Skip to content

Latest commit

 

History

History
32 lines (22 loc) · 2.4 KB

configuration_management_policy.md

File metadata and controls

32 lines (22 loc) · 2.4 KB

Configuration Management Policy

Pact outsources its configuration management to Catalyze, a service provider that stores all of Pact's' ePHI. Catalyze has signed a BAA with Pact committing to the policy below.

Catalyze Configuration Management Policy

Catalyze standardizes and automates configuration management through the use of Salt scripts as well as documentation of all changes to production systems and networks. Salt automatically configures all Catalyze systems according to established and tested policies, and is used as part of our Disaster Recovery plan and process.

Applicable Standards from the HITRUST Common Security Framework

  • 06 - Configuration Management

Applicable Standards from the HIPAA Security Rule

  • 164.310(a)(2)(iii) Access Control & Validation Procedures

Configuration Management

  1. Salt is used to standardize and automate configuration management.
  2. OSSEC is used to scan systems every 2 hours and on reboot. These scans capture file system changes and also unauthorized or malicious software.
  3. No systems are deployed into Catalyze environments without approval of the Catalyze CTO.
  4. All changes to production systems, network devices, and firewalls are approved by the Catalyze CTO before they are implemented. Additionally, all changes are tested before they are implemented in production.
  5. An up-to-date inventory of systems is maintained using Google spreadsheets and architecture diagrams hosted on Google Apps and Box. All systems are categorized as production and utility to differentiate based on criticality.
  6. Clocks are synchronized across all systems using NTP. Modifying time data on systems is restricted.
  7. All front end functionality (developer dashboards and portals) is separated from backend (database and app servers) systems by being deployed on separate servers.
  8. All software and systems are tested using unit tests and end to end tests.
  9. All committed code is reviewed using pull requests (on Github) to assure software code quality and proactively detect potential security issues in development.
  10. Catalyze utilizes development and staging environments that mirror production to assure proper function.
  11. Catalyze also deploys environments locally using Vagrant to assure functionality before moving to staging or production.
  12. Catalyze schedules production deployments every four weeks.
  13. All formal change requests require unique ID and authentication.