How Teleport Works

HIPAA compliance with Teleport

Learn how Teleport keeps an audit log of access events for all SSH servers, Kubernetes clusters, and web applications.

HIPAA, the Health Insurance Portability and Accountability Act, sets the standard for protecting sensitive patient data. Any company that deals with protected health information (PHI) must ensure that all the required physical, network, and process security measures are in place and followed. A critical component of HIPAA compliance is the implementation of Technical Safeguards set forth in § 164.312.

Teleport is a modern SSH access system that can help organizations comply with many of the Access and Audit requirements at the systems layer through its ability to integrate with existing identity management services and by providing role-based access controls (“RBAC”), access auditing, session recording and ephemeral certificates. Below is a summary of the Technical Safeguards outlined in HIPAA with information on how Teleport can help achieve compliance.




HIPAA § 164.312 Technical Safeguards How Teleport Helps Compliance

(a) Standard: Access control.

Implement technical policies and procedures for electronic information systems that maintain electronic protected health information to allow access only to those persons or software programs that have been granted access rights as specified in § 164.308(a)(4).

Teleport implements role based access control for remote terminals, which is the predominant way health care IT professionals access computing infrastructure. This RBAC can be mapped to the administrative safeguards set up pursuant to §164.308.

(i) Unique user identification.

Assign a unique name and/or number for identifying and tracking user identity .

Teleport integrates with existing identity providers and assigns access permissions based on enterprise single sign-on. Teleport's access auditing and tracking ties directly back to real user identity.

(ii) Emergency access procedure.

Establish (and implement as needed) procedures for obtaining necessary electronic protected health information during an emergency.

Remote terminals are often the last option available to access server infrastructure in an emergency (other than physically accessing servers). Teleport can make sure your permissions are enforced even during emergency SSH sessions.

(iii) Automatic logoff.

Implement electronic procedures that terminate an electronic session after a predetermined time of inactivity.

The Teleport Certificate Authority issues ephemeral certificates that expire after a pre-configured time period which eliminates the risk of unauthorized access through stale or compromised static access keys.

(iv) Encryption and decryption

Implement a mechanism to encrypt and decrypt electronic protected health information.

Teleport is based on encryption technology created by Google. Any session carried through Teleport automatically inherits high grade end-to-end transport encryption.

HIPAA § 164.312 Technical Safeguards How Teleport Helps Compliance

(b) Standard: Audit controls.

Implement hardware, software, and/or procedural mechanisms that record and examine activity in information systems that contain or use electronic protected health information.

Teleport's SSH bastion automatically records all activity that passes through it, including a detailed audit log with session replay archive available to authorized administrators.

HIPAA § 164.312 Technical Safeguards How Teleport Helps Compliance

(c) Standard: Integrity.

Implement policies and procedures to protect electronic protected health information from improper alteration or destruction.

Teleport's SSH implementation ties in with traditional healthcare IT network and storage system's remote access daemons, bringing audit and recording to an area not traditionally visible to auditors.

(i) Mechanism to authenticate electronic protected health information.

Implement electronic mechanisms to corroborate that electronic protected health information has not been altered or destroyed in an unauthorized manner.

Off the shell remote file integrity and verification tools such as rsync and tripwire can utilize Teleport for remote access without modification. Your development teams can utilize off-the-shelf open source tooling and scripting techniques to solve complex data validity and integrity challenges.

HIPAA § 164.312 Technical Safeguards How Teleport Helps Compliance

(d) Standard: Person or entity authentication.

Implement procedures to verify that a person or entity seeking access to electronic protected health information is the one claimed.

Teleport's role-based access control simplifies access procedures by tightly coupling identity with authorization. Access allowance decisions are removed from low-level technology and brought into realms where appropriate administrators have better visibility.

HIPAA § 164.312 Technical Safeguards How Teleport Helps Compliance

(e) Standard: Transmission security.

Implement technical security measures to guard against unauthorized access to electronic protected health information that is being transmitted over an electronic communications network.

Teleport uses the secure shell protocol as implemented by Google's security experts and is based on the industry standard for accessing servers via an encrypted connection.

(i) Integrity controls.

Implement security measures to ensure that electronically transmitted electronic protected health information is not improperly modified without detection until disposed of.

End-to-end transport encryption as provided by Teleport is a fundamental building block for ensuring the integrity of files sent between locations.

(ii) Encryption.

Implement a mechanism to encrypt electronic protected health information whenever deemed appropriate.

Teleport always takes care of transport encryption, allowing you to focus on encryption of protected health data while at rest on endpoint storage.

Easy to get started

Teleport is easy to deploy and use. We believe that simplicity and good user experience are key to first-class security.

Teleport consists of just two binaries.
  1. The tsh client allows users to login to retrieve short-lived certificates.
  2. The teleport agent can be installed on any server, database, application and Kubernetes cluster with a single command.
Download Teleport
Terminal
# on a client$ tsh login --proxy=example.com
# on a server$ apt install teleport
# in a Kubernetes cluster$ helm install

Try Teleport today

In the cloud, self-hosted, or open source
Get StartedView developer docs