CSF Support for HIPAA and NIST Implementation and Compliance



Similar documents
Understanding HITRUST s Approach to Risk vs. Compliance-based Information Protection

Managing Cybersecurity Risk in a HIPAA-Compliant World

HITRUST Risk Management Framework and the Texas Certification Program A Model for the Healthcare Industry

MU Security & Privacy Risk Assessments: What It Is & How to Approach It

What can HITRUST do for me?

Frequently Asked Questions about the HITRUST Risk Management Framework

Assessing Your HIPAA Compliance Risk

Managing Business Risk with HITRUST Leveraging Healthcare s Risk Management Framework

MU Security & Privacy Risk Assessments: What It Is & How to Approach It

BIOS Steven Penn, Senior Director CSF Development And Educa9on Programs Bryan Cline, PhD Senior Advisor

Sunday March 30, 2014, 9am noon HCCA Conference, San Diego

Health Industry Implementation of the NIST Cybersecurity Framework

Guidance on Risk Analysis Requirements under the HIPAA Security Rule

Perspectives on Navigating the Challenges of Cybersecurity in Healthcare

Strategies for. Proactively Auditing. Compliance to Mitigate. Matt Jackson, Director Kevin Dunnahoo, Manager

HIPAA and HITRUST - FAQ

Using the HITRUST CSF to Assess Cybersecurity Preparedness 1 of 6

Compliance, Security and Risk Management Relationship Advice. Andrew Hicks, Director Coalfire

Executive Order 13636: The Healthcare Sector and the Cybersecurity Framework. September 23, 2014

HITRUST Risk Management Framework and the Texas Certification Program A Model for the Healthcare Industry

How To Manage Cybersecurity In Healthcare

Healthcare s Model Approach to Critical Infrastructure Cybersecurity

HITRUST CSF Assurance Program

Building Security In:

HITRUST. Risk Management Frameworks

The HIPAA Audit Program

Meaningful Use and Security Risk Analysis

Our Commitment to Information Security

What is required of a compliant Risk Assessment?

HIPAA Compliance Review Analysis and Summary of Results

HHS Information System Security Controls Catalog V 1.0

An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule

HEALTHCARE SECURITY AND PRIVACY CATALOG OF SERVICES

HIPAA Security Prepare Now or Wait and See?

How to Use the NYeC Privacy and Security Toolkit V 1.1

HIPAA: Compliance Essentials

Bringing Box into HIPAA Alignment. Bob Flynn & Anurag Shankar University Information Technology Services Indiana University

Information Protection Framework: Data Security Compliance and Today s Healthcare Industry

CASRO Digital Research Conference Data Security: Don t Risk Being the Weak Link

Decrypting the Security Risk Assessment (SRA) Requirement for Meaningful Use

The President issued an Executive Order Improving Critical Infrastructure Cybersecurity, on February 2013.

INFORMATION SECURITY STRATEGIC PLAN

HIPAA Security. 6 Basics of Risk Analysis and Risk Management. Security Topics

This is the third and final presentation on HIPAA Security Administrative Safeguards. This presentation focuses on the last 2 standards under the

Overview of the HIPAA Security Rule

ForeScout CounterACT and Compliance June 2012 Overview Major Mandates PCI-DSS ISO 27002

HIPAA Security. 1 Security 101 for Covered Entities. Security Topics

IT ASSET MANAGEMENT Securing Assets for the Financial Services Sector

FDA Releases Final Cybersecurity Guidance for Medical Devices

NIST Cybersecurity Framework Sean Sweeney, Information Security Officer 5/20/2015

Cybersecurity Audit Why are we still Vulnerable? November 30, 2015

Risk Management Framework (RMF): The Future of DoD Cyber Security is Here

Bruce A. Metz, PhD Chief Information Officer Thomas Jefferson University November 3, 2010

HITRUST CSF Assurance Program You Need a HITRUST CSF Assessment Now What?

Cybersecurity for Meaningful Use FRHA Annual Summit "Setting the Health Care Table: Politics, Economics, Health" November 20-22, 2013

Nationwide Review of CMS s HIPAA Oversight. Brian C. Johnson, CPA, CISA. Wednesday, January 19, 2011

Security Control Standard

How To Understand And Understand The Benefits Of A Health Insurance Risk Assessment

Business Associate Management Methodology

HIPAA Security Rule Changes and Impacts

HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics

How Much Do I Need To Do to Comply? Vice president SystemExperts Corporation

HITRUST Common Security Framework Summary of Changes

Trust 9/10/2015. Why Does Privacy and Security Matter? Who Must Comply with HIPAA Rules? HIPAA Breaches, Security Risk Analysis, and Audits

Nine Network Considerations in the New HIPAA Landscape

Framework for Reducing Cyber Risks to Critical Infrastructure

Health Homes Implementation Series: NYeC Privacy and Security Toolkit. 16 February 2012

The HIPAA Security Rule: Cloudy Skies Ahead?

U.S. Department of Health and Human Services (HHS) The Office of the National Coordinator for Health Information Technology (ONC)

U.S. FLEET CYBER COMMAND U.S. TENTH FLEET DoD RMF Transition

HIPAA/HITECH Privacy and Security for Long Term Care. Association of Jewish Aging Services 1

Looking at the SANS 20 Critical Security Controls

SAMPLE HIPAA/HITECH POLICIES AND PROCEDURES MANUAL FOR THE SECURITY OF ELECTRONIC PROTECTED HEALTH INFORMATION

HITRUST Common Security Framework

Information Security for Managers

Uncheck Yourself. by Karen Scarfone. Build a Security-First Approach to Avoid Checkbox Compliance. Principal Consultant Scarfone Cybersecurity

Understanding the NIST Cybersecurity Framework September 30, 2014

Securing the FOSS VistA Stack HIPAA Baseline Discussion. Jack L. Shaffer, Jr. Chief Operations Officer

MANAGING THE CONFIGURATION OF INFORMATION SYSTEMS WITH A FOCUS ON SECURITY

Framework for Improving Critical Infrastructure Cybersecurity

Policy on Information Assurance Risk Management for National Security Systems

Does Your Information Security Program Measure Up? Session #74

Richard Gadsden Information Security Office Office of the CIO Information Services

PROTIVITI FLASH REPORT

Intel Security Professional Services Leveraging NIST Cybersecurity Framework (CSF): Complexity is the enemy of security

Greenway Marketplace. Hear from GSG Compliance & White Plume November 14, 2013

HIPAA Security Risk Analysis for Meaningful Use

Information Security Risk and Compliance Series Risking Your Business

Unified Security Anywhere HIPAA COMPLIANCE ACHIEVING HIPAA COMPLIANCE WITH MASERGY PROFESSIONAL SERVICES

IT Senior Audit Leader

2015 Minnesota e-health Summit Data Privacy and Security Prevailing Federal Laws for Local Public Health

An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule

Lessons Learned from HIPAA Audits

G22 - A Security and Compliance Risk Management Framework for Health Care Bryan Cline

HIPAA Secure Now! How MSPs Can Profit From Selling HIPAA security services

What s new In the News Data Breach Discussion The 5 W s Risk Analysis: Why, What, how, When, and Who Common Issues Observed Q / A Session Purdue

Architecting Security to Address Compliance for Healthcare Providers

CMS POLICY FOR THE INFORMATION SECURITY PROGRAM

Healthcare Sector Cybersecurity Framework Implementation Guide

NIST CYBERSECURITY FRAMEWORK COMPLIANCE WITH OBSERVEIT

Transcription:

CSF Support for HIPAA and NIST Implementation and Compliance Presented By Bryan S. Cline, Ph.D. Presented For HITRUST

Why does HITRUST exist? Multitude of challenges Significant government oversight Evolving requirements Complex business relationships Uncertain standard of care Reasonable and appropriate? Adequate protection? Page 2

Principle driver Page 3

Overarching requirement 45 CFR 164.308(a)(1) Conduct an accurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality, integrity, and availability of electronic protected health information held by the covered entity or business associate. 45 CFR 164.306(a) (1) Ensure the [CIA] of all [ephi] the covered entity or business associate creates, receives, maintains or transmits. (2) Protect against any reasonably anticipated threats or hazards to the security or integrity of such information. Page 4 Page 4

What exactly is a risk assessment? Risk assessment The process of identifying, estimating, and prioritizing risks resulting from the operation of an information system. Part of risk management, incorporates threat and vulnerability analyses, and considers mitigations provided by security controls planned or in place. Synonymous with risk analysis. Risk analysis NIST SP 800-39, Managing Information Security Risk Examination of information to identify the risk to an information asset. Synonymous with risk assessment CNSSI No. 4009, National IA Glossary Conducting a risk analysis is the first step in identifying and implementing safeguards that comply with and carry out the standards and implementation specifications in the Security Rule HHS Guidance on Risk Analysis Requirements under the HIPAA Security Rule Page 5 Page 5

Risk management lifecycle Page 6 Page 6

Risk analysis process Page 7 Page 7

HHS interpretation HHS Guidance on RA Requirements under the Security Rule Scope the assessment to include all ephi ID & document all assets with ephi ID & document all reasonably anticipated threats to ephi Assess all current security measures Determine the likelihood of threat occurrence Determine the potential impact of a threat occurrence Determine the level of risk Document assigned risk levels and corrective actions Rinse & repeat Page 8 Page 8

Traditional approach Conduct comprehensive risk analysis Threat & vulnerability assessment Information asset valuation Information protection control selection Comprehensive risk analysis difficult for most Lack of skilled resources, funding, time Limited information available Page 9 Page 9

Framework Approach Modify general baseline control standard Threat modeling / control selection performed by capable, thirdparty for general threats, vulnerabilities Baseline controls assigned based on confidentiality, and/or criticality Baseline control approach most widely used ISO/IEC 27001/27002, part of the ISO/IEC 27000-series RMF NIST SP 800-53, part of the NIST SP 800-series RMF HITRUST CSF, part of the HITRUST RMF Based on ISO/IEC 27001 and integrates a significant portion of NIST SP800-53 requirements Page 10 Page 10

HITRUST Risk Analysis Modified Guidance on RA Requirements for the Security Rule Scope the assessment to include all ephi ID & document all assets with ephi (inventory and categorization) Select a control baseline for given categorization (risk factors) Assess all current security measures (gap analysis) Determine the likelihood of a control failure Determine the potential impact of a control failure Determine the level of residual risk Document assigned risk levels and corrective actions Rinse & repeat Note: A threat catalog is being developed as part of a HITRUST C3 initiative to map threats to specific controls, which will support the requirement to enumerate and address all reasonably anticipated threats. Page 11 Page 11

Justification for the approach All federal agencies use the NIST RMF NIST SP 800-30 r1, Guide for Conducting Risk Assessments, addresses traditional RA Typical risk factors include threat, vulnerability, impact, likelihood, and predisposing condition BUT NIST SP 800-37 r1, Guide to Applying the [RMF] to Federal Information Systems, doesn t address threat identification Categorize information system Select security controls Implement security controls Hardly seems fair, does it? Traditional approach likely used due to lack of federally recognized healthcare security framework including NIST Page 12 Page 12

But what about everything else in HIPAA? RA requirement is one of 42 stds & specifications Like RA, other requirements lack prescription What safeguards are reasonable and appropriate? What is adequate protection? Simple HIPAA requirement-based approaches to risk analysis lack depth, breadth and rigor OCR will not accept a risk analysis based on the old OCR Audit Protocol developed by KPMG (Linda Sanchez, 2014 HCCA conference) Implies controls reviewed do not sufficiently address all reasonably anticipated threats Implies similar approaches based on HIPAA standards and specifications are also flawed Page 13 Page 13

Defining reasonable and appropriate for healthcare HITRUST CSF Built on international framework, ISO 27001 Additional prescription provided by: ISO 27002 & 27799 NIST SP 800-53 CMS IS ARS (High-level baseline) PCI-DSS Others CSF controls mapped to HIPAA E.g., 164.308(a)(5)(ii)(C), Log-in Monitoring (Addressable) 8 controls provide direct support: 01.b., 01.c, 01.e, 02.i, 09.aa, 09.ab, 09.ad, 09.af 7 controls provide indirect support: 01.q, 01.s, 01.t, 01.u, 06.e, 06.i, 11.a Page 14 Page 14

Prego it s in there! https://www.hitrustcentral.net/news_repository/blog/comparingthecsfisoiec27001andnistsp80053~1 Page 15 Page 15

But what about NIST? NIST SP 800-53 r4 moderate-level baseline All controls All enhancements Requirements tailored/harmonized for healthcare Reasonable and appropriate Adequate protection Mappings are similar to HIPAA Direct mappings with relevant language Indirect or supportive mappings with relevant language Mappings are consistent with NIST mappings to ISO/IEC 2001:2005 Page 16 Page 16

Prego it s in there! https://www.hitrustcentral.net/news_repository/blog/comparingthecsfisoiec27001andnistsp80053~1 Page 17 Page 17

But what about the other NIST? The NIST Cybersecurity Framework provides structure for sectorlevel cybersecurity frameworks and organizational-level programs HITRUST provides a healthcare-specific implementation of the NIST framework that addresses a broad spectrum of information security risk (not just cybersecurity) CSF controls mapped to 100% of the NIST cybersecurity subcategories (w/ language updates) 2014 CSF v6.1 Page 18 Page 18

Dr. Bryan S. Cline, CISSP-ISSEP, CISM, CISA, CCSFP, HCISPP HITRUST Advisor Bryan.Cline@HITRUSTalliance.net