Does the application log administrative activity, such as user account access changes and password changes, including specific user, date/time of changes, and originating IP or device?
Explanation
Guidance
Refer to HIPAA regulations documentation for supplemental guidance in this section.
Example Responses
Example Response 1
Yes, our application maintains comprehensive logs of all administrative activities For user account access changes and password changes, we record the specific administrator who performed the action, the exact date and time of the change (in UTC), the originating IP address, and device information when available These logs include details of what was changed (e.g., which user account was modified, what specific permissions were altered) All logs are stored in a separate, secured database with write-only access from the application and are retained for a minimum of 6 years as required by HIPAA We also have automated alerts for unusual administrative activities, such as mass permission changes or administrative actions outside of business hours These logs are regularly backed up, encrypted, and protected against tampering through cryptographic hash verification.
Example Response 2
Yes, our application implements detailed audit logging for all administrative activities Each log entry for account access changes and password modifications includes the administrator username, timestamp with millisecond precision, client IP address, browser/device fingerprint, and the specific details of the change made Our system maintains these logs in a separate, immutable storage system that prevents modification even by system administrators The logs are retained for 7 years and are automatically analyzed by our security information and event management (SIEM) system to detect potentially suspicious patterns Additionally, we maintain a separate record of who accessed these audit logs and when, creating a complete chain of accountability All logs are encrypted at rest and in transit, and access to logs requires multi-factor authentication.
Example Response 3
No, our application currently has limited logging capabilities for administrative activities While we do record when user accounts are created, we don't capture who performed these actions, and we don't log password changes or permission modifications We're aware this is a gap in our security controls and doesn't meet HIPAA requirements for audit controls We've prioritized this issue in our development roadmap and expect to implement comprehensive administrative activity logging within the next quarter In the interim, we've implemented compensating controls including strict access limitations to administrative functions and regular manual reviews of user account statuses We recognize this is not ideal and are committed to addressing this deficiency promptly.
Context
- Tab
- Case-Specific
- Category
- HIPAA Compliance

