Managing Security and Privacy Risk in Healthcare Applications



Similar documents
Cyber Security Risk Management: A New and Holistic Approach

Cloud Computing Technologies Achieving Greater Trustworthiness and Resilience

Security Risk Management For Health IT Systems and Networks

Managing Security Risk In a World of Complex Systems and IT Infrastructures

FISMA Implementation Project

FREQUENTLY ASKED QUESTIONS

Security Controls Assessment for Federal Information Systems

Compliance Risk Management IT Governance Assurance

HHS Information System Security Controls Catalog V 1.0

Dr. Ron Ross National Institute of Standards and Technology

Information Security for Managers

Big Data, Big Risk, Big Rewards. Hussein Syed

I. U.S. Government Privacy Laws

The Protection Mission a constant endeavor

Guide for Applying the Risk Management Framework to Federal Information Systems

POSTAL REGULATORY COMMISSION

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Privacy Impact Assessment (PIA) for the. Certification & Accreditation (C&A) Web (SBU)

NIST Cybersecurity Initiatives. ARC World Industry Forum 2014

IT Security Management Risk Analysis and Controls

HIGH-RISK SECURITY VULNERABILITIES IDENTIFIED DURING REVIEWS OF INFORMATION TECHNOLOGY GENERAL CONTROLS

Security Control Standards Catalog

PRESENTATION TO THE UNIVERSITY SYSTEM OF MARYLAND S BOARD OF REGENTS

Office of Inspector General

Security and Privacy Controls for Federal Information Systems and Organizations

DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Threat and Vulnerability Management V1.0 April 21, 2014

Guide for Security-Focused Configuration Management of Information Systems

Information Security Program Management Standard

Information Technology Security Training Requirements APPENDIX A. Appendix A Learning Continuum A-1

CMS POLICY FOR THE INFORMATION SECURITY PROGRAM

Get Confidence in Mission Security with IV&V Information Assurance

NATIONAL CREDIT UNION ADMINISTRATION OFFICE OF INSPECTOR GENERAL

WRITTEN INFORMATION SECURITY PROGRAM (WISP) ACME Consulting Services, Inc.

Security Controls What Works. Southside Virginia Community College: Security Awareness

Unified Security Anywhere HIPAA COMPLIANCE ACHIEVING HIPAA COMPLIANCE WITH MASERGY PROFESSIONAL SERVICES

Selecting RMF Controls for National Security Systems

U.S. ELECTION ASSISTANCE COMMISSION OFFICE OF INSPECTOR GENERAL

Best Practices For Department Server and Enterprise System Checklist

White Paper. Information Security -- Network Assessment

FISH AND WILDLIFE SERVICE INFORMATION RESOURCES MANAGEMENT. Chapter 7 Information Technology (IT) Security Program 270 FW 7 TABLE OF CONTENTS

Security Control Standard

VA Office of Inspector General

Risk Management Guide for Information Technology Systems. NIST SP Overview

FACT SHEET: Ransomware and HIPAA

VA Office of Inspector General

NIST Cyber Security Activities

DEPARTMENT OF VETERANS AFFAIRS VA HANDBOOK INCORPORATING SECURITY AND PRIVACY INTO THE SYSTEM DEVELOPMENT LIFE CYCLE

Standards for Security Categorization of Federal Information and Information Systems

HEALTH INSURANCE MARKETPLACES GENERALLY PROTECTED PERSONALLY IDENTIFIABLE INFORMATION BUT COULD IMPROVE CERTAIN INFORMATION SECURITY CONTROLS

Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance

Security Control Standard

Critical Controls for Cyber Security.

Guideline for Mapping Types of Information and Information Systems to Security Categorization Levels SP AP-2/03-1

SECURITY CONTROLS AND RISK MANAGEMENT FRAMEWORK

Appendix. Key Areas of Concern. i. Inadequate coverage of cybersecurity risk assessment exercises

Guide for the Security Certification and Accreditation of Federal Information Systems

SCAC Annual Conference. Cybersecurity Demystified

U.S. Office of Personnel Management. Actions to Strengthen Cybersecurity and Protect Critical IT Systems

Bellevue University Cybersecurity Programs & Courses

Reports on Computer Systems Technology

Supply Chain Risk Management Practices for Federal Information Systems and Organizations

Security Control Standard

A Wake-Up Call? Fight Back Against Cybercrime. Prepared for: Ricky Link Managing Director, Southwest Region May 15, 2014

Homeland Security Virtual Assistance Center

Audit Report. The Social Security Administration s Compliance with the Federal Information Security Management Act of 2002 for Fiscal Year 2013

Virginia Government Finance Officers Association Spring Conference May 28, Cloud Security 101

Cybersecurity. Cloud. and the. 4TH Annual NICE Workshop Navigating the National Cybersecurity Education InterState Highway September 2013

PROJECT BOEING SGS. Interim Technology Performance Report 1. Company Name: The Boeing Company. Contract ID: DE-OE

Enterprise Security Tactical Plan

THE 411 ON CYBERSECURITY, INFORMATION SHARING AND PRIVACY

Basics of Internet Security

An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule

An Overview of Information Security Frameworks. Presented to TIF September 25, 2013

APHIS INTERNET USE AND SECURITY POLICY

Information Security for IT Administrators

NASA OFFICE OF INSPECTOR GENERAL

Fiscal Year 2014 Federal Information Security Management Act Report: Status of EPA s Computer Security Program

Health Insurance Portability and Accountability Act Enterprise Compliance Auditing & Reporting ECAR for HIPAA Technical Product Overview Whitepaper

I N T E L L I G E N C E A S S E S S M E N T

SECURITY CATEGORIZATION AND CONTROL SELECTION FOR NATIONAL SECURITY SYSTEMS

Discussion Draft of the Preliminary Cybersecurity Framework Illustrative Examples

Minimum Acceptable Risk Standards for Exchanges Exchange Reference Architecture Supplement

TASK TDSP Web Portal Project Cyber Security Standards Best Practices

DEPARTMENT OF THE INTERIOR. Privacy Impact Assessment Guide. Departmental Privacy Office Office of the Chief Information Officer

OFFICE OF THE SECRETARY OF DEFENSE 1700 DEFENSE PENTAGON WASHINGTON, DC

HIPAA Compliance Guide

Transcription:

Managing Security and Privacy Risk in Healthcare Applications 5 th Annual OCR / NIST HIPAA Security Rule Conference June 6, 2012 Dr. Ron Ross Computer Security Division Information Technology Laboratory NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 1

The Perfect Storm Explosive growth and aggressive use of information technology. Proliferation of information systems and networks with virtually unlimited connectivity. Increasing sophistication of threat including exponential growth rate in malware (malicious code). Resulting in an increasing number of penetrations of information systems in the public and private sectors potentially affecting security and privacy NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 2

The Threat Situation Continuing serious cyber attacks on public and private sector information systems targeting key operations, assets, and individuals Attacks are organized, disciplined, aggressive, and well resourced; many are extremely sophisticated. Adversaries are nation states, terrorist groups, criminals, hackers, and individuals or groups with hostile intentions. Effective deployment of malware causing significant exfiltration of sensitive information (e.g., intellectual property). Potential for disruption of critical systems and services. NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 3

Unconventional Threats Affecting Security and Privacy Connectivity Complexity Culture NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 4

Mainstreaming Security and Privacy Information security and privacy requirements must be considered first order requirements and are critical to mission and business success. An effective organization-wide information security and privacy programs help to ensure that security and privacy considerations are specifically addressed in the enterprise architecture for the organization and are integrated early into the system development life cycle. Use Federal Segment Architecture Methodology and FEA Security and Privacy Profile for implementation. NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 5

Mutually Supporting Objectives Enterprise Architecture Standardization, consolidation, optimization. Information Security Confidentiality, integrity, and availability of information processed, stored, and transmitted by information systems. Privacy Confidentiality and integrity of personally identifiable information; collection of information (data minimization); use of information (sharing and disclosure concerns). Requires a disciplined, structured process that takes a holistic, organization-wide view NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 6

Information security and privacy, traditional societal values, are at greater risk today due to the ever increasing size of our digital footprint NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 7

Enterprise-Wide Risk Management Multi-tiered Risk Management Approach Implemented by the Risk Executive Function Enterprise Architecture and SDLC Focus Information Security Architecture Flexible and Agile Implementation Threat Aware TIER 1 Organization (Governance) TIER 2 Mission / Business Process (Information and Information Flows) TIER 3 Information System (Environment of Operation) STRATEGIC RISK FOCUS TACTICAL RISK FOCUS NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 8

A new initiative to develop privacy controls for federal information systems and organizations NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 9

Privacy Control Families Families are based upon the Fair Information Practice Principles (FIPPs) Use them to build privacy into new or modified: Programs, research, pilots; Information systems; Technology (surveillance cameras, body imaging devices, data mining); and Any other business-related activity that involves personally identifiable information (PII). NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 10

Applying Privacy Control Families (1 of 2) Preliminary steps: Identify the types of PII involved; Identify the legal framework that applies; (Statutes, regulations, and policies that must be applied) Map the data flows. Law enforcement and intelligence programs and systems, particularly those that are classified, will require modifications in light of their legal and operational requirements. NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 11

Applying Privacy Control Families (2 of 2) Families are interrelated -- action taken in one family likely will affect the implementation of another. Families are not in any particular order and should be considered individually and as a whole. Families are iterative and must be revisited to determine the impact of changes to any particular family. Families must be analyzed and applied to each agency s distinct mission, operation, and legal authorities and obligations. NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 12

Fair Information Practice Principles Transparency Individual Participation and Redress Purpose Specification Data Minimization and Retention Use Specification Data Quality and Integrity Security Accountability and Auditing NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 13

Privacy Control Families Authority and Purpose (AP) Accountability, Audit, and Risk Management (AR) Data Quality and Integrity (DI) Data Minimization and Retention (DM) Individual Participation and Redress (IP) Security (SE) Transparency (TR) Use Limitation (UL) NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 14

Risk Management Framework Starting Point CATEGORIZE Information System MONITOR Privacy Controls SELECT Privacy Controls Security/Privacy Life Cycle AUTHORIZE Information System IMPLEMENT Privacy Controls ASSESS Privacy Controls NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 15

What do we achieve? NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 16

Benefits Well defined privacy controls that help demonstrate compliance with federal legislation and policies. Measurable and enforceable privacy requirements. Closer linkage to enterprise cyber security programs to provide a solid foundation for privacy. Enterprise-wide defense-in-depth for security and privacy. Security and privacy requirements traceability. NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 17

Defense-in-Depth Links in the Security and Privacy Chain: Security and Privacy Controls Risk assessment Security planning, policies, procedures Configuration management and control Contingency planning Incident response planning Security awareness and training Security in acquisitions Physical and personnel security Security assessments and authorization Continuous monitoring Privacy protection Access control mechanisms Identification & authentication mechanisms (Biometrics, tokens, passwords) Audit mechanisms Encryption mechanisms Boundary and network protection devices (Firewalls, guards, routers, gateways) Intrusion protection/detection systems Security configuration settings Anti-viral, anti-spyware, anti-spam software Smart cards Adversaries attack the weakest link where is yours? NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 18

Defense-in-Breadth RISK EXECUTIVE FUNCTION Organization-wide Risk Governance and Oversight Strategic Risk Management Focus Tactical Risk Management Focus Ongoing Authorization Decisions Security/Privacy Plan Assessment Report Plan of Action and Milestones Core Missions / Business Processes Security Requirements Policy Guidance INFORMATION SYSTEM System-specific Controls Hybrid Controls RISK MANAGEMENT FRAMEWORK (RMF) INFORMATION SYSTEM System-specific Controls Hybrid Controls COMMON CONTROLS Security Controls Inherited by Organizational Information Systems New Privacy Controls Security/Privacy Plan Assessment Report Plan of Action and Milestones Ongoing Authorization Decisions Top Level Risk Management Strategy Informs Operational Elements Enterprise-Wide Security/Privacy Plan Assessment Report Plan of Action and Milestones Ongoing Authorization Decisions NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 19

Requirements Traceability 30,000 FT Legislation, Presidential Directives, OMB Policies High Level, Generalized, Information Security and Privacy Requirements 15,000 FT Federal Information Processing Standards FIPS 200: Minimum Information Security Requirements FIPS 199: Security Categorization 5,000 FT Security and Privacy Controls NIST Special Publication 800-53 Ground Zero Information Systems and Environments of Operation Hardware, Firmware, Software, Facilities NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 20

Integration of Privacy Requirements Core Risk Management Publications NIST Special Publication 800-53, Revision 3 Recommended Security Controls for Federal Information Systems and Organizations SP 800-53, Revision 4 Appendix J: Privacy Control Catalog NIST Special Publication 800-53A, Revision 1 Guide for Assessing the Security Controls in Federal Information Systems and Organizations: Building Effective Assessment Plans SP 800-53A, Revision 2 Privacy Assessment Procedures NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 21

Important Take Aways Developing new privacy controls in NIST SP 800-53. Creating stronger relationship between security and privacy groups within organizations. Providing a standardized approach for specifying privacy requirements within organizations. Building on strong foundation of cyber security to achieve a more comprehensive privacy program within organizations. NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 22

Contact Information Project Leader 100 Bureau Drive Mailstop 8930 Gaithersburg, MD USA 20899-8930 Administrative Support Dr. Ron Ross Peggy Himes (301) 975-5390 (301) 975-2489 ron.ross@nist.gov peggy.himes@nist.gov Senior Information Security Researchers and Technical Support Marianne Swanson Kelley Dempsey (301) 975-3293 (301) 975-2827 marianne.swanson@nist.gov kelley.dempsey@nist.gov Pat Toth Arnold Johnson (301) 975-5140 (301) 975-3247 patricia.toth@nist.gov arnold.johnson@nist.gov Web: csrc.nist.gov/sec-cert Comments: sec-cert@nist.gov NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY 23