Skip to main content

Lyve Cloud Documentation

Lyve Cloud Compliance

This Lyve Cloud Compliance Overview document provides a summary of the key certifications and compliance requirements that organizations should consider when selecting and implementing cloud services. From HIPAA to ISO 27001 to SOC 2, this guide covers the most widely recognized standards and best practices for cloud security and privacy. It explains why these certifications and requirements are critical to ensure the protection of sensitive information in the cloud.

HIPAA

Lyve Cloud has a HIPAA Compliant report.

Seagate built Lyve Cloud to be the industry leader for the Healthcare sector with core tenants around: Resilience, Compliance, Performance and Value. Lyve Cloud, according to Health and Human Services HHS.org, is a No View SaaS provider. Being HIPAA compliant, we always ensure complete protection of your data under our care. Lyve Cloud uses a standards-based approach which produces the highest level of compliance and security in the market.

For the cost of an archive, we are delivering a Hot Tier of object storage in a high availability HIPAA-compliant offering. Lyve Cloud is new and more modern than most traditional providers and, as such was built for security upfront with fewer vulnerabilities.

Lyve Cloud has a HIPAA Compliant report.

A HIPAA (Health Insurance Portability and Accountability Act) compliant cloud is expected to meet certain standards to ensure the protection of sensitive health information. The following are some of the key expectations of a HIPAA-compliant cloud: A HIPAA (Health Insurance Portability and Accountability Act) compliant cloud is expected to meet certain standards to ensure the protection of sensitive health information. The following are some of the key expectations of a HIPAA-compliant cloud:

  • Security: The cloud provider must have strong security measures in place to protect the confidentiality, integrity, and availability of electronically protected health information (ePHI). This includes encryption, access controls, and audit logs.

  • Privacy: The cloud provider must have strict privacy policies and procedures in place to ensure that ePHI is only accessed by authorized individuals. This includes limiting access to ePHI, conducting background checks on employees, and training employees on privacy and security.

  • Compliance: The cloud provider must comply with all HIPAA regulations, including the HIPAA Security Rule, the HIPAA Breach Notification Rule and associated policies, procedures, and documentation.

  • Business Associate Agreement: The cloud provider must sign a Business Associate Agreement (BAA) with its clients to ensure that they understand and agree to comply with HIPAA regulations.Business Associate Agreement: The cloud provider must sign a Business Associate Agreement (BAA) with its clients to ensure that they understand and agree to comply with HIPAA regulations.

  • Disaster Recovery and Business Continuity: The cloud provider must have a disaster recovery and business continuity plan in place to ensure that ePHI can be recovered in the event of a disaster or data loss.

  • Monitoring and Auditing: The cloud provider must regularly monitor and audit their systems and processes to ensure that they comply with HIPAA regulations and to identify and address any potential security or privacy breaches.

  • Technical Support: The cloud provider must provide technical support to their clients to ensure that they can effectively use the cloud and resolve any issues that may arise.Technical Support: The cloud provider must provide technical support to their clients to ensure that they can effectively use the cloud and resolve any issues that may arise.

It is important to note that the responsibility for ensuring HIPAA compliance does not rest solely with the cloud provider. The entity that uses the cloud, known as the covered entity, must also ensure that they comply with HIPAA regulations.

ISO 27001

ISO 27001 is an international standard for information security management that outlines a set of security controls and best practices for protecting sensitive information. A cloud service that holds an ISO 27001 certificate is expected to meet the following expectations:

  • Information Security Management System (ISMS): The cloud service must have an ISMS in place that is designed to manage and protect sensitive information. The ISMS should cover all aspects of information security, including but not limited to access control, incident management, risk management, and business continuity.

  • Security Controls: The cloud service must have a comprehensive set of security controls in place to protect sensitive information. These controls should include access controls, encryption, firewalls, and intrusion detection systems. Security Controls: The cloud service must have a comprehensive set of security controls in place to protect sensitive information. These controls should include access controls, encryption, firewalls, and intrusion detection systems.

  • Risk Management: The cloud service must have a robust risk management process in place to identify, assess, and mitigate potential risks to sensitive information. This includes conducting regular security assessments and risk analyses and implementing appropriate controls to mitigate identified risks.

  • Data Privacy: The cloud service must have strict data privacy policies and procedures in place to ensure that sensitive information is protected and only accessed by authorized individuals. Business Continuity and Disaster Recovery: The cloud service must have a business continuity and disaster recovery plan in place to ensure that sensitive information is protected in the event of a disaster or data loss.

  • Monitoring and Auditing: The cloud service must regularly monitor and audit its systems and processes to ensure that they are compliant with ISO 27001 and to identify and address any potential security or privacy breaches.

  • Technical Support: The cloud service must provide technical support to their clients to ensure that they can effectively use the cloud and resolve any issues that may arise.

  • Continual Improvement: The cloud service must have a continuous improvement process in place to ensure that its security controls and processes are updated and improved over time to stay ahead of emerging threats and risks.

A cloud service with an ISO 27001 certificate is expected to have a comprehensive and robust approach to information security management that covers all aspects of information security, including but not limited to risk management, data privacy, business continuity, and monitoring and auditing.

Type 2 SOC 2

Lyve Cloud has a Type 2 SOC 2 attestation report

A SOC 2 attestation is a third-party assessment of a cloud service provider's controls related to the security, availability, processing integrity, confidentiality, and privacy of the information processed by the service. Type 2 SOC 2 attestation specifically refers to an assessment of the cloud service provider's controls over a period of time, typically six months or more.

A cloud service provider that has received a Type 2 SOC 2 attestation is expected to meet the following expectations:

  • Information Security: The cloud service provider must have a comprehensive information security program in place to protect sensitive information and meet the requirements of the SOC 2 standard. This includes implementing security controls such as access controls, encryption, and firewalls and regularly monitoring and auditing their systems.

  • Availability: The cloud service provider must have a robust availability program in place to ensure that their services are available to their clients when needed. This includes implementing redundant systems and processes, monitoring the availability of their services, and having a disaster recovery plan in place. Availability: The cloud service provider must have a robust availability program in place to ensure that their services are available to their clients when needed. This includes implementing redundant systems and processes, monitoring the availability of their services, and having a disaster recovery plan in place.

  • Processing Integrity: The cloud service provider must have controls in place to ensure the integrity of the information processed by their services. This includes implementing controls such as data validation, error checking, and audit trails.

  • Confidentiality: The cloud service provider must have strict confidentiality policies and procedures in place to ensure that sensitive information is protected and only accessed by authorized individuals.

  • Privacy: The cloud service provider must have a comprehensive privacy program in place to meet the requirements of relevant privacy regulations and standards, such as GDPR or HIPAA.Privacy: The cloud service provider must have a comprehensive privacy program in place to meet the requirements of relevant privacy regulations and standards, such as GDPR or HIPAA.

  • Monitoring and Auditing: The cloud service provider must regularly monitor and audit their systems and processes to ensure that they comply with SOC 2 and to identify and address any potential security or privacy breaches.

  • Technical Support: The cloud service provider must provide technical support to their clients to ensure that they can effectively use their services and resolve any issues that may arise.

  • Continual Improvement: The cloud service provider must have a continuous improvement process in place to ensure that their security controls and processes are updated and improved over time to stay ahead of emerging threats and risks.

A cloud service provider with a Type 2 SOC 2 attestation is expected to have a comprehensive and robust approach to information security, privacy, and availability and to have controls in place to ensure the integrity and confidentiality of the information processed by their services.

Summary

Having key certifications and meeting compliance requirements is important for Lyve Cloud to build customer trust and confidence. Certifications demonstrate compliance with legal and regulatory requirements, improve security, help manage risks, and can provide a competitive advantage.

Lyve Cloud has key international certifications and attestations and is constantly expanding this list based on customer feedback