Access control

MedStack Confidential

Metadata

Automate access control management for access

CodeSectionTitle
ISO A.9.4.1 Information access restriction
ISO A.9.2.4 Management of secret authentication information of users
HIPAA 164.308(a)(4)(ii)(C) Access establishment and modification (Addressable)

Grant, modify, and terminate user access

CodeSectionTitle
ISO A.9.1.2 Access to networks and network services
ISO A.9.2.1 User registration and de-registration
ISO A.9.2.2 User access provisioning
ISO A.9.2.3 Management of privileged access rights
ISO A.9.2.6 Removal or adjustment of access rights
CHI SR60 Timely Revocation of Access Privileges
HIPAA 164.308(a)(4)(ii)(B) Access authorization (Addressable)

Secret authentication information

CodeSectionTitle
ISO A.9.3.1 Use of secret authentication information
ISO A.9.4.3 Password management system
HIPAA 164.308(a)(5)(ii)(D) Password management (Addressable)

Logging in and out

CodeSectionTitle
ISO A.9.4.2 Secure log-on procedures
HIPAA 164.312(a)(2)(iii) Automatic logoff (Addressable)
HIPAA 164.312(d) Standard: Person or entity authentication
SOC2 CC6.1 The entity implements logical access security software, infrastructure, and architectures over protected information assets to protect them from security events to meet the entity's objectives.
SOC2 CC6.1 The entity implements logical access security software, infrastructure, and architectures over protected information assets to protect them from security events to meet the entity's objectives.
SOC2 CC6.6 The entity implements logical access security measures to protect against threats from sources outside its system boundaries.

Restrict use of admin utilities

CodeSectionTitle
ISO A.9.4.4 Use of privileged utility programs
CHI SR68 Controlling Access to EHRi System Utilities

Review access grants regularly

CodeSectionTitle
ISO A.9.2.5 Review of user access rights
CHI SR56 Reviewing User Registration Details
SOC2 CC6.2 Prior to issuing system credentials and granting system access, the entity registers and authorizes new internal and external users whose access is administered by the entity. For those users whose access is administered by the entity, user system credentials are removed when user access is no longer authorized.

Unique user IDs

CodeSectionTitle
HIPAA 164.312(a)(2)(i) Unique user identification (Required)

Enforcement

References

CodeSectionTitle
ISO A.9 Access control
ISO A.9.1 Business requirements for access control
ISO A.9.1.1 Access control policy
ISO A.9.2 User access management
ISO A.9.3 User responsibilities
ISO A.9.4 System and application access control
HIPAA 164.308(a)(4)(i) Standard: Information access management
HIPAA 164.308(a)(4)(ii)(A) Isolating health care clearinghouse functions (Required)
HIPAA 164.312(a) Standard: Access control
SOC2 CC6.1 The entity implements logical access security software, infrastructure, and architectures over protected information assets to protect them from security events to meet the entity's objectives.
SOC2 CC6.1 The entity implements logical access security software, infrastructure, and architectures over protected information assets to protect them from security events to meet the entity's objectives.