Skip to content

15. IDS Policy

In order to preserve the integrity of data that W2H stores, processes, or transmits for Customers, W2H in conjunction with PMACS and Penn Medicine Cybersecurity implements strong intrusion detection tools and policies to proactively track and retroactively investigate unauthorized access.

15.1 Applicable Standards

15.1.1 Applicable Standards from the HITRUST Common Security Framework

  • 09.ab - Monitoring System Use
  • 06.e - Prevention of Misuse of Information
  • 10.h - Control of Operational Software

15.1.2 Applicable Standards from the HIPAA Security Rule

  • 164.312(b) - Audit Controls

15.2 Intrusion Detection Policy

  1. FortiGuard is used to monitor and correlate log data from different systems on an ongoing basis. Reports generated by FortiGuard are reviewed by the Cybersecurity on an ongoing basis.
  2. Automatic monitoring is done to identify patterns that might signify the lack of availability of certain services and systems (DoS attacks) using Fortinet FortiGate.
  3. W2H firewalls monitor all incoming traffic to detect potential denial of service attacks. Suspected attack sources are blocked automatically.
  4. All new firewall rules and configuration changes are tested before being pushed into production. All firewall and router rules are reviewed every quarter.
Back to top