Right Sizing the HIPAA Security Program

Right Sizing
the
HIPAA Security Program
Laurie Leer, CISSP;Manager Information Systems Security
Shana Chung, CISSP; Director Contract Management (HIPAA Compliance,
Definition & Evaluation)
An Independent Licensee of the
Blue Cross Blue Shield Association
Introductions and Agenda
2
•
HIPAA Security Standards = Project Requirements
•
Covered Entity Deliverables
•
Risk Assessment: Key to Sizing the HIPAA Security Program
•
Right Sizing
•
Risk Assessment: Getting Started
•
Sample Risk Assessment Summary
•
Risk Assessment as a Tool to Size a HIPAA Security Program
•
Right Size = Reasonable and Appropriate
•
Survey Results
•
Conclusions
HIPAA Security Standards = Project Requirements
•
Standards define project scope and approach
– Applies to electronic protected health information (EPHI). A covered entity
must:
• ensure the confidentiality, integrity, and availability of all EPHI it creates, receives,
maintains or transmits
• protect against any reasonably anticipated threats or hazards to the security or
integrity of such information
• protect against any reasonably anticipated uses or disclosures of such information
that are not permitted or required under subpart E of this part
• ensure compliance with this subpart by its workforce
•
The standards define required deliverables
– Standards describe high-level deliverables
• Policies, procedures, periodic reviews, etc.
– Specifications describe required content
• e.g., “Procedures to regularly review records of system activity”
3
Covered Entity Required Deliverables
•
Document how the covered entity (CE) met each specification
– Criteria evaluated in choosing a solution for a given specification [164.306(b)]
• Factors from 164.308(a)(1) - covered later
• Organizational and environmental factors
• Contracts or superceding state law
• Other constraints
–
Solution implemented
• Solution description
• Policies and procedures to maintain the solution
• Audit trails or other mechanisms to assure ongoing effectiveness and workforce
compliance
– Required vs. addressable specifications
• Required specifications must be implemented as stated
• An addressable specification must be implemented, or the CE must document why it
was not and the equivalent measures implemented
4
Risk Assessment: Key to Sizing a Security Program
• 164.308(a) (1) requires CEs to:
– Conduct accurate and thorough assessments of EPHI potential risks
and confidentiality, integrity, and availability vulnerabilities held by the
CE
– Implement security measures to reduce risks and vulnerabilities to
comply with §164.306(a)
•
Risk is a compound value or judgment based on the following:
–
–
–
–
Threat
Vulnerability to the threat
Probability of exploiting the vulnerability
Cost or other adverse effect if successfully exploited
• Apply sound business judgment
– Absolute security doesn’t exist
– Management may make an informed judgment to accept risk
5
“Accurate and Thorough” Right Sizing
• 164.306(b) instructs us to consider:
– (i) The size, complexity, and capabilities of the covered entity
– (ii) The covered entity's technical infrastructure, hardware and software
security capabilities
– (iii) The costs of security measures
– (iv) The probability and criticality of potential risks to EPHI
• HIPAA Security program should scale against 164.306(b)
–
–
–
–
Number of different EPHI stores the organization has
Size and/or location of the workforce
Number of different EDI connections or Web services transporting EPHI
Robustness of the baseline security program
• How “probable and critical” are more organization-specific
– What EPHI is critical to the organization mission or operations?
– What security and privacy risks have been identified?
6
“Reasonable and Appropriate” Right Sizing
• What is a “reasonable and appropriate level” of risk and vulnerability?
– Common practices for similar organizations
– Case law
– Source documents for HIPAA Security Rules
• NIST http://csrc.nist.gov/publications/nistpubs/index.html
• OMB Circulars http://www.whitehouse.gov/omb/circulars/index.html
• Mapped standards in the 1998 Draft Rules: ASTM, ANSI, IEEE, ISO, etc.
• Common practices for similar organizations
– Common practices are both human and technical
– Similar organizations = similar business model and workforce size
• Case law
– “Reasonable person” standards have developed in other areas of law
– TriWest Healthcare Alliance suit
– National Academy of Science study (2002) recommends laws that hold system
operators liable for security breaches
7
“Reasonable and Appropriate” Right Sizing
(cont.)
• Some guidance available in NIST’s “Generally Accepted Principles and
Practices for Secure Information Technology Systems”
– “Risk management requires the analysis of risk, relative to potential benefits,
consideration of alternatives, and, finally, implementation of what management
determines to be the best course of action.”
– “Management needs to decide if the operation of the IT system is acceptable,
given the kind and severity of remaining risks.”
• ‘Best course of action’ decision should occur at the right management level
– If potential costs are known: Approving manager should have authority for that
amount
– If costs can’t be estimated: Approval comes from manager with responsibility
over the system or vulnerable information
– If the risk spans departments: Approval comes from all affected department
heads or executive responsible overall
8
Risk Assessment: Getting Started
• Common elements of risk management
–
–
–
–
–
Formal, repeatable process
Reliable metrics and probability algorithms
Clear documentation and outputs
Adequate training for assessment personnel
Management authorization
• Missing link is often “metrics and probability”
– Some data about number of incidents; very little predictive value
– Available data focuses on hacker-style attacks. No reliable metric sources around
internal threats and vulnerabilities
– In many cases, management decisions are based on incomplete data
• Consider starting with the HIPAA Security Rules as assessment targets
– Identify ‘reasonably anticipated threats’ affecting organization’s ability to comply
– Assess organization’s degree of vulnerability to the identified threats
– Use vulnerability data to set the scope of the HIPAA Security Program
9
Sample Risk Assessment Summary
Rule
Standard
Reasonably
Anticipated Threats to
Compliance
1.
Procedures for
preventing or
detecting violations
may not be
consistently
followed by all
personnel.
2.
Containment and
correction of
violations may not
be authorized by
management if costbenefit cannot be
calculated.
Implement
policies and
procedures to
prevent,
detect, contain
and correct
security
violations
10
Estimated Probability
of Occurrence
High. Records for
other interdepartmental
procedures (HR
notification, etc.)
reflect several
instances per week
of inconsistent
process.
2. High. Management
has consistently
requested
cost/benefit or ROI
information before
approving changes
to systems and
procedures.
1.
Estimated Vulnerability to
the Threats
High. Current lack of
security awareness
results in violations of
existing security
standards and underreporting of violations.
2. Low. When incident
response procedures are
followed correctly, the
resulting
documentation contains
clear business rationale
for corrective actions
and management
decision to proceed or
accept risk.
1.
Estimated Risk to the
Organization
High. Undetected violations
of security standards, either
by personnel or during
system development and
configuration. Possible
exposure to previously
mitigated threats. Negative
audit findings. Possible
breach of contracts or
statute. Cost of occurrence
$0 to $5M.
2. Low. Security incident
reports go to personnel who
are well trained on incident
investigation and response.
Resulting documentation
should be sufficient to meet
the standard.
1.
Using Risk Assessment to Size
the HIPAA Security Program
• Set scope
– Zero probability is out-of-scope (e.g., if clearinghouse rules do not
apply to your organization, you have no probability of being out of
compliance with that rule)
– Set work priority
1. High probability and high cost of occurrence
2. Medium probability and high cost of occurrence
3. High probability and low cost of occurrence
4. Low probability and high cost of occurrence
5. All other combinations
• Define project plan and work schedule in priority order
– Standardize work breakdown structures




Phases collect related groups of work (activities) along the critical path
Activities collect related tasks along the critical path
Milestones signal acceptance of major deliverables and completion of
activities
Use life cycle approach to activities
» Requirements  Alternatives  Solution Selection  Build/Test  Deploy 
Maintain
11
Right Size = Reasonable and Appropriate
• Outputs from solution selection document the reasonableness and
appropriateness of the selected security measures
• Standardize deliverables as much as feasible
– Document at least 2 alternatives
• Include factors from 164.306(b)
• Document the fit between requirements and each alternative
• Estimate cost & time to implement
• Summarize reasons for recommending one alternative
– Document management approval for selected solution
• Outputs from maintenance determine ongoing costs and staffing needs
– Document maintenance oversight roles, responsibilities and procedures
• 164.306(e) : “Security measures . . . must be reviewed and modified as needed to continue
provision of reasonable and appropriate protection of EPHI”
– Document intersections with other processes required by HIPAA Security rules
• Risk analysis and management; system activity review; access authorization; contingency
planning; evaluation; etc.
12
Information Security Program Survey
•
•
Our methodology
Respondents
– Type
• Covered entity - plan, clearinghouse, provider
• Hybrid
• Other (includes business associate, consultant, vendor)
– Size
• Total employees
• Number of IT FTEs
– IT Security
• Number of IT Security FTEs
• Annual IT Security training budget
• Annual IT Security budget
– By confidence in meeting HIPAA Security compliance date
13
Respondents by Type of Organization
25
42%
20
29%
15
19%
10
8%
5
2%
0
1
Health
Plan
14
2
3
Clearinghouse Provider
4
Hybrid
Other5 (vendor,
consultant,
attorney, etc.)
Respondents by Size of OrganizationTotal Number of Employees
16
29%
27%
14
23%
12
10
8
6
10%
27%
4
2
0
1-501
Total EEs
15
2
51-500
Total EEs
3
501-1000
Total EEs
4
1001-5000
Total EEs
5
5000+
Total EEs
Respondents by Size of IT Department
Total Number of IT FTEs
25
42%
20
29%
15
19%
10
8%
5
2%
0
1-50 1
IT Employees
16
2
51-500
IT Employees
3
501-1000
IT Employees
4
1001-5000
IT Employees
5
5000+
IT
Employees
Does Your Organization Have IT
Security FTEs?
27% No
73% Yes
17
How Much Do You Spend Annually
On IT Security
16
31%
14
12
10 %
10
8%
17%
8
6
10%
4
4%
2
0
1
<$10,000
18
2
$10K - $25K
3
$25K - $100K
4
$100K - $500K
5
6
$500K - $1 mil
$1 mil+
Is Organization Confident of Meeting
HIPAA Security Deadline?
Not Very Confident
4%
Don't Know/
Not Applicable
33%
44%
19%
Very Confident
19
Confident
Some of the Challenges
•
Communication
– Does the right hand know what the left hand is doing?
•
Prioritization
– Are “dubious projects” getting the money?
•
Training
– NIST and others address this
20
Does Scalability = Reality?
•
Is bigger really better?
– Security spending doesn’t necessarily scale to an organization’s size
– HIPAA and GLB are acknowledged as contributing to policy/procedure infrastructure
in larger organizations
– Damage to an organization’s reputation is more of a concern
•
Related surveys
–
“US Healthcare Industry Quarterly HIPAA Survey Results: Winter 2003”
http://www.hipaadvisory.com
•
–
21
“Security remediation efforts are progressing slowly”
“Does Company Size Really Matter?,” Information Security, September 2002
http://www.infosecuritymag.com/2002/sep/2002survey.pdf
Conclusions
22