Risk Assessment
Risk Assessment
Risk Assessment
Security Topics
1.
Security 101 for Covered Entities
Security
SERIES
2.
Security Standards - Administrative Safeguards
3.
Security Standards - Physical Safeguards
4.
Security Standards - Technical Safeguards
5.
Security Standards - Organizational, Policies and Procedures and Documentation Requirements
6.
Basics of Risk Analysis and Risk Management
page.
Background
All electronic protected health information (EPHI) created, received, maintained or transmitted by a covered entity is subject to the Security Rule. Covered entities are required to implement reasonable and appropriate security measures to protect against reasonably anticipated threats or hazards to the security or integrity of EPHI. The Security Rule requires covered entities to evaluate risks and vulnerabilities in their environments and to implement policies and procedures to address those risks and vulnerabilities.
7.
Implementation for the Small Provider
Volume 2 / Paper 6
The objectives of this paper are to: Review the Security Rule required implementation specifications for Risk Analysis and Risk Management. Review the basic concepts involved in security risk analysis and risk management. Discuss the general steps involved in risk analysis and risk management.
ORGANIZATIONAL REQUIREMENTS - Business Associate Contracts and Other Arrangements - Requirements for Group Health Plans POLICIES and PROCEDURES and DOCUMENTATION REQUIREMENTS
Volume 2 / Paper 6
VULNERABILITY Vulnerability is defined in NIST SP 800-30 as [a] flaw or weakness in system security procedures, design, implementation, or internal controls that could be exercised
Volume 2 / Paper 6
THREAT An adapted definition of threat, from NIST SP 800-30, is [t]he potential for a person or thing to exercise (accidentally trigger or intentionally exploit) a specific vulnerability. There are several types of threats that may occur within an information system or operating environment. Threats may be grouped into general categories such as natural, human, and environmental. Examples of common threats in each of these general categories include: Natural threats may include floods, earthquakes, tornadoes, and landslides. Human threats are enabled or caused by humans and may include intentional (e.g., network and computer based attacks, malicious software upload, and unauthorized access to EPHI) or unintentional (e.g., inadvertent data entry or deletion and inaccurate data entry) actions. Environmental threats may include power failures, pollution, chemicals, and liquid leakage.
RISK The definition of risk is clearer once threat and vulnerability are defined. An adapted definition of risk, from NIST SP 800-30, is: The net mission impact considering (1) the NOTE: A Vulnerability probability that a particular [threat] will triggered or exploited by a exercise (accidentally trigger or intentionally Threat equals a Risk. exploit) a particular [vulnerability] and (2) the resulting impact if this should occur. [R]isks arise from legal liability or mission loss due to
Volume 2 / Paper 6
EXAMPLE RISK ANALYSIS STEPS: 1. Identify the scope of the analysis. NOTE: CMS is not 2. Gather data. recommending that all covered 3. Identify and document potential threats entities follow this approach, but rather is providing it as a frame and vulnerabilities. of reference. 4. Assess current security measures. 5. Determine the likelihood of threat occurrence. 6. Determine the potential impact of threat occurrence. 7. Determine the level of risk. 8. Identify security measures and finalize documentation. EXAMPLE RISK MANAGEMENT STEPS: 1. Develop and implement a risk management plan. 2. Implement security measures. 3. Evaluate and maintain security measures.
Volume 2 / Paper 6
Volume 2 / Paper 6
2. Gather Data
Once the scope of the risk analysis is identified, the covered entity should gather relevant data on EPHI. For example, a covered entity must identify where the EPHI is stored, received, maintained or transmitted. A covered entity could gather relevant data by: reviewing past and/or existing projects; performing interviews; reviewing documentation; or using other data gathering techniques. The data on EPHI gathered using these methods must be documented. (See 164.308(a)(1)(ii)(A) and 164.316(b)(1)(ii).) Many covered entities inventoried and performed an analysis of the use and disclosure of all protected health information (PHI) (which includes EPHI) as part of HIPAA Privacy Rule compliance, even though it was not a direct requirement. This type of inventory and analysis is a valuable input for the risk analysis. The level of effort and resource commitment needed to complete the data gathering step depends on the covered entitys environment and amount of EPHI held. For example, a small provider that keeps its medical records on paper may be able to identify all EPHI within the organization by analyzing a single department which uses an information system to perform billing functions. In another covered entity with large amounts of EPHI, such as a health system, identification of all EPHI may require reviews of multiple physical locations, most (if not all) departments, multiple information systems, portable electronic media, and exchanges between business associates and vendors.
Volume 2 / Paper 6
IDENTIFY AND DOCUMENT VULNERABILITIES While identifying potential threats, covered entities must also identify and document vulnerabilities which, if triggered or exploited by a threat, would create a risk to EPHI. (See 164.308(a)(1)(ii)(A) and 164.316(b)(1)(ii).) The process of identifying vulnerabilities is similar to the process used for identifying threats. The entity should create a list of vulnerabilities, both technical and non-technical, associated with existing information systems and operations that involve EPHI.
Volume 2 / Paper 6
Volume 2 / Paper 6
Volume 2 / Paper 6
10
QUALITATIVE METHOD The qualitative method rates the magnitude of the potential impact resulting from a threat triggering or exploiting a specific vulnerability on a scale such as high, medium and low. The qualitative method is the most common measure used to measure the impact of risk. This method allows the covered entity to measure all potential impacts, whether tangible or intangible. For example, an intangible loss, NOTE: Covered entities should consider the advantages such as a loss of public confidence or loss of and disadvantages of both credibility, can be measured using a high, qualitative and quantitative medium or low scale.
methods for determining the potential impact.
Volume 2 / Paper 6
11
Volume 2 / Paper 6
12
The final step in the risk analysis process is documentation. The Security Rule requires the risk analysis to be documented but does not require a specific format. (See 164.316(b)(1)(ii).) A risk analysis report could be created to document the risk analysis process, output of each step and initial identification of security measures. The risk analysis documentation is a direct input to the risk management process.
Volume 2 / Paper 6
13
Volume 2 / Paper 6
14
Volume 2 / Paper 6
15
In Summary
Risk analysis and risk management are the foundation of a covered entitys Security Rule compliance efforts. Risk analysis and risk management are on going processes that will provide the covered entity with a detailed understanding of the risks to EPHI and the security measures needed to effectively manage those risks. Performing these processes appropriately will ensure the confidentiality, availability and integrity of EPHI, protect against any reasonably anticipated threats or hazards to the security or integrity of EPHI, and protect against any reasonably anticipated uses or disclosures of EPHI that are not permitted or required under the HIPAA Privacy Rule.
Volume 2 / Paper 6
16
Volume 2 / Paper 6
17
164.308(a)(2) 164.308(a)(3) Authorization and/or Supervision Workforce Clearance Procedure Termination Procedures Isolating Health Care Clearinghouse Functions Access Authorization Access Establishment and Modification Security Reminders Protection from Malicious Software Log-in Monitoring Password Management Response and Reporting Data Backup Plan Disaster Recovery Plan Emergency Mode Operation Plan Testing and Revision Procedures Applications and Data Criticality Analysis (A) (A) (A) (R) (A) (A) (A) (A) (A) (A) (R) (R) (R) (R) (A) (A)
164.308(a)(4)
164.308(a)(5)
164.308(a)(6) 164.308(a)(7)
Volume 2 / Paper 6
18
164.310(b) 164.310(c) 164.310(d)(1) Disposal Media Re-use Accountability Data Backup and Storage Implementation Specifications (R)= Required, (A)=Addressable Unique User Identification Emergency Access Procedure Automatic Logoff Encryption and Decryption (R) (R) (A) (A)
TECHNICAL SAFEGUARDS
Standards Access Control Sections 164.312(a)(1)
Person or Entity Authentication Transmission Security Standards Business associate contracts or other arrangements Requirements for Group Health Plans
ORGANIZATIONAL REQUIREMENTS
Sections 164.314(a)(1) Implementation Specifications (R)= Required, (A)=Addressable Business Associate (R) Contracts Other Arrangements (R) Implementation (R) Specifications
164.314(b)(1)
Volume 2 / Paper 6
19
Volume 2 / Paper 6
20