LogRhythm and HIPAA Compliance



Similar documents
WHITEPAPER Complying with HIPAA LogRhythm and HIPAA Compliance

LogRhythm and NERC CIP Compliance

LogRhythm and PCI Compliance

Automation Suite for NIST Cyber Security Framework

HIPAA and HITECH Compliance for Cloud Applications

The Impact of HIPAA and HITECH

SAMPLE BUSINESS ASSOCIATE AGREEMENT

Automation Suite for. 201 CMR Compliance

Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH)

Nationwide Review of CMS s HIPAA Oversight. Brian C. Johnson, CPA, CISA. Wednesday, January 19, 2011

HIPAA Business Associate Agreement

BUSINESS ASSOCIATE AGREEMENT ( BAA )

COMPLIANCE ALERT 10-12

HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics

STATE OF NEVADA DEPARTMENT OF HEALTH AND HUMAN SERVICES BUSINESS ASSOCIATE ADDENDUM

Unified Security Anywhere HIPAA COMPLIANCE ACHIEVING HIPAA COMPLIANCE WITH MASERGY PROFESSIONAL SERVICES

North American Electric Reliability Corporation: Critical Infrastructure Protection, Version 5 (NERC-CIP V5)

SECURITY RISK ASSESSMENT SUMMARY

SAMPLE BUSINESS ASSOCIATE AGREEMENT

BUSINESS ASSOCIATE AGREEMENT

Sarbanes-Oxley Compliance for Cloud Applications

Business Associate Agreement

Adopt and implement privacy procedures, train employees on requirements, and designate a responsible party for adopting and following procedures

MaxMD 2200 Fletcher Ave. 5 th Floor Fort Lee, NJ (201) support@max.md Page 1of 10

BUSINESS ASSOCIATE AGREEMENT

HIPAA Omnibus Rule Overview. Presented by: Crystal Stanton MicroMD Marketing Communication Specialist

BUSINESS ASSOCIATE AGREEMENT. Business Associate. Business Associate shall mean.

HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT (HIPAA) TERMS AND CONDITIONS FOR BUSINESS ASSOCIATES

Data Security and Integrity of e-phi. MLCHC Annual Clinical Conference Worcester, MA Wednesday, November 12, :15pm 3:30pm

HIGH-RISK SECURITY VULNERABILITIES IDENTIFIED DURING REVIEWS OF INFORMATION TECHNOLOGY GENERAL CONTROLS

ARRA HITECH Stimulus HIPAA Security Compliance Reporter. White Paper

HIPAA Security Alert

Exhibit 2. Business Associate Addendum

BUSINESS ASSOCIATE AGREEMENT

Compliance Management, made easy

BUSINESS ASSOCIATE AGREEMENT

New HIPAA Breach Notification Rule: Know Your Responsibilities. Loudoun Medical Group Spring 2010

Medical Privacy Version Standard. Business Associate Agreement. 1. Definitions

Understanding HIPAA Privacy and Security Helping Your Practice Select a HIPAA- Compliant IT Provider A White Paper by CMIT Solutions

PCI Compliance for Cloud Applications

HIPAA Business Associate Contract. Definitions

Heather L. Hughes, J.D. HIPAA Privacy Officer U.S. Legal Support, Inc.

VMware vcloud Air HIPAA Matrix

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)

Disclaimer: Template Business Associate Agreement (45 C.F.R )

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

HIPAA/HITECH PRIVACY & SECURITY CHECKLIST SELF ASSESSMENT INSTRUCTIONS

HIPAA BUSINESS ASSOCIATE AGREEMENT

HIPAA Omnibus Rule Practice Impact. Kristen Heffernan MicroMD Director of Prod Mgt and Marketing

Security Information Lifecycle

White Paper Achieving GLBA Compliance through Security Information Management. White Paper / GLBA

H I P AA B U S I N E S S AS S O C I ATE AGREEMENT

BUSINESS ASSOCIATE AGREEMENT Tribal Contract

HIPAA Compliance for Students

Solution Brief for ISO 27002: 2013 Audit Standard ISO Publication Date: Feb 6, EventTracker 8815 Centre Park Drive, Columbia MD 21045

HIPAA PRIVACY AND SECURITY RULES BUSINESS ASSOCIATE AGREEMENT BETWEEN. Stewart C. Miller & Co., Inc. (Business Associate) AND

M E M O R A N D U M. Definitions

Louisiana State University System

AVE MARIA UNIVERSITY HIPAA PRIVACY NOTICE

BEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO

EXHIBIT C BUSINESS ASSOCIATE AGREEMENT

Healthcare Compliance Solutions

White Paper THE HIPAA FINAL OMNIBUS RULE: NEW CHANGES IMPACTING BUSINESS ASSOCIATES

Iowa Health Information Network (IHIN) Security Incident Response Plan

Health Insurance Portability and Accountability Act Enterprise Compliance Auditing & Reporting ECAR for HIPAA Technical Product Overview Whitepaper

HIPAA and the HITECH Act Privacy and Security of Health Information in 2009

HIPAA Security Rule Compliance

HIPAA BUSINESS ASSOCIATE AGREEMENT

Data Management Policies. Sage ERP Online

FairWarning Mapping to PCI DSS 3.0, Requirement 10

FACT SHEET: Ransomware and HIPAA

Please print the attached document, sign and return to or contact Erica Van Treese, Account Manager, Provider Relations &

The Institute of Professional Practice, Inc. Business Associate Agreement

Infinedi HIPAA Business Associate Agreement RECITALS SAMPLE

University Healthcare Physicians Compliance and Privacy Policy

HIPAA Security Checklist

HIPAA Security COMPLIANCE Checklist For Employers

This form may not be modified without prior approval from the Department of Justice.

A How-To Guide for Updating HIPAA Policies & Procedures to Align with ARRA Health Care Provider Edition Version 1

HIPAA BUSINESS ASSOCIATE AGREEMENT

SaaS. Business Associate Agreement

University of Colorado at Denver and Health Sciences Center HIPAA Policy. Policy: 9.2 Latest Revision: 04/17/2005 Security Incidents Page: 1 of 9

Use & Disclosure of Protected Health Information by Business Associates

HIPAA Security Education. Updated May 2016

FINAL May Guideline on Security Systems for Safeguarding Customer Information

NETWORK AND AIS AUDIT, LOGGING, AND MONITORING POLICY OCIO TABLE OF CONTENTS

CHIS, Inc. Privacy General Guidelines

Transcription:

LogRhythm and HIPAA Compliance The Department of Health and Human Services (HHS) enacted the Health Insurance Portability and Accountability Act of 1996 (HIPAA) to ensure that personal information stored, accessed, or processed adheres to a set of guidelines or security rules. These rules outline security measures that should be implemented to adequately secure all electronic protected health information (EPHI). The Secretary of Health and Human Services enforces this law. Non-compliance can lead to civil monetary penalties and public distrust. The collection, management, and analysis of log data is integral to meeting many HIPAA requirements. The use of LogRhythm directly meets some requirements and decreases the cost of complying with others. IT environments consist of heterogeneous devices, systems, and applications all reporting log data. Millions of individual log entries can be generated daily if not hourly. The task of organizing this information can be overwhelming in itself. The additional requirements of analyzing and reporting on log data render manual processes or homegrown remedies inadequate and costly. LogRhythm can help. Log collection, archive, and recovery is fully automated across the entire IT infrastructure. LogRhythm automatically performs the first level of log analysis. Log data is categorized, identified, and normalized for easy analysis and reporting. LogRhythm s powerful alerting capability automatically identifies the most critical issues and notifies relevant personnel. With the click of a mouse, LogRhythm s out-of-the box HIPAA reporting packages ensure you meet your reporting requirements. LogRhythm Report Center Screenshot The National Institute of Standards and Technology (NIST) Special Publication 800-66 provides guidance for meeting HIPAA Standards. The remainder of this paper lists the applicable standards LogRhythm can help address. For each standard, an explanation of how LogRhythm supports compliance is provided. Learn how LogRhythm s comprehensive log management and analysis solution can help your organization meet or exceed HIPAA regulatory requirements. Copyright 2008 LogRhythm, Inc. All Rights Reserved Page 1 of 6

The table below outlines each HIPAA Standard and associated Security Rule that LogRhythm helps to address. The s were taken directly from NIST Special Publication 800-66 titled An Introductory Resource Guide for Implementing the HIPAA Security Rule. These columns briefly describe the key activities and descriptions that are necessary to reach compliance. The column describes the capabilities LogRhythm provides that help a company achieve compliance. In some cases LogRhythm can be used to directly meet the compliance requirement, in others, LogRhythm helps verify the compliance requirement is met and/or reduces the cost of meeting the requirement. AS Administrative Safeguards 4.1 Security Management Process 164.308(a)(1) HIPAA Standard: Implement policies and procedures to prevent, detect, contain, and correct security violations. 7. Develop and Deploy the Information System Activity Review Process 8. Develop Appropriate Standard operating procedures 9. Implement the Information System Activity Review and Audit Process Implement procedures to regularly review records of information system activity, such as audit logs, access reports, and security incident tracking reports. Determine the types of audit trail data and monitoring procedures that will be needed to derive exception reports. Activate the necessary review process and begin auditing and logging activity LogRhythm provides centralized monitoring, analysis, and reporting of audit activity across the entire IT infrastructure. LogRhythm automates the process of identifying high-risk activity and prioritizes based on asset risk. High-risk activity can be monitored in real-time or alerted on. LogRhythm reports provide easy and standard review of inappropriate, unusual, and suspicious activity. Audit Failures by User Audit Failures by Host Suspicious Activity by User Suspicious Activity by Host Top Suspicious Users Top Targeted Hosts Top Targeted Applications LogRhythm collects and analyzes log data from operating systems, applications, and databases. This includes logs from intrusion detection/prevention systems, anti-virus systems, firewalls, and other security devices. All log data is normalized and centrally stored and secured for easy exception-based reporting. LogRhythm can correlate activity across user, origin host, impacted host, application and more. LogRhythm reports provide easy and standard review of inappropriate, unusual, and suspicious activity. Audit Failures by User Audit Failures by Host Suspicious Activity by User Suspicious Activity by Host Top Suspicious Users Top Targeted Hosts Top Targeted Applications LogRhythm s Personal Dashboard provides customized real-time monitoring of event activity and alerts. LogRhythm s Investigator provides deep forensic analysis of intrusion related activity. LogRhythm s integrated knowledge base provides information and references useful in responding to and resolving intrusions. Copyright 2008 LogRhythm, Inc. All Rights Reserved Page 2 of 6

Administrative Safeguards AS 4.6 Security Incident Procedures ( 164.308(a)(6)) HIPAA Standard: Implement policies and procedures to address security incidents. Gain an understanding as to what constitutes a true security incident. Under the HIPAA Security Rule a security incident is the attempted or successful unauthorized access, use, disclosure, modification, or destruction of information or interference with system operations in an information system. (45 CFR 164.304) Determine how the organization will respond to a security incident. 1. Determine Goals of Incident Response 3. Develop and Implement Procedures to Respond to and Report Security Incidents Establish a reporting mechanism and a process to coordinate responses to the security incident. Provide direct technical assistance, advise vendors to address product-related problems, and provide liaisons to legal and criminal investigative groups as needed. Identify and respond to suspected or known security incidents; mitigate, to the extent practicable, harmful effects of security incidents that are known to the covered entity; and document security incidents and their outcomes. LogRhythm s alerting capability can detect and notify individuals of activity that may constitute and incident. LogRhythm s analysis capabilities provide quick & easy analysis of activity to determine root cause and impact. LogRhythm s notification capabilities can route alerts to the appropriate individual based on group membership or relationship to the impacted system. LogRhythm reports provide summary and detail level reporting of incident based alerts. LogRhythm s Investigator and reporting capabilities facilitate the documentation efforts for incident response procedures. LogRhythm s integrated knowledge base provides information useful in responding to and resolving the incident. Document incident response procedures that can provide a single point of reference to guide the day-to-day operations of the incident response team. Review incident response procedures with staff with roles and responsibilities related to incident response, solicit suggestions for improvements, and make changes to reflect input if reasonable and appropriate. Copyright 2008 LogRhythm, Inc. All Rights Reserved Page 3 of 6

TS Technical Safeguards 4.14 Access Control ( 164.312(a)(1)) HIPAA Standard: Implement technical policies and procedures for electronic information systems that maintain electronic protected health information to allow access only to those persons or software programs that have been granted access rights. Enforce policy and procedures as a matter of ongoing operations. 6. Review and Update User Access Determine if any changes are needed for access control mechanisms. Establish procedures for updating access when users require the following: -Initial access. -Increased access. -Access to different systems or applications than those they currently have. LogRhythm reports provide easy review of permissions granted to ensure access rights have been terminated and/or appropriately modified. Access Granted/Revoked by User Access Granted/Revoked by Host Access Granted/Revoked by Application 9. Terminate Access if it is No Longer Required Ensure access to EPHI is terminated if the access is no longer authorized. LogRhythm reports provide easy review of terminated personnel to ensure access rights have been removed. LogRhythm alerts can detect the use of accounts that should have been terminated. Disabled/Removed Account Summary Disabled/Removed Accounts by Host Disabled/Removed Accounts by Application Copyright 2008 LogRhythm, Inc. All Rights Reserved Page 4 of 6

TS Technical Safeguards 4.15 Audit Controls ( 164.312(b)) HIPAA Standard: Implement hardware, software, and/or procedural mechanisms that record and examine activity in information systems that contain or use electronic protected health information. 4. Develop Appropriate Standard Operating Procedures 5. Implement the Audit/System Activity Review Process. Determine the types of audit trail data and monitoring procedures that will be needed to derive exception reports. Activate the necessary audit system. Begin logging and auditing procedures. LogRhythm can collect logs from intrusion detection/prevention systems, anti-virus systems, firewalls, and other security devices. LogRhythm provides central analysis and monitoring of intrusion related activity across the IT infrastructure. LogRhythm can correlate activity across user, origin host, impacted host, application and more. LogRhythm can be configured to identify known bad hosts and networks. LogRhythm s Personal Dashboard provides customized real-time monitoring of event activity and alerts. LogRhythm s Investigator provides deep forensic analysis of intrusion related activity. LogRhythm s integrated knowledge base provides information and references useful in responding to and resolving intrusions. LogRhythm reports enable easy and standard review of exceptions. Access Granted/Revoked by User Access Granted/Revoked by Object Successful/Failed File Access by User Successful/Failed Host Access by User Successful/Failed Application Access by User Copyright 2008 LogRhythm, Inc. All Rights Reserved Page 5 of 6

TS Technical Safeguards 4.16 Integrity ( 164.312(c)(1)) HIPAA Standard: Implement policies and procedures to protect electronic protected health information from improper alteration or destruction. 1. Identify All Users Who Have Been Authorized to Access EPHI. Identify all approved users with the ability to alter or destroy data, if reasonable and appropriate. Address this Key Activity in conjunction with the identification of unauthorized sources in Key Activity 2, below LogRhythm collects all access activity and changes to access controls. LogRhythm reports provide easy and independent review of access control settings and enforcement. Access Granted/Revoked by User Access Granted/Revoked by Host Successful/Failed File Access by User Successful/Failed Host Access by User Successful/Failed Application Access by User 4. Implement Procedures to Address These Requirements Identify and implement methods that will be used to protect the information from modification. Identify and implement tools and techniques to be developed or procured that support the assurance of integrity. LogRhythm s file integrity monitoring capability can be used to detect, report and/or alert on the following changes to the file system: Additions Modifications Deletions Permissions This capability can be used to detect unauthorized alteration and destruction of information. LogRhythm Corporate Headquarters EMEA Headquarters LogRhythm Inc. LogRhythm Inc. 3195 Sterling Circle, Suite 100 Siena Court, The Broadway Boulder CO., 80301 Maidenhead, Berkshire SL6 1NJ United Kingdom Phone (303) 413-8745 Phone +44 (0) 1628 509 070 Fax (303) 413-8791 Fax +44 (0) 1628 509 100 Copyright 2008 LogRhythm, Inc. All Rights Reserved Page 6 of 6