25% off all training courses Offer ends May 29, 2026
View HIPAA Courses
25% off all training courses
View HIPAA Courses
Offer ends May 29, 2026

The HIPAA Journal is the leading provider of HIPAA training, news, regulatory updates, and independent compliance advice.

CISA & Partners Issue Guidance & Best Practices for Event Logging and Threat Detection

The U.S. Cybersecurity and Infrastructure Security Agency (CISA), Federal Bureau of Investigation (FBI), National Security Agency (NSA), Australian Signals Directorate’s Australian Cyber Security Centre (ACSC), and their international partners have issued guidance on event logging and threat detection.

HIPAA-regulated entities are required to implement hardware, software, and/or procedural mechanisms that record and examine activity in information systems that contain or use electronic protected health information (ePHI) and to regularly review those logs to identify unauthorized activity. These include application logs of user activity in ePHI systems/applications, which capture information such as files opened, records accessed, and the creation, reading, editing, or deletion of records associated with ePHI, and system-level logs, which include successful and unsuccessful login attempts, devices used to log on, and the applications that were successfully or unsuccessfully accessed.

The latest guidance from CISA and partners is aimed at medium to large organizations and includes best practices to improve event logging and threat detection for enterprise networks, cloud services, enterprise mobility, and operational technology (OT) networks. The guidance can help network defenders define a baseline for event logging, identify threats, and help incident response teams mitigate cyber threats, including attacks involving fileless malware and living-off-the-land (LOTL) techniques that threat actors use to evade detection.

According to the guidance, the main aims of an effective event logging system are the creation of event logs that are usable and performant for analysts and allow network defenders to make quick, informed decisions based on prioritized alerts and analytics. The system should send alerts to network defenders to warn them of activities that could be associated with malicious actions, such as new software installations and configuration changes, as well as events that could indicate LOTL techniques being used or post-compromise lateral movement. It is also important to reduce alert noise to save query time and avoid costs associated with storage.

Get The FREE
HIPAA Compliance Checklist

Immediate Delivery of Checklist Link To Your Email Address

Please Enter Correct Email Address

Your Privacy Respected

HIPAA Journal Privacy Policy

The best practices detailed in the guidance include the creation of an enterprise-approved event logging policy, centralized event log access and correlation, secure storage and event log integrity, and implementing a detection strategy for relevant threats. The guidance also includes a case study involving the Volt Typhoon threat actor, which used LOTL techniques to infiltrate Windows-based systems and evade detection. The guidance explains some of the anomalous behaviors associated with the use of LOTL techniques that could allow network defenders to identify the activities and differentiate them from legitimate behaviors.

Author: Steve Alder is the editor-in-chief of The HIPAA Journal. Steve is responsible for editorial policy regarding the topics covered in The HIPAA Journal. He is a specialist on healthcare industry legal and regulatory affairs, and has 10 years of experience writing about HIPAA and other related legal topics. Steve has developed a deep understanding of regulatory issues surrounding the use of information technology in the healthcare industry and has written hundreds of articles on HIPAA-related topics. Steve shapes the editorial policy of The HIPAA Journal, ensuring its comprehensive coverage of critical topics. Steve Alder is considered an authority in the healthcare industry on HIPAA. The HIPAA Journal has evolved into the leading independent authority on HIPAA under Steve’s editorial leadership. Steve manages a team of writers and is responsible for the factual and legal accuracy of all content published on The HIPAA Journal. Steve holds a Bachelor’s of Science degree from the University of Liverpool. You can connect with Steve via LinkedIn or email via stevealder(at)hipaajournal.com

x

Is Your Organization HIPAA Compliant?

Find Out With Our Free HIPAA Compliance Checklist

Get Free Checklist