| Framework | HIPAA Security Rule |
|---|---|
| Control ID | §164.312(a)(1) |
| Control Family | Technical Safeguards > Access Control |
| Control Name | Access Control |
| Status | PARTIALLY IMPLEMENTED |
| Assessment Date | 2026-04-19T02:25:35.202960+00:00 |
| Assessor | TITAN AI Scanner v2.0 (CONDUCTOR + BASTION + SCOUT + COMPLY + SAGE) |
| Environment Scope | Azure: Pay-As-You-Go (prod) (4f29d094-1079-44c9-acb0-4d73a7a2dd34) |
| Report ID | af955e6e8af7b9e458d1b9f7b33cf28c1d0f2a98afd51b3d0cf361116131340f |
Standard: Access control. Implement technical policies and procedures for electronic information systems that maintain electronic protected health information to allow access only to those persons or software programs that have been granted access rights as specified in §164.308(a)(4).
Source: https://www.ecfr.gov/current/title-45/subtitle-A/subchapter-C/part-164/subpart-C/section-164.312
Each implementation specification addressed separately per HIPAA §164.306(d) / NIST 800-53A assessment methodology.
Assign a unique name and/or number for identifying and tracking user identity.
Establish (and implement as needed) procedures for obtaining necessary ePHI during an emergency.
Implement electronic procedures that terminate an electronic session after a predetermined time of inactivity.
Summarized with counts + exceptions + drill-down. Raw data available on request per retention policy.
Test of Design (does the control exist?) + Test of Operating Effectiveness (does it work consistently?). Sampling per AICPA AU-C 530.
n/a
Policy covers specs.
25 of 67 (AICPA AU-C 530)
1 shared SP found. See Finding #3.
14 apps
13/14 compliant. See Finding #2.
n/a
Break-glass SOP v2.1 approved.
Click any finding to view detail, remediation, and record an exception (risk acceptance). Exceptions are retained in the report as part of the audit trail.
sa-finance-prod-eastus (Storage)
Encryption uses Microsoft-managed key (not CMK).
▾
app-hr-portal-prod
Idle timeout 45 min (should be <=15).
▾
svc_legacy_etl
Shared SP used by 3 ETL jobs + 2 devs. Violates unique user ID.
▾
SOC 2 Type 2 and HITRUST assessors require management's written response to findings.
| Scanner | TITAN AI Scanner v2.0 (CONDUCTOR + BASTION + SCOUT + COMPLY + SAGE) |
|---|---|
| Scanner version | v2.0.1 |
| Collection timestamp | 2026-04-19T02:25:35.202960+00:00 |
| Retention | 2555 days (HIPAA 164.316(b)(2)) |
| Report hash (SHA-256) | af955e6e8af7b9e458d1b9f7b33cf28c1d0f2a98afd51b3d0cf361116131340f |
This same evidence is admissible for the following related controls. Scan once, satisfy multiple frameworks.
AC-2, AC-3, AC-12, IA-2(1), IA-11, SC-13, SC-28 — same evidence satisfiesCC6.1, CC6.2, CC6.3, CC6.6 — same evidence satisfies8.1, 8.2, 8.3, 8.5, 3.5.1 — same evidence satisfiesA.9.2.1, A.9.4.2, A.10.1.1 — same evidence satisfies01.b, 01.c, 01.d, 01.q — same evidence satisfiesAC-2, AC-3, AC-12 — same evidence satisfies