IT Security Requirements Under the HITECH Act RA for MU and Continuous Monitoring Lisa Broome, RPMS ISSO.

Slides:



Advertisements
Similar presentations
Applying Technical Solutions. The ables Addressable Arguable Reasonable.
Advertisements

NISTs Role in Securing Health Information AMA-IEEE Medical Technology Conference on Individualized Healthcare Kevin Stine, Information Security Specialist.
Nick Vennaro, NHIN Team (Contractor), Office of the National Coordinator for Health IT Michael Torppey, CONNECT Health IT Security Specialist (Contractor)
HIPAA: FEDERAL REGULATIONS REGARDING PATIENT SECURITY.
JEFF WILLIAMS INFORMATION SECURITY OFFICER CALIFORNIA STATE UNIVERSITY, SACRAMENTO Payment Card Industry Data Security Standard (PCI DSS) Compliance.
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Lecture 1: Overview modified from slides of Lawrie Brown.
DoD Information Technology Security Certification and Accreditation Process (DITSCAP) Phase III – Validation Thomas Howard Chris Pierce.
HIPAA Security Standards What’s happening in your office?
Security Controls – What Works
Defense-in-Depth Against Malicious Software Jeff Alexander IT Pro Evangelist Microsoft Australia
Cybersecurity Summit 2004 Andrea Norris Deputy Chief Information Officer/ Director of Division of Information Systems.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments.
Secure System Administration & Certification DITSCAP Manual (Chapter 6) Phase 4 Post Accreditation Stephen I. Khan Ted Chapman University of Tulsa Department.
Computer Security: Principles and Practice
DITSCAP Phase 2 - Verification Pramod Jampala Christopher Swenson.
Vulnerability Assessments
Beyond HIPAA, Protecting Data Key Points from the HIPAA Security Rule.
VULNERABILITY MANAGEMENT Moving Away from the Compliance Checkbox Towards Continuous Discovery.
Website Hardening HUIT IT Security | Sep
Information Security Introduction to Information Security Michael Whitman and Herbert Mattord 14-1.
SEC835 Database and Web application security Information Security Architecture.
Basics of OHSAS Occupational Health & Safety Management System
Information Systems Security Computer System Life Cycle Security.
Business Computing 550 Lesson 6. 2 Security Threats on Web Sites Issues and vulnerabilities 1.Illegal Access and Use (Hacking the system or users exposing.
Computer Security “Measures and controls that ensure confidentiality, integrity, and availability of IS assets including hardware, software, firmware,
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Module 14: Configuring Server Security Compliance
Security Mark A. Magumba. Definitions Security implies the minimization of threats and vulnerabilities A security threat is a harmful event or object.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
Web Security for Network and System Administrators1 Chapter 2 Security Processes.
Patient Data Security and Privacy Lecture # 7 PHCL 498 Amar Hijazi, Majed Alameel, Mona AlMehaid.
Utilizing the CMS Security Risk Assessment Tool Liz Hansen, PCMH CEC, ICD-10 PMC Special Consultant, GA-HITEC Member Manager, GaHIN
Meaningful Use Security Risk Analysis Passing Your Audit.
Security Standards and Threat Evaluation. Main Topic of Discussion  Methodologies  Standards  Frameworks  Measuring threats –Threat evaluation –Certification.
1 Thank you for visiting our site and welcome to the “Introduction to ISO 22000” Presentation that you requested. For more information.
OCTAVE-S on TradeSolution Inc.. Introduction Phase 1: Critical Assets and threats Phase 2: Critical IT Components Phase 3: Changes Required in current.
Security is not just… 1 A Compliance Exercise Certification and Accreditation FISMA.
Eliza de Guzman HTM 520 Health Information Exchange.
Office of Campus Information Security Driving a Security Architecture by Assessing Risk Stefan Wahe Sr. Information Security Analyst.
Cloud Computing Security Keep Your Head and Other Data Secure in the Cloud Lynne Pizzini, CISSP, CISM, CIPP Information Systems Security Officer Information.
The Culture of Healthcare Privacy, Confidentiality, and Security Lecture d This material (Comp2_Unit9d) was developed by Oregon Health and Science University,
Module 14: Securing Windows Server Overview Introduction to Securing Servers Implementing Core Server Security Hardening Servers Microsoft Baseline.
THE COUNTY OF YUBA OFFICE OF EMERGENCY SERVICES The Disaster Mitigation Act of 2000.
Juan Ortega 12/15/09 NTS355. Microsoft Security Advisory (977544) Vulnerability in SMB Could Allow Denial of Service Flaw on SMBv2 supposedly opened two.
NIST Computer Security Framework and Grids Original Slides by Irwin Gaines (FNAL) 20-Apr-2006 Freely Adapted by Bob Cowles (SLAC/OSG) for JSPG 13-Mar-2007.
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
IT Security Requirements Under the HITECH Act RA for MU and Continuous Monitoring Lisa Broome, RPMS ISSO.
IS3220 Information Technology Infrastructure Security
By Ramesh Mannava.  Overview  Introduction  10 secure software engineering topics  Agile development with security development activities  Conclusion.
OFFICE OF VA ENTERPRISE ARCHITECTURE VA EA Cybersecurity Content Line of Sight Report April 29, 2016.
Welcome Information Security Office Services Available to Counties Security Operations Center Questions.
CompTIA Security+ Certification Exam SY COMPTIA SECURITY+SY0-401 Q&A is a straight forward,efficient,and effective method of preparing for the new.
Computer Science / Risk Management and Risk Assessment Nathan Singleton.
Dr. Gerry Firmansyah CID Business Continuity and Disaster Recovery Planning for IT (W-XIV)
Information Security KRISHNAKUMAR RAGHAVAN (KK) NASWA's Information Technology Support Center 1.
Defining your requirements for a successful security (and compliance
Risk management.
THE COUNTY OF YUBA OFFICE OF EMERGENCY SERVICES
Security Standard: “reasonable security”
Secure Software Confidentiality Integrity Data Security Authentication
Compliance with hardening standards
Introduction to the Federal Defense Acquisition Regulation
CYB 110 Competitive Success/snaptutorial.com
CIS 333Competitive Success/tutorialrank.com
CIS 333 Education for Service-- tutorialrank.com.
IS4680 Security Auditing for Compliance
Information Security Awareness
Group Meeting Ming Hong Tsai Date :
Cybersecurity Threat Assessment
Presentation transcript:

IT Security Requirements Under the HITECH Act RA for MU and Continuous Monitoring Lisa Broome, RPMS ISSO

Agenda  Introduction  Threat Identification  Vulnerability Identification  Control Analysis  Risk Mitigation

Privacy & Security are key to maintaining trust in health IT Meaningful use criteria and certification standards are tools to promote health IT Meaningful use criteria and certification standards are tools to promote health IT Privacy and security are incorporated to address risks associated with increasing information sharing, access and use. Privacy and security are incorporated to address risks associated with increasing information sharing, access and use.

Risk Analysis for Meaningful Use CIA Resources and Information 45 CFR (a)(1) HITECH Act Requirements IT security is the foundation to build TRUST in health information technology & electronic information exchange.

Risk Analysis for Meaningful Use Designed to access the security posture of a system or application. Raise Management’s awareness of major security risks in their infrastructure. Propose recommendations for mitigation of these risks. Ensures IHS meets the Federal requirements for Meaningful Use.

Risk Assessment for Meaningful Use Covers: Physical, Environmental and Logical Controls Physical: How access to information is protected whether during initial, processing, storage or destruction phrase. Environmental: Gauges changes in the environment which could impact CIA of information. Logical: Include but are not limited to the use of software, collected data and hardware.

Risk Assessment for Meaningful Use When should the RA be completed for a hospital? Hospitals participating in Medicare: Year 1, RA needed prior to the end of the 90 day reporting period Year 2+, RA needed prior to the end of the 365 day reporting period (Based on fiscal year) Hospitals participating in Medicaid: Year 1, No RA needed Year 2, RA needed prior to the end of their 90 day period (any consecutive 90 day period in fiscal year) Year 3, RA needed prior to the end of the 365 day reporting period (Based on fiscal year) Note: All Federal sites must complete monthly Secure Fusion and Annual Risk Analysis survey in order to maintain SA (formerly C&A).

Risk Assessment for Meaningful Use  When Should a RA be completed for an EP?  EP participating in Medicare:  Year 1, RA needed prior to the end of their 90 day reporting period  Year 2+, RA needed prior to the end of their 365 day reporting period (calendar year)  EP participating in Medicaid:  Year 1, no RA needed  Year 2, RA needed prior to the end of their 90 day reporting period  Year 3+, RA needed prior to the end of their 365 day reporting period (calendar year)

Threat Identification  Threat: The potential for a particular threat-source to successfully exercise a specific vulnerability.  Facilities must evaluate the potential for a particular threat source to successfully exercise a particular vulnerability, the impact to the facility and corresponding response using a hazard specific scale.  Risk Analysis (pages 12-14)  U:\Desktop\Risk Analysis Revision 2.docx U:\Desktop\Risk Analysis Revision 2.docx

Vulnerability Identification  Develop a list of system vulnerabilities (flaws or weaknesses) that could be exploited.  Vulnerabilities captured via automated tools.  OIT/DIS provides some vulnerability identification via continuous monitoring.  Monthly Secure Fusion Report  Penetration Testing (available to sites)  Intrusion Prevention System  Wireless survey (available to sites utilizing wireless)  Network Threat Response  Log Management (RPMS logs should be reviewed periodically)

Vulnerability Identification & Secure Fusion Monthly Reports Reporting to HHS Focus on High Risks by Area Part of the Quarterly Report to the HHS Secretary Implemented Across IHS Federal/Tribal/Urban Facilities in August 2009 Each facility can access Secure Fusion reports Provides a detailed list of vulnerabilities Fix action for each vulnerability

Vulnerability Identification & Secure Fusion High Risk Mitigation %A %A %B %C %D < 40%F

Vulnerability Identification & Secure Fusion High Risk Aging < 30 daysA daysA daysB daysC daysD > 90 daysF

Vulnerability Identification & Secure Fusion Other vulnerability tests run by OIT/DIS  TippingPoint: IPS, insert findings in Appendix D  Network Threat Response: Discovers zero-day malware  ArcSight Log Management: Logs should be reviewed.

Vulnerability Identification & Pen Testing  Evaluates the security of a computer system or network by simulating a malicious attack.  Must be performed annually.  Testing should include  Approach, methodology, procedures and results.  For each finding the following should be reported  Description of finding, affected host(s), impact, recommendation for mitigation and source(s) for corrective action.  OIT/DIS has preconfigured laptops sites may borrow in order to complete Pen Testing  Point of contact is: Dan Largo;

Vulnerability Identification & VisiWave  For sites that utilize wireless  Provides visualization of wireless devices within a facility  Can identify device interference  IHS OIT/DIS has laptops with VisiWave installed. These laptops can be loaned out to sites for VisiWave testing.  Results should be included in Appendix E.

Control Analysis  Analyze implemented controls (modify as needed)  Based upon NIST (SP) , Rev 3  Common controls provided for you via GPO settings and should not be changed ( site is responsible for ensuring correct controls are implemented.  Risk Analysis (pages 19-21)  U:\My Documents\Work docs\Continuous Monitoring\Risk Analysis Revision 2.docx U:\My Documents\Work docs\Continuous Monitoring\Risk Analysis Revision 2.docx

3 rd Party Software Needed for MU  WinHasher:  MU requirement for (s), Integrity.  Allows verification of file integrity utilizing file hash comparison.  Open Source, available for sites to download  IPsec:  Installed on Windows based RPMS systems  VanDyke:  Installation for AIX RPMS systems  Each facility where RPMS is running on an AIX system the Service Unit/Site is responsible for installing  Contact OIT Support for installation instructions For Official Use Only

3 rd Party Software Needed for MU  MU requirement (u), General Encryption  File Level Encryption  Ability to use a NIST certified product to create a self-extracting encrypted file  Three products certified by IHS  Symantec SEE (Removable):  Federal solution provided by IHS  Sites must contact OIT Support for installation instructions  Credant2Go  3 rd party client/server based product I/T/Us can purchase  7-Zip  Only available for Tribal sites  Uses a FIPS approved algorithm but is not certified by NIST  Freeware

Risk Mitigation  Prioritizing, evaluating and implementing appropriate risk- reducing controls recommended from the risk assessment process.  Risk Analysis (Appendix G:- Risk Mitigation Worksheet)  Manual sheet  Risk Analysis (Appendix H:- Secure Fusion Mitigation Plan)  Automated plan

Storage of Completed RAs  Completed RA will be stored on SharePoint.  orms/AllItems.aspx?RootFolder=%2fsites%2fCAdocs% 2fCA%20Docs%2fCompleted%20RA%20Templates&F olderCTID=&View=%7b088F5F7D%2d65C1%2d40FE %2dB719%2d20BB0AEF1220%7d orms/AllItems.aspx?RootFolder=%2fsites%2fCAdocs% 2fCA%20Docs%2fCompleted%20RA%20Templates&F olderCTID=&View=%7b088F5F7D%2d65C1%2d40FE %2dB719%2d20BB0AEF1220%7d  HQ ISSOs will:  Perform periodic audits of stored RA.  Certify annually.

Questions? Information Security Team: IHS Information Security Web site: Contact:Lisa Broome, RPMS ISSO: