Clique

Security Overview

Last updated: April 1, 2026

Clique runs vendor-supplied AI models against PHI inside the hospital, never outside it. The security model is built around two ideas: data never leaves the hospital perimeter, and the code that touches it can be cryptographically proven -- before it runs and continuously while it runs -- to be the code the vendor shipped. This page describes how that works at a level useful to security and infrastructure teams evaluating Clique.

SOC 2 Type II HIPAA Compliant HITRUST CSF Confidential Computing

Architecture & Trust Boundaries

Clique is deployed as three nested trust zones inside a customer hospital. The innermost zone -- the confidential-computing enclave -- is the only place PHI in use is ever processed. Each boundary enforces a different control, and only specific well-typed messages are allowed to cross them.

HOSPITAL PERIMETER network boundary -- no PHI egress Client apps EHR / clinician UI inference consumer CLIQUE CONTROL PLANE attestation · policy · audit Attestation verifier Policy engine Hash-chained audit log append-only · Ed25519 anchored ENCLAVE (TDX / SEV-SNP / H100 CC) hardware root of trust · memory encrypted Sealed vendor model container image digest: sha384:<measured> egress: DENY ALL (default) host kernel: UNREACHABLE PHI processed here — never leaves inference req (mTLS, PHI) inference resp attestation quote session key release signed events
PHI crosses only the client-to-enclave boundary and is bounded by an mTLS session whose keys are released only after attestation. Attestation quotes, policy decisions, and signed audit events flow inside the control plane. Nothing carrying PHI ever crosses the hospital perimeter.

Anatomy of an Attested Workload

An "enclave" on Clique is not a container in the Docker sense. It is a hardware-isolated VM whose memory is encrypted with a key that never leaves the CPU (or, for GPU workloads, the H100's confidential-compute controller). The contents of a Clique enclave are:

Attestation Flow

Every workload is verified before it is allowed to receive session keys, and re-verified continuously while it runs.

  1. Enclave self-measures. On launch, the enclave measures itself -- firmware, kernel, sealed image digest, launch policy -- and produces a quote signed by the hardware attestation key (TDX REPORT / SEV-SNP ATTESTATION_REPORT / NVIDIA SPDM report).
  2. Control plane verifies the quote. The attestation verifier validates the hardware signature chain against the vendor CA (Intel PCS, AMD KDS, NVIDIA NRAS) and matches the measurement payload against the vendor-signed manifest for that model version.
  3. Policy engine evaluates expected values. PCR / MRTD values, image digest, launch flags, and customer-specific policy (e.g. "H100 CC must be on", "model vX.Y.Z only") are checked. Any mismatch is a hard failure -- not a warning.
  4. Session keys are released. Only if every check passes, the control plane releases the per-session mTLS key material and the wrapping key used to unseal vendor weights. Without this step the enclave has no way to communicate with clients or decrypt the model.
  5. Heartbeat re-attestation every 60s. While the workload runs, the enclave re-attests on a 60-second heartbeat. A failed or missing heartbeat quarantines the session, revokes keys, and raises a compliance-panel alert identical to the one shown in the control plane.

Audit Log Integrity

Every security-relevant event -- attestation verdict, session open/close, policy change, key release, heartbeat result, admin action -- is written to an append-only log. Integrity is guaranteed by a per-tenant hash chain anchored to an Ed25519 signing key held by the control plane.

event[n].hash = sha256( event[n-1].hash || event[n].payload )
root_sig      = Ed25519_sign( control_plane_key, event[n].hash )

Data Residency & Egress

Clique's residency story is simple: PHI stays in the hospital, full stop. This is enforced at the network layer, not just by policy.

Compliance Mapping

The following table maps specific HIPAA Security Rule and SOC 2 Common Criteria controls to the Clique mechanisms that satisfy them. This is the mapping used in our SOC 2 Type II report and is available with auditor commentary under NDA.

Control Clique mechanism
HIPAA §164.312(a)(2)(iv)
Encryption at rest
AES-256-GCM on the audit volume and on all persistent enclave state; keys managed by a dedicated KMS with automatic rotation.
HIPAA §164.312(e)(1)
Transmission security
TLS 1.3 everywhere, HSTS enforced, certificate pinning on API endpoints. mTLS between enclaves and the control plane, with session keys released only after attestation.
HIPAA §164.312(b)
Audit controls
Hash-chained, Ed25519-anchored append-only audit log (see Audit Log Integrity).
HIPAA §164.308(a)(1)(ii)(D)
Information system activity review
Continuous replay-verification of the audit chain; real-time anomaly alerts routed to on-call security engineering.
HIPAA §164.308(a)(5)(ii)(C)
Log-in monitoring
Every authentication attempt, MFA challenge, and session open is logged with actor, source, and outcome.
HIPAA §164.312(a)(1)
Access control
RBAC with Clinician / IT / Researcher / Admin roles; least-privilege by default; break-glass access is time-boxed and written to the audit chain.
HIPAA §164.312(c)(1)
Integrity
Hash-chained audit log, signed attestation quotes, and measured boot together establish integrity of both data history and execution environment.
HIPAA §164.504(e)
Vendor BAAs
A signed BAA with the model vendor is a hard prerequisite; enclaves cannot be provisioned for a vendor until the BAA reference is present in the policy engine.
HIPAA §164.316(b)(2)
Documentation retention
Seven-year retention of audit logs, attestation evidence, and policy history on WORM-backed storage.
SOC 2 CC6.1
Logical access
SSO (SAML 2.0 / OIDC) with enforced MFA, role-based authorization, and hardware-key support for privileged roles.
SOC 2 CC6.6
External boundary protection
Enclave egress DENY-by-default; allow-list limited to two in-perimeter destinations; perimeter egress limited to the signed audit stream.
SOC 2 CC6.7
Transmission confidentiality
TLS 1.3 on all transport; mTLS plus attestation-gated session keys between control plane and enclaves.
SOC 2 CC7.1
Change management
Every container image SHA, config bundle, and policy change is recorded in the audit log; promotion to production requires a signed approval that is itself an audit event.
SOC 2 CC7.2
System monitoring
Continuous heartbeat re-attestation, audit-chain replay, and anomaly detection feed a single compliance panel shown in the control plane.

Encryption

In transit. TLS 1.3 with HSTS and certificate pinning on API connections. Internal service-to-service traffic uses mutual TLS. Enclave sessions additionally derive per-session keys that are released only after successful attestation.

At rest. AES-256-GCM on all persistent data, managed by a dedicated KMS with automatic rotation. Customer-managed encryption keys (CMEK) are available for enterprise deployments. Model weights are encrypted at rest and unsealed inside the enclave after attestation.

Access Controls

Infrastructure Security

SOC 2 Type II

Clique has completed SOC 2 Type II certification, independently audited by a third-party firm. Scope covers the Trust Service Criteria for Security, Availability, and Confidentiality. Continuous monitoring and annual re-certification apply. A copy of the report is available upon request under NDA.

Incident Response

We maintain a documented incident response plan, tested regularly through tabletop exercises and simulations:

Penetration Testing

Independent third-party firms conduct penetration tests at least annually. Scope covers the application layer, APIs, infrastructure, cloud configurations, and the enclave attestation path. Critical and high findings are remediated within defined SLAs. Summary reports are available to customers under NDA.

Vendor Security

Model vendors with access to the enclave runtime undergo security review before onboarding and are re-assessed annually. A signed BAA is a hard prerequisite for enclave provisioning and is enforced by the policy engine, not just by process.

Responsible Disclosure

Security researchers are welcome to report vulnerabilities to security@cliquehealth.com. We commit to:

We do not currently operate a paid bug bounty -- we are early-stage and would rather be honest about that than promise payouts we cannot commit to. We credit reporters by name (with permission) in our security release notes.

Questions

To request our SOC 2 report, a HITRUST letter, a copy of the architecture diagram in a higher-resolution form, or to discuss a specific control with our security team, contact security@cliquehealth.com.