WHITE PAPER. Attaining HIPAA Compliance with Retina Vulnerability Assessment Technology



Similar documents
Attaining HIPAA Compliance with Retina Vulnerability Assessment Technology

Intrusive vs. Non-Intrusive Vulnerability Scanning Technology

Avoiding the Top 5 Vulnerability Management Mistakes

Simplifying the Challenges of Mobile Device Security

Three Ways to Secure Virtual Applications

WHITE PAPER. Best Practices for Securing Remote and Mobile Devices

WHITE PAPER. BeyondTrust PowerBroker : Root Access Risk Control for the Enterprise

VMware vcloud Air HIPAA Matrix

SecureIIS Web Server Protection Guarding Microsoft Web Servers

Understanding BeyondTrust Patch Management

HIPAA Security. 2 Security Standards: Administrative Safeguards. Security Topics

PCI Data Security Standards (DSS)

Unified Security Anywhere HIPAA COMPLIANCE ACHIEVING HIPAA COMPLIANCE WITH MASERGY PROFESSIONAL SERVICES

Integrated Threat & Security Management.

Retina CS: Using Strong Certificates

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

TOP 10 WAYS TO ADDRESS PCI DSS COMPLIANCE. ebook Series

WHITE PAPER. Take Back Control of Your Active Directory Auditing

The Impact of HIPAA and HITECH

ForeScout CounterACT and Compliance June 2012 Overview Major Mandates PCI-DSS ISO 27002

CHIS, Inc. Privacy General Guidelines

BeyondInsight Version 5.6 New and Updated Features

ITS HIPAA Security Compliance Recommendations

BUSINESS ASSOCIATE AGREEMENT HIPAA Protected Health Information

Policy Title: HIPAA Security Awareness and Training

WHITEPAPER. Addressing Them with Adaptive Network Security. Executive Summary... An Evolving Network Environment Adaptive Network Security...

HIPAA Security Checklist

Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security

HIPAA Audit Processes HIPAA Audit Processes. Erik Hafkey Rainer Waedlich

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

Information Security: A Perspective for Higher Education

Sample Vulnerability Management Policy

UNIVERSITY OF CALIFORNIA, SANTA CRUZ 2015 HIPAA Security Rule Compliance Workbook

HIPAA and Mental Health Privacy:

Patch and Vulnerability Management Program

Information Security Policy

PATCH MANAGEMENT. February The Government of the Hong Kong Special Administrative Region

Healthcare Management Service Organization Accreditation Program (MSOAP)

How To Buy Nitro Security

HIPAA Security Rule Compliance

SUBJECT: SECURITY OF ELECTRONIC MEDICAL RECORDS COMPLIANCE WITH THE HEALTH INSURANCE PORTABILITY AND ACCOUNTABILITY ACT OF 1996 (HIPAA)

Payment Card Industry Data Security Standard

ForeScout CounterACT CONTINUOUS DIAGNOSTICS & MITIGATION (CDM)

New Boundary Technologies HIPAA Security Guide

Extreme Networks Security Analytics G2 Vulnerability Manager

UMHLABUYALINGANA MUNICIPALITY PATCH MANAGEMENT POLICY/PROCEDURE

Data Management Policies. Sage ERP Online

HIPAA Security. Jeanne Smythe, UNC-CH Jack McCoy, ECU Chad Bebout, UNC-CH Doug Brown, UNC-CH

plantemoran.com What School Personnel Administrators Need to know

SECURITY RISK ASSESSMENT SUMMARY

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

How To Achieve Pca Compliance With Redhat Enterprise Linux

BUSINESS ASSOCIATE AGREEMENT BETWEEN LEWIS & CLARK COLLEGE AND ALLEGIANCE BENEFIT PLAN MANAGEMENT, INC. I. PREAMBLE

Achieving HIPAA Security Rule Compliance with Lumension Solutions

Proven LANDesk Solutions

WHITEPAPER. Achieving Network Payment Card Industry Data Security Standard (PCI DSS) Compliance with NetMRI

Cisco Security Optimization Service

Professional Solutions Insurance Company. Business Associate Agreement re HIPAA Rules

Implementing HIPAA Compliance with ScriptLogic

Legacy Applications and Least Privilege Access Management

An Effective MSP Approach Towards HIPAA Compliance

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

Data Privacy and Gramm- Leach-Bliley Act Section 501(b)

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

Threat and Vulnerability Management (TVM) Protecting IT assets through a comprehensive program. Chicago IIA/ISACA

Network Security and Vulnerability Assessment Solutions

How To Protect A Wireless Lan From A Rogue Access Point

Presented by Evan Sylvester, CISSP

Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis

ARRA HITECH Stimulus HIPAA Security Compliance Reporter. White Paper

HIPAA Security Series

HIPAA Security. 2 Security Standards: Administrative Safeguards. Security. Topics

WHITEPAPER. Addressing Them with Secure Network Access Control. Executive Summary... An Evolving Network Environment... 2

October Application Control: The PowerBroker for Windows Difference

GFI White Paper PCI-DSS compliance and GFI Software products

AUTOMATED PENETRATION TESTING PRODUCTS

CORE Security and the Payment Card Industry Data Security Standard (PCI DSS)

FISMA / NIST REVISION 3 COMPLIANCE

FDA Releases Final Cybersecurity Guidance for Medical Devices

Transcription:

WHITE PAPER Attaining HIPAA Compliance with Retina Vulnerability Assessment Technology

Table of Contents Overview 3 HIPAA & Retina Enterprise Edition 3 Six Steps of Vulnerability Assessment & Remediation 4 Achieving HIPAA Compliance with Retina 6 Administrative Safeguards 6 Technical Safeguards 6 About BeyondTrust 8 2 2013. BeyondTrust Software, Inc.

Overview The final privacy rules for securing electronic health care became effective April 14th, 2003. These regulations require health care companies to develop, implement, and document the measures they take to ensure that health information remains secure under the Health Insurance Portability and Accountability Act (HIPAA). HIPAA is intended to protect and simplify the exchange of health care data nationwide. Large health-care organizations will have until April 2005 to fully comply, while smaller entities will have until April 2006. The complete HIPAA information can be found at: http://www.aspe.hhs.gov/admnsimp/ Now federal law, compliance with HIPAA is mandatory and violators face up to $250,000 in fines and jail time of up to 10 years. HIPAA regulations are intended to protect such data as a patient s medical records and personal health care information. HIPAA affects organizations that transmit protected health information in electronic form (e.g. health plans, health care clearinghouses, and health care providers). The law maintains that health care organizations implement a wide variety of safeguards and security best-practices in order to adequately protect customer data. Full compliance requires that these entities understand the threats and liabilities and take proactive measures to maintain reasonable and appropriate safeguards in three areas: administrative, physical, and technical. This document details the process needed to achieve compliance and breaks down the specific areas of HIPAA where BeyondTrust s Retina Network Security Scanner plays a pivotal role. HIPAA & Retina Enterprise Edition There are several areas in HIPAA where BeyondTrust s vulnerability assessment solution is key to attaining compliance. The sections include: Title II (Preventing Health Care Fraud and Abuse), Subtitle F (Administrative Simplification), Section 262, and Subsection 1173d (Security Standards for Health Information). As initially mentioned, Subsection 1173d contains the three security standards categories that are critical: administrative, physical, and technical. The final ruling on compliance requires all entities subject to HIPAA standards to periodically conduct an evaluation of their security safeguards to demonstrate and document their compliance with the entity s security policy and the requirements of this subpart. In terms of evaluation frequency, the regulations state that covered entities must assess the need for a new evaluation based on changes to their security environment since their last evaluation, for example, new technology adopted or responses to newly recognized risks to the security of their information. HIPAA regulations also point out, it is important to recognize that security is not a product, but is an ongoing, dynamic process. BeyondTrust s Retina Enterprise Edition automates and fulfills these process-oriented safeguard requirements for entities of all sizes. It is important to recognize the significance of the word process from the HIPAA regulations as it pertains to security within an organization. A computer security audit is a systematic, measurable technical assessment of how the entity s security policy is employed. Security audits do not take place in a vacuum and are part of the on-going methodology of defining, maintaining, and improving effective security throughout the organization. Following an established vulnerability assessment and remediation process is a proven approach to attaining HIPAA network security compliance. 3 2013. BeyondTrust Software, Inc.

Six Steps of Vulnerability Assessment & Remediation By using BeyondTrust s vulnerability assessment solution, Retina can identify the asset and identify risks and vulnerabilities, through the review and remediation stage, to final verification of fixes. Eye s complete Enterprise Vulnerability Assessment solution incorporates Retina and a sophisticated events management system to manage the entire process and minimizes resources needed to undertake this critical security initiative. Step 1: Identify all network assets discover functions wired and wireless a. Determine the existence and relative value of networked assets b. Create logical asset groupings i. Separate revenue generating and application assets ii. Separate desktops from mobile devices iii. Group by business unit and location iv. Measure the level of risk posed to critical processes and services c. Quickly identify high risk locations i. Establish priorities and Rogue Devices Step 2: Assess Security Risks Scan for patches, vulnerabilities, setting and web application flaws a. Research audits b. SANS 20 Checks c. Secure configuration audits d. Policy violations e. Vendor disclosed audits f. Custom audits g. Device, user or other audits Step 3: Mitigate existing security risks a. Remediate business critical applications using detail instructions and references b. Options to rescan and validate vulnerabilities c. Monitor remediation progress in the form of tasks and ticketing d. Analyze and adapt strategy to eliminate future security exposures e. Create custom rules to protect against specific threats and manage compliancy 4 2013. BeyondTrust Software, Inc.

Step 4: Prevent future security risks a. Protect against methods of attack i. Zero-Day prevention ii. Intrusion prevention iii. Application and system firewall iv. Policy enforcement v. Virus, spyware, and phishing protection vi. Vulnerability assessment agent b. Continuously protect and mitigate security risks for all devices c. Enforce corporate policy d. No signatures, no learning mode e. Single console management and reporting f. Recognized as the best protection for the end point Step 5: Manage and monitor risk a. Comprehensive third party integration b. Cisco NAC Game server integration c. Change device policy on the fly d. Alerting through: i. Email, SNMP, SYslog, Windows Events Step 6: Report on risk status a. After step two: i. Severity of audit violation ii. PCI compliance iii. Grouping by asset, vulnerability, locations, etc. iv. Most vulnerable hosts v. Vulnerabilities by category vi. Open ports and services vii. Export data to a variety of formats b. Accurate and actionable report in your needed format c. Reporting by Region, business group, application, compliance 5 2013. BeyondTrust Software, Inc.

Achieving HIPAA Compliance with Retina Below are the applicable areas where Retina is instrumental in attaining compliance particular in the areas of administrative and technical initiatives since the physical safeguards that are nontechnical do not apply. Administrative Safeguards Security Management Process [Standard: (a)(1)(i) Implement policies and procedures to prevent, detect, contain, and correct security violations. This is the core strength of BeyondTrust s vulnerability assessment solution. Retina Enterprise Edition is a complete, automated system that performs non-intrusive audits to prevent, detect, contain, and correct security violations. Evaluation [Standard: (a)(8)] Perform a periodic technical and non-technical evaluation based initially upon the standards implemented under this rule and subsequently, in response to environmental operational changes affecting the security of electronic protected health information, that establishes the extent to which an entity s security policies and procedures meet the requirements of this subpart. Regular, scheduled vulnerability assessment audits can be performed by Retina, fulfilling this ongoing requirement for the entire network and verifying that any changes in the network have not created exposure. Technical Safeguards Security Management Process - Risk Analysis [(a)(1)(ii)(a)] Conduct an accurate and thorough assessment of the potential risks and vulnerabilities of the confidentiality, integrity, and availability of electronic protected health information held by the covered entity. Required implementation specification: (a)(1)(ii)(a). Retina is one of the leading network vulnerability assessment scanner. Its database of vulnerability checks is the most accurate and comprehensive. Retina utilizes advanced technology to quickly and accurately test the strength of the entire network and reports on weaknesses with detailed remediation instructions. Security Management Process - Risk Management [(a)(1)(ii)(b) Implement security measures sufficient to reduce risks and vulnerabilities to a reasonable and appropriate level to comply with 164.306(a). Required implementation specification: (a)(1)(ii)(b). Retina provides instant vulnerability information, which can be sorted in a variety of ways, including risk-level. For largeorganizations, Retina is the core of BeyondTrust s Enterprise Vulnerability Assessment solution that enables entities to compile vulnerability reports and automate the remediation management process for the entire organization worldwide. 6 2013. BeyondTrust Software, Inc.

Security Management Process - Risk Analysis [(a)(1)(ii)(a)] Conduct an accurate and thorough assessment of the potential risks and vulnerabilities of the confidentiality, integrity, and availability of electronic protected health information held by the covered entity. Required implementation specification: (a)(1)(ii)(a). Retina is one of the leading network vulnerability assessment scanner. Its database of vulnerability checks is the most accurate and comprehensive. Retina utilizes advanced technology to quickly and accurately test the strength of the entire network and reports on weaknesses with detailed remediation instructions. Security Management Process - Information System Activity Review [(a)(1)(ii) (D)] Implement procedures to regularly review records of information system activity, such as audit logs, access reports, and security incident tracking reports. Required specification: (a)(1)(ii)(d). Retina automatically documents all incidents and effects of performed audits. Security Incident Procedures [(a)(6)(i)] Implement policies and procedures to address security incidents. Standard: (a)(6)(i) Vulnerability assessment audits performed by Retina provide the required data to implement and change security policies as appropriate to fortify the strength of the network. Security Incident Procedures - Response and Reporting [(a)(6)(ii)]) Identify and respond to suspected or known security incidents; mitigate, to the extent practicable, harmful effects of security incidents that are known to the covered entity; and document security incidents and their outcomes. Required implementation specification: (a)(6)(ii). Retina is one of the leading network vulnerability assessment scanner. It s database of vulnerability checks is the most accurate and comprehensive. Retina utilizes advanced technology to quickly and accurately test the strength of the entire network and reports on weaknesses with detailed corrective action instructions. All corrective actions can be immediately tested by running a follow-up scan to assure that corrective measures were properly followed to secure the entity. Business Associate Contracts and Other Arrangements [(b)(1) and (b)(4)] [An entity] may permit a business associate to create, receive, maintain, or transmit electronic protected health information on the covered entity s behalf only if the covered entity obtains satisfactory assurances... that the business associate wil appropriately safeguard the information. Standard (b)(1) Document the satisfactory assurances required... through awritten contract or other arrangement with the business associate that meets the applicable requirements... Required implementation specification: (b)(4) Retina provides complete reports that can be used by the entity to assure compliance. Furthermore, Retina can be used by business associates to test their own security measures and assure that their networks are safe for creating, receiving, maintaining, or transmitting health information. 7 2013. BeyondTrust Software, Inc.

About BeyondTrust With more than 25 years of global success, BeyondTrust is the pioneer of Privileged Identity Management (PIM) and vulnerability management solutions for dynamic IT environments. More than half of the companies listed on the Dow Jones Industrial Average rely on BeyondTrust to secure their enterprises. Customers include eight of the world s 10 largest banks, seven of the world s 10 largest aerospace and defense firms, and six of the 10 largest U.S. pharmaceutical companies, as well as renowned universities. The company is privately held, and headquartered in Carlsbad, California. For more information, visit beyondtrust.com. CONTACT INFO NORTH AMERICAN SALES 1.800.234.9072 sales@beyondtrust.com EMEA HEADQUARTERS Suite 345 Warren Street London W1T 6AF United Kingdom Tel: + 44 (0) 8704 586224 Fax: + 44 (0) 8704 586225 emeainfo@beyondtrust.com CONNECT WITH US Twitter: @beyondtrust Facebook.com/beyondtrust Linkedin.com/company/beyondtrust www.beyondtrust.com 8 2013. BeyondTrust Software, Inc.