Security Risk Analysis — A Practical Approach From The Perspective of a Medicare Fiscal Intermediary Presented by Todd Fitzgerald, CISSP, CISA, CISM Director of Systems Security and Systems Security Officer for United Government Services, LLC Organizational Overview United Government Services, LLC – Largest Part A (Hospital) Medicare Fiscal Intermediary processing 30+ million claims annually – 1200 employees residing in 12 Offices in 8 states – Headquartered in Milwaukee, WI – Part of the WellPoint (NYSE: WLP) family of companies (20,000+ associates) Security Organization – Systems Security Officer reports to VP, Legal, Compliance & Audit – Multiple security departments (Systems Security, Data Security, Corporate Security) with differing roles Organizational Overview Wisconsin Ashland Milwaukee Monona W A M T O R N V California U T Oakland Camarillo A Z C O M I W I I A N E C A Southfield Lansing M N S D W Y I L OK NM TX HI Hawaii NY PA O H I N M O KS W V K Y A R ME V T N H MA C R T I New York Valhalla N DJ MD E West Virginia Charlston VA NC T N Virginia Richmond Roanoke SC MS AK Mt Vernon Michigan N D ID Illinois A L GA Medicare Part A RHHI L A FQHC covers all fifty states FL Honolulu Puerto Rico HIPAA Security Risk Analysis Deliverables Documented compliance with existing Centers for Medicare & Medicaid Services (CMS) core security requirements Created Systems Security Plans (SSPs) • • • • Business and Technical System Definition Management Controls Operational Controls Technical Controls Information Security Risk Assessment HIPAA Security Rule requirement analysis Document Existing Controls Documented Existing Control Environment with CMS-Directed Contractor Assessment Security Tool – – – – – – – Details of each security requirement (390 requirements, 79 reference HIPAA Security Rule) Status of compliance - Yes/No, Partial, Planned Specifics of ‘ how’ compliance is achieved Primary Point of Contacts (Ownership) Secondary Point of Contacts (Support) Who, What, When, Where Proposed safeguards for deficient requirements Information Security Risk Assessment Approach Utilized CMS Risk Assessment Methodology 1 Document system purpose, environment, security 2 3 4 5 6 7 8 level Identify potential dangers to the system (threats) Identify system weaknesses that could be exploited (vulnerabilities) Identify existing controls to reduce risk Determine exploitation likelihood given existing controls Determine severity impact Establish risk level for threat/vulnerability pair given existing controls. Determined safeguards to reduce risk Examined Threats, Vulnerabilities and Existing Controls Item No. Threat Name 2 Vulnerability Name Risk Description 3 Data Entry Errors Inadvertent Acts or Carelessness Impersonation Shoulder Surfing User Abuse/fraud Theft,Sabotage, Vandalism Espionage Physical Intrusions Sensitive Data Disclosure Terrorism Disgruntled Employees Existing Controls Likelihood of Occurrence Impact Severity Risk Level 4 Environmental Conditions Hazardous Material Power Fluctuation Sensitive Media Disposal Server Rooms Physical Security Misrepresentation of Identity Intrusion/Unauthorized Access Data/System Contamination Eavesdropping Malicious Code Authorized session takeover Failures & Intrusions not properly logged Installation Errors Fire, Flood, Earthquake, Tornado, Hurricane, etc Determined Likelihood and Impact Severity Item No. Threat Name Vulnerability Name 2 Risk Description 3 Existing Controls Likelihood of Occurrence 4 5 Impact Severity 6 5 Likelihood Unlikely to occur. Very Low Likely to occur two/three times every five years. Low Medium High Very High Extreme Likely to occur once per month or less. Description Minor Will have some minor effect on the system. It will require minimal effort to repair or reconfigure the system. Significant Damaging Likely to occur multiple times per month Likely to occur multiple times per day 6 Will have almost no impact if threat is realized and exploits vulnerability. Likely to occur one every year or less. Likely to occur once every six months or less. Risk Level Insignificant Description Negligible Impact Severity Serious Critical Will result in some tangible harm, albeit negligible and perhaps only noted by a few individuals or agencies. May cause political embarrassment. Will require some expenditure of resources to repair. May cause damage to the reputation of system management, and/or notable loss of confidence in the system’s resources or services. It will require expenditure of significant resources to repair. May cause considerable system outage, and/or loss of connected customers or business confidence. May result in compromise or large amount of Government information or services. May cause system extended outage or to be permanently closed, causing operations to resume in a Hot Site environment. May result in complete compromise of Government agencies’ information or services. Determined Risk Level and Safeguards Item No. Threat Name Vulnerability Name Risk Description Existing Controls Likelihood of Occurrence Impact Severity Risk Level 7 Likelihood of Occurrence Item No 8 Impact Severity Insignificant Minor Significant Damaging Serious Critical Negligible Low Low Low Low Low Very Low Low 7 Low Low Low Low Low Moderate Moderate Low Low Moderate Moderate High High Medium High Low Low Moderate High High High Low Moderate High High High High Very High Low Moderate High High High High Extreme Low Moderate High High High High Recommended Safeguard Description Residual Likelihood of Occurrence Residual Impact Severity Residual Risk L Cross-validation with HIPAA Security Assessment Tool Evaluated overall compliance using 165 HIPAA security question tool Question, Gap Analysis Based Useful for documenting current state of HIPAA Compliance Several vendors offer low cost tools ($300-$500 range) HIPAA Collaborative WEDI SNIP affiliates developing similar spreadsheet versions at no cost NIST 800-66 (DRAFT) HIPAA Resource Guide Results/Lessons Learned External consultants effective in creating initial objective viewpoint. Qualitative approaches are much more useful than rigorous Quantitative exercises. Formal project Kick-off important to ensure availability of internal subject matter experts Matrices avoid debate over the appropriate “risk level” by focusing on likelihood & severity of impact. Fully document how the implementation satisfies the requirement Explain the risks in business terms with respect to Confidentiality, Integrity & Availability. Results/Lessons Learned Senior Management must review and agree to the documented Risk Assessment Risk determinations and safeguard implementations must be monitored to maintain energy. Risk Management is ongoing, assessments must also be, as they are only a snapshot in time. Policy, Procedure, Standard.. And most importantly, Practice. HIPAA Risk Assessment should be integrated with Information Security Risk Management Program. Closing Thoughts Risk Analysis results will be different for each organization based upon existing controls, resources available and complexity of the environment. Important to share with other HIPAA Collaboratives and Security Associations on specific security issues to understand the “norms” that have been implemented. Real data on specific “current state” or implementation approaches may be difficult to obtain, as organizations need to maintain confidentiality around vulnerablities. Document and re-review, to ensure organization is practicing adequate security. Resources CMS Risk Assessment Methodology, Threat Identification Resource, Acceptable Risk Safeguards www.cms.hhs.gov/it/security HIPAA Security evaluation tool www.nchica.org/HIPAAResources/EV HIPAA Collaborative no cost matrices such as www.hipaacow.org* NIST 800-66 HIPAA Resource Guide for Implementing the HIPAA Security Rule (DRAFT) www.csrc.nist.gov/publications *Full Disclosure: Todd is a member of the Board of Directors and co-chair of the security taskforce for the WEDI Regional SNIP Affiliate HIPAA Collaborative of Wisconsin (www.hipaacow.org) Thanks ! Contact Information: Todd Fitzgerald, CISSP, CISA, CISM todd.fitzgerald@cobalt-corp.com todd_fitzgerald@yahoo.com