Network security management

MedStack Confidential

Metadata

Manage and control networks

CodeSectionTitle
ISO A.13.1.1 Network controls
SOC2 CC6.6 The entity implements logical access security measures to protect against threats from sources outside its system boundaries.
SOC2 CC6.6 The entity implements logical access security measures to protect against threats from sources outside its system boundaries.

Segregate the networks of each each customer using virtual networks

CodeSectionTitle
ISO A.13.1.3 Segregation in networks
CHI SR66 Segregating EHRi Network Users, Services and Systems
CHI SR67 Controlling Routing on EHRi Networks
SOC2 CC6.1 The entity implements logical access security software, infrastructure, and architectures over protected information assets to protect them from security events to meet the entity's objectives.

Use firewalls on all virtual networks and servers

CodeSectionTitle
CHI SR65 Controlling Access to EHRi Network Diagnostics and Network Management Services
SOC2 CC6.6 The entity implements logical access security measures to protect against threats from sources outside its system boundaries.

Enforcement

References

CodeSectionTitle
ISO A.13.1 Network Security Management
SOC2 CC6.7 The entity restricts the transmission, movement, and removal of information to authorized internal and external users and processes, and protects it during transmission, movement, or removal to meet the entity’s objectives.
SOC2 CC6.7 The entity restricts the transmission, movement, and removal of information to authorized internal and external users and processes, and protects it during transmission, movement, or removal to meet the entity’s objectives.