200 likes | 312 Vues
This presentation by Randall J. Sandone, President & CEO of Argus Systems Group, explores the evolving landscape of HIPAA compliance. It covers the essential security assurance requirements, the limitations of traditional security methods, and how modern computing architectures necessitate more robust security controls. Key topics include access control, audit trails, data authentication, and the importance of operating system-level security solutions that protect patient data integrity, confidentiality, and availability. Learn about the benefits of high-assurance systems for enabling effective HIPAA compliance in a complex digital environment.
E N D
Operating System Approaches to HIPAA Compliance Randall J. Sandone President & CEO Argus Systems Group
Agenda • Overview of HIPAA Security Assurance Requirements • Evolving Computing Architectures • Limitations of Traditional Security Methods • Operating System Security Solutions • Benefits of Certified, High-Assurance Systems
HIPAA Security Requirements • Provides for Access Controls, Audit Controls, Authorization Controls, and Data & Entity Authentication • To guard integrity, confidentiality, and availability of patient data and medical records • Combination of policies, procedures, and technology implementation & management • Provides for civil and criminal penalties for failure to comply; breaches to compliance
Evolving Computing Landscape • Collaborative Environments • Need for dispersed groups of individuals to gain access and modification rights to data and network resources • Classes of Data and Users • Patient records and histories, laboratory results, financial and insurance information all need to be accessed by specific and different groups of people • Ensure segregation of data while maintaining economies of server/application consolidation
Evolving Computing Landscape • Open Networks • Concept of “insiders” has been extended to employees, partners, clients, patients • Everyone’s an insider and has potential to access sensitive data and computing resources! • Multi-Networked Machines • Complex network architectures have led to persons and systems requiring access to more than one network • Public networks connected to machines connected to private internal networks
Evolving Computing Landscape • Multiple Use Machines • Server consolidation trend allows realization of significant economic benefits • Also raises security issues related to corruption of data and interaction between multiple applications
Limitations of Traditional Approaches • Perimeter Defenses • Who’s an Insider? Who’s an Outsider? • Where is the Perimeter? • What Happens Once Inside the Perimeter?
Limitations of Traditional Approaches • System Monitoring • What’s Acceptable Use? • How to Compensate for Collaboration? • How to Deal with Flood of Data? • New patterns of attacks, viruses, application holes introduced daily! • Monitoring Doesn’t Halt Activity!
Limitations of Traditional Approaches • “Patch and Pray” • Patch applications “as soon as patches are released” • Ex post facto protection! • What protects against new holes? • How to effectively manage patch compatibility and updates to applications?
A New Approach Is Needed • Minimal (if any) reliance upon system activity monitoring • No reliance on fore-knowledge of holes or patch updates • Extend from network connections to data resources • Ability to enforce security policy on all users (even administrators) • Ability to differentiate and segregate classes of users and classes of data
What Is This New Approach? Operating System Level Security Secure Application Environments
What is OS Security? • New security features and functionality added to standard operating systems • Control application access to files, networks, and other applications • Applies regardless of who user is or how they attempt access • Cannot be overridden by any means or process • Security at the point of decision
OS Security and HIPAA • Solves variety of HIPAA requirements • Access Controls • Audit Trails • Data Authentication • Prevention of Unauthorized Access to Electronic Records
Access Controls • Mandatory Access Controls • Ensure Authorized Users can not perform Unauthorized Activities • Allows for division of Administrative Responsibility • Admins can be prevented from accessing any data • No one user can have total control • Can not be circumvented by any means • Delivers high-assurance protection
Audit Trails • Reduced information within audit trails • No need to monitor all activities, look for patterns, match signatures • Records can be protected from access or modification by OS-level controls • Can log user information, access information, date and time stamp
Data Authentication • No file, program, or command can be surreptitiously accessed, modified, or executed • No Trojan Horse or backdoors can be implanted • A priori virus protection
Protection of Networked Information Assets • Controls extend from network level through to data resources • Can be configured to disallow information dissemination based on entry, exit point • Can ensure read-only traffic based on entry, exit point
Benefits of Operating System Security • Reduces risk in new architectures • Protects where other approaches are deficient – ‘point of decision’ • Satisfies multiple HIPAA requirements with one solution • Allows realization of cost economies • Demonstrates due care • Reduces liability concerns
Benefits of Certified, High-Assurance • US government NIAP – credibility! • Scalable security criteria • Independent validation & verification • Stringent certification testing • Demonstrates due care • Reduce/mitigate legal liabilities • Basis for lower insurance premiums • Easy ‘pass-through’ requirement to partners
Questions? Thank You!