Implement hardware, software, and procedural mechanisms that record and examine activity in systems containing ePHI
Audit logging is fundamental to accountability: you cannot investigate a breach if you have no record of who accessed what and when. HIPAA requires covered entities to implement technical mechanisms to record activity in systems that contain ePHI. This includes login and logoff events, record access and modifications, user provisioning changes, and failed access attempts. Audit logs must be retained for a sufficient period to support breach investigations and reviewed regularly for suspicious activity.
Implementation steps
- 1
Enable audit logging on all ePHI systems
Configure all systems containing ePHI to generate audit logs capturing: user login and logoff, access to patient records (view, create, modify, delete), failed access attempts, administrative actions such as user provisioning, and system events. Verify that logging is enabled and generating records for all relevant activity.
splunk microsoft-sentinel aws-cloudtrail azure-monitor - 2
Centralize and retain audit logs
Aggregate audit logs from all ePHI systems into a centralized logging system. Logs should be retained for at minimum 6 years (aligned with HIPAA's documentation retention requirement). Ensure logs are protected from modification or deletion: logs stored in a centralized system with write-once controls are harder to tamper with.
splunk microsoft-sentinel aws-cloudwatch-logs datadog - 3
Review audit logs regularly
Establish procedures for regular review of audit logs. High-risk events (mass record downloads, after-hours access, access to records of VIP patients) should generate automated alerts. Periodic manual reviews should look for patterns that automated rules miss. Document review activities and any findings.
splunk microsoft-sentinel datadog
Evidence required
Audit logging configuration
Evidence that audit logging is enabled and capturing required events.
- - Logging configuration for EHR or ePHI systems
- - SIEM ingestion configuration
- - Audit log sample showing required event types
Log retention policy
Documentation of how long logs are retained and where they are stored.
- - Log retention policy
- - SIEM retention configuration
Log review records
Evidence that logs are reviewed.
- - Scheduled log review reports
- - Alerting rules and triggered alert records
Related controls
Implement technical policies and procedures to allow access to ePHI only to authorized persons or software programs
Access Control
Implement policies and procedures to protect ePHI from improper alteration or destruction
Integrity
Implement procedures to verify that a person or entity seeking access to ePHI is who they claim to be
Person or Entity Authentication
Implement technical security measures to guard against unauthorized access to ePHI transmitted over electronic communications networks
Transmission Security