Loading controls...
Benchmark: 164.312(e)(2)(i) Integrity controls
Description
Implement security measures to ensure that electronically transmitted electronic protected health information is not improperly modified without detection until disposed of.
Usage
Browse dashboards and select 164.312(e)(2)(i) Integrity controls:
steampipe dashboard
Or run the benchmarks in your terminal:
steampipe check aws_compliance.benchmark.hipaa_security_rule_2003_164_312_e_2_i
Snapshot and share results via Steampipe Cloud:
steampipe loginsteampipe check --share aws_compliance.benchmark.hipaa_security_rule_2003_164_312_e_2_i
Controls
- At least one multi-region AWS CloudTrail should be present in an account
- All S3 buckets should log S3 data events in CloudTrail
- At least one enabled trail should be present in a region
- CloudTrail trails should be integrated with CloudWatch logs
- ELB application load balancers should redirect HTTP requests to HTTPS
- ELB classic load balancers should use SSL certificates
- GuardDuty should be enabled
- Redshift cluster encryption in transit should be enabled
- S3 buckets should enforce SSL
- S3 bucket logging should be enabled
- AWS Security Hub should be enabled for an AWS Account