policy:data_privacy:log-in_monitoring
Differences
This shows you the differences between two versions of the page.
Next revision | Previous revision | ||
policy:data_privacy:log-in_monitoring [2019/03/28 19:24] – created tonyromero | policy:data_privacy:log-in_monitoring [2019/06/05 20:08] (current) – tonyromero | ||
---|---|---|---|
Line 1: | Line 1: | ||
- | ====== | + | ====== |
- | Here's some formatting stuff to show off what a policy could look like. | + | ==== University Internal Standard ==== |
- | ===== Sub Heading ===== | + | OIT has an internal standard for logging, monitoring and auditing that applies to all servers managed by CU Denver OIT. Click her to view the version that was effective as of July 1, 2017. Please contact OIT's Risk and Compliance team for the most up to date version. |
- | :!: **Important: | + | According to the standard the following details are logged and saved on a centralized logging server for at least six months: |
- | **Note:** Lorem ipsum dolor sit amet, consectetur adipiscing elit. | + | - Timestamp |
- | ===== Headline ===== | + | - Event, status, and/or error codes |
+ | - Service/ | ||
+ | - User or system account associated with an event | ||
+ | - Device used (e.g. source and destination IPs, terminal session ID, web browser, etc) | ||
- | Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean eu eleifend orci, vel scelerisque nisi. Praesent finibus euismod auctor. Cras leo massa, auctor eu cursus nec, volutpat eu sapien. Cras mollis euismod diam, eu viverra elit ornare sit amet. Mauris vel dolor vel magna molestie eleifend tempor vitae massa. Phasellus at lacus a libero pharetra imperdiet vitae sed lorem. Pellentesque eu dictum sem. | + | The events related to the following categories are logged: |
- | ---- | + | |
+ | | ||
+ | | ||
+ | | ||
+ | - File Access (files containing ePHI or Highly Confidential information) | ||
- | ===== Various Underlines ===== | + | ==== University of Colorado Denver HIPPA Policy |
- | Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean eu eleifend orci, vel scelerisque nisi. Praesent finibus euismod auctor. Cras leo massa, auctor eu cursus nec, volutpat eu sapien. Cras mollis euismod diam, eu viverra elit ornare sit amet. Mauris vel dolor vel magna molestie eleifend tempor vitae massa. Phasellus at lacus a libero pharetra imperdiet vitae sed lorem. Pellentesque eu dictum sem. | + | As applicable, the most secure SEHD data are subject to the UCD Auditing [[http:// |
- | ===== List Items ===== | + | > The system hardware, software, and applications must have the capability of creating log files. These logs must include, but are not limited to: |
- | - One | + | - User ID; |
- | - something | + | - Login date/time; and, |
- | - three | + | - Activity time. |
- | - eleven | + | |
- | - five hundred((I' | + | |
- | Lorem ipsum dolor sit amet, consectetur adipiscing elit. Aenean eu eleifend orci, vel scelerisque nisi. Praesent finibus euismod auctor. Cras leo massa, auctor eu cursus nec, volutpat eu sapien. Cras mollis euismod diam, eu viverra elit ornare sit amet. Mauris vel dolor vel magna molestie eleifend tempor vitae massa. Phasellus at lacus a libero pharetra imperdiet vitae sed lorem. Pellentesque eu dictum sem. | + | > Units must monitor login success and failure to systems that host ePHI. To ensure that unauthorized login attempts are discovered, discrepancies or unusual login patterns must be reported to the department administrator and HIPAA Security Officer. |
- | + | ||
- | ---- | + | |
- | + | ||
- | ==== Slightly Lower Header ==== | + | |
- | + | ||
- | |We can also use tables|for describing various policies| | + | |
- | | | | | + | |
- | | | | | + | |
- | + | ||
- | \\ | + | |
policy/data_privacy/log-in_monitoring.1553801070.txt.gz · Last modified: 2019/03/28 19:24 by tonyromero