Which of the following should the administrator impleme…

A security administrator is developing controls for creating audit trails and tracking if a PHI data breach is to occur. The administrator has been given the following requirements:
+All access must be correlated to a user account.
+All user accounts must be assigned to a single individual.
+User access to the PHI data must be recorded.
+Anomalies in PHI data access must be reported.
+Logs and records cannot be deleted or modified.

Which of the following should the administrator implement to meet the above requirements? (Select three.)

A security administrator is developing controls for creating audit trails and tracking if a PHI data breach is to occur. The administrator has been given the following requirements:
+All access must be correlated to a user account.
+All user accounts must be assigned to a single individual.
+User access to the PHI data must be recorded.
+Anomalies in PHI data access must be reported.
+Logs and records cannot be deleted or modified.

Which of the following should the administrator implement to meet the above requirements? (Select three.)

A.
Eliminate shared accounts.

B.
Create a standard naming convention for accounts.

C.
Implement usage auditing and review.

D.
Enable account lockout thresholds.

E.
Copy logs in real time to a secured WORM drive.

F.
Implement time-of-day restrictions.

G.
Perform regular permission audits and reviews.



Leave a Reply 0

Your email address will not be published. Required fields are marked *