|
Specification & Description |
Current Status |
Proposed Status |
Change |
|
Risk Analysis & Risk Management (annual, detailed); Written, detailed annual risk analysis referencing asset inventory and network map; risk management plan documented. |
Required |
Required |
No change |
|
Technology Asset Inventory & Network Map; Written inventory of technology assets and a network map of ePHI data flows; updated at least annually and upon changes. |
|
Required |
New requirement for Covered Entity (CE) and Business Associate (BA) |
|
Assigned Security Responsibility; Designation of a security official with documented duties and authority. |
Required |
Required |
No change |
|
Workforce Security (clearance/authorization & termination within 1 hour); Written policies for granting/terminating access; access terminated within one hour of separation. |
Addressable |
Required |
Access termination time requirement is new |
|
Information Access Management; Documented policies and procedures governing role-based access to ePHI |
Addressable |
Required |
Now Required |
|
Security Awareness Training; Formal, documented training program for all workforce members |
Addressable |
Required |
New workforce members must receive training within 30 days. |
| Incident Response & Reporting (72-hour restoration objective); Documented incident response plan; procedures to restore affected systems and ePHI within 72 hours; annual incident reviews | Required | Required | Restoration required within 72 hours. Incident reviews every 12 months. |
| Contingency Plan (backup, disaster recovery, emergency operations, criticality analysis); Documented contingency planning including criticality analysis to prioritize restoration; BA must notify covered entity within 24 hours of plan activation | Required | Required | BA must notify CE within 24 hours of activation |
| Evaluation (annual compliance audit); Annual documented evaluation/audit of Security Rule compliance | Required | New requirement for CE and BA | |
| Business Associate Oversight (annual verification & 24-hour contingency activation notice); BA and subcontractors provide annual written verification of deployed technical safeguards; BA must notify CA within 24 hours of activating contingency plan. | Required | New Requirement | |
| Facility Access Controls; Controls to limit physical access to systems and facilities containing ePHI; documented. | Addressable | Required | Controls must be documented |
| Workstation & Device Security; Policies for secure workstation use/configuration; device security documented. | Addressable | Required | Controls must be documented |
| Device & Media Controls; Procedures for disposal, reuse, and movement of hardware/media containing ePHI. | Required | Required | Controls must be documented |
| Access Control (unique IDs, emergency access, automatioc logoff; Documented access control mechanisms including unique IDs,, emergency access procedures, and automatic logoff | Addressable | Required | Controls must be documented |
| Multi-Factor Authentication (MFA); MFA required for all access to systems containing ePHI | Required with limit exceptions | New requirement. Limited exception | |
| Audit Controls; Systems to record an examine activity in systems that contain or use ePHI documented | Required | Required | Controls must be documented |
| Integrity Controls; Technical measures to guard against improper alteration or destruction of ePHI; documented. | Addressable | Required | Controls must be documented |
| Person/Entity Authentication; Mechanisms to verify identity before granting access to ePHI; strengthen via MFA | Addressable | Required | MFA required |
| Transmission Security (encryption in transit and at rest); Encryption required for ePHI in transit and at rest; limited exceptions must be documented. | Addressable | Required with limited exceptions | Now required |
| Vulnerability Management (scans & pen testing); Scan for vulnerabilities at least every six months and conduct penetration tests annually; test effectiveness of certain measures annually. | Required | New requirement | |
| Configuration Management & Secure Deployment; Establish and deploy technical controls for consistent configuration of relevant systems; verify ongoing operation of controls. | Required | New requirement | |
| Backup & Recovery Controls; Separate technical controls to protect backups and recovery systems for ePHI and relevant systems. | Addressable | Required | Procedures to ensure recovery of relevant systems within 72 hours |
| Group Health Plan Safeguards; Formal safeguards and documentation for PHI used by group health plans. | Required | New requirement | |
| Comprehensive Written Documentation & Retention; All policies, procedures, analyses, inventories, maps, audits, incident reviews, contingency plans, BA verifications must be documented and retained. | Required | Required | Verification of BA's and subcontractors |