6 software testing strategies for hipaa compliance
TRANSCRIPT
![Page 1: 6 Software Testing Strategies for HIPAA Compliance](https://reader034.vdocument.in/reader034/viewer/2022042723/5870ea9c1a28abcf288b6a19/html5/thumbnails/1.jpg)
6 SoftwareTesting Strategies
for HIPAACompliance
![Page 2: 6 Software Testing Strategies for HIPAA Compliance](https://reader034.vdocument.in/reader034/viewer/2022042723/5870ea9c1a28abcf288b6a19/html5/thumbnails/2.jpg)
The Health Insurance Portability and Accountability Act (HIPAA) sets
STANDARDS to PROTECT patient data.
![Page 3: 6 Software Testing Strategies for HIPAA Compliance](https://reader034.vdocument.in/reader034/viewer/2022042723/5870ea9c1a28abcf288b6a19/html5/thumbnails/3.jpg)
When testing in the healthcare domain, your team MUST
understand HIPAA regulations.
![Page 4: 6 Software Testing Strategies for HIPAA Compliance](https://reader034.vdocument.in/reader034/viewer/2022042723/5870ea9c1a28abcf288b6a19/html5/thumbnails/4.jpg)
Apply these 6 strategies to ensureFULL COMPLIANCE
with HIPAA:
![Page 5: 6 Software Testing Strategies for HIPAA Compliance](https://reader034.vdocument.in/reader034/viewer/2022042723/5870ea9c1a28abcf288b6a19/html5/thumbnails/5.jpg)
1. ACCESS CONTROL
![Page 6: 6 Software Testing Strategies for HIPAA Compliance](https://reader034.vdocument.in/reader034/viewer/2022042723/5870ea9c1a28abcf288b6a19/html5/thumbnails/6.jpg)
Provide users theMINIMUM
amount of data forTASK COMPLETION
![Page 7: 6 Software Testing Strategies for HIPAA Compliance](https://reader034.vdocument.in/reader034/viewer/2022042723/5870ea9c1a28abcf288b6a19/html5/thumbnails/7.jpg)
TYPES OFACCESS CONTROL:
USER-BASED
![Page 8: 6 Software Testing Strategies for HIPAA Compliance](https://reader034.vdocument.in/reader034/viewer/2022042723/5870ea9c1a28abcf288b6a19/html5/thumbnails/8.jpg)
TYPES OFACCESS CONTROL:
USER-BASED
ROLE-BASED
![Page 9: 6 Software Testing Strategies for HIPAA Compliance](https://reader034.vdocument.in/reader034/viewer/2022042723/5870ea9c1a28abcf288b6a19/html5/thumbnails/9.jpg)
TYPES OFACCESS CONTROL:
USER-BASED
ROLE-BASED
CONTEXT-BASED
![Page 10: 6 Software Testing Strategies for HIPAA Compliance](https://reader034.vdocument.in/reader034/viewer/2022042723/5870ea9c1a28abcf288b6a19/html5/thumbnails/10.jpg)
2. ENCRYPTED DATA TRANSFERS
![Page 11: 6 Software Testing Strategies for HIPAA Compliance](https://reader034.vdocument.in/reader034/viewer/2022042723/5870ea9c1a28abcf288b6a19/html5/thumbnails/11.jpg)
ENCRYPT/DECRYPTdata before
SHARING/STORING
![Page 12: 6 Software Testing Strategies for HIPAA Compliance](https://reader034.vdocument.in/reader034/viewer/2022042723/5870ea9c1a28abcf288b6a19/html5/thumbnails/12.jpg)
3. DATA SANITIZATION
![Page 13: 6 Software Testing Strategies for HIPAA Compliance](https://reader034.vdocument.in/reader034/viewer/2022042723/5870ea9c1a28abcf288b6a19/html5/thumbnails/13.jpg)
ReplacePATIENT DATAwith genericTEST DATA
![Page 14: 6 Software Testing Strategies for HIPAA Compliance](https://reader034.vdocument.in/reader034/viewer/2022042723/5870ea9c1a28abcf288b6a19/html5/thumbnails/14.jpg)
4. STRUCTURED DATA APPROACH
![Page 15: 6 Software Testing Strategies for HIPAA Compliance](https://reader034.vdocument.in/reader034/viewer/2022042723/5870ea9c1a28abcf288b6a19/html5/thumbnails/15.jpg)
StandardizeTEST DATA todefine testingperformed at
DIFFERENT LEVELS
![Page 16: 6 Software Testing Strategies for HIPAA Compliance](https://reader034.vdocument.in/reader034/viewer/2022042723/5870ea9c1a28abcf288b6a19/html5/thumbnails/16.jpg)
5. AUDIT TRAIL
![Page 17: 6 Software Testing Strategies for HIPAA Compliance](https://reader034.vdocument.in/reader034/viewer/2022042723/5870ea9c1a28abcf288b6a19/html5/thumbnails/17.jpg)
AUDIT TRAILSMONITOR:
MODIFICATIONS
![Page 18: 6 Software Testing Strategies for HIPAA Compliance](https://reader034.vdocument.in/reader034/viewer/2022042723/5870ea9c1a28abcf288b6a19/html5/thumbnails/18.jpg)
AUDIT TRAILSMONITOR:
MODIFICATIONS
DELETIONS
![Page 19: 6 Software Testing Strategies for HIPAA Compliance](https://reader034.vdocument.in/reader034/viewer/2022042723/5870ea9c1a28abcf288b6a19/html5/thumbnails/19.jpg)
AUDIT TRAILSMONITOR:
MODIFICATIONS
DELETIONS
USER/TIMESTAMP
![Page 20: 6 Software Testing Strategies for HIPAA Compliance](https://reader034.vdocument.in/reader034/viewer/2022042723/5870ea9c1a28abcf288b6a19/html5/thumbnails/20.jpg)
6. FAILOVER/LOADBALANCING
![Page 21: 6 Software Testing Strategies for HIPAA Compliance](https://reader034.vdocument.in/reader034/viewer/2022042723/5870ea9c1a28abcf288b6a19/html5/thumbnails/21.jpg)
GOOD STRATEGYRESULTS IN:DATA SECURITY
![Page 22: 6 Software Testing Strategies for HIPAA Compliance](https://reader034.vdocument.in/reader034/viewer/2022042723/5870ea9c1a28abcf288b6a19/html5/thumbnails/22.jpg)
GOOD STRATEGYRESULTS IN:DATA SECURITY
MINIMAL DATA LOSS
![Page 23: 6 Software Testing Strategies for HIPAA Compliance](https://reader034.vdocument.in/reader034/viewer/2022042723/5870ea9c1a28abcf288b6a19/html5/thumbnails/23.jpg)
GOOD STRATEGYRESULTS IN:DATA SECURITY
MINIMAL DATA LOSS
IMMEDIATE RECOVERY
![Page 24: 6 Software Testing Strategies for HIPAA Compliance](https://reader034.vdocument.in/reader034/viewer/2022042723/5870ea9c1a28abcf288b6a19/html5/thumbnails/24.jpg)
LEARN MORE ABOUT
HEALTHCARE APPLICATION TESTING
SEE ALL 6 STRATEGIES IN THE FULL BLOG POST:HOW TO COMPLY WITH HIPPA: 6 SOFTWARE
TESTING STRATEGIES
QUESTIONS ABOUT HEALTHCARE TESTING?VISIT US AT QASOURCE.COM