Implement policies and procedures to prevent, detect, contain, and correct security violations.
Arctic Wolf monitors end user and administrative access and configuration changes to all systems that create, receive, maintain, and transmit ePHI data, which enables development/enhancement of the required policies and
procedures. Arctic Wolf™ Managed Risk continuously scans your internal and external networks and devices for vulnerabilities, enabling you to take proactive intervention on identified risks.
Implement policies and procedures to ensure that all members of
its workforce have appropriate access to ePHI and prevent people who do not have access to ePHI.
Arctic Wolf monitors activities of active and in-active user accounts, escalates de-provisioning of in-active accounts through manual/automated means, which enables development/ enhancement of the required policies and procedures.
Implement policies and procedures for authorizing access to ePHI data that are consistent with the applicable requirements.
Arctic Wolf audits changes in Active Directory (AD), Group Policies, Exchange, and file servers, and flags unauthorized actions, which enables development/ enhancement of the required policies and procedures.
Log-in Monitoring and Password Management
Procedures for monitoring log-in attempts, reporting discrepancies, and monitoring password changes.
Arctic Wolf monitors failed/successful logins/logoffs and all password changes to prevent excessive help desk calls.
Security Incident Procedures
Implement policies and procedures to address security incidents.
Arctic Wolf investigates all attack vectors (e.g. phishing, ransomware, etc.), and generates security incidents to initiate response actions, which enables development/enhancement of the required policies and procedures.
Disaster Recovery Plan
Establish policies and procedures for responding to an emergency or other occurrence.
Arctic Wolf audits anomalous login activity, and changes, including before/ after values for immediate data recovery. This promotes quick rollback of unauthorized and accidental changes to Active Directory and other systems.
Implement physical safeguards for all workstations that access ePHI data to restrict access to authorized users.
Arctic Wolf scans endpoints for unpatched vulnerabilities, and collects log information from endpoint security solutions when unauthorized access or advanced malware is detected. The Arctic Wolf™ Agent is deployed on Windows and Mac workstations to provide additional safeguards to physical devices.
Implement technical policies and procedures for electronic information
systems that maintain ePHI data to allow access only to those persons or software programs authorized to have it.
Arctic Wolf collects relevant data from access control systems and Active Directory, monitoring endpoint activity, and file access. It escalates unauthorized access via security incidents to the Concierge Security Team.
Implement hardware, software, and/or procedural mechanisms that record and examine activity in endpoints that contain ePHI data.
The Arctic Wolf Concierge Security Team monitors and reports user logins/ logouts in Active Directory, all user activity on endpoints, and continuously monitors network traffic to detect anomalous activity.
Maintain policies and procedures implemented to comply with documentation requirements.
Arctic Wolf provides reports for account creations and deletions, data retention policies, admin lockouts, configuration changes, and about who, what, where, and when these changes were made.