Security Considerations for the Cloud



Similar documents
John Essner, CISO Office of Information Technology State of New Jersey

Purpose. Service Model SaaS (Applications) PaaS (APIs) IaaS (Virtualization) Use Case 1: Public Use Case 2: Use Case 3: Public.

Overview of Cloud Computing and Cloud Computing s Use in Government Justin Heyman CGCIO, Information Technology Specialist, Township of Franklin

HIPAA in the Cloud. How to Effectively Collaborate with Cloud Providers

Cloud Security and Managing Use Risks

Managing Cloud Computing Risk

Cloud Security. DLT Solutions LLC June #DLTCloud

Strategic Compliance & Securing the Cloud. Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security

A COALFIRE PERSPECTIVE. Moving to the Cloud. NCHELP Spring Convention Panel May 2012

Cloud models and compliance requirements which is right for you?

Overview of the HIPAA Security Rule

Ethics, Privilege, and Practical Issues in Cloud Computing, Privacy, and Data Protection: HIPAA February 13, 2015

Orchestrating the New Paradigm Cloud Assurance

The HIPAA Security Rule: Cloudy Skies Ahead?

ARRA HITECH Stimulus HIPAA Security Compliance Reporter. White Paper

HIPAA/HITECH Compliance Using VMware vcloud Air

VMware vcloud Air HIPAA Matrix

Cloud Computing In a Post Snowden World. Guy Wiggins, Kelley Drye & Warren LLP Alicia Lowery Rosenbaum, Microsoft Legal and Corporate Affairs

Securing The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master

Security Issues in Cloud Computing

Data, Data, Who Has The Data?

Big Data, Big Risk, Big Rewards. Hussein Syed

Data Security and Integrity of e-phi. MLCHC Annual Clinical Conference Worcester, MA Wednesday, November 12, :15pm 3:30pm

HIPAA Security Rule Compliance

Future of Cloud Computing. Irena Bojanova, Ph.D. UMUC, NIST

New HIPAA regulations require action. Are you in compliance?

STORAGE SECURITY TUTORIAL With a focus on Cloud Storage. Gordon Arnold, IBM

Virtualization Impact on Compliance and Audit

Third Party Risk Management 12 April 2012

PCI Compliance and the Cloud: What You Can and What You Can t Outsource Presented By:

The Challenges of Applying HIPAA to the Cloud. Adam Greene, Partner Davis Wright Tremaine LLP

HIPAA and HITECH Compliance Simplification. Sol Cates

Cloud Security Trust Cisco to Protect Your Data

Securing and Auditing Cloud Computing. Jason Alexander Chief Information Security Officer

OWASP Chapter Meeting June Presented by: Brayton Rider, SecureState Chief Architect

Cloud Security Who do you trust?

2/9/ HIPAA Privacy and Security Audit Readiness. Table of contents

Joe Dylewski President, ATMP Solutions

HIPAA BUSINESS ASSOCIATE AGREEMENT

HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT

Cloud Computing and HIPAA Privacy and Security

Cloud Computing & Health Care Organizations: Critical Privacy & Security Issues - December 16, 2015

Cloud Security. Peter Jopling IBM UK Ltd Software Group Hursley Labs. peterjopling IBM Corporation

Cloud Security Implications for Financial Institutions By Scott Galyk Director of Software Development FIMAC Solutions, LLC

Cloud Security Keeping Data Safe in the Boundaryless World of Cloud Computing

Cloud Security. Nantawan Wongkachonkitti Electronic Government Agency, Thailand Cloud Security Alliance, Thailand Chapter October 2014

Isaac Willett April 5, 2011

Assessing Risks in the Cloud

ITL BULLETIN FOR JUNE 2012 CLOUD COMPUTING: A REVIEW OF FEATURES, BENEFITS, AND RISKS, AND RECOMMENDATIONS FOR SECURE, EFFICIENT IMPLEMENTATIONS

Clouds on the Horizon Cloud Security in Today s DoD Environment. Bill Musson Security Analyst

How To Protect Your Cloud Computing Resources From Attack

12/19/2014. HIPAA More Important Than You Realize. Administrative Simplification Privacy Rule Security Rule

Cloud Computing Security Issues

Heather L. Hughes, J.D. HIPAA Privacy Officer U.S. Legal Support, Inc.

InfoGard Healthcare Services InfoGard Laboratories Inc.

Keeping up with the World of Cloud Computing: What Should Internal Audit be Thinking About?

Information Technology: This Year s Hot Issue - Cloud Computing

Protec'ng Data and Privacy in a World of Clouds and Third Par'es Vincent Campitelli

Use & Disclosure of Protected Health Information by Business Associates

FINAL May Guideline on Security Systems for Safeguarding Customer Information

Cloud Computing Contracts. October 11, 2012

{Moving to the cloud}

MASSIVE NETWORKS Online Backup Compliance Guidelines Sarbanes-Oxley (SOX) SOX Requirements... 2

Understanding HIPAA Privacy and Security Helping Your Practice Select a HIPAA- Compliant IT Provider A White Paper by CMIT Solutions

University Healthcare Physicians Compliance and Privacy Policy

Cloud Security & Risk. Adam Cravedi, CISA Senior IT Auditor acravedi@compassitc.com

Addressing Security for Hybrid Cloud

penelope athena software SOFTWARE AS A SERVICE INFORMATION PACKAGE case management software

SECURITY MODELS FOR CLOUD Kurtis E. Minder, CISSP

Compliance and the Cloud: What You Can and What You Can t Outsource

Cloud Security Who do you trust?

VMware vcloud Powered Services

Transcription:

June 6, 2012 Security Considerations for the Cloud Presented by: Mac McMillan CEO CynergisTek, Inc. Chair, HIMSS Privacy & Security Policy Task Force 1

2012 NIST/OCR Conference Agenda Threat Implications Security Considerations Risk Assessment Last Thoughts

Threat Implications

Why Data Security Is Important People choose to disclose their most intimate information in order to get healthy Providers earn their trust by guaranteeing privacy Privacy is assured by properly protecting systems and information Breaches undermine patient confidence No Confidence and people avoid treatment, lie or omit information, opt-out, and potentially get sicker Therefore, privacy and security are integral to care

2011 Threat Picture 2011 healthcare assumes number one position in total number of breaches, and fifth in overall identities exposed. The total number of breaches reported in healthcare exceeds 55,000 including those less than 500 records. Symantec 2011 Internet Security Threat Report

What s Changing? Pervasiveness of information being made available electronically has made healthcare a target of cybercriminals. (1 in 6 attacks in 2009 were HC, greatest growth in attacks in 2010 and 2011. In general, healthcare may face bigger risks going forward than either the financial or retail sectors because the information they have is gaining value and there is expected to be greater distribution/access. The Cloud is only one example. A recent ID Experts survey found that 33% of healthcare respondents are in the cloud, and 48% have plans to move there soon.

What s Not Changing? Covered entities responsibility to ensure the confidentiality, integrity and availability of electronic Protected Health Information (ephi). The requirement to assess all reasonable risks to ephi. The requirement to insure that Business Associates are capable of protecting ephi appropriately. The requirement to assure appropriate access and minimal necessary. The requirement to account for uses and disclosures. The requirement to respond effectively to incidents, And the list goes on

Security Considerations in the Cloud

Cloud Appeal The cloud provides multiple value propositions for Covered Entities and Business Associates of all sizes by creating access to pools of economical information assets. Organizations can take advantage of Infrastructure, Platforms or Software as a Service deployment models. And, there are different service models to choose from Public, Private, Hybrid and Community. Models count

Cloud Models Control of security varies greatly depending on model selected: SaaS The Provider has control PaaS Shared control IaaS The consumer has control Security assurance changes depending on model selected: Public Untrusted Assets provided for anyone Private Trusted Dedicated assets provided Community Trusted Assets shared by group Hybrid Combination Mix of delivery means

Top Three Concerns Performance and Reliability Compliance Lack of visibility Physical location of information Jurisdiction issues Ability to investigate Information Security Unintended disclosures Data privacy System integrity Multi-tenancy Browser Support Hardware integrity Key Management

Risk Assessment

Key Questions for Management Cloud security Alliance What would the impact be if the asset were to become public or widely distributed? How would you be harmed if an employee of the cloud provider accessed the asset? What if the process were altered or manipulated by an outsider? How would you be harmed if the process or function failed to provide the expected results? How would you be harmed if the information/data were to be unexpectedly changed? How would you be harmed if the asset were to be unexpectedly unavailable for a period of time?

Risk Assessment Moving to/from the cloud: Identification of information suitable for the cloud Procedures for interaction with information in the cloud Plans for retrieval/destruction upon termination Conduct data discovery and inventory information prior to moving to the cloud Continuity of Operations: Assessing the venders plans for contingencies (back up/disaster recovery/continuity of operations) Reviewing Service Level Agreements to insure timely actions Legal/contractual protections for unexpected outages/loss of data

Risk Assessment Compliance requirements: Secure commitment to compliance (Security Agreement/BAA) Review documentation of policies/controls Request third party controls assessment Physical/Personnel: Insure compartmentalization of provider/consumer administrative staff roles/responsibilities. Request access to where information is stored. Monitor all access to systems with ephi. Ensure the environment is regularly tested.

Risk Assessment Encryption: Encrypt prior to storing in the cloud, segregating key management. Encrypt transmissions between provider and consumer. Review encryption methods used by cloud service provider. Policy/Legal: Review operating policies for completeness/currency. Substantiate whether provider is available for audit. Review incident response plans, procedures and readiness. Insure capability to respond to legal requests such as litigation holds, data searches, etc.

Transitional Thoughts

Last Thoughts HIPAA, HITECH, PCI, etc. responsibilities follow the information and extend to the cloud, selection of the right cloud service provider is important. Third party certification can reduce risk such as cloud providers certified by FedRAMP. Risk assessment should be performed before moving to the cloud. In some cases moving to the cloud can improve the protection of data. There are many excellent resources on cloud computing to help inform approaches. There is a HIMSS, Cloud Security Working Group established specifically to focus on healthcare.

Thank You For more Information please visit our blog site. www.cynergistek.com Mac McMillan Mac.McMillan@cynergistek.com (512) 402-8555

View from the cloud Security Assurance considerations for a purchaser 5 th Annual Safeguarding Health Information: Building Assurance through HIPAA Security - Conference Hosted by NIST and HHS Office for Civil Rights June 6-7, 2012 Washington, DC

Is there a Cloud in the Future of Healthcare? Market Prognosis Unique opportunities Unique Challenges

MARKET PROGNOSIS Revenue Growth $16b (2009)/$55.5b(2115) Proxy for IT Outsourcing Federal Programs Major market participants

UNIQUE OPPORTUNITIES Monetary rewards for IT modernization Connectivity / Big Data Leverage cost efficiencies / IT competencies Access to IT agility

UNIQUE CHALLENGES Compliance overhang Security requirements Governance / Management Contracting Governmental oversight

Security Guidance Playbook Risk Assessment Governance Operations Reporting Monitoring

Assessment Resources NIST / FISMA HiTech Cloud Security Alliance ISO 27001

Cloud Security Alliance Tools / Research Security guidance Cloud controls matrix Cloud Audit GRC stack Cloud data governance

Provider Accountability

Questions to ask Cloud Providers Does the contract adequately protect the buyer? Service levels Intellectual Property Service availability Limitation of Liability Data Security Implementation Insurance Assignment Indemnification Warranties Exclusivity Exit strategy BAA

Questions to ask Cloud Providers Are the results of internal and external audits available to customers at their request?

Questions to ask Cloud Providers Are customers allowed to view the provider s third party audit reports?

Questions to ask Cloud Providers Does the cloud provider conduct network penetration tests of its cloud service infrastructure on a periodic basis?

Questions to ask Cloud Providers Does the provider document scenarios where data may moved from one physical location to another?

Questions to ask Cloud Providers Does the provider use encryption to protect data and virtual machine images during transport across and between networks?

Questions to ask Cloud Providers Can the cloud provider logically segment and recover data for a specific customer in the case of a failure or data loss?

Questions to ask Cloud Providers Does the provider encrypt user data at rest(on disk/storage) as well as in transit?

Questions to ask Cloud Providers Does the provider have anti-malware programs installed on all systems that support the cloud service offerings?