Each Covered Entity must maintain a cybersecurity program designed to protect the Confidentiality,Integrity, and Availability of the Covered Entity's Information Systems.
See 500.21. Develop and Implement policies and procedures for monitoring and assessing cybersecurity risks
2. Regularly test and update the effectiveness of the cybersecurity program
3. Maintain an inventory of information systems and data
4. Classify the data inventory according to its level of sensitivity
5. Develop and implement policies and procedures for incident response
6. Conduct periodic cybersecurity training for all employees
7. Conuct periodic vulnerability assessments and penetration testing
8. Use defensive infrastructure to protect from unauthorized access, use or malicious acts.