Logging and monitoring

MedStack Confidential

Metadata

Log events automatically on all operational systems

Protect the logs

Retain logs until whichever comes first

Log service activity on all systems that handle PHI

Synchronize the clocks of servers

Enforcement

References

CodeSectionTitleText
ISO A.12.4 Logging and monitoring To record events and generate evidence.
HIPAA 164.308(a)(1)(ii)(D) Information system activity review (1) (i) Standard: Security management process. Implement policies and procedures to prevent, detect, contain, and correct security violations. (ii) Implementation specifications: (A) Risk analysis (Required). Conduct an accurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality, integrity, and availability of electronic protected health information held by the covered entity or business associate. (B) Risk management (Required). Implement security measures sufficient to reduce risks and vulnerabilities to a reasonable and appropriate level to comply with ยง 164.306(a). (C) Sanction policy (Required). Apply appropriate sanctions against workforce members who fail to comply with the security policies and procedures of the covered entity or business associate. (D) Information system activity review (Required). Implement procedures to regularly review records of information system activity, such as audit logs, access reports, and security incident tracking reports.
HIPAA 164.308(a)(5)(ii)(C) Log-in monitoring (i)Standard: Security awareness and training. Implement a security awareness and training program for all members of its workforce (including management). (ii)Implementation specifications. Implement: (A) Security reminders (Addressable). Periodic security updates. (B) Protection from malicious software (Addressable). Procedures for guarding against, detecting, and reporting malicious software. (C) Log-in monitoring (Addressable). Procedures for monitoring log-in attempts and reporting discrepancies. (D) Password management (Addressable). Procedures for creating, changing, and safeguarding passwords.
HIPAA 164.312(b) Audit controls Standard: Audit controls. Implement hardware, software, and/or procedural mechanisms that record and examine activity in information systems that contain or use electronic protected health information.
OWASP Logging Cheat Sheet
NIST Special Publication 800-92 Guide to Computer Security Log Management