ALERT LOGIC FOR HIPAA COMPLIANCE



Similar documents
DETECT AND RESPOND TO THREATS FROM THE DATA CENTER TO THE CLOUD

CHEAT SHEET: PCI DSS 3.1 COMPLIANCE

DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER

PCI DSS Reporting WHITEPAPER

ALERT LOGIC LOG MANAGER & LOGREVIEW

CONTINUOUS LOG MANAGEMENT & MONITORING

PCI DSS Top 10 Reports March 2011

LOG MANAGEMENT: BEST PRACTICES

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

The Impact of HIPAA and HITECH

HIPAA and HITECH Compliance for Cloud Applications

The Cloud App Visibility Blindspot

1 Introduction Product Description Strengths and Challenges Copyright... 5

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

Payment Card Industry Data Security Standard

5 Lines of Defense You Need to Secure Your SharePoint Environment SharePoint Security Resource Kit

North American Electric Reliability Corporation (NERC) Cyber Security Standard

SANS Top 20 Critical Controls for Effective Cyber Defense

HIPAA: Understanding The Omnibus Rule and Keeping Your Business Compliant

Health Insurance Portability and Accountability Act (HIPAA) and Health Information Technology for Economic and Clinical Health Act (HITECH)

Unified Security Anywhere HIPAA COMPLIANCE ACHIEVING HIPAA COMPLIANCE WITH MASERGY PROFESSIONAL SERVICES

End-user Security Analytics Strengthens Protection with ArcSight

How To Manage Security On A Networked Computer System

Vulnerability Management

The CIO s Guide to HIPAA Compliant Text Messaging

whitepaper The Benefits of Integrating File Integrity Monitoring with SIEM

Checklist for HIPAA/HITECH Compliance Best Practices for Healthcare Information Security

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

SOLUTION BRIEF SEPTEMBER Healthcare Security Solutions: Protecting your Organization, Patients, and Information

SYMANTEC MANAGED SECURITY SERVICES. Superior information security delivered with exceptional value.

TOP 10 WAYS TO ADDRESS PCI DSS COMPLIANCE. ebook Series

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

Caretower s SIEM Managed Security Services

Preemptive security solutions for healthcare

Healthcare Compliance Solutions

HIPAA/HITECH Compliance Using VMware vcloud Air

Bridging the HIPAA/HITECH Compliance Gap

Stay ahead of insiderthreats with predictive,intelligent security

Where every interaction matters.

NEW PERSPECTIVES. Professional Fee Coding Audit: The Basics. Learn how to do these invaluable audits page 16

FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES

IBM Security QRadar Vulnerability Manager

Policy Title: HIPAA Security Awareness and Training

Trend Micro. Advanced Security Built for the Cloud

PROGRAM OVERVIEW: ALERT LOGIC SECURITY-AS-A-SERVICE FOR SERVICE PROVIDERS

IBM Internet Security Systems. The IBM Internet Security Systems approach for Health Insurance Portability and Accountability Act compliance overview

HIPAA Security Rule Compliance

FACT SHEET: Ransomware and HIPAA

Overcoming PCI Compliance Challenges

The Business Case for Security Information Management

RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief

How to Secure Your SharePoint Deployment

How To Buy Nitro Security

Protect Your Business and Customers from Online Fraud

Microsoft s cybersecurity commitment

Health Insurance Portability and Accountability Act Enterprise Compliance Auditing & Reporting ECAR for HIPAA Technical Product Overview Whitepaper

IBM Security QRadar Risk Manager

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

Please Read. Apgar & Associates, LLC apgarandassoc.com P. O. Box Portland, OR Fax

Healthcare Security and HIPAA Compliance with A10

CLOUD GUARD UNIFIED ENTERPRISE

PCI Compliance for Cloud Applications

How To Protect Your Cloud From Attack

HIPAA Compliance Guide

LOG INTELLIGENCE FOR SECURITY AND COMPLIANCE

Cyber Security An Exercise in Predicting the Future

A BETTER SOLUTION FOR MAINTAINING HEALTHCARE DATA SECURITY IN THE CLOUD

Current IBAT Endorsed Services

Extreme Networks Security Analytics G2 Vulnerability Manager

Technology Blueprint. Protect Your Servers. Guard the data and availability that enable business-critical communications

Attachment A. Identification of Risks/Cybersecurity Governance

IBM Security QRadar Risk Manager

Logging and Auditing in a Healthcare Environment

Trend Micro Cloud Security for Citrix CloudPlatform

Extreme Networks Security Analytics G2 Risk Manager

Defending Against Cyber Attacks with SessionLevel Network Security

InfoGard Healthcare Services InfoGard Laboratories Inc.

What is Security Intelligence?

Host-based Protection for ATM's

Checklist for Breach Readiness. Ali Pabrai, MSEE, CISSP (ISSMP, ISSAP) For Daily Compliance & Security Tips, Follow

Protect the data that drives our customers business. Data Security. Imperva s mission is simple:

The Education Fellowship Finance Centralisation IT Security Strategy

EMERGING THREATS & STRATEGIES FOR DEFENSE. Stephen Coty Chief Security

Transcription:

SOLUTION OVERVIEW: ALERT LOGIC FOR HIPAA COMPLIANCE AN OUNCE OF PREVENTION IS WORTH A POUND OF CURE Alert Logic provides organizations with the most advanced and cost-effective means to secure their healthcare networks and help them achieve compliance with HIPAA, HITECH and Meaningful Use mandates. As Meaningful Use is driving greater use of electronic health records (EHR) within the healthcare industry and making protected health information (PHI) more easily accessible to medical professionals, it is also creating opportunities for identity theft and medical claim fraud. Medical-related identity theft accounted for 43 percent of all identity thefts reported in the United States in 20131. Healthcare organizations are exposed to a higher risk of breach than other industries for two reasons: (a) PHI is significantly more valuable on the black market than other personally identifiable information such as credit card data, and (b) healthcare security systems are typically lagging other sectors, as evidenced by the FBI 2014 Private Industry Notification (PIN)3. The Health Insurance Portability and Accountability Act (HIPAA) outlines several administrative, physical and technical safeguards for covered entities and business associates in healthcare. Together these safeguards create a proactive approach to discovering and addressing vulnerabilities and suspicious network activity, thereby reducing risk for these organizations. Also, with the passage of the Omnibus Act of 2013 and HITECH Act of 2009, cleaning up after a breach will usually be more expensive and damaging than preventing one, making compliance with HIPAA all that much more important. Alert Logic solutions are a critical component in our overall security strategy for Methodist Health System. Protecting patient data is our number one priority and Alert Logic helps us do just that. -Wayne Keatts, Director, Enterprise Security and Architecture, Methodist Health System

SOLUTION OVERVIEW In order to comply with HIPAA, healthcare organizations and their business partners need to review log data, implement intrusion detection solutions and conduct regular vulnerability scans to help strengthen their security programs and protect PHI. The Alert Logic HIPAA Compliance suite provides broad coverage for HIPAA requirements and keeps health care applications and infrastructure secure. As a managed security and compliance solution based on a SaaS delivery model and a 24 x 7 Security Operations Center, Alert Logic keeps healthcare applications and infrastructure secure without the need for additional resources or lengthy deployment cycles that traditional security solutions require. THE ALERT LOGIC HIPAA COMPLIANCE SUITE INCLUDES: ALERT LOGIC Provides 24x7 security monitoring, expert analysis, and guidance on security events and incidents. This service increases threat detection accuracy, reduces false positives, and allows scarce IT resources to stay focused on business-critical projects. Everything is KEY HEALTHCARE INDUSTRY FACTS managed from Alert Logic s state-of-the-art, 24x7 Security Operations Center (SOC), staffed by security professionals with Global Information Assurance Certification (GIAC) from the SANS Institute. ALERT LOGIC WEB SECURITY MANAGER Proactive defense against web application attacks, providing immediate protection against zero-day attacks that signatures cannot detect and is backed by the 24 7 Security Operations Center that monitors all activity and ongoing WAF tuning to optimize protection, removing the biggest challenge of WAF utilization. ALERT LOGIC LOG MANAGER Certified security and compliance experts analyze log data to identify potential compliance issues as well as suspicious activity that may indicate a security risk. Organizations can reduce the costs associated with audit preparation, as well as gain deeper visibility into the activity occurring throughout their environments, by using Alert Logic Log Manager to Healthcare data is 50X more valuable on the black market than credit card data. 2 The number of HIPAA violation complaints has also geometrically increased since the HITECH act - in the last 3 years; there have been over 70,000 complaints. Many of the devices in a healthcare environment are under FDA scrutiny and can t receive Microsoft patches on their needed intervals, nor have their AV signatures updated automatically. automate the collection, aggregation, and normalization of log data across cloud and onpremises environments. ALERT LOGIC THREAT MANAGER Detects and prevents network intrusions, identifies vulnerabilities and mis-configurations, and automates security analysis with prebuilt alerts and reports for key compliance mandates; backed by security experts who provide detailed remediation guidance as incidents are encountered 1 Kaiser Health News, The Rise Of Medical Identity Theft In Healthcare, http://bit.ly/1nf7qhe 2 Government Health IT, A glimpse inside the $234 billion world of medical fraud, http://bit.ly/1kz3ktv 3 Reuters, Exclusive: FBI warns healthcare sector vulnerable to cyber attacks, http://reut.rs/rmogpw

MAPPING TO HIPAA/HITECH REQUIREMENTS: HIPAA RULE ALERT LOGIC MAPPING COVERAGE DETAILS ADMINISTRATIVE SAFEGUARDS: 164.308 (A) (1) SECURITY MGMT PROCESS Risk Analysis (Required) - Integrated Vulnerability Assessment delivers context-aware threat detection and mitigation Risk Management (Required) - Includes the ability to automatically aggregate and correlate anomalous behavior patterns to quickly identify and assess threats and attacks to the network Information system activity review (Required) - Leverages patented expert system, including Threat Scenario Modeling, for more accurate detection Risk Management (Required) - Detect, qualify and assess threats to web applications. Protect business-critical web applications against zero-day exploits and emerging threats and ensures uninterrupted application availability Information system activity review (Required) Implements policies and procedures to prevent, detect, contain and correct security violations 164.308 (A) (3) WORKFORCE SECURITY LOG MANAGER & LOGREVIEW Authorization/supervision (Addressable) - Tracks transitions in availability, and errors, failures and other exceptions in services that archive audit records 164.308 (A) (4) INFORMATION ACCESS MANAGEMENT LOG MANAGER & LOGREVIEW Access authorization (Addressable) - Tracks access control changes on users, admin users and groups 164.308 (A) (5) SECURITY AWARENESS AND TRAINING Access establishment and modification (Addressable) - Shows transition in system availability, shows occurrences of access to audited objects Protection from malicious software (Addressable) - Guards against malicious activity by detecting and preventing network intrusions, identifying vulnerabilities and potential misconfigurations Protection from malicious software (Addressable) - Provides active protection against Web application attacks, including SQL Injection and Cross-Site Scripting attacks 164.308 (A) (6) SECURITY INCIDENT PROCEDURES LOG MANAGER & LOGREVIEW Protection from malicious activity (Addressable) - Shows occurrences of malware infections, and changes in antivirus availability Log-in monitoring (Addressable) - Shows instances of successful or failed authentication Response & Reporting (Required) - Provides multi-factor, automated real-time detection of threats across environment; Security experts provide detailed remediation guidance on any threat incident identified in the environment Response & Reporting (Required) - Implements policies and procedures to address security incidents; security analysts provide 24x7 monitoring and ongoing tuning, along with escalation for inappropriately blocked requests 164.308 (A) (7) CONTINGENCY PLAN LOG MANAGER & LOGREVIEW FOR THREAT MANAGER, FOR WEB SECURITY MANAGER Data backup plan (Required) - Tracks transitions in database backup service availability, as well as occurrences of database backups Applications and data criticality analysis (Addressable) - GIAC-certified security experts provide ongoing security tuning in response to changing attacks and customer application changes

HIPAA RULE ALERT LOGIC MAPPING COVERAGE DETAILS PHYSICAL SAFEGUARDS: 164.310 (A) FACILITY ACCESS CONTROLS LOG MANAGER & LOGREVIEW Contingency operations (Addressable) - Logs can be transferred to Alert Logic s secure cloud, thereby preserving them against unauthorized loss, access or modification Access control and validation procedures (Addressable) - Tracks access control changes on users, admin users and groups 164.310 (D) DEVICE AND MEDIA CONTROLS LOG MANAGER & LOGREVIEW Data backup and storage (Addressable) - Shows authenticated access by a user to a database, as well as transitions in database backup service availability, and occurrences of database backups TECHNICAL SAFEGUARDS: 164.312 (A) (1) ACCESS CONTROL LOG MANAGER & LOGREVIEW Unique user identification (Required) - Tracks access control changes on users, admin users and groups 164.312 (B) AUDIT CONTROLS LOG MANAGER & LOGREVIEW Encryption and decryption (Addressable) Tracks transitions in the availability of, or errors/failures in cryptographic services that provide authentication or privacy Audit controls - Automates log collection, aggregation and normalization across sources, simplifying log searches and forensic analysis Audit controls - Provides automated security analysis with pre-built alerts and reports for key compliance mandates; visibility into raw events that are directed to or sourced from assets with EPHI data 164.312 (C) INTEGRITY LOG MANAGER & LOGREVIEW Mechanism to authenticate electronic PHI (Addressable) - Tracks transitions in the availability of, or errors/failures in services that archive audit records 164.312 (E) TRANSMISSION SECURITY LOG MANAGER & LOGREVIEW Encryption (addressable) - Tracks transitions in the availability of, or errors/ failures in cryptographic services that provide authentication or privacy 164.310 (A) FACILITY ACCESS CONTROLS LOG MANAGER & LOGREVIEW Contingency operations (Addressable) - Logs can be transferred to Alert Logic s secure cloud, thereby preserving them against unauthorized loss, access or modification Access control and validation procedures (Addressable) - Tracks access control changes on users, admin users and groups

THE ALERT LOGIC DIFFERENCE: DEEP SECURITY INSIGHTS BIG DATA ANALYTICS WITH RICH CONTENT SECURITY RESEARCH COMBINED WITH EXPERT MONITORING AND SUPPORT GLOBAL THREAT VISIBILITY ACROSS THOUSANDS OF CUSTOMERS CONTINUOUS PROTECTION PROTECTION ACROSS ENTIRE APPLICATION STACK, INCLUDING WEB APPLICATIONS 24X7 SINGLE-PANE-OF-GLASS VIEW CONSISTENT PROTECTION ACROSS CLOUD, HYBRID, AND ON-PREMISES IT LOWER TOTAL COST REDUCED STARTUP COSTS NO CAPITAL INVESTMENTS OPERATING EXPENSE THAT SCALES WITH THE BUSINESS ABOUT ALERT LOGIC Alert Logic, the leader in security and compliance solutions for the cloud, provides Security-as-a-Service for on-premises, cloud, and hybrid infrastructures, delivering deep security insight and continuous protection for customers at a lower cost than traditional security solutions. Fully managed by a team of experts, the Alert Logic Security-as-a-Service solution provides network, system and web application protection immediately, wherever your IT infrastructure resides. Alert Logic partners with the leading cloud platforms and hosting providers to protect over 3,000 organizations worldwide. Built for cloud scale, our patented platform stores petabytes of data, analyses over 400 million events and identifies over 50,000 security incidents each month, which are managed by our 24 7 Security Operations Center. Alert Logic, founded in 2002, is headquartered in Houston, Texas, with offices in Seattle, Dallas, Cardiff, Belfast and London. For more information, please visit www.alertlogic.com. 2015 Alert Logic, Inc. All rights reserved. Alert Logic and the Alert Logic logo are trademarks, registered trademarks, or servicemarks of Alert Logic, Inc. All other trademarks listed in this document are the property of their respective owners. 0615US