Plan Development Getting from Principles to Paper



Similar documents
Assessing Your Disaster. Andrews Hooper Pavlik PLC. Andrews Hooper Pavlik PLC

Our Commitment to Information Security

NIST SP , Revision 1 Contingency Planning Guide for Federal Information Systems

Heather L. Hughes, J.D. HIPAA Privacy Officer U.S. Legal Support, Inc.

White Paper THE HIPAA FINAL OMNIBUS RULE: NEW CHANGES IMPACTING BUSINESS ASSOCIATES

Institute for Business Continuity Training 1623 Military Road, # 377 Niagara Falls, NY

Business Continuity - IT Disaster Recovery Discussion Paper - - Commercial in Confidence Version V2.0R Wednesday, 5 September 2012

Business Continuity Standards A Primer

HIPAA and HITECH Compliance for Cloud Applications

Business Continuity Plan

HIPAA Hot Topics. Audits, the Latest on Enforcement and the Impact of Breaches. September Nashville Knoxville Memphis Washington, D.C.

Business Continuity Policy

The PNC Financial Services Group, Inc. Business Continuity Program

COMPLIANCE ALERT 10-12

HIPAA Security Rule Compliance

University of Glasgow. Policy for. Business Continuity Management

Best Practices in Disaster Recovery Planning and Testing

Information Protection Framework: Data Security Compliance and Today s Healthcare Industry

Business Continuity Management Planning Methodology

HITRUST CSF Assurance Program You Need a HITRUST CSF Assessment Now What?

BUSINESS CONTINUITY: BEST PRACTICE, 2ND EDITION

The Basics of HIPAA Privacy and Security and HITECH

Temple university. Auditing a business continuity management BCM. November, 2015

Business Continuity Management

Top Ten Technology Risks Facing Colleges and Universities

HIPAA Secure Now! How MSPs Can Profit From Selling HIPAA security services

Business Continuity Management Policy

Business Continuity Policy and Business Continuity Management System

HIPAA. New Breach Notification Risk Assessment and Sanctions Policy. Incident Management Policy. Focus on: For breaches affecting 1 3 individuals

Name of Other Party: Address of Other Party: Effective Date: Reference Number as applicable:

HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics

NHS Hardwick Clinical Commissioning Group. Business Continuity Policy

Contingency Plan for HIPAA

The PNC Financial Services Group, Inc. Business Continuity Program

Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH)

Overview of the HIPAA Security Rule

HIPAA and the HITECH Act Privacy and Security of Health Information in 2009

The Role of Internal Audit In Business Continuity Planning

Understanding HIPAA Privacy and Security Helping Your Practice Select a HIPAA- Compliant IT Provider A White Paper by CMIT Solutions

AN OVERVIEW OF INFORMATION SECURITY STANDARDS

Information Security Management Systems

Moving from BS to ISO The new international standard for business continuity management systems. Transition Guide

Vendor Management Challenges and Solutions for HIPAA Compliance. Jim Sandford Vice President, Coalfire

Business Resiliency Business Continuity Management - January 14, 2014

INFORMATION SECURITY SPECIFIC VENDOR COMPLIANCE PROGRAM (VCP) ACME Consulting Services, Inc.

HIPAA PRIVACY AND SECURITY AWARENESS

New HIPAA Breach Notification Rule: Know Your Responsibilities. Loudoun Medical Group Spring 2010

HIPAA Omnibus Compliance How A Data Loss Prevention Solution Can Help

Sample Business Associate Agreement Provisions

VMware vcloud Air HIPAA Matrix

Business Associates and HIPAA

An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule

SECURETexas Health Information Privacy & Security Certification Program FAQs

Measuring Continuity Planning Program. Performance

How to Plan for Disaster Recovery and Business Continuity

Privacy Officer Job Description 4/28/2014. HIPAA Privacy Officer Orientation. Cathy Montgomery, RN. Presented by:

SECURITY. Risk & Compliance Services

OCRA Spring Convention ~ 2014 Phyllis Craver Lykken, RPR, CLR, CCR Court Reporters and HIPAA

STATE OF NEVADA DEPARTMENT OF HEALTH AND HUMAN SERVICES BUSINESS ASSOCIATE ADDENDUM

By. Mr. Chomnaphas Tangsook Business Director BSI Group ( Thailand) Co., Ltd

Joe Dylewski President, ATMP Solutions

Business Continuity and Disaster Recovery Policy

2015 CEO & Board University Taking Your Business Continuity Plan To The Next Level. Tracy L. Hall, MBCP

Implementing Electronic Medical Records (EMR): Mitigate Security Risks and Create Peace of Mind

Business Associates, HITECH & the Omnibus HIPAA Final Rule

HIPAA and Mental Health Privacy:

1.0 Policy Statement / Intentions (FOIA - Open)

Business Continuity (Policy & Procedure)

Governance and Management of Information Security

Vendor Management Panel Discussion. Managing 3 rd Party Risk

Continuity of operations for critical infrastructure. Disclosure of critical information to the government.

OVERVIEW. In all, this report makes recommendations in 14 areas, such as. Page iii

Cybersecurity Framework. Executive Order Improving Critical Infrastructure Cybersecurity

Business Associate Management Methodology

Information Security Program

BCP and DR. P K Patel AGM, MoF

ARRA HITECH Stimulus HIPAA Security Compliance Reporter. White Paper

Business Continuity and Disaster Recovery Planning

HIPAA, HIPAA Hi-TECH and HIPAA Omnibus Rule

HIPAA Summit. March 10, Phyllis A. Patrick, MBA, FACHE, CHC Phyllis A. Patrick & Associates LLC

Business Continuity Policy

Bridging the HIPAA/HITECH Compliance Gap

Transcription:

Plan Development Getting from Principles to Paper March 22, 2015 Table of Contents / Agenda Goals of the workshop Overview of relevant standards Industry standards Government regulations Company standards Mapping standards to plan outline Document Control Document control principles Template development Development of different plan types Incident Management Business Continuity Disaster Recovery (data center) Application Recovery Technology Recovery Disaster Recovery Exercise Small Groups plan review and critique Conclusion 2

Goals of the Workshop Present an overview of the factors and requirements that shape plan development Give examples of plan development based on these requirements Allow participants to review and critique these examples based on their needs and experience 3 Two Types of Plan Factors External Requirements Factors outside of the plan that determine what will guide, direct, limit its content Regulatory requirements Audit Corporate policy Internal Usability Factors that shape the usefulness of the plan for those reading it Order of content Length Verbiage (or lack of it) Optional content 4

Regulations, Policies, and Standards: International Organization for Standardization (ISO) ISO/IEC 2011 All rights reserved 5 Regulations, Policies, and Standards: International Organization for Standardization (ISO) ISO 22301 Societal security Business Continuity Management Systems Requirements Supersedes BS 25999, which was withdrawn in 2012 A generic business continuity management standard that can be used by any organization, or any part of an organization, no matter what size it is or what it does However, exactly how you apply ISO 22301 is up to you and will depend on your organization's unique business continuity needs and obligations and the particular expectations and requirements of interested parties Plan-Do-Check-Act (PDCA) is an iterative four-step management method outlined in ISO 22301 - and organized as follows: 1. PLAN - Parts 4, 5, 6, and 7 expect you to plan the establishment of your organization's BCMS. 2. DO - Part 8 expects you to establish your BCMS 3. CHECK - Part 9 expects you to evaluate your BCMS 4. ACT - Part 10 expects you to improve your BCMS. 6

Regulations, Policies, and Standards: International Organization for Standardization (ISO) ISO 27031 Information technology - Security techniques - Guidelines for information and communication technology readiness for business continuity ISO/IEC 27031 provides guidance on the concepts and principles behind the role of information and communications technology in ensuring business continuity. The Standard: Suggests a structure or framework (actually a set of methods and processes) for any organization private, governmental, and non-governmental; Identifies and specifies all relevant aspects including performance criteria, design, and implementation details, for improving ICT readiness as part of the organization s ISMS, helping to ensure business continuity; Enables an organization to measure its ICT continuity, security and hence readiness to survive a disaster in a consistent and recognized manner. 7 Regulations, Policies, and Standards: International Organization for Standardization (ISO) ISO 27031 Information technology - Security techniques - Guidelines for information and communication technology readiness for business continuity Plan-Do-Check-Act (PDCA) is an iterative four-step management method outlined in ISO 27031 1. PLAN. Establish a Disaster Recovery Business Continuity policy with objectives, metrics, and processes relevant to managing risk and improving the enterprise's Information and Communication Technology ability and readiness to operate at the level defined within the parameters of the enterprise's overall disaster recovery and business continuity objectives. 2. DO. Implement and operate the Disaster Recovery and Business Continuity policies, procedures, controls, and processes. 3. CHECK. Assess and monitor the performance metrics as defined within the Disaster Recovery and Business Continuity policy metrics and communicate the results to the management of the enterprise. This process can be done via an audit, a test of the plan, or an actual execution of the plan via a post event analysis session. 4. ACT. Modify the Disaster Recovery and Business Continuity policies, procedures, and metrics based on the "Check" (audit, test, or execution of the plan) in order to improve the Disaster Recovery and Business Continuity Policy 8

Regulations, Policies, and Standards: Federal Financial Institutions Examination Council (FFIEC) In summary, the following factors represent critical aspects of an effective business continuity planning process: The effectiveness of business continuity planning depends upon the involvement of the board and senior management; Business continuity planning involves a continuous, process-oriented approach that includes a BIA, a risk assessment, risk management, and risk monitoring and testing; A thorough BIA and risk assessment should form the foundation of a comprehensive BCP; The BCP and testing program should be developed on an enterprise-wide basis; The effectiveness of the BCP should be validated through annual, or more frequent, testing; The BCP and test program should be thoroughly documented, evaluated by institution management, independently reviewed by an internal and/or external audit function, and reported to the board; The BCP and test program should be updated to reflect and respond to changes in the institution and gaps identified during continuity testing; and In addition to the BCP, other financial institution policies, standards, and processes should be integrated into the business continuity planning process. 9 Regulations, Policies, and Standards: National Fire Protection Association (NFPA) NFPA 1600 - National Fire Protection Association (NFPA) Standard on Disaster/Emergency Management and Business Continuity Programs (NFPA 1600). The NFPA 1600 standard is a description of the basic criteria for a comprehensive program that addresses disaster recovery, emergency management, and business continuity. NFPA 1600 is considered by many to be an excellent benchmark for continuity and emergency planners in both the public and private sectors. The standard addresses methodologies for defining and identifying risks and vulnerabilities and provides planning guidelines that address stabilizing the restoration of the physical infrastructure, protecting the health and safety of personnel, and crisis communications procedures. This standard shall establish a common set of criteria for all hazards disaster/emergency management and business continuity programs, hereinafter referred to as the program. This standard provides the fundamental criteria to develop, implement, assess, and maintain the program for prevention, mitigation, preparedness, response, continuity, and recovery. 10

Regulations, Policies, and Standards: Health Insurance Portability and Accountability Act (HIPAA) HIPAA Privacy Rule - is a set of federal standards to protect the privacy of patients' medical records and other health information maintained by covered entities: health plans, which include many governmental health programs, such as the Veterans Health Administration, Medicare and Medicaid; most doctors, hospitals and many other health care providers; and health care clearinghouses. These standards provide patients with access to their medical records and with significant control over how their personal health information is used and disclosed. Compliance with the standards was required as of April 14, 2003 for most entities covered by HIPAA. On that date, Office for Civil Rights (OCR) began accepting complaints involving the privacy of personal health information in the health care system. HIPAA Security Rule - establishes national standards for the security of electronic protected health information. The final rule adopting HIPAA standards for security was published in the Federal Register on February 20, 2003. This final rule specifies a series of administrative, technical, and physical security safeguards for covered entities to assure the confidentiality of electronic protected health information. The standards are delineated into either required or addressable implementation specifications. Compliance with the standards was required as of April 20, 2005, for most entities covered by HIPAA. The authority to administer and enforce the Security Rule was transferred to OCR on July 27, 2009. HIPAA Breach Notification Rule - requires covered entities and their business associates to notify the Secretary, individuals, and in some cases, the media, regarding breaches of unsecured protected health information. Compliance with the standards was required as of September 23, 2009. 11 Regulations, Policies, and Standards: Health Insurance Portability and Accountability Act (HIPAA) HIPAA Violation Minimum Penalty Maximum Penalty Individual did not know that he/she violated HIPAA and by exercising reasonable diligence, would not have known. $100 per violation, with an annual maximum of $25,000 for repeat violations. Note: This is the maximum penalty that can be imposed by the State Attorney General regardless of the violation. $50,000 per violation, with an annual maximum of $1.5 million. HIPAA violation due to reasonable cause and not due to willful neglect. $1,000 per violation, with an annual maximum of $100,000 for repeat violations. $50,000 per violation, with an annual maximum of $1.5 million. HIPAA violation due to willfull neglect but violation is corrected within the required time period. $10,000 per violation, with an annual maximum of $250,000 for repeat violations. $50,000 per violation, with an annual maximum of $1.5 million. HIPAA violation due to willful neglect and is not corrected. $50,000 per violation, with an annual maximum of $1.5 million. $50,000 per violation, with an annual maximum of $1.5 million 12

Regulations, Policies, and Standards: National Institute of Standards and Technology (NIST) NIST 800-34 Contingency Planning Guide for Federal Information Systems NIST s Information Technology Laboratory has published a recommended guidance document on contingency planning for federal departments and agencies. (Industry will find the recommendations valuable as well.) NIST Special Publication (SP) 800-34, Contingency Planning Guide for Information Technology Systems provides instructions, recommendations, and considerations for government IT contingency planning NIST SP 800-34 provides guidance to individuals responsible for preparing and maintaining contingency plans. The guide discusses essential contingency plan elements and processes, highlights specific considerations and concerns associated with contingency planning for various types of IT systems, and provides examples to assist readers in developing their own IT contingency plans. 13 Regulations, Policies, and Standards: Company Policy What is your industry? What external standards are referenced? Business Continuity Disaster Recovery Incident Management 14

Regulations, Policies, and Standards: Standards Comparison 15 Regulations, Policies, and Standards: Internal Company Policy (cont d) What is required? Business Continuity Plan Application Disaster Recovery Plan Technology Disaster Recovery Plan Incident Management Plan Data Center Disaster Recovery Plan 3 rd Party Vendor (Off-site) Exercise Plan Exercise Report What is measurable? Exercises (types) Applications and Systems Communications Plans Number of; last reviewed or updated What is reportable? Management requirements from Policy 16

Regulations, Policies, and Standards: Internal Company Policy (cont d) What is a Policy? A statement of the philosophy, rules, and expectations of the organization Long-term in nature Relatively static Supported and interpreted by more detailed standards, guidelines, and procedures What is a Standard? A mandatory requirement that supports the policy and defines an acceptable level of control along with measurable compliance criteria For Example AIG s policy and standard for a Business Impact Analysis Policy: AIG Business Units are responsible for completing and maintaining a Business Impact Analysis Standard: AIG Business Units are responsible for developing a BIA for all functions/processes which at a minimum identifies: An overview of the overall business purpose A listing of business functions/processes Function/Process location (use multiple line, using the same function/process number) if the function/process is conducted in multiple locations. A summary of potential operational and financial impacts over time 17 Regulations, Policies, and Standards: Internal Company Policy (cont d) For Example - AIG policy and standard for a Business Continuity Plan Policy: AIG Business Units are responsible for completing and maintaining a Business Continuity Plan The BCP identifies the recovery strategy, actions, and activities required to recover business operations during any given operational disruption. Standard: AIG Business Units are responsible to document a BCP aligned to the RA and BIA which must include: Executive Summary Overview of BCP Recovery assumptions RTO for each function/process Staff recovery requirements Key recovery strategy 18

Mapping Standards: A Sample Mapping of Standards Requirements to Plan Content 19 Documentation Development and Control: Part 1: Documentation Control Methodology 1. Separate template section (preferably at the beginning of the document) Template information and history Template approval Instructions for completing the template 2. Only approved versions are published/implemented 3. Version numbers 4. Revision history detailed list of changes in each revision 5. Signoff 6. Header, footer, page numbers (content and location of fields should be defined) Good to have! 7. Document title = (Document purpose or subject) + (Applicable entity) or (Applicable entity) + (Document purpose or subject) Order of title may be determined by how documents are to be sorted or stored E.g., AIG Order Processing Application Recovery Plan 8. Filename = (Document title) + (Version number) 9. Version numbering: whole numbers (e.g., 2.00) for approved, published versions; decimals (e.g., 2.03) for intermediate revisions, drafts, etc. 10. Consistent use of effective date : always mm/dd/yyyy format, always linked to current official document version. 20

Documentation Development and Control: Part 2: Document Development Methodology Begin by using the agreed-upon document control methodology Identify the drivers of required content and what they require What do the applicable regulations/standards/policies require Consider a content/requirement mapping spreadsheet Determine the order of content More important information at the beginning More detailed explanations later on (e.g., listing of applications vs. application descriptions) Populate the main body of the document with relatively static information Restrict dynamic information primarily to the appendices (team rosters, etc.) Restrict dynamic information to as few sections as possible Use titles and positions in the document rather than individual names Restrict names and contact information to a minimal number of predefined sections Work to keep plans as concise as possible These ideas are helpful! Avoid maps, detailed navigation instructions Provide links where useful Burden of proof is on inclusion, not exclusion Consider a glossary of terms as the final appendix (especially company-specific acronyms) 21 Template Development: Template Section 1 22

Template Development: Template Section 2 23 Template Development: Incident Management Plan TOC 24

Template Development: Business Continuity Plan TOC 25 Template Development: Disaster Recovery Plan TOC 26

Template Development: Technical Recovery Plan TOC 27 Template Development: Application Recovery Plan TOC 28

Template Development: Disaster Recovery Exercise Plan TOC 29 Template Development: Sample Appendix for Contact Information 30

Template Development: Sample Appendix for Forms and Reporting 31 Template Development: Glossary 32

Template Development: Additional Considerations If working with a pre-existing plan, work backward to create a template and documentation standards If using a BC/DR software tool, build a template as a sample plan with a model table of contents Copy the template to form the beginning of a new plan As necessary, create separate TOCs for the template and individual plans that are based on it Use documents for static text and diagrams Use reports for appendices or tables with dynamic information (team listings, contact information, etc.) Regardless of the source of the finished template or plan (BC software, Word, etc.), always proofread and QA the final version 33 Summary of Major Steps in Getting from Principles to Paper Identify the drivers of required content and what they require Legal/regulatory Industry standards Company policy Define a methodology for documentation development and maintenance Identify the types of plans needed Develop a template for each plan type Disseminate and populate the templates Adhere to document management principles and a regular maintenance schedule 34

Putting the Work in Workshop : Your Turn Template Evaluation and Critique Each table will get a sample template and a critique worksheet; multiple groups will have the same template Review the template as a group and document your review What would you change about the order of the content? What would you delete from the template? What would you add to the template? We will go around the room and have each group summarize its review 35 Conclusion 36

Contact Information David Greb, BCM/Compliance Team Manager Email: david.greb@aig.com Work Phone: 913-948-9435 Andrew Collins, BCM/Compliance Project Manager Email: andrew.collins1@aig.com Work Phone: 682-831-8973 Shawn Dennis, BCM/Compliance Project Manager Email: shawn.dennis@aig.com Work Phone: 973-533-2141 37