Access control

MedStack Confidential

Metadata

Automate access control management for access

Grant, modify, and terminate user access

Secret authentication information

Logging in and out

Restrict use of admin utilities

CodeSectionTitleText
ISO A.9.4.4 Use of privileged utility programs The use of utility programs that might be capable of overriding system and application controls shall be restricted and tightly controlled.
CHI SR68 Controlling Access to EHRi System Utilities Organizations hosting components of the EHRi must restrict and control the use of system utility programs.

Review access grants quarterly

CodeSectionTitleText
CHI SR56 Reviewing User Registration Details All organizations connecting to the EHRi should periodically review user registration details to ensure that they are complete and accurate and that access to the EHRi is still required.
ISO A.9.2.5 Review of user access rights Asset owners shall review users’ access rights at regular intervals.

Unique user IDs

Enforcement

References

CodeSectionTitleText
ISO A.9 Access control
ISO A.9.1 Business requirements for access control Objective: To limit access to information and information processing facilities.
ISO A.9.1.1 Access control policy An access control policy shall be established, documented and reviewed based on business and information security requirements.
ISO A.9.2 User access management Objective: To ensure authorized user access and to prevent unauthorized access to systems and services.
ISO A.9.3 User responsibilities Objective: To make users accountable for safeguarding their authentication information.
ISO A.9.4 System and application access control Objective: To prevent unauthorized access to systems and applications.
HIPAA 164.308(a)(4) Information access management (i) Standard: Information access management. Implement policies and procedures for authorizing access to electronic protected health information that are consistent with the applicable requirements of subpart E of this part. (ii) Implementation specifications: (A) Isolating health care clearinghouse functions (Required). If a health care clearinghouse is part of a larger organization, the clearinghouse must implement policies and procedures that protect the electronic protected health information of the clearinghouse from unauthorized access by the larger organization. (B) Access authorization (Addressable). Implement policies and procedures for granting access to electronic protected health information, for example, through access to a workstation, transaction, program, process, or other mechanism. (C) Access establishment and modification (Addressable). Implement policies and procedures that, based upon the covered entity's or the business associate's access authorization policies, establish, document, review, and modify a user's right of access to a workstation, transaction, program, or process.
HIPAA 164.312(a) Access control (1) Standard: Access control. Implement technical policies and procedures for electronic information systems that maintain electronic protected health information to allow access only to those persons or software programs that have been granted access rights as specified in § 164.308(a)(4). (2) Implementation specifications: (i) Unique user identification (Required). Assign a unique name and/or number for identifying and tracking user identity. (ii) Emergency access procedure (Required). Establish (and implement as needed) procedures for obtaining necessary electronic protected health information during an emergency. (iii) Automatic logoff (Addressable). Implement electronic procedures that terminate an electronic session after a predetermined time of inactivity. (iv) Encryption and decryption (Addressable). Implement a mechanism to encrypt and decrypt electronic protected health information.