WHITEPAPER Complying with HIPAA LogRhythm and HIPAA Compliance



Similar documents
LogRhythm and HIPAA Compliance

LogRhythm and NERC CIP Compliance

LogRhythm and PCI Compliance

Automation Suite for NIST Cyber Security Framework

Automation Suite for. 201 CMR Compliance

HIPAA and HITECH Compliance for Cloud Applications

Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH)

SAMPLE BUSINESS ASSOCIATE AGREEMENT

HIPAA Business Associate Agreement

The Impact of HIPAA and HITECH

Nationwide Review of CMS s HIPAA Oversight. Brian C. Johnson, CPA, CISA. Wednesday, January 19, 2011

North American Electric Reliability Corporation: Critical Infrastructure Protection, Version 5 (NERC-CIP V5)

COMPLIANCE ALERT 10-12

HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics

STATE OF NEVADA DEPARTMENT OF HEALTH AND HUMAN SERVICES BUSINESS ASSOCIATE ADDENDUM

SECURITY RISK ASSESSMENT SUMMARY

BUSINESS ASSOCIATE AGREEMENT ( BAA )

Sarbanes-Oxley Compliance for Cloud Applications

SAMPLE BUSINESS ASSOCIATE AGREEMENT

Adopt and implement privacy procedures, train employees on requirements, and designate a responsible party for adopting and following procedures

BUSINESS ASSOCIATE AGREEMENT

HIPAA Omnibus Rule Overview. Presented by: Crystal Stanton MicroMD Marketing Communication Specialist

BUSINESS ASSOCIATE AGREEMENT. Business Associate. Business Associate shall mean.

HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT (HIPAA) TERMS AND CONDITIONS FOR BUSINESS ASSOCIATES

Data Security and Integrity of e-phi. MLCHC Annual Clinical Conference Worcester, MA Wednesday, November 12, :15pm 3:30pm

Unified Security Anywhere HIPAA COMPLIANCE ACHIEVING HIPAA COMPLIANCE WITH MASERGY PROFESSIONAL SERVICES

HIGH-RISK SECURITY VULNERABILITIES IDENTIFIED DURING REVIEWS OF INFORMATION TECHNOLOGY GENERAL CONTROLS

ARRA HITECH Stimulus HIPAA Security Compliance Reporter. White Paper

HIPAA Security Alert

Exhibit 2. Business Associate Addendum

BUSINESS ASSOCIATE AGREEMENT

BUSINESS ASSOCIATE AGREEMENT

BUSINESS ASSOCIATE AGREEMENT

New HIPAA Breach Notification Rule: Know Your Responsibilities. Loudoun Medical Group Spring 2010

Medical Privacy Version Standard. Business Associate Agreement. 1. Definitions

Understanding HIPAA Privacy and Security Helping Your Practice Select a HIPAA- Compliant IT Provider A White Paper by CMIT Solutions

PCI Compliance for Cloud Applications

HIPAA Business Associate Contract. Definitions

Heather L. Hughes, J.D. HIPAA Privacy Officer U.S. Legal Support, Inc.

Health Insurance Portability and Accountability Act Enterprise Compliance Auditing & Reporting ECAR for HIPAA Technical Product Overview Whitepaper

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

HIPAA/HITECH PRIVACY & SECURITY CHECKLIST SELF ASSESSMENT INSTRUCTIONS

HIPAA Omnibus Rule Practice Impact. Kristen Heffernan MicroMD Director of Prod Mgt and Marketing

Business Associate Agreement

HIPAA Compliance for Students

MaxMD 2200 Fletcher Ave. 5 th Floor Fort Lee, NJ (201) support@max.md Page 1of 10

Solution Brief for ISO 27002: 2013 Audit Standard ISO Publication Date: Feb 6, EventTracker 8815 Centre Park Drive, Columbia MD 21045

M E M O R A N D U M. Definitions

Louisiana State University System

VMware vcloud Air HIPAA Matrix

Compliance Management, made easy

AVE MARIA UNIVERSITY HIPAA PRIVACY NOTICE

BEFORE THE BOARD OF COUNTY COMMISSIONERS FOR MULTNOMAH COUNTY, OREGON RESOLUTION NO

EXHIBIT C BUSINESS ASSOCIATE AGREEMENT

Iowa Health Information Network (IHIN) Security Incident Response Plan

White Paper THE HIPAA FINAL OMNIBUS RULE: NEW CHANGES IMPACTING BUSINESS ASSOCIATES

Disclaimer: Template Business Associate Agreement (45 C.F.R )

HIPAA Security Rule Compliance

HIPAA BUSINESS ASSOCIATE AGREEMENT

Data Management Policies. Sage ERP Online

Security Information Lifecycle

FACT SHEET: Ransomware and HIPAA

White Paper Achieving GLBA Compliance through Security Information Management. White Paper / GLBA

Please print the attached document, sign and return to or contact Erica Van Treese, Account Manager, Provider Relations &

H I P AA B U S I N E S S AS S O C I ATE AGREEMENT

The Institute of Professional Practice, Inc. Business Associate Agreement

HIPAA BUSINESS ASSOCIATE AGREEMENT

HIPAA Security COMPLIANCE Checklist For Employers

HIPAA Security Checklist

A How-To Guide for Updating HIPAA Policies & Procedures to Align with ARRA Health Care Provider Edition Version 1

SaaS. Business Associate Agreement

BUSINESS ASSOCIATE AGREEMENT Tribal Contract

University of Colorado at Denver and Health Sciences Center HIPAA Policy. Policy: 9.2 Latest Revision: 04/17/2005 Security Incidents Page: 1 of 9

PCI DSS Reporting WHITEPAPER

Use & Disclosure of Protected Health Information by Business Associates

HIPAA Security Education. Updated May 2016

FINAL May Guideline on Security Systems for Safeguarding Customer Information

NETWORK AND AIS AUDIT, LOGGING, AND MONITORING POLICY OCIO TABLE OF CONTENTS

CHIS, Inc. Privacy General Guidelines

HIPAA and the HITECH Act Privacy and Security of Health Information in 2009

Healthcare Compliance Solutions

HIPAA BUSINESS ASSOCIATE AGREEMENT

SITA Security Requirements for Third-Party Service Providers that Access, Process, Store or Transmit Data on Behalf of SITA

Attachment A. Identification of Risks/Cybersecurity Governance

12/19/2014. HIPAA More Important Than You Realize. Administrative Simplification Privacy Rule Security Rule

Using NetIQ Security and Administration Products to Ensure HIPAA Compliance March 25, Contents

Transcription:

WHITEPAPER Complying with HIPAA LogRhythm and HIPAA Compliance

Complying With HIPAA The Department of Health and Human Services (HHS) enacted the Health Insurance Portability and Accountability Act of 1996 (HIPAA) to ensure that personal information stored, accessed, or processed adheres to a set of guidelines or security rules. These rules outline security measures that should be implemented to adequately secure all electronic protected health information (EPHI). The Secretary of Health and Human Services enforces this law. Non-compliance can lead to civil monetary penalties and public distrust. The collection, management, and analysis of log data is integral to meeting many HIPAA requirements. The use of LogRhythm directly meets some requirements and decreases the cost of complying with others. IT environments consist of heterogeneous devices, systems, and applications all reporting log data. Millions of individual log entries can be generated daily if not hourly. The task of organizing this information can be overwhelming in itself. The additional requirements of analyzing and reporting on log data render manual processes or homegrown remedies inadequate and costly. and notifies relevant personnel. With the click of a mouse, LogRhythm s out-of-the box HIPAA reporting packages ensure you meet your reporting requirements. The National Institute of Standards and Technology (NIST) Special Publication 800-66 provides guidance for meeting HIPAA Standards. The remainder of this paper lists the applicable standards LogRhythm can help address. For each standard, an explanation of how LogRhythm supports compliance is provided. Learn how LogRhythm s comprehensive log management and analysis solution can help your organization meet or exceed HIPAA regulatory requirements. LogRhythm can help. Log collection, archive, and recovery is fully automated across the entire IT infrastructure. LogRhythm automatically performs the first level of log analysis. Log data is categorized, identified, and normalized for easy analysis and reporting. LogRhythm s powerful alerting capability automatically identifies the most critical issues LogRhythm Report Center Screenshot PAGE 1

LogRhythm Compliance Support for HIPAA The table below outlines each HIPAA Standard and associated Security Rule that LogRhythm helps to address. The Compliance Requirements were taken directly from NIST Special Publication 800-66 titled An Introductory Resource Guide for Implementing the HIPAA Security Rule. These columns briefly describe the key activities and descriptions that are necessary to reach compliance. The column describes the capabilities LogRhythm provides that help a company achieve compliance. In some cases LogRhythm can be used to directly meet the compliance requirement, in others, LogRhythm helps verify the compliance requirement is met and/or reduces the cost of meeting the requirement. Administrative Safeguards 4.1 Security Management Process 164.308(a)(1) HIPAA Standard: Implement policies and procedures to prevent, detect, contain, and correct security violations. 7. Develop and Deploy the Information System Activity Review Process 8. Develop Appropriate Standard operating procedures 9. Implement the Information System Activity Review and Audit Process Implement procedures to regularly review records of information system activity, such as audit logs, access reports, and security incident tracking reports. Determine the types of audit trail data and monitoring procedures that will be needed to derive exception reports. Activate the necessary review process and begin auditing and logging activity. LogRhythm provides centralized monitoring, analysis, and reporting of audit activity across the entire IT infrastructure. LogRhythm automates the process of identifying high-risk activity and prioritizes based on asset risk. High-risk activity can be monitored in real-time or alerted on. LogRhythm reports provide easy and standard review of inappropriate, unusual, and suspicious activity. Audit Failures by User Audit Failures by Host Suspicious Activity by User Suspicious Activity by Host Top Suspicious Users Top Targeted Hosts Top Targeted Applications LogRhythm collects and analyzes log data from operating systems, applications, and databases. This includes logs from intrusion detection/prevention systems, anti-virus systems, firewalls, and other security devices. All log data is normalized and centrally stored and secured for easy exception-based reporting. LogRhythm can correlate activity across user, origin host, impacted host, application and more. LogRhythm reports provide easy and standard review of inappropriate, unusual, and suspicious activity. Audit Failures by User Audit Failures by Host Suspicious Activity by User Suspicious Activity by Host Top Suspicious Users Top Targeted Hosts Top Targeted Applications LogRhythm s Personal Dashboard provides customized real-time monitoring of event activity and alerts. LogRhythm s Investigator provides deep forensic analysis of intrusion related activity. LogRhythm s integrated knowledge base provides information and references useful in responding to and resolving intrusions. PAGE 2

Administrative Safeguards 4.6 Security Incident Procedures ( 164.308(a)(6)) HIPAA Standard: Implement policies and procedures to address security incidents. 1. Determine Goals of Incident Response 3. Develop and Implement Procedures to Respond to and Report Security Incidents Gain an understanding as to what constitutes a true security incident. Under the HIPAA Security Rule a security incident is the attempted or successful unauthorized access, use, disclosure, modification, or destruction of information or interference with system operations in an information system. (45 CFR 164.304) Determine how the organization will respond to a security incident. Establish a reporting mechanism and a process to coordinate responses to the security incident. Provide direct technical assistance, advise vendors to address product-related problems, and provide liaisons to legal and criminal investigative groups as needed. Identify and respond to suspected or known security incidents; mitigate, to the extent practicable, harmful effects of security incidents that are known to the covered entity; and document security incidents and their outcomes. Document incident response procedures that can provide a single point of reference to guide the day-to-day operations of the incident response team. Review incident response procedures with staff with roles and responsibilities related to incident response, solicit suggestions for improvements, and make changes to reflect input if reasonable and appropriate. LogRhythm s alerting capability can detect and notify individuals of activity that may constitute an incident. LogRhythm s analysis capabilities provide quick & easy analysis of activity to determine root cause and impact. LogRhythm s notification capabilities can route alerts to the appropriate individual based on group membership or relationship to the impacted system. LogRhythm reports provide summary and detail level reporting of incident based alerts. LogRhythm s Investigator and reporting capabilities facilitate the documentation efforts for incident response procedures. LogRhythm s integrated knowledge base provides information useful in responding to and resolving the incident. 4.14 Access Control ( 164.312(a)(1)) HIPAA Standard: Implement technical policies and procedures for electronic information systems that maintain electronic protected health information to allow access only to those persons or software programs that have been granted access rights. 6. Review and Update User Access 9. Terminate Access if it is No Longer Required Enforce policy and procedures as a matter of ongoing operations. Determine if any changes are needed for access control mechanisms. Establish procedures for updating access when users require the following: - Initial access. - Increased access. - Access to different systems or applications than those they currently have. Ensure access to EPHI is terminated if the access is no longer authorized. LogRhythm reports provide easy review of permissions granted to ensure access rights have been terminated and/or appropriately modified. Access Granted/Revoked by Host Access Granted/Revoked by Application LogRhythm reports provide easy review of terminated personnel to ensure access rights have been removed. LogRhythm alerts can detect the use of accounts that should have been terminated. Disabled/Removed Account Summary Disabled/Removed Accounts by Host Disabled/Removed Accounts by Application PAGE 3

4.15 Audit Controls ( 164.312(b)) HIPAA Standard: Implement hardware, software, and/or procedural mechanisms that record and examine activity in information systems that contain or use electronic protected health information. 4. Develop Appropriate Standard Operating Procedures 5. Implement the Audit/System Activity Review Process Determine the types of audit trail data and monitoring procedures that will be needed to derive exception reports. Activate the necessary audit system. Begin logging and auditing procedures. LogRhythm can collect logs from intrusion detection/prevention systems, anti-virus systems, firewalls, and other security devices. LogRhythm provides central analysis and monitoring of intrusion related activity across the IT infrastructure. LogRhythm can correlate activity across user, origin host, impacted host, application and more. LogRhythm can be configured to identify known bad hosts and networks. LogRhythm s Personal Dashboard provides customized real-time monitoring of event activity and alerts. LogRhythm s Investigator provides deep forensic analysis of intrusion related activity. LogRhythm s integrated knowledge base provides information and references useful in responding to and resolving intrusions. LogRhythm reports enable easy and standard review of exceptions. Access Granted/Revoked by Object Successful/Failed File Access by User Successful/Failed Host Access by User Successful/Failed Application Access by User 4.16 Integrity ( 164.312(c)(1)) HIPAA Standard: Implement policies and procedures to protect electronic protected health information from improper alteration or destruction. 1. Identify All Users Who Have Been Authorized to Access EPHI 4. Implement Procedures to Address These Requirements Identify all approved users with the ability to alter or destroy data, if reasonable and appropriate. Address this Key Activity in conjunction with the identification of unauthorized sources in Key Activity 2, below. Identify and implement methods that will be used to protect the information from modification. Identify and implement tools and techniques to be developed or procured that support the assurance of integrity. LogRhythm collects all access activity and changes to access controls. LogRhythm reports provide easy and independent review of access control settings and enforcement. Access Granted/Revoked by Object Successful/Failed File Access by User Successful/Failed Host Access by User Successful/Failed Application Access by User LogRhythm s file integrity monitoring capability can be used to detect, report and/or alert on the following changes to the file system: Additions Modifications Deletions Permissions This capability can be used to detect unauthorized alteration and destruction of information. INFO@LOGRHYTHM.COM PAGE 4 2014 LogRhythm Inc. Whitepaper - HIPAA Compliance - 7.2014