HIPAA Security: Gap Analysis, Vulnerability Assessments, and Countermeasures



Similar documents
Network Security Policy

TECHNICAL NOTE 01/02 PROTECTING YOUR COMPUTER NETWORK

Security Technology: Firewalls and VPNs

Network Security Administrator

SANS Top 20 Critical Controls for Effective Cyber Defense

CISCO IOS NETWORK SECURITY (IINS)

Fundamentals of Information Systems Security Unit 1 Information Systems Security Fundamentals

Network Security Guidelines. e-governance

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

H.I.P.A.A. Compliance Made Easy Products and Services

Chapter 12. Security Policy Life Cycle. Network Security 8/19/2010. Network Security

State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD Effective Date: April 7, 2005

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

CMPT 471 Networking II

Pension Benefit Guaranty Corporation. Office of Inspector General. Evaluation Report. Penetration Testing An Update

The Protection Mission a constant endeavor

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

3. Firewall Evaluation Criteria

Goals. Understanding security testing

Firewall VPN Router. Quick Installation Guide M73-APO09-380

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

Unified Security Anywhere HIPAA COMPLIANCE ACHIEVING HIPAA COMPLIANCE WITH MASERGY PROFESSIONAL SERVICES

This chapter covers the following topics: Why Network Security Is Necessary Secure Network Design Defined Categorizing Network Security Threats How

For more information or call

PierianDx - Clinical Genomicist Workstation Software as a Service FAQ s

Network and Host-based Vulnerability Assessment

Cyber Security: An Introduction

74% 96 Action Items. Compliance

Designing a security policy to protect your automation solution

SY system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.

By David G. Holmberg, Ph.D., Member ASHRAE

Payment Card Industry Data Security Standard

Sygate Secure Enterprise and Alcatel

CTS2134 Introduction to Networking. Module Network Security

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led

United States Trustee Program s Wireless LAN Security Checklist

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design

Best Practices for PCI DSS V3.0 Network Security Compliance

Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

Basics of Internet Security

Multi-Homing Dual WAN Firewall Router

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Security aspects of e-tailing. Chapter 7

IP Telephony Management

TABLE OF CONTENT. Page 2 of 9 INTERNET FIREWALL POLICY

CH ENSA EC-Council Network Security Administrator Detailed Course Outline

Firewalls Overview and Best Practices. White Paper

Consensus Policy Resource Community. Lab Security Policy

TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL

OLD DOMINION UNIVERSITY Router-Switch Best Practices. (last updated : )

AASTMT Acceptable Use Policy

ADM:49 DPS POLICY MANUAL Page 1 of 5

Approved 12/14/11. FIREWALL POLICY INTERNAL USE ONLY Page 2

Directory and File Transfer Services. Chapter 7

How To Protect A Network From Attack From A Hacker (Hbss)

Global Partner Management Notice

Rapid Vulnerability Assessment Report

INFORMATION TECHNOLOGY ENGINEER V

Security Policy for External Customers

Cisco Advanced Services for Network Security

Security Issues in Cloud Computing

Understanding SCADA System Security Vulnerabilities

ORANGE REGIONAL MEDICAL CENTER Hospital Wide Policy/Procedure

SECURITY. Risk & Compliance Services

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

Chapter 1 The Principles of Auditing 1

What IT Auditors Need to Know About Secure Shell. SSH Communications Security

Two Approaches to PCI-DSS Compliance

HIPAA Compliance for Mobile Healthcare. Peter J. Haigh, FHIMSS Verizon

SonicWALL PCI 1.1 Implementation Guide

Did you know your security solution can help with PCI compliance too?

Firewalls. CEN 448 Security and Internet Protocols Chapter 20 Firewalls

Payment Card Industry Self-Assessment Questionnaire

Firewall Design Principles Firewall Characteristics Types of Firewalls

Security Policy JUNE 1, SalesNOW. Security Policy v v

Ti m b u k t up ro. Timbuktu Pro Enterprise Security White Paper. Contents. A secure approach to deployment of remote control technology

Enterprise K12 Network Security Policy

CNA NetProtect Essential SM. 1. Do you implement virus controls and filtering on all systems? Background:

Industrial Firewalls Endpoint Security

Cisco Security Optimization Service

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

8 Steps For Network Security Protection

Step-by-Step Configuration

Achieving PCI-Compliance through Cyberoam

HIPAA Security. Jeanne Smythe, UNC-CH Jack McCoy, ECU Chad Bebout, UNC-CH Doug Brown, UNC-CH

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting

Transcription:

HIPAA Security: Gap Analysis, Vulnerability Assessments, and Countermeasures Don Hewitt and Chris Goggans March 1, 2001 Copyright 2001 by Security Design International, Inc. 1

Agenda The Proposed Rule The Gap(s) A Network Security Primer Vulnerability Assessments Real Examples Countermeasures Copyright 2001 by Security Design International, Inc. 2

Information Security Classical Definition Confidentiality Integrity Availability Copyright 2001 by Security Design International, Inc. 3

Some Characteristics of the Rule Technology neutral Deliberately general guidance Extremely broad applicability An attempt at scalability Easier said than done Serious technical issue Copyright 2001 by Security Design International, Inc. 4

Proposed Security Requirements Administrative procedures Physical safeguards Technical security services Technical security mechanisms The standard does not address the extent to which a particular entity should implement the specific features. Instead, we would require that each affected entity assess its own security needs and risks and devise, implement, and maintain appropriate security to address its business requirements. Federal Register, August 12, 1998 [43250] Copyright 2001 by Security Design International, Inc. 5

Gap Analysis Applicable to any aspect of the rule Determine the gap between where you are, and where you need to be. One such gap will be defined by your network security posture. Copyright 2001 by Security Design International, Inc. 6

Other Gaps of Interest Budget Gap Between what you have and what you need to implement HIPAA Knowledge Gap Between what you know about information security and what you need to know to implement HIPAA Practicality Gap Between HIPAA as currently formulated and the medical/business processes necessary to deliver health care Copyright 2001 by Security Design International, Inc. 7

Honor the Threat Threats are both internal and external. Increased Connectivity = Increased Risk Internet Other networks Dial-up connections Threats are both technical and physical. In early 2000, a report by CSI and the FBI stated that 90% of 650 corporations interviewed had detected attacks in 1999. Copyright 2001 by Security Design International, Inc. 8

Network Threat: Perception Internal Dial-Up Internet Copyright 2001 by Security Design International, Inc. 9

Network Threat: Reality Internet Dial-Up Internal Copyright 2001 by Security Design International, Inc. 10

Evolution of Workstation Connectivity Standalone personal computers Local Area Network connects small workgroups Larger LANs and client server software provide distributed services and applications Wide Area Networks connect LANs to offer enterprise-wide connectivity The Internet allows enterprises and individuals to connect directly to millions of known and unknown individuals world-wide Copyright 2001 by Security Design International, Inc. 11

TCP/IP Enabling the Internet Transmission Control Protocol / Internet Protocol Provides a framework for inter-networking and multiple simultaneous communication via standard packets Addressing standards allow routing of messages across multiple dissimilar networks Layering of communications responsibilities and the concept of ports allows diverse systems and applications to communicate Copyright 2001 by Security Design International, Inc. 12

TCP/IP Vulnerabilities 12345 Netbus Trojan Horse Host 10.10.10.10 1521 - Oracle 161 Simple Network Mgt Protocol 111 Portmapper 80 World Wide Web 25 Simple Mail Transfer Protocol 23 - Telnet 21 File Transfer Protocol Connect to network 3 desired services Superfluous services started by default Over 65,000 ports first 1024 reserved what else is out there? Copyright 2001 by Security Design International, Inc. 13

It s All Connected! Ping See if a host is present on the network First step in mapping network Port Scan See which port(s) are responding on every host High probability of identifying function by its port number War-Dialing Consecutive dialing of phone numbers in search of carrier tone Copyright 2001 by Security Design International, Inc. 14

Some Terrible Assumptions It s only a workstation. No one will see a dial-up connection. The manufacturer s default settings will be fine. It will be ok to connect just this one machine across multiple networks for ease of use. Copyright 2001 by Security Design International, Inc. 15

e-liable Direct Liability First Party Information Proprietary data and intellectual property Direct Liability Third Party Information HIPAA Gramm-Leach-Bliley Act Indirect Liability As a conduit (through unprotected connections) As a platform (allowing use of resources as attack platforms, e.g., in a DDOS) Copyright 2001 by Security Design International, Inc. 16

The Inevitable Conclusion It s not about perfect security; it s about DUE DILIGENCE. "Given the inevitability of computer losses, you ll be judged not by whether you were the victim of an attack, but by how well you planned for it." - Computer Security Institute Copyright 2001 by Security Design International, Inc. 17

Vulnerability Assessments Internal and external attack Validation of existing security mechanisms Detailed analysis of networked devices and services Audit for policy compliance Prioritized recommendations for improving security posture Copyright 2001 by Security Design International, Inc. 18

WHY Vulnerability Assessments? Only realistic way to determine vulnerabilities Get a baseline of vulnerability state Prioritize remedial actions Correct serious problems quickly Assure that policies address real vulnerabilities Evolving best practice Copyright 2001 by Security Design International, Inc. 19

Assessments as Program Drivers Vulnerability Assessment Establishment Of Security Office MIS Actions Risk Assessment Corporate Requirements Policy Development Policy Implementation Training Copyright 2001 by Security Design International, Inc. 20

News Flash and possible heresy Healthcare network security concerns are not significantly different from other industries! Copyright 2001 by Security Design International, Inc. 21

Real Examples: Large University Hospital Only router filters separated the two environments Extensive inter-entity traffic Broadcast networks on both sides allowed sniffing of passwords Poor password choices on both sides Similar accounts on Netware, Unix, and Mainframes Copyright 2001 by Security Design International, Inc. 22

Real Examples: Cardiac Care Center No Internet firewall Open (unpassworded) dial-up connections Vulnerable single-sign-on server led to compromise of Netware, Unix, and Tandem accounts (including active patient data) Copyright 2001 by Security Design International, Inc. 23

Real Examples: Insurance Customer had a very small Internet presence (16 IP address allocation, only live hosts were mail server and firewall) Customer users made posts to USENET news and common mailing lists Firewall allowed incoming authentication and gave different error messages for valid and invalid users POP server did not log failed login attempts Copyright 2001 by Security Design International, Inc. 24

Real Examples: Telecommunications Large US telephone company Dial-ups found with unpassworded pcanywhere pcanywhere system used primarily for access into security camera monitoring Full access to internal network, including switching systems, billing, etc. Copyright 2001 by Security Design International, Inc. 25

Real Examples: Public Utilities Large power generation company Unpassworded modem dial-ups found less than a dozen phone numbers away from main number Many administrator level accounts on main NT server with password of password Accounts on VMS nuclear power monitoring systems found with no password Copyright 2001 by Security Design International, Inc. 26

Real Examples: Manufacturing Customer had large Internet-accessible network, but made good use of firewall products and used internal-use-only addressing Customer had multiple hosts dual-homed to internal network on the DMZ (other than the firewall) Customer had extensive unprotected connectivity to business partners Copyright 2001 by Security Design International, Inc. 27

Common Problems UNIX Ubiquitous default accounts and passwords Open NFS exports Poor trust relationships Open X-Windows servers Copyright 2001 by Security Design International, Inc. 28

Common Problems Windows NT Null Session access almost always enabled Poor passwords choices endemic even on administrator-level accounts leading to password database (SAM) access Shared drives found with no passwords Copyright 2001 by Security Design International, Inc. 29

Common Problems Generic The Internet is usually very easy to secure, but modems (authorized and unauthorized) are the number one entry mechanism to a company s network Poor passwords are the number one mechanism to gain host-level access Non-switched networks are still everywhere allowing network sniffing Copyright 2001 by Security Design International, Inc. 30

Countermeasures: Searching for the Silver Bullet Scanning tools Network firewalls Intrusion detection Virtual Private Networks (VPN) Encryption Copyright 2001 by Security Design International, Inc. 31

Emerging Best Practice A Formal Security Program Policy Deployment Training Configuration Management Recurring Assessment Copyright 2001 by Security Design International, Inc. 32

Emerging Best Practice A Formal Security Program Policy Deployment MANAGEMENT SUPPORT Target critical areas Permitted use Passwords Connectivity Incident Response Related policies Personnel Physical security Disaster recovery Copyright 2001 by Security Design International, Inc. 33

Emerging Best Practice A Formal Security Program Mandatory awareness training Advanced training for administrators Publications Web page Security Awareness Week Training Copyright 2001 by Security Design International, Inc. 34

Emerging Best Practice A Formal Security Program Configuration Management Standard configurations for servers and workstations Process for patches and upgrades System enforcement of policies Process for virus scanning Copyright 2001 by Security Design International, Inc. 35

Emerging Best Practice A Formal Security Program Recurring internal audits/compliance checks Periodic third party vulnerability assessments Recurring Assessment Copyright 2001 by Security Design International, Inc. 36

Summary Increased connectivity increased risk Real liability exists Best practice vs perfect security Formal security programs needed Scaled to enterprise Oriented to counter threat Continually updated to remain effective Security is a process, not a product Copyright 2001 by Security Design International, Inc. 37