Executive Summary

ArcaScience operates at the intersection of artificial intelligence and pharmaceutical regulation, where the security and integrity of data are not merely business requirements but fundamental obligations to patient safety and regulatory compliance. Our platform processes highly sensitive clinical trial data, pharmacovigilance signals, and proprietary benefit-risk models for pharmaceutical companies, contract research organizations, and regulatory agencies worldwide.

This document provides a comprehensive technical overview of the security architecture underpinning the ArcaScience Benefit-Risk Analysis (BRA) platform. It addresses the multi-layered defense strategy, encryption standards, identity management, audit capabilities, infrastructure hardening, vulnerability management processes, incident response procedures, and business continuity planning that collectively ensure the confidentiality, integrity, and availability of our customers' data.

ArcaScience maintains SOC 2 Type II certification, aligns with ISO 27001 controls, complies with FDA 21 CFR Part 11 requirements for electronic records and signatures, and satisfies GDPR, HIPAA, and HDS (Hébergeur de Données de Santé) requirements for health data hosting in France and the European Union.

Table of Contents

  1. Introduction and Security Philosophy
  2. Platform Security Architecture
  3. Encryption Standards
  4. Identity and Access Management
  5. Audit Trail and Data Integrity
  6. Infrastructure Security
  7. Vulnerability Management
  8. Incident Response
  9. Business Continuity and Disaster Recovery
  10. Compliance Framework Mapping
  11. Appendices: Technical Specifications

1. Introduction and Security Philosophy

The pharmaceutical industry demands the highest standards of data security and regulatory compliance. Clinical trial data, adverse event reports, proprietary analytical models, and regulatory submission content represent some of the most sensitive information in any industry. A breach or loss of integrity in this data can have consequences ranging from competitive damage to direct harm to patient safety.

ArcaScience's security philosophy is built on four foundational principles:

These principles inform every architectural decision, operational process, and organizational practice described in this document. Our security program is overseen by a dedicated Chief Information Security Officer (CISO) who reports directly to the CEO, ensuring that security considerations receive appropriate executive attention and resource allocation.

1.1 Security Governance

ArcaScience maintains a formal Information Security Management System (ISMS) governed by a cross-functional Security Steering Committee that meets monthly. The committee includes representatives from Engineering, Product, Legal, Compliance, and executive leadership. Key responsibilities include:

1.2 Shared Responsibility Model

ArcaScience operates under a shared responsibility model that clearly delineates security obligations between ArcaScience as the platform provider and our customers as the data controllers. ArcaScience is responsible for securing the platform infrastructure, application code, data storage systems, and operational processes. Customers retain responsibility for managing their user accounts, configuring access policies within their tenant, classifying their data, and ensuring their use of the platform complies with applicable regulations.

This shared responsibility model is documented in our Master Service Agreement and reinforced through our customer onboarding process, which includes a dedicated security configuration review session.

2. Platform Security Architecture

The ArcaScience platform employs a multi-layered security architecture that protects data and operations at the network, application, and data layers. Each layer implements independent security controls that collectively provide comprehensive protection against a wide range of threat vectors.

2.1 Network Layer Security

Network Layer

The network architecture is designed around micro-segmented virtual private clouds (VPCs) with strict ingress and egress controls. All customer-facing traffic enters through a globally distributed content delivery network (CDN) and web application firewall (WAF) before reaching the application layer.

Key network security controls include:

2.2 Application Layer Security

Application Layer

The application layer implements defense-in-depth through input validation, output encoding, secure session management, API authentication, and real-time behavioral anomaly detection across all platform services.

The application layer is built on a containerized microservices architecture deployed on Kubernetes (Amazon EKS), with security controls embedded throughout:

2.3 Data Layer Security

Data Layer

The data layer implements tenant isolation, encryption at rest and in transit, fine-grained access controls, and continuous integrity verification to protect the most sensitive assets in the system: customer data and analytical models.

Data security controls span storage, processing, and transmission:

3. Encryption Standards

Encryption is the cornerstone of data protection in the ArcaScience platform. We employ industry-leading encryption standards for data at rest, data in transit, and cryptographic key management, meeting or exceeding the requirements of all applicable regulatory frameworks.

3.1 Encryption at Rest

All data stored within the ArcaScience platform is encrypted at rest using AES-256-GCM (Advanced Encryption Standard with 256-bit keys in Galois/Counter Mode). AES-256 is approved by the U.S. National Institute of Standards and Technology (NIST) and is the standard required for protecting classified information at the Top Secret level.

Storage System Encryption Algorithm Key Length Key Management
Primary database (PostgreSQL) AES-256-GCM 256-bit AWS KMS (CMK per tenant)
Document storage (S3) AES-256-GCM 256-bit AWS KMS (SSE-KMS)
Search index (Elasticsearch) AES-256-GCM 256-bit AWS KMS
Cache layer (Redis) AES-256-GCM 256-bit AWS KMS
Backup storage AES-256-GCM 256-bit AWS KMS (separate key)
Log storage AES-256-GCM 256-bit AWS KMS

For customers requiring additional control over their encryption keys, ArcaScience supports Bring Your Own Key (BYOK) configurations where customers provide their own AWS KMS Customer Master Keys. In BYOK mode, ArcaScience cannot access customer data without the customer's key being available, providing an additional layer of customer control.

3.2 Encryption in Transit

All data transmitted to and from the ArcaScience platform is protected using TLS 1.3, the most current version of the Transport Layer Security protocol. TLS 1.2 is supported for backward compatibility with legacy clients but is scheduled for deprecation in Q4 2026. TLS 1.0 and 1.1 are not supported.

Our TLS configuration enforces the following cipher suites (in order of preference):

Perfect Forward Secrecy (PFS) is enforced for all connections, ensuring that the compromise of long-term keys does not compromise past session keys. Certificate pinning is implemented in our mobile and desktop applications to prevent man-in-the-middle attacks via compromised certificate authorities.

3.3 Key Management

Cryptographic key management follows NIST SP 800-57 recommendations for key lifecycle management:

3.4 Application-Level Encryption

Beyond infrastructure-level encryption, certain high-sensitivity data fields receive additional application-level encryption before storage. This includes:

Application-level encryption uses per-tenant keys derived from the customer's master key, ensuring that even database administrators with direct access to storage systems cannot read sensitive field values.

4. Identity and Access Management

Identity and Access Management (IAM) is the primary mechanism through which ArcaScience controls who can access the platform, what actions they can perform, and what data they can view. Our IAM implementation is designed to meet the stringent requirements of FDA 21 CFR Part 11, which mandates that electronic records and electronic signatures are trustworthy, reliable, and equivalent to paper records and handwritten signatures.

4.1 Role-Based Access Control (RBAC)

ArcaScience implements a hierarchical RBAC model with five standard roles, each with progressively increasing permissions. Customers can also define custom roles with granular permission assignments.

Role Description Key Permissions
Viewer Read-only access to assigned projects View dashboards, reports, and BRA outputs
Analyst Can create and modify analyses within assigned projects Viewer + create/edit BRA models, import data, run simulations
Reviewer Can review and approve analyses (segregation of duties) Analyst + approve/reject analyses, sign-off on reports
Project Admin Manages project-level settings and team membership Reviewer + manage project users, configure workflows
Tenant Admin Full administrative control over the customer's tenant All permissions + SSO configuration, user management, audit log access

The RBAC system enforces segregation of duties for regulated workflows. For example, the user who creates a benefit-risk analysis cannot be the same user who approves it for regulatory submission. This segregation is enforced at the system level and cannot be overridden, even by Tenant Administrators.

4.2 Multi-Factor Authentication (MFA)

Multi-factor authentication is mandatory for all user accounts. ArcaScience supports the following MFA methods:

MFA enrollment is required during the user's first login. Recovery codes are generated during enrollment and must be stored securely by the user. Account recovery without MFA requires identity verification by the Tenant Administrator and generates an audit log entry.

4.3 Single Sign-On (SSO) and SAML Integration

Enterprise customers can integrate ArcaScience with their existing identity providers using SAML 2.0 or OpenID Connect (OIDC). Supported identity providers include:

When SSO is enabled, ArcaScience acts as a Service Provider (SP), delegating authentication entirely to the customer's Identity Provider (IdP). User provisioning and deprovisioning can be automated via SCIM 2.0, ensuring that employee lifecycle changes in the customer's HR system are reflected in ArcaScience access within minutes.

SSO sessions honor the IdP's session policies. When a user's session expires or is revoked at the IdP, their ArcaScience session is terminated within 60 seconds through backchannel logout notifications.

4.4 Session Management

User sessions are managed with security-hardened parameters designed to minimize the risk of session hijacking or unauthorized access:

5. Audit Trail and Data Integrity

In regulated pharmaceutical environments, the ability to demonstrate that data has not been altered, deleted, or fabricated is not optional—it is a legal requirement. ArcaScience's audit trail system is designed to satisfy FDA 21 CFR Part 11, EU Annex 11, and ICH E6(R2) Good Clinical Practice requirements for data integrity.

5.1 ALCOA+ Compliance

All audit records within the ArcaScience platform conform to the ALCOA+ principles, the gold standard for data integrity in pharmaceutical and clinical environments:

Principle Definition ArcaScience Implementation
Attributable Data is attributed to the person who generated it Every action is linked to authenticated user identity with timestamp
Legible Data is readable and permanent Structured JSON format with human-readable descriptions; immutable storage
Contemporaneous Data is recorded at the time of activity Events recorded synchronously with sub-millisecond timestamps (NTP-synchronized)
Original First recording of data is preserved Original values preserved in change records; no overwrite capability
Accurate Data is correct and truthful Server-side timestamp generation; validated data types; checksum verification
Complete All data is present No audit records can be deleted; gap detection alerts on missing sequence numbers
Consistent Data follows logical sequence Monotonic sequence numbers; cross-reference validation between related events
Enduring Data is available throughout retention period Minimum 15-year retention; geo-redundant storage; format migration guarantees
Available Data is accessible when needed Real-time query API; export in CSV, JSON, and PDF formats; sub-second search

5.2 Immutable Audit Logs

Audit logs in the ArcaScience platform are stored in an append-only data store that prevents modification or deletion of existing records, even by system administrators. The immutability of audit logs is guaranteed through multiple mechanisms:

5.3 Audit Scope

The following categories of events are captured in the audit trail:

5.4 Electronic Signatures

ArcaScience's electronic signature implementation satisfies FDA 21 CFR Part 11 requirements:

6. Infrastructure Security

ArcaScience's infrastructure is hosted on Amazon Web Services (AWS), leveraging AWS's extensive physical security, network security, and compliance certifications. Our infrastructure architecture is designed for security, availability, and performance across multiple geographic regions.

6.1 Cloud Infrastructure (SOC 2 Certified)

ArcaScience's production infrastructure runs exclusively on AWS, which maintains SOC 1, SOC 2, and SOC 3 certifications, ISO 27001, ISO 27017, ISO 27018, and ISO 27701 certifications, and numerous industry-specific compliance attestations including HIPAA, FedRAMP, and PCI DSS.

Our infrastructure is deployed across multiple Availability Zones (AZs) within each supported region, providing resilience against individual data center failures. Key infrastructure components include:

6.2 DDoS Protection

Distributed Denial of Service (DDoS) protection is implemented at multiple layers:

6.3 Server Hardening

All server instances follow a rigorous hardening standard based on the CIS Benchmarks:

Infrastructure as Code

All infrastructure is defined and managed through Infrastructure as Code (IaC) using Terraform, with state stored in encrypted S3 buckets. Infrastructure changes follow the same code review, testing, and approval processes as application code changes. Drift detection runs hourly to identify any configuration changes made outside the IaC pipeline.

7. Vulnerability Management

ArcaScience maintains a comprehensive vulnerability management program that identifies, prioritizes, and remediates security vulnerabilities across all layers of the technology stack. The program combines automated scanning, manual penetration testing, and community-driven discovery through our responsible disclosure program.

7.1 Penetration Testing

Independent penetration testing is conducted by qualified third-party firms on the following schedule:

Penetration test findings are classified using the CVSS v3.1 scoring system, and remediation timelines are based on severity:

Severity (CVSS) Remediation SLA Escalation
Critical (9.0-10.0) 24 hours Immediate CISO and CEO notification
High (7.0-8.9) 72 hours CISO notification within 4 hours
Medium (4.0-6.9) 30 days Included in next sprint planning
Low (0.1-3.9) 90 days Tracked in vulnerability backlog

7.2 Bug Bounty Program

ArcaScience operates a private bug bounty program through HackerOne, providing a structured channel for independent security researchers to report vulnerabilities. The program offers rewards ranging from $500 for low-severity findings to $15,000 for critical vulnerabilities, with bonus payments for exceptional reports that include proof-of-concept exploits and remediation recommendations.

To date, the bug bounty program has received over 340 submissions, with 47 valid vulnerabilities identified and remediated. The mean time to first response is under 4 hours, and the mean time to remediation for accepted findings is 6.2 days.

7.3 Static and Dynamic Application Security Testing

Automated security testing is integrated throughout the software development lifecycle:

7.4 Patch Management

Operating system and infrastructure patches are applied according to the following schedule:

8. Incident Response

Despite comprehensive preventive controls, ArcaScience recognizes that no system is immune to security incidents. Our incident response program ensures rapid detection, containment, eradication, and recovery from security events, with clear communication protocols to keep stakeholders informed.

8.1 Detection

ArcaScience employs multiple detection mechanisms operating continuously:

8.2 Containment

Upon detection of a confirmed security incident, the incident response team executes containment procedures appropriate to the incident type:

8.3 Recovery

Recovery procedures are designed to restore normal operations while preserving forensic evidence:

8.4 Notification SLAs

ArcaScience commits to the following notification timelines for confirmed security incidents affecting customer data:

Incident Severity Customer Notification SLA Regulatory Notification Update Frequency
Critical (confirmed data breach) Within 24 hours Within 72 hours (GDPR) Every 4 hours until resolved
High (potential data exposure) Within 48 hours As required by assessment Every 8 hours until resolved
Medium (security event, no data impact) Within 72 hours Not typically required Daily until resolved
Low (minor policy violation) Monthly security report Not required Monthly summary
Post-Incident Review

Every security incident, regardless of severity, is followed by a blameless post-incident review within 5 business days. The review produces a written report documenting the incident timeline, root cause analysis, impact assessment, remediation actions taken, and preventive measures to avoid recurrence. Lessons learned are incorporated into the security program and shared with relevant teams.

9. Business Continuity and Disaster Recovery

ArcaScience's Business Continuity and Disaster Recovery (BCDR) program ensures that critical platform services can be maintained or rapidly restored in the event of infrastructure failures, natural disasters, or other disruptive events. The program is designed to meet the stringent availability requirements of pharmaceutical organizations that depend on continuous access to benefit-risk data and analyses.

9.1 Recovery Objectives

4h
Recovery Time
Objective (RTO)
1h
Recovery Point
Objective (RPO)
99.95%
Availability
SLA Target

9.2 Geographic Redundancy

ArcaScience maintains active-passive disaster recovery configurations for each supported data residency region:

Primary Region DR Region Replication Mode Failover Type
EU-West (Ireland) EU-Central (Frankfurt) Async (<30s lag) Automated with manual approval
US-East (Virginia) US-West (Oregon) Async (<30s lag) Automated with manual approval
AP-Southeast (Singapore) AP-Northeast (Tokyo) Async (<60s lag) Manual (regulatory constraint)

Within each primary region, the platform is deployed across three Availability Zones, providing automatic failover for individual data center failures without service interruption. Cross-region failover is triggered when a regional outage persists beyond 30 minutes or when monitoring detects unrecoverable data corruption.

9.3 Backup Strategy

ArcaScience implements a comprehensive backup strategy with multiple tiers:

9.4 DR Testing

Disaster recovery capabilities are validated through regular testing:

10. Compliance Framework Mapping

ArcaScience's security program is designed to satisfy the requirements of multiple regulatory frameworks applicable to pharmaceutical companies operating globally. The following table maps our key security controls to the most relevant compliance frameworks.

10.1 FDA 21 CFR Part 11

FDA 21 CFR Part 11 establishes requirements for electronic records and electronic signatures in FDA-regulated industries. ArcaScience's compliance with Part 11 is critical for customers who use the platform to generate and manage records that may be submitted to the FDA.

Part 11 Requirement ArcaScience Control
System validation (11.10(a)) IQ/OQ/PQ documentation; automated regression testing; change control procedures
Record generation and retention (11.10(b)) Immutable audit trail; 15-year retention; human-readable export
Record protection (11.10(c)) AES-256 encryption; RBAC; backup and recovery procedures
Limited system access (11.10(d)) RBAC with least privilege; MFA; session management controls
Audit trail (11.10(e)) ALCOA+ compliant audit trail; hash-chained immutable logs
Operational system checks (11.10(f)) Input validation; data type enforcement; sequence verification
Authority checks (11.10(g)) Permission verification before every operation; segregation of duties
Device checks (11.10(h)) Session binding; device fingerprinting; anomaly detection
Personnel training (11.10(i)) Role-specific onboarding; annual security training; compliance attestation
Electronic signatures (11.50-11.300) Unique user ID; re-authentication at signing; signature-record binding

10.2 GDPR

The General Data Protection Regulation (GDPR) applies to the processing of personal data of EU/EEA residents. ArcaScience serves as a Data Processor on behalf of our customers (Data Controllers) and implements the following GDPR-relevant controls:

10.3 ISO 27001

ArcaScience's Information Security Management System (ISMS) is aligned with ISO/IEC 27001:2022 controls. While ArcaScience is pursuing formal ISO 27001 certification (expected Q3 2026), our current control implementation covers all 93 controls in Annex A, organized across the four themes: Organizational, People, Physical, and Technological.

10.4 HIPAA

For U.S. customers who process Protected Health Information (PHI) on the ArcaScience platform, we execute Business Associate Agreements (BAAs) and implement the HIPAA Security Rule's administrative, physical, and technical safeguards:

10.5 HDS (Hébergeur de Données de Santé)

ArcaScience's EU infrastructure deployment satisfies the requirements of the French HDS certification for hosting health data. Our HDS compliance is inherited from our hosting on AWS's HDS-certified Paris (eu-west-3) region, supplemented by ArcaScience's application-level security controls and data governance procedures.

10.6 Cross-Framework Control Mapping

Control Domain 21 CFR Part 11 GDPR ISO 27001 HIPAA
Access Control 11.10(d),(g) Art. 25, 32 A.8.2-A.8.5 164.312(a)
Audit Trail 11.10(e) Art. 30 A.8.15 164.312(b)
Encryption 11.10(c) Art. 32 A.8.24 164.312(a)(2)(iv)
Incident Response Art. 33, 34 A.5.24-A.5.28 164.308(a)(6)
Backup/Recovery 11.10(c) Art. 32 A.8.13-A.8.14 164.308(a)(7)
Risk Assessment 11.10(a) Art. 35 A.5.1 164.308(a)(1)

11. Appendices: Technical Specifications

Appendix A: Cryptographic Standards Summary

Use Case Algorithm Key Length Standard
Data at rest AES-256-GCM 256-bit NIST SP 800-38D
Data in transit TLS 1.3 256-bit (AES) / 253-bit (X25519) RFC 8446
Key exchange X25519 / ECDHE P-256 253-bit / 256-bit RFC 7748 / NIST SP 800-56A
Digital signatures Ed25519 / ECDSA P-256 256-bit RFC 8032 / FIPS 186-4
Password hashing bcrypt Cost factor 12 OWASP recommendation
Audit log integrity SHA-256 256-bit FIPS 180-4
Random number generation CSPRNG (DRBG) 256-bit seed NIST SP 800-90A

Appendix B: Network Architecture Summary

Component Technology Security Controls
Edge / CDN AWS CloudFront TLS 1.3, WAF, DDoS protection, geo-restriction
Load Balancer AWS ALB TLS termination, health checks, request routing
Application Tier Amazon EKS (Kubernetes) Pod security, mTLS (Istio), network policies
Database Tier Amazon RDS PostgreSQL AES-256, Multi-AZ, private subnet, IAM auth
Object Storage Amazon S3 SSE-KMS, Object Lock, versioning, access logging
Secrets AWS Secrets Manager Auto-rotation, IAM policies, audit logging
DNS Amazon Route 53 DNSSEC, private hosted zones, health checks

Appendix C: Security Monitoring and Alerting

Monitoring Category Tools Alert Threshold Response SLA
Failed authentication SIEM, application logs 5 failures in 10 minutes Auto-lockout + review within 1 hour
Privilege escalation SIEM, UBA Any unauthorized attempt Immediate investigation
Data exfiltration DLP, network monitoring Anomalous data volume or pattern 15-minute investigation SLA
Infrastructure anomaly CloudTrail, GuardDuty ML-based anomaly detection 30-minute investigation SLA
Certificate expiry Certificate monitoring 30 days before expiry Renewal within 7 days
Vulnerability detection Trivy, Snyk, OWASP ZAP Critical/High severity Per remediation SLA table

Appendix D: Compliance Certifications and Attestations

Certification / Attestation Status Scope Validity
SOC 2 Type II Active Security, Availability, Confidentiality Jan 2025 — Dec 2025 (renewal in progress)
ISO 27001:2022 In Progress Full ISMS Expected Q3 2026
HIPAA BAA Available PHI processing on platform Per customer agreement
FDA 21 CFR Part 11 Compliant Electronic records and signatures Continuous (self-assessed + audited)
GDPR DPA Available Personal data processing Per customer agreement
HDS Compliant Health data hosting (France/EU) Via AWS HDS-certified infrastructure

Appendix E: Contact Information

Security Team Contacts

General security inquiries: security@arcascience.ai

Vulnerability reports: security-reports@arcascience.ai or via HackerOne

Data Protection Officer: dpo@arcascience.ai

Incident reporting (24/7): +33 1 XX XX XX XX | incidents@arcascience.ai

Compliance documentation requests: compliance@arcascience.ai

NDA and security questionnaire responses: trust@arcascience.ai

Request a Security Briefing

Our security team is available to conduct detailed walkthroughs of our security architecture tailored to your organization's requirements.

Schedule a Briefing  |  security@arcascience.ai