-
Notifications
You must be signed in to change notification settings - Fork 284
/
Copy pathnist-sp-800-66-rev2.yaml
4245 lines (3358 loc) · 192 KB
/
nist-sp-800-66-rev2.yaml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
urn: urn:intuitem:risk:library:nist-sp-800-66-rev2
locale: en
ref_id: NIST-SP-800-66-rev2
name: NIST SP-800-66 rev2 (HIPAA)
description: 'Implementing the Health Insurance Portability and Accountability Act
(HIPAA) Security Rule: A Cybersecurity Resource Guide, 2.0.0
Source: https://csrc.nist.gov/Projects/cprt/catalog#/cprt/framework/version/SP800_66_2_0_0/home
'
copyright: With the exception of material marked as copyrighted, information presented
on NIST sites are considered public information and may be distributed or copied.
version: 1
publication_date: 2024-04-05
provider: NIST
packager: intuitem
objects:
framework:
urn: urn:intuitem:risk:framework:nist-sp-800-66-rev2
ref_id: nist-sp-800-66-rev2
name: NIST SP-800-66 rev2 (HIPAA)
description: 'Implementing the Health Insurance Portability and Accountability
Act (HIPAA) Security Rule: A Cybersecurity Resource Guide, 2.0.0
Source: https://csrc.nist.gov/Projects/cprt/catalog#/cprt/framework/version/SP800_66_2_0_0/home
'
requirement_nodes:
- urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:164.308
assessable: false
depth: 1
ref_id: '164.308'
description: "Administrative Safeguards:\nDefined in the Security Rule as the\
\ \u201Cadministrative actions and policies, and procedures to manage the\
\ selection, development, implementation, and maintenance of security measures\
\ to protect electronic protected health information and to manage the conduct\
\ of the covered entity's workforce in relation to the protection of that\
\ information.\u201D"
- urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:164.308(a)(1)
assessable: false
depth: 2
parent_urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:164.308
ref_id: 164.308(a)(1)
description: 'Security Management Process:
HIPAA Standard: Implement policies and procedures to prevent, detect, contain,
and correct security violations.'
- urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:node4
assessable: true
depth: 3
parent_urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:164.308(a)(1)
name: Identify all ePHI and Relevant Information Systems
description: 'Identify where ePHI is generated within the organization, where
it enters the organization, where it moves within the organization, where
it is stored, and where it leaves the organization.
Identify all systems that house ePHI. Be sure to identify mobile devices,
medical equipment, and medical IoT devices that store, process, or transmit
ePHI.
Include all hardware and software that are used to collect, store, process,
or transmit ePHI.
Analyze business functions and verify the ownership and control of information
system elements as necessary.
Consider the impact of a merger or acquisition on risks to ePHI. During a
merger or acquisition, new data pathways may be introduced that lead to ePHI
being stored, processed, or transmitted in previously unanticipated places.'
- urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:node5
assessable: false
depth: 4
parent_urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:node4
name: Sample questions
description: 'Has all ePHI generated, stored, processed, and transmitted within
the organization been identified?
Are all hardware and software for which the organization is responsible periodically
inventoried?
Is the hardware and software inventory updated on a regular basis?
Have hardware and software that maintains or transmits ePHI been identified?
Does this inventory include removable media and remote access devices?
Is the current configuration of organizational systems documented, including
connections to other systems?
Has a BIA been performed?'
- urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:node6
assessable: true
depth: 3
parent_urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:164.308(a)(1)
name: Conduct Risk Assessment
description: Conduct an accurate and thorough assessment of the potential risks
and vulnerabilities to the confidentiality, integrity, and availability of
ePHI held by the covered entity or business associate.
- urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:node7
assessable: false
depth: 4
parent_urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:node6
name: Sample questions
description: "Are there any prior risk assessments, audit comments, security\
\ requirements, and/or security test results?\n\nIs there intelligence available\
\ from agencies, the Office of the Inspector General (OIG), the US-CERT, virus\
\ alerts, and/or vendors?\n\nWhat are the human, natural, and environmental\
\ threats to systems that contain, store, process, or transmit ePHI?\n\nWhat\
\ are the current and planned controls?\n\nHave likelihood and impact been\
\ determined for relevant threats and vulnerabilities?\n\nHave risk ratings\
\ been determined for relevant threats and vulnerabilities?\n\nIs the facility\
\ located in a region prone to any natural disasters, such as earthquakes,\
\ floods, or fires?\n\nHas responsibility been assigned to check all hardware\
\ and software \u2013 including hardware and software used for remote access\
\ \u2013 to determine whether selected security settings are enabled?\n\n\
Is there an analysis of current safeguards and their effectiveness relative\
\ to the identified risks?\n\nHave all processes involving ePHI been considered,\
\ including creating, receiving, maintaining, and transmitting it?"
- urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:node8
assessable: true
depth: 3
parent_urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:164.308(a)(1)
name: Implementation Specification (Required)
description: Conduct an accurate and thorough assessment of the potential risks
and vulnerabilities to the confidentiality, integrity, and availability of
ePHI held by the covered entity or business associate.
- urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:node9
assessable: false
depth: 4
parent_urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:node8
name: Sample questions
- urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:node10
assessable: true
depth: 3
parent_urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:164.308(a)(1)
name: Implement a Risk Management Program
description: "Implement security measures sufficient to reduce risks and vulnerabilities\
\ to a reasonable and appropriate level to comply with \xA7164.306(a).\n\n\
Risk management should be performed with regular frequency to examine past\
\ decisions, reevaluate risk likelihood and impact levels, and assess the\
\ effectiveness of past remediation efforts\n\nCreate a Risk Management policy\
\ and program that outlines organizational risk appetite and risk tolerance,\
\ personnel duties, responsible parties, the frequency of risk management,\
\ and required documentation.\n\nA risk management methodology is included\
\ in Section 4.\n\nRisk management resources are also included in Appendix\
\ F."
- urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:node11
assessable: false
depth: 4
parent_urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:node10
name: Sample questions
description: 'Is executive leadership and/or management involved in risk management
decisions?
Has a risk management program been created with related policies?
Does the regulated entity need to engage other resources (e.g., external expertise)
to assist in risk management?
Do current safeguards ensure the confidentiality, integrity, and availability
of all ePHI?
Do current safeguards protect against reasonably anticipated uses or disclosures
of ePHI that are not permitted by the Privacy Rule?
Has the regulated entity used the results of risk assessment and risk management
processes to guide the selection and implementation of appropriate controls
to protect ePHI?
Has the regulated entity protected against all reasonably anticipated threats
or hazards to the security and integrity of ePHI?
Has the regulated entity assured compliance with all policies and procedures
by its workforce?'
- urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:node12
assessable: true
depth: 3
parent_urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:164.308(a)(1)
name: Implementation Specification (Required)
description: "Implement security measures sufficient to reduce risks and vulnerabilities\
\ to a reasonable and appropriate level to comply with \xA7164.306(a)"
- urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:node13
assessable: false
depth: 4
parent_urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:node12
name: Sample questions
- urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:node14
assessable: true
depth: 3
parent_urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:164.308(a)(1)
name: Acquire IT Systems and Services
description: 'Regulated entities should consider how cloud services and other
third-party IT system and service offerings can both assist regulated entities
in protecting ePHI while also potentially introducing new risks to ePHI.
Although the HIPAA Security Rule does not require purchasing any particular
technology, adequately protecting information may require additional hardware,
software, or services. Considerations for their selection should include the
following:'
- urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:node15
assessable: false
depth: 4
parent_urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:node14
name: Sample questions
description: 'Will new security controls work with the existing IT architecture?
Have the security requirements of the organization been compared to the security
features of existing or proposed hardware and software?
Has a cost-benefit analysis been conducted to determine the reasonableness
of the investment given the security risks identified?
Has a training strategy been developed?'
- urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:node16
assessable: true
depth: 3
parent_urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:164.308(a)(1)
name: Create and Deploy Policies and Procedures
description: 'Implement the decisions concerning the management, operational,
and technical controls selected to mitigate identified risks.
Create policies that clearly establish roles and responsibilities, and assign
ultimate responsibility for the implementation of each control to particular
individuals or offices.
Create procedures to be followed to accomplish particular security-related
tasks.
Establish a frequency for reviewing policy and procedures'
- urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:node17
assessable: false
depth: 4
parent_urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:node16
name: Sample questions
description: 'Has the regulated entity documented an organizational risk assessment/management
policy that outlines the duties, responsible parties, frequency, and required
documentation of the risk management program?
Are policies and procedures in place for security?
Is there a formal (documented) system security plan?
Is there a formal contingency plan?
Is there a process for communicating policies and procedures to the affected
workforce members?
Are policies and procedures reviewed and updated as needed?'
- urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:node18
assessable: true
depth: 3
parent_urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:164.308(a)(1)
name: Develop and Implement a Sanction Policy
description: "Apply appropriate sanctions against workforce members who fail\
\ to comply with the security policies and procedures of the covered entity\
\ or business associate\n\nDevelop policies and procedures for imposing appropriate\
\ sanctions (e.g., reprimand, termination) for noncompliance with the organization\u2019\
s security policies.\n\nImplement sanction policy as cases arise."
- urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:node19
assessable: false
depth: 4
parent_urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:node18
name: Sample questions
description: 'Does the regulated entity have existing sanction policies and
procedures to meet the requirements of this implementation specification?
If not, can existing sanction policies be modified to include language related
to violations of these policies and procedures?
Is there a formal process in place to address system misuse, abuse, and fraudulent
activity?
Have workforce members been made aware of policies concerning sanctions for
inappropriate access, use, and disclosure of ePHI?
Has the need and appropriateness of a tiered structure of sanctions that accounts
for the magnitude of harm and possible types of inappropriate disclosures
been considered?
How will managers and workforce members be notified regarding suspect activity?'
- urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:node20
assessable: true
depth: 3
parent_urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:164.308(a)(1)
name: Implementation Specification (Required)
description: Apply appropriate sanctions against workforce members who fail
to comply with the security policies and procedures of the covered entity
or business associate
- urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:node21
assessable: false
depth: 4
parent_urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:node20
name: Sample questions
- urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:node22
assessable: true
depth: 3
parent_urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:164.308(a)(1)
name: Develop and Deploy the Information System Activity Review Process
description: 'Implement procedures to regularly review records of information
system activity, such as audit logs, access reports, and security incident
tracking reports.
Implement regular reviews of information system activity, and consider ways
to automate the review for the protection of ePHI.'
- urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:node23
assessable: false
depth: 4
parent_urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:node22
name: Sample questions
description: 'Is there a policy that establishes what reviews will be conducted?
Are there corresponding procedures that describe the specifics of the reviews?
Who is responsible for the overall process and results?
How often will reviews take place?
How often will review results be analyzed?
Has the regulated entity considered all available capabilities to automate
the reviews?
Where will audit information reside (e.g., separate server)? Will it be stored
external to the organization (e.g., cloud service provider)?'
- urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:node24
assessable: true
depth: 3
parent_urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:164.308(a)(1)
name: Implementation Specification (Required)
description: Implement procedures to regularly review records of information
system activity, such as audit logs, access reports, and security incident
tracking reports.
- urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:node25
assessable: false
depth: 4
parent_urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:node24
name: Sample questions
- urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:node26
assessable: true
depth: 3
parent_urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:164.308(a)(1)
name: Develop Appropriate Standard Operating Procedures
description: Determine the types of audit trail data and monitoring procedures
that will be needed to derive exception reports.
- urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:node27
assessable: false
depth: 4
parent_urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:node26
name: Sample questions
description: 'How will exception reports or logs be reviewed?
Where will monitoring reports and their reviews be documented and maintained?'
- urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:node28
assessable: true
depth: 3
parent_urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:164.308(a)(1)
name: Implement the Information System Activity Review and Audit Process
description: 'Activate the necessary review process.
Begin auditing and logging activity.'
- urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:node29
assessable: false
depth: 4
parent_urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:node28
name: Sample questions
description: 'What mechanisms will be implemented to assess the effectiveness
of the review process (measures)?
What is the plan to revise the review process when needed?'
- urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:164.308(a)(2)
assessable: false
depth: 2
parent_urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:164.308
ref_id: 164.308(a)(2)
description: 'Assigned Security Responsibility:
HIPAA Standard: Identify the security official who is responsible for the
development and implementation of the policies and procedures required by
this subpart for the covered entity or business associate.'
- urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:node31
assessable: true
depth: 3
parent_urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:164.308(a)(2)
name: Select a Security Official to be Assigned Responsibility for HIPAA Security
description: 'Identify the individual who has final responsibility for security.
Select an individual who is able to assess effective security to serve as
the point of contact for security policy, implementation, and monitoring.'
- urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:node32
assessable: false
depth: 4
parent_urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:node31
name: Sample questions
description: 'Who in the organization:
Does the security official have adequate access and communications with senior
officials in the organization, such as executives, chief information officers,
chief compliance officers, and in-house counsel?
Who in the organization is authorized to accept risks from systems on behalf
of the organization?'
- urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:node33
assessable: true
depth: 3
parent_urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:164.308(a)(2)
name: "Assign and Document the Individual\u2019s Responsibility"
description: "Document the assignment to one individual\u2019s responsibilities\
\ in a job description.\n\nCommunicate this assigned role to the entire organization."
- urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:node34
assessable: false
depth: 4
parent_urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:node33
name: Sample questions
description: 'Is there a complete job description that accurately reflects assigned
security duties and responsibilities?
Have the staff members in the organization been notified as to whom to call
in the event of a security problem?'
- urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:164.308(a)(3)
assessable: false
depth: 2
parent_urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:164.308
ref_id: 164.308(a)(3)
description: 'Workforce Security:
HIPAA Standard: Implement policies and procedures to ensure that all members
of its workforce have appropriate access to electronic protected health information,
as provided under paragraph (a)(4) of this section, and to prevent those workforce
members who do not have access under paragraph (a)(4) of this section from
obtaining access to electronic protected health information.'
- urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:node36
assessable: true
depth: 3
parent_urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:164.308(a)(3)
name: Implement Policies and Procedures for Authorization and/or Supervision
description: Implement procedures for the authorization and/or supervision of
workforce members who work with ePHI or in locations where it might be accessed.
- urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:node37
assessable: false
depth: 4
parent_urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:node36
name: Sample questions
description: 'Have chains of command and lines of authority been established?
Have staff members been made aware of the identity and roles of their supervisors?'
- urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:node38
assessable: true
depth: 3
parent_urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:164.308(a)(3)
name: Implementation Specification (Addressable)
description: Implement procedures for the authorization and/or supervision of
workforce members who work with ePHI or in locations where it might be accessed.
- urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:node39
assessable: false
depth: 4
parent_urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:node38
name: Sample questions
- urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:node40
assessable: true
depth: 3
parent_urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:164.308(a)(3)
name: Establish Clear Job Descriptions and Responsibilities
description: 'Define roles and responsibilities for all job functions.
Assign appropriate levels of security oversight, training, and access.
Identify in writing who has the business need and who has been granted permission
to view, alter, retrieve, and store ePHI and at what times, under what circumstances,
and for what purposes.'
- urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:node41
assessable: false
depth: 4
parent_urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:node40
name: Sample questions
description: 'Are there written job descriptions that are correlated with appropriate
levels of access to ePHI?
Are these job descriptions reviewed and updated on a regular basis?
Have staff members been provided copies of their job descriptions and informed
of the access granted to them, as well as the conditions by which this access
can be used'
- urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:node42
assessable: true
depth: 3
parent_urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:164.308(a)(3)
name: Establish Criteria and Procedures for Hiring and Assigning Tasks
description: 'Ensure that staff members have the necessary knowledge, skills,
and abilities to fulfill particular roles (e.g., positions involving access
to and use of sensitive information).
Ensure that these requirements are included as part of the personnel hiring
process.'
- urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:node43
assessable: false
depth: 4
parent_urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:node42
name: Sample questions
description: 'Have the qualifications of candidates for specific positions been
checked against the job description?
Have determinations been made that candidates for specific positions are able
to perform the tasks of those positions?'
- urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:node44
assessable: true
depth: 3
parent_urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:164.308(a)(3)
name: Establish a Workforce Clearance Procedure
description: 'Implement procedures to determine that the access of a workforce
member to ePHI is appropriate.
Implement appropriate screening of persons who will have access to ePHI.
Implement a procedure for obtaining clearance from appropriate offices or
individuals where access is provided or terminated.'
- urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:node45
assessable: false
depth: 4
parent_urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:node44
name: Sample questions
description: "Is there an implementation strategy that supports the designated\
\ access authorities?\n\nAre applicants\u2019 employment and educational references\
\ checked, if reasonable and appropriate?\n\nHave background checks been completed,\
\ if reasonable and appropriate?\n\nAre there procedures for determining that\
\ the appropriate workforce members have access to the necessary information?\n\
\nDo procedures exist for obtaining appropriate sign-offs to grant or terminate\
\ access to ePHI?\n\nHave clearance and supervision procedures been developed\
\ for non-US based workforce members that are applicable to their location?"
- urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:node46
assessable: true
depth: 3
parent_urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:164.308(a)(3)
name: Implementation Specification (Addressable)
description: Implement procedures to determine that the access of a workforce
member to ePHI is appropriate.
- urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:node47
assessable: false
depth: 4
parent_urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:node46
name: Sample questions
- urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:node48
assessable: true
depth: 3
parent_urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:164.308(a)(3)
name: Establish Termination Procedures
description: "Implement procedures for terminating access to ePHI when the employment\
\ of or other arrangement with a workforce member ends or as required by determinations\
\ made as specified in \xA7164.308(a)(3)(ii)(B).\n\nDevelop a standard set\
\ of procedures that should be followed to recover access control devices\
\ (e.g., identification badges, keys, access cards) when employment ends.\n\
\nDeactivate computer access accounts (e.g., disable user IDs and passwords)\
\ and facility access (e.g., change facility security codes/PINs)."
- urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:node49
assessable: false
depth: 4
parent_urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:node48
name: Sample questions
description: "Are there separate procedures for voluntary termination (e.g.,\
\ retirement, promotion, transfer, change of employment) versus involuntary\
\ termination (e.g., termination for cause, reduction in force, involuntary\
\ transfer, criminal or disciplinary actions), if reasonable and appropriate?\n\
\nIs there a standard checklist for all action items that should be completed\
\ when a workforce member leaves (e.g., return of all access devices, deactivation\
\ of logon accounts [including remote access], and delivery of any needed\
\ data solely under the employee\u2019s control)?\n\nDo other organizations\
\ need to be notified to deactivate accounts that the workforce member had\
\ access to in the performance of their employment duties?"
- urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:node50
assessable: true
depth: 3
parent_urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:164.308(a)(3)
name: Implementation Specification (Addressable)
description: "Implement procedures for terminating access to ePHI when the employment\
\ of or other arrangement with a workforce member ends or as required by determinations\
\ made as specified in \xA7164.308(a)(3)(ii)(B)."
- urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:node51
assessable: false
depth: 4
parent_urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:node50
name: Sample questions
- urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:164.308(a)(4)
assessable: false
depth: 2
parent_urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:164.308
ref_id: 164.308(a)(4)
description: 'Information Access Management:
HIPAA Standard: Implement policies and procedures for authorizing access to
electronic protected health information that are consistent with the applicable
requirements of subpart E of this part.'
- urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:node53
assessable: true
depth: 3
parent_urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:164.308(a)(4)
name: Isolate Healthcare Clearinghouse Functions
description: 'If a healthcare clearinghouse is part of a larger organization,
the clearinghouse must implement policies and procedures that protect the
ePHI of the clearinghouse from unauthorized access by the larger organization.
Determine whether a component of the regulated entity constitutes a healthcare
clearinghouse under the HIPAA Security Rule.
If no clearinghouse functions exist, document this finding. If a clearinghouse
exists within the organization, implement procedures for access that are consistent
with the HIPAA Privacy Rule.'
- urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:node54
assessable: false
depth: 4
parent_urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:node53
name: Sample questions
description: 'If healthcare clearinghouse functions are performed, are policies
and procedures implemented to protect ePHI from the other functions of the
larger organization?
Does the healthcare clearinghouse share hardware or software with a larger
organization of which it is a part?
Does the healthcare clearinghouse share staff or physical space with staff
from a larger organization?
Has a separate network or subsystem been established for the healthcare clearinghouse,
if reasonable and appropriate?
Has staff of the healthcare clearinghouse been trained to safeguard ePHI from
disclosure to the larger organization, if required for compliance with the
HIPAA Privacy Rule?'
- urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:node55
assessable: true
depth: 3
parent_urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:164.308(a)(4)
name: Implementation Specification (Required)
description: If a healthcare clearinghouse is part of a larger organization,
the clearinghouse must implement policies and procedures that protect the
ePHI of the clearinghouse from unauthorized access by the larger organization.
- urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:node56
assessable: false
depth: 4
parent_urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:node55
name: Sample questions
- urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:node57
assessable: true
depth: 3
parent_urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:164.308(a)(4)
name: Implement Policies and Procedures for Authorizing Access
description: 'Implement policies and procedures for granting access to ePHI,
such as through access to a workstation, transaction, program, process, or
other mechanism.
Decide and document procedures for how access to ePHI will be granted to workforce
members within the organization.
Select the basis for restricting access to ePHI.
Select an access control method (e.g., identity-based, role-based, or other
reasonable and appropriate means of access.)
Decide and document how access to ePHI will be granted for privileged functions.
Ensure that there is a list of personnel with authority to approve user requests
to access ePHI and systems with ePHI.
Identify authorized users with access to ePHI, including data owners and data
custodians.
Consider whether multiple access control methods are needed to protect ePHI
according to the results of the risk assessment.
Determine whether direct access to ePHI will ever be appropriate for individuals
external to the organization (e.g., business partners or patients seeking
access to their own ePHI).'
- urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:node58
assessable: false
depth: 4
parent_urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:node57
name: Sample questions
description: "Have appropriate authorization and clearance procedures, as specified\
\ in Workforce Security (\xA7 164.308(a)(3)), been performed prior to granting\
\ access?\n\nDo the organization\u2019s systems have the capacity to set access\
\ controls?\n\nAre there documented job descriptions that accurately reflect\
\ assigned duties and responsibilities and enforce segregation of duties?\n\
\nHas the organization documented procedures that specify how authorized personnel\
\ will be granted access to ePHI?\n\nDoes the organization grant remote access\
\ to ePHI?\n\nWhat methods of access control are used (e.g., identity-based,\
\ role-based, location-based, or a combination) to protect ePHI?\n\nAre there\
\ additional access control requirements for users who will be accessing privileged\
\ functions?\n\nHave organizational personnel been explicitly authorized to\
\ approve user requests to access ePHI and/or systems with ePHI?"
- urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:node59
assessable: true
depth: 3
parent_urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:164.308(a)(4)
name: Implementation Specification (Addressable)
description: Implement policies and procedures for granting access to ePHI,
such as through access to a workstation, transaction, program, process, or
other mechanism.
- urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:node60
assessable: false
depth: 4
parent_urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:node59
name: Sample questions
- urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:node61
assessable: true
depth: 3
parent_urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:164.308(a)(4)
name: Implement Policies and Procedures for Access Establishment and Modification
description: "Implement policies and procedures that \u2013 based on the covered\
\ entity or business associate\u2019s access authorization policies \u2013\
\ establish, document, review, and modify a user's right of access to a workstation,\
\ transaction, program, or process.\n\nEstablish standards for granting access\
\ to ePHI.\n\nProvide formal authorization from the appropriate authority\
\ before granting access to ePHI.\n\nRegularly review personnel access to\
\ ePHI to ensure that access is still authorized and needed.\n\nModify personnel\
\ access to ePHI, as needed, based on review activities."
- urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:node62
assessable: false
depth: 4
parent_urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:node61
name: Sample questions
description: 'Are duties separated such that only the minimum necessary ePHI
is made available to each workforce member based on their job requirements?
Are access decisions justified, approved, logged, and retained?
Is personnel access to ePHI regularly reviewed to ensure that access is still
authorized and needed?
Are activities that review access to ePHI logged and retained, including decisions
that arise from review activities?
Are decisions related to the establishment and modification of workforce member
authorization to access ePHI documented?'
- urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:node63
assessable: true
depth: 3
parent_urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:164.308(a)(4)
name: Implementation Specification (Addressable)
description: "Implement policies and procedures that \u2013 based on the covered\
\ entity or business associate\u2019s access authorization policies \u2013\
\ establish, document, review, and modify a user's right of access to a workstation,\
\ transaction, program, or process."
- urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:node64
assessable: false
depth: 4
parent_urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:node63
name: Sample questions
- urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:node65
assessable: true
depth: 3
parent_urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:164.308(a)(4)
name: Evaluate Existing Security Measures Related to Access Controls
description: 'Evaluate the security features of access controls that are already
in place or those of any planned for implementation, as appropriate.
Determine whether these security features involve alignment with other existing
management, operational, and technical controls, such as policy standards,
personnel procedures, the maintenance and review of audit trails, the identification
and authentication of users, and physical access controls.'
- urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:node66
assessable: false
depth: 4
parent_urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:node65
name: Sample questions
description: 'Are there policies and procedures related to the security of access
controls? If so, are they updated regularly?
Are authentication mechanisms used to verify the identity of those accessing
systems protected from inappropriate manipulation?
Does management regularly review the list of access authorizations, including
remote access authorizations, to verify that the list is accurate and has
not been inappropriately altered?[1]'
- urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:164.308(a)(5)
assessable: false
depth: 2
parent_urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:164.308
ref_id: 164.308(a)(5)
description: 'Security Awareness and Training:
HIPAA Standard: Implement a security awareness and training program for all
members of its workforce (including management).'
- urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:node68
assessable: true
depth: 3
parent_urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:164.308(a)(5)
name: Conduct a Training Needs Assessment
description: 'Determine the training needs of the organization.
Interview and involve key personnel in assessing security training needs.
Use feedback and analysis of past events to help determine training needs
Review organizational behavior issues, past incidents, and/or breaches to
determine what training is missing or needs reinforcement, improvement, or
periodic reminders.'
- urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:node69
assessable: false
depth: 4
parent_urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:node68
name: Sample questions
description: 'What awareness, training, and education programs are needed? Which
are required?
Is the organization monitoring current threats to determine possible areas
of training needs?
Are there current, relevant threats (e.g., phishing, ransomware) about which
personnel need training?
Do workforce members need training on any particular organization devices
(e.g., medical IoT) or technology that pose a risk to ePHI?
What is the current status regarding how these needs are being addressed (e.g.,
how well are current efforts working)?
Where are the gaps between the needs and what is being done (e.g., what more
needs to be done)?
What are the training priorities in terms of content and audience?'
- urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:node70
assessable: true
depth: 3
parent_urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:164.308(a)(5)
name: Develop and Approve a Training Strategy and a Plan
description: "Address the specific HIPAA policies that require security awareness\
\ and training in the security awareness and training program.\n\nSet organizational\
\ expectations for protecting ePHI.\n\nIn the security awareness and training\
\ program, outline the program\u2019s scope, goals, target audiences, learning\
\ objectives, deployment methods, and evaluation and measurement techniques,\
\ as well as the frequency of training"
- urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:node71
assessable: false
depth: 4
parent_urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:node70
name: Sample questions
description: 'Is there a procedure in place to ensure that everyone in the organization
receives security awareness training, including teleworkers and remote personnel?
What type of security training is needed to address specific technical topics
based on job responsibility?
When should training be scheduled to ensure that compliance deadlines are
met?
Has the organization considered the training needs of non-employees (e.g.,
contractors, interns)?
Is there a need to implement information security training tailored to individual
roles?'
- urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:node72
assessable: true
depth: 3
parent_urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:164.308(a)(5)
name: Protection from Malicious Software, Login Monitoring, and Password Management
description: "As reasonable and appropriate, train workforce members regarding\
\ procedures for:\n\nIncorporate information concerning workforce members\u2019\
\ roles and responsibilities in implementing these implementation specifications\
\ into training and awareness efforts."
- urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:node73
assessable: false
depth: 4
parent_urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:node72
name: Sample questions
description: 'Do workforce members know the importance of the timely application
of system patches to protect against malicious software and the exploitation
of vulnerabilities?
Are workforce members aware that login attempts may be monitored?
Do workforce members who monitor login attempts know to whom to report discrepancies?
Do workforce members understand their roles and responsibilities in selecting
a password of appropriate strength, safeguarding their password, and changing
a password when it has been compromised or is suspected of being compromised?
Are there policies in place that prohibit workforce members from sharing passwords
with others?'
- urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:node74
assessable: true
depth: 3
parent_urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:164.308(a)(5)
name: Implementation Specification (Protection from Malicious Software)
description: 'As reasonable and appropriate, train workforce members regarding
procedures for:'
- urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:node75
assessable: false
depth: 4
parent_urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:node74
name: Sample questions
- urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:node76
assessable: true
depth: 3
parent_urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:164.308(a)(5)
name: Implementation Specification (Log-in Monitoring)
description: 'As reasonable and appropriate, train workforce members regarding
procedures for:'
- urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:node77
assessable: false
depth: 4
parent_urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:node76
name: Sample questions
- urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:node78
assessable: true
depth: 3
parent_urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:164.308(a)(5)
name: Implementation Specification (Password Management)
description: 'As reasonable and appropriate, train workforce members regarding
procedures for:'
- urn: urn:intuitem:risk:req_node:nist-sp-800-66-rev2:node79
assessable: false