth

Security controls are implemented and layered according to the principle of defense-in-depth, ensuring multiple barriers protect sensitive data.

3

Consistent Application

Security controls are applied consistently across all areas of the enterprise, no exceptions, no blind spots.

4

Continuous Improvement

The implementation of controls is iterative, continuously maturing across the dimensions of improved effectiveness, increased audibility, and decreased friction.

Security and Privacy

Always

Audit Ready

24/7 compliance monitoring

Data Protection for Our Solutions.

Encryption, secure transit, and secrets management are standard, not optional, across every InterScripts solution.

Data At Rest

All stored data is encrypted using AES-256 encryption standards, ensuring data is protected at rest across all systems and storage environments.

Data In Transit

All data in transit is encrypted using TLS 1.2+, ensuring secure transmission between systems and users at all times.

Secret Management

Sensitive credentials and secrets are managed using enterprise-grade secret management platforms with strict access controls and audit trails.

Product Security

Readiness

Zero-day Ready

Product Security & Stability.

We go beyond reactive patching. Through proactive testing and continuous scanning, we maintain a hardened product surface that customers can rely on.

Penetration Testing

Regular third-party penetration testing is conducted to identify and remediate vulnerabilities before they can be exploited, keeping your data one step ahead of threats.

Vulnerability Scanning

Continuous automated scanning identifies security vulnerabilities across our product and infrastructure footprint, with rapid remediation cycles.

Enterprise-Wide Security.

Security is everyone's responsibility. These organization-wide programs ensure every team member and every system upholds our standards.

Endpoint Protection

All endpoints are protected with enterprise-grade security software including EDR, AV, and device management.

Security Education

All employees receive regular security awareness training to recognize and respond to evolving threats.

Identity & Access Management

Role-based access controls and multi-factor authentication are enforced across all systems.

Data Privacy

Comprehensive data privacy policies govern the collection, processing, and retention of all personal and sensitive data.

Mobile Data Privacy

Mobile device management policies ensure secure handling of data on mobile endpoints across the organization.

Messages Opt-In Consent

All marketing communications require explicit opt-in consent in compliance with applicable regulations.

Data Share Policy

Strict data sharing policies govern how data is shared with third parties, ensuring compliance with contractual and regulatory requirements.

Our Certifications & Accreditations

InterScripts maintains the highest certification levels to ensure safety, security, and compliance for every client.

GSA Schedule 70
ISO 9001:2015
CMMI Level 3
ISO 27001:2013
SOC 2 Type II
ISO 27001
HITRUST r2
Security Documentation

Security is our Commitment.

We're happy to share audit reports, compliance certifications, and security documentation with qualified prospects and clients.