We list out the assets or network segment in the current scope. We understanding the business process, e-PHI assets, their storage and exchange. We list out the vulnerabilities in the e-PHI handling and storing mechanism.
We perform a detailed assessment of the shortcomings of the current state of IT assets against the recommended standards of HIPAA and industry best practices.
This stage involves aligning current processes involving e-PHI handling, with the guidelines of HIPAA. We implement necessary controls and modify current information flow processes to improve the security posture of the organisation. HIPAA is primarily concerned with security and privacy of e-PHI information of patients.
Under this stage, we perform a checklist-oriented audit to verify adherence to suggested controls and implementation. This helps us rectify process oversights and enforce employee level controls if needed. We recommend changes in organisational policies and access control mechanisms.
Certification process is carried out by independent auditors, not by the implementers. We bring the auditor for the certification process. Thus, we take care of end to end process from scope determination to certification making the whole process easy for the client.