Using Splunk to Protect Pa=ent Privacy and Achieve Meaningful Use



Similar documents
HIPAA and Meaningful User Audit Reports Using Splunk

Modernizing EDI: How to Cut Your Migra6on Costs by Over 50%

Incident Response Using Splunk for State and Local Governments

NetFlow Analytics for Splunk

Tim Blevins Execu;ve Director Labor and Revenue Solu;ons. FTA Technology Conference August 4th, 2015

Stream Deployments in the Real World: Enhance Opera?onal Intelligence Across Applica?on Delivery, IT Ops, Security, and More

CSE/ISE 311: Systems Administra5on Logging

Splunk for Networking and SDN

How To Use Splunk For Android (Windows) With A Mobile App On A Microsoft Tablet (Windows 8) For Free (Windows 7) For A Limited Time (Windows 10) For $99.99) For Two Years (Windows 9

An Introduc+on to CloudPrime

Kaseya Fundamentals Workshop DAY THREE. Developed by Kaseya University. Powered by IT Scholars

FTC Data Security Standard

Industry leading Education

How To Protect Virtualized Data From Security Threats

Secret Server Splunk Integration Guide

Monitoring System Status

Legacy Archiving How many lights do you leave on? September 14 th, 2015

Achieving Customer Intelligence with Splunk Enterprise

HIPAA Breaches, Security Risk Analysis, and Audits

configurability compares with typical SIEM & Log Management systems Able to install collectors on remote sites rather than pull all data

configurability compares with typical Asset Monitoring systems Able to install collectors on remote sites rather than pull all data

Sophos Ltd. All rights reserved.

Hunk & Elas=c MapReduce: Big Data Analy=cs on AWS

HIPAA Compliance Use Case

Volume SYSLOG JUNCTION. User s Guide. User s Guide

Effec%ve AX 2012 Upgrade Project Planning and Microso< Sure Step. Arbela Technologies

Sisense. Product Highlights.

Workflow Templates Library

Syslog Server Configuration on Wireless LAN Controllers (WLCs)

Informa*on Management

Leveraging Machine Data to Deliver New Insights for Business Analytics

FIVE WAYS WIRE DATA ANALYTICS ENABLES REAL-TIME HEALTHCARE SYSTEMS

Offensive & Defensive & Forensic Techniques for Determining Web User Iden<ty

Junos Pulse. Windows In-Box Junos Pulse Client Quick Start Guide. Published: Copyright 2013, Juniper Networks, Inc.

A R o a d t o y o u r C l o u d. Professional Service. C R M a n d C l o u d C o n s u l t i n g

Help Framework. Ticket Management Ticket Resolu/on Communica/ons. Ticket Assignment Follow up Customer - communica/on System updates Delay management

Secret Server Qualys Integration Guide

SPI Backup via Remote Terminal

Overcoming The Blind Spots in Your Virtualized Data Center

Monitoring SharePoint 2007/2010/2013 Server Using Event Tracker

End-user Security Analytics Strengthens Protection with ArcSight

RSA Data Loss Prevention (DLP) Understand business risk and mitigate it effectively

Splunk Company Overview

Splunk Enterprise in the Cloud Vision and Roadmap

Pervade Software. Use Case PCI Technical Controls. PCI- DSS Requirements

Top 5 Ways to Improve Your Billing & Collec=ons

Enforcive /Cross-Platform Audit

Sophos XG Firewall v Release Notes. Sophos XG Firewall Reports Guide v

Splunk and Big Data for Insider Threats

LT Auditor Windows Assessment SP1 Installation & Configuration Guide

FREQUENTLY ASKED QUESTIONS

Network Metrics Content Pack for VMware vrealize Log Insight

Hortonworks & SAS. Analytics everywhere. Page 1. Hortonworks Inc All Rights Reserved

Patching, AlerFng, BYOD and More: Managing Security in the Enterprise with Splunk Enterprise

Pu?ng B2B Research to the Legal Test

Reneaué Railton Sr. Informa2on Security Analyst, Duke Medicine Cyber Defense & Response

View the Replay on YouTube. Sustainable HIPAA Compliance: Enhancing Your Epic Reporting. FairWarning Executive Webinar Series October 17, 2013

Getting Real with Policies for Software Defined Infrastructure. Manish Dave Principal Engineer, Intel IT

<Insert Picture Here> Oracle Database Security Overview

Secret Server Syslog Integration Guide

August Investigating an Insider Threat. A Sensage TechNote highlighting the essential workflow involved in a potential insider breach

EZblue BusinessServer The All - In - One Server For Your Home And Business

IBM Security QRadar SIEM Version MR1. Log Sources User Guide

Extreme Networks: A SOLUTION WHITE PAPER

Exporting IBM i Data to Syslog

PES Has The Sustainable Solu2on For Chronic Care Management

Blue Medora VMware vcenter Opera3ons Manager Management Pack for Oracle Enterprise Manager

HyTrust Logging Solution Brief: Gain Virtualization Compliance by Filling Log Data Gaps

One Patient, One Record: How Allina completes an award-winning EHR with enterprise content management

Netwrix Auditor. Сomplete visibility into who changed what, when and where and who has access to what across the entire IT infrastructure

Savvius Insight Initial Configuration

Adopt and implement privacy procedures, train employees on requirements, and designate a responsible party for adopting and following procedures

FISMA / NIST REVISION 3 COMPLIANCE

March 10 th 2011, OSG All Hands Mee6ng, Network Performance Jason Zurawski Internet2 NDT

YOUR PROCESS MANAGEMENT AND CONTROLLING SUITE FOR MULTI-CHANNEL ONLINE MARKETING.!

Do I need to install anything on my computer to use the VC?

pt360 FREE Tool Suite Networks are complicated. Network management doesn t have to be.

The Comprehensive Guide to PCI Security Standards Compliance

CallRail Healthcare Marketing. HIPAA and HITECH Compliance for Covered Entities using Call Analytics Software

The Definitive Guide. Active Directory Troubleshooting, Auditing, and Best Practices Edition Don Jones

Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment

Case Study. The SACM Journey at the Ontario Government

Qubera Solu+ons Access Governance a next genera0on approach to Iden0ty Management

NOT ALL END USER EXPERIENCE MONITORING SOLUTIONS ARE CREATED EQUAL COMPARING ATERNITY WORKFORCE APM TO FOUR OTHER MONITORING APPROACHES

EZblue BusinessServer The All - In - One Server For Your Home And Business

About this Getting Started Guide. Enabling Log Management... 2 Applying a License... 4 Using Log Management How to forward logs...

Log Management Standard 1.0 INTRODUCTION 2.0 SYSTEM AND APPLICATION MONITORING STANDARD. 2.1 Required Logging

Management, Logging and Troubleshooting

Administration Guide NetIQ Privileged Account Manager 3.0.1

Enforcive / Enterprise Security

The Purview Solution Integration With Splunk

VMware Identity Manager Connector Installation and Configuration

Poten&al Impact of FDA Regula&on of EMRs. October 27, 2010

FioranoMQ 9. High Availability Guide

IBM Security QRadar SIEM Version MR1. Vulnerability Assessment Configuration Guide

Apple Client Management with JAMF. Andrew D Huston Client Infrastructure Group Informa8on Services Kent State University

NOT ALL END USER EXPERIENCE MONITORING SOLUTIONS ARE CREATED EQUAL COMPARING ATERNITY WORKFORCE APM TO FOUR OTHER MONITORING APPROACHES

Building a Better Business Process

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

Transcription:

Copyright 2014 Splunk Inc. Using Splunk to Protect Pa=ent Privacy and Achieve Meaningful Use Ant Lefebvre ant@midhosp.org Senior Systems Engineer Middlesex Hospital

About Middlesex Hospital Complete range of medical services Some of Connec?cut s highest quality and pa?ent sa?sfac?on ra?ngs 30 Networked Offsite Loca?ons 10 Primary Care Offices 3 Emergency Departments Recipient of the CIO 100 award for our use of Splunk sonware 100 Top Hospitals list for two years running HealthCare s Most Wired List 2012-2014

whoami? Systems Engineer Network Engineer Security / Compliance Wireless/Wired IT Director IT Consultant Splunk.conf 2013 Revolu?on Award Winner!

Hospital Network Opera=ons

Challenges in Healthcare Virtualiza?on Management Applica?on Performance Event Log Correla?on Global View of Environment

Hospital s Visibility Gap Not easy to navigate Windows event viewer Log by log review for troubleshoo?ng Manual event correla?on spanning mul?ple systems No log access when host down or off network Hours/days to find root cause(s) for end user device issues Wasted (me and effort to track down issues

Steps to success: Splunk Solves Visibility Gap 1. Downloaded free demo 2. Globally installed Splunk Universal Forwarders on Windows server and client opera?ng systems 3. Indexed Windows event log data 4. Instantly gained visibility into Windows environment like never before Troubleshoo(ng (me now a frac(on of what it used to be

Splunk in Produc=on Finding new use cases EVERY DAY!! Audit consolida?on One tool to monitor all systems Event correla?on Is the issue happening everywhere? When? Recognize anomalous ac?vi?es Something strange going on? Add new log sources See what shakes out No need to purchase addi(onal products. Index the data in Splunk.

Success Stories Mystery wireless disconnects persisted for years. Using Splunk searched on User ID / tablet name at drop?mes. Discovered crashing process on Citrix server at dropping event?me! Wireless disconnects reported HERE Root cause was back end service crashing in datacenter

What computer am I connected to? Mystery name resolu?on issues. Connec?ng to wrong worksta?ons when using hostname. *error* search found DNS record scavenging was accidentally off aner AD/DNS server migra?on. Want to connect to PC A Helpdesk But get connected to PC B

Finding a Botnet Index firewall traffic logs using Splunk and Google Maps Discovered a health library machine connected to an interna?onal botnet No business need to communicate with Peru

Boot Times Table

Found File Dele=on Incident User files vanish with no insight from file audit tool Search for user id AND delete finds over 300 events in an hour over the weekend User accidentally deleted one too many folders

Blocking streaming HDTV through Firewall

Program Intelligence into Apps/Dashboards Created useful dashboards for opera?ons/helpdesk team No need to know Splunk search commands to use Help less knowledgeable staff troubleshoot environment issues Each new dashboard is created in- house. No need for addi?onal purchase. No need to ask for product enhancement or feature from vendors. Single point of reference for mul?ple uses The Splunk Admin can create point and click knowledge

Citrix User Login Finder

Find Server Behind Load Balancer

Where has this user logged in?

Most Numerous Cisco Syslog Messages

Web Traffic!

Power Dashboard

Windows NPS RADIUS Dashboard

Print Server Log Dashboard

Print User to IP Correla=on Print logs do not contain where user prints from. Windows Event logs show where user last logged in.

Viral Spread of Splunk Word of Splunk s capability to audit systems and solve mysteries trickled through other IT staffers. Addi?onal systems I didn t even know we had were added to Splunk.

IT Director s Challenge A system to audit our Electronic Health Record access. A single solu?on to audit mul?ple systems. Easy to manage. Cost is always a factor. We have two op?ons. Which one is beher? The answer: Op?on 3 Splunk!

Pa=ent Privacy & Meaningful Use

EMR/EHR - Electronic Pa?ent Records Healthcare Jargon PHI/ePHI (electronic) Protected Health Informa?on HIPAA - The Health Insurance Portability and Accountability Act of 1996 HITECH Act - Health Informa?on Technology for Economic and Clinical Health Act Meaningful Use Goal is to not just adopt an EHR, but to leverage it to achieve significant improvements in care Cerner - Middlesex Hospital s Primary EHR Results Middlesex Hospital s home grown EHR lookup applica?on eclinicalworks Middlesex Hospital s Primary Care / Family Prac?ce / Mul?specialty EHR McKesson Homecare Middlesex Hospital Home care EHR GE Flowcast Pa?ent registra?on/demographics Lawson Employee Database

Electronic Health Record Audi=ng Federal reimbursement for having cer?fied technologies to audit Electronic Health Record (EHR) access, Meaningful Use Requirement Splunk v6.0 is currently v1.0 Cer?fied (for both Ambulatory and Inpa?ent) 170.314(d)(3) - Audit report(s) EHR provider offers specialized (and expensive) point solu?on Other EHR vendors couldn t correlate between systems/databases Other vendor solu?ons specific to their product. Can t build intelligence.

Splunk for MU2 EHR Module, 2014 Edi=on means EHR technology that is cer?fied to at least one of the 2014 Edi?on EHR cer?fica?on criteria for either the ambulatory or inpa?ent prac?ce sepng. An EHR Module could provide a single capability required by one cer?fica?on criterion or it could provide all capabili?es but one, required by the cer?fica?on criteria for a Complete EHR. Splunk is 1 of 20 modules required to meet Base EHR defini?on for 2014 Edi?on EHR cer?fica?on. 170.314(d)(3) Audit reports Required 170.314(g)(4) Quality Management System Needed for all modules Splunk will not fulfill your EHR product cer?fica?on alone, but will check the (d)(3) Audit Report(s) box on the cer?fied health IT product list: hhp://oncchpl.force.com/ehrcert/ehrproductsearch or hhp://goo.gl/5pshd

Primary vendor solu=on EHR Vendor Audit Repository Data Inputs Similar in ability to Splunk Much more expensive to implement Very lihle if any community support New inputs require vendor services to implement Data elements have to be pre- programed into repository

Other vendor solu=ons Each system has its own audi?ng capabili?es (maybe) No way to centrally look into all system access. Log into each app to run access reports Advance inves?ga?ve dashboards unavailable, limited, or costly to implement

Taking a stab at an EHR audit App Newbie Splunk user s first App Cerner audit data only PoC rolled into preliminary App Much development needed Worked well enough to sa?sfy audi?ng requirements

Challenges in building the App First of it s kind in Splunk I am not a compliance officer I am not a developer Limits on my?me Only IT staffer with end game in focus

Raw EHR formats? XML with checksum to prevent tampering SQL Human Readable Columns Key Value Pairs Splunk Comma Separated Value Splunk to indexes ALL! mysql

Under the Hood Inges?ng Cerner EHR (XML format) audit data into Splunk By far the most comprehensive audi?ng Cerner Audit Outbound Server Cerner Listener / Splunk Universal Forwarder Splunk Indexer Real- (me Audit Events

Under the Hood Part 2 Inges?ng CSV exports into Splunk Results Flowcast Lawson FTP server / Splunk Universal Forwarder Yesterday s Audit Events Splunk Indexer

Under the Hood Part 3 Inges?ng database EHR audit data into Splunk ECW mysql McKesson Homecare SQL DB Connect/ Splunk Heavy Forwarder Engage your EHR vendor EARLY! Near Real- (me Audit Events Splunk Indexer

Healthcare App fields? EHR A: 35 fields Employee Database EHR B: 15 fields Homegrown EHR Splunk EHR C: 5 fields Pa?ent Registra?on App Healthcare common informa(on model?

HIPAA Privacy and Security Scout Healthcare Compliance Splunk App HIPAA Privacy and Security Scout and HIPAA Scout are protected by U.S. and interna?onal copyright and intellectual property laws. Middlesex is able to ensure that staff is compliant with State and Federal privacy regula?ons. The hospital has the ability to monitor user level access to several EHR systems from single interface using Splunk Healthcare CIM. App is available from Splunk Partner Conducive Consul?ng - hhp://www.conducivesi.com

What HIPAA Scout Provides Get right to the facts Compliance isn t prehy Auditors are going to love it! Meaningful Use of EHR logs HIPAA viola?on inves?ga?on made easy Common Informa?on Model Universal EHR Audi?ng App

HIPAA Privacy and Security Scout Auditor Home Page Quick links to most used reports Applica=on Report Categories Ac?vity Audit Admin Audit Disclosure Report Employee Info Login Report Inves?ga?ons Suspicious Ac?vity User Account Sharing VIP Pa?ent Access New reports are only limited by the logs and the imagina=on Every hospital is different. Requirements and problems vary.

HIPAA Privacy and Security Scout Most Useful Dashboards Record Access Inves?ga?on Coworker Record Access Same Last Name Wrong Unit Employee Admission Report Same Street Example Fields Available for Inves=ga=ons User Name User ID Pa?ent Name Medical Record Number Account Number Hospital Unit Number

Example Dash: Same Last Name 44

Example Dash: Wrong Unit 45

Example Dash: Record Access Inves=ga=on 46

Example Dash: Coworker Record Access 47

Example Dash: Record Print by Pa=ent 48

Splunk & Compliance " Re- dran our policies on regarding what a HIPAA viola?on actually is. " Create policies regarding how we will move forward with Splunk & HIPAA Privacy and Security Scout app. " Will we survive an audit? We have the power. Use it! " Educate the masses. Goal is for Splunk to find nothing. 49

Barriers to Progress " Beher at finding poten?al viola?ons. Takes more?me to inves?gate. Splunk is too good! " EHR vendors don t supply enough audit info to automate more. " Finding the informa?on with DB Connect takes lots of?me. Hope the schema doesn t change! " Vendors unable/unwilling to co- operate. 50

Vision into Our Future NOW Compliance Officers, Auditors, Applica?on Staff, Opera?ons Team, Infrastructure Team Splunk search heads with TAs (Technology Add- ons) and a Common Healthcare App Splunk indexing mul?ple diverse, but related systems EHR, Finance, Infrastructure, Clients, Servers, Systems, the list goes on.

Lessons Learned Budget for servers/storage. Don t roll PoC into produc?on system. Start fresh. Sync?mes before indexing (where is that s?nking real?me data?). Expect to frequent answers.splunk.com if you want to be successful. When inges?ng data, it helps to have friends on the inside. If I had known then what I know now

THANK YOU! Ant Lefebvre ant@midhosp.org Senior Systems Engineer Middlesex Hospital