Rōvn is verified direct healthcare hiring infrastructure. We treat nurse credential data, packet contents, and hospital workflow data as sensitive by default. This page describes the controls in place today and the controls we are formalizing as we expand into production PHI workloads.
Rōvn operates on a HIPAA-eligible AWS account in us-east-2. AWS has accepted Rōvn's Business Associate Addendum. Workloads are deployed inside a private VPC with private subnets, controlled security groups, and no direct public exposure of data plane resources.
RDS PostgreSQL (rovn-prod-phi-postgres) is encrypted with a customer-managed KMS key under alias alias/rovn-phi. Evidence vault S3 bucket is encrypted and blocks public access. EBS encryption-by-default is enabled at the account level.
All public surfaces use TLS. Internal service-to-service traffic stays inside the VPC and is restricted by security group.
CloudTrail is enabled account-wide with a hardened trail bucket. Application packet-release events are written as signed audit records (Ed25519). Hash-chained evidence events are retained in the evidence vault.
GuardDuty and AWS Security Hub are enabled. KMS key rotation is enabled. Account budget alerts are configured.
AWS Backup vault retains automated backups of the PHI database. A point-in-time restore drill has been performed; evidence is stored in s3://rovn-phi-evidence-vault-559849758760-us-east-2/restore-drill/evidence/.
AWS Identity Center is the entry point for human access. Founders have admin group access. Production workload secrets migrate to AWS Secrets Manager / SSM Parameter Store as they move from build to live.
399700000147857.Rōvn has a HIPAA-eligible AWS foundation. Rōvn is not yet a fully attested HIPAA-compliant operating company. We are actively executing the formal program below before connecting any production traffic to PHI:
Send a description and reproduction steps to security@rovn.to. Please do not include real PHI in the report.
Last updated 2026-04-25.