meaningful use risk analysis - security assessment · (a) risk analysis (required) conduct an...

38
Meaningful Use Risk Analysis

Upload: others

Post on 16-Jul-2020

7 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Meaningful Use Risk Analysis - Security Assessment · (A) Risk analysis (Required) Conduct an accurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality,

Meaningful Use Risk

Analysis

Page 2: Meaningful Use Risk Analysis - Security Assessment · (A) Risk analysis (Required) Conduct an accurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality,

Who are we

EHR 2.0 Mission: To assist healthcare

organizations develop and implement

practices to secure IT systems and comply

with HIPAA/HITECH regulations.

Education

Consulting

Toolkit(Tools, Best Practices & Checklist)

Goal: To make compliance an enjoyable

and painless experience

Page 3: Meaningful Use Risk Analysis - Security Assessment · (A) Risk analysis (Required) Conduct an accurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality,

Webinar Objective

Understand and Perform Meaningful Use

Risk Analysis that satisfies CMS

incentive and attestation requirement.

3

Page 4: Meaningful Use Risk Analysis - Security Assessment · (A) Risk analysis (Required) Conduct an accurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality,

Glossary

1. HHS, CMS:

2. NIST:

3. Threats and Vulnerabilities:

4. Findings:

5. Risk Analysis:

4

Page 5: Meaningful Use Risk Analysis - Security Assessment · (A) Risk analysis (Required) Conduct an accurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality,

The American Recovery and

Reinvestment Act of 2009 and HITECH

5

Page 6: Meaningful Use Risk Analysis - Security Assessment · (A) Risk analysis (Required) Conduct an accurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality,

HITECH Act

The Health Information Technology for Economic and

Clinical Health (“HITECH”) provisions of the

American Recovery and Reinvestment Act of 2009

(“ARRA”, also referred to as the “Stimulus Bill”) codify and

expand on many of the requirements contained in the

Health Insurance Portability and Accountability Act of 1996

(“HIPAA”) and its regulations to protect the privacy and

security of protected health information (“PHI”).

6

Page 7: Meaningful Use Risk Analysis - Security Assessment · (A) Risk analysis (Required) Conduct an accurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality,

HITECH

HITECH modifications to HIPAA including:

Creating incentives for developing a meaningful use of electronic health records

Changing the liability and responsibilities of Business Associates

Redefining what a breach is

Creating stricter notification standards

Tightening enforcement

Raising the penalties for a violation

Creating new code and transaction sets (HIPAA 5010, ICD10)

7

Page 8: Meaningful Use Risk Analysis - Security Assessment · (A) Risk analysis (Required) Conduct an accurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality,

CMS Meaningful Use Incentives

8 For Eligible Professionals

Page 9: Meaningful Use Risk Analysis - Security Assessment · (A) Risk analysis (Required) Conduct an accurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality,

9

For Eligible Professionals

Page 10: Meaningful Use Risk Analysis - Security Assessment · (A) Risk analysis (Required) Conduct an accurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality,

10

For Eligible Hospital & CAH

Page 11: Meaningful Use Risk Analysis - Security Assessment · (A) Risk analysis (Required) Conduct an accurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality,

HIPAA Titles - Overview

11

Page 12: Meaningful Use Risk Analysis - Security Assessment · (A) Risk analysis (Required) Conduct an accurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality,

HIPAA Security Rule

12

Page 13: Meaningful Use Risk Analysis - Security Assessment · (A) Risk analysis (Required) Conduct an accurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality,

Information Security Model

Confidentiality Limiting information access and

disclosure to authorized users (the right

people)

Integrity Trustworthiness of information

resources (no inappropriate changes)

Availability Availability of information resources (at

the right time)

13

Page 14: Meaningful Use Risk Analysis - Security Assessment · (A) Risk analysis (Required) Conduct an accurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality,

PHI

14

Health Information

Individually Identifiable

Health Information

PHI

Page 15: Meaningful Use Risk Analysis - Security Assessment · (A) Risk analysis (Required) Conduct an accurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality,

ePHI – 18 Elements

Elements Examples

Name Max Bialystock

Address

1355 Seasonal Lane

(all geographic subdivisions smaller than state,

including street address, city, county, or ZIP code)

Dates related to an individual Birth, death, admission, discharge

Telephone numbers 212 555 1234, home, office, mobile etc.,

Fax number 212 555 1234

Email address [email protected], personal, official

Social Security number 239-68-9807

Medical record number 189-88876

Health plan beneficiary number 123-ir-2222-98

Account number 333389

Certificate/license number 3908763 NY

Any vehicle or other device serial number SZV4016

Device identifiers or serial numbers Unique Medical Devices

Web URL www.rickymartin.com

Internet Protocol (IP) address numbers 19.180.240.15

Finger or voice prints finger.jpg

Photographic images mypicture.jpg

Any other characteristic that could uniquely

identify the individual

15

Page 16: Meaningful Use Risk Analysis - Security Assessment · (A) Risk analysis (Required) Conduct an accurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality,

HIPAA Security –Administrative

safeguard (§164.308)

(A) Risk analysis (Required)

Conduct an accurate and thorough assessment of the

potential risks and vulnerabilities to the confidentiality,

integrity, and availability of electronic protected health

information held by the covered entity.

(B) Risk management (Required)

Implement security measures sufficient to reduce risks

and vulnerabilities to a reasonable and appropriate level

to comply with §164.306(a).

(C) Sanction policy (Required)

Apply appropriate sanctions against workforce members

who fail to comply with the security policies and

procedures of the covered entity.

(D) Information system activity review (Required)

Implement procedures to regularly review records of

information system activity, such as audit logs, access

reports, and security incident tracking reports.

a(1) Security

Management

Process Implement policies and

procedures to prevent,

detect, contain, and

correct security

violations.

Page 17: Meaningful Use Risk Analysis - Security Assessment · (A) Risk analysis (Required) Conduct an accurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality,

Computers

Storage Devices

Networking devices (Routers,

Switches & Wireless)

Medical Devices

Scanners, fax and

photocopiers

VoIP

Smart-phones, Tablets (ipad,

PDAs)

Cloud-based services

Infrastructure

Any device that

electronically stores or

transmits information

using a software

program 17

Page 18: Meaningful Use Risk Analysis - Security Assessment · (A) Risk analysis (Required) Conduct an accurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality,

Trends in Healthcare IT

Informatics Collaboration

Mobile Computing

EHR

HIE

18

Page 19: Meaningful Use Risk Analysis - Security Assessment · (A) Risk analysis (Required) Conduct an accurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality,

Handheld Usage in Healthcare

19

• 25% usage with providers

• Another 21% expected to use

• 38% physicians use medical

apps

• 70% think it is a high priority

• 1/3 use hand-held for accessing EMR/EHR

compTIA 2011 Survey

Page 20: Meaningful Use Risk Analysis - Security Assessment · (A) Risk analysis (Required) Conduct an accurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality,

EMR and EHR systems

20

Page 21: Meaningful Use Risk Analysis - Security Assessment · (A) Risk analysis (Required) Conduct an accurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality,

Health Information Exchange (HIE)

21

Page 22: Meaningful Use Risk Analysis - Security Assessment · (A) Risk analysis (Required) Conduct an accurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality,

Social Media

How does your practice use it?

How do your employees use it?

Do you have policies?

22

Page 23: Meaningful Use Risk Analysis - Security Assessment · (A) Risk analysis (Required) Conduct an accurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality,

Public Cloud

EHR Applications

Private-label e-mail

Private Cloud

Archiving of Images

File Sharing

On-line Backups

Hybrid

Cloud-based services

Cloud Computing is taking

all batch processing, and

farming it out to a huge

central or virtualized

computers.

HIPAA regulations

remain barriers to full

cloud adoption

23

Page 24: Meaningful Use Risk Analysis - Security Assessment · (A) Risk analysis (Required) Conduct an accurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality,

Informatics

24

Page 25: Meaningful Use Risk Analysis - Security Assessment · (A) Risk analysis (Required) Conduct an accurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality,

Step 1: System Characterization

Hardware, Software, System

Interfaces, Data and Information,

People and System mission

System boundary, functions,

criticality and sensitivity

Step 2: Threat Identification

History of system attack,

Data from intelligence agencies

Threat Statement

Step 3: Vulnerability Identification

Reports from previous risk

assessments, any audit

comments, security

requirements, security test

results

List of potential vulnerabilities

Step 4:

Control Analysis

Current controls and planned

controls

List of current and planned

controls

Step 5:

Likelihood determination

Threat source motivation,

threat capacity, Nature of

vulnerability, current controls

Likelihood rating

Step 6:

Impact Analysis

Mission impact analysis, asset

criticality assessment, data criticality, data sensitivity

Impact rating

Step 7:

Risk Determination

Likelihood of threat

exploitation, magnitude of

impact, adequacy of planned or

current controls

Risk and Associated risk

levels

Step 8:

Control Recommendation

Recommended controls

Risk Assessment Methodology

Flowchart(NIST)

Page 26: Meaningful Use Risk Analysis - Security Assessment · (A) Risk analysis (Required) Conduct an accurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality,

Risk Analysis - Example

Risk Description

Risk Description /Threat and

Potential Loss

Probability

of Loss

Conse-

quence

Risk

Score

Risk

Value

ePHI located on Desk top in an

employees office is not routinely

backed up.

Risk = Loss of PHI

(Identified in Gap Analysis)

4 4 16 High

Page 27: Meaningful Use Risk Analysis - Security Assessment · (A) Risk analysis (Required) Conduct an accurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality,

Sample Risk Analysis Template

Likelihood High Medium Low

Imp

act

High

Unencrypted laptop ePHI

Lack of auditing on EHR systems

Missing security

patches on web server hosting patient

information

Medium

Unsecured wireless network in doctor’s office

Outdated anti-virus

software

External hard drives not being backed up

Low Sales presentation

on USB thumb drive

Web server backup tape not stored in a

secured location

Weak password on internal document

server

27

Page 28: Meaningful Use Risk Analysis - Security Assessment · (A) Risk analysis (Required) Conduct an accurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality,

Risk Management- Steps

Develop and implement a risk management plan

Implement security measures

Evaluate and maintain security measures

Risk transfer, reduction, acceptance

Page 29: Meaningful Use Risk Analysis - Security Assessment · (A) Risk analysis (Required) Conduct an accurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality,

Sanction Policy

Sample sanction policy:

https://docs.google.com/document/d/1KSMZtdp9O

AHILfTAKWdCkUR6jv6vl9mGIDYvv-5gQ1o/edit

Acceptable Use of PHI

- Minimum Necessary

- Sanction Exemptions

Disciplinary Actions

Page 30: Meaningful Use Risk Analysis - Security Assessment · (A) Risk analysis (Required) Conduct an accurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality,

Information System Security Review -

Example

Review of Security Incidents Response reports

System user privileges grants and changes logs

User-level system access logs, if available

User level system activity logs, if available

User level transaction log reports, if available

Exception reports

The required level of system activity logging and reporting capabilities, and the actual scope

Page 31: Meaningful Use Risk Analysis - Security Assessment · (A) Risk analysis (Required) Conduct an accurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality,

Top 5 Recommendations

31

1. Ensure encryption on all protected health information

in storage and transit.(at least de-identification)

2. Implement a mobile device security program.

3. Strengthen information security user awareness and

training programs.

4. Ensure that business associate due diligence includes

clearly written contract, a periodic review of

implemented controls.

5. Minimize sensitive data capture, storage and sharing.

Page 32: Meaningful Use Risk Analysis - Security Assessment · (A) Risk analysis (Required) Conduct an accurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality,

Meaningful Use Stage 2 and Stage 3

Security Requirements

Security Risk Analysis with encryption assessment

Secure Messaging for ambulatory practices

32

Page 33: Meaningful Use Risk Analysis - Security Assessment · (A) Risk analysis (Required) Conduct an accurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality,

Effective Management of Security and

Compliance

Find out where your business is weak

Determine the compliance and security needs &

gaps

Put reasonable policies and

business processes in place

Implement the right technologies &

processes to help with enforcement

Re-evaluate on a periodic and

consistent basis

33

Page 34: Meaningful Use Risk Analysis - Security Assessment · (A) Risk analysis (Required) Conduct an accurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality,

HIPAA Security Checklist

Overview

34

Page 35: Meaningful Use Risk Analysis - Security Assessment · (A) Risk analysis (Required) Conduct an accurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality,

Key Takeaways

Risk Analysis is foundation for an effective security

program

ePHI elements drives risk analysis scope

There is no silver bullet for risk management. It is a

journey of continuous assessment and improvement

35

Page 37: Meaningful Use Risk Analysis - Security Assessment · (A) Risk analysis (Required) Conduct an accurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality,

How can you help us?

Follow-us on social media

facebook.com/ehr20 (Like)

linkedin.com/company/ehr-2-0 (Follow us)

https://twitter.com/#!/EHR_20 (Follow)

Next Webinar on Business Associate Assessment( 3/21)

http://ehr20.com/services/

We sincerely appreciate your referrals! 37

Page 38: Meaningful Use Risk Analysis - Security Assessment · (A) Risk analysis (Required) Conduct an accurate and thorough assessment of the potential risks and vulnerabilities to the confidentiality,

Thank you!!

38