Baseline Overview
The HIPAA Security Rule requires covered entities to implement reasonable and appropriate safeguards to protect the confidentiality, integrity, and availability of ePHI. The following settings represent the minimum configuration required to use AXIS CloudSync in a HIPAA-compliant manner.
Important
Authentication Requirements
| Setting | Recommended Value | Where to Configure |
|---|---|---|
| Two-Step Authentication | Required for all users | Admin → Settings → Policies (Require Two-Step Authentication checkbox) |
| Password Expiration | Force change every 90 days or fewer | Admin → Settings → Policies (Force Password Change After) |
| Session Timeout | 15–30 minutes of inactivity | Enforced by your identity provider or SSO solution; not a configurable setting in AXIS CloudSync |
| Failed Login Lockout | Lock after 5–10 failed attempts | Handled automatically by the AXIS CloudSync platform; not a configurable admin setting |
| API Token Expiration | 30 days or fewer | Admin → Settings → Policies (Deactivate API Tokens After) |
Important
Access Control
- Principle of Least Privilege: Grant users only the minimum access they need to perform their job. Use Read Only permissions where write access is not required.
- Role-Based Access: Use Team Shares with specific permission levels rather than giving all users access to all files.
- Regular Access Reviews: Review user permissions quarterly. Remove access for users who no longer need it.
- Prompt Deprovisioning: Suspend or delete accounts immediately when an employee leaves or changes roles.
- Guest Access Controls: Require administrator approval for all guest account creation.
Audit & Monitoring
- Enable audit logging for all user and admin actions (enabled by default — verify it is not disabled).
- Configure log retention for a minimum of 6 years to meet HIPAA documentation requirements.
- Set up automated compliance reports to be delivered to your compliance officer monthly.
- Review failed login reports weekly to detect unauthorized access attempts.
- Investigate any anomalous access patterns: after-hours access, bulk downloads, access from unusual IP addresses.
Encryption
AXIS CloudSync provides the following encryption protections automatically — verify these are active for your account:
- In Transit: All data is encrypted using TLS 1.2 or higher during transmission.
- At Rest: All data is encrypted using AES-256 encryption on AXIS CloudSync servers.
- End-to-End: Files are encrypted before leaving your device and decrypted only by authorized users.
- Key Management: AXIS CloudSync manages encryption keys. For organizations requiring customer-managed keys (CMK), contact your account manager.
Compliance Checklist
- ☐ Two-Step Authentication enforced for all users
- ☐ Password policy configured (minimum length, complexity, expiration)
- ☐ Session timeout set to 15–30 minutes
- ☐ Failed login lockout enabled
- ☐ Share expiration policy communicated to all users (7 days or fewer for ePHI)
- ☐ Password protection required on all external share links containing ePHI
- ☐ Active shares audited and unnecessary shares revoked
- ☐ Audit logging verified as active
- ☐ Log retention set to 6+ years
- ☐ Automated compliance reports scheduled
- ☐ User access reviewed and least-privilege applied
- ☐ Guest access policy configured
- ☐ Employee offboarding procedure documented
- ☐ BAA requested and executed with AXIS CloudSync (available upon request)
- ☐ Security baseline documented in Risk Analysis
Tip