🏥 Healthcare Compliance Training · 2024–2026

HIPAA Security Rule
Safeguards × Delinea Controls

A compliance module for healthcare organizations mapping HIPAA Security Rule requirements to Delinea PAM controls — grounded in the HHS 405(d) HICP framework and the 2024–2026 Security Rule modifications.

Regulatory Basis45 CFR §164.300–.318
FrameworkHHS 405(d) / HICP
Rule Status2024 NPRM → 2026 Final
Modules4 Safeguards + Checklist

⚡ 2024 Security Rule Update — What Changed

HHS OCR's December 2024 NPRM eliminates the "required vs. addressable" distinction — all 18 safeguards become mandatory. New requirements include MFA for all ePHI systems, biannual vulnerability scans, annual penetration testing, and mandatory ePHI restoration within 72 hours of a breach. The HHS 405(d) HICP framework — which already recommended many of these controls — now directly aligns with binding HIPAA requirements, making PAM solutions like Delinea a compliance necessity rather than a best practice.

18
Mandatory Safeguards
All required under 2026 final rule
4
Delinea-Mapped Controls
Covered in this module
72h
ePHI Recovery SLA
Post-breach restoration target
6mo
Risk Assessment Cycle
Biannual requirement
🔑
§164.312(a)(2)(i)

Unique User Identification

Eliminate shared admin accounts. Every privileged session must be attributable to a named individual.

⏱️
§164.312(a)(2)(iii)

Automatic Logoff

Session timeout controls that terminate idle sessions and prevent unauthorized re-use of privileged credentials.

📋
§164.312(b)

Audit Controls

Immutable, tamper-proof audit logs of all access to ePHI systems — the forensic backbone of breach response.

🛡️
§164.312(a)(1)

Access Control via PAM

Role-based access to PHI systems using Privileged Access Management — least privilege, JIT, and workflow approvals.

HHS 405(d) HICP Alignment

  • HICP Practice 3: Access Management → MFA & RBAC
  • HICP Practice 2: Endpoint Protection → Session controls
  • HICP Practice 8: Incident Response → Audit trail integrity
  • HICP Practice 10: Cybersecurity Policies → PAM governance

Delinea Product Coverage

  • Secret Server — Vault & credential management
  • Privilege Manager — Endpoint least-privilege
  • Connection Manager — Session recording & proxy
  • DevOps Secrets Vault — CI/CD & automation secrets

HIPAA Security Rule Timeline

1996
HIPAA enacted. National standards for healthcare data privacy established.
2003
Security Rule finalized. Administrative, physical, and technical safeguards codified. "Required vs. Addressable" distinction introduced.
2015
Cybersecurity Act §405(d). HHS mandated to develop HICP — the voluntary healthcare cybersecurity framework that prefigured today's HIPAA updates.
Dec 2024
HHS OCR NPRM. Proposed elimination of "addressable" safeguards. Mandatory MFA, biannual vulnerability scans, annual pen testing, 72hr ePHI recovery SLA.
2026
Final Rule expected. All 18 safeguards become mandatory. Organizations should begin compliance gap assessments now.
🔑

Unique User Identification

Administrative Safeguard · 45 CFR §164.308(a)(5) & §164.312(a)(2)(i)
ℹ️ HIPAA Requirement: Covered entities must assign a unique name and/or number to identify and track user identity. Under the 2024 NPRM, elimination of shared credentials for privileged accounts becomes explicitly required — no longer merely recommended.

The Problem: Shared Admin Accounts

  • Multiple staff share a single "sysadmin" or "administrator" credential
  • Impossible to attribute specific actions to individual users in audit logs
  • Password rotation forces coordinated downtime across teams
  • Departing employees retain access until passwords are manually changed
  • Violates both HIPAA minimum necessary standard and 405(d) HICP Practice 3

The Delinea Solution Secret Server

  • Vault stores privileged credentials — users never see the password
  • Each checkout is uniquely attributed: user, time, system, duration
  • Automatic password rotation after every checkout (check-in/check-out)
  • Just-In-Time (JIT) provisioning — accounts created on-demand, expire automatically
  • Break-glass accounts with dual-approval workflows and full session recording
REQUIREMENT → DELINEA CONTROL MAPPING ADMIN SAFEGUARD
§164.312(a)(2)(i)Assign unique identifier to each user
Secret ServerPer-user account checkout with attribution logging
§164.308(a)(3)(ii)(C)Terminate access for departed workforce members
Secret ServerAD/LDAP sync + automatic account disablement on HR trigger
§164.308(a)(4)(ii)(B)Minimum necessary access — least privilege
Privilege ManagerLocal admin removal + policy-based elevation
2024 NPRM — MFA MandateMFA required for all ePHI system access
Secret Server + MFAStep-up authentication for privileged credential checkout
⚠️ OCR Enforcement Note: OCR has cited shared credential use in multiple HIPAA settlements. In the 2023 Banner Health settlement ($1.25M), investigators found that terminated employee credentials remained active in privileged systems. Delinea's automated de-provisioning directly addresses this audit finding.

🧠 Knowledge Check — Module 1

Under HIPAA and the 2024 NPRM, which of the following BEST describes the requirement for privileged account credentials in a covered entity?

⏱️

Automatic Logoff

Technical Safeguard · 45 CFR §164.312(a)(2)(iii)
ℹ️ HIPAA Requirement: Implement electronic procedures that terminate an electronic session after a predetermined time of inactivity. This prevents unauthorized users from accessing ePHI via an unattended, authenticated workstation or session — a top vector for insider threat and opportunistic access.

Scope of the Requirement

  • Applies to all workstations and applications that access ePHI
  • Under the 2024 NPRM, timeout thresholds must be documented and risk-assessed
  • Privileged sessions (RDP, SSH, database consoles) carry the highest risk if left idle
  • HICP Practice 2 (Endpoint Protection) specifically calls for session lockout controls
  • Screen lock ≠ session termination — PAM-level logoff is distinct from OS screen savers

Delinea Session Controls Connection Manager

  • Configurable idle timeout per secret, per role, or per system classification
  • Session proxy architecture: Delinea intermediates all RDP/SSH — timeout enforced at the broker, not the endpoint
  • Session recording preserved even when the live session is terminated
  • Re-authentication required after timeout (MFA step-up for high-value targets)
  • Concurrent session limits prevent credential re-use across multiple open windows
REQUIREMENT → DELINEA CONTROL MAPPING TECHNICAL SAFEGUARD
§164.312(a)(2)(iii)Automatic logoff after inactivity period
Connection ManagerConfigurable idle timeout per session type/secret policy
§164.312(d)Unique user identification on re-authentication
Secret Server + MFAMFA step-up challenge on session resume
§164.308(a)(1)(ii)(A)Risk analysis — identify session hijack risk
Connection ManagerSession proxy prevents direct endpoint exposure; sessions recorded for forensic review
§164.312(e)(2)(ii)Encryption of ePHI in transit
Connection ManagerTLS-encrypted session tunnels for all RDP/SSH proxied connections

Recommended Timeout Thresholds by System Classification

System Type Rec. Timeout Delinea Policy
EHR / Clinical Workstation 5 min Per-secret idle timeout + MFA re-auth
Database Admin Console 10 min Session recording + auto-terminate on idle
Server RDP / SSH 15 min Connection Manager proxy termination
Break-Glass / Emergency Access 5 min / alert Real-time alert + forced timeout + full recording

🧠 Knowledge Check — Module 2

A nurse leaves an EHR workstation unattended for 20 minutes without logging out. The HIPAA Automatic Logoff requirement is meant to address this scenario. Which Delinea feature MOST directly fulfills this HIPAA control?

📋

Audit Controls & Immutable Logging

Technical Safeguard — Audit Controls · 45 CFR §164.312(b)
ℹ️ HIPAA Requirement: Implement hardware, software, and/or procedural mechanisms that record and examine activity in information systems that contain or use ePHI. The 2024 NPRM strengthens this by requiring audit logs be tamper-proof, retained for a defined period, and reviewable within a specific timeframe post-incident.

Why "Immutable" Matters

  • Logs that can be edited by admins are legally unreliable in breach investigations
  • OCR investigations hinge on demonstrating what happened, when, and by whom
  • Ransomware actors routinely delete or encrypt logs as part of their attack chain
  • HICP Practice 8 (Incident Response) requires preserved, trusted forensic evidence
  • Under 2024 NPRM: logs must be protected from unauthorized modification or deletion

Delinea Audit Architecture Connection Manager

  • Session recordings stored in a separate, cryptographically signed vault
  • Every session log includes: user identity, time, target system, commands, keystrokes
  • Video-equivalent session replay for RDP sessions — admissible as forensic evidence
  • SIEM integration (Splunk, QRadar, Sentinel) for real-time log forwarding
  • Retention policies configurable per system class — minimum 6 years for HIPAA covered entities
REQUIREMENT → DELINEA CONTROL MAPPING AUDIT CONTROLS
§164.312(b)Record and examine activity in ePHI systems
Connection ManagerFull keystroke/video session recording for all proxied sessions
§164.308(a)(1)(ii)(D)Information system activity review
Secret ServerCentralized audit trail dashboard — search by user, system, time, action
2024 NPRM — Tamper-proof logsProtect logs from unauthorized modification
Vault + SIEMCryptographically signed logs forwarded to immutable SIEM store
§164.308(a)(6)(ii)Incident response — forensic evidence preservation
Connection ManagerSession recordings isolated in separate vault inaccessible to compromised admin accounts
Delinea + 72-Hour Recovery SLA: The 2024 NPRM requires restoration of ePHI within 72 hours post-breach. Delinea's audit logs provide the forensic timeline necessary to scope the breach accurately — knowing exactly which systems were accessed, by which credential, and when, reduces recovery time by eliminating guesswork in the incident scope.

Audit Log Minimum Data Fields — HIPAA Evidence Standard

IDENTITY
Authenticated username, employee ID, source IP, device fingerprint
TIME
UTC timestamp of session start, each action, session end — millisecond precision
ACTION
Commands executed, files accessed, queries run, data exported or modified
TARGET SYSTEM
Hostname, IP, system classification (ePHI-containing or not)
INTEGRITY HASH
Cryptographic hash confirming log record has not been altered post-write
RETENTION
Minimum 6 years for HIPAA; Delinea policy enforces retention and alerts on premature deletion

🧠 Knowledge Check — Module 3

During an OCR breach investigation, the investigator requests all audit logs for privileged access to the hospital's database server for a 90-day window. The hospital's DBA claims the logs show no unusual activity. What Delinea capability ensures these logs can be trusted as forensic evidence?

🛡️

Access Control to PHI Systems via PAM

Technical Safeguard — Access Control · 45 CFR §164.312(a)(1)
ℹ️ HIPAA Requirement: Implement technical policies and procedures for electronic information systems that maintain ePHI to allow access only to those persons or software programs that have been granted access rights. Under HICP Practice 3, this maps directly to role-based access control (RBAC) and multi-factor authentication — both now mandatory under the 2024 NPRM.

RBAC Requirements for ePHI Systems

  • Access tied to job function — a billing analyst has no need for server shell access
  • Minimum necessary standard: grant only permissions required to perform the specific task
  • Access must be reviewed periodically — 2024 NPRM suggests 6-month certification cycle
  • Privileged access should be time-limited — JIT provisioning, not standing access
  • Separation of duties: the person who can approve access shouldn't also manage the vault

Delinea PAM Architecture Secret Server

  • Secret folders organized by role, team, and system classification
  • Role-based access policies: "RN-EHR-Read" vs "DBA-PHI-Full" — distinct secret permission sets
  • Workflow-based approvals: access requests trigger manager + security team sign-off
  • JIT: accounts provisioned at request, deprovisioned on session close — zero standing access for high-risk targets
  • Access reviews built into dashboard — exportable for HIPAA audit evidence
REQUIREMENT → DELINEA CONTROL MAPPING ACCESS CONTROL
§164.312(a)(1)Technical access control policies for ePHI systems
Secret ServerSecret permission model with role-based folder access and policy enforcement
§164.312(a)(2)(ii)Emergency access — break-glass procedures
Secret ServerBreak-glass workflow with dual approval, auto-alert, and mandatory post-use review
§164.308(a)(4)(ii)(B)Access establishment and modification
Secret Server + ADSCIM/AD-sync provisioning with automated role assignment based on HR attributes
2024 NPRM — MFA for all ePHI accessMulti-factor authentication mandatory
Secret Server MFATOTP/FIDO2 step-up required for secret checkout on classified systems
2024 NPRM — Periodic access reviewCertify access every 6 months
Secret Server ReportsAutomated access certification reports exportable for audit evidence packages
⚠️ The 405(d) Connection: HICP Practice 3 (Access Management) directly maps to this module. HHS designed HICP to bridge the gap between abstract HIPAA language and concrete technical controls. The 2024 NPRM essentially codifies HICP Practice 3 — organizations already following 405(d) guidance with a PAM solution like Delinea are well-positioned to demonstrate compliance.

Sample Role → Secret Access Matrix

Role EHR Admin DB Server Network Break-Glass
Clinical RN Read
IT System Admin Approval Req. Approval Req. Full
DBA Full + Recorded
Security Officer Approve Only Approve Only Approve Only Dual Approval

🧠 Knowledge Check — Module 4

A hospital's IT team wants to implement HIPAA-compliant access control to its EHR database server using Delinea. Which approach BEST aligns with both HIPAA §164.312(a)(1) and the 2024 NPRM's minimum necessary and MFA requirements?

HIPAA Evidence Checklist

Use this checklist to document compliance evidence for each HIPAA Security Rule safeguard mapped to Delinea controls. Check each item as evidence is collected, policies are documented, or controls are verified.

Administrative Safeguards — Unique User Identification
Shared account inventory completed
All shared/generic admin accounts identified across ePHI systems (EHR, databases, servers, network devices). Documented in risk register.
ADMIN
Delinea Secret Server deployed and configured for privileged accounts
All identified shared accounts migrated to Secret Server vault. Individual user checkout configured. Password rotation policy active.
ADMIN
AD/LDAP synchronization configured for automated de-provisioning
Delinea connected to Active Directory. Workflow tested: HR offboarding triggers account disable in Secret Server within 4 hours.
ADMIN
MFA enforced for all privileged credential checkout
TOTP or FIDO2 MFA required for Secret Server login and high-sensitivity secret checkout. Bypass exceptions documented and approved by CISO.
ADMIN
Workforce training on unique account usage completed
All IT staff and privileged users trained on the prohibition of shared credentials and the process for requesting access via Delinea.
ADMIN
Technical Safeguards — Automatic Logoff
Session timeout policy documented and approved
Written policy defines idle timeout thresholds by system classification. Approved by Security Officer and Privacy Officer. Reviewed annually.
TECH
Delinea Connection Manager configured with idle timeout per secret policy
EHR sessions: 5 min. Database consoles: 10 min. Server RDP/SSH: 15 min. Break-glass: 5 min + real-time alert. All tested and documented.
TECH
MFA re-authentication on session resume confirmed
After idle timeout, user must re-authenticate with MFA before session can be resumed. Tested and documented in control testing log.
TECH
Concurrent session limits enforced
Maximum concurrent sessions per user per secret configured in Secret Server. Alert triggered if anomalous concurrent session activity detected.
TECH
Audit Controls — Immutable Logging
Session recording enabled for all ePHI-adjacent privileged sessions
All RDP, SSH, and database sessions proxied through Delinea Connection Manager with video/keystroke recording enabled. Coverage documented per system inventory.
AUDIT
Log integrity — cryptographic signing configured
Delinea audit logs cryptographically signed on write. Hash validation procedure documented. SIEM integration active for immutable off-vault copy.
AUDIT
Log retention policy set to minimum 6 years
Retention policy configured in Secret Server and SIEM. Automated alert on premature deletion attempt. Storage capacity reviewed quarterly.
AUDIT
Information system activity review — monthly log review procedure
Security team conducts monthly review of anomalous access patterns via Secret Server reports. Review documented in audit log. Escalation path defined.
AUDIT
Incident response — audit log access procedure documented
Incident response plan includes step-by-step procedure for pulling Delinea session recordings as forensic evidence within the 72-hour OCR-required notification window.
AUDIT
Access Control — Role-Based Access to PHI Systems via PAM
Role-based secret folder structure implemented in Secret Server
Folders organized by role and system classification. Access rights mapped to job functions. Reviewed and approved by Security Officer.
ACCESS
Access request and approval workflow active
Workflow-based access requests configured in Secret Server for sensitive ePHI systems. Dual-approval for break-glass accounts. Ticket trail generated per request.
ACCESS
JIT provisioning enabled for high-risk ePHI system access
Zero standing access configured for database servers and EHR admin consoles. Accounts provisioned on-demand and deprovisioned on session close. JIT policy documented.
ACCESS
Semi-annual access certification completed
All privileged access rights reviewed by managers every 6 months. Delinea access certification report generated, attested, and filed as HIPAA audit evidence.
ACCESS
Privilege Manager deployed — local admin removal on clinical endpoints
Delinea Privilege Manager removes local admin rights from clinical workstations. Policy-based elevation for approved applications only. Exceptions logged.
ACCESS
HHS 405(d) HICP Practice 3 self-assessment completed
Organization has completed the HICP self-assessment tool for Access Management (Practice 3). Gaps documented. Delinea deployment mapped as remediation evidence.
ACCESS
0
Items Evidenced
19
Total Items
0%
Completion