Protecting Patient Data in the Cloud With DLP An Executive Whitepaper



Similar documents
Protecting Regulated Information in Cloud Storage with DLP

Data Loss Prevention Best Practices to comply with PCI-DSS An Executive Guide

Managing PHI in the Cloud Best Practices

Best Practices for DLP Implementation in Healthcare Organizations

HIPAA Omnibus Compliance How A Data Loss Prevention Solution Can Help

White Paper FASTFILE / Page 1

The Impact of HIPAA and HITECH

RSA Solution Brief RSA. Data Loss. Uncover your risk, establish control. RSA. Key Manager. RSA Solution Brief

Top 10 Reasons for Using Disk-based Online Server Backup and Recovery

Why Consider Cloud-Based Applications?

Websense Data Security Suite and Cyber-Ark Inter-Business Vault. The Power of Integration

SECURITY PLATFORM FOR HEALTHCARE PROVIDERS

CA Technologies Data Protection

Module 1: Facilitated e-learning

Identifying Broken Business Processes

Faster, Smarter, More Secure: IT Services Geared for the Health Care Industry A White Paper by CMIT Solutions

Dell s Five Best Practices for Maximizing Mobility Benefits while Maintaining Compliance with Data Security and Privacy Regulations

HIPAA Compliance with Database Record Matching

A Websense Research Brief Prevent Data Loss and Comply with Payment Card Industry Data Security Standards

Data Encryption in the cloud A Handy Guide

Protecting Your Data On The Network, Cloud And Virtual Servers

EMC DOCUMENTUM Capital Projects Express. KEEP YOUR PROJECTS ON TRACK Flexible Document Control for Agile Teams

CA Technologies Healthcare security solutions:

Why cloud backup? Top 10 reasons

Identity & Access Management in the Cloud: Fewer passwords, more productivity

12/19/2014. HIPAA More Important Than You Realize. Administrative Simplification Privacy Rule Security Rule

Data Loss Prevention Program

SM B13: Symantec Data Insight Ketan Shah, Principal Product Manager John Dodds, Director Technical Product Manager

Data Sheet: Archiving Symantec Enterprise Vault Store, Manage, and Discover Critical Business Information

WHY CLOUD BACKUP: TOP 10 REASONS

BYOD File Sharing - Go Private Cloud to Mitigate Data Risks. Whitepaper BYOD File Sharing Go Private Cloud to Mitigate Data Risks

DISCOVER, MONITOR AND PROTECT YOUR SENSITIVE INFORMATION Symantec Data Loss Prevention. symantec.com

Preemptive security solutions for healthcare

Securing Data in the Virtual Data Center and Cloud: Requirements for Effective Encryption

Solve the Dropbox Problem with Enterprise Content Connectors. Whitepaper Solve the Dropbox Problem with Enterprise Content Connectors

Cloud Computing: A Question of Trust Maintaining Control and Compliance with Data-centric Information Security

Datosphere Platform Product Brief

CA Message Manager. Benefits. Overview. CA Advantage

For more information on how to build a HIPAA-compliant wireless network with Lutrum, please contact us today!

management solutions

Top Ten Keys to Gaining Enterprise Configuration Visibility TM WHITEPAPER

Five Tips to Ensure Data Loss Prevention Success

DISCOVERING AND SECURING SENSITIVE DATA IN HADOOP DATA STORES

Grayteq DLP Data. Loss. Prevention.

Effective, Affordable Data Management with CommVault Simpana 9 and Microsoft Windows Azure

Strategies and Best Practices to Implement a Successful Data Loss Prevention Program Sebastian Brenner, CISSP

Effective storage management and data protection for cloud computing

custom hosting for how you do business

Art Gross President & CEO HIPAA Secure Now! How to Prepare for the 2015 HIPAA Audits and Avoid Data Breaches

Symantec Enterprise Vault for Microsoft Exchange

WHITE PAPER USING ONLINE BACKUP AS A GATEWAY TO CLOUD SERVICES

Executive Summary Program Highlights for FY2009/2010 Mission Statement Authority State Law: University Policy:

WHITEPAPER. Addressing Them with Adaptive Network Security. Executive Summary... An Evolving Network Environment Adaptive Network Security...

The SaaS LMS and Total Cost of Ownership in FDA-Regulated Companies

Top 10 Reasons Enterprises are Moving Security to the Cloud

WHITE PAPER. Stay ahead (of data leak) with Data Classification and Data Loss Prevention

Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance

Understanding HIPAA Privacy and Security Helping Your Practice Select a HIPAA- Compliant IT Provider A White Paper by CMIT Solutions

Payment Card Industry Data Security Standard

Why Encryption is Essential to the Safety of Your Business

UNCLASSIFIED. UK Archiving powered by Mimecast Service Description

Secure Data Transmission Solutions for the Management and Control of Big Data

Data Classification Technical Assessment

Data Sheet: Archiving Symantec Enterprise Vault for Microsoft Exchange Store, Manage, and Discover Critical Business Information

PCI Solution for Retail: Addressing Compliance and Security Best Practices

How to Avoid the Headache of User Mailbox Quotas

HIPAA Compliance and the Protection of Patient Health Information

Applying ITIL v3 Best Practices

HIPAA, PHI and . How to Ensure your and Other ephi are HIPAA Compliant.

HIPAA Compliance for the Wireless LAN

Effective Storage Management for Cloud Computing

Improving Unstructured Data Governance. Ryan Jancaitis Product Management Symantec

BRING YOUR OWN DEVICE (BYOD) AND MOBILE DEVICE MANAGEMENT

5 ways Mimecast relieves the headache of

Cisco Security Optimization Service

Symantec Enterprise Vault for Microsoft Exchange

White Paper. How a cloud phone system uniquely supports your mobile workforce

A Guide to. Cloud Services for production workloads

The Impact of Wireless LAN Technology on Compliance to the PCI Data Security Standard

Contact Center Security: Moving to the Cloud

RSA Solution Brief RSA. Encryption and Key Management Suite. RSA Solution Brief

Cirius Whitepaper for Medical Practices

HIPAA and HITECH Compliance for Cloud Applications

Office Technologies Managed Services Professional Services. SERVING OVER 18,000 CUSTOMERS IN THE NYC & TRI-STATE AREA tomorrowsoffice.

HIPAA Security Alert

AnswerNow Guides How New HIPAA Regulations Impact Medical Answering Services

CASE STUDY. Carbonite Collateral

Data Loss Prevention: Data-at-Rest vs. Data-in-Motion

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

Whitepaper: Manage Access Control for Network Resources with Securitay s Security Policy Manager

ALERT LOGIC FOR HIPAA COMPLIANCE

Brochure. ECM without borders. HP Enterprise Content Management (ECM)

Memeo C1 Secure File Transfer and Compliance

Using Automated, Detailed Configuration and Change Reporting to Achieve and Maintain PCI Compliance Part 4

Things You Need to Know About Cloud Backup

Sage ERP I White Paper. ERP and the Cloud: What You Need to Know

Document Imaging Solutions. The secure exchange of protected health information.

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0

Transcription:

Protecting Patient Data in the Cloud With DLP An Executive Whitepaper.

Overview Healthcare and associated medical record handling organizations have, for many years, been utilizing DLP, Data Loss Prevention technology as a cornerstone in meeting legal requirements to protect regulated patient health information within their network. Now, as organizations have increasingly begun to utilize cloud computing to store and share patient information, questions have arisen as to how best to extend proven DLP solutions to include cloud storage as well. In this paper, best practices in applying DLP to the cloud are orgnized into the major stages in the process: Planning Migrating to Cloud Storage Ongoing Operation The topics are directed toward organizations that may be considering DLP technology with cloud storage for the first time. However, any healthcare executive involved with regulated healthcare information compliance will find value here. Why is the Cloud Valuable to Healthcare Organizations? The cost and scalability benefits of the cloud are particularly substantial for many healthcare organizations which may typically have limited IT resource. With appropriate security the cloud may further enable more efficient and productive sharing of patient data between multiple care providers, their associates and the patients themselves. However, concerns over the loss of visibility of data in the cloud have remained barriers to many organizations seeking these benefits. Healthcare IT professionals may ask how can we protect sensitive data if we lose visibility of where it is? The cloud computing market in the healthcare sector is expected to grow to $5.4 billion by 2017. MarketsandMarkets Market Research Company What are the Requirements to Protect Patient Information? The importance of managing patient medical information is dictated in the United States by Federal HIPAA/HITECH regulations familiar to all healthcare organizations. These regulations require, as just one example, that, whether data is encrypted or not, the organization must know where patient data is stored or sent. In other words, encryption, alone, is not enough to meet the necessary standards or to provide the visibility required to govern this type of sensitive data. This paper outlines the selection and use of a proper DLP, Data Loss Prevention technology to help address these requirements and significantly reduce the risks. 2

What is at Stake for Handlers of Personal Health Information? The improper release of regulated patient medical records can result in a drop in confidence by their patients and the general public as well as fines and penalties from the Health and Human Services regulatory agencies. Maintaining compliance with these regulatory acts is a vital concern for every organization handling electronic health records. In September of 2013 the HIPAA Omnibus ruling took effect which, among other guidance, provided significant clarity in spelling out what is required of the Business Associates of a healthcare organization. In a nutshell, they are required to provide the same protection to personal health information as a covered entity. How does DLP Assist the Healthcare Industry? Data Loss Prevention, DLP, refers to technology employed over the past ten years toward reducing the risks from loss of sensitive data. Today, considerable experience has been particularly gained in DLP applications to managing healthcare data. Not all DLP offerings in the market are equal, however. Because of its unique advantages and powerful capabilities, here DLP will be taken to mean Content Aware DLP which is often referred to as Enterprise DLP. Gartner, Inc. provided this, still applicable, definition in its IT Glossary several years ago: Content-aware data loss prevention (DLP) tools enable the dynamic application of policy based on the content and context at the time of an operation. These tools are used to address the risk of inadvertent or accidental leaks, or exposure of sensitive enterprise information outside authorized channels, using monitoring, filtering, blocking and remediation features. Security and privacy regulation issues are the top concerns delaying some healthcare organizations from moving data to the Cloud. In addition, more recent DLP technology, now available, is capable of extending this coverage to the cloud as well as the enterprise s own centers and networks. What steps to Take When Deciding to Move Patient Data to the Cloud? The following steps will help any healthcare organization make appropriate decisions prior to deciding if they are ready to move regulated information to the Cloud. 1. Assess Current Information Policies - Insure that any existing information governance rules may be extended to cloud data. In some cases it may be desired to apply more stringent controls on data in or intended for cloud storage. 3

2. Assess Current Usage of Cloud Storage - Determine the protection requirements and status of any data already stored in the cloud. Investigate current personal cloud use by medical professionals or other employees. It may be found that some patient data is already being inappropriately stored in the cloud and creating data loss risks previously not known. An appropriate managed cloud capability will remove the perceived need for any such practices by individuals. 3. Establish Credible Expectations - Cloud storage changes the available means of data visibility and control. In the absence of a well communicated policy, medical professionals may use unsecured, cloud services to store patient data in order to make it more easily accessible when traveling with their mobile devices. A DLP solution appropriate for cloud storage protection will facilitate the application of uniform policy across the enterprise, including the cloud. In particular, an appropriate DLP solution will provide means for educating every end user and preventing unauthorized actions when required by policy. 4. Set Objectives Appropriate for the Organization - After gathering and reviewing existing policies and procedures concerning the handling of sensitive information develop agreement on what information is to be placed in the cloud, what that placement should accomplish, and note any information requiring special protection and control. For example, a first step may be to identify and encrypt all records identifying patient name with their Social Security or hospital ID number. If DLP is being acquired for the first time, resist buying features that will never be used. 5. Involve the Stakeholders - Ensure the participation of those responsible for entering or accessing patient information and those responsible for adhering to HIPAA compliance requirements. All parties should understand the benefits being sought from cloud storage and the requirements for protecting sensitive data expected to be placed there. Managers should understand the benefits and issues of the cloud storage as well as the policy enforcement capabilities provided by DLP. These persons could include: Compliance and Privacy personnel, Professional medical staff, HR, IT Security Executive management Third party consultants specializing in Data Loss Prevention 6. Assess the Costs Involved - If DLP is being acquired for the first time, resist buying features you will never use. Do a 5 year Total Cost of Ownership (TCO) analysis to compare alternative possibilities including the costs for: the hardware, the software, maintenance, training, and any professional services that will be required. Understand any software licensing payment terms. 4

7. Test Any Proposed Solution On-Site - Insist on a short demonstration or Proof of Concept to evaluate ease of installation and usage. This should be done in your environment with the organization s own data both inside and outside of cloud storage. A system that requires separate services only for cloud storage will be both inefficient and confusing in operation. Seek a DLP solution capable of comprehensive and consistent compliance management across the enterprise including the cloud. What Steps to Take Once Committed to Moving Patient Data to the Cloud? Once the decision is made to proceed with the cloud and DLP solution the following steps should be taken to prepare for and execute the migration of data to cloud storage. An appropriate DLP Discovery tool capable of performing these actions will ensure that regulated information will be properly identified, categorized and protected, or, removed before it may be uploaded and exposed to access in the cloud 1. Scan Data Already in Cloud Storage - Use the DLP Discovery tool to inspect all previously stored information in the cloud to bring it under the same policy levels as will be applied to the newly migrating data. This will assure uniformity that newly adopted policy rules will be applied to any older data already placed in the cloud. Note that this important cloud Discovery capability is not a feature offered by every DLP provider. 2. Identify Assets for Migration to the Cloud - Identify information assets that are candidates to move the cloud. This will require identifying and categorizing the information on all storage under control of the organization, including file servers, file shares, SAN, SharePoint servers, user home directories, workstations and laptops in order to determine the best candidates to move the cloud. For example it might be an easy decision to consider moving a marketing file to the cloud to facilitate sharing with an external design agency. An appropriate DLP Discovery scan should be employed to carefully, assess and, perhaps, remediate specific information assets prior to migrating them to cloud storage. 3. Scan the Identified Assets for Regulated Data - Once candidates have been selected for cloud migration the next step is to identify any potential regulated or other sensitive information on that information asset. An appropriate Data Loss Prevention (DLP) Discovery scan should be employed to carefully, assess and, perhaps, remediate specific information assets prior to migrating them to cloud storage. An example might be to encrypt any files containing identifiable personal health information. 4. Review Any Regulated Data Found - The DLP Discovery scan will produce a list of potential regulated or sensitive information on each information asset. This output will help determine the actions required before moving the data on a particular information asset to the cloud. 5

5. Remediate Any Regulated Data as Appropriate - An appropriate DLP Discovery solution will include the ability to remediate potentially sensitive data both during and after the discovery scan. These include: moving files to secure vaults, deleting files, or applying rights management. If the objective is to move an information asset to a cloud storage provider then all regulated data should be moved to a secure area or simply removed altogether from that asset prior to moving the information. 6. Move the Information to the Cloud - Once the information asset has been sanitized it is ready for migration to a cloud storage provider. If the data has not already been sanitized then apply DLP to scan and block any regulated data found as it is in flight to the cloud What is Expected once a DLP Solution is in Operation? By selecting a DLP solution that provides coverage uniformly across the enterprise including cloud storage, the organization s ongoing management of regulated or other sensitive information is greatly simplified. Policies will be enforced with consistency and from single administrative control. Here are steps to help guide the ongoing processes: 1. Audits - At any time, conduct a mock HIPAA compliance audit involving the information in cloud storage. Not only will the organization be ready for any external audit demands, but, this will force questions to be asked regarding where to focus next on risk mitigation strategies. Apply Network DLP capabilities to inspect all data before it leaves the enterprise network and heads to the cloud. 2. Filter and Audit Information as it is Moved to the Cloud - Apply Network DLP capabilities to inspect all data before it leaves the enterprise network and heads to the cloud. DLP tools will identify regulated information and allow it to be removed, encrypted on the fly or stopped for remediation according to policy for the particular information. Note that this provides for information to be inspected at the final stage rather than some prior point where remedies could be undone at a later point. These automatic processes reduce opportunities for error and audit trails provide visibility into information being transmitted 3. Scan Files Systems Planned for Cloud Storage - For efficiency it may sometimes be appropriate to scan entire file systems when there are uncertainties regarding content. Or, the file systems may be so large that it is desirable to scan them prior to the uploading transmissions which will look at each record at a time. An appropriate DLP solution may be employed to inspect all data poised for sending to the Cloud. Sensitive data discovered will be controlled according to policies established by the enterprise: 6

Before release to the cloud sensitive information may be denied passage or automatically encrypted Or, other proscribed remediation may be applied 4. Apply Remediation Selectively at Each Step - It may or may not be most effective to encrypt-everything sent to the cloud. An appropriate DLP will allows, at every stage in the process, the appropriate remediation to be automatically applied according to the policies established by the enterprise for that particular information and where it is being stored or transmitted: Policies dictate action for specific data elements More efficient, speedier processing Alternatives may add burden of needless repetitive encryption and decryption It s all About the Data The Cloud provides the ability to access and manage health records from anywhere at anytime. Data Loss Prevention, DLP, technology has proven to be an invaluable resource in protecting regulated personal health data as advances in technology has migrated information from secure data centers to distributed file servers to the desk top and to mobile computing devices. Now, with appropriate tools, this technology may be applied to data in the cloud as well. There are many resources to assist organizations in sorting out the options available for data protection. But, the most important criteria for a healthcare organization is to evaluate solutions that will apply consistent and uniform policy enforcement to patient data across the entire enterprise, no matter where it is stored, including cloud storage. A good way to see this in action is to ask for proof of concept on site. No single tool is capable of addressing every security issue; however, an appropriate DLP implementation will, by accurately identifying regulated data wherever it may be stored or sent, substantially reduce the risks to the healthcare organization as a key component of its overall data security strategy. 7

About Code Green Networks Code Green Networks delivers solutions that help enterprises protect and manage regulated and other sensitive digital information across their data network, whether local, remote, mobile or in the cloud. The company s solutions have been tested and proven through daily use by hundreds of deployments in large and small organizations across the United States and around the globe. It s All About The Data Code Green s total focus is data protection utilizing innovative content inspection technology to insure maximum protection for an organization s important data. By investing over 200 man years in software development and working closely with customers since 2004, Code Green Networks has applied innovative technology to produce Data Loss Prevention solutions with the most advanced capabilities available to locate, identify and manage regulated data. Significant examples include: A complete Content Aware DLP solution: TrueDLP The Deep Inspection Content Engine: DICE Protection extending to the cloud: Cloud Content Control Removing Compliance Complexity Code Green Networks believes that many products offered to address regulatory compliance are often needlessly complex in implementation and difficult to manage leading to unplanned costs and delays resulting in diminished benefits to the organization. Code Green has taken a different approach. We chose to deliver solutions that are faster to deploy, easier to manage, highly accurate with superior performance and significantly less costly than alternative solutions. Our attention to these details has produced major benefits for our customers: Enhanced simplified management control for consistent uniform policy administration Powerful yet simple to deploy appliances designed for quick installation PoEasy modular growth by capacity, function and location Committed to Supporting Our Customer s Compliance Requirements Working with customers to address the rigorous regulations faced by organizations handling personal medical and financial information has led to our deep understanding of these particular areas of regulatory compliance. It has also helped us create solutions which are very applicable to other markets as well. We fully understand that there is no margin for error when it comes to protecting our client s critical data and this commitment to our customers guides us in everything we do. Code Green Networks, Inc. 385 Moffett Park Drive Suite 105 Sunnyvale, CA 94089 Phone: +1 (408) 716-4200 E-mail: info@codegreennetworks.com www.codegreennetworks.com 8