Welcome
Login  Sign up

Reference

Accessing Archived Logs
App container and SSH access logs are permanently stored in S3. Logs are streamed in near real-time to the archive, to minimize loss of data in the unlikely...
Thu, 3 Aug, 2017 at 10:20 AM
Customer Responsibilities
Customer Responsibilities 1. Using an up-to-date version of programming languages, application dependencies, application frameworks (including browser-side...
Thu, 19 Apr, 2018 at 9:08 AM
Data Volume Wiping
When an AWS Elastic Block Storage (EBS) volume is deleted, AWS automatically wipes its contents using an unspecified method.  Upon request, Healthcare Bloc...
Tue, 13 Mar, 2018 at 1:48 PM
Logging
For all servers, SSH access logs are permanently archived in our intrusion detection system (IDS) database, which is replicated and backed up nightly. A ...
Fri, 2 Sep, 2016 at 2:40 PM
Protected Health Information
Under the US Health Insurance Portability and Accountability Act (HIPAA), PHI that is linked based on the following list of 18 identifiers must be treated w...
Mon, 22 Aug, 2016 at 9:10 AM
Security Configuration and Practices
Healthcare Blocks virtual servers are security hardened and continuously maintained to eliminate vulnerabilities. Virtual Machines are Generated and Tested...
Fri, 6 Apr, 2018 at 8:27 AM
System Monitoring Protocols
Healthcare Blocks uses a combination of tools, including a custom metrics collection agent, AWS CloudWatch, PagerDuty, and Slack to keep an eye on the upti...
Fri, 30 Mar, 2018 at 7:47 AM
Observed US Holidays
On the following major US holidays, Healthcare Blocks work locations are closed for business. While systems are always monitored 24/7 and designated employe...
Mon, 20 Nov, 2017 at 10:25 PM
Policies and Procedures
HIPAA imposes many responsibilities upon an organization that is transmitting and/or storing protected health information (PHI). One of the comprehensive re...
Fri, 10 Feb, 2017 at 3:54 PM
Penetration and Vulnerability Testing
Guidance While HIPAA does not have a specific requirement with regard to penetration and vulnerability testing, it is a requirement that comes up regularly...
Wed, 7 Mar, 2018 at 4:12 PM