Implement policies and procedures for authorizing access to ePHI
Access to ePHI must be granted based on the minimum necessary standard: workforce members should access only the ePHI they need to perform their job functions. This requires formal procedures for authorizing access, establishing the access each role is permitted, and modifying or removing access when roles change. Proper information access management prevents both accidental exposure and intentional misuse of ePHI by limiting the blast radius of any one account being compromised or misused.
Implementation steps
- 1
Define access authorization procedures
Establish written procedures for who can authorize access to ePHI systems, what information is required to request access, and what criteria must be met. Access should require both a business need and management approval. Define roles or job functions with standard access packages to simplify provisioning while enforcing least privilege.
confluence okta azure-ad - 2
Establish and document access levels by role
Document which ePHI systems and data each role can access and at what permission level (read, write, delete, admin). Use role-based access control so permissions are tied to job functions rather than individuals. Review and update the role definitions when job functions change.
okta azure-ad confluence excel - 3
Implement access modification procedures
Define procedures for modifying access when a workforce member changes roles. A promotion, department transfer, or job function change may require granting new access and revoking old access. Establish a process so that role changes trigger an access review rather than simply adding new permissions on top of existing ones.
servicenow jira okta
Evidence required
Access authorization policy
Written policy defining how access to ePHI is authorized.
- - Information access management policy
- - Access control policy with role definitions
Role-based access control configuration
Evidence that access is managed by role or job function.
- - Identity management system role configurations
- - Access matrix mapping roles to ePHI systems
Related controls
Implement procedures to ensure workforce members have appropriate access to ePHI and prevent unauthorized access
Workforce Security
Implement policies and procedures to limit physical access to electronic information systems and the facilities where they are housed
Facility Access Controls
Implement technical policies and procedures to allow access to ePHI only to authorized persons or software programs
Access Control
Implement policies and procedures to protect ePHI from improper alteration or destruction
Integrity