UNC CAUSE November 2006 Planning for Information Security and HIPAA Compliance “Security should follow data” Leo Howell, CISSP John Baines, CISSP IAS-Information Assurance & Security ETSS-Enterprise Technology Services & Support North Carolina State University Sharon McLawhorn McNeil ITCS-Security Department of ITCS East Carolina University What’s it all about, Webster? Defalcation – – – – – Pronunciation:*d*-*fal-*k*-sh*n, Date:15th century 1 archaic : DEDUCTION 2 : the act or an instance of embezzling 3 : a failure to meet a promise or an expectation Malfeasance – Pronunciation:*mal-*f*-z*n(t)s – Date:1696 : – wrongdoing or misconduct especially by a public official Two twenty dollar words – Fraud and criminal business acts – Reaction to the excesses of the 80’s and 90’s "Planning for Security and HIPAA Compliance" NCSU and ECU 2 Increasingly Complicated Compliance Constraints Statute Type of requirement University data Example location FERPA Federal law Student records Faculty PC or server HIPAA Federal law Health records Athletics dept. GLBA Federal law Financial data Financial Aid PCI DSS Payment Card Industry -Data Security Std. Credit card data Bookstore server SB 1048 State Identity Theft law SSN , etc. R&R State Employee Personal Information Privacy law Staff data Payroll Federal Grants Research materials Lab PC Contract requirements "Planning for Security and HIPAA Compliance" NCSU and ECU 3 Educational Institutes Seen as Easy Marks Los Angeles Times article - May 30, 2006 ‘Since January, 2006 at least 845,000 people have had sensitive information jeopardized in 29 security failures at colleges nationwide.’ ‘we were adding on another university every week to look into’ - Michael C. Zweiback, assistant U.S. attorney "Planning for Security and HIPAA Compliance" NCSU and ECU 4 Information Security Planning High level tasks Make a conscious decision to plan for security and compliance for improved efficiency and effectiveness Understand the business goals and objectives Conduct a risk assessment; factor in compliance! Develop the plan "Planning for Security and HIPAA Compliance" NCSU and ECU 5 Data Classification Standard, DCS forms the foundation 3 classification levels High, Moderate, Normal Based on data business value, financial implications, legal obligations "Planning for Security and HIPAA Compliance" NCSU and ECU Identification Confidentiality and sensitivity Classification Protection Consistency 6 Data Management Procedures, DMP assigns ownership and accountability Role relationships Data Trustee Oversight responsibility Data Steward Access within his or her unit accuracy, privacy, and security User Data Custodians Security Admistrator Responsibilites Physical data management Manage access rights e.g. Application Security Unit Authorizes users based on Guidelines "Planning for Security and HIPAA Compliance" NCSU and ECU 7 Seven Steps RMIS Information System Security Plan, RISSP Leo Howell Information Security Analyst "Planning for Security and HIPAA Compliance" NCSU and ECU 8 STEP ONE – Understand the Asset Effective security begins with a solid understanding of the protected asset and its value At NC State we have identified DATA as our primary asset Philosophically, we believe that “security should follow data” But we know that not all data were created equal "Planning for Security and HIPAA Compliance" NCSU and ECU 9 STEP TWO – Identify and prioritize Threats Governance: – policy breach – rebellion – theft Physical: – disclosure – data theft – equipment theft/damage Infrastructure & Application: – DoS – unauthorized access Endpoint: – theft – social engineering Data: – unauthorized access – corruption/destruction "Planning for Security and HIPAA Compliance" NCSU and ECU 10 STEP THREE – Identify and rank Vulnerabilities Governance: – policy loopholes Physical: – “open” network – weak perimeter – open access Endpoint: – ignorance Infrastructure & Application: – unpatched systems/OS – misconfiguration Data: – unencrypted storage – insecure transmission "Planning for Security and HIPAA Compliance" NCSU and ECU 11 STEP FOUR – Quantify Relative Risk, R R = µVAT V = vulnerability A = asset T = threat µ = likelihood of T The greater the number of vulnerabilities the bigger the risk The greater the value of the asset the bigger the risk The greater the threat the bigger the risk "Planning for Security and HIPAA Compliance" NCSU and ECU 12 STEP FIVE – Develop a strategy 3 virtual operational protection zones, OPZ based on Data Classification High - Significantly business impact - financial loss - regulatory compliance Laptop with High data Moderate - adversely affects business and reputation Normal - minimal adverse effect on business - authorization required to modify or copy Types of data stored, accessed, processed or transmitted dictates OPZ Server with Moderate data Higher Classification implies Increased Security "Planning for Security and HIPAA Compliance" NCSU and ECU 13 STEP SIX – Establish target standards Seven layers of protection per zone based on COBIT, ISO 17799 and NIST 800-53 1.Management & Governance 2.Access control 3.Physical security 4.Endpoint security 5.Infrastructure security 6.Application security 7.Data security "Planning for Security and HIPAA Compliance" NCSU and ECU Amount and stringency of security controls at each level varies with data classification 14 Snippet from Data Security Standard Security Control Red Zone Yellow Zone Green Zone Encrypt stored data Mandatory Recommended Optional Limit data stored to external media Mandatory Recommended Optional Encrypt transmitted data Mandatory Mandatory Recommended "Planning for Security and HIPAA Compliance" NCSU and ECU 15 STEP SEVEN – Document the plan Create a list of action items for the next 3 to 5 years Prioritize the list based on risk and reality Forecast investment Beg, kick and scream to get funding Implement the plan over time "Planning for Security and HIPAA Compliance" NCSU and ECU Identify realistic solutions for applying the appropriate security controls at each level. 16 Quick takes Planning paves the way for effectiveness and efficiency for security and compliance Understand the business the goals Conduct a risk assessment Establish a strategy based on data classification and industry standards Develop a prioritized realistic plan Go for the long haul! "Planning for Security and HIPAA Compliance" NCSU and ECU 17 Key Elements of the HIPAA Security Rule: And how to comply Sharon McLawhorn McNeil ITCS-Security Department of ITCS East Carolina University "Planning for Security and HIPAA Compliance" NCSU and ECU 18 Introduction HIPAA is the Health Insurance Portability and Accountability Act. There are thousands of organizations that must comply with the HIPAA Security Rule. The Security Rule is just one part of the federal legislation that was passed into law in August 1996. The purpose the Security Rule: To allow better access to health insurance Reduce fraud and abuse Lower the overall cost of health care. "Planning for Security and HIPAA Compliance" NCSU and ECU 19 What is the HIPAA Security Rule? The rule applies to electronic protected health information (EPHI), which is individually identifiable health information in electronic form. Identifiable health information is: Your past, present, or future physical or mental health or condition, Your type of health care, or Past, present, or future payment methods for the type of health care received. "Planning for Security and HIPAA Compliance" NCSU and ECU 20 Who Must Comply? Covered Entities (CEs) must comply with the Security Rule. Covered Entities are health plans, health care clearinghouses, and health care providers who transmit any EPHI. Health care plans - HMOs, group health plans, etc. Health care clearinghouses - billing and repricing companies, etc. Health care providers - doctors, dentists, hospitals, etc. "Planning for Security and HIPAA Compliance" NCSU and ECU 21 How Does One Comply? Covered Entities must maintain reasonable and appropriate administrative, physical, and technical safeguards to protect the confidentiality, integrity, and availability of patient information. "Planning for Security and HIPAA Compliance" NCSU and ECU 22 Administrative Safeguards To comply with the Administrative Safeguards portion of the regulation, the covered entity must implement the following "Required" security management activities: Conduct a Risk Analysis. Implement Risk Management Actions. Develop a Sanction Policy to deal with violators. Conduct an Information System Activity Review. "Planning for Security and HIPAA Compliance" NCSU and ECU 23 Physical Safeguards The physical safeguards are a series of requirements meant to protect a Covered Entity's computer systems, network and EPHI from unauthorized access. The recommended and required physical safeguards are designed to provide facility access controls to limit access to the organization's computer systems, network, and the facility in which it is housed. "Planning for Security and HIPAA Compliance" NCSU and ECU 24 Technical Safeguards Technical safeguards refers to the technology and the procedures used to protect the EPHI and access to it. The goal of technical safeguards is to protect patient data by allowing access only by individuals or software programs that have been granted access rights to the information. "Planning for Security and HIPAA Compliance" NCSU and ECU 25 Key Elements of Compliance 1. Obtain and Maintain Senior Management Support 2. Develop and Implement Security Policies 3. Conduct and Maintain Inventory of EPHI 4. Be Aware of Political and Cultural Issues Raised by HIPAA 5. Conduct Regular and Detailed Risk Analysis 6. Determine What is Appropriate and Reasonable 7. Documentation 8. Prepare for ongoing compliance "Planning for Security and HIPAA Compliance" NCSU and ECU 26 Penalties Civil penalties are $100 per violation, up to $25,000 per year for each violation. Criminal penalties range from $50,000 in fines and one year in prison up to $250,000 in fines and 10 years in jail. Additional Negatives: Negative publicity Loss of Customers Loss of Business Partners Legal Liability "Planning for Security and HIPAA Compliance" NCSU and ECU 27 Conclusion Compliance will require Covered Entities to: Identify the risks to their EPHI Implement security best practices Complying with the Security Rule can require significant time and resources Compliance efforts should be currently underway "Planning for Security and HIPAA Compliance" NCSU and ECU 28 Contacts NC State University Leo Howell, CISSP CEH CCSP CBRM Information Security Analyst IAS-Information Assurance and Security ETSS-Enterprise Technology Services and Support leo_howell@ncsu.edu (919) 513-1169 East Carolina University Sharon McLawhorn McNeil IT-Security Analyst McLawhorns@ecu.edu 252-328-9112 NC State University John Baines, CISSP Assistant Director IAS-Information Assurance and Security ETSS-Enterprise Technology Services and Support john_baines@ncsu.edu "Planning for Security and HIPAA Compliance" NCSU and ECU 29