Introduction
This document summarizes the relevant and applicable aspects of the Uplevel system that pertain to
complying with the requirements of the Health Insurance Portability and Accountability Act of 1996
(HIPAA), specifically the HIPAA Security Rule, codified as 45 CFR 164.310-312. As the HIPAA Security
Rule is fairly broad and general, the actual HIPAA Security Rule implementation guidelines are taken
from the NIST resource guide for implementing the HIPAA Security Rule (NIST Special Publication
800-66).
Applicable
HIPAA Requirements Categories
Most of the HIPAA requirements detailed in NIST 800 are directed at training, organization and
personnel management, process documentation, and physical security, and are not relevant to
equipment or services provided by Uplevel Systems. Several of the sections containing the storage,
transmission and access to Electronic Protected Health Information (EPHI) are, however, applicable:
Implementation Of Applicable Sections
The following sections summarize the functions and features of the Uplevel system that pertain to
the different requirements categories listed above. Note that not all of the NIST 800 detailed
requirements are implementable by physical hardware (e.g., the requirement to “Analyze workloads
and operations to identify the access needs of all users” listed in NIST 800 Section 4.14
(corresponding to 45 CFR 164.312(a)(1)) can only be implemented by a staff member of the
customer). Further, many of the functions and features of the Uplevel system are outside the remit
of the HIPAA Security Rule. This section therefore covers only those portions of the Uplevel system
that are pertinent to 45 CFR 164 as described by NIST 800.
Storage
- EPHI stored on the Uplevel NAS shares are fully encrypted at rest. If one or more shares on
the NAS are deleted, the data contained therein is completely destroyed and cannot be
recreated.
- The Uplevel gateway is configured to support Active Directory. The Active Directory server
maintains a continuous audit log of all accesses (read, write, create, delete, modify) to all files
within the NAS shares, traceable to the user.
- If an Uplevel gateway is decommissioned, deleting all of the NAS shares will irretrievably
destroy all EPHI stored therein beyond recovery, satisfying the disposal requirements.
- As the entire storage media potentially holding EPHI are encrypted, physical removal of the
storage media and attempt to access EPHI is not possible.
- Uplevel gateways are locked to individual customers and cannot be reassigned without
explicit arrangements. Unauthorized access to EPHI after physically removing the gateway is
therefore prevented.
Backup
- Cloud backups have been enabled on the NAS shares provided by the Uplevel gateway. All
EPHI held in these shares are therefore periodically backed up to an encrypted backup mirror
over an encrypted tunnel. If EPHI is lost from the physical NAS shares, it can be recovered
from the backups.
- The cloud backups are held off-site in AWS virtual datacenters, satisfying the offsite backup
requirement. Further, the requirement to create a retrievable exact copy of EPHI before
equipment movement is satisfied.
- In case of an emergency involving a catastrophic failure of the Uplevel gateway, or malicious
alteration of EPHI, the EPHI is retrievable from these cloud backups. In addition, protection
against malicious alteration is afforded by the local read-only snapshots taken on the Uplevel
NAS shares.
- Cloud backups are held on individually assigned and secured servers and storage media that
are dedicated per-customer. Prevention of EPHI release or sharing with unauthorized parties
is therefore guaranteed by isolation.
- Cloud backups cannot be accessed outside of the physical gateway present at the physical
customer site, further limiting the risk of unauthorized EPHI release.
User Access Control
- The Domain Controller within the Uplevel gateway, if active at the customer site, controls
access to NAS shares (and by extension the EPHI within these shares). Users cannot access the
EPHI without first logging in using their unique user credentials.
- User logins and logouts are logged within the audit logs. Accesses to EPHI are tracked based
on the unique user credentials.
- Uplevel NAS shares can be restricted to specific groups of users (e.g., Employees, Accounting),
and unauthorized user access to EPHI can be controlled thereby.
- The Uplevel Domain Controller implements automatic password-protected lock, minimum
password complexity requirements, account lock after failed attempts, and mandatory
password expiry after preset times. The automatic logoff and password management
requirements are therefore satisfied.
- Passwords are stored within the Domain Controller using a secure one-way hash mechanism
(not plaintext). The password encryption requirements are therefore satisfied.
- Users can be disabled or deleted from the Domain Controller, thereby temporarily or
permanently preventing their access to EPHI if no longer required.
Activity Logging
- The Uplevel NAS in Domain Controller mode maintains detailed audit logs listing accesses to
the system. As users cannot access EPHI on the NAS shares without logging in first, these
audit logs are traceable to individual users.
- The Uplevel system also maintains detailed audit logs of system activity (e.g., equipment
connection, disconnection, or modification) and device activity (e.g., workstation connection
and disconnection).
- Audit records include the unique user ID and the date/time when the activity was performed.
- Attempts by unauthorized users to access the system (e.g., bad password attempts) are
logged in the audit logs.
- User login and logout attempts are recorded in the audit logs.
Admin Access and Logging
- Administrative login and logout attempts are logged on the Uplevel portal.
- Administrative adds, deletes and changes to configurations are logged on the Uplevel portal.
- Administrative access to the Uplevel system holding EPHI can be secured using multi-factor
authentication.
- Administrators are able to perform emergency access and provision to the customer of
backup copies of EPHI in case of loss (without requiring direct access to EPHI), and are able to
perform restore of EPHI from the backups in case of catastrophic failures or emergencies.
EPHI File Access Logging
- The Uplevel NAS in Domain Controller mode maintains detailed audit logs listing accesses to
or modification of EPHI contained within individual files.
- The EPHI audit records include the unique user ID, the specific activity performed (e.g., read,
write, create, delete), and the date/time when the activity was performed.
- Attempts by unauthorized users to access EPHI (e.g., failed reads) are logged in the audit logs.
Encryption And Access Control
- All EPHI stored on the Uplevel NAS is encrypted at rest using strong AES encryption.
- All EPHI transferred from the Uplevel NAS to the cloud backup, or transferred to a remote
user via VPN access, is encrypted during transmission using strong AES encryption.
- Both the connections to the cloud backup and the VPN access are defended against
unauthorized or malicious modification of EPHI using integrity checks, via a Message Integrity
Check (MIC).
- Transmission of EPHI over the Uplevel Wi-Fi devices is protected by mandatory strong AES
encryption and MIC checks; passwordless access to EPHI via the Wi-Fi is not permitted.
- Unauthorized access to EPHI by physically connecting to unused Ethernet ports can be limited
or prevented by disabling the ports from the Uplevel portal. Attempts to defeat this limitation
by disconnecting an existing device (whether Uplevel switch/AP, or third-party device, or
workstation) and connecting to the port can be detected and alerted by settings on the
Uplevel portal.
IDS/IPS
- If the Uplevel gateway has IDS/IPS enabled, the IDS/IPS will intercept and inspect all packets
transiting the system from the WAN against a set of rules to to detect and mitigate malicious
attempts to access EPHI held on the Uplevel NAS.
- Attacks or attempts detected by the IDS are recorded for audits, and can be transmitted to
logging systems via e-mail for recording and analysis.
- IDS/IPS is active on all networks that have access to EPHI stored on the Uplevel NAS shares.
Related Articles
Firewall log retention
Our basic firewall (without Advanced Security enabled or HIPAA BAA compliance) we do maintain basic inbound logging and reporting, and limited recording of LAN device activity (e.g., devices present on the LAN and traffic records). The duration of ...
CIS Level 1 and 2
Introduction The Center for Internet Security (CIS) benchmarks are a method of specifying a secure baseline configuration for assets. This includes assets of all kinds: servers, workstations, network devices, firewalls, phone systems, etc. ...
Log Retention
The retention period varies depending on the type of logs. The audit logs that determine logins, changes, client arrivals/departures, etc (e.g., what we'd normally use for HIPAA compliance) are normally maintained for months. It depends on how much ...
Azure vs. Uplevel Active Directory
Portions of this article are from the Blog post on our website - https://www.uplevelsystems.com/blog/uplevel-ad-vs-azure-ad-whats-the-difference Introduction On-premises Microsoft Active Directory, Uplevel Active Directory compatible Directory ...