It is essential as a cybersecurity professional to have a complete understanding of how a compliance audit is conducted and documented because organizational sustainability often depends on the adequate assessment of information security and privacy management. Using the GCU Virtualization Environment, build either a Windows or Linux server. Then, search the web for technical controls related to HIPAA. Break the technical controls down into technical requirements appropriate for your virtual server with Pass/Fail criteria. Audit the virtual server and report if compliant or not. Once compliance testing has been completed, draft a certification letter for your client or organization highlighting the applicable controls tested along with the compliance model used.
Refer to the “HIPAA Security Audit Certification Document,” located within the Topic Resources, as an example.
Don't use plagiarized sources. Get Your Custom Essay on