230 likes | 320 Views
HIPAA Overview. Overview of Technologies in the Health Care Organization. Security is a Balance. Risk vs. Access Tightest Security (not useful) Write-only databases Passwords too complex to remember Weakest Security (not protected) No logins or passwords Systems available to the public
E N D
HIPAA Overview Overview of Technologies in the Health Care Organization
Security is a Balance • Risk vs. Access • Tightest Security (not useful) • Write-only databases • Passwords too complex to remember • Weakest Security (not protected) • No logins or passwords • Systems available to the public • Full privileges for all!
Establishing A Balance • Risk Assessment • Identify critical systems and data • Determine the threats • Analyze the risks • Assess the impact of the threats • Question: Do you think the risks in healthcare are similar to other industries? • Risk Management • Take pro-active measures to reduce risk • Make policy decisions • Have a plan for mitigation for security incidents
HIPAA Security • Governs health care “covered” entities and now Business Associates as well • Requires certain levels of security and documentation • Strong emphasis on control processes and audits • Few technical “rules” or methods • HIPAA Security covers: • Administrative Safeguards • Physical Safeguards • Technical Safeguards
HIPAA • Administrative Safeguards • Risk analysis and management • Workforce (user) management • Security awareness training • Contingency planning • Physical safeguards • Facility access • Workstation use and security • Device and media controls
HIPAA • Technical Safeguards • Unique user IDs • Automatic log-off • Encryption • Auditing • Data integrity controls
HIPAA(New regulations) • Were effective January 25, 2013 but compliance with most of this is not required until September 23, 2013. In the case of Business Associate and Data Use agreements the date is September 23, 2014 unless they are updated in the interim. • Breach Notification • HHS has eliminated the harm threshold that provided notice of a security breach would only be required if the breach posed a significant risk of harm to affected individuals. • Business Associates • Much of the Privacy Rule and all of the Security Rule now apply directly to business associates and their subcontractors. • Enforcement and Penalties • HHS has retained the high penalty structure currently in effect, meaning that penalties can range from $100 to $50,000 per violation depending on culpability, up to an annual maximum cap of $1.5 million on a per provision basis.
HIPAA(New regulations) • Privacy Requirements • The final rules address multiple privacy issues related to uses and disclosures of PHI, such as communications for marketing or fundraising, exchanging PHI for remuneration, disclosures of PHI to persons involved in a patient's care or payment for care, and disclosures of student immunization records. • Genetic Information • To implement the Genetic Information Nondiscrimination Act, HHS has included “genetic information” as a type of health information subject to HIPAA rules, and has imposed restrictions that will prohibit health plans from using genetic information for underwriting purposes.
HIPAA Considerations • HIPAA is a “floor” for security • Most of the language in the regulation is very vague and open to interpretation • Organizations must assess how to meet the requirements and addressable items • The Department of Health and Human Services Office of Civil Rights has been performing audits of healthcare organizations since November, 2011
Security Areas • Physical Security • System Security • Application and Data Security • Operational Security
Physical Security • Protect computers, media and data • High risk areas: • Computer room • Network closets • Telephone closets • Facility Security • Keys, lighting, keypad locks, etc. • Visitor control
System Security • Network • Firewalls • Intrusion Detection • Network Monitoring • Signature-based virus detection • Controlling Internet access by proxy servers (outbound) and creating a DMZ (inbound) • Servers • Software firewalls • Virus protection • Limiting system administrators • Controlling vendor access
System Security • Workstations • Physical location • Virus protection • Spyware/Malware • Software firewalls • Limiting elevated privileges • Question: How much more likely are systems to be infected when users have elevated privileges? • PDA’s and Smart Phones • Known as the BYOD (Bring Your Own Device) issue • Really are workstations
Application & Data Security • Authentication • Effective user authentication and passwords • Password complexity increases greatly with additional characters or length • Two factor vs. single factor authentication • Single factor: Something you know (password) or something you have (key) • Two factor: Something you know plus something you have (ATM card plus PIN) • Biometrics • Such as fingerprint, retinal scan, voice matching, etc. • Characteristic of someone which is really something you “have”
Application & Data Security • Authentication (continued) • Deterministic vs. Probabilistic • Deterministic – Can be determined to be true with mathematical certainty • Probabilistic – Likely to be true using probability • Question: Biometrics are? Passwords are? • Question: What is the best security? • Single sign-on • Single user authentication which then allows for immediate access to other applications • Applications must either cooperate on security or “connectors” must be written
Application & Data Security • System Parameters • Automatic timeout • Application lockout after x login attempts • Audit capabilities • User Roles and Privileges • Ability to view, add, modify or delete data • Question: Which privilege requires the most scrutiny? • Privileges • Restrict access to certain functions • Restrict access to certain data sets • System administration • Update dictionaries • Manage security
Application & Data Security • Security Management • Centralized vs. Decentralized? • Depends on the application • Best Practice: Centralized control with decentralized authorization
Application & Data Security • Encryption • Early cryptography led to the development of computers! • WWII Era • German Enigma • Bombe • Turing Machine • Colossus • Depends on algorithms (ciphers) and keys (string of bytes) • Ciphers: Triple DES, AES, etc. • Keys: Size in bits
Application & Data Security • Symmetrical vs. Asymmetrical Keys • Symmetric: Encrypting key is used for decrypting • Asymmetrical: Key pair is created, one for encryption and another for decryption • Public Key Infrastructure (PKI) • Third parties that issue public-private key pairs and publish the public keys • Public keys are used to encrypt and private keys to decrypt messages • At Rest vs. In Transit • Password protecting a file = At rest • Secure web site transactions (SSL) = In transit • Question: How many credit card numbers have been stolen from SSL protected sites while in transit?
Operational Security • Policies and Procedures • Foundation for good security practice • Clearly states organizational guidelines • FAHC has several security policies • Security Standards • Remote Access • HIPAA Security Compliance • Workstation Use and Security • Back and Disaster Recovery • Audit and Review • Risk Analysis and Management • Risk Assessment • Think like the “enemy” • Identify critical information or systems • Analyze threats • Analyze vulnerabilities • Assess risk • Apply countermeasures
Operational Security • Personnel Security • One of the highest threats • Question: Why? • Background checks • Security awareness & training • Auditing and monitoring capabilities
Conclusion • Balancing risk vs. ease of use • Physical Security – Lock it up! • System Security • Gets most of the attention • Most technical • Application & Data Security • Authentication • Single factor vs. Two factor • Deterministic vs. Probabilistic • Managing User Roles and Privileges • Cryptography • Operational Security • Policies • Risk Assessments • Personnel