HIPAARemediation PlanningDemo
Classify each failing implementation specification as deploy, runbook, or accepted risk. CFR citations travel with each action so auditors can trace remediation back to the Security Rule.
Demo mode. Deployments are simulated. Your tenant run applies real M365 changes and generates runbooks per control.
1 controls require licenses not detected in your tenant
These controls cannot be remediated until the required licenses are assigned. They are excluded from the remediation selection below.
| Control | Action |
|---|---|
Information system activity review — regular audit-log review HIPAA-164.308(a)(1)(ii)(D) | |
Data backup plan — create retrievable exact copies of ePHI HIPAA-164.308(a)(7)(ii)(A) | |
Record & examine activity in info systems containing ePHI HIPAA-164.312(b) | |
Termination procedures — deprovision access on workforce exit HIPAA-164.308(a)(3)(ii)(C) | |
Log-in monitoring & discrepancy reporting HIPAA-164.308(a)(5)(ii)(C) | |
Automatic logoff — terminate sessions after predetermined inactivity HIPAA-164.312(a)(2)(iii) | |
Encryption & decryption of ePHI at rest HIPAA-164.312(a)(2)(iv) | |
Encryption — encrypt ePHI in transit whenever deemed appropriate HIPAA-164.312(e)(2)(ii) |
