Logging and Auditing in a Healthcare Environment



Similar documents
HIPAA and HITECH Compliance for Cloud Applications

Big Data, Big Risk, Big Rewards. Hussein Syed

Law Firm Cyber Security & Compliance Risks

ALERT LOGIC FOR HIPAA COMPLIANCE

NEW PERSPECTIVES. Professional Fee Coding Audit: The Basics. Learn how to do these invaluable audits page 16

SANS Top 20 Critical Controls for Effective Cyber Defense

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

Threat and Vulnerability Management (TVM) Protecting IT assets through a comprehensive program. Chicago IIA/ISACA

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

InfoGard Healthcare Services InfoGard Laboratories Inc.

The Impact of HIPAA and HITECH

Security Controls What Works. Southside Virginia Community College: Security Awareness

PCI Compliance for Cloud Applications

Payment Card Industry Data Security Standard

Auditing Security: Lessons Learned From Healthcare Security Breaches

Decrypting the Security Risk Assessment (SRA) Requirement for Meaningful Use

whitepaper The Benefits of Integrating File Integrity Monitoring with SIEM

HIPAA Privacy Rule Policies

Tripwire Log Center NEXT GENERATION LOG AND EVENT MANAGEMENT WHITE PAPER

AlienVault for Regulatory Compliance

SUMMARY OF Proactive Monitoring Procedures

Our Commitment to Information Security

Tripwire Log Center NEXT GENERATION LOG AND EVENT MANAGEMENT WHITE PAPER

Adopt and implement privacy procedures, train employees on requirements, and designate a responsible party for adopting and following procedures

How To Buy Nitro Security

Enterprise Security Solutions

WHITEPAPER Complying with HIPAA LogRhythm and HIPAA Compliance

How To Manage Log Management

Interpreting the HIPAA Audit Protocol for Health Lawyers

Logging In: Auditing Cybersecurity in an Unsecure World

Feature. Log Management: A Pragmatic Approach to PCI DSS

Sarbanes-Oxley Compliance for Cloud Applications

Clavister InSight TM. Protecting Values

Trust 9/10/2015. Why Does Privacy and Security Matter? Who Must Comply with HIPAA Rules? HIPAA Breaches, Security Risk Analysis, and Audits

Demonstrating the ROI for SIEM: Tales from the Trenches

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

DEMONSTRATING THE ROI FOR SIEM

How To Understand And Understand The Benefits Of A Health Insurance Risk Assessment

Attaining HIPAA Compliance with Retina Vulnerability Assessment Technology

Worldwide Security and Vulnerability Management Forecast and 2008 Vendor Shares

Compliance Management, made easy

WHITE PAPER. Attaining HIPAA Compliance with Retina Vulnerability Assessment Technology

Everything You Always Wanted to Know About Log Management But Were Afraid to Ask. August 21, 2013

End-user Security Analytics Strengthens Protection with ArcSight

Managing the Insider Threat: Real-time Monitoring of Access Patterns to ephi

White Paper. Protecting Databases from Unauthorized Activities Using Imperva SecureSphere

ARRA HITECH Stimulus HIPAA Security Compliance Reporter. White Paper

Compliance Challenges. Ali Pabrai, MSEE, CISSP (ISSMP, ISSAP) Member, FBI InfraGard. Increased Audits & On-site Investigations

Solution Brief for ISO 27002: 2013 Audit Standard ISO Publication Date: Feb 6, EventTracker 8815 Centre Park Drive, Columbia MD 21045

Everything You Wanted to Know about DISA STIGs but were Afraid to Ask

WHITE PAPER. Best Practices for Wireless Network Security and Sarbanes-Oxley Compliance

A Database Security Management White Paper: Securing the Information Business Relies On. November 2004

QRadar SIEM 6.3 Datasheet

THE TOP 4 CONTROLS.

HIPAA 203: Security. An Introduction to the Draft HIPAA Security Regulations

Attachment A. Identification of Risks/Cybersecurity Governance

Agenda. OCR Audits of HIPAA Privacy, Security and Breach Notification, Phase 2. Linda Sanches, MPH Senior Advisor, Health Information Privacy 4/1/2014

Privacy and Security requirements, OCR HIPAA Audits and the New Audit Protocol

HIPAA COMPLIANCE PLAN FOR 2013

TOP 10 WAYS TO ADDRESS PCI DSS COMPLIANCE. ebook Series

HIPAA: Compliance Essentials

INCIDENT RESPONSE CHECKLIST

HIPAA Security & Compliance

Information Protection Framework: Data Security Compliance and Today s Healthcare Industry

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

Ecom Infotech. Page 1 of 6

2016 OCR AUDIT E-BOOK

How to Use the NYeC Privacy and Security Toolkit V 1.1

Information Security: A Perspective for Higher Education

Information Technology Policy

Continuous Network Monitoring

Extreme Networks Security Analytics G2 Risk Manager

LogRhythm and HIPAA Compliance

Critical Controls for Cyber Security.

Protect the data that drives our customers business. Data Security. Imperva s mission is simple:

The Need for Real-Time Database Monitoring, Auditing and Intrusion Prevention

HITRUST CSF Assurance Program You Need a HITRUST CSF Assessment Now What?

Data Privacy: The High Cost of Unprotected Sensitive Data 6 Step Data Privacy Protection Plan

NIST CYBERSECURITY FRAMEWORK COMPLIANCE WITH OBSERVEIT

Compliance, Security and Risk Management Relationship Advice. Andrew Hicks, Director Coalfire

HEALTH INSURANCE MARKETPLACES GENERALLY PROTECTED PERSONALLY IDENTIFIABLE INFORMATION BUT COULD IMPROVE CERTAIN INFORMATION SECURITY CONTROLS

Health & Life sciences breach security program. David Houlding MSc CISSP CIPP Healthcare Privacy & Security Lead Intel Health and Life Sciences

Transcription:

Logging and Auditing in a Healthcare Environment Mac McMillan CEO CynergisTek, Inc. OCR/NIST HIPAA Security Rule Conference Safeguarding Health Information: Building Confidence Through HIPAA Security May 11, 2010

Introduction HIMSS Privacy & Security Steering Committee Former Chair, HIMSS Information Security Working Group National Practice Director, CTG Healthcare Solutions Director of Security, SAIC Intelligence Solutions Group Director of Security, Defense Threat Reduction Agency, DoD Director of Security, On-Site inspection Agency, DoD DoD Critical Infrastructure Protection Committee Information Security in Healthcare: Managing Risk

Logging & Audit in Healthcare Current Trends Logging & Audit Requirements Privacy vs. Security Correlation Challenges & Barriers Observations

Logging & Audit Trends 2008 only 60% using automated or partially automated means to collect/review log data 2009 only 64% using automated or partially automated means to collect/review log data

HIMSS Annual Survey Log Sources Firewall Logs 83% Application Logs 72% Servers 70% Intrusion Detection 60% Network Devices 61% Additional Storage Devices 15% Don t Collect 6%

Growth in Log Data According to SANS survey there is a 15/20% growth in log data being collected each year, primarily due to: Increased log sources New regulations Inclusion of application logs

Frequent Themes Expressed Frustration with primarily reactive processes Frustration with time consuming manual processes Lack of confidence in manual searches Desire to mitigate potential public embarrassment Gaps in current SIEM/Log Management solutions to address clinical applications Lack of log/audit functionality in systems

Proliferation of Regulations with Log/Audit Requirements HIPAA/HITECH FTC Red Flag Rules 21 CFR Part 11 42 CFR part 2 SOX GINA FISMA Payment Card Industry/Data Security Standard State Laws

HIPAA/HITECH requirements driving logging and audit Risk Management Information System Activity Reviews Audit Controls Accounting of Disclosure Meaningful Use EHR Certification Breach Notification Accounting of Disclosures

Some Other Requirements Data retention policies Account management reviews Process audits Controls audits Third Party security audits User education/awareness

Collection & Uses of Log Data Detect/prevent unauthorized access and insider abuse Meet regulatory requirements Forensic analysis and correlation Ensure regulatory compliance Tracking suspicious behavior IT Troubleshooting & network operations

Breach Data/Enforcement Demonstrate Need Number of organizations reporting breaches increased 6% over last year 80+ breaches of 500 records or more to OCR in 2010, countless smaller ones Malicious intent is still less likely to be cause Unauthorized access by User Wrongful access of paper based records Physical loss/theft of device

Disjointed Efforts Privacy and Compliance organizations have focused on application monitoring Technical and Security organizations have focused on monitoring events affecting security of the IT infrastructure This approach is inefficient and adds to the risk of exploitation

Privacy vs. Security Auditing Privacy violations Internal Threats EHR/Clinical applications Application log managers Network/system security Internal/external Threats IT Infrastructure Network log managers/siem

Using Other Technologies to Audit Data Loss Prevention Email Encryption Vulnerability Scanners Policy Management Scanners Configuration Managers

How Correlation Enables Proactive Audit and Monitoring Increases efficiency in investigative processes Multiple reports increases confidence Assists in identifying false alarms Missing data is not as limiting More thorough understanding of incidents Reduces number of false alerts

Correlation Does Matters Confirmation of multiple pieces of information Statistical correlation Historical correlation Pattern or rule-based correlation

Challenges/Barriers Volume of systems/data Lack of Integration Identity Management Lack of Access Health Information Exchanges Lack of functionality Lack of definition Lack of data elements Lack of correlation Lack of data mapping

Healthcare Logging & Audit Needs Behavior based modeling for privacy enforcement Proactive alerting of potential issues Accurate search and investigative functionality Correlation across critical applications and systems of log events Early detection of security/privacy breaches Automated reporting/alerting for prompt action

Opportunities for Improvement Federal guidance on logging and audit requirements Vendor inclusion of audit functionality and necessary data in clinical applications Inclusion of logging/audit functionality in EHR certification criteria Continued development of log management and SIEM product improvements and integration Address identity management shortfalls

Questions

References 2010 HIMSS Analytics Report: Security of Patient Data Kroll Fraud Solutions 2008/2009 HIMSS Security Survey Booz Allen Hamilton/Symantec SANS Sixth Annual Log Management Survey Report