VA Medical Device Protection Program (MDPP)



Similar documents
AT&T Global Network Client for Windows Product Support Matrix January 29, 2015

COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS*

COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS*

Analysis One Code Desc. Transaction Amount. Fiscal Period

Case 2:08-cv ABC-E Document 1-4 Filed 04/15/2008 Page 1 of 138. Exhibit 8

Continuous compliance through good governance

Enhanced Vessel Traffic Management System Booking Slots Available and Vessels Booked per Day From 12-JAN-2016 To 30-JUN-2017

P/T 2B: 2 nd Half of Term (8 weeks) Start: 25-AUG-2014 End: 19-OCT-2014 Start: 20-OCT-2014 End: 14-DEC-2014

P/T 2B: 2 nd Half of Term (8 weeks) Start: 26-AUG-2013 End: 20-OCT-2013 Start: 21-OCT-2013 End: 15-DEC-2013

P/T 2B: 2 nd Half of Term (8 weeks) Start: 24-AUG-2015 End: 18-OCT-2015 Start: 19-OCT-2015 End: 13-DEC-2015

AgriLife Information Technology IT General Session January 2010

BCOE Payroll Calendar. Monday Tuesday Wednesday Thursday Friday Jun Jul Full Force Calc

OPTIMIZING THE USE OF VHA s FEE BASIS CLAIMS SYSTEM (FBCS)

Beyond Good Practice: Why HIPAA only addresses part of the data security problem

2/9/ HIPAA Privacy and Security Audit Readiness. Table of contents

John Essner, CISO Office of Information Technology State of New Jersey

Cost effective methods of test environment management. Prabhu Meruga Director - Solution Engineering 16 th July SCQAA Irvine, CA

GTA Board of Directors September 4, 2014

Department of Veterans Affairs VA Directive 6004 CONFIGURATION, CHANGE, AND RELEASE MANAGEMENT PROGRAMS

An Overview of Information Security Frameworks. Presented to TIF September 25, 2013

Policy Title: HIPAA Security Awareness and Training

Important Dates Calendar FALL

Managing Open Source Code Best Practices

Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems

McAfee Endpoint Protection Products

Ashley Institute of Training Schedule of VET Tuition Fees 2015

Pega Texas Conference 2012 Department of Veterans Affairs. Terry Riffel, Director Financial Services Center October 26, 2012

Homeland Security Grants Management Louisiana Emergency Preparedness Association (LEPA)

Marsha Ingram, Head of Corporate Affairs

Computing & Telecommunications Services Monthly Report March 2015

Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security

Cisco & Big Data Security

Cyber Security An Exercise in Predicting the Future

Deep Security Vulnerability Protection Summary

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

CAFIS REPORT

Unified Security Anywhere HIPAA COMPLIANCE ACHIEVING HIPAA COMPLIANCE WITH MASERGY PROFESSIONAL SERVICES

Colorado s Accountable Care Collaborative

MICHIGAN AUDIT REPORT OFFICE OF THE AUDITOR GENERAL THOMAS H. MCTAVISH, C.P.A. AUDITOR GENERAL

Consumer ID Theft Total Costs

Business Continuity in Healthcare

NICE and Framework Overview

Department of Veterans Affairs VA Directive 6403 SOFTWARE ASSET MANAGEMENT

Deep Security/Intrusion Defense Firewall - IDS/IPS Coverage Statistics and Comparison

A!Team!Cymru!EIS!Report:!Growing!Exploitation!of!Small! OfCice!Routers!Creating!Serious!Risks!

JBoss Enterprise Middleware. The foundation of your open source middleware reference architecture

Deep Security Intrusion Detection & Prevention (IDS/IPS) Coverage Statistics and Comparison

Systems Administrator. July 2014 Sharon Welna, Information Security Officer

Certification Programs

Auditing Security: Lessons Learned From Healthcare Security Breaches

VA Telehealth Technologies: Rural. VISTA / CPRS For Patient Care: Rural. VA Telehealth Technologies EMR / CPRS Order Entry. Care Coordination: Concept

Council, 6 February IT Report. Executive summary and recommendations. Introduction

Healthcare Cybersecurity Risk Management: Keys To an Effective Plan

Briefing Outline. Overview of the CUI Program. CUI and IT Implementation

In accordance with risk management best practices, below describes the standard process for enterprise risk management (ERM), including:

How To Achieve Pca Compliance With Redhat Enterprise Linux

Conducting due diligence and managing cybersecurity in medical technology investments

Information Security Office

The Protection Mission a constant endeavor

CPSC ITDS/RAM Pilot System: PGA Message Set

Audit Report. Management of Naval Reactors' Cyber Security Program

Centers of Academic Excellence in Cyber Security (CAE-C) Knowledge Units Review

VICTORIAN CARDIAC OUTCOMES REGISTRY. Data Management Policy

HITRUST CSF Assurance Program You Need a HITRUST CSF Assessment Now What?

U.S. Department of Energy Golden Field Office Information Technology. GOanywhere Real World Virtual Desktops in the DOE

CENTERPOINT ENERGY TEXARKANA SERVICE AREA GAS SUPPLY RATE (GSR) JULY Small Commercial Service (SCS-1) GSR

Boston Traffic Management Center Activity Report for FY 2013 Real-time Traffic Signal Adjustments

Attachment A. Identification of Risks/Cybersecurity Governance

Manchester City Council Report for Information. Managing Attendance (Real Time Absence Reporting)

How To Ensure The C.E.A.S.A

Information Protection Framework: Data Security Compliance and Today s Healthcare Industry

Goals. Understanding security testing

VA Office of Inspector General

Virtual Desktops Security Test Report

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

NASDAQ DUBAI TRADING AND SETTLEMENT CALENDAR On US Federal Reserve Holidays, no settlements will take place for USD.

Data Loss Prevention Best Practices for Healthcare

Transcription:

VA Medical Device Protection Program (MDPP) Presented to National Institute for Standards and Technology (NIST) Health Security Conference May 11, 2011

Table of Contents Introduction MDPP Timeline and Evolution What s Next Conclusion 2

Achieving Security Takes Teamwork Photo Source: Idaho Department of Commerce 3

Data Protection and Patient Safety are Critical VA Priorities Any Personally Identifiable Information (PII) and electronic Patient Health Information (ephi) that is collected, stored, or transmitted across medical device systems should be protected with the best possible security tools for the deployed systems. Photo Source: Department of Health and Human Services Health Information Portability and Accountability Act (HIPAA) VA must secure medical devices in order to maintain data integrity and prevent invalid results that may negatively impact patient safety! 4

Threats to VA Medical Devices Medical devices can restrict the application of operating system patches and malware protection updates, which can potentially cause: An increased vulnerability to malware attacks and potential to serve as an entry point for attacks into the trusted network A risk to patient safety and protection of patient sensitive information A medical device is defined as any component(s) [hardware, software] that is/are: Food and Drug Administration (FDA) 510K certified; Any device that is used in patient healthcare for diagnosis, treatment, or monitoring; Any ancillary support device including but not limited to external disk storage, database servers, gateway or middleware interface devices that are required for the medical device to function properly. Networked medical device: Any medical device that is connected to the VA network. Photo Source: Department of Veterans Affairs Networked medical system: Any group of devices that make up a complete medical system. These are multiple devices that are required for the medical system to function as intended by the manufacturer/vendor. 5

Threats to VA Medical Devices (con t) VA is tracking reported incidents on networked devices 60 Medical Device Infections Jan 2009 - April 2011 50 *173 Medical Device Infections since January 2009 40 30 20 10 0 Jan - Mar 2009 Apr - Jun 2009 Jul - Sep 2009 Oct - Dec 2009 Jan - Mar 2010 Apr - Jun 2010 Jul - Sep 2010 Oct - Dec 2010 Jan - Mar 2011 Apr - Jun 2011 (Source: VA Network Security and Operations Center (VA-0NSOC) Weekly Threat Brief) 6

Table of Contents Introduction MDPP Timeline and Evolution What s Next Conclusion 7

Medical Device Protection Program To better safeguard medical devices, VA developed a comprehensive security initiative that encompasses: Communication Training Validation Scanning Remediation Patching Medical device isolation architecture (MDIA) 8

MDPP Has Evolved Over Time 2004 MDIA Guidance Sept 2009 Updated MDIA Guidance Released April 2010: Senior Mgmt Support 2011 MDPP Continues to Progress Jan 2009: Medical Device Infections Feb 2010: Creation of MDPP Sept 2010: 2004 MDIA Access Control Lists (ACLs) Completed 3270 ACLs MDPP has grown and changed over time to meet the challenge of evolving threats to VA medical devices The program will continue to grow and change to create a service oriented architecture that meets the needs of the organization and addresses the risks of medical devices 9

MDIA Has Been Implemented VA-wide As of September 30 th, 2010, approximately 50,000 medical devices have been isolated behind nearly 3,200 virtual local area networks (VLANs) It took approximately 7 months to isolate the medical devices behind VLANs to meet MDIA guidance MDPP is Now in an Operations and Maintenance (O&M) Phase 10

MDPP is Currently Focused on the Validation Phase of the O&M Process 17% ACL Validation VA s IT personnel are reviewing all ACLs 43% 40% Green (Pass) Yellow (Fail) Red (Fail) VA has begun validation assessments of the program as of FY11 Q2, ensuring that the VLANs are in place and maintained * 86 ACLs at 6 Facilities were reviewed Multiple compliance and oversight audits occur independently of one another 11

Table of Contents Introduction MDPP Timeline and Evolution What s Next Conclusion 12

VA is Moving Forward with Numerous MDPP Activities Communications: Training: Building solutions through collaboration to reduce risk and promote innovation in the medical device network Working with internal and external partners to identify leading information protection and security best practices Continuing training initiatives Closing out Medical Device Incident Response (MDIR) training Presenting MDPP to all VA regional facilities Conducting targeted trainings at VA facilities requesting additional support 13

VA is Moving Forward with Numerous MDPP Activities (con t) Validation: Scanning: Employing validation assessments to maintain the integrity of the MDIA implementation Internal validation process began 2nd Qtr FY11 Working on Medical Device Sanitization Guidance Planning a pilot program to formalize operating procedures for scanning medical devices Continuing regularly scheduled scans in conjunction with local facility Biomedical Engineering Scanning devices upon initial introduction to network Tracking vulnerabilities to risk posture 14

VA is Moving Forward with Numerous MDPP Activities (con t) Remediation/Patching : Looking to IT staff, Biomedical Engineering, and device manufacturers to resolve problems Developing technical solutions and providing oversight of device manufacturers Relying on user facilities to keep FDA informed of device malfunctions Activating a single patching server for all medical devices to use Initiating a pilot test of a vendor patching solution Installation of the hardware and software underway 15

VA is Moving Forward with Numerous MDPP Activities (con t) MDIA: Developing strategy and technology for tighter security boundary, audit capabilities, and threat detection Refreshing 2009 MDIA Guidance Rewriting the ACL Rule set Drafting MDPP Security Architecture Requirements document 16

Table of Contents Introduction MDPP Timeline and Evolution What s Next Conclusion 17

MDPP is Only as Good as the Sum of Its Parts Success depends on teamwork, communication, and compliance with established protocols 18

Wrap Up: Medical Device Security Best Practices Requires an organization approach Needs to become a core competency of the Biomedical Engineering community Will have many partners, but we need to own the security of our devices Must have a thoughtful, well reasoned, risk based approach that recognizes that medical devices, at times, need to be treated differently VA is committed to ensuring the security of medical devices and upholding the world class patient care that our Nation s Veterans expect from us 19

Wrap Up: MDPP Requirements Pre-procurement assessments must be complete No Internet access Always scan media No changes to ACLs without Change Control Board (CCB) approvals Use the Patch Repository Update DAT files often These are requisites for good computing and can be applied beyond medical device security 20

Questions? VA Key Contacts Field Security Services (FSS) Health Information Security Division (HISD): VAFSOHISD@va.gov Veterans Health Administration (VHA) Healthcare Technology Management (HTM): VHACOHTMIT@va.gov 21