[fusion_builder_container hundred_percent=”no” equal_height_columns=”no” menu_anchor=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” background_color=”” background_image=”” background_position=”center center” background_repeat=”no-repeat” fade=”no” background_parallax=”none” enable_mobile=”no” parallax_speed=”0.3″ video_mp4=”” video_webm=”” video_ogv=”” video_url=”” video_aspect_ratio=”16:9″ video_loop=”yes” video_mute=”yes” overlay_color=”” overlay_opacity=”0.5″ video_preview_image=”” border_size=”” border_color=”” border_style=”solid” margin_top=”” margin_bottom=”” padding_top=”” padding_right=”” padding_bottom=”” padding_left=””][fusion_builder_row][fusion_builder_column type=”1_1″ layout=”1_1″ spacing=”” center_content=”no” hover_type=”none” link=”” min_height=”” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” class=”” id=”” background_color=”” background_image=”” background_position=”left top” background_repeat=”no-repeat” border_size=”0″ border_color=”” border_style=”solid” border_position=”all” padding=”” dimension_margin=”” animation_type=”” animation_direction=”left” animation_speed=”0.3″ animation_offset=”” last=”no”][fusion_text]

OCR recently published its January Cyber Awareness Newsletter that provides guidance on how organizations should comply with the audit controls standard. The HIPAA Security Rule (45 CFR 164.312(b)) requires a covered entity or business associate to implement hardware, software, and/or procedural mechanisms that record and examine activity in electronic information systems that contain or use electronic protected health information. Often overlooked, demonstrating compliance with the Audit Controls Standard and evidence of information system activity reviews are a key feature in OCR’s investigations into breaches involving hacking and ransomware incidents.

OCR refers to guidance authored by the National Institute of Standards and Technology (NIST) Guide to Computer Security (NIST SP-800-12) that explains audit logs are records of events based on applications, users, and systems, and audit trails involve audit logs of applications, users, and systems. Audit trails’ main purpose is to maintain a record of system activity by application processes and by user activity within systems and applications. Effective audit controls produce audit reports that work in conjunction with audit logs and audit trails.

Audit logs and trails assist covered entities and business associates with reducing risk associated with:

As part of this process, covered entities and business associates should consider which audit tools may best help them with reducing non-useful information contained in audit records, as well as with extracting useful information.

The enterprise-wide information security risk analysis that is periodically performed by every covered entity and business associate is critical to identifying the information that should be collected from an audit log and how often the audit reports should be reviewed. During the risk analysis, a covered entity needs to define the reasons for establishing audit trail mechanisms and procedures for its electronic information systems that contain or use electronic protected health information. These reasons may include, but are not limited to:

The OCR blog post on audit controls does not guide on the issue of data retention requirements for access logs and audit trails. However, a good rule of thumb is that organizations should have policies and processes that ensure access logs are retained long enough to be reviewed for inappropriate access or usage. Log files that are evidence of improper access or security incident must be retained for the six year HIPAA document retention period. Audit logs must be retained for the six year document retention period because they are evidence of actions taken to comply with the requirements of the Security Rule.

If you have questions about performing a system audit or evaluating effective audit controls please contact us at advisory@cynergistek.com.