Our security isn't just a claim — it's independently verified by multiple third-party security assessments and backed by 50+ documented security controls. Your patient data is protected by enterprise-grade, audited security infrastructure.
Don't take our word for it. Our security is continuously verified by independent, third-party security scanners. Click any badge to verify our results in real time.
TLS/SSL encryption rated by Qualys — the industry gold standard
Comprehensive website security, GDPR & PCI DSS compliance scan
HTTP security headers analysis by Snyk — all critical headers present
Mozilla Foundation HTTP security assessment — 80/100 score
ImmuniWeb dark web exposure scan — zero compromised credentials found
ImmuniWeb email security test — SPF configured, server hardened, not blacklisted
Patient data is hosted exclusively on Google Cloud in Australia (Sydney region). Google Cloud maintains:
Your patient data is protected by four independent security layers. Each layer must be breached for unauthorized access - failure at any layer blocks the entire attack.
For an attacker to access your data, they must simultaneously defeat:
Probability of successful breach: Virtually zero
No one can directly connect to your database - including our development team. All access flows through authenticated, logged pathways.
Each step requires authentication and is logged.
Breaking any link in this chain blocks all access completely.
Every password passes through a four-stage security pipeline before acceptance. Your credentials are protected by the same techniques used by leading security organisations.
Real-time password strength scoring using advanced pattern analysis — detects dictionary words, common substitutions, keyboard patterns, and sequences
Every password is checked against billions of known compromised credentials. Uses k-anonymity — your full password is never transmitted externally
Common passwords, sequential patterns (123456), and keyboard walks (qwerty, asdfgh) are automatically blocked before they can be set
Your last five passwords are securely hashed and stored. Previously used passwords cannot be recycled, enforcing genuine credential rotation
Passwords are hashed with Argon2 — winner of the Password Hashing Competition — designed to be resistant to GPU and ASIC brute-force attacks.
🇦🇺 Guaranteed: Your patient data never leaves Australian soil and remains under Australian privacy law protection.
⏰ Privacy by Design: Patient data automatically expires, ensuring minimal data retention and maximum privacy protection.
Purpose-built for Australian healthcare regulation. Every interaction is tracked, every access is logged, and sensitive data is automatically protected.
Every interaction with patient data is logged — who accessed what, when, and what changed. Audit logs cannot be modified or deleted by any user, creating a tamper-proof compliance record.
Audit logs are retained for 7 years to meet Australian healthcare record-keeping requirements. Security and warning events are retained indefinitely for forensic analysis.
Sensitive fields like Medicare numbers and credentials are automatically redacted from audit logs. The audit trail tracks access patterns without storing the sensitive values themselves.
Patient consent is recorded and tracked before any data can be collected. The consent record captures who gave consent, when, and what type — with renewal tracking built in.
Every data query is automatically scoped to your organisation. Dual-layer isolation — application-level filtering plus database-enforced Row-Level Security — makes cross-organisation access impossible.
When user accounts are deleted, audit records are anonymised and preserved. This satisfies both the right to deletion and healthcare compliance requirements simultaneously.
Built for Australian Healthcare Law. Designed to comply with the Privacy Act 1988, My Health Records Act 2012, and Australian Digital Health Agency guidelines. All patient data processing occurs exclusively within Australian borders.
Self-assessed against the Australian Signals Directorate Essential Eight framework — the Australian Government's baseline cyber security mitigation strategies.
TOTP-based MFA with encrypted secrets, backup codes, and lockout protection
Separate admin authentication, role-based access control, and Row-Level Security on all tables
GitHub Dependabot continuously monitors and alerts on dependency vulnerabilities
CSP, HSTS preload, X-Frame-Options, reCAPTCHA, input validation, and CSRF protection
Automated daily backups via Google Cloud SQL and Supabase managed infrastructure
Google Cloud Run manages OS patching — immutable container runtime with no manual OS management
Containerised deployment on Cloud Run with Pydantic input validation and DOMPurify sanitisation
Not applicable — Markoste is a web application with no Microsoft Office suite deployment
Markoste has self-assessed against the Australian Signals Directorate Essential Eight framework at Maturity Level 2 for Multi-Factor Authentication, Administrative Privilege Restriction, Application Hardening, and Patch Management. Infrastructure-level controls (backups, OS patching) are managed by Google Cloud, which holds IRAP Protected assessment. Self-assessment conducted February 2026.
Beyond verification badges — here is a detailed view of the security controls protecting your data every second of every day.
We maintain a public security.txt file and welcome responsible disclosure of vulnerabilities.
View our security.txtTrusted by pharmacists who demand the highest security for their patient data. Independently verified by SSL Labs, ImmuniWeb, and Mozilla.