Applications Overview

Modified on Mon, 10 Mar at 5:25 PM

Managing Applications in the Assets Module

Overview

The Applications Module allows an organization to track and manage cloud applications and software solutions that create, receive, maintain, or transmit Electronic Protected Health Information (ePHI).

Unlike device-specific inventories, this module is org-wide and focuses on primary software solutions rather than individual programs installed on each device. Examples include:

  • Email Providers: Microsoft 365, Google Workspace

  • Cloud Storage Solutions: OneDrive, Google Drive, Dropbox

  • Practice Management SoftwareEHR SystemsCommunication Platforms



TABLE OF CONTENTS


Adding a New Application

To add a new application:

  1. Navigate to the Applications Module.

  2. Click + Add Application.

  3. Enter the application details in the form fields provided.

Application Information Fields

Field Name

Description

Application Name (Required)

The name of the software or solution (e.g., Microsoft 365, Google Drive).

Application Type

Select the type: Cloud Application, On-Premise Application, or Desktop Application.

Location

Specify where the application is used (Org-wide or specific sites).

License Type

If applicable, enter details about the license or versioning.

License Number

Accompanies the License Type field, if applicable.

BAA with Vendor

Indicate whether a Business Associate Agreement (BAA) exists with the vendor.

Administrator

Select the primary administrator responsible for managing the application.

Employee Access

Define who has access: Everyone, Departmental, Management, or Some Employees.

Security Controls (Required)

Identify security measures in place for the application.

Risk Rating

Assess the likelihood and impact of a security risk related to the application.

Status

Indicate whether the application is Active or Inactive.

Notes

Add additional details or security-related considerations.


Security Controls Fields

Control

Description

Encryption

Does the platform encrypt data at rest/in transit?

Antivirus/Malware Protection

Is the application protected against malicious threats?

Strong Password Requirement

Does the application require strong passwords?

Multi-Factor Authentication (MFA)

Is MFA/2FA enabled for access?

Backups

Does the organization back up data stored in this platform?


Important: Security controls may vary depending on the vendor. Organizations should confirm directly with the vendor to ensure proper security measures are in place.

Bulk Upload Option

To add multiple applications at once:

  1. Download the Bulk Upload Template.

  2. Fill in all required fields.

  3. Upload the completed spreadsheet into The Guard.

Viewing and Managing Applications

Once applications are added, they appear in the application inventory list within the Assets Module.

Application Inventory List Display

The list displays:

  • Application Name

  • Type

  • Location

  • Administrator

  • Risk Rating

  • Vulnerabilities

graph at the top of the page provides a summary of:

  • Total Applications (Active, Inactive)

  • Risk Analysis

  • Total Vulnerabilities

  • Secured vs. Unsecured Applications


Filtering Applications

Filters can be applied to refine the list by:

  • Active/Inactive Status

  • MFA

  • BAA with Vendor

  • Encryption

  • Endpoint Protection

  • Risk Rating

  • Strong Password Requirement

  • Backups

  • Location

Managing Application Status

Applications can be set to Inactive when no longer in use.

Bulk Status Updates

  1. Select the checkboxes of applications to update.

  2. Click Bulk Actions and choose Deactivate.

Individual Status Updates

  1. Click the ellipsis button next to an application.

  2. Select Deactivate from the options.


Adding Evidence to Applications

To attach supporting evidence:

  1. Click the ellipsis button next to an application.

  2. Select Evidence Locker to upload relevant files.


Ongoing Application Management

Application inventories should be regularly updated to ensure compliance, security, and risk assessment remain accurate.






Was this article helpful?

That’s Great!

Thank you for your feedback

Sorry! We couldn't be helpful

Thank you for your feedback

Let us know how can we improve this article!

Select at least one of the reasons
CAPTCHA verification is required.

Feedback sent

We appreciate your effort and will try to fix the article