advanced strategies in hipaa security risk analysismanagement and oversight roi/benefits realization...

56
Advanced Strategies in HIPAA Security Risk Analysis Margret Amatayakul, RHIA, CHPS, FHIMSS Steven S. Lazarus, PhD, FHIMSS

Upload: others

Post on 08-Aug-2020

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Advanced Strategies in HIPAA Security Risk Analysismanagement and oversight ROI/benefits realization Training and education Vendor selection Product/ market analysis Information management

Advanced Strategies in HIPAA Security Risk Analysis

Margret Amatayakul, RHIA, CHPS, FHIMSS

Steven S. Lazarus, PhD, FHIMSS

Page 2: Advanced Strategies in HIPAA Security Risk Analysismanagement and oversight ROI/benefits realization Training and education Vendor selection Product/ market analysis Information management

2Copyright © 2004, Margret\A Consulting, LLC and Boundary Information Group

Margret A.

Margret\A Consulting, LLCStrategies for the digital future of healthcare information

Strategic IT planningCompliance assessmentsWork flow redesignProject management and oversight ROI/benefits realizationTraining and educationVendor selectionProduct/ market analysis

Information management and systems consultant, focusing on electronic health records and their value proposition

Adjunct faculty, College of St. Scholastica; former positions with CPRI, AHIMA, Univ. of Ill., IEEI

Active participant in standards development

Speaker and author (Silver ASHPE Awards for “HIPAA on the Job” column in Journal of AHIMA)

Page 3: Advanced Strategies in HIPAA Security Risk Analysismanagement and oversight ROI/benefits realization Training and education Vendor selection Product/ market analysis Information management

3Copyright © 2004, Margret\A Consulting, LLC and Boundary Information Group

Steve Lazarus.

Boundary Information GroupStrategies for workflow, productivity, quality and patient satisfaction improvement through health care information

Business process consultant focusing on electronic health records, and electronic transactions between organizationsFormer positions with MGMA, University of Denver, Dartmouth College; advisor to national associationsActive leader in the Workgroup for Electronic Data Interchange (WEDI)Speaker and author (two books on HIPAA Security and one forthcoming on electronic health record)

Strategic IT business process planningROI/benefits realizationProject management and oversightWorkflow redesignEducation and trainingVendor selection and enhanced use of vendor productsFacilitate collaborations among organizations to share/exchange health care information

Page 4: Advanced Strategies in HIPAA Security Risk Analysismanagement and oversight ROI/benefits realization Training and education Vendor selection Product/ market analysis Information management

4Copyright © 2004, Margret\A Consulting, LLC and Boundary Information Group

Agenda

Security Rule in context of HIPAA

Risk-based Approach to Information Security

Executive Risk Mitigation Strategies

Planning and Managing the Project

Risk Management Approaches

“Best Practices” for Ongoing Compliance

Page 5: Advanced Strategies in HIPAA Security Risk Analysismanagement and oversight ROI/benefits realization Training and education Vendor selection Product/ market analysis Information management

Advanced Strategies in HIPAA Security Risk Analysis

Security Rule in context of HIPAA

Page 6: Advanced Strategies in HIPAA Security Risk Analysismanagement and oversight ROI/benefits realization Training and education Vendor selection Product/ market analysis Information management

Health Insurance Portability & Accountability Act

Uniform data standards for

patient medical record

informationUses and

DisclosuresPatient

RightsAdmin

Practices

57 Standards

Privacy

Title III: Medical Savingsand Tax Deduction

Title IV: Group Health Plan Provisions

Title V: Revenue Offset Provisions

Title I: InsurancePortability

Title II: Fraud & Abuse,Administrative Simplification,

Medical Liability Reform

April 14, 2003

Security

April 21, 2005

9 Standards

AdministrativeSafeguards

PhysicalSafeguards

4 Standards

TechnicalSafeguards

5 Standards

Recommendations

6Copyright © 2004, Margret\A Consulting, LLC and Boundary Information Group

ASC X12Nfor claims, eligibility,

etc.

Employer

Health Plan

Individual

Provider

Transactions

Variable 2004-?

Code Sets

Identifiers

October 16, 2003

Page 7: Advanced Strategies in HIPAA Security Risk Analysismanagement and oversight ROI/benefits realization Training and education Vendor selection Product/ market analysis Information management

7Copyright © 2004, Margret\A Consulting, LLC and Boundary Information Group

“Mini-Security Rule”

“Mini-security rule” in Privacy Rule is not sufficient

Does not address risk analysisFocuses on incidental disclosuresLacks specificityEfforts may be 2 – 4 years old

“Mini-security rule” does address the need to “secure” paper and oral forms of PHI

Page 8: Advanced Strategies in HIPAA Security Risk Analysismanagement and oversight ROI/benefits realization Training and education Vendor selection Product/ market analysis Information management

7. Termination procedures for members of workforce & business associate contracts

7. Investigation & remediation; policies addressing non-employment or retention of sanctioned individuals

6. Ensure uses & disclosures consistent with notice; information system activity review, risk management, evaluation

6. Audits &/or other evaluation techniques to monitor compliance

5. Complaint/incident handling & enforcement of sanction policy

5. System to respond to allegations & the enforcement of disciplinary action

4. Privacy complaint & security incident reporting procedures

4. Process to receive complaints & protect whistleblowers from retaliation

3. Training & awareness building3. Regular, effective education & training for all affected employees

2. Designation of information privacy official & information security official

2. Designation of chief compliance officer; reports to CEO & governing body

1. Privacy & security policies & procedures

1. Written standards of conduct & policies & procedures

Privacy and SecurityFraud and Abuse

8Copyright © 2004, Margret\A Consulting, LLC and Boundary Information Group

Fraud & Abuse Sets Precedence

Page 9: Advanced Strategies in HIPAA Security Risk Analysismanagement and oversight ROI/benefits realization Training and education Vendor selection Product/ market analysis Information management

9Copyright © 2004, Margret\A Consulting, LLC and Boundary Information Group

Security of TCS

Promote adoption of electronic transactionsAchieve benefits of “direct connectivity”Claims attachments coming

Page 10: Advanced Strategies in HIPAA Security Risk Analysismanagement and oversight ROI/benefits realization Training and education Vendor selection Product/ market analysis Information management

10Copyright © 2004, Margret\A Consulting, LLC and Boundary Information Group

Uniform Data Standards for PMRI

RecommendationsInteroperabilityComparability

EHR InitiativesUniform data setsPay-for-performance

Heightened need for:Contingency planningAccess controlsAuthentication

InteroperabilityHL7DICOMNCPDP SCRIPTIEEE 1073

ComparabilitySNOMED CT®LOINCFederal Drug Terminologies

Page 11: Advanced Strategies in HIPAA Security Risk Analysismanagement and oversight ROI/benefits realization Training and education Vendor selection Product/ market analysis Information management

Advanced Strategies in HIPAA Security Risk Analysis

Using a Risk-based Approach to Information Security

Page 12: Advanced Strategies in HIPAA Security Risk Analysismanagement and oversight ROI/benefits realization Training and education Vendor selection Product/ market analysis Information management

12Copyright © 2004, Margret\A Consulting, LLC and Boundary Information Group

ComprehensiveMust address allaspects of security for electronic PHI

ScalableSize, complexity, capabilitiesTechnical infrastructureCostsProbability & criticality of risks

Technology-neutralStable, but flexible

StandardsRequire compliance

Required & Addressable Implementation Specifications

Implement or document alternative

Very specific/very general, e.g.,

Maintenance recordsEncryption

Page 13: Advanced Strategies in HIPAA Security Risk Analysismanagement and oversight ROI/benefits realization Training and education Vendor selection Product/ market analysis Information management

13Copyright © 2004, Margret\A Consulting, LLC and Boundary Information Group

Benefits of Risk Analysis

Comply with HIPAA

Build a business case

Help executives meet fiduciary duties

Build staff awareness & support

Uncover excellent new ideas

Reduce damages if you are sued

Page 14: Advanced Strategies in HIPAA Security Risk Analysismanagement and oversight ROI/benefits realization Training and education Vendor selection Product/ market analysis Information management

14Copyright © 2004, Margret\A Consulting, LLC and Boundary Information Group

Examples

Encrypted e-mail

Reconstruction of examination rooms

SSL Web portal

White noise, tranquility fountains, wall hangings

Page 15: Advanced Strategies in HIPAA Security Risk Analysismanagement and oversight ROI/benefits realization Training and education Vendor selection Product/ market analysis Information management

15Copyright © 2004, Margret\A Consulting, LLC and Boundary Information Group

=Event

Agent

Target

+

Threats Vulnerabilities

Risk Analysis Process

Page 16: Advanced Strategies in HIPAA Security Risk Analysismanagement and oversight ROI/benefits realization Training and education Vendor selection Product/ market analysis Information management

16Copyright © 2004, Margret\A Consulting, LLC and Boundary Information Group

Targets – Agents - Events

WrongfulDisclosure

Privacy Violation

ErroneousInformation

Medical Errors

Lack of CriticalInformationProductivity

Recovery Cost

False ClaimsLack of

Evidence

Event

Confidentiality

Integrity

Availability

Accountability

Target

Unauthorized Access

Modification/Destruction of

Data

Denial of Service

Repudiation

Agent

Page 17: Advanced Strategies in HIPAA Security Risk Analysismanagement and oversight ROI/benefits realization Training and education Vendor selection Product/ market analysis Information management

17Copyright © 2004, Margret\A Consulting, LLC and Boundary Information Group

Threat Sources

Accidental ActsIncidental disclosuresErrors and omissionsProximity to risk areasWork stoppageEquipment malfunction

Deliberate ActsInattention/inactionMisuse/abuse of privilegesFraudTheft/embezzlementExtortionVandalismCrime

Environmental threats

ContaminationFireFloodWeatherPower HVAC

Page 18: Advanced Strategies in HIPAA Security Risk Analysismanagement and oversight ROI/benefits realization Training and education Vendor selection Product/ market analysis Information management

18Copyright © 2004, Margret\A Consulting, LLC and Boundary Information Group

Internal ThreatsSource: eWeek, January 21, 2002

57% - Users accessing resources they are not entitled to

43% - Accounts left open after employee has left company

27% - Access to contractors not terminated upon project completion

21% - Attempted or successful break-in by angry employee

Tangible LossesCost of data recoveryLost user productivityInvestigate/prosecute offendersInsurance premium increasesFees for contract/regulatory defenseCost of fines

Intangible IssuesHarm to patientLost patient & business partner confidence & loyaltyLost reputation, contributing to difficulty in recruitmentLower employee moraleCareer-threatening corporate officer liabilities

Primary Healthcare Concerns

.Adapted from: Journal of Healthcare Information Management, 17/1Surveys

Page 19: Advanced Strategies in HIPAA Security Risk Analysismanagement and oversight ROI/benefits realization Training and education Vendor selection Product/ market analysis Information management

19Copyright © 2004, Margret\A Consulting, LLC and Boundary Information Group

Vulnerabilities

AdministrativePolicyAccountabilityManagementResourcesTrainingDocumentation

PhysicalEntrance/exit controlsSupervision/monitoringLocks, barriers, routesHardwarePropertyDisposal

TechnicalNew applicationsMajor modificationsNetwork reconfigurationNew hardwareOpen portsArchitectureControls

Page 20: Advanced Strategies in HIPAA Security Risk Analysismanagement and oversight ROI/benefits realization Training and education Vendor selection Product/ market analysis Information management

20Copyright © 2004, Margret\A Consulting, LLC and Boundary Information Group

Security Vulnerability Tests

Policy & procedure reviewWorkforce perception surveyCertification/accreditationDisaster recovery plan drillsSocial engineeringDocument grindingFacility security reviewCommunications testingWireless testingBackup, maintenance & change control log reviewInternet presence identification & testing

Page 21: Advanced Strategies in HIPAA Security Risk Analysismanagement and oversight ROI/benefits realization Training and education Vendor selection Product/ market analysis Information management

Probability of Occurrence

Has it happened before?How frequently?Does threat source have

Access, knowledge, motivation?Predictability, forewarning?Known speed of onset, spread, duration?

Are controls available toPrevent?Deter?Detect?React?Recover?

Patient careConfidentialityComplaint/lawsuitReduce productivityLoss of revenueCost to remediateLicensure/ accreditationConsumer confidence Competitive advantage

Criticality of Impact

21Copyright © 2004, Margret\A Consulting, LLC and Boundary Information Group

Page 22: Advanced Strategies in HIPAA Security Risk Analysismanagement and oversight ROI/benefits realization Training and education Vendor selection Product/ market analysis Information management

22Copyright © 2004, Margret\A Consulting, LLC and Boundary Information Group

Risk Ranking

HighMediumLow

321Low

642Medium

963High

Criticality of ImpactProbability of Occurrence

Page 23: Advanced Strategies in HIPAA Security Risk Analysismanagement and oversight ROI/benefits realization Training and education Vendor selection Product/ market analysis Information management

23Copyright © 2004, Margret\A Consulting, LLC and Boundary Information Group

Example

Page 24: Advanced Strategies in HIPAA Security Risk Analysismanagement and oversight ROI/benefits realization Training and education Vendor selection Product/ market analysis Information management

Advanced Strategies in HIPAA Security Risk Analysis

Executive Risk Mitigation Strategies

Page 25: Advanced Strategies in HIPAA Security Risk Analysismanagement and oversight ROI/benefits realization Training and education Vendor selection Product/ market analysis Information management

25Copyright © 2004, Margret\A Consulting, LLC and Boundary Information Group

News

Foreign hacker stole 4,000 medical records from University of Washington, mid-2000Kaiser Permanente sent 858 patients’ medical records to 19 before error in e-mail upgrade system was caught, Aug, 2000A 13-year-old daughter brought to work at University Medical Center, Jacksonville, stole patients’ names and phone numbers and called them saying they either had AIDS or were pregnant, March, 1996A 17-year-old boy reconfigured physicians’ central paging system at Inova Fairfax Hospital to forward pages to his own pager, & called in prescriptions which nurses administered to patients. Dec, 2000

“It won’t happen here”

Page 26: Advanced Strategies in HIPAA Security Risk Analysismanagement and oversight ROI/benefits realization Training and education Vendor selection Product/ market analysis Information management

26Copyright © 2004, Margret\A Consulting, LLC and Boundary Information Group

Executive Engagement

Sarbanes-Oxley Act of 2002, PL 107-204, impact on private sector:

Management must establish and maintain an adequate internal control structure and procedures for financial reporting

“A secure information infrastructure is central to many companies’ operational capabilities. Hence, the material condition of the business will be assessed, and certified by officers, in that light.”

Richard Marks, Davis Wright Tremaine, LLP

Page 27: Advanced Strategies in HIPAA Security Risk Analysismanagement and oversight ROI/benefits realization Training and education Vendor selection Product/ market analysis Information management

27Copyright © 2004, Margret\A Consulting, LLC and Boundary Information Group

Risk Mitigation Options

Source: NIST, Special Publication 800-30, “Risk Management Guide for Information Technology Systems,” U.S. Government Printing Office, Washington, DC, 2001.

Transfer risk by using other options to compensate for the loss, such as insurance

Risk Transference

Lower risk of loss by acknowledging vulnerability & researching controls to correct

Research & Acknowledgement

Manage risk by developing a plan that prioritizes, implements, and maintains controls

Risk Planning

Limit risk with controls that minimize adverse impact of a threat’s exercising a vulnerability

Risk Limitation

Avoid risk by eliminating cause and/or consequence

Risk Avoidance

Accept risk & continue operating or implement controls to lower risk to an acceptable level

Risk AssumptionNIST DefinitionOption

Page 28: Advanced Strategies in HIPAA Security Risk Analysismanagement and oversight ROI/benefits realization Training and education Vendor selection Product/ market analysis Information management

28Copyright © 2004, Margret\A Consulting, LLC and Boundary Information Group

Wasn’t this done before?

AssessmentIdentify Vulnerabilities

Prioritize by:Privacy RuleImportance

Risk AnalysisIdentify Vulnerabilities

Identify Threats

MeasureProbability of OccurrenceCriticality of Impact

Determine Risk

Select ControlsIdentify Residual Risk

++

=

Page 29: Advanced Strategies in HIPAA Security Risk Analysismanagement and oversight ROI/benefits realization Training and education Vendor selection Product/ market analysis Information management

29Copyright © 2004, Margret\A Consulting, LLC and Boundary Information Group

Business Case Example

HIPAA doesn’t require a hot siteWhat form of DRP should you recommend for this environment?

Top ranking states in terms of number of killer tornadoes:

Texas Oklahoma Arkansas Alabama

Mississippi Illinois

Missouri Indiana

Louisiana Tennessee

Page 30: Advanced Strategies in HIPAA Security Risk Analysismanagement and oversight ROI/benefits realization Training and education Vendor selection Product/ market analysis Information management

30Copyright © 2004, Margret\A Consulting, LLC and Boundary Information Group

Residual Risk

Level of risk remaining after controls have been implemented

No such thing as 100% secure

Estimate in same manner as original risk determination:

Probability of a threat exploiting a vulnerabilityCriticality of impactProbability plus criticality with controldefine residual risk

Page 31: Advanced Strategies in HIPAA Security Risk Analysismanagement and oversight ROI/benefits realization Training and education Vendor selection Product/ market analysis Information management

Advanced Strategies in HIPAA Security Risk Analysis

Planning and Managing the Risk Analysis Project

Page 32: Advanced Strategies in HIPAA Security Risk Analysismanagement and oversight ROI/benefits realization Training and education Vendor selection Product/ market analysis Information management

32Copyright © 2004, Margret\A Consulting, LLC and Boundary Information Group

Project vs. Process

Executive SupportObjectivesScopeStaffingBudgetTimelineReporting ResultsObtaining Approval for ControlsIdentifying Residual Risk

ImplementationStaffingExternal resourcesVendor selectionLicenses & capitalInstallation & testingTrainingDocumentation

Ongoing monitoring for compliance

Page 33: Advanced Strategies in HIPAA Security Risk Analysismanagement and oversight ROI/benefits realization Training and education Vendor selection Product/ market analysis Information management

33Copyright © 2004, Margret\A Consulting, LLC and Boundary Information Group

Objectives & Scope

ePHI

PHI

Page 34: Advanced Strategies in HIPAA Security Risk Analysismanagement and oversight ROI/benefits realization Training and education Vendor selection Product/ market analysis Information management

34Copyright © 2004, Margret\A Consulting, LLC and Boundary Information Group

Staffing the Project Team

Interpret message for executivesExecutive SponsorCoordinate with Privacy Rule complianceInformation Privacy OfficialGain insight for training programsTrainers

Represent user interests, assures controls meet other legal requirements

HR, Labor Relations, Legal, Contract Management

Probability/criticality estimates, support implementation, represent customers

Representatives of Other Areas Monitoring Risk

Identify vulnerabilities, evaluate technical capability, learn administrative controls

I.T. Professionals

Understand threats, evaluate functionality of controls, gain buy-in

User Representatives

Team Leader, Project Manager, Internal Consultant

Information Security OfficialPurposeMembers

Page 35: Advanced Strategies in HIPAA Security Risk Analysismanagement and oversight ROI/benefits realization Training and education Vendor selection Product/ market analysis Information management

35Copyright © 2004, Margret\A Consulting, LLC and Boundary Information Group

Budget & Timeline

StaffExternal resourcesLearning & benchmarking resourcesSoftware toolsAssessment tools & servicesResource office Apr 2

1

2005

$

$

$

$

$

$

Page 36: Advanced Strategies in HIPAA Security Risk Analysismanagement and oversight ROI/benefits realization Training and education Vendor selection Product/ market analysis Information management

36Copyright © 2004, Margret\A Consulting, LLC and Boundary Information Group

Results & Approval

Page 37: Advanced Strategies in HIPAA Security Risk Analysismanagement and oversight ROI/benefits realization Training and education Vendor selection Product/ market analysis Information management

Advanced Strategies in HIPAA Security Risk Analysis

Risk Management Approaches

Page 38: Advanced Strategies in HIPAA Security Risk Analysismanagement and oversight ROI/benefits realization Training and education Vendor selection Product/ market analysis Information management

38Copyright © 2004, Margret\A Consulting, LLC and Boundary Information Group

Risk Analysis Approaches

QualitativeScenario-based

Rating probability and criticality and ranking risk

Integrates administrative, physical, and technical factors

QuantitativeAttempts to determine annualized loss expectancy from value of information assets

Difficult to assign monetary value to health care information

Page 39: Advanced Strategies in HIPAA Security Risk Analysismanagement and oversight ROI/benefits realization Training and education Vendor selection Product/ market analysis Information management

39Copyright © 2004, Margret\A Consulting, LLC and Boundary Information Group

Quantitative Analysis

Annualized Loss Expectancy (ALE):Asset value, times% of asset loss caused by threat, timesFrequency of threat occurrence in a year

Cost of Safeguard:Purchase, development, and/or licensing costsPhysical installation costs; disruption to normal productivity during installation and testingNormal operating costs, resource allocation, and maintenance/repair costs

Cost of Safeguard vs. ALE:Positive, recommend remediationNegative, consider other alternatives

Page 40: Advanced Strategies in HIPAA Security Risk Analysismanagement and oversight ROI/benefits realization Training and education Vendor selection Product/ market analysis Information management

40Copyright © 2004, Margret\A Consulting, LLC and Boundary Information Group

Steps to Conduct the Process

1. Executive management guidance on risk

2. Inventory & characterize policies, procedures, processes, physical layout, systems

3. Identify threats

4. Identify vulnerabilities

5. Determine likelihood risks may actually occur

6. Analyze impact if risk actually occurs

7. Determine & rate each risk

8. Analyze appropriate types of controls

9. Recommend controls & describe residual risk

10. Document results

Page 41: Advanced Strategies in HIPAA Security Risk Analysismanagement and oversight ROI/benefits realization Training and education Vendor selection Product/ market analysis Information management

41Copyright © 2004, Margret\A Consulting, LLC and Boundary Information Group

Practical Assessment

Administrative

Physical

Technical

CorporateSite/DepartmentApplicationData CenterNetworkPlatform

Page 42: Advanced Strategies in HIPAA Security Risk Analysismanagement and oversight ROI/benefits realization Training and education Vendor selection Product/ market analysis Information management

42Copyright © 2004, Margret\A Consulting, LLC and Boundary Information Group

Pair Threats & Vulnerabilities

User log off on exit

Integrity issue, rotation of users need accountability

Exam room

Notebook

User log off on exit reminder &automatic logoff set at 10 min.

Public area, not staffed continuously

Outpatient reception area

Desktop

Screen saver only

Staff only area, staffed continuously, all workstations turned away from public, high need for availability

Nursing units

Desktop

ControlVulnerability/Threat Analysis

LocationWorkstation

Page 43: Advanced Strategies in HIPAA Security Risk Analysismanagement and oversight ROI/benefits realization Training and education Vendor selection Product/ market analysis Information management

43Copyright © 2004, Margret\A Consulting, LLC and Boundary Information Group

Security Architecture

Structure of controls to achieve functions

Security architecture

Control that provides security function

Security mechanism

Function to be accomplished

Security service

PerimeterNetwork

HostApplication

Data

Page 44: Advanced Strategies in HIPAA Security Risk Analysismanagement and oversight ROI/benefits realization Training and education Vendor selection Product/ market analysis Information management

Advanced Strategies in HIPAA Security Risk Analysis

“Best Practices” for Ongoing Compliance

Page 45: Advanced Strategies in HIPAA Security Risk Analysismanagement and oversight ROI/benefits realization Training and education Vendor selection Product/ market analysis Information management

45Copyright © 2004, Margret\A Consulting, LLC and Boundary Information Group

“Best Practices”

Most effective and efficient“Most appropriate”What a prudent person would doWhether or not specified in regulations

Most expensiveExpected to fill every gapNecessarily common in industry

Page 46: Advanced Strategies in HIPAA Security Risk Analysismanagement and oversight ROI/benefits realization Training and education Vendor selection Product/ market analysis Information management

46Copyright © 2004, Margret\A Consulting, LLC and Boundary Information Group

Proposed Security Rule

Access controlsAlarmsAudit trailEncryptionEntity authenticationEvent reportingIntegrity controlsMessage authentication

Page 47: Advanced Strategies in HIPAA Security Risk Analysismanagement and oversight ROI/benefits realization Training and education Vendor selection Product/ market analysis Information management

SecurityIdentity

Management

PasswordReset

AccessManagement

Software

Bio-metrics

PasswordSynchron-

ization

SingleSign-on

Tokens & Smart Cards

47Copyright © 2004, Margret\A Consulting, LLC and Boundary Information Group

Page 48: Advanced Strategies in HIPAA Security Risk Analysismanagement and oversight ROI/benefits realization Training and education Vendor selection Product/ market analysis Information management

48Copyright © 2004, Margret\A Consulting, LLC and Boundary Information Group

Local LAN

Corporate WAN

Proprietary Connectivity

Supporting Systems

Internet Gateway

SecurityEvent

Management

Page 49: Advanced Strategies in HIPAA Security Risk Analysismanagement and oversight ROI/benefits realization Training and education Vendor selection Product/ market analysis Information management

Based on conditionsContext-based

To classes of users to categories of PHI

Role-based

To each user User-based

Assigns Privileges

Access Control

49Copyright © 2004, Margret\A Consulting, LLC and Boundary Information Group

Conditions of Access

Categories of PHI

Classes ofUsers

Minimum Necessary

Page 50: Advanced Strategies in HIPAA Security Risk Analysismanagement and oversight ROI/benefits realization Training and education Vendor selection Product/ market analysis Information management

50Copyright © 2004, Margret\A Consulting, LLC and Boundary Information Group

Compliance

PoliciesStandardsProceduresSpecificationsReports & logs

All

Most

AboutHalfSome

None

Don'tHaveDon'tKnow

Extent to whichIT security decisions were guided by policySource: Information Security, 9/2002

Page 51: Advanced Strategies in HIPAA Security Risk Analysismanagement and oversight ROI/benefits realization Training and education Vendor selection Product/ market analysis Information management

51Copyright © 2004, Margret\A Consulting, LLC and Boundary Information Group

Documentation

1. Rules & Regulations Policies & Procedures Training Materials

2. Records: of Training Awareness Building

3. Contracts

4. Sensitive Findings Audit Trails Incident Reports

Page 52: Advanced Strategies in HIPAA Security Risk Analysismanagement and oversight ROI/benefits realization Training and education Vendor selection Product/ market analysis Information management

52Copyright © 2004, Margret\A Consulting, LLC and Boundary Information Group

Compliance Assurance

HIPAA Standards &

Organizational Controls

ContinuousMonitoringof Actions

TriggeredReviews

of Incidents

Management Reporting &

Documentation

Analyze

Implement

Design & Test

Changes

Auditingof Events

Page 53: Advanced Strategies in HIPAA Security Risk Analysismanagement and oversight ROI/benefits realization Training and education Vendor selection Product/ market analysis Information management

53Copyright © 2004, Margret\A Consulting, LLC and Boundary Information Group

Compliance Assurance Plan

Page 54: Advanced Strategies in HIPAA Security Risk Analysismanagement and oversight ROI/benefits realization Training and education Vendor selection Product/ market analysis Information management

54Copyright © 2004, Margret\A Consulting, LLC and Boundary Information Group

References & Resources

Required specifications and prioritization based on:

National Research Council, For the Record: Protecting Electronic Health Information

www.nap.eduSignificant reference to NIST Special Publications (SP) 800 Series documents:

http://csrc.nist.gov/ publications/nistpubs/

NIST certifying activities:http://www.niap.nist.gov

CMS IT Security –http://cms.hhs.gov/it/ security/ReferencesWEDI – www.wedi.org/snip

SP 800-30, Risk Management Guide for Information Technology Systems, Chapters 3 and 4

Revision A DRAFT, Jan. 21, 2004

SP 800-16, Information Technology Security Training Requirements, A role and performance based model

SP 800-14, Generally Accepted Principles and Practices for Securing Information Technology Systems

SP 800-33, Underlying Technical Models for Information Technology Security

SP 800-26, Security Self-Assessment Guide for Information Technology Systems

CMS Information Security Acceptable Risk Safeguards V1.1

Page 55: Advanced Strategies in HIPAA Security Risk Analysismanagement and oversight ROI/benefits realization Training and education Vendor selection Product/ market analysis Information management

References & Resourceswww.brownstone.com

AmatayakulLazarus

www.hcpro.comAmatayakul

https://catalog.ama-assn.orgAmatayakulLazarusWalshHartley

55Copyright © 2004, Margret\A Consulting, LLC and Boundary Information Group

Page 56: Advanced Strategies in HIPAA Security Risk Analysismanagement and oversight ROI/benefits realization Training and education Vendor selection Product/ market analysis Information management

56Copyright © 2004, Margret\A Consulting, LLC and Boundary Information Group

Contact Information

Margret Amatayakul, RHIA, CHPS, FHIMSSMargret\A Consulting, LLCSchaumburg, [email protected]

Steven S. Lazarus, PhD, FHIMSSBoundary Information GroupDenver, [email protected]