Welcome
Login  Sign up

Reference

Accessing Archived Logs
App container and SSH access logs are permanently stored in S3. Logs are streamed in near real-time to the archive, to minimize loss of data in the unlikely...
Thu, 3 Aug, 2017 at 10:20 AM
Application Developer Guidelines
When PHI is viewed or modified, your application should record the identity of the person and the timestamp (other metadata, e.g. IP address, is not requir...
Thu, 23 Jul, 2020 at 10:24 AM
Customer Responsibilities
Customer Responsibilities 1. Using an up-to-date version of programming languages, application dependencies, application frameworks (including browser-side...
Fri, 28 Aug, 2020 at 2:47 PM
Data Volume Wiping
When an AWS Elastic Block Storage (EBS) volume is deleted, AWS automatically wipes its contents using an unspecified method.  Upon request, Healthcare Bloc...
Tue, 13 Mar, 2018 at 1:48 PM
Logging
For all servers, SSH access logs are permanently archived in our intrusion detection system (IDS) database, which is replicated and backed up nightly. A ...
Fri, 2 Sep, 2016 at 2:40 PM
Malware Detection
The Healthcare Blocks platform performs a weekly malware scan of every virtual machine using the following tools: ClamAV Linux Malware Detect Rootkit Hu...
Thu, 22 Apr, 2021 at 4:03 PM
Penetration and Vulnerability Testing
Guidance While HIPAA does not have a specific requirement with regard to penetration and vulnerability testing, it is a requirement that comes up regularly...
Tue, 23 Mar, 2021 at 10:22 AM
Policies and Procedures
HIPAA imposes many responsibilities upon an organization that is transmitting and/or storing protected health information (PHI). One of the comprehensive re...
Thu, 28 Oct, 2021 at 7:52 AM
Protected Health Information
Under the US Health Insurance Portability and Accountability Act (HIPAA), PHI that is linked based on the following list of 18 identifiers must be treated w...
Mon, 22 Aug, 2016 at 9:10 AM
Security Configuration and Practices
Healthcare Blocks virtual servers are security hardened and continuously maintained to eliminate vulnerabilities. Virtual Machines are Generated and Tested...
Thu, 22 Apr, 2021 at 4:29 PM