Added Teams deployment + HIPAA-appropriate configuration as a tracked gap (hipaa.md #27) and M365 issue (m365.md #14). Cites transmission security + BAA requirements and outlines controls needed (retention, DLP, external sharing lockdown, guest access, meeting consent). Dependency on Microsoft BAA flagged. Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
8.2 KiB
8.2 KiB
HIPAA Compliance — Cascades
Why HIPAA Applies
Cascades is an assisted living facility with health services staff (nurses, medtechs, health services director). They handle Protected Health Information (PHI) through:
- ALIS (https://www.go-alis.com/) — cloud-hosted clinical/medical records system, accessed via web browser on staff PCs
- Synology NAS (cascadesDS) — stores resident/facility data locally that falls under HIPAA
- CS-SERVER file shares — migration target for Synology data; will become the primary secured storage
- M365 email — staff may send/receive resident-related information via cascadestucson.com email
Project Mission
Cascades was taken over from a previous MSP that left the environment insecure and non-compliant. The core objective of the migration project is to get Cascades secure and HIPAA compliant. Every migration phase ties back to this goal.
Current HIPAA Gaps
| # | Gap | Severity | HIPAA Rule | Migration Phase |
|---|---|---|---|---|
| 1 | No backup exists | Critical | §164.308(a)(7) — Contingency Plan | Phase 0 (WSB → Synology) + Phase 4 (offsite) |
| 2 | Synology stores PHI with no access auditing | Critical | §164.312(b) — Audit Controls | Phase 4 (move to CS-SERVER with NTFS audit) |
| 3 | Shared accounts (Receptionist, Culinary, saleshare, directoryshare) | High | §164.312(a)(2)(i) — Unique User ID | Phase 5 (replace with individual accounts) |
| 4 | No MFA on M365 | High | §164.312(d) — Person Authentication | Can enable now (Security Defaults, free) |
| 5 | No disk encryption (BitLocker) | High | §164.312(a)(2)(iv) — Encryption | Phase 2.6 GPO (free with Windows Pro) |
| 6 | Permissive floating firewall rule | High | §164.312(e)(1) — Transmission Security | Phase 1.6 (post-migration lockdown) |
| 7 | Non-IT staff in Domain Admins | High | §164.312(a)(1) — Access Control | Phase 2.2 (remove Meredith.Kuhn, John.Trozzi) |
| 8 | Most PCs not domain-joined | Medium | §164.308(a)(3) — Workforce Security | Phase 3 (domain join all staff PCs) |
| 9 | No GPOs enforced (password policy, screen lock) | Medium | §164.308(a)(5) — Security Awareness | Phase 2.6 (Security Baseline GPO) |
| 10 | Kitchen iPads on same VLAN as staff PCs | Medium | §164.312(e)(1) — Transmission Security | Restrict iPads to kitchen printers only |
| 11 | ALIS browser access on shared PCs | Medium | §164.312(d) — Person Authentication | Phase 5 (individual logins, no shared accounts) |
| 12 | No BAA verified with ALIS | Medium | §164.308(b)(1) — Business Associates | Verify with management |
| 13 | No BAA with Microsoft (M365) | Medium | §164.308(b)(1) — Business Associates | Sign Microsoft BAA via M365 admin |
| 14 | Sandra Fish still global admin | Low | §164.308(a)(3) — Workforce Security | Create break-glass admin, remove Sandra |
| 15 | No M365 backup | Low | §164.308(a)(7) — Contingency Plan | Future — Veeam Backup for M365 |
How Migration Phases Address HIPAA
| Phase | What It Does | HIPAA Controls Addressed |
|---|---|---|
| Phase 0 — Safety Net | Windows Server Backup → Synology SMB share | Backup, contingency plan |
| Phase 1 — Network | VLAN migration, firewall lockdown, guest isolation | Transmission security, access control |
| Phase 2 — Server Prep | AD cleanup, security groups, GPOs (BitLocker, passwords, screen lock) | Access control, audit, encryption, unique user ID |
| Phase 3 — Domain Join | All staff PCs under centralized management | Workforce security, device management |
| Phase 4 — Synology Retirement | Move data to CS-SERVER with NTFS permissions + audit logging | Audit controls, access control, integrity |
| Phase 5 — Hardening | Remove shared accounts, RDS cleanup, final lockdown | Unique user ID, person authentication |
Systems and PHI Flow
Nurses/MedTechs (staff PCs)
│
├──► ALIS (cloud, go-alis.com) — clinical/medical records
│ └── ALIS responsible for their own HIPAA compliance + BAA
│
├──► Synology NAS (cascadesDS, 192.168.0.120) — resident/facility data (MOVING TO CS-SERVER)
│
├──► CS-SERVER (192.168.2.254) — file shares, AD, DNS (migration target)
│
└──► M365 (cascadestucson.com) — email, may contain PHI in messages/attachments
Non-PHI Systems (out of HIPAA scope)
| System | Purpose | Notes |
|---|---|---|
| Kitchen iPads (9 units) | Food order taking | No PHI — only need access to kitchen thermal receipt printers. Managed via ManageEngine MDM |
| Kitchen thermal printers | Receipt printing | Bistro (TM-T88VII, 192.168.2.207) + Kitchen (TM-U220IIB, 10.0.20.225) |
| Resident room VLANs | Resident personal devices (TVs, phones) | No PHI — isolated /28 per room |
| Ring cameras (8 units) | Security cameras | No PHI |
| GoDaddy | Website hosting (cascadestucson.com) | Public website, no PHI |
New Findings from Audit (2026-03-20)
| # | Gap | Severity | HIPAA Rule | Notes |
|---|---|---|---|---|
| 16 | 3 shared accounts with no password (Nurses, memfrtdesk, Front Desk) — these PCs access ALIS | Critical | §164.312(a)(2)(i) — Unique User ID | NURSESTATION-PC, MEMRECEPT-PC, RECEPTIONIST-PC |
| 17 | No audit logging on CS-SERVER (Object Access = No Auditing) | Critical | §164.312(b) — Audit Controls | Cannot track who accessed PHI files |
| 18 | 13 months without Windows updates on DESKTOP-LPOPV30 | High | §164.308(a)(1) — Security Management | 6 machines 3+ months behind |
| 19 | Expired SSL certificate on CS-SERVER (2025-04-02) | High | §164.312(e)(1) — Transmission Security | Causes Schannel errors |
| 20 | krbtgt password 569 days old | High | §164.312(a)(1) — Access Control | Should rotate every 180 days |
| 21 | RDP without NLA on ASSISTMAN-PC, DESKTOP-U2DHAP0 | High | §164.312(e)(1) — Transmission Security | Credential exposure risk |
| 22 | TightVNC on MEMRECEPT-PC | High | §164.312(a)(1) — Access Control | Unauthorized remote access tool |
| 23 | No LAPS — same local admin password on all machines | Medium | §164.312(a)(1) — Access Control | Lateral movement risk |
| 24 | RestrictAnonymous = 0 on CS-SERVER | Medium | §164.312(a)(1) — Access Control | Null sessions allowed |
| 25 | Protected Users group empty | Medium | §164.312(a)(1) — Access Control | Admin accounts not protected |
| 26 | Share permissions: Everyone=FullControl on multiple shares | Medium | §164.312(a)(1) — Access Control | Culinary, directoryshare, Roaming |
| 27 | Microsoft Teams not deployed or HIPAA-configured for staff | Medium | §164.312(e)(1) — Transmission Security + §164.308(b)(1) — Business Associates | Roll out Teams to all staff with HIPAA-appropriate controls: retention policies for chat/channel/meeting recordings, external sharing restrictions, DLP for PHI in messages, meeting recording consent, guest access disabled by default. Depends on Microsoft BAA (#13). |
Quick Wins (Free, Can Do Now)
- Enable MFA on M365 — Security Defaults in Entra ID (free, takes 5 minutes)
- Sign Microsoft BAA — M365 Admin Center → Settings → Org Settings → Security & Privacy → HIPAA BAA
- Verify ALIS BAA — Ask management if they have a signed BAA with go-alis.com
- BitLocker GPO — Enable via Security Baseline GPO once PCs are domain-joined (Phase 2.6)
Recommendations (Paid)
| Service | Why | Cost | Priority |
|---|---|---|---|
| Veeam Backup for M365 | Protect email/OneDrive containing PHI | ~$2-4/user/mo | Medium |
| Business Premium upgrade | DLP (prevent PHI in outbound email), Defender, Conditional Access | +$10/user/mo (~$340/mo net after shared mailbox savings) | Low — most gaps covered by free controls |
Notes
- Cascades is assisted living, not a hospital — but nurses and medtechs handle PHI, making HIPAA applicable
- Previous MSP left the environment non-compliant — this project is a remediation effort
- ALIS handles the heavy clinical data in the cloud — local HIPAA focus is on access control, backup, encryption, and audit trails
- Kitchen area (iPads, thermal printers) is out of HIPAA scope — food service only