Overview
The Health Insurance Portability and Accountability Act (HIPAA) establishes national standards for protecting sensitive patient health information. The HIPAA Security Rule specifically requires covered entities and business associates to implement administrative, physical, and technical safeguards to protect electronic Protected Health Information (ePHI). Wazuh helps organizations monitor and maintain HIPAA compliance through security event detection and technical safeguard monitoring.HIPAA Requirements Coverage
Wazuh maps security events to HIPAA Security Rule requirements through therule.hipaa field. The compliance requirements are defined in:
Source: plugins/main/common/compliance-requirements/hipaa-requirements.ts
All monitored requirements are from 45 CFR § 164.312 - Technical Safeguards.
Technical Safeguards Requirements
Access Control (§ 164.312(a))
164.312.a.1 - Access Control Standards
164.312.a.1 - Access Control Standards
- User authentication systems
- Authorization controls
- Access control lists (ACLs)
- Role-based access control (RBAC)
- Least privilege enforcement
- Unauthorized access attempts
- Access control violations
- Authentication failures
- Authorization bypasses
- Privilege escalation attempts
164.312.a.2.I - Unique User Identification (Required)
164.312.a.2.I - Unique User Identification (Required)
- Unique user IDs for all users
- No shared accounts
- User identification in all logs
- Account lifecycle management
- User account creation/deletion
- Shared account usage detection
- Non-unique identifier alerts
- Account naming violations
164.312.a.2.II - Emergency Access Procedure (Required)
164.312.a.2.II - Emergency Access Procedure (Required)
- Break-glass access procedures
- Emergency access accounts
- Emergency access logging
- Post-emergency access review
- Emergency account usage
- Break-glass procedure activation
- Out-of-hours ePHI access
- Emergency access pattern analysis
164.312.a.2.III - Automatic Logoff (Addressable)
164.312.a.2.III - Automatic Logoff (Addressable)
- Session timeout configuration
- Idle session termination
- Automatic logout enforcement
- Session management controls
- Session timeout violations
- Inactive session detection
- Session management failures
- Long-running session alerts
164.312.a.2.IV - Encryption and Decryption (Addressable)
164.312.a.2.IV - Encryption and Decryption (Addressable)
- ePHI encryption at rest
- ePHI encryption in transit
- Cryptographic key management
- Encryption strength requirements
- Unencrypted ePHI access
- Weak encryption usage
- Encryption failures
- Key management violations
Audit Controls (§ 164.312(b))
164.312.b - Audit Controls (Required)
164.312.b - Audit Controls (Required)
- Comprehensive logging systems
- Audit trail generation
- Log analysis and review
- Security Information and Event Management (SIEM)
- Activity monitoring
- All ePHI access events
- System activity logs
- User actions on ePHI systems
- Security event logs
- Administrative actions
Integrity Controls (§ 164.312(c))
164.312.c.1 - Integrity (Required)
164.312.c.1 - Integrity (Required)
- Data integrity verification
- Version control systems
- Change tracking
- Backup and recovery procedures
- Write protection mechanisms
- Unauthorized data modifications
- Data deletion events
- Integrity violation alerts
- Improper change attempts
164.312.c.2 - Mechanism to Authenticate ePHI (Addressable)
164.312.c.2 - Mechanism to Authenticate ePHI (Addressable)
- File integrity monitoring (FIM)
- Digital signatures
- Checksums and hash verification
- Audit logs for data changes
- Integrity validation systems
- File integrity violations
- Checksum mismatches
- Unauthorized file modifications
- Digital signature failures
Person or Entity Authentication (§ 164.312(d))
164.312.d - Authentication (Required)
164.312.d - Authentication (Required)
- Multi-factor authentication (MFA)
- Password policies
- Biometric authentication
- Certificate-based authentication
- Single sign-on (SSO) with strong authentication
- Authentication attempts
- Failed authentication events
- MFA bypass attempts
- Weak authentication usage
- Authentication mechanism failures
Transmission Security (§ 164.312(e))
164.312.e.1 - Transmission Security (Required)
164.312.e.1 - Transmission Security (Required)
- TLS/SSL for data in transit
- VPN for remote access
- Secure protocols (HTTPS, SFTP, etc.)
- Network encryption
- Wireless security (WPA3)
- Unencrypted transmissions
- Insecure protocol usage
- Network security violations
- Unauthorized network access
- Man-in-the-middle attempts
164.312.e.2.I - Integrity Controls (Addressable)
164.312.e.2.I - Integrity Controls (Addressable)
- Message integrity checks
- Data transmission validation
- Checksum verification
- Digital signatures for transmitted data
- Secure messaging protocols
- Transmission integrity failures
- Data corruption detection
- Message tampering alerts
- Integrity check failures
164.312.e.2.II - Encryption (Addressable)
164.312.e.2.II - Encryption (Addressable)
- End-to-end encryption
- Transport layer security
- Email encryption
- File transfer encryption
- Application-level encryption
- Unencrypted ePHI transmissions
- Weak encryption protocols
- Encryption failures
- Policy violations
Using the HIPAA Dashboard
Accessing HIPAA Compliance View
Filter by Requirement Type
Dashboard Components
The HIPAA dashboard includes:- Top requirements by alert count - Identifies technical safeguard violations
- Access control monitoring - Tracks § 164.312(a) compliance
- Audit trail coverage - Monitors § 164.312(b) implementation
- Integrity violations - Shows § 164.312(c) events
- Authentication failures - Displays § 164.312(d) issues
- Transmission security - Monitors § 164.312(e) compliance
plugins/main/public/components/overview/hipaa/dashboards/dashboard-panels.ts
Data Source Implementation
The HIPAA data source filters events by therule.hipaa field:
plugins/main/public/components/common/data-source/pattern/events/hipaa/hipaa-data-source.ts:5
Event Columns
HIPAA events table displays:- Timestamp
- Rule description
- HIPAA requirement (
rule.hipaafield) - Alert level
- ePHI system identifier
- Agent information
plugins/main/public/components/overview/hipaa/events/hipaa-columns.tsx:8
Compliance Reporting for HIPAA
HIPAA Requirement Naming Convention
HIPAA requirements follow the pattern164.312.[section].[subsection].[element]:
- 164.312.a.1 - Technical safeguards, Access Control, standard
- 164.312.a.2.I - Access Control, implementation specification I (required)
- 164.312.c.2 - Integrity Controls, addressable implementation specification
Generating HIPAA Reports
Required vs. Addressable Specifications
- Required Specifications
- Addressable Specifications
- 164.312.a.1 - Access Control (standard)
- 164.312.a.2.I - Unique User Identification
- 164.312.a.2.II - Emergency Access Procedure
- 164.312.b - Audit Controls
- 164.312.c.1 - Integrity
- 164.312.d - Person or Entity Authentication
- 164.312.e.1 - Transmission Security
HIPAA-Specific Use Cases
Audit Controls (§ 164.312(b))
Wazuh serves as the audit control mechanism:Access Logging
Activity Monitoring
Security Event Detection
Audit Trail Integrity
File Integrity Monitoring for ePHI
Meets § 164.312(c.2) - Mechanism to Authenticate ePHI:Access Control Monitoring
Track § 164.312(a) compliance:- Monitor successful and failed authentication attempts
- Detect unauthorized access attempts
- Track privilege escalation
- Identify shared account usage
- Monitor emergency access procedures
Transmission Security
Monitor § 164.312(e) compliance:- Detect unencrypted ePHI transmissions
- Identify insecure protocol usage (HTTP, FTP, Telnet)
- Monitor VPN connections for remote access
- Track network intrusion attempts
- Verify encryption usage for data in transit
Integration with Other Modules
HIPAA requirements appear in:- MITRE ATT&CK view - Maps ePHI protection to attack techniques
- File Integrity Monitoring - Implements § 164.312(c.2)
- Vulnerability Detection - Supports risk analysis requirements
- NIST 800-53 - Crosswalk between HIPAA and NIST controls
plugins/main/public/components/overview/mitre/framework/components/techniques/components/rule-details.tsx:120
Requirement Data Structure
The complete HIPAA requirements mapping:plugins/main/common/compliance-requirements/hipaa-requirements.ts:12
Best Practices
Focus on Required Specs
Enable FIM for ePHI
Monitor Access Controls
Maintain Audit Trails
Regular Security Reviews
Document Addressable Specs
Risk Analysis Integration
Wazuh data supports HIPAA Security Rule § 164.308(a)(1)(ii)(A) risk analysis:- Threat identification - Security events show active threats to ePHI
- Vulnerability assessment - Integration with vulnerability scanning
- Impact analysis - Alert severity indicates potential impact
- Likelihood determination - Alert frequency shows likelihood of threats
Related Documentation
- Compliance Overview
- [File Integrity Monitoring(/modules/file-integrity-monitoring) - Implements § 164.312(c.2)
- [Log Analysis(/modules/threat-hunting) - Implements § 164.312(b)
- [Vulnerability Detection(/modules/vulnerability-detection) - Supports risk analysis
- [Incident Response(/guides/threat-analysis) - Supports breach notification requirements