SP 800-66 Rev. 1. An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule

Special Publication 800-66 Rev. 1, An Introductory Resource Guide for Implementing the Health Insurance Probability and Accountability Act (HIPAA) Security Rule, which discusses security considerations and resources that may provide value when implementing the requirements of the HIPAA Seucurity Rule, was written to help educate readers about information security terms used in the HIPAA Security Rule and to improve understanding of the meaning of the security standards set out itn the Security Rule, direct readers to helpful information in other NIST publications on individual topics the HIPAA Security Rule addresses, and aid readers in understanding the security concepts discussed in the HIPAA Security Rule. This publication does not supplement, replace, or supersede the HIPAA Security Rule itself.

[1]  Timothy Grance,et al.  Contingency Planning Guide For Information Technology Systems: Recommendations Of The National Institute Of Standards And Technology , 2004 .

[2]  Marianne Swanson,et al.  SP 800-14. Generally Accepted Principles and Practices for Securing Information Technology Systems , 1996 .

[3]  Karen A. Scarfone,et al.  User's Guide to Securing External Devices for Telework and Remote Access , 2007 .

[4]  Timothy Grance,et al.  SP 800-47. Security Guide for Interconnecting Information Technology Systems , 2002 .

[5]  Gregory B. White,et al.  SP 800-84. Guide to Test, Training, and Exercise Programs for IT Plans and Capabilities , 2006 .

[6]  Mark Wilson,et al.  SP 800-16. Information Technology Security Training Requirements: a Role- and Performance-Based Model , 1998 .

[7]  Quynh H. Dang SP 800-107. Recommendation for Applications Using Approved Hash Algorithms , 2009 .

[8]  D. R. Kuhn,et al.  Security for Telecommuting and Broadband Communications , 2002 .

[9]  Karen A. Scarfone,et al.  SP 800-41 Rev. 1. Guidelines on Firewalls and Firewall Policy , 2009 .

[10]  Timothy Grance,et al.  Guide to Integrating Forensic Techniques into Incident Response , 2006 .

[11]  Matthew J. Fanto,et al.  SP 800-52. Guidelines for the Selection and Use of Transport Layer Security (TLS) Implementations , 2005 .

[12]  Joan Hash,et al.  SP 800-100. Information Security Handbook: A Guide for Managers , 2006 .

[13]  Peter Mell,et al.  SP 800-83. Guide to Malware Incident Prevention and Handling , 2005 .

[14]  Karen A. Scarfone,et al.  SP 800-111. Guide to Storage Encryption Technologies for End User Devices , 2007 .

[15]  Angela Orebaugh,et al.  SP 800-113. Guide to SSL VPNs , 2008 .

[16]  Edward Roback,et al.  SP 800-12. An Introduction to Computer Security: the NIST Handbook , 1995 .

[17]  Karen Kent,et al.  SP 800-77. Guide to IPsec VPNs , 2005 .

[18]  Timothy Grance,et al.  SP 800-35. Guide to Information Technology Security Services , 2003 .

[19]  Murugiah P. Souppaya,et al.  SP 800-92. Guide to Computer Security Log Management , 2006 .

[20]  D. Richard Kuhn,et al.  SP 800-58. Security Considerations for Voice Over IP Systems , 2005 .

[21]  Joan Hash,et al.  Building an Information Technology Security Awareness and Training Program , 2003 .

[22]  Karen A. Scarfone,et al.  Guide to Intrusion Detection and Prevention Systems (IDPS) , 2007 .

[23]  Hhs Centers for Medicare Medicare Services Health insurance reform: security standards. Final rule. , 2003, Federal register.

[24]  L. Johnson,et al.  Minimum Security Requirements for Federal Information and Information Systems , 2006 .

[25]  Marianne M. Swanson,et al.  Standards for Security Categorization of Federal Information and Information Systems , 2004 .

[26]  G. Stoneburner,et al.  Risk Management Guide for Information Technology Systems: Recommendations of the National Institute of Standards and Technology , 2002 .

[27]  A. Craig Eddy,et al.  The Effect of the Health Insurance Portability and Accountability Act of 1996 (HIPAA) on Health Care Fraud in Montana , 2000 .

[28]  William M. Daley,et al.  Security Requirements for Cryptographic Modules , 1999 .

[29]  Quynh H. Dang SP 800-106. Randomized Hashing for Digital Signatures , 2009 .