Do accounts used for solution provider-supplied remote support abide by the same authentication policies and access logging as the rest of the system?
Explanation
Guidance
Refer to HIPAA regulations documentation for supplemental guidance in this section.
Example Responses
Example Response 1
Yes, all remote support accounts provided to our solution providers abide by the same authentication policies and access logging as the rest of our system Remote support accounts require multi-factor authentication, follow our password complexity requirements (minimum 14 characters, combination of uppercase, lowercase, numbers, and special characters), and are subject to the same account lockout policies after failed login attempts All actions performed by remote support accounts are logged in our centralized logging system with timestamps, account information, actions performed, and systems accessed These logs are retained for a minimum of 6 years in compliance with HIPAA requirements and are reviewed weekly by our security team Remote support accounts are also provisioned with the principle of least privilege and are reviewed quarterly to ensure appropriate access levels are maintained.
Example Response 2
Yes, our remote support accounts follow the same authentication policies and access logging as standard accounts, with additional controls All remote support accounts require multi-factor authentication using our corporate identity provider They are subject to our standard password policy requiring 16+ character passwords that expire every 90 days For enhanced security, remote support accounts are only active during pre-approved maintenance windows and automatically disabled when not in use All remote support sessions are initiated through our secure jump server which provides full session recording and logging These session recordings capture all commands executed and screens viewed, and are stored in our immutable log storage system for 7 years Our SOC team receives real-time alerts when remote support accounts are activated and monitors all activity during support sessions.
Example Response 3
No, our remote support accounts currently have different authentication policies than our standard user accounts While our regular users are required to use multi-factor authentication and complex passwords that expire every 60 days, our remote support accounts for vendors only require a password without MFA This exception was made to accommodate vendors who claimed their support staff couldn't use our MFA solution We do maintain detailed access logs for these accounts, but recognize this represents a security gap in our environment We are actively working to address this issue by implementing a new remote access solution that will enforce MFA for all remote support sessions by Q3 of this year In the interim, we've implemented compensating controls including IP restrictions, just-in-time access provisioning, and enhanced monitoring of all remote support account activities.
Context
- Tab
- Case-Specific
- Category
- HIPAA Compliance

