Mike Turner Improvements Phase Healthcare in the Cloud Cloud Security Concerns Fear of the lack of valid security and compliance has caused the healthcare industry to slow down cloud implementation. Cloud providers must ensure that their infrastructure is secure and that their clients’ data and applications are protected while the customer must ensure that the provider has taken the proper security measures to protect their information. Most concerns lie within these areas… 1. Identity and Access Management: Identity management helps to maintain security, visibility and control, and centralizing IT control of identities and access is useful. 2. Data Protection: Encryption of traffic and isolation mechanisms that serve to separate memory, storage, and routing between tenants must be put in place in multi-tenant cloud environments. 3. Compliance: Different countries and regions have different privacy laws, some more strict than others. To be sure that cloud vendors are compliant with policy, it is important that the cloud infrastructure is auditable. 4. Trust: When migrating to the cloud, most of the control is now in the hands of the cloud vendor which requires trust. To build trust vendors need to deliver incident response, such as; attack analysis, containment, data preservation, remediation and service continuity. Data management tools are required so that the client can see over their data on the cloud and make sure agreed upon policies are being enforced. 5. Secured Architecture: Large cloud infrastructures obviously present a bigger and more vulnerable target for cybercriminals. To protect a healthcare cloud from trojans, rootkits and malware requires management of identities and APIs at the network edge to ensure that only authorized users can gain access. Also Hardware and software components that are inherently trusted (Roots of Trust) must be established to secure server and client machines by measuring or verifying software, protecting cryptographic keys and performing device authentication. These concerns can be mitigated by using Intel technology. Intel has done a lot to improve the security of the cloud and make it safe enough for any industry including the Health Care Industry. Cloud Security Solutions To help address the issue of securing sensitive patient data and medical records it is necessary that both client and vendor are using AES encryption. 1. AES (Advanced Encryption Standard) – This type of encryption uses complex algorithms to secure data. a. Due to the complexity of AES algorithms, in an environment where there is endless data being passed to and from the cloud, there will be too much overhead. a) Solution: Intel’s Advanced Encryption Standard New Instructions (AES NI) 1) This solution speeds up the execution of encryption algorithms by anywhere up to 10 times other solutions. 2) Intel has built this technology right into many of their Xeon, Core vPro and Core processors. b) Video on Intel AES NI - http://www.youtube.com/watch?v=Bvmy5BKMG1g b. Using the machine specs in the chart below, Intel measured the performance benefit offered by Intel AES-NI on a Linux/Java software stack to prove that use of their advanced encryption technology would be beneficial for the healthcare sector and allow more organizations to address the increasing security concerns within the industry and by consumers. a) Specs b) Test Results - The test was run 100 times for each encryption method and the results were averaged. c) Key Findings 1) Application file encryption improved 39% (average) and file decryption 37% (average) with Intel® AES-NI enabled over AES128 key. 2) Application file encryption improved 37% (average) and file decryption 38% (average) with Intel® AES-NI enabled over AES256 key. 2. Secure communication connections – Browser protocols must be used to secure browser access and encrypt content as it is transferred over the network and throughout the cloud. a. Secure Socket Layer (SSL) b. Transport Layer Security (TLS) a) The session initiation phase and the bulk-data transfer phase of traditional SSL and TLS are very compute-intesive. 1) Solution: Intel has helped to enhance the speeds and performance by creating 2 library functions to OpenSSL a. The first function accelerates session initiation b. The second function enables simultaneous execution of data encryption and authentication for bulk data. 2) Any software that incorporates OpenSSL can automatically take advantage of these Intel advancements 3. Intel® AES-NI Boosts Data Security for Swedish Healthcare - Sweden is recognized worldwide for its advanced healthcare systems and effective adaption of healthcare IT, but also faces the same problems of healthcare facilities elsewhere. Due to the Swedish Patient Data Act and its demand for stringent security and data protection, even tougher security is required for them to migrate to the cloud. a. Along with basic security measures, the following security measures must be met according to the requirements of the Swedish Patient Data Act to access sensitive health information: 1) Authorized health workers must have a patient relationship (“need to know”) 2) Receive patient consent 3) Employ strong authentication using the Secure IT in Health Services (SITHS) smart card and digital certificates. 4) The Swedish Patient Data Act also governs the maintenance of security logs and requires routine audits of healthcare information disclosure, as well as patient consent, patient access, provisions for breach, and patient requests for modifications to health records b. Siemens Melior – As a solution, Intel collaborated with Siemens to create an innovative healthcare application suite, called Siemens Melior. a) This suite is built on a foundation of Intel Xeon processor-based servers b) Supports SITHS c) Applies role-based access control in support of the security principles of “need to know” and “least privilege.” d) Protects communications of health information in transit through transportlevel SSL encryption and message-level encryption using SAML tokens and digital certificates. e) To address data protection at rest it deploys hardware-assisted encryption in the data center using AES-NI. f) Siemens’ customers are advised to encrypt sensitive information in client, desktop, and mobile devices using full-disk encryption accelerated with Intel AES-NI and solidstate drives (Intel® SSDs). 4. Authenticating Identity and Access a. Intel Identity Protection Technology (IPT) – This is built into Intel Core vPRo processors. a) Provides a simple way to authenticate legitimate users are logging in. b) It validates transactions and defends against malware b. Intel’s Expressway Service Gateway (Intel® ESG) – for API Security a) ESG is a software appliance that provides enforcement points at the network’s edge to authenticate API requests against an organization’s existing identity and access-management systems. 5. Ensuring Trust – Putting data in the cloud is risky business and because you can’t see into the cloud infrastructure, you can’t tell if the data is actually secure and if the vendor is meeting compliance. a) Intel’s Trusted Execution Technology (Intel® TXT) establishes a more secure platform centered on a hardware root of trust at the level of the chipset and CPU to ensure system integrity. b) TXT improves the ability to audit the cloud environment by permitting hardware-based reporting of platform trust both locally and remotely. c) Intel TXT is found in Intel Xeon processors Conclusion Intel has built a foundation secure enough to allow the Health Care Industry to migrate to the cloud without as much concern with security. Although you can never truly be 100% secure, Intel has done a lot to calm the concerns. With using this technology, the healthcare industry will significantly improve on the safety of their data in the cloud. Sources Intel Industry Brief: Healthcare Cloud Security http://www.intel.com/content/dam/www/public/us/en/documents/solution-briefs/cloud-computingsecurity-healthcare-brief.pdf AES NI Charts http://www.intel.com/content/dam/www/public/us/en/documents/white-papers/healthcare-and-inteladvanced-encryption-standards-new-instructions.pdf Securing the Cloud for Government Entities http://www.intel.com/content/dam/www/public/us/en/documents/solution-briefs/cloud-computingsecurity-government-brief.pdf Securing the Cloud for Financial Institutions http://www.intel.com/content/dam/www/public/us/en/documents/solution-briefs/cloud-computingsecuring-cloud-financial-brief.pdf Siemens and Intel Deliver Enhanced Scalability and Robust Security for Healthcare http://www.intel.com/content/dam/www/public/us/en/documents/white-papers/siemens-inteldeliver-enhanced-scalability-robust-security-for-healthcare-paper.pdf Securing the Enterprise with Intel AES NI http://www.intel.com/content/dam/doc/white-paper/enterprise-security-aes-ni-white-paper.pdf Wikipedia http://en.wikipedia.org/wiki/Six_Sigma http://en.wikipedia.org/wiki/Cloud_computing_security http://en.wikipedia.org/wiki/Health_Insurance_Portability_and_Accountability_Act http://en.wikipedia.org/wiki/Audit_trail http://en.wikipedia.org/wiki/Intellectual_property Other Sources Healthcare 'most breached industry in 2011' http://blogs.csoonline.com/1806/healthcare_most_breached_industry_in_2011 Security First: A Network Prescription for the Healthcare Industry http://blog.level3.com/bcdr/security-first-a-network-prescription-for-the-healthcare-industry/ Assessing IT Risks in the Health-care Industry http://www.theiia.org/intAuditor/itaudit/archives/2008/january/assessing-it-risks-in-the-health-careindustry/ Healthcare Cloud Computing (Clinical, EMR, SaaS, Private, Public, Hybrid) Market - Global Trends, Challenges, Opportunities & Forecasts (2012 – 2017) http://www.marketsandmarkets.com/Market-Reports/cloud-computing-healthcare-market-347.html Health care and the cloud are finally coming together http://www.infoworld.com/d/cloud-computing/health-care-and-the-cloud-are-finally-coming-together212581 Roots of Trust http://healthitsecurity.com/2012/12/27/nist-roots-of-trust-for-healthcare-mobile-devices/