Cybersecurity Health Check At A Glance



Similar documents
Internet Security Protecting Your Business. Hayden Johnston & Rik Perry WYSCOM

Client Security Risk Assessment Questionnaire

Security Management. Keeping the IT Security Administrator Busy

Security Tool Kit System Checklist Departmental Servers and Enterprise Systems

Introduction. PCI DSS Overview

Ovation Security Center Data Sheet

SANS Top 20 Critical Controls for Effective Cyber Defense

CHIS, Inc. Privacy General Guidelines

Goals. Understanding security testing

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

Critical Security Controls

HIPAA Compliance Evaluation Report

Cyber Essentials Questionnaire

Ovation Security Center Data Sheet

How To Control Vcloud Air From A Microsoft Vcloud (Vcloud)

University of California, Riverside Computing and Communications. IS3 Local Campus Overview Departmental Planning Template

Security Standard: Servers, Server-based Applications and Databases

Application White Listing and Privilege Management: Picking Up Where Antivirus Leaves Off

Data Management Policies. Sage ERP Online

SANS Institute First Five Quick Wins

Critical Controls for Cyber Security.

Corporate Account Takeover (CATO) Risk Assessment

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

HIPAA Privacy and Security Risk Assessment and Action Planning

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

APPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST

Supplier Information Security Addendum for GE Restricted Data

1. Why is the customer having the penetration test performed against their environment?

Server Security Checklist (2009 Standard)

HIPAA: Compliance Essentials

TASK TDSP Web Portal Project Cyber Security Standards Best Practices

Data Access Request Service

The Protection Mission a constant endeavor

PCI COMPLIANCE REQUIREMENTS COMPLIANCE CALENDAR

Unified Security Anywhere HIPAA COMPLIANCE ACHIEVING HIPAA COMPLIANCE WITH MASERGY PROFESSIONAL SERVICES

Attachment A. Identification of Risks/Cybersecurity Governance

PCI DSS Policies Outline. PCI DSS Policies. All Rights Reserved. ecfirst Page 1 of 7

Network Detective. HIPAA Compliance Module RapidFire Tools, Inc. All rights reserved V

Procedure Title: TennDent HIPAA Security Awareness and Training

An Overview of Information Security Frameworks. Presented to TIF September 25, 2013

FINAL May Guideline on Security Systems for Safeguarding Customer Information

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)

DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

GFI White Paper PCI-DSS compliance and GFI Software products

Top 20 Critical Security Controls

Computer and Network Security Policy

McAfee Server Security

Did you know your security solution can help with PCI compliance too?

Qualification Specification. Level 4 Certificate in Cyber Security and Intrusion For Business

Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems

Data Stored on a Windows Server Connected to a Network

NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS

How To Secure An Rsa Authentication Agent

Cyber Risk Mitigation via Security Monitoring. Enhanced by Managed Services

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

Supplier Security Assessment Questionnaire

INNOVATE. MSP Services Overview SVEN RADEMACHER THROUGH MOTIVATION

Hong Kong Baptist University

SCADA and Security Are they Mutually Exclusive? Terry M. Draper, PE, PMP

Jumpstarting Your Security Awareness Program

Larry Wilson Version 1.0 November, University Cyber-security Program Controls Book

Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security

Check Point and Security Best Practices. December 2013 Presented by David Rawle

How To Manage Your Information Systems At Aerosoft.Com

How To Protect Your Data From Being Stolen

Stable and Secure Network Infrastructure Benchmarks

PREMIER SUPPORT STANDARD SERVICES BRONZE SILVER GOLD

Business ebanking Fraud Prevention Best Practices

OIT User Conference Security Team November 2014

PCI DSS 3.0 Changes Bill Franklin Executive IT Auditor January 23, 2014

Best Practices For Department Server and Enterprise System Checklist

Defending Against Data Beaches: Internal Controls for Cybersecurity

Healthcare Security Vulnerabilities. Adam Goslin Chief Operations Officer High Bit Security

SERVICES BRONZE SILVER GOLD PLATINUM. On-Site emergency response time 3 Hours 3 Hours 1-2 Hours 1 Hour or Less

EVALUATION REPORT. Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review. March 13, 2015 REPORT NUMBER 15-07

BM482E Introduction to Computer Security

Microsoft Online Subscription Agreement/Open Program License Amendment Microsoft Online Services Security Amendment Amendment ID MOS10

SWAP EXECUTION FACILITY OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

Securing the Service Desk in the Cloud

Cyber Self Assessment

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

Payment Card Industry (PCI) Data Security Standard. Summary of Changes from PCI DSS Version 2.0 to 3.0

BKDconnect Security Overview

Verve Security Center

Looking at the SANS 20 Critical Security Controls

Transcription:

This cybersecurity health check provides a quick view of compliance gaps and is not intended to replace a professional HIPAA Security Risk Analysis. Failing to have more than five security measures not currently in place may constitute an out-of-compliance condition. Workstations 1. Hardware Inventory & Tracking All IT equipment tagged; recorded; records kept current 2. Software Inventory & Tracking List of all software on all machines, including versions; kept current 3. Commercial-grade Antivirus Commercial-grade antivirus protection installed properly 4. Spam Filtering Software scans emails and attachments for spam, spam-borne malware 5. Monthly Software Patching All security patches applied monthly; logged and kept current 6. Workstation Firewall Software firewall protection installed on every workstation 7. Admin Privileges to Install Software Ability of staff to install software is restricted to system administrator 8. Security Profiles Security settings for all equipment documented; ed; kept current 9. Disabled USB Drives USB drives disabled to prevent unauthorized downloads/uploads by staff

Networking 1. Commercial-grade Firewall Commercial-grade Firewall recommended; installed properly 2. Intrusion Detection & Prevention Software in firewall to defend against known attacks 3. Penetration Reporting Regular review of external penetration attempts logged by firewall/idps 4. Unified Threat Management Security device installed to block malware and other threats 5. Domain Controller Special server used to control security settings on workstations Unique User Names Complex Passwords Regular Password Changes Each user name is unique and traceable to its sole user Minimum 8 characters long; at least 2 numbers; at least 1 special character All passwords are required to be changed every 90 days 6. File Integrity Tools Special tools used to verify files have not been altered or removed 7. Network Monitoring Network inbound/outbound activity monitored; real-time preferable 8. Quarterly Security Reviews Security measures reviewed to detect and prevent erosion

Workforce 1. Training Security Rule training yearly; regularly refreshed; included in new hire training 2. Credential Disablement Access immediately disabled upon termination of any employee Internet Access 1. Web Content Filtering Software installed to block access to unauthorized web content 2. Blacklist / Whitelist Software set to restrict or grant access to specified websites Data Backup 1. On-Site and Off-site Backups Performed routinely for on-site AND off-site backups 2. Reviews of Data Backups Data backups are tested to verify completeness of copies 3. Data Restoration Plan Key staff members know how to restore systems as needed

1. Audit Log Monitoring Server Firewall EMR Information Systems Access 2. Access Controls User access by role/need to know; administrative accounts limited 3. Two Factor Authentication Access requires two factors to identify user or admin

Encryption 1. Servers Software or other tools used to lock files or encrypt data or devices 2. Workstations Software or other tools used to lock files or encrypt data or devices 3. Mobile Devices Software or other tools used to lock files or encrypt data or devices 4. Backup Data Software or other tools used to lock files or encrypt data or devices 5. All Data at Rest Software or other tools used to lock files or encrypt data or devices 6. Emails, Texts, Attachments Software or other tools used to lock files or encrypt data or devices

Annual Network Security Testing 1. Vulnerability Scanning Internal scans conducted to identify unknown vulnerabilities 2. Penetration Testing External scans performed to identify risks from external access 3. Security Remediation System changes resulting from vulnerability and penetration scans 4. Verification Rescans conducted to verify updates in place and working