What Health Tech Leaders Miss When Developing New Products

TL;DR

A strong security posture doesn’t mean much if it doesn’t scale across new products. In fast-growing health tech orgs, Product A is airtight but Product B, built by a different team on a separate stack, falls outside security oversight. In this post, I break down what I’ve seen working in the real world, how blind spots are created, and what to do about them before they lead to compliance gaps, increased risks, or deal friction.

The Problem in the Field

I have worked with health tech teams that had a solid posture around their flagship product (Product A.)

Security was owned.

Their cloud infrastructure was locked down.

Access controls, encryption, and logging were all in place.

Then they started building a second product.

And that’s where things got messy.

The team building Product B had spun up their own infrastructure.

Separate deployment pipeline.

Separate cloud account.

And no oversight from the Product A's infrastructure team.

In short, they were building fast just blindfolded.

How Shadow Infrastructure Creates Risk

This isn’t unusual.

In fact, it’s a common gap I see with growth-stage companies.

The moment product velocity picks up, new teams start solving for speed and inadvertently leave security behind.

No bad intent, just misalignment.

The result is shadow infrastructure.

Cloud providers, assets, etc. are not documented.

Security not centrally managed.

And it doesn’t follow the same standards that got the company HIPAA compliant in the first place.

What This Looks Like on the Inside

These are some of the blind spots of product silos:

❌ Access controls don’t match company policy

❌ BAAs are not captured and reviewed

❌ Logging isn't centralized

❌ Infrastructure doesn't align with security configuration policies

❌ No clear governance strategy for security

And if a breach hits Product B?

The audit doesn’t stop at Product B.

It pulls Product A, your leadership, your buyers (i.e. everything) into scrutiny.

We’re unpacking this exact pitfall in a LinkedIn Live next Wednesday

“Why These Cybersecurity Pitfalls Have Crushed Clinics Like Yours”

👉 Join us for common missteps and how to get ahead of them: LinkedIn Live

Scaling Securely

So what should a health tech leader do before the next product spins up?

✅ Extend Your Visibility

Ensure your security team has full visibility into any new architecture before the first line of code is committed.

✅ Assign Ownership Early

Security is a leadership function. Don’t make it the dev team’s side project. Appoint a single accountable owner for security decisions on every product (i.e. leverage a CISO.)

✅ Standardize Cloud Security

Create a security configuration standard for new infrastructure, assets, or accounts. Don’t rely on tribal knowledge. Rely on company approved policy documentation.

✅ Maintain Compliance

Gather all necessary compliance documentation like vendor or cloud hosting BAA's, SOC 2 Reports, etc. to ensure you're compliant and they meet your security requirements.

✅ Centralize Logging

New environments need visibility on them, period. If you can’t spot threats across products, you can’t correlate activity across products.

If any of this is unclear, this is what the HIPAA Exposure Guide helps uncover.

👉Go beyond the typical HIPAA checklist and download it here

For Health Tech Execs

Growth should never mean starting over.

But when new teams build new products without security oversight, it happens.

Instead of maintaining your posture, you weaken it.

Security is about locking down today and expanding tomorrow.

Let’s Open This Up!

Let’s make this a leadership conversation.

What’s one way health tech teams can ensure security as they scale?

Drop your answer in the comments 👇

L Trotter II

As Founder and CEO of Inherent Security, Larry Trotter II is responsible for defining the mission and vision of the company, ensuring execution aligns with the business purpose. Larry has transformed Inherent Security from a consultancy to a cybersecurity company through partnerships and expert acquisitions. Today the company leverages its healthcare and government expertise to accelerate compliance operation for clients.

Larry has provided services for 12 years across the private industry developing security strategies and managing security operations for Fortune 500 companies and healthcare organizations. He is influential business leader who can demonstrate the value proposition of security and its direct link to customers.

Larry graduated from Old Dominion University with a bachelor’s degree in Business Administration with a focus on IT and Networking. Larry has accumulated certifications such as the CISM, ISO27001 Lead Implementer, GCIA and others. He serves on the Board of Directors for the MIT Enterprise Forum DC and Baltimore.

https://www.inherentsecurity.com
Next
Next

What Hims & Hers’ European Expansion Signals for Health Tech Security