HIPAA Security Implementation, Version 1.0

6.8 SYSTEM / NETWORK TECHNICAL ARCHITECTURE

The design of an organization's infrastructure can go a long way toward mitigating many security risks. It should be documented in a standardized fashion that allows entity staff to comprehend the IT infrastructure, the network (configuration and topology), network traffic, and associated communication systems. This category includes, but is not limited to:

[3] Security configuration management is defined as measures, practices and procedures for the security of information systems that should be coordinated and integrated with each other and other measures, practices and procedures of the organization so as to create a coherent system of security.

[4] Data authentication is a means to corroborate that data has not been altered or destroyed in an unauthorized manner

Категории