Skip to main content

Documentation Index

Fetch the complete documentation index at: https://docs.encoreos.io/llms.txt

Use this file to discover all available pages before exploring further.

Version: 1.0.0 Last Updated: 2026-02-27 Status: Active Module: IT (IT & Security)
Cross-References:

Overview

This document tracks information security and IT compliance obligations for Encore Health OS as a healthcare technology platform processing ePHI. The IT module covers HIPAA Security Rule safeguards, HITECH breach notification, cybersecurity frameworks (NIST CSF, CIS Controls), state data breach notification, and related standards (SOC 2, PCI DSS).

1. HIPAA Security Rule (45 CFR 164 Subpart C)

1.1 Administrative Safeguards (§164.308)

#RequirementResponsible SpecStatusNotes
HS-A01Risk analysis — Conduct accurate and thorough assessment of risks to ePHIIT-05⏳ Not StartedAnnual risk analysis; document findings and remediation
HS-A02Risk management — Implement measures sufficient to reduce risks to reasonable and appropriate levelIT-05⏳ Not StartedRisk treatment plan; track mitigation actions
HS-A03Workforce security — Ensure appropriate access to ePHI; prevent unauthorized accessPF-30 (permissions), HR-01🟡 PartialRole-based access in PF-30; authorization/supervision procedures needed
HS-A04Information access management — Authorize access to ePHI consistent with access policiesPF-30🟡 PartialPermission system implemented; access review procedures needed
HS-A05Security awareness training — Security training program for all workforce membersIT-05, HR-04⏳ Not StartedTraining tracking in HR-04; security-specific curriculum needed
HS-A06Security incident procedures — Identify, respond to, and mitigate security incidentsIT-05⏳ Not StartedIncident response plan; SIEM integration
HS-A07Contingency plan — Establish data backup, disaster recovery, and emergency operations plansIT-05⏳ Not StartedBackup strategy (Supabase); RTO/RPO documentation
HS-A08Business associate agreements — Written agreements with all business associates handling ePHIPF-44🟡 PartialBAA with Supabase; BAA tracking for all vendors needed

1.2 Physical Safeguards (§164.310)

#RequirementResponsible SpecStatusNotes
HS-P01Facility access controls — Limit physical access to systems containing ePHIIT-05📋 CloudCloud-hosted (Supabase/Vercel); data center physical security managed by providers
HS-P02Workstation use and security — Policies for workstation access and physical safeguardsIT-05⏳ Not StartedEndpoint security policies needed
HS-P03Device and media controls — Procedures for disposal, re-use, and transfer of ePHI mediaIT-05⏳ Not StartedData disposal procedures; encryption at rest

1.3 Technical Safeguards (§164.312)

#RequirementResponsible SpecStatusNotes
HS-T01Access control — Unique user identification, emergency access, automatic logoff, encryptionPF-30, PF-01🟡 PartialSupabase Auth (PF-01); RBAC (PF-30); session timeout and emergency access procedures needed
HS-T02Audit controls — Hardware, software, and procedural mechanisms to record and examine ePHI accessPF-40 (audit logging)🟡 PartialAudit logging implemented; log review and retention procedures needed
HS-T03Integrity controls — Protect ePHI from improper alteration or destructionPF, RLS🟡 PartialRLS policies enforce data integrity; additional integrity verification needed
HS-T04Person or entity authentication — Verify identity of person/entity seeking ePHI accessPF-01✅ CompliantSupabase Auth with MFA support
HS-T05Transmission security — Encrypt ePHI in transit (TLS/SSL)PF, Supabase✅ CompliantAll Supabase connections use TLS; Vercel serves HTTPS

1.4 Encryption at Rest and Key Management (Module-Specific)

#Spec / ModuleRequirementStatusNotes
KM-01PM-33 (Capitation)member_id_external (MCO-assigned member ID) encrypted at rest via pgcrypto pgp_sym_encrypt; keys stored in Supabase Vault. Key rotation: Privacy Officer and Security Officer agree on rotation cadence during PM-33 sign-off (e.g. annual per FA-SECURITY-CONSIDERATIONS or 90-day service key). Agreed cadence must be recorded in this tracker and in PM-33-COMPLIANCE-SIGNOFF.md.📋 Pending sign-offRotation plan documented upon PM-33 compliance sign-off

2. HITECH Act

#RequirementResponsible SpecStatusNotes
HT-01Breach notification — individuals — Notify affected individuals without unreasonable delay (within 60 days)IT-05, PF-44⏳ Not StartedBreach notification workflow; template letters
HT-02Breach notification — HHS — Report breaches of 500+ individuals to HHS and mediaIT-05⏳ Not StartedHHS breach reporting portal integration or manual process
HT-03Breach notification — small breaches — Annual report to HHS for breaches < 500 individualsIT-05⏳ Not StartedBreach log; annual compilation and submission
HT-04Risk assessment for breach determination — Assess probability that PHI was compromisedIT-05⏳ Not StartedRisk assessment methodology per HITECH 4-factor test
HT-05Business associate obligations — BAs directly liable for HIPAA Security Rule compliancePF-44, IT-05🟡 PartialBAA tracking; vendor security assessments needed
HT-06Encryption safe harbor — Encrypted/destroyed data exempt from breach notificationIT-05🟡 PartialSupabase encryption at rest; application-level encryption review needed

3. Cybersecurity Frameworks

3.1 NIST Cybersecurity Framework (CSF 2.0)

#FunctionResponsible SpecStatusNotes
NIST-01Identify — Asset management, risk assessment, governanceIT-05⏳ Not StartedAsset inventory; risk register; governance framework
NIST-02Protect — Access control, awareness training, data security, maintenanceIT-05, PF-30🟡 PartialAccess control via PF-30; training and maintenance procedures needed
NIST-03Detect — Anomalies and events, continuous monitoring, detection processesIT-05⏳ Not StartedSIEM/monitoring; alerting; log analysis
NIST-04Respond — Response planning, communications, analysis, mitigation, improvementsIT-05⏳ Not StartedIncident response plan; communication templates
NIST-05Recover — Recovery planning, improvements, communicationsIT-05⏳ Not StartedDisaster recovery plan; business continuity
NIST-06Govern (CSF 2.0 new) — Organizational context, risk management strategy, supply chain riskIT-05⏳ Not StartedCybersecurity governance framework

3.2 CIS Critical Security Controls v8

#ControlResponsible SpecStatusNotes
CIS-01Inventory and control of enterprise assetsIT-05⏳ Not StartedAsset inventory system
CIS-02Inventory and control of software assetsIT-05🟡 Partialpackage.json/lock files track dependencies; formal software inventory needed
CIS-03Data protection — Classify and protect sensitive dataIT-05, PF-44🟡 PartialPHI_CLASSIFICATION.md exists; data loss prevention needed
CIS-04Secure configuration — Establish and maintain secure configurationsIT-05🟡 PartialInfrastructure-as-code partially; CIS benchmarks audit needed
CIS-05Account management — Manage lifecycle of accountsPF-30, PF-01🟡 PartialAuth and RBAC in place; formal lifecycle (provisioning/deprovisioning) review needed
CIS-06Access control management — Create, assign, manage, and revoke accessPF-30🟡 PartialPermission system; periodic access review procedures needed
CIS-07Continuous vulnerability management — Identify, prioritize, remediate vulnerabilitiesIT-05⏳ Not StartedDependabot/Snyk scanning; vulnerability management process

4. Arizona Data Breach Notification (ARS 18-552)

#RequirementResponsible SpecStatusNotes
AZ-B01Investigation requirement — Investigate security incidents to determine if breach occurredIT-05⏳ Not StartedIncident investigation procedures
AZ-B0245-day notification — Notify affected individuals within 45 days of breach determinationIT-05⏳ Not StartedNotification workflow; template letters
AZ-B031,000+ threshold reporting — Notify AG, DHS, and CRAs for breaches of 1,000+ individualsIT-05⏳ Not StartedAG notification form; CRA contact procedures
AZ-B04HIPAA exemption — HIPAA-covered entities following HIPAA breach notification are exempt from ARS 18-552IT-05📋 AwarenessEncore Health OS as HIPAA CE follows HIPAA rules; ARS 18-552 exemption applies to PHI breaches

5. SOC 2 (Service Organization Control)

#RequirementResponsible SpecStatusNotes
SOC-01SOC 2 Type II readiness — Trust service criteria: security, availability, processing integrity, confidentiality, privacyIT-05⏳ Not StartedEvaluate need based on customer/payer requirements; Supabase has SOC 2
SOC-02Control documentation — Document and test controls per trust service criteriaIT-05⏳ Not StartedIf pursuing SOC 2: map controls to criteria; engage auditor
SOC-03Vendor SOC reports — Obtain and review SOC reports from subservice organizations (Supabase, Vercel, Stripe)IT-05⏳ Not StartedAnnual vendor SOC report review

6. PCI DSS

#RequirementResponsible SpecStatusNotes
PCI-01PCI DSS applicability assessment — Determine if cardholder data is stored/processed/transmittedIT-05📋 Assessment neededIf Stripe tokenization is used exclusively, PCI scope is minimal (SAQ-A eligible)
PCI-02SAQ-A compliance (if applicable) — Self-Assessment Questionnaire A for merchants who outsource all cardholder dataIT-05⏳ Not StartedComplete SAQ-A annually if payment processing is in scope

7. Authoritative External References

SourceURLUsed By
HIPAA Security Rule (45 CFR 164 Subpart C)https://www.hhs.gov/hipaa/for-professionals/security/index.htmlIT-05
NIST SP 800-66r2 (Implementing HIPAA Security Rule)https://csrc.nist.gov/pubs/sp/800/66/r2/finalIT-05
NIST Cybersecurity Framework 2.0https://www.nist.gov/cyberframeworkIT-05
CIS Critical Security Controls v8https://www.cisecurity.org/controlsIT-05
HITECH Acthttps://www.hhs.gov/hipaa/for-professionals/special-topics/hitech-act-enforcement-interim-final-rule/index.htmlIT-05
HHS: Breach Notification Rulehttps://www.hhs.gov/hipaa/for-professionals/breach-notification/index.htmlIT-05
Arizona ARS 18-552 (Data breach notification)https://www.azleg.gov/ars/18/00552.htmIT-05
Arizona AG: Data Breach FAQhttps://www.azag.gov/consumer/data-breach/faqIT-05
PCI Security Standards Councilhttps://www.pcisecuritystandards.org/IT-05
SOC 2 (AICPA)https://us.aicpa.org/interestareas/frc/assuranceadvisoryservices/sorhomeIT-05

8. Periodic Review Schedule

ReviewFrequencyNext DueOwner
HIPAA Security risk analysisAnnuallyYYYY-MM-DDCISO / Security Officer
NIST CSF maturity assessmentAnnuallyYYYY-MM-DDCISO / Security Officer
Vulnerability scanningMonthly (or continuous)YYYY-MM-DDEngineering / DevOps
Penetration testingAnnuallyYYYY-MM-DDExternal vendor
Incident response plan testAnnuallyYYYY-MM-DDCISO / Security Officer
BAA inventory reviewAnnuallyYYYY-MM-DDPrivacy Officer
Vendor SOC report reviewAnnuallyYYYY-MM-DDCISO / Security Officer
Backup and recovery testSemi-annuallyYYYY-MM-DDDevOps
PCI SAQ-A (if applicable)AnnuallyYYYY-MM-DDFinance / IT

Version History

1.0.0 (2026-02-27)

  • Initial comprehensive IT security compliance document
  • Covers HIPAA Security Rule (admin/physical/technical safeguards), HITECH, NIST CSF 2.0, CIS Controls v8, Arizona breach notification, SOC 2, PCI DSS
  • 40+ compliance requirements tracked across 6 categories

Last Updated: 2026-02-27 Next Review: 2026-05-27