Question: A security administrator is developing controls for creating audit trails and tracking if a PHI data breach is to occur. The administrator has been given

 A security administrator is developing controls for creating audit trails and

A security administrator is developing controls for creating audit trails and tracking if a PHI data breach is to occur. The administrator has been given the following requirements: All access must be correlated to a user account - All user accounts must be assigned to a single individual. User access to the PHI data must be recorded. Anomalies in PHI data access must be reported. Logs and records cannot be deleted or modified. Which of the following should the administrator implement to meet the above requirements? (Select THREE). Eliminate shared accounts. Create a standard naming convention for accounts. Implement usage auditing and review Enable account lockout thresholds O B. D. OE Copy logs in real time to a secured WORM drive. F Implement time-of-day restrictions Perform regular permission audits and reviews

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!