Difference between revisions of "User:Shawndouglas/sandbox/sublevel22"
Shawndouglas (talk | contribs)  | 
				Shawndouglas (talk | contribs)   | 
				||
| Line 152: | Line 152: | ||
   | style="background-color:white;" |'''33.15''' The system shall be able to install an upgrade into a test environment for testing purposes before upgrading the actual production environment.  |    | style="background-color:white;" |'''33.15''' The system shall be able to install an upgrade into a test environment for testing purposes before upgrading the actual production environment.  | ||
  |-    |   |-    | ||
|}  | |||
|}  | |||
==34. Cybersecurity==  | |||
{|   | |||
 | STYLE="vertical-align:top;"|  | |||
{| class="wikitable collapsible" border="1" cellpadding="10" cellspacing="0"  | |||
 |-  | |||
  ! colspan="2" style="text-align:left; padding-left:20px; padding-top:10px; padding-bottom:10px;"|  | |||
 |-  | |||
  ! style="color:brown; background-color:#ffffee; width:500px;"| Regulation, Specification, or Guidance  | |||
  ! style="color:brown; background-color:#ffffee; width:700px;"| Requirement  | |||
 |-   | |||
  | style="padding:5px; width:500px;" |  | |||
[https://www.law.cornell.edu/cfr/text/42/493.1231 42 CFR Part 493.1231]<br />  | |||
[https://www.law.cornell.edu/cfr/text/45/164.312 45 CFR Part 164.312]<br />  | |||
[https://www.law.cornell.edu/cfr/text/45/170.315 45 CFR Part 170.315 (d-9)]<br />  | |||
[https://www.astm.org/Standards/E1578.htm ASTM E1578-18 S-4-1]<br />  | |||
[https://www.fbi.gov/services/cjis/cjis-security-policy-resource-center CJIS Security Policy 5.6.4]<br />  | |||
[https://www.fbi.gov/services/cjis/cjis-security-policy-resource-center CJIS Security Policy 5.8.2.1]<br />  | |||
[https://www.fbi.gov/services/cjis/cjis-security-policy-resource-center CJIS Security Policy 5.10.1.2]<br />  | |||
[https://www.fbi.gov/services/cjis/cjis-security-policy-resource-center CJIS Security Policy Appendix G.6]  | |||
  | style="background-color:white;" |'''34.1''' The system should use secure communication protocols like SSL/TLS over Secure Hypertext Transfer Protocol with 256 bit encryption.  | |||
 |-   | |||
  | style="padding:5px; width:500px;" |  | |||
[https://www.law.cornell.edu/cfr/text/42/493.1231 42 CFR Part 493.1231]<br />  | |||
[https://www.law.cornell.edu/cfr/text/45/164.312 45 CFR Part 164.312]<br />  | |||
[https://www.law.cornell.edu/cfr/text/45/170.315 45 CFR Part 170.315 (d)]<br />  | |||
[https://www.astm.org/Standards/E1578.htm ASTM E1578-18 S-4-2]<br />  | |||
[https://www.fbi.gov/services/cjis/cjis-security-policy-resource-center CJIS Security Policy 5.5.2.4]<br />  | |||
[https://www.fbi.gov/services/cjis/cjis-security-policy-resource-center CJIS Security Policy 5.10.1.2]<br />  | |||
[https://www.fbi.gov/services/cjis/cjis-security-policy-resource-center CJIS Security Policy Appendix G.6]  | |||
  | style="background-color:white;" |'''34.2''' The system should support database encryption and be capable of recording the encryption status of the data contained within.  | |||
 |-   | |||
  | style="padding:5px; width:500px;" |[https://www.law.cornell.edu/cfr/text/42/493.1231 42 CFR Part 493.1231]<br />[https://www.fbi.gov/services/cjis/cjis-security-policy-resource-center CJIS Security Policy 5.6.2.2.1]  | |||
  | style="background-color:white;" |'''34.3''' The system should be able to support multifactor authentication.  | |||
 |-  | |||
  | style="padding:5px; width:500px;" |[https://www.law.cornell.edu/cfr/text/45/170.202 45 CFR Part 170.202]<br />[https://www.law.cornell.edu/cfr/text/45/170.315 45 CFR Part 170.315 (h)]  | |||
  | style="background-color:white;" |'''34.4''' The system should support Office of the National Coordinator for Health Information Technology (ONC) transport standards and protocols for the reception and distribution of personal health information.  | |||
 |-  | |||
|}  | |||
|}  | |||
==35. Information Privacy==  | |||
{|   | |||
 | STYLE="vertical-align:top;"|  | |||
{| class="wikitable collapsible" border="1" cellpadding="10" cellspacing="0"  | |||
 |-  | |||
  ! colspan="2" style="text-align:left; padding-left:20px; padding-top:10px; padding-bottom:10px;"|  | |||
 |-  | |||
  ! style="color:brown; background-color:#ffffee; width:500px;"| Regulation, Specification, or Guidance  | |||
  ! style="color:brown; background-color:#ffffee; width:700px;"| Requirement  | |||
 |-   | |||
  | style="padding:5px; width:500px;" |[https://www.law.cornell.edu/cfr/text/45/part-164/subpart-E 45 CFR Part 164 Subpart E]<br />[https://www.astm.org/Standards/E1578.htm ASTM E1578-18 S-5-1]  | |||
  | style="background-color:white;" |'''35.1''' The system shall comply with privacy protection compliance like that found in HIPAA provisions.  | |||
 |-  | |||
  | style="padding:5px; width:500px;" |  | |||
[https://www.law.cornell.edu/cfr/text/45/164.105 45 CFR Part 164.105]<br />  | |||
[https://www.law.cornell.edu/cfr/text/45/part-164/subpart-C 45 CFR Part 164 Subpart C]<br />  | |||
[https://www.law.cornell.edu/cfr/text/45/170.315 45 CFR Part 170.315 (d)]<br />  | |||
[https://www.astm.org/Standards/E1578.htm ASTM E1578-18 S-5-2]  | |||
  | style="background-color:white;" |'''35.2''' The system should be provisioned with enough security to prevent personally identifiable information in the system from being compromised.  | |||
 |-  | |||
  | style="padding:5px; width:500px;" |[https://www.law.cornell.edu/cfr/text/45/164.514 45 CFR Part 164.514]  | |||
  | style="background-color:white;" |'''35.3''' The system shall allow authorized individuals to de-identify select data in the system, including but not limited to names, geographic locations, dates, government-issued identification numbers, telephone numbers, email addresses, full-face photos, and other personal identifiers.  | |||
 |-  | |||
  | style="padding:5px; width:500px;" |[https://www.law.cornell.edu/cfr/text/45/part-164/subpart-E 45 CFR Part 164 Subpart E]  | |||
  | style="background-color:white;" |'''35.4''' The system shall be able to verify and ensure that users authorized to view de-identified data are also not a member of a role that permits access to information that re-identifies the data, i.e., segregate duties.  | |||
 |-  | |||
|}  | |}  | ||
|}  | |}  | ||
Revision as of 17:42, 19 September 2019
| 
   | 
This is sublevel22 of my sandbox, where I play with features and test MediaWiki code. If you wish to leave a comment for me, please see my discussion page instead. | 
Sandbox begins below
32. System Validation and Commission
  | ||||||||||||||||
33. System Administration
  | ||||||||||||||||||||||||||||||||||
34. Cybersecurity
  | ||||||||||||
35. Information Privacy
  | ||||||||||||







