Security is at the core of Ally,
protecting sensitive clinical data and maintaining
the trust of providers and their clients.

Security is at the core of Ally, protecting sensitive clinical data and maintaining the trust of providers and their clients.

Security is at the core of Ally,
protecting sensitive clinical data
and maintaining the trust of
providers and their clients.

Security Centre

Security is not a feature at Ally. It is foundational to how the platform is designed, built, and operated.

We understand that occupational health providers manage highly sensitive clinical and employment data. Every layer of the Ally platform is engineered to protect confidentiality, integrity, and availability, while supporting regulatory compliance and clinical governance requirements.

Our Security Approach

Ally’s security programme is structured in alignment with the SOC 2 Trust Services Criteria, the ISO/IEC 27001 control framework, and the requirements of UK GDPR and the Data Protection Act 2018.

Formal certification audits are planned as part of our growth roadmap. In the meantime, our controls are being implemented in accordance with these recognised standards to ensure the platform is built to meet enterprise security expectations from day one.

Infrastructure and Hosting

Ally is hosted on Amazon Web Services and is architected in alignment with the AWS Well Architected Framework. Our infrastructure is designed around the core principles of operational excellence, security, reliability, performance efficiency, and cost optimisation. By leveraging managed AWS services, we reduce infrastructure risk while ensuring high availability, resilience, and scalable performance to support growing occupational health providers.

Our hosting environment is built to maintain consistent uptime, support secure multi tenant deployments, and provide the stability required for handling sensitive clinical data at scale.

Encryption at Rest
and In Transit


All data within Ally is encrypted at rest using AES 256 encryption standards. Data transmitted between users and the platform is protected using TLS 1.2 or higher to ensure secure communication across networks.

Encryption extends to backups and stored datasets, and secure key management practices are implemented to maintain strict control over cryptographic materials. This ensures that sensitive clinical and employee data remains protected both within the platform and during transmission at all times.

Secure Authentication

Ally uses OAuth 2.0 standards-based authentication with secure, token-based session management to protect user access. Strong password policies are enforced to reduce credential risk, and configurable session timeouts help minimise exposure from inactive sessions.

Where required, enterprise authentication and single sign-on can be supported to integrate securely with organisational identity providers. Access is designed to ensure only verified users can interact with sensitive clinical and employee data.

Role-Based Access Control (RBAC)

Access within Ally is governed by granular, least-privilege permissions to ensure users only access the data and functionality necessary for their role. Role-based restrictions are enforced at both organisation and user level. Clear segregation is maintained between provider, client, and administrative roles, supporting secure multi-tenant deployments and protecting sensitive information. Permissions are structured to reduce risk, limit unnecessary access, and maintain strict control over clinical and operational data.

Secure Authentication

Ally uses OAuth 2.0 standards-based authentication with secure, token-based session management to protect user access. Strong password policies are enforced to reduce credential risk, and configurable session timeouts help minimise exposure from inactive sessions.

Where required, enterprise authentication and single sign-on can be supported to integrate securely with organisational identity providers. Access is designed to ensure only verified users can interact with sensitive clinical and employee data.

Role-Based Access Control (RBAC)

Access within Ally is governed by granular, least-privilege permissions to ensure users only access the data and functionality necessary for their role. Role-based restrictions are enforced at both organisation and user level. Clear segregation is maintained between provider, client, and administrative roles, supporting secure multi-tenant deployments and protecting sensitive information. Permissions are structured to reduce risk, limit unnecessary access, and maintain strict control over clinical and operational data.

Application Security

Security is embedded throughout our development lifecycle. We follow secure engineering practices that include structured code reviews, disciplined dependency management, continuous vulnerability scanning, and regular security updates. Production deployments are tightly access-controlled to reduce risk and maintain platform integrity.

We continuously monitor for emerging vulnerabilities and proactively remediate risks in line with recognised industry best practice, ensuring the platform remains resilient as it evolves.

Monitoring and Incident Response

Ally implements logging and monitoring across infrastructure and application layers.

Security events are monitored to detect anomalous behaviour, unauthorised access attempts, and system misuse. Logs are retained and reviewed to support forensic analysis where required.

We maintain an incident response process designed to identify, contain, and remediate security events promptly.

Data Residency and Compliance

All primary infrastructure is hosted within the United Kingdom, ensuring data residency remains aligned with UK regulatory expectations. We support compliance with UK GDPR through the implementation of data minimisation principles, robust access control policies, strong encryption standards, and secure data handling procedures embedded across the platform.

Where required, formal Data Processing Agreements can be provided to customers to clearly define responsibilities and ensure regulatory transparency.

Business Continuity and Backup

Ally is designed with resilience at its core to ensure continuity of service. We implement automated backups and infrastructure redundancy to minimise the risk of disruption, and all backup data is encrypted and stored securely to maintain data integrity and confidentiality.

Comprehensive disaster recovery procedures are in place to support timely restoration of services in the event of a major incident, helping ensure operational stability for occupational health providers and their clients.

Security Roadmap

Our security programme is structured in alignment with SOC 2 and ISO 27001 frameworks. Formal certification audits will be initiated in line with onboarding and growth milestones.

We are committed to continuous improvement and maturing our control environment as we scale.

Security Questions?

We understand that occupational health providers handle highly sensitive clinical information.

If you require additional documentation, technical clarification, or wish to discuss our security posture in more detail, please contact us.


Email hello@allyhealth.uk

Security Questions?

We understand that occupational health providers handle highly sensitive clinical information.

If you require additional documentation, technical clarification, or wish to discuss our security posture in more detail, please contact us.


Email: hello@allyhealth.uk

Ally streamlines workflows to improve care, reduce errors, and lower operational costs.

Efficiency built for clinicians.

© 2025. All rights reserved.

Ally streamlines workflows to improve care, reduce errors, and lower operational costs.

Efficiency built for clinicians.

© 2025. All rights reserved.