If the application is institution-hosted, can all service level and administrative account passwords be changed by the institution?
Explanation
Guidance
Refer to HIPAA regulations documentation for supplemental guidance in this section.
Example Responses
Example Response 1
Yes, our institution has full control over all service level and administrative account passwords for our locally-hosted application This includes the ability to change database administrator accounts, application administrator accounts, service accounts, and any other privileged accounts within the system We maintain these passwords in our enterprise password management system and rotate them according to our institutional password policy (minimum 90-day rotation for administrative accounts) This control allows us to immediately revoke access when needed and maintain compliance with our security requirements.
Example Response 2
Yes, our institution can change most service level and administrative account passwords for the application We have full control over application administrator accounts, database accounts, and most service accounts However, there is one system account used for background processing that requires vendor assistance to change For this exception, we have implemented a compensating control where the account has very limited permissions, and all actions are logged and monitored We have documented procedures with the vendor to change this password within 4 hours if needed for security purposes.
Example Response 3
No, our application uses several hard-coded service accounts with passwords that cannot be changed by our institution While we host the application infrastructure on our servers, the application was developed by a third party that maintains exclusive control over these administrative credentials They perform quarterly password rotations according to their security policy, but our institution cannot directly change these passwords when needed This creates a dependency on the vendor for access management and potential delays in responding to security incidents We recognize this as a compliance gap and are working with the vendor to implement a solution that gives us control over all credentials by Q3 of this year.
Context
- Tab
- Case-Specific
- Category
- HIPAA Compliance

