HICP98
HICP · HICP Practice 1.1 · HICP Practice 1.10 · HICP Practice 1.2 · HICP Practice 1.3 · HICP Practice 1.4 · HICP Practice 1.5 · HICP Practice 1.6 · HICP Practice 1.7 · HICP Practice 1.8 · HICP Practice 1.9 · HICP Practice 10.1 · HICP Practice 10.2 · HICP Practice 10.3 · HICP Practice 10.4 · HICP Practice 10.5 · HICP Practice 10.6 · HICP Practice 10.7 · HICP Practice 10.8 · HICP Practice 2.1 · HICP Practice 2.10 · HICP Practice 2.2 · HICP Practice 2.3 · HICP Practice 2.4 · HICP Practice 2.5 · HICP Practice 2.6 · HICP Practice 2.7 · HICP Practice 2.8 · HICP Practice 2.9 · HICP Practice 3.1 · HICP Practice 3.10 · HICP Practice 3.2 · HICP Practice 3.3 · HICP Practice 3.4 · HICP Practice 3.5 · HICP Practice 3.6 · HICP Practice 3.7 · HICP Practice 3.8 · HICP Practice 3.9 · HICP Practice 4.1 · HICP Practice 4.10 · HICP Practice 4.2 · HICP Practice 4.3 · HICP Practice 4.4 · HICP Practice 4.5 · HICP Practice 4.6 · HICP Practice 4.7 · HICP Practice 4.8 · HICP Practice 4.9 · HICP Practice 5.1 · HICP Practice 5.10 · HICP Practice 5.2 · HICP Practice 5.3 · HICP Practice 5.4 · HICP Practice 5.5 · HICP Practice 5.6 · HICP Practice 5.7 · HICP Practice 5.8 · HICP Practice 5.9 · HICP Practice 6.1 · HICP Practice 6.2 · HICP Practice 6.3 · HICP Practice 6.4 · HICP Practice 6.5 · HICP Practice 6.6 · HICP Practice 7.1 · HICP Practice 7.2 · HICP Practice 7.3 · HICP Practice 7.4 · HICP Practice 7.5 · HICP Practice 7.6 · HICP Practice 8.1 · HICP Practice 8.10 · HICP Practice 8.2 · HICP Practice 8.3 · HICP Practice 8.4 · HICP Practice 8.5 · HICP Practice 8.6 · HICP Practice 8.7 · HICP Practice 8.8 · HICP Practice 8.9 · HICP Practice 9.1 · HICP Practice 9.2 · HICP Practice 9.3 · HICP Practice 9.4 · HICP Practice 9.5 · HICP Practice 9.6 · HICP Practice 9.7 · HICP Practice 9.8
Requirements in this framework
- Access Logging and Monitoring
- Access management
- Access Reviews and Recertification
- Account Provisioning and Deprovisioning
- Antivirus and Anti-Malware
- Application Whitelisting
- Backup and Recovery
- Breach Notification Procedures
- Business Associate Agreements
- Business Continuity Planning
- Cloud Data Protection
- Cyber Insurance Coordination
- Cybersecurity Governance
- Data Classification
- Data Disposal and Sanitization
- Data Inventory and Mapping
- Data Loss Prevention Controls
- Data Minimization
- Data protection and loss prevention
- Data protection and loss prevention operations
- Data Protection Monitoring
- Data Retention Policy
- De-Identification and Anonymization
- DMARC Email Authentication
- DNS Security
- Email Attachment Sandboxing
- Email Data Loss Prevention
- Email Encryption
- Email Protection System Implementation
- Email protection systems
- Email Security Logging and Monitoring
- Email Security Policy
- Encryption at Rest
- Encryption in Transit
- Endpoint Backup and Recovery
- Endpoint Detection and Response
- Endpoint Hardening
- Endpoint Inventory and Visibility
- Endpoint protection
- External Email Tagging
- Firewall and Perimeter Protection
- Full Disk Encryption
- Host-Based Firewall
- Identity Analytics and Risk Scoring
- Identity and access management controls
- Identity Directory Services
- Identity Governance Framework
- Incident Communication Plan
- Incident response and cyber resilience
- Incident Response Automation
- Incident Response Plan
- Incident Response Team
- Intrusion Detection and Prevention
- IoT and Connected Device Security
- Legacy System Compensating Controls
- Manufacturer Disclosure Review
- Medical device and legacy system risk management
- Medical Device Inventory
- Medical Device Lifecycle Management
- Medical Device Network Isolation
- Medical Device Patch Management
- Medical Device Risk Assessment
- Mobile Device Management
- Multi-Factor Authentication
- Network Architecture Documentation
- Network management and resilience
- Network Monitoring and Logging
- Network Segmentation
- Network Vulnerability Management
- Password Policy and Credential Management
- Patch Management
- PHI Data Handling Procedures
- Phishing Simulation and Training
- Post-Incident Analysis
- Privileged Access Management
- Ransomware Response Planning
- Removable Media Controls
- Role-Based Access Control
- Security Awareness Training
- Separation of Duties
- Service Account Management
- Session Management
- Single Sign-On Integration
- Supply Chain Risk Management
- Suspicious Email Reporting
- Tabletop Exercises and Testing
- Third-party and business partner cybersecurity
- Vendor Access Controls
- Vendor Incident Response Coordination
- Vendor Offboarding
- Vendor Risk Assessment
- Vendor Risk Tiering
- Vendor Security Monitoring
- VPN and Remote Access Security
- Wireless Network Security
- Workforce Identity Verification
- Zero Trust Access Principles
- Zero Trust Architecture Planning