Skip to main content
Splunk Lantern の記事が日本語で利用できるようになりました。.
Splunk Lantern

HIPAA audit controls


You might need an overarching view of user activities when doing the following:


In order to execute this procedure in your environment, the following data, services, or apps are required:


In a healthcare organization, you must implement hardware, software, and procedural mechanisms to record and examine access and other activity in information systems that contain or use electronic protected health information (e-PHI). These searches show who accessed patient health records, when they accessed them, and what activities they performed. In addition, they highlight unusual events such as failed password attempts and user accounts with excessive activity. This information can help your organization monitor suspicious users or activities before any data breach occurs.

To optimize the searches shown below, you should specify an index and a time range. These sample searches use Cerner audit logs. You can swap out this data source for ones in use at your organization, changing field names as necessary.

Timeline of access events

To see a timeline of which users accessed your system, organized by event type, run the following search.

| timechart count(UserName) BY EventType useother=false

Users patient record actions by event type

To see what actions your users have performed on patient records, run the following search.

sourcetype=Cerner_Audit_Log (EventType=Modify OR EventType=View* OR EventType=Security) 
ParticipantName=* PrsnlName=*
| stats count BY EventType EventName PrsnlName 
| appendpipe [stats count BY PrsnlName EventType | rename EventType AS target, PrsnlName AS source]
| appendpipe [stats count BY EventType EventName|rename EventType AS source, EventName AS target ] 
| search source=* 
| fields source target count

Number of failed logins by user ID

To count the number of failed logon attempts to a device, sorted by user ID, run the following search.

sourcetype=Cerner_Audit_Log AuditSource=* 
EventName="Logon Attempt" 
| stats count BY UserName
| sort  -count
| rename UserName AS "User ID", count AS "Count"

Timeline of failed logins

To see a timeline of failed logins to your system, update the search to the following.

sourcetype=Cerner_Audit_Log AuditSource=* EventName="Logon Attempt" OutcomeInd="8"
|fields _time,UserName 
| timechart count(UserName) BY UserName

System access information

To get a table of basic user activity information on your system, run the following search.

| table _time, UserName, PrsnlName, Role, EventType, EventName, Application, NetworkAccID
| convert ctime(_time) 
| rename _time AS "Time Accessed", UserName AS "User ID", PrsnlName AS "Name", EventType AS "Event Type", EventName AS "Event Name", NetworkAccID AS "Workstation"


After running these access controls and taking appropriate action, you may want to look into other HIPAA controls: