NISTs Role in Securing Health Information AMA-IEEE Medical Technology Conference on Individualized Healthcare Kevin Stine, Information Security Specialist Computer Security Division Information Technology Laboratory National Institute of Standards and Technology March 22, 2010
NISTs Mission To promote U.S. innovation and industrial competitiveness by advancing measurement science, standards, and technology … 2 Credit: NIST Credit: R. Rathe … in ways that enhance economic security and improve our quality of life.
Computer Security Divisions Mission A division with the Information Technology Lab, CSD provides standards and technology to protect information systems against threats to the confidentiality, integrity, and availability of information and services … 3 … in order to build trust and confidence in Information Technology (IT) systems
Agenda 4
Meaningful Use, Standards, and Certifications (Oh My) Meaningful Use (NPRM) Adopt and meaningfully use certified electronic health record (EHR) technology Stage 1(beginning in 2011): Ensure adequate privacy and security protections for personal health information. Standards and Certification (IFR) Represents the first step in an incremental approach to adopting standards, implementation specifications, and certification criteria to enhance the interoperability, functionality, utility, and security of health information technology and to support its meaningful use. Standards for HIT to protect Electronic Health Info (IFR, § ) Encryption and decryption of EHI, Record actions related to EHI, Verification that electronic health information has not been altered in transit, Cross- enterprise authentication Certification Criteria (IFR, § ) Access Control, Audit Log, Integrity, Authentication, Encryption
Agenda 6
Risk Management 7 Repeat as necessary RISK MANAGEMENT FRAMEWORK Security Life Cycle Step 1 CATEGORIZE Information Systems FIPS 199 / SP Step 6 MONITOR Security State SP / A Step 3 IMPLEMENT Security Controls SP Step 2 SELECT Security Controls FIPS 200 / SP Security Plan Step 5 AUTHORIZE Information Systems SP Plan of Actions & Milestones Step 4 ASSESS Security Controls SP A Security Assessment Report ORGANIZATIONAL VIEW Organizational Inputs Laws, Directives, Policy Guidance Strategic Goals and Objectives Priorities and Resource Availability Supply Chain Considerations Architecture Description FEA Reference Models Segment and Solution Architectures Mission and Business Processes Information System Boundaries Starting Point Risk Executive Function
Health IT Security - What Weve Done… Standards Harmonization Support ONC and HITSP in harmonizing and integrating standards to enable exchange of health information Outreach & Awareness Present on application of security standards and guidelines to HIPAA and HIT security implementations Publications & Resources HIPAA Security Rule Guide HIE Security Architecture
Health IT Security - What We Plan To Do… Security Automation HIPAA Security Rule toolkit Security configuration checklists HIT Test Infrastructure Provide capability for current and future EHR testing needs against standards Conformance and interoperability testing capabilities
Agenda 10
Wireless and Mobile Technology Security Resources Wireless Draft, Guide to Security for WiMAX Technologies , Guide to Bluetooth Security , Recommendations for EAP Methods Used in Wireless Network Access Authentication , Establishing Wireless Robust Security Networks: A Guide to IEEE i Revision 1, Guide to Securing Legacy IEEE Wireless Networks Mobile Technologies , Guidelines on Cell Phone and PDA Security , Users Guide to Securing External Devices for Telework and Remote Access , Guidelines on Cell Phone Forensics Rev 1, Guide to Enterprise Telework and Remote Access Security
Thank You Kevin Stine Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Computer Security Resource Center: NIST Health IT Standards and Testing: 12