From healthcare-privacy-skills
Guides implementation of HIPAA Security Rule §164.312 technical safeguards for ePHI, covering access controls (unique user ID, emergency access, auto logoff), encryption, audit/integrity controls, transmission security.
npx claudepluginhub mukul975/privacy-data-protection-skills --plugin healthcare-privacy-skillsThis skill uses the workspace's default tool permissions.
The HIPAA Security Rule establishes national standards for protecting electronic protected health information (ePHI) that is created, received, used, or maintained by a covered entity or business associate. Published as a final rule on February 20, 2003 (68 FR 8334), with compliance required by April 20, 2005 (April 20, 2006 for small health plans), the Security Rule operationalizes the Privacy...
Acquire memory dumps from live systems/VMs and analyze with Volatility 3 for processes, networks, DLLs, injections in incident response or malware hunts.
Provides x86-64/ARM disassembly patterns, calling conventions, control flow recognition for static analysis of executables and compiled binaries.
Identifies anti-debugging checks like IsDebuggerPresent, NtQueryInformationProcess in Windows binaries; suggests bypasses via patches/hooks/scripts for malware analysis, CTFs, authorized RE.
The HIPAA Security Rule establishes national standards for protecting electronic protected health information (ePHI) that is created, received, used, or maintained by a covered entity or business associate. Published as a final rule on February 20, 2003 (68 FR 8334), with compliance required by April 20, 2005 (April 20, 2006 for small health plans), the Security Rule operationalizes the Privacy Rule's confidentiality protections through administrative, physical, and technical safeguards. The rule adopts a risk-based, technology-neutral approach — it specifies what must be achieved but allows flexibility in how covered entities implement protections based on their size, complexity, and capabilities.
The Security Rule applies only to ePHI, unlike the Privacy Rule which covers PHI in all forms. The rule organizes its requirements into three safeguard categories (administrative §164.308, physical §164.310, technical §164.312) plus organizational requirements (§164.314) and policies/procedures/documentation (§164.316).
Technical safeguards are the technology and related policies and procedures that protect ePHI and control access to it. Each standard has required implementation specifications (mandatory) and addressable implementation specifications (must be implemented if reasonable and appropriate, with documented rationale if an alternative measure is adopted or the specification is not implemented).
Standard: Implement technical policies and procedures for electronic information systems that maintain ePHI to allow access only to those persons or software programs that have been granted access rights.
| Implementation Specification | Type | Requirement |
|---|---|---|
| Unique User Identification — §164.312(a)(2)(i) | Required | Assign a unique name and/or number for identifying and tracking user identity |
| Emergency Access Procedure — §164.312(a)(2)(ii) | Required | Establish and implement procedures for obtaining necessary ePHI during an emergency |
| Automatic Logoff — §164.312(a)(2)(iii) | Addressable | Implement electronic procedures that terminate an electronic session after a predetermined time of inactivity |
| Encryption and Decryption — §164.312(a)(2)(iv) | Addressable | Implement a mechanism to encrypt and decrypt ePHI |
Every workforce member, administrator, and system account accessing ePHI must have a unique identifier. Shared accounts and generic logins are prohibited.
Asclepius Health Network Implementation:
[first initial][last name][employee number] (e.g., jsmith4821)svc-[application]-[function] (e.g., svc-epic-hl7)adm-jsmith4821)Covered entities must have documented procedures for accessing ePHI during emergencies when normal access controls cannot function.
Asclepius Health Network Implementation:
Asclepius Health Network Implementation:
Although addressable, OCR has consistently found that failing to encrypt ePHI without documented equivalent alternative measures constitutes a Security Rule violation.
Asclepius Health Network Implementation:
Standard: Implement hardware, software, and/or procedural mechanisms that record and examine activity in information systems that contain or use ePHI.
No implementation specifications are designated — the standard itself is required.
Asclepius Health Network Implementation:
What is logged:
Log management:
Audit triggers and alerts:
| Trigger | Response SLA | Action |
|---|---|---|
| 5+ failed login attempts in 10 minutes | Immediate | Account lockout, alert to SOC |
| Access to VIP/employee patient records | Immediate | Alert to Privacy Office for review |
| Bulk record access (>50 records in 1 hour by single user) | 15 minutes | SOC review, possible account suspension |
| After-hours access from unusual location | 1 hour | Review by SOC next business day or immediate if high risk |
| Break-the-glass event | 24 hours | Privacy Office justification review |
| Administrative privilege escalation | Immediate | SOC verification of change ticket |
Standard: Implement policies and procedures to protect ePHI from improper alteration or destruction.
| Implementation Specification | Type | Requirement |
|---|---|---|
| Mechanism to Authenticate ePHI — §164.312(c)(2) | Addressable | Implement electronic mechanisms to corroborate that ePHI has not been altered or destroyed in an unauthorized manner |
Asclepius Health Network Implementation:
Standard: Implement procedures to verify that a person or entity seeking access to ePHI is the one claimed. This standard is required with no implementation specifications.
Asclepius Health Network Implementation:
Standard: Implement technical security measures to guard against unauthorized access to ePHI that is being transmitted over an electronic communications network.
| Implementation Specification | Type | Requirement |
|---|---|---|
| Integrity Controls — §164.312(e)(2)(i) | Addressable | Implement security measures to ensure electronically transmitted ePHI is not improperly modified without detection |
| Encryption — §164.312(e)(2)(ii) | Addressable | Implement a mechanism to encrypt ePHI whenever deemed appropriate |
Asclepius Health Network Implementation:
| Implementation Specification | Type |
|---|---|
| Risk Analysis | Required |
| Risk Management | Required |
| Sanction Policy | Required |
| Information System Activity Review | Required |
| Implementation Specification | Type |
|---|---|
| Authorization and/or Supervision | Addressable |
| Workforce Clearance Procedure | Addressable |
| Termination Procedures | Addressable |
| Implementation Specification | Type |
|---|---|
| Isolating Healthcare Clearinghouse Functions | Required |
| Access Authorization | Addressable |
| Access Establishment and Modification | Addressable |
| Implementation Specification | Type |
|---|---|
| Security Reminders | Addressable |
| Protection from Malicious Software | Addressable |
| Log-in Monitoring | Addressable |
| Password Management | Addressable |
| Implementation Specification | Type |
|---|---|
| Response and Reporting | Required |
| Implementation Specification | Type |
|---|---|
| Data Backup Plan | Required |
| Disaster Recovery Plan | Required |
| Emergency Mode Operation Plan | Required |
| Testing and Revision Procedures | Addressable |
| Applications and Data Criticality Analysis | Addressable |
Addressable specifications: Contingency operations, facility security plan, access control and validation procedures, maintenance records.
Required standard specifying appropriate physical environment and manner of use for workstations accessing ePHI.
Required standard implementing physical safeguards restricting access to workstations that access ePHI.
Required specifications for disposal and media re-use; addressable specifications for accountability and data backup/storage.
OCR has clarified that "addressable" does not mean "optional." For each addressable specification, covered entities must:
OCR enforcement actions have found violations where entities failed to encrypt ePHI (addressable) without documenting any alternative measure. In practice, encryption of ePHI at rest and in transit is expected by OCR absent extraordinary documented justification.