Skip to content

Implement Audit Logging #5

@suhasramanand

Description

@suhasramanand

Implement hardware, software, and/or procedural mechanisms that record and examine activity in information systems that contain or use ePHI.

Acceptance criteria

  • Log all access attempts (successful and failed)
  • Log all user authentication events
  • Log modifications to ePHI
  • Timestamp, user ID, action, resource accessed, source IP
  • 6-year retention
  • Tamper-evident

Source: § 2.2.1

Covered entities MUST implement hardware, software, and/or procedural mechanisms that record and examine activity in information systems that contain or use ePHI.

Metadata

Metadata

Assignees

No one assigned

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions