A single place to log all suspected and actual security incidents (and when necessary, breaches) along with your response and the outcome.
Even your workforce (if you allow) can open and log security incidents they see. A great way to get your whole team involved in protection your ePHI.
§164.308(a)(6)(i), §164.308(a)(6)(ii)