bmad-plus 0.4.4 → 0.5.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +31 -0
- package/README.md +3 -3
- package/package.json +1 -1
- package/readme-international/README.de.md +2 -2
- package/readme-international/README.es.md +2 -2
- package/readme-international/README.fr.md +2 -2
- package/src/bmad-plus/module.yaml +43 -12
- package/src/bmad-plus/packs/pack-shield/README.md +110 -0
- package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/csrd-agent.md +262 -0
- package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/section508-agent.md +179 -0
- package/src/bmad-plus/packs/pack-shield/categories/accessibility-esg/wcag-agent.md +201 -0
- package/src/bmad-plus/packs/pack-shield/categories/ai-governance/eu-ai-act-agent.md +97 -0
- package/src/bmad-plus/packs/pack-shield/categories/ai-governance/iso42001-agent.md +251 -0
- package/src/bmad-plus/packs/pack-shield/categories/ai-governance/nist-ai-rmf-agent.md +133 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/cis-controls-agent.md +221 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/ism-agent.md +150 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/iso27001-agent.md +167 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nis2-agent.md +83 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nist-800-53-agent.md +250 -0
- package/src/bmad-plus/packs/pack-shield/categories/cybersecurity/nist-csf-agent.md +218 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/ccpa-agent.md +94 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/dpdpa-agent.md +136 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/gdpr-agent.md +296 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/iso27701-agent.md +134 -0
- package/src/bmad-plus/packs/pack-shield/categories/data-privacy/lgpd-agent.md +129 -0
- package/src/bmad-plus/packs/pack-shield/categories/defense-export/cmmc-agent.md +127 -0
- package/src/bmad-plus/packs/pack-shield/categories/defense-export/ear-agent.md +272 -0
- package/src/bmad-plus/packs/pack-shield/categories/defense-export/itar-agent.md +202 -0
- package/src/bmad-plus/packs/pack-shield/categories/defense-export/tsa-agent.md +367 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/dora-agent.md +510 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/fedramp-agent.md +247 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/hipaa-agent.md +173 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/pci-dss-agent.md +239 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/soc2-agent.md +266 -0
- package/src/bmad-plus/packs/pack-shield/categories/industry-compliance/swift-csp-agent.md +164 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-classifier.md +131 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-fria.md +155 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-incidents.md +187 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/ai-act-roles.md +113 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/breach-sentinel.md +197 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/cookie-policy-gen.md +180 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/dpia-sentinel.md +235 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/legitimate-interest.md +159 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-advisor.md +133 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-notice-gen.md +160 -0
- package/src/bmad-plus/packs/pack-shield/categories/workflows/privacy-policy-gen.md +135 -0
- package/src/bmad-plus/packs/pack-shield/references/ccpa/ccpa-gdpr-comparison.md +117 -0
- package/src/bmad-plus/packs/pack-shield/references/ccpa/consumer-rights-workflows.md +177 -0
- package/src/bmad-plus/packs/pack-shield/references/cis-controls/framework-mappings.md +162 -0
- package/src/bmad-plus/packs/pack-shield/references/cis-controls/implementation-guidance.md +235 -0
- package/src/bmad-plus/packs/pack-shield/references/cis-controls/safeguards-detail.md +252 -0
- package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-assessment.md +170 -0
- package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-levels.md +113 -0
- package/src/bmad-plus/packs/pack-shield/references/cmmc/cmmc-practices.md +211 -0
- package/src/bmad-plus/packs/pack-shield/references/csrd/compliance-program.md +281 -0
- package/src/bmad-plus/packs/pack-shield/references/csrd/double-materiality.md +253 -0
- package/src/bmad-plus/packs/pack-shield/references/csrd/esrs-standards.md +401 -0
- package/src/bmad-plus/packs/pack-shield/references/dora/article-reference.md +441 -0
- package/src/bmad-plus/packs/pack-shield/references/dora/incident-classification.md +297 -0
- package/src/bmad-plus/packs/pack-shield/references/dora/rts-its-guide.md +306 -0
- package/src/bmad-plus/packs/pack-shield/references/dora/third-party-risk.md +349 -0
- package/src/bmad-plus/packs/pack-shield/references/dpdpa/gdpr-comparison.md +173 -0
- package/src/bmad-plus/packs/pack-shield/references/dpdpa/rights-and-obligations.md +426 -0
- package/src/bmad-plus/packs/pack-shield/references/dpdpa/rules-2025.md +599 -0
- package/src/bmad-plus/packs/pack-shield/references/dpdpa/sections-reference.md +319 -0
- package/src/bmad-plus/packs/pack-shield/references/ear/ccl-eccn-guide.md +250 -0
- package/src/bmad-plus/packs/pack-shield/references/ear/compliance-program.md +280 -0
- package/src/bmad-plus/packs/pack-shield/references/ear/license-exceptions.md +207 -0
- package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/gpai-governance.md +267 -0
- package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/obligations-high-risk.md +287 -0
- package/src/bmad-plus/packs/pack-shield/references/eu-ai-act/risk-classification.md +182 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/appendices-guide.md +209 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/control-families.md +281 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/poam-guide.md +93 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/readiness-checklist.md +134 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/sap-sar-guide.md +86 -0
- package/src/bmad-plus/packs/pack-shield/references/fedramp/ssp-guide.md +129 -0
- package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/documents.md +192 -0
- package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/dpa-template.md +121 -0
- package/src/bmad-plus/packs/pack-shield/references/gdpr-compliance/privacy-notice.md +87 -0
- package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/breach-notification.md +293 -0
- package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/privacy-rule.md +276 -0
- package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/security-rule.md +299 -0
- package/src/bmad-plus/packs/pack-shield/references/hipaa-compliance/templates.md +568 -0
- package/src/bmad-plus/packs/pack-shield/references/ism/control-applicability.md +181 -0
- package/src/bmad-plus/packs/pack-shield/references/ism/guidelines-overview.md +183 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27001/annex-a-2013.md +203 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27001/annex-a-2022.md +132 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27001/control-mapping.md +153 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27701/annex-a-controls.md +195 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27701/regulatory-mapping.md +229 -0
- package/src/bmad-plus/packs/pack-shield/references/iso27701/transition-guide.md +219 -0
- package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-ai-risk-assessment.md +258 -0
- package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-clauses-requirements.md +279 -0
- package/src/bmad-plus/packs/pack-shield/references/iso42001/iso42001-controls-annex-a.md +155 -0
- package/src/bmad-plus/packs/pack-shield/references/itar/compliance-program.md +174 -0
- package/src/bmad-plus/packs/pack-shield/references/itar/licensing-guide.md +146 -0
- package/src/bmad-plus/packs/pack-shield/references/itar/usml-categories.md +93 -0
- package/src/bmad-plus/packs/pack-shield/references/lgpd/anpd-enforcement.md +147 -0
- package/src/bmad-plus/packs/pack-shield/references/lgpd/compliance-program.md +272 -0
- package/src/bmad-plus/packs/pack-shield/references/lgpd/lgpd-articles.md +271 -0
- package/src/bmad-plus/packs/pack-shield/references/nis2/article-21-measures.md +153 -0
- package/src/bmad-plus/packs/pack-shield/references/nis2/iso27001-nis2-mapping.md +68 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-800-53/assessment-rmf.md +349 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-800-53/baselines-tailoring.md +277 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-800-53/control-families.md +450 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-ai-rmf/rmf-core.md +361 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-ai-rmf/rmf-profiles.md +192 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-10-to-20-mapping.md +143 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-20-functions-categories.md +278 -0
- package/src/bmad-plus/packs/pack-shield/references/nist-csf/csf-implementation-tiers.md +135 -0
- package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-requirements.md +366 -0
- package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-saq-guide.md +217 -0
- package/src/bmad-plus/packs/pack-shield/references/pci-compliance/pci-dss-v4-changes.md +190 -0
- package/src/bmad-plus/packs/pack-shield/references/section-508/wcag-mapping.md +160 -0
- package/src/bmad-plus/packs/pack-shield/references/soc2/controls.md +241 -0
- package/src/bmad-plus/packs/pack-shield/references/soc2/evidence.md +236 -0
- package/src/bmad-plus/packs/pack-shield/references/soc2/policies.md +254 -0
- package/src/bmad-plus/packs/pack-shield/references/soc2/vendor.md +276 -0
- package/src/bmad-plus/packs/pack-shield/references/swift-csp/swift-assessment.md +202 -0
- package/src/bmad-plus/packs/pack-shield/references/swift-csp/swift-controls.md +545 -0
- package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-crmp-requirements.md +359 -0
- package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-directives-overview.md +187 -0
- package/src/bmad-plus/packs/pack-shield/references/tsa-compliance/tsa-incident-reporting.md +187 -0
- package/src/bmad-plus/packs/pack-shield/references/wcag/criteria-detail.md +510 -0
- package/src/bmad-plus/packs/pack-shield/shared/audit-report-template.md +103 -0
- package/src/bmad-plus/packs/pack-shield/shared/cross-framework-mapper.md +103 -0
- package/src/bmad-plus/packs/pack-shield/shared/gap-analysis-template.md +83 -0
- package/src/bmad-plus/packs/pack-shield/shield-orchestrator.md +229 -0
- package/src/bmad-plus/packs/pack-shield/upstream-sync.yaml +68 -0
- package/tools/cli/commands/install.js +21 -8
- package/tools/cli/commands/update.js +4 -2
- package/tools/cli/i18n.js +50 -10
|
@@ -0,0 +1,299 @@
|
|
|
1
|
+
# HIPAA Security Rule Reference
|
|
2
|
+
## 45 CFR Part 164, Subparts A and C
|
|
3
|
+
|
|
4
|
+
---
|
|
5
|
+
|
|
6
|
+
## Table of Contents
|
|
7
|
+
1. [Scope & Applicability](#1-scope--applicability)
|
|
8
|
+
2. [General Rules](#2-general-rules)
|
|
9
|
+
3. [Administrative Safeguards](#3-administrative-safeguards)
|
|
10
|
+
4. [Physical Safeguards](#4-physical-safeguards)
|
|
11
|
+
5. [Technical Safeguards](#5-technical-safeguards)
|
|
12
|
+
6. [Organizational Requirements](#6-organizational-requirements)
|
|
13
|
+
7. [Policies, Procedures & Documentation](#7-policies-procedures--documentation)
|
|
14
|
+
8. [Risk Analysis Deep Dive](#8-risk-analysis-deep-dive)
|
|
15
|
+
9. [Cloud & Modern Architecture Guidance](#9-cloud--modern-architecture-guidance)
|
|
16
|
+
10. [Implementation Checklist](#10-implementation-checklist)
|
|
17
|
+
|
|
18
|
+
---
|
|
19
|
+
|
|
20
|
+
## 1. Scope & Applicability
|
|
21
|
+
|
|
22
|
+
The Security Rule applies to **ePHI** (electronic Protected Health Information) — PHI that is:
|
|
23
|
+
- Created, received, maintained, or transmitted in electronic form
|
|
24
|
+
- Stored on any electronic media (servers, workstations, laptops, mobile devices, removable media, cloud)
|
|
25
|
+
|
|
26
|
+
**Applies to:**
|
|
27
|
+
- Covered Entities (CEs)
|
|
28
|
+
- Business Associates (BAs) — directly under HITECH (2009)
|
|
29
|
+
|
|
30
|
+
**Does NOT cover:**
|
|
31
|
+
- PHI in paper form (Privacy Rule covers this)
|
|
32
|
+
- Verbal communications
|
|
33
|
+
|
|
34
|
+
---
|
|
35
|
+
|
|
36
|
+
## 2. General Rules
|
|
37
|
+
|
|
38
|
+
### Three Safeguard Categories
|
|
39
|
+
All CEs and BAs must implement:
|
|
40
|
+
1. **Administrative Safeguards** — Policies, procedures, workforce management
|
|
41
|
+
2. **Physical Safeguards** — Facility access, workstation, device controls
|
|
42
|
+
3. **Technical Safeguards** — Technology-based protections for ePHI
|
|
43
|
+
|
|
44
|
+
### Required vs. Addressable
|
|
45
|
+
| Designation | Meaning |
|
|
46
|
+
|------------|---------|
|
|
47
|
+
| **Required** | Must implement — no flexibility |
|
|
48
|
+
| **Addressable** | Must assess whether reasonable and appropriate; if so implement; if not, document why and implement an equivalent alternative |
|
|
49
|
+
|
|
50
|
+
> **Common Misconception**: "Addressable" does NOT mean optional. You must either implement it or formally document why you didn't and what you did instead.
|
|
51
|
+
|
|
52
|
+
### Flexibility Principle (§164.306(b))
|
|
53
|
+
Implementation may consider:
|
|
54
|
+
- Size, complexity, and capabilities of the CE/BA
|
|
55
|
+
- Technical infrastructure, hardware, and software security capabilities
|
|
56
|
+
- Costs of security measures
|
|
57
|
+
- Probability and criticality of potential risks
|
|
58
|
+
|
|
59
|
+
---
|
|
60
|
+
|
|
61
|
+
## 3. Administrative Safeguards
|
|
62
|
+
### §164.308
|
|
63
|
+
|
|
64
|
+
| Standard | Req/Addr | Description |
|
|
65
|
+
|----------|----------|-------------|
|
|
66
|
+
| **Security Management Process** (§164.308(a)(1)) | Required | Framework for protecting ePHI |
|
|
67
|
+
| → Risk Analysis | Required | Assess threats, vulnerabilities, likelihood, impact |
|
|
68
|
+
| → Risk Management | Required | Implement security measures to reduce risk to reasonable level |
|
|
69
|
+
| → Sanction Policy | Required | Apply sanctions for workforce violations |
|
|
70
|
+
| → Information System Activity Review | Required | Regularly review audit logs, access reports, incident reports |
|
|
71
|
+
| **Assigned Security Responsibility** (§164.308(a)(2)) | Required | Designate a Security Official |
|
|
72
|
+
| **Workforce Security** (§164.308(a)(3)) | Required | Control workforce access to ePHI |
|
|
73
|
+
| → Authorization/Supervision | Addressable | Supervise workforce members working with ePHI |
|
|
74
|
+
| → Workforce Clearance Procedure | Addressable | Determine appropriate access levels |
|
|
75
|
+
| → Termination Procedures | Addressable | Revoke access upon termination |
|
|
76
|
+
| **Information Access Management** (§164.308(a)(4)) | Required | Grant appropriate access to ePHI |
|
|
77
|
+
| → Isolating Healthcare Clearinghouse Function | Required (if applicable) | Separate clearinghouse from rest of org |
|
|
78
|
+
| → Access Authorization | Addressable | Process for authorizing access |
|
|
79
|
+
| → Access Establishment and Modification | Addressable | Process for granting/modifying access |
|
|
80
|
+
| **Security Awareness and Training** (§164.308(a)(5)) | Required | Train all workforce members |
|
|
81
|
+
| → Security Reminders | Addressable | Periodic security updates |
|
|
82
|
+
| → Protection from Malicious Software | Addressable | Anti-malware procedures |
|
|
83
|
+
| → Log-in Monitoring | Addressable | Monitor failed log-in attempts |
|
|
84
|
+
| → Password Management | Addressable | Guidance on creating/changing passwords |
|
|
85
|
+
| **Security Incident Procedures** (§164.308(a)(6)) | Required | Respond to security incidents |
|
|
86
|
+
| → Response and Reporting | Required | Identify, respond to, mitigate, document incidents |
|
|
87
|
+
| **Contingency Plan** (§164.308(a)(7)) | Required | Respond to emergencies affecting ePHI |
|
|
88
|
+
| → Data Backup Plan | Required | Create retrievable exact copies of ePHI |
|
|
89
|
+
| → Disaster Recovery Plan | Required | Restore lost ePHI data |
|
|
90
|
+
| → Emergency Mode Operation Plan | Required | Continue critical business processes during emergency |
|
|
91
|
+
| → Testing and Revision | Addressable | Implement procedures for periodic testing of contingency plans |
|
|
92
|
+
| → Applications and Data Criticality Analysis | Addressable | Assess relative criticality of applications |
|
|
93
|
+
| **Evaluation** (§164.308(a)(8)) | Required | Periodic technical/non-technical evaluation |
|
|
94
|
+
| **Business Associate Contracts** (§164.308(b)(1)) | Required | BAA with all BAs handling ePHI |
|
|
95
|
+
|
|
96
|
+
---
|
|
97
|
+
|
|
98
|
+
## 4. Physical Safeguards
|
|
99
|
+
### §164.310
|
|
100
|
+
|
|
101
|
+
| Standard | Req/Addr | Description |
|
|
102
|
+
|----------|----------|-------------|
|
|
103
|
+
| **Facility Access Controls** (§164.310(a)(1)) | Required | Limit physical access to systems containing ePHI |
|
|
104
|
+
| → Contingency Operations | Addressable | Access during disaster recovery |
|
|
105
|
+
| → Facility Security Plan | Addressable | Safeguard facility and equipment |
|
|
106
|
+
| → Access Control and Validation | Addressable | Control access to facilities based on role |
|
|
107
|
+
| → Maintenance Records | Addressable | Document repairs/modifications to physical security |
|
|
108
|
+
| **Workstation Use** (§164.310(b)) | Required | Specify proper functions and physical surroundings for workstations |
|
|
109
|
+
| **Workstation Security** (§164.310(c)) | Required | Physical safeguards for workstations accessing ePHI |
|
|
110
|
+
| **Device and Media Controls** (§164.310(d)(1)) | Required | Govern receipt and removal of hardware/media |
|
|
111
|
+
| → Disposal | Required | Properly dispose of media containing ePHI (wiping, destruction) |
|
|
112
|
+
| → Media Re-use | Required | Remove ePHI before reuse of electronic media |
|
|
113
|
+
| → Accountability | Addressable | Track movements of hardware/media |
|
|
114
|
+
| → Data Backup and Storage | Addressable | Create retrievable copy before moving equipment |
|
|
115
|
+
|
|
116
|
+
---
|
|
117
|
+
|
|
118
|
+
## 5. Technical Safeguards
|
|
119
|
+
### §164.312
|
|
120
|
+
|
|
121
|
+
| Standard | Req/Addr | Description |
|
|
122
|
+
|----------|----------|-------------|
|
|
123
|
+
| **Access Control** (§164.312(a)(1)) | Required | Allow only authorized persons/software to access ePHI |
|
|
124
|
+
| → Unique User Identification | Required | Assign unique names/numbers to identify and track user identity |
|
|
125
|
+
| → Emergency Access Procedure | Required | Obtain ePHI during emergency |
|
|
126
|
+
| → Automatic Logoff | Addressable | Terminate sessions after inactivity |
|
|
127
|
+
| → Encryption and Decryption | Addressable | Encrypt/decrypt ePHI |
|
|
128
|
+
| **Audit Controls** (§164.312(b)) | Required | Hardware/software/procedural mechanisms to record and examine activity in systems containing ePHI |
|
|
129
|
+
| **Integrity** (§164.312(c)(1)) | Required | Protect ePHI from improper alteration or destruction |
|
|
130
|
+
| → Mechanism to Authenticate ePHI | Addressable | Corroborate that ePHI has not been altered |
|
|
131
|
+
| **Person or Entity Authentication** (§164.312(d)) | Required | Verify identity of person/entity seeking access |
|
|
132
|
+
| **Transmission Security** (§164.312(e)(1)) | Required | Guard against unauthorized access to ePHI transmitted over electronic networks |
|
|
133
|
+
| → Integrity Controls | Addressable | Ensure ePHI is not improperly modified during transmission |
|
|
134
|
+
| → Encryption | Addressable | Encrypt ePHI in transit |
|
|
135
|
+
|
|
136
|
+
---
|
|
137
|
+
|
|
138
|
+
## 6. Organizational Requirements
|
|
139
|
+
### §164.314
|
|
140
|
+
|
|
141
|
+
### Business Associate Contracts (§164.314(a)):
|
|
142
|
+
BAA must require the BA to:
|
|
143
|
+
- Implement Administrative, Physical, and Technical Safeguards
|
|
144
|
+
- Ensure subcontractors do the same (sign sub-BAAs)
|
|
145
|
+
- Report security incidents (including successful and unsuccessful attempts)
|
|
146
|
+
- Authorize termination of contract if CE determines BA has violated a material term
|
|
147
|
+
|
|
148
|
+
### Group Health Plans (§164.314(b)):
|
|
149
|
+
Plan documents must require plan sponsors to:
|
|
150
|
+
- Implement reasonable and appropriate security measures
|
|
151
|
+
- Not use/disclose ePHI except as permitted
|
|
152
|
+
- Report security incidents to the plan
|
|
153
|
+
|
|
154
|
+
---
|
|
155
|
+
|
|
156
|
+
## 7. Policies, Procedures & Documentation
|
|
157
|
+
### §164.316
|
|
158
|
+
|
|
159
|
+
### Policies and Procedures (§164.316(a)):
|
|
160
|
+
- Must implement reasonable and appropriate policies to comply with the Security Rule
|
|
161
|
+
- Must update as necessary
|
|
162
|
+
|
|
163
|
+
### Documentation Requirements (§164.316(b)):
|
|
164
|
+
- Maintain written (electronic or paper) policies, procedures, and records required by the Security Rule
|
|
165
|
+
- **Retention**: 6 years from creation date OR date last in effect (whichever is later)
|
|
166
|
+
- Make documentation available to those responsible for implementing procedures
|
|
167
|
+
- Review documentation periodically and update as needed
|
|
168
|
+
|
|
169
|
+
---
|
|
170
|
+
|
|
171
|
+
## 8. Risk Analysis Deep Dive
|
|
172
|
+
|
|
173
|
+
Risk Analysis (§164.308(a)(1)(ii)(A)) is the **foundation** of HIPAA Security compliance. HHS has emphasized it is the most commonly cited deficiency in enforcement actions.
|
|
174
|
+
|
|
175
|
+
### Required Components:
|
|
176
|
+
1. **Scope**: All ePHI created, received, maintained, or transmitted (not just EHR — includes backups, emails, mobile devices)
|
|
177
|
+
2. **Threat Identification**: Identify potential threats to ePHI (natural, human, environmental)
|
|
178
|
+
3. **Vulnerability Identification**: Identify security vulnerabilities
|
|
179
|
+
4. **Likelihood Assessment**: Assess probability that each threat would exploit each vulnerability
|
|
180
|
+
5. **Impact Assessment**: Assess potential impact of threat occurrence
|
|
181
|
+
6. **Risk Level Determination**: Combine likelihood + impact = risk level (High/Medium/Low)
|
|
182
|
+
7. **Current Controls**: Document existing security measures and their effectiveness
|
|
183
|
+
|
|
184
|
+
### Risk Management (§164.308(a)(1)(ii)(B)):
|
|
185
|
+
- Implement security measures sufficient to reduce risks to a reasonable and appropriate level
|
|
186
|
+
- Prioritize based on risk level
|
|
187
|
+
- Document all decisions
|
|
188
|
+
|
|
189
|
+
### Common Risk Analysis Mistakes (HHS Enforcement Findings):
|
|
190
|
+
- Only analyzing the EHR system (missing emails, mobile devices, backups, printers)
|
|
191
|
+
- Performing once and never updating
|
|
192
|
+
- Not documenting the analysis
|
|
193
|
+
- Confusing risk analysis with gap analysis
|
|
194
|
+
- Assigning risk levels without methodology
|
|
195
|
+
|
|
196
|
+
### NIST Framework Alignment:
|
|
197
|
+
HHS recommends NIST SP 800-30 for risk analysis methodology. NIST SP 800-66 is the HIPAA-specific guidance.
|
|
198
|
+
|
|
199
|
+
---
|
|
200
|
+
|
|
201
|
+
## 9. Cloud & Modern Architecture Guidance
|
|
202
|
+
|
|
203
|
+
### Cloud Service Providers (CSPs):
|
|
204
|
+
- CSPs storing ePHI are Business Associates — **BAA is required**
|
|
205
|
+
- AWS, Azure, GCP all offer HIPAA-eligible services under BAA
|
|
206
|
+
- BAA does not transfer compliance responsibility — CE/BA must configure properly
|
|
207
|
+
|
|
208
|
+
### Key Cloud Considerations:
|
|
209
|
+
|
|
210
|
+
**Encryption:**
|
|
211
|
+
- At rest: AES-256 minimum (addressable but industry standard)
|
|
212
|
+
- In transit: TLS 1.2+ minimum; TLS 1.3 recommended
|
|
213
|
+
- Key management: Use dedicated KMS (AWS KMS, Azure Key Vault, GCP Cloud KMS)
|
|
214
|
+
- Customer-managed keys preferred for higher sensitivity
|
|
215
|
+
|
|
216
|
+
**Access Control:**
|
|
217
|
+
- Implement IAM with least-privilege principle
|
|
218
|
+
- Use MFA for all accounts with ePHI access
|
|
219
|
+
- Separate service accounts from human accounts
|
|
220
|
+
- Regularly audit and rotate credentials
|
|
221
|
+
|
|
222
|
+
**Audit Logging:**
|
|
223
|
+
- Enable CloudTrail (AWS), Activity Log (Azure), Cloud Audit Logs (GCP)
|
|
224
|
+
- Log: API calls, data access, authentication events, configuration changes
|
|
225
|
+
- Immutable log storage (S3 with Object Lock, etc.)
|
|
226
|
+
- Retention: Minimum 6 years for HIPAA records
|
|
227
|
+
- Alert on anomalous access patterns
|
|
228
|
+
|
|
229
|
+
**Network Security:**
|
|
230
|
+
- VPC/private network for ePHI systems
|
|
231
|
+
- Security groups / network policies: deny-by-default
|
|
232
|
+
- No direct internet exposure of ePHI datastores
|
|
233
|
+
- WAF for any public-facing applications handling ePHI
|
|
234
|
+
|
|
235
|
+
**Mobile & BYOD:**
|
|
236
|
+
- MDM/EMM solution required if devices access ePHI
|
|
237
|
+
- Remote wipe capability
|
|
238
|
+
- Screen lock enforcement
|
|
239
|
+
- Encrypted storage
|
|
240
|
+
- App-level controls (MAM) if possible
|
|
241
|
+
|
|
242
|
+
### API & Application Security:
|
|
243
|
+
- Authentication: OAuth 2.0 + OIDC; consider SMART on FHIR for health apps
|
|
244
|
+
- Input validation to prevent injection attacks
|
|
245
|
+
- No ePHI in URLs (appears in logs)
|
|
246
|
+
- No ePHI in error messages
|
|
247
|
+
- Rate limiting on endpoints handling ePHI
|
|
248
|
+
- FHIR APIs: HL7 FHIR R4 with SMART on FHIR is the modern standard
|
|
249
|
+
|
|
250
|
+
### DevOps / CI-CD:
|
|
251
|
+
- No real PHI in dev/test environments (use synthetic data)
|
|
252
|
+
- Secrets management (never hardcode credentials)
|
|
253
|
+
- SAST/DAST scanning in pipeline
|
|
254
|
+
- Dependency scanning for vulnerabilities
|
|
255
|
+
- Infrastructure as Code security scanning
|
|
256
|
+
|
|
257
|
+
---
|
|
258
|
+
|
|
259
|
+
## 10. Implementation Checklist
|
|
260
|
+
|
|
261
|
+
### Administrative
|
|
262
|
+
- [ ] Designate Security Official
|
|
263
|
+
- [ ] Conduct and document Risk Analysis covering ALL ePHI
|
|
264
|
+
- [ ] Implement Risk Management Plan with prioritized remediation
|
|
265
|
+
- [ ] Implement sanction policy for violations
|
|
266
|
+
- [ ] Review system activity regularly (audit logs)
|
|
267
|
+
- [ ] Establish workforce clearance procedures
|
|
268
|
+
- [ ] Implement access authorization process
|
|
269
|
+
- [ ] Conduct annual Security Awareness Training (document it)
|
|
270
|
+
- [ ] Implement anti-malware protection
|
|
271
|
+
- [ ] Monitor failed login attempts
|
|
272
|
+
- [ ] Document and implement Password/Credential Policy
|
|
273
|
+
- [ ] Implement Security Incident Response Plan
|
|
274
|
+
- [ ] Create Data Backup Plan (test it)
|
|
275
|
+
- [ ] Create Disaster Recovery Plan (test it)
|
|
276
|
+
- [ ] Create Emergency Mode Operation Plan
|
|
277
|
+
- [ ] Execute BAAs with all vendors handling ePHI
|
|
278
|
+
- [ ] Conduct periodic Security Rule evaluations
|
|
279
|
+
|
|
280
|
+
### Physical
|
|
281
|
+
- [ ] Implement facility access controls (badge, keypad, locks)
|
|
282
|
+
- [ ] Create and implement Facility Security Plan
|
|
283
|
+
- [ ] Document workstation use policies
|
|
284
|
+
- [ ] Implement workstation physical security
|
|
285
|
+
- [ ] Implement media disposal procedures (certificates of destruction)
|
|
286
|
+
- [ ] Implement media re-use procedures (secure wiping)
|
|
287
|
+
- [ ] Track hardware/media movements
|
|
288
|
+
|
|
289
|
+
### Technical
|
|
290
|
+
- [ ] Assign unique user IDs (no shared accounts)
|
|
291
|
+
- [ ] Implement role-based access control (RBAC)
|
|
292
|
+
- [ ] Implement MFA for all ePHI access
|
|
293
|
+
- [ ] Implement automatic session timeout
|
|
294
|
+
- [ ] Implement encryption at rest (AES-256)
|
|
295
|
+
- [ ] Implement encryption in transit (TLS 1.2+)
|
|
296
|
+
- [ ] Enable and monitor audit logs
|
|
297
|
+
- [ ] Implement integrity controls (checksums, digital signatures)
|
|
298
|
+
- [ ] Implement entity authentication mechanisms
|
|
299
|
+
- [ ] Test transmission security controls
|