HIPAA: MANAGING ACCESS TO SYSTEMS STORING ephi WITH SECRET SERVER



Similar documents
CHIS, Inc. Privacy General Guidelines

Technical Safeguards is the third area of safeguard defined by the HIPAA Security Rule. The technical safeguards are intended to create policies and

How Managed File Transfer Addresses HIPAA Requirements for ephi

HIPAA Privacy & Security White Paper

itrust Medical Records System: Requirements for Technical Safeguards

HIPAA Security. 4 Security Standards: Technical Safeguards. Security Topics

HIPAA Security Alert

Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH)

HIPAA Compliance Guide

HIPAA Information Security Overview

WHITE PAPER. HIPPA Compliance and Secure Online Data Backup and Disaster Recovery

Healthcare Compliance Solutions

WHITE PAPER. HIPAA-Compliant Data Backup and Disaster Recovery

HIPAA Security Rule Compliance

Develop HIPAA-Compliant Mobile Apps with Verivo Akula

VMware vcloud Air HIPAA Matrix

Unified Security Anywhere HIPAA COMPLIANCE ACHIEVING HIPAA COMPLIANCE WITH MASERGY PROFESSIONAL SERVICES

Datto Compliance 101 1

WHITEPAPER XMEDIUSFAX CLOUD FOR HEALTHCARE AND HIPAA COMPLIANCE

MANAGED FILE TRANSFER: 10 STEPS TO HIPAA/HITECH COMPLIANCE

The Health Insurance Portability and Accountability Act - HIPAA - Using BeAnywhere on a HIPAA context

Overview of the HIPAA Security Rule

LogMeIn HIPAA Considerations

C.T. Hellmuth & Associates, Inc.

HIPAA. considerations with LogMeIn

Compliance and Industry Regulations

Data Security and Integrity of e-phi. MLCHC Annual Clinical Conference Worcester, MA Wednesday, November 12, :15pm 3:30pm

Complying with PCI Data Security

HIPAA COMPLIANCE AND DATA PROTECTION Page 1

HIPAA PRIVACY AND SECURITY AWARENESS

Five Ways to Improve Electronic Patient Record Handling for HIPAA/HITECH with Managed File Transfer

RAYSAFE S1 SECURITY WHITEPAPER VERSION B. RaySafe S1 SECURITY WHITEPAPER

Policies and Procedures Audit Checklist for HIPAA Privacy, Security, and Breach Notification

Ensuring HIPAA Compliance with Pros 4 Technology Online Backup and Archiving Services

HIPAA, PHI and . How to Ensure your and Other ephi are HIPAA Compliant.

WHITE PAPER. Support for the HIPAA Security Rule RadWhere 3.0

Procedure Title: TennDent HIPAA Security Awareness and Training

efolder White Paper: HIPAA Compliance

Secret Server Qualys Integration Guide

Pennsylvania Department of Public Welfare. Bureau of Information Systems OBSOLETE. Secure User Guide. Version 1.0.

White Paper. Support for the HIPAA Security Rule PowerScribe 360

HIPAA Compliance and Wireless Networks Cranite Systems, Inc. All Rights Reserved.

Securing the FOSS VistA Stack HIPAA Baseline Discussion. Jack L. Shaffer, Jr. Chief Operations Officer

M E M O R A N D U M. Definitions

HIPAA Compliance and Wireless Networks

My Docs Online HIPAA Compliance

Appendix 4-2: Sample HIPAA Security Risk Assessment For a Small Physician Practice

HIPAA COMPLIANCE AND

SECURELINK.COM COMPLIANCE AND INDUSTRY REGULATIONS

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

IBM Internet Security Systems. The IBM Internet Security Systems approach for Health Insurance Portability and Accountability Act compliance overview

FileCloud Security FAQ

HIPAA Audit Processes HIPAA Audit Processes. Erik Hafkey Rainer Waedlich

Ensuring HIPAA Compliance with AcclaimVault Online Backup and Archiving Services

HIPAA: Understanding The Omnibus Rule and Keeping Your Business Compliant

Ensuring HIPAA Compliance with Computer BYTES Online Backup and Archiving Services

HIPAA and HITECH Regulations

An Oracle White Paper December Leveraging Oracle Enterprise Single Sign-On Suite Plus to Achieve HIPAA Compliance

HIPAA Security COMPLIANCE Checklist For Employers

MySQL Security: Best Practices

HIPAA SECURITY RISK ASSESSMENT SMALL PHYSICIAN PRACTICE

The CIO s Guide to HIPAA Compliant Text Messaging

HIPAA and HITECH Compliance for Cloud Applications

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)

Please Read. Apgar & Associates, LLC apgarandassoc.com P. O. Box Portland, OR Fax

Authorized. User Agreement

Nationwide Review of CMS s HIPAA Oversight. Brian C. Johnson, CPA, CISA. Wednesday, January 19, 2011

How To Write A Health Care Security Rule For A University

HIPAA 203: Security. An Introduction to the Draft HIPAA Security Regulations

HIPAA Security Matrix

For more information on how to build a HIPAA-compliant wireless network with Lutrum, please contact us today!

HIPAA Self-Study Module Patient Privacy at Unity Health Care, Inc HIPAA Hotline

Information Technology Branch Access Control Technical Standard

ITUS Med Solutions. HITECH & HIPAA Compliance Guide

Heather L. Hughes, J.D. HIPAA Privacy Officer U.S. Legal Support, Inc.

Supplier Information Security Addendum for GE Restricted Data

HIPAA Compliance: Are you prepared for the new regulatory changes?

HIPAA/HITECH PRIVACY & SECURITY CHECKLIST SELF ASSESSMENT INSTRUCTIONS

EVALUATION REPORT. Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review. March 13, 2015 REPORT NUMBER 15-07

University of Illinois at Chicago Health Sciences Colleges Information Technology Group Security Policies Summary

Security Architecture Whitepaper

HIPAA Security. 1 Security 101 for Covered Entities. Security Topics

PRIVACY POLICIES AND FORMS FOR BUSINESS ASSOCIATES

Compliance and Security Challenges with Remote Administration

SECURITY RISK ASSESSMENT SUMMARY

Health Insurance Portability and Accountability Act Enterprise Compliance Auditing & Reporting ECAR for HIPAA Technical Product Overview Whitepaper

Transcription:

HIPAA: MANAGING ACCESS TO SYSTEMS STORING ephi WITH SECRET SERVER With technology everywhere we look, the technical safeguards required by HIPAA are extremely important in ensuring that our information remains protected. Thycotic Secret Server can assist your organization in achieving and maintaining HIPAA compliance.

WHAT S THE HIPAA SECURITY RULE? Any company that holds or transfers patient health records in electronic form, or provides services to companies that work with patient health information in electronic form, must ensure that all of the required security measures are in place and followed according to the Health Insurance Portability and Accountability Act s (HIPAA) Rules. Thycotic Secret Server assists in meeting HIPAA Security Rule s Technical Safeguard requirements by ensuring the confidentiality, integrity, and security of the accounts and credentials that have access to patient health information. TECHNICAL SAFEGUARDS & ENSURING ephi PROTECTION Technical Safeguards require covered entities to maintain reasonable safeguards for protecting electronic protected health information, most commonly known as ephi. HIPAA rules specify the covered entities must: Ensure the confidentiality, integrity, and availability of all ephi they create, receive, maintain or transmit; Identify and protect against reasonably anticipated threats to the security or integrity of the information; Protect against reasonably anticipated, impermissible uses or disclosures; and Ensure compliance by their workforce. The HIPAA Security Rule defines confidentiality to mean that ephi is not available or disclosed to unauthorized persons. Confidentiality requirements support the HIPAA Privacy Rule s prohibitions against improper uses and disclosures of PHI. The Security Rule also promotes the two additional goals of maintaining the integrity and availability of ephi. Integrity means that ephi is not altered or destroyed in an unauthorized manner. Availability means that ephi is accessible and usable on-demand by an authorized person. With digital medical records, patient online portals, and other electronic methods of healthcare management, maintaining a secure network is critical to meet the Health Insurance Portability and Accountability Act (HIPAA) security requirements. Thycotic s Secret Server Password Management Software manages the availability, rotation, and integrity of the privilege accounts that allow access to electronic Protected Health Information (ephi). The tool creates a centralized, encrypted location for password storage, the ability to restrict access by role, full auditing of credential usage and automatic password changing. Add your security policy to Secret Server to automatically change passwords at required times, enforce password length and complexity requirements, and ensure sensitive systems maintain a high level of access control and oversight over privileged accounts. Those are just a few features in Secret Server that are able to protect access to your ephi data and ensure your company is meeting HIPAA Security Rule requirements.

PROTECTING ACCESS TO ephi Thycotic Secret Server uses role-based access control, which provides the ability to set strict, granular permissions for each user. All features in Secret Server are made available to users based on permissions, which collectively make up roles. Access to features within Secret Server is controlled using user roles. Administrator is a default role that comes preconfigured with Secret Server. This role can be customized to have different permissions. In this guide, administrator will be used when referring to users who manage the system and have control over global security and configuration settings without Secret Server. Note that administrators in Secret Server do not automatically have access to all data stored in the system access to data is still controlled by explicit permissions on that data. In addition, Secret Server uses different types of encryption to ensure data security. Every field, except name, on a Secret is encrypted at the database level with the Advanced Encryption Standard (AES) 256-bit algorithm. Database encryption prevents unauthorized access of sensitive data on the server. The AES encryption algorithm provides a high level of security for sensitive data. How Secret Server Confirms the Integrity of Account Credentials Thycotic Secret Server s Heartbeat feature allows properly configured Secrets to have the entered credentials automatically tested for accuracy at a given interval. Using Heartbeat on Secrets will ensure the credentials stored in Secret Server are up-to-date and can alert administrators if the credentials are changed outside of Secret Server. Heartbeat helps manage Secrets and prevent them from being out of sync. IT Admin Role-based access to credentials and/or needed to access ephi PATIENT INFORMATION Workstations Servers ephi Other Supported Devices

MEETING THE HIPAA SECURITY RULE FOR IT The HIPAA Security Rule is made up of three parts: Physical, Administrative, and Technical Safeguards which ensure the confidentiality, integrity and security of protected health information (PHI). All three parts include implementation specifications which are classified as required or addressable. implantation specifications must be implemented no matter what. Addressable implementations must be implemented if it is reasonable and/or appropriate to do so. It s important to note that addressable implementations are not optional; when in doubt, implement the addressable specification. The following sections of this document will give an in-depth analysis as to how Thycotic Secret Server can be used in your environment to implement policies and procedures to secure the accounts used to access electronic protected health information (ephi) allowing your environment to meet HIPAA s Technical Safeguard requirements. Technical Safeguards Audit Controls. A covered entity must implement hardware, software, and/or procedural mechanisms to record and examine access and other activity in information systems that contain or use ephi. Integrity Controls. A covered entity must implement policies and procedures to ensure that ephi is not improperly altered or destroyed. Electronic measures must be put in place to confirm that ephi has not been improperly altered or destroyed. Transmission Security. A covered entity must implement technical security measures that guard against unauthorized access to ephi that is being transmitted over an electronic network. Technical Safeguards focus on the technology that protects PHI and controls access to it. There are five standards associated with the Technical Safeguards section:, Audit Controls, Integrity, Authentication, and Transmission Security.. A covered entity must implement technical policies and procedures that allow only authorized persons to access electronic protected health information (ephi).

HIPAA TECHNICAL SAFEGUARDS This table shows a breakdown of how Thycotic Secret Server can be configured to ensure the management of privilege accounts used to access ephi meet the five standards associated with the Technical Safeguards. Standard Standard Details Implementation Specifications How Safeguard is addressed by Thycotic Secret Server Unique User Identification In Secret Server each user is assigned a unique name and/ or number for identifying and tracking user identity. Either by integrating Secret Sever with Active Directory or creating a unique local account for a user. Authentication Unique User Identification Active Directory settings can be configured in Secret Server by going to Admin Active Directory. Local users can be created by going to Admin Users. Through these features Secret Server is able to verify that a person or entity seeking access to ephi is the one claimed. Emergency Access Procedure Secret Server has numerous establish procedures for obtaining necessary ephi during an emergency. These procedures are listed, in detail, in Thycotic s Disaster Recovery Guide. Automatic Logoff Addressable Secret Server has implemented electronic procedures that terminate an electronic session after a predetermined time of inactivity. Application settings, such as Force Inactivity Timeout, Prevent Application from Sleeping When Idle, Remember Me is valid For which allow you to administer that a session is terminated after a configurable amount of time. These settings are found by going to Admin Configuration and toggling between the General and Login Tabs. Encryption and Decryption Addressable Secret Server has the ability to encrypt and decrypt Secrets stored in Secret Server using AES-256 bit encryption. All Secret Server data is encrypted and cannot be access by anyone other than the user with the proper permission, specified by each client, within their own Secret Server. Additional layers of security are available such as SHA512 hashing, two-factor authentication, Auditing, and more. A detailed description of Secret Server s security settings can be found in Thycotic s Security Hardening Report. Transmission Security Encryption Addressable Secret Server keeps detailed audit records on actions in Secret Sever. It is able to examine user activity in information systems that contain or use ephi not only through detailed user and admin audit reports, but through Event Subscriptions, real-time session monitoring/recording, settings such as Request Approval, and more. Audit Controls Audit Audit Reports and Request Access can be found on the Secret Level by selecting the Secret View Audit and Secret Security. Event Subscriptions can be configured by going to Admin Event Subscriptions. Session Monitoring/Recording can be configured by going to Admin Configuration.

RECAP: WHAT YOU NEED TO KNOW THYCOTIC SECRET SERVER WILL PROTECT YOUR INFORMATION SYSTEMS This one is a given, but not everyone takes the time to do it! Make sure all of your servers (ALL of them not only those that specifically handle personal health information) have strong, unique passwords that are rotated frequently. Don t leave any easy targets for intruders to exploit. Require users to change their passwords often and enforce strong password requirements. Secret Server provides the ability to manage server and systems accounts, not only by storing them in a central repository, but also by changing them on a regular, scheduled basis. Improve password strength by configuring password requirements for Secret Server s random password generator. Have too many servers on your network to keep track of? Secret Server can automatically discover the local Windows and service accounts on your network and pull them into Secret Server to be managed. ENCRYPT DATA IN TRANSIT Especially personal health information (PHI), but this applies to all information that secures the systems storing and transporting PHI as well. Use SSL/TLS to encrypt data being sent over the network. Secret Server encrypts all sensitive information before it s stored and, as a web-based application, supports the use of SSL/TLS encryption for access. What does this mean? Your passwords and any other private information such as credit card numbers, pin codes, or even documents are encrypted and stored securely in one central repository. RECORD ACCESS TO DATA HIPAA requires measures to ensure data isn t modified or deleted without authorization. Keep an accurate record of who has access to which systems or information and why. Once your accounts are managed by Secret Server, it will be your central point for sharing and auditing access to privileged credentials. Secret Server keeps an audit of who views and edits credentials, showing you who had access, which system or data they needed access to, and when. You can even require comments to keep a more comprehensive audit trail of why a user accessed the data. PROVIDE DOCUMENTATION Have reports and audit logs available in case any information is requested for review. Secure access to documentation so you are able to track exactly who has the ability to review it. Secret Server contains a number of built-in reports that will give you an overview of the status of your passwords, who has access to credentials and data, and more. Use a read-only user role to allow auditors to access reports and documentation without the ability to view or edit sensitive information.

SUMMARY With technology everywhere we look, the technical safeguards required by HIPAA are extremely important in ensuring that our information remains protected. Thycotic Secret Server can assist your organization in achieving and maintaining HIPAA compliance. For healthcare IT teams managing sensitive patient data, protecting from both external and internal threat is critical. A healthcare data breach not only damages the reputation of your organization, but brings substantial financial implications from monetary HIPAA fines and potential lawsuits. Thycotic Secret Server helps IT teams within healthcare ensure compliance by providing full auditing on privileged users, detailed reporting, lifecycle management of privileged credentials, and strict access controls to protect patient data. SEE FOR YOURSELF! Try Secret Server free for 30 days www.thycotic.com/secret-server 1101 17th Street NW Suite 1102 Washington DC 20036 DC LONDON SYDNEY p: +1 202-802-9399 t: @thycotic www.thycotic.com