Benchmark: 164.312(c)(2) Mechanism to authenticate electronic protected health information
Description
Implement electronic mechanisms to corroborate that electronic protected health information has not been altered or destroyed in an unauthorized manner.
Usage
Install the mod:
mkdir dashboardscd dashboardspowerpipe mod initpowerpipe mod install github.com/turbot/steampipe-mod-aws-compliance
Start the Powerpipe server:
steampipe service startpowerpipe server
Open http://localhost:9033 in your browser and select 164.312(c)(2) Mechanism to authenticate electronic protected health information.
Run this benchmark in your terminal:
powerpipe benchmark run aws_compliance.benchmark.hipaa_final_omnibus_security_rule_2013_164_312_c_2
Snapshot and share results via Turbot Pipes:
powerpipe benchmark run aws_compliance.benchmark.hipaa_final_omnibus_security_rule_2013_164_312_c_2 --share
Controls
- CloudTrail trail logs should be encrypted with KMS CMK
- CloudTrail trail log file validation should be enabled
- Attached EBS volumes should have encryption enabled
- S3 bucket default encryption should be enabled
- S3 buckets should enforce SSL
- S3 bucket versioning should be enabled
- VPC flow logs should be enabled