| Framework | HIPAA Security Rule |
|---|---|
| Control ID | §164.308(a)(4) |
| Control Family | Administrative Safeguards > Access Management |
| Control Name | Information Access Management |
| Status | PARTIALLY IMPLEMENTED |
| Assessment Date | 2026-04-19T02:25:35.202960+00:00 |
| Assessor | TITAN AI Scanner v2.0 (CONDUCTOR + BASTION + SCOUT + COMPLY + SAGE) |
| Environment Scope | Azure: Pay-As-You-Go (prod) (4f29d094-1079-44c9-acb0-4d73a7a2dd34) |
| Report ID | 993a1730b67a54ad86ca5b734cd589f7ec3d54cbda7eaee5f4113d38b27e9468 |
Standard: Information access management. Implement policies and procedures for authorizing access to electronic protected health information that are consistent with the applicable requirements of subpart E of this part.
Source: https://www.ecfr.gov/current/title-45/subtitle-A/subchapter-C/part-164/subpart-C/section-164.308
Each implementation specification addressed separately per HIPAA §164.306(d) / NIST 800-53A assessment methodology.
If a health care clearinghouse is part of a larger organization, the clearinghouse must implement policies and procedures that protect the electronic protected health information of the clearinghouse from unauthorized access by the larger organization.
Implement policies and procedures for granting access to electronic protected health information, for example, through access to a workstation, transaction, program, process, or other mechanism.
Implement policies and procedures that, based upon the covered entity's or the business associate's access authorization policies, establish, document, review, and modify a user's right of access to a workstation, transaction, program, or process.
Summarized with counts + exceptions + drill-down. Raw data available on request per retention policy.
Test of Design (does the control exist?) + Test of Operating Effectiveness (does it work consistently?). Sampling per AICPA AU-C 530.
n/a
Access Management Policy v2.4 current.
4 quarters
All 4 quarterly reviews completed on time in last 12 months.
Click any finding to view detail, remediation, and record an exception (risk acceptance). Exceptions are retained in the report as part of the audit trail.
custom-role-ReadWriteAdmin
Custom role grants Microsoft.*/write across subscription. 5 users assigned. Over-privileged.
▾
SOC 2 Type 2 and HITRUST assessors require management's written response to findings.
| Scanner | TITAN AI Scanner v2.0 (CONDUCTOR + BASTION + SCOUT + COMPLY + SAGE) |
|---|---|
| Scanner version | v2.0.1 |
| Collection timestamp | 2026-04-19T02:25:35.202960+00:00 |
| Retention | 2555 days (HIPAA 164.316(b)(2)) |
| Report hash (SHA-256) | 993a1730b67a54ad86ca5b734cd589f7ec3d54cbda7eaee5f4113d38b27e9468 |
This same evidence is admissible for the following related controls. Scan once, satisfy multiple frameworks.
AC-2, AC-3, AC-5, AC-6 — same evidence satisfiesCC6.1, CC6.2, CC6.3 — same evidence satisfiesA.9.1, A.9.2, A.9.4 — same evidence satisfies7.1, 7.2, 7.3, 8.1 — same evidence satisfies01.a, 01.c, 01.v — same evidence satisfies