Security Management Information System Activity Review, v1.0

Specifies that a health care related organization must implement procedures to regularly review information system activity (i.e., audit logs, access reports, and security incident tracking reports).

Assessment Step

1
Activity Records Review (ActivityRecordsReview)
Does the covered entity or business associate, in accordance with Section 164.306 (Security standards: General rules), implement procedures to regularly review records of information system activity, such as audit logs, access reports, and security incident tracking reports?
Artifact
A1
Provide evidence (e.g. organizational policies, procedures, compliance/assessment reports, etc.) that support the assessor's response to this assessment step.
Standard: Security management process. Implement policies and procedures to prevent, detect, contain, and correct security violations.

Conformance Criteria (1)

Review Records of System Activity
The covered entity or business associate must, in accordance with Section 164.306 (Security standards: General rules), implement procedures to regularly review records of information system activity, such as audit logs, access reports, and security incident tracking reports.
Citation
HIPAA-Security-Rule
45 CFR Section 164.308(a)(1)(ii)(D)