Loading controls...
Benchmark: 164.312(e)(1) Transmission security
Description
Implement technical security measures to guard against unauthorized access to electronic protected health information that is being transmitted over an electronic communications network.
Usage
Browse dashboards and select 164.312(e)(1) Transmission security:
steampipe dashboard
Or run the benchmarks in your terminal:
steampipe check aws_compliance.benchmark.hipaa_security_rule_2003_164_312_e_1
Snapshot and share results via Steampipe Cloud:
steampipe loginsteampipe check --share aws_compliance.benchmark.hipaa_security_rule_2003_164_312_e_1
Controls
- ACM certificates should not expire within 30 days
- API Gateway stage cache encryption at rest should be enabled
- CloudFront distributions should require encryption in transit
- ELB application load balancers should be drop HTTP headers
- ELB application load balancers should redirect HTTP requests to HTTPS
- ELB classic load balancers should use SSL certificates
- ELB classic load balancers should only use SSL or HTTPS listeners
- Elasticsearch domain node-to-node encryption should be enabled
- OpenSearch domains node-to-node encryption should be enabled
- Redshift cluster encryption in transit should be enabled