450 likes | 614 Views
Risk Assessment: Key to a Successful Information Security Program Sharon Welna Information Security Officer October 23, 2008. Agenda. Environment Legal entities Network Regulatory Information Security organizational structure What is a mobile device?
E N D
Risk Assessment: Key to a Successful Information Security ProgramSharon WelnaInformation Security OfficerOctober 23, 2008
Agenda • Environment • Legal entities • Network • Regulatory • Information Security organizational structure • What is a mobile device? • How are mobile devices used in healthcare • Risk Assessment • Risk Mitigation Nebraska’s Pride is 500-miles wide
Sharon Welna, Information Security Officer • Education • BA from UNL (Major: Political Science) • MBA from UNO • ConAgra • Central Telephone • Creighton University Medical Hospital • CIO • Director Medical Records • Controller • Director, IT Nebraska’s Pride is 500-miles wide
Partners in Healthcare UNMC The Nebraska Medical Center UNMC Physicians Patient Care Education Research Outreach Diversity Nebraska’s Pride is 500-miles wide
Partnership Vision • The partnership of UNMC and the Nebraska Health System will be a world-renowned health sciences center that: • Delivers state-of-the-art health care; • Prepares the best-educated health professionals and scientists; • Ranks among the leading research centers; • Advances our historic commitment to community health; • Embraces the richness of diversity to build unity. Nebraska’s Pride is 500-miles wide
Environment: Legal Entities • UNMC • College of Nursing • College of Medicine • College of Pharmacy • College of Dentistry • College of Public Health • Eppley Cancer Institute • Munroe Meyer Institute • 3,000+ Students • 4,000+ Faculty / Staff • $90+ Million Research Nebraska’s Pride is 500-miles wide
Environment: Legal Entities • The Nebraska Medical Center • 1997 Partnership • 735 Licensed beds • 900+ Medical Staff • 4,400+ Employees • UNMC’s Primary Teaching Hospital Nebraska’s Pride is 500-miles wide
Environment: Legal Entities UNMC Physicians Physician Practice Group 500 physicians serving in over 50 specialist & sub-specialist areas from family medicine to transplantation 300+ non physician employees Nebraska’s Pride is 500-miles wide
Environment: Physical • Omaha • MidTown • 100 acres • 43 buildings • 3.9 million square feet • 30+ clinics • College of Nursing • Lincoln, Kearney, Scottsbluff • Norfolk (under development) • College of Dentistry • Lincoln Nebraska’s Pride is 500-miles wide
Buildings, Moves and More… • Weigel Williamson Center for • Visual Rehabilitation 38th & Jones April 08 Sorrell Center For Health Science Education August 08
Buildings, Moves and More… Durham Research Center II (Winter 08) Patient Financial Services / TNMC Executive Offices Relocation To Mutual of Omaha 3333 Farnam Street
Buildings, Moves and More… Village Point NMC Cancer Center (late 08/early 09) Bellevue Medical Center Highway 370 and 25th Street Bellevue, Nebraska (2010)
Environment: Regulatory HIPAA Healthcare GLBA Financial FERPA Student PCI Credit Card And more
Environment: Information Security • Entities contractually agreed to follow same policies and procedures • Information Security Officer • Policies, Procedures • Incident Management • Legal • Network Technical Services Team • Technical Security implementation Nebraska’s Pride is 500-miles wide
Environment: Wireless 800+ access points 1 million + square ft Cisco unified wireless network infrastructure Nebraska’s Pride is 500-miles wide
Mobile Devices Nebraska’s Pride is 500-miles wide
Medical Mobile Devices IV Pumps Glucose Meters Nebraska’s Pride is 500-miles wide
Mobile Device Usage Electronic Medical Record viewing Point of Care devices Traditional administrative functions Nebraska’s Pride is 500-miles wide
Summary 12,000 members of the workforce Want to access data from anywhere, anytime with any device securely Nebraska’s Pride is 500-miles wide
Risk Analysis • Protect the organization’s ability to perform its mission
Risk Analysis: Approach #1 • Identify risk • Determine risk mitigation alternatives and cost • Compare risk mitigation cost to Annual Loss Expectancy • Implement/do not implement decision
Risk Analysis: Approach #1 Definitions: Annualized Rate of Occurrence (ARO) Single Loss Expectancy (SLE) Annual Loss Expectancy (ALE) Risk Formula: ARO * SLE = ALE
Single Loss Expectancy • Costs include: • Notification (creating letter, postage etc) • 800 number set up and staffing • Staff time… • Gartner estimate as of August 2007 $300/account Nebraska’s Pride is 500-miles wide
Annual Loss Expectancy Nebraska’s Pride is 500-miles wide
Risk Analysis: Approach #2 • NIST • SP 800-30 • Risk Management Guide for Information Technology Systems
NIST 800-30 Guide Purpose • Provide a foundation for risk management program development • Provide information on cost-effective security controls
Definitions • Risk - “…a function of the likelihood of a given threat-source’s exercising a particular potential vulnerability, and the resulting impact of that adverse event on the organization.” • Risk management – process of identifying, assessing and reducing risk
Definitions • Threat – “The potential for a threat-source to exercise (accidentally trigger or intentionally exploit) a specific vulnerability.” • Threat-Source – “Either (1) intent and method targeted at the intentional exploitation of a vulnerability or (2) a situation and method that may accidentally trigger a vulnerability
Definitions: • Vulnerability: • Hardware, firmware, or software flow that leaves an AIS open for potential exploitation. A weakness in automated system security procedures, administrative controls, physical layout or internal controls that could be exploited by a threat to gain unauthorized access to information or disrupt critical processing.
Risk Assessment Methodology • Step 1: System Characterization • Collect system-related information including: • Which mobile devices • How are they being used
Risk Assessment Methodology • Step 2: Threat Identification • Identify potential threat-sources that could cause harm to the IT system and its environment • Can be natural, human or environmental
Risk Assessment Methodology • Step 3: Vulnerability Identification • Develop list of system vulnerabilities (flaws or weaknesses) that could be exploited • Develop Security Requirements Checklist
Risk Assessment Methodology • Step 4: Control Analysis • Control Methods – • May be technical or non-technical • Control Categories – preventative or detective • Control Analysis Technique – use of security requirements checklist
Risk Assessment Methodology • Step 5: Likelihood Determination • Governing factors • Threat-source motivation & capability • Nature of the vulnerability • Existence & effectiveness of current controls • Levels – High, Medium or Low
Risk Assessment Methodology • Step 6: Impact Analysis • Prerequisite information • System mission • System and data criticality • System and data sensitivity • Adverse impact described in terms of loss or degradation of integrity, confidentiality, availability • Quantitative vs. qualitative assessment
Risk Assessment Methodology • Step 7: Risk Determination • Develop Risk-Level Matrix • Risk Level = Threat Likelihood x Threat Impact • Develop Risk Scale • Risk Levels with associated Descriptions and Necessary Actions
NIST Risk Level • High (50-100) • Strong need for corrective measure as soon as possible • Medium (10-49) • Plan must be developed and implemented within a reasonable period of time • Low (1-9) • Determine if corrective action is needed or can risk be accepted
Risk Assessment Methodology • Step 8: Control Recommendations • Factors to consider • Effectiveness of recommended option • Legislation and regulation • Organizational policy • Operational impact • Safety and reliability
Risk Assessment Methodology • Step 9: Results Documentation • Risk Assessment Report • Presented to senior management and mission owners • Describes threats & vulnerabilities, measures risk and provides recommendations on controls to implement
Risk Mitigation Strategies • Specific to the device • Laptops: • Password Protection • Encryption • Blackberries • Vendor recommendation • Policy/procedure to follow if device is lost • Device “wiped” from the server Nebraska’s Pride is 500-miles wide
Risk Mitigation Strategies • Flash drives • Encryption required • Working towards making it easy to access data remotely—eliminate the need for a flash drive Nebraska’s Pride is 500-miles wide