Health IT Security Risk Assessment Tool
Health IT Security Risk Assessment Tool
techniques. The document is from a site which has not identified restrictions on
permitted use and are sharing this information for the benefit of the audit community.
However, while we have attempted to provide accurate information no
representation is made or warranty given as to the completeness or accuracy of the
document. In particular, you should be aware that the document may be incomplete,
may contain errors, or may have become out of date. While every reasonable
precaution has been taken in the preparation of this document, neither the author
nor AuditNet® assumes responsibility for errors or omissions, or for damages
resulting from the use of the information contained herein. The information contained
in this document is believed to be accurate. However, no guarantee is provided. Use
this information at your own risk.
Audit Program Licensing Terms 1. You accept that this product is
intended for your use, and you will not duplicate in any form or manner,
electronic or otherwise, copies of this product nor distribute this product to
anyone else. 2. You recognize that the product and its content are the sole
property of AuditNet® (the Publisher), and that we have copyrighted the
product. 3. You agree that the Publisher is not responsible for any
interruption of service or malfunction that is a consequence of the Internet,
a service provider, personal computer, browser or other software or
hardware components. You accept that there is no guarantee that this
product is totally error free. You further understand and accept that the
Publisher intends to provide reliable information but does not guarantee the
accuracy or completeness of any information, and is not responsible for any
results obtained from the use of such information. 4 This license is effective
until terminated, when the license or subscription period ends without
renewal, or when you destroy this product and any related documentation.
The Publisher may terminate your license without notice if you fail to
comply with the conditions set forth in this agreement, and may pursue any
other legal recourse.
HIT Security Risk Assessment Tool
Presented By: The National Learning Consortium (NLC)
Developed By: Health Information Technology Research Center (HITRC)
Privacy and Security Community of Practice (Toolkit Workgroup)
Version: 1.0
Date: October 21, 2011
Description: The purpose of a risk assessment is to identify conditions where Electronic Protected Health Information (EPHI) could be disclosed
without proper authorization, improperly modified, or made unavailable when needed. This information is then used to make risk
management decisions on what reasonable and appropriate safeguards are needed to reduce risk to an acceptable level. This Risk
Assessment Tool is intended to be a starting point for identifying cybersecurity risks to your organization. Please note that this tool is best
printed using landscape orientation and on legal sized paper.
Table of Contents: How to Complete the Forms
800-66 Risk Guidance
Practice Summary
Inventory (Preparation)
Screening Questions (Step 1)
People and Processes (Step 2a)
Technology (Step 2b)
Findings-Remediation (Step 3)
The National Learning Consortium (NLC) is a virtual and evolving body of knowledge and tools designed to support healthcare providers
and health IT professionals working towards the implementation, adoption and meaningful use of certified EHR systems.
The NLC represents the collective EHR implementation experiences and knowledge gained directly from the field of ONC’s outreach
programs (REC, Beacon, State HIE) and through the Health Information Technology Research Center (HITRC) Communities of Practice
(CoPs).
The following resource is a tool used in the field today and recommended by “boots-on-the-ground” professionals for use by others who
have made the commitment to implement or upgrade to certified EHR systems.
This Risk Assessment Tool contains a four-step process designed to enable respondents to identify their level of risk against pre-identified threats and vulnerabilities. The tool is
designed for ease of use and user-friendliness. Cells that populated on one table will be automatically populated on subsequent tabs to ensure accuracy and simplicity. The US
Department of Health and Human Services(HHS), Office for Civil Rights (OCR) references components of the National Institute of Standards and Technology (NIST) Special
Publications (SP) 800-66 and 800-30 as guidance for a security risk assessment. NIST SP 800-66 is an introductory resource guide for implementing the Health Insurance
Portability and Accountability Act (HIPAA) Security Rule, and NIST SP 800-30 is a risk management guide for information technology systems.
Background information on the nine primary steps to the risk assessment methodology outlined in NIST SP 800-66 and in NIST SP 800-30 is available on the next tab, labeled 800-
66 Risk Guidance. These steps offer helpful background information on the assessment steps, how they interact with one another and basic descriptions of risk and the
components of risk, such as threats and vulnerabilities. Internet links to NIST SP 800-66 and SP 800-30 are also provided for those seeking additional information.
Preparation is the Inventorying of Assets tab and is optional to the respondent but highly recommended for completion. In this step, the respondent should list ALL devices that
are touched by EPHI. Devices may be for example, desktop PCs, fax machines or specialized medical devices with computerized hard drives to record patient data and test results.
Any software applications, whether for recording of patient information, billing information or any other purpose which comes into contact with EPHI should also be listed here. The
next column will ask whether the device processes, stores or transmits EPHI. If the devices does not process EPHI, there is no need to proceed further with this device. If the
devices DOES process EPHI, then the respondent would select from the next column whether the asset should be categorized as a People and Process asset, or as a Technology
asset.
Step 1 is the Screening Questions. This tab is offered as a means for determining the degree to which threats and associated vulnerabilities apply to their organization’s assets.
While this tab is an optional feature in the risk analysis, it is strongly recommended that respondents utilize this tab, as these questions will assist in additional responses in Steps 2a
and 2b. Users should examine the question and determine the degree to which their current operations address the matching Threat-Vulnerability Statement. The choices from the
drop down menu are Addressed, Partially Addressed or Not Addressed. Two columns are provided to the far right in the table for respondents to provide expanded responses to the
questions in the row; responses entered in the People/Processes column will be automatically transferred to the Existing Control column of the People and Processes (Step 2a) tab
and responses entered in the Technology column will be automatically transferred to the Existing Control column of the Technology (Step 2b) tab. If no action is taken, please
indicate 'No Action Taken' in the appropriate column(s). There is no correct or incorrect response, this is merely a sampling of what practitioners are doing to mitigate threats or
minimize vulnerabilities.
Steps 2a (People and Processes) and 2b (Technology) utilize the same questions, criteria and risk calculations. It is necessary to separate the two categories of assets for
analysis purposes.
The People and Processes and Technology tabs will list assets typically found within a medical practice which are applicable to the Threat-Vulnerability Statement appearing in the
next column.
How
Theto Complete the Control
Recommended Forms Measures, which is associated with the Threat-Vulnerability, is pre-populated
4 and is provided for respondents to consider in developing their information October 21, 2011
security posture.
analysis purposes.
The People and Processes and Technology tabs will list assets typically found within a medical practice which are applicable to the Threat-Vulnerability Statement appearing in the
next column.
The Recommended Control Measures, which is associated with the Threat-Vulnerability, is pre-populated and is provided for respondents to consider in developing their information
security posture.
The Existing Control is what the practitioner is doing, if any corrective actions are being taken, to mitigate and reduce the threat or vulnerability. These cells will be pre-populated
with data from the People/Processes and/or Technology columns of the Screening Questions (Step 1) tab.
The Existing Control Effectiveness is a Drop-Down list in which the respondent will select the best answer to describe the degree to which their counter-measures address the
Threat-Vulnerability statement earlier in the row. When making a selection, respondents should also consider how effective their counter-measures are in relation to the
Recommended Control Activity which is suggested in the previous cell. The available response choices are Effective, Partially Effective or Not Effective.
The Exposure Potential is a pre-populated cell from the response in the previous Step 1 tab and represents the risk exposure to the practice for this Threat-Vulnerability statement.
The risk exposure is rated on a scale of High, Medium or Low. The purpose is to offer additional guidance and empower the respondent in their selections on the following choices of
Impact and the Likelihood of Occurrence, or simply ‘Likelihood’. As with the Impact Rating, this is a judgment by the respondent as to how likely an 'Undesirable Event', such as
power outage or fire, are to occur to the medical practice. Please select from the appropriate corresponding choice of:
VERY LIKELY is defined as having a probable chance of occurrence.
LIKELY is defined as having a significant chance of occurrence .
NOT LIKELY is defined as a modest or insignificant chance of occurrence .
Impact is the consequences of a security event to the medical practice. Please select from the appropriate corresponding choice of High, Medium or Low for each Business Asset.
HIGH is defined as having a catastrophic impact on the medical practice; the medical practice is incapable of offering medical treatments or services and a significant number of
medical records have been lost or compromised.
MEDIUM is defined as having a significant impact; the medical practice may offer a reduced array of treatment services to patients. A moderate number of medical records within the
practice have been lost or compromised.
LOW is defined as a modest or insignificant impact; the medical practice can continue to offer treatment to patients and some medical records may be lost or compromised.
NOTE: Any loss or compromise of 500 medical records or more requires that the practice notify the US Department of Health and Human Services (HHS), Office for Civil
Rights (OCR) immediately.
The Risk Rating requires no action by the respondent. The column automatically calculates the risk rating to the medical practice based upon the inputs to the 'Impact' and
'Likelihood' columns.
Step 3, Findings-Remediation, is the final tab requiring completion and is almost entirely auto-populated with data from previous tabs. The Risks Found column is populated with
the data from the People and Process or Technology asset tabs ,which in Steps 2a or 2b was determined to have a Risk Rating of either Medium or High. The Existing Control
Measures Applied are the measures, if any, currently being undertaken to address the threat as was indicated in Steps 2a or 2b. Recommended Control Measures are the
corresponding recommended corrective measures which were automatically populated in the tabs of Steps 2a and 2b and appear again in this space. The final cell, Additional
Steps, offers the respondent an opportunity to consider and state any additional measures they would like to implement.
NEXT STEP: Please proceed to the 800-66 Risk Guidance tab which provides guidance on conducting a risk assessment.
2. Gather Information.
During this step, the covered entity should identify: The conditions under which EPHI is created, received, maintained, processed, or transmitted by the covered entity. It should also
identify the security controls currently being used to protect the EPHI.
• Vulnerabilities are a flaw or weakness in a system security procedure, design, implementation, or control that could be intentionally or unintentionally exercised by a threat.
• Impact is a negative quantitative and/or qualitative assessment of a vulnerability being exercised on the confidentiality, integrity, and availability of EPHI.
For further information, please refer to NIST SP 800-66 and NIST SP 800-30. A link to the NIST Special Publications 800 Series is provided below:
http://csrc.nist.gov/publications/PubsSPs.html
NEXT STEP : Please proceed to the Step 1 tab and complete the appropriate sections which follow. Background information and guidance is offered at the top of each tab.
Practice Information
Practice Name
Contact Information Name:
(Practice Point of Contact) Email:
Phone:
Office Locations
EHR Information
EHR Model
(Hosted or Client/Server)
EHR System
Certified Version?
Vendors/Third Parties
IT Vendor
EHR Vendor Company
REC
Other
Infrastructure
EHR Server Information
Fax Server Information
Network Firewall
Wireless Devices
Workstations
Media Used
Smartphones
USB Thumb Drives
USB Hard Drives
CD's
Backup Tapes
Other
PHI Location
Where is PHI Stored?
The following template, consistent with Step 1 of NIST Special Publications 800-66 and 800-30.
People and Processes: Any asset(s) which processes, transmits or stores Electronic Personal Health Information (EPHI). The assets may be used in an
operational or administrative capacity, for business purposes or for sustainment of operations. As long as the asset usage impacts EPHI usage, then it should
be listed in the tool.
Examples could include devices such as Desktop PCs, Fax Machines, Photo Copiers, Scanners, Mobile Computing Devices, Cell Phones/Smart Phones,
Storage Servers, Monitors, Phones, Pagers, Network Connections, Internet Routers, Printer(s), Teleconferencing Equipment, Dictaphones, Software, Medical
Equipment, Specialized Medical Devices (such as X-Ray, EKG, or EEG) or Portable Storage devices such as Thumb Drives.
NOTE: policies, procedures, organizational standards and guidance should all be considered and included in the Business Asset section.
Technology: This would be a list that exclusively contains the software package(s) which process EPHI. This may be any computer program from specialized
medical software to the Microsoft Office suite of products such as Excel, Word or Access. Any software or computer program which processes, transmits or
stores EPHI would be categorized in this section.
NOTE: If an asset does not process, store, or transmit EPHI, then it is NOT necessary to consider or include that asset on this list. The only consideration is
whether or not EPHI is a factor in the usage of the asset.
NEXT STEP: Please take the opportunity to review all your selections and inputs, in order to ensure accuracy in the responses given.
When examining each of the individual questions below, consider the question and your organizations current posture. Please select from the drop-down list as to whether your organization
Addresses, Partially-Addresses or Does Not Address the security issue in question. There is no correct or incorrect response. The purpose of the risk analysis effort is to gauge the information
security practices within medical facilities and where to best direct resources to remediate the areas of greatest concern. When the selection is made, the corresponding ‘Exposure Potential’ column
in Steps 2a or 2b will automatically populate with the words, ‘High', 'Medium' or ‘Low’ as a means of assisting the respondent in calculating their risk.
There will be a pre-selected Threat-Vulnerability Statement which will correspond to the question; no action is required for this cell. The respondent is offered this statement in consideration of what,
if any, response they would like to offer in the last two cells- People/Processes and Technology. All responses in the last two columns will pre-populate information in the Existing Control column on
the People and Processes (Step 2a) or Technology (Step 2b) tab respectively. The respondent should populate this cell with what the practitioner is doing, if any corrective actions are being taken, to
mitigate and reduce the threat or vulnerability. If no action is taken, please indicate 'No Action Taken' in the appropriate column(s). There is no correct or incorrect response, this is merely a sampling
of what practitioners are doing to mitigate threats or minimize vulnerabilities. The pre-populated Threat-Vulnerability Statement will appear again in Steps 2a and 2b.
NEXT STEP: After completing the questions on this tab, please proceed to the tab labeled People and Processes (Step 2a).
- REC helping to
start the risk
assessment process
- No regular assessments of
[3.1] Do you have a process that addresses: the identification by using this
Information around risks and technology is performed; including
and measurement of potential risks, mitigating controls spreadsheet as a
related control options are not vulnerability testing, patch
Risk (measures taken to reduce risk), and the acceptance or foundation for the
3.1 presented to management management, or other review of
Assessment transfer (Insurance policies, warranties for example) of the risk assessment as
before management decisions systems to help determine risks
remaining (residual) risk after mitigation steps have been well as risk
are made. [TVS004] associated with them so appropriate
applied? management plan.
action(s) can be taken.
- No prior risk
assessments
conducted
- No formal
Applications and technology information security
During [4.1] Have your employees been provided formal information
solutions are not correctly and training but periodic
Employment – security training? Have policies been communicated to your - The use of technology regarding
securely used since a training HIPAA training
4.1 Training, employees? Are periodic security reminders provided? a training curriculum is not currently
curriculum for employees has (random).
Education & i.e. New employee orientation, yearly training, posters in being utilized.
not been established or - No one dedicated
Awareness public areas, email reminders, etc.
regularly updated. [TVS006] to the role of training.
- No IT orientation
5. Personnel Security
- References are
verified
Background verification
- Credential
[5.1] Does your organization perform background checks to checks are not carried out and
verification is also
Background examine and assess an employee’s or contractor’s work and management is not aware of
5.1 performed N/A
Checks criminal history? academic, professional, credit
- No criminal
i.e. Credential verification, criminal history, references or criminal backgrounds of
background checks
employees. [TVS007]
are performed at this
time
Prior to
[5.2] Are your employees required to sign a non-disclosure Employees or contractors do
Employment - - Non disclosure - Accounts are not created within
agreement? If so, are employees required to sign the non- not agree or sign terms or
5.2 Terms and Agreements required the EHR until appropriate
disclosure agreement annually? Non-disclosure and/or conditions of employment.
Conditions of prior to employment Agreements are signed
confidentiality form at initial employment [TVS008]
Employment
6. Physical Security
- Workstations/Laptops/Tablets
Positioning?
- No facility security
Privacy screens used?
plan is currently in
Cable locks used?
place at the practice
[6.1] Do you have effective physical access controls (e.g., door - Fire escape plans
- Server Room
locks) in place that prevent unauthorized access to facilities are posted
Server room location?
and a facility security plan? throughout the
Locked at all times?
a) Are there plans in place to handle/manage contingent building
Proper cooling?
events or circumstances (e.g. what if the person with the key to - Alarm system is
Battery backup?
the server room is sick)? currently in place and
Fire suppression?
b) Is there a facility security plan? monitored 24/7
Unauthorized parties gain
c) How are physical access controls authorized (who is
physical access to facilities - Network Closet
6.1 Secure Areas responsible for ensuring that only appropriate persons have - Front Desk
due to insufficient physical Locked at all times?
keys or codes to the facility and to locations within the facility Waiting room
entry/exit controls. [TVS010] Proper cooling?
with ePHI)? securely separated?
Battery backup?
d) Are there policies and procedures to document repairs All patients must sign
and modifications to physical components of the facility that in?
- Building
are related to security? All visitors must sign
Emergency lighting?
- [See Facility Walkthrough Checklist for additional in?
Fire detection?
information] All visitors & patients
Fire suppression?
escorted?
Back door remains locked?
Sign-in sheet
Other doors remain locked?
secured and
Water shut-off valves?
maintained?
Emergency power shut-off?
Building alarm system?
7. Network Security
- No policies or
[7.2] Is sensitive information transferred to external recipients? procedures around
If so, are controls in place to protect sensitive information when the protection of
transferred (e.g. with encryption)? i.e. Secure VPN connection electronic
Information involved in
with EHR and/or IT vendors or email encryption (certificate messaging.
7.2 Encryption electronic messaging is
server, ZixMail). - No PHI is
compromised. [TVS012]
a) Is sensitive information being sent via text, either by email electronically sent via
(i.e. phonenumber@messaging.att.com) or by texting on the email or other
phones themselves? electronic means
except through fax.
[8.2] Are user IDs for your system uniquely identifiable? Unauthorized users are able to - No policy or - Unique user ID's are utilized
Identity a) Any shared accounts at all? i.e. hard coded into gain access to operating procedure around the within the EHR.
8.2
Management applications, someone is sick or unavailable, emergency systems by claiming to be an use of unique user - However, user ID's are NOT
access to sensitive information? authorized user. [TVS016] ID's unique for workstation access
- No current policies
[9.1] Has antivirus software been deployed and installed on Systems and data are
and procedures
your computers and supporting systems (e.g., desktops, exposed to malicious software
9.1 Antivirus surrounding the use
servers and gateways)? and/or unauthorized use.
and updating of
1) Product installed? Centrally managed? Updated daily? [TVS018]
antivirus software
Unauthorized information
[9.2] Are systems and networks monitored for security events?
processing activities occur
Security If so, please describe this monitoring. i.e. server and
9.2 undetected due to lack of
Monitoring networking equipment logs monitored regularly. Servers,
consistent logging and
routers, switches, wireless AP's.
monitoring activities. [TVS019]
- No formal change
management - No internal tracking or reporting of
procedures currently changes to the systems
[9.7] Do formal change management procedures exist for The change management
in place. - EHR vendor does keep records of
networks, systems, desktops, software releases, deployments, process in place does not
- The existing any changes performed through the
Change and software vulnerability (e.g., Virus or Spyware) patching adequately protect the
9.7 process for EHR use of their ticketing system
Management activities? i.e. Changes to the EHR? Changes to the environment from disruptive
updating involves
workstations and servers? Appropriate testing, notification, and changes in production.
being contacted by - Windows Updates
approval? [TVS024]
the vendor and then Workstations update automatically?
scheduling a time for Servers are updated regularly?
installation.
Steps for Using the People and Processes Tab (Step 2a):
1. Asset Management Category - This list has already been pre-populated to assist the respondent and requires no action. This cell contains the typical asset or business process which
corresponds with the Threat-Vulnerability Statement in the next cell.
2. Threat-Vulnerability Statement - The Threat-Vulnerability Statement is also pre-populated and requires no action on the part of the respondent.
3. Recommended Control Measures - This column requires no action by the respondent. This is a recommended action which is provided for respondents to consider in developing their information
security posture.
4. Existing Control - This column is pre-populated from the response in the People/Processes column of the Screening Questions (Step 1) tab and requires no action by the respondent.
5. Existing Control Effectiveness - This is a Drop-Down list in which the respondent will select the best answer to describe the degree to which their counter-measures address the Threat-
Vulnerability statement earlier in the row. When making a selection, respondents should also consider how effective their counter-measures are in relation to the Recommended Control Measures
which is suggested in the previous cell. The available choices are Effective, Partially Effective or Not Effective.
For example, the Threat-Vulnerability statement that “Facilities are protected by appropriate entry controls” would be evaluated as to how effectively the workspaces where EPHI can be accessed are
protected. Additionally, the respondent would also want to consider how effectively the medical facility itself is secured and protected. These are some of the factors which must be considered in
offering a response.
6. Exposure Potential - This cell is pre-populated from the response on the Screening Questions (Step 1) tab and requires no action. This cell represents the response of ‘Addressed, Partially-
Addressed or Not-Addressed’ relative to the Threat-Vulnerability statement. The purpose is to offer additional guidance and empower the respondent in their selections on the following choices of
Impact and Likelihood.
7. Likelihood - As with the Impact Rating, this is a judgment by the respondent as to how likely an 'Undesirable Event', such as power outage or fire, are to occur to the medical practice. Please
select from the appropriate corresponding choice of Low, Medium or High for each asset.
Very Likely would be defined as having a probable chance of occurrence.
Likely would be defined as having a significant chance of occurrence.
Not Likely would be defined as modest or insignificant chance of occurrence.
8. Impact - In the event that an 'Undesirable Event' such as a power outage or a fire occurs, what is the level of impact to the practice? The response is a completely subjective judgment by the
People and Processes
practitioner as to what(Step 2a) of an occurrence of the threat would have upon the medical practice.
the impact 22 Please select from the appropriate corresponding choice of High, Medium, or Low October
for each 21, 2011
asset.
Very Likely would be defined as having a probable chance of occurrence.
Likely would be defined as having a significant chance of occurrence.
Not Likely would be defined as modest or insignificant chance of occurrence.
8. Impact - In the event that an 'Undesirable Event' such as a power outage or a fire occurs, what is the level of impact to the practice? The response is a completely subjective judgment by the
practitioner as to what the impact of an occurrence of the threat would have upon the medical practice. Please select from the appropriate corresponding choice of High, Medium, or Low for each
asset.
High would be defined as having a catastrophic impact on the medical practice; the medical practice is incapable of offering medical treatments or services and a significant number of medical records
have been lost or compromised.
Medium would be defined as having a significant impact on the medical practice; the medical practice may offer a reduced array of treatment services to patients. A moderate number of medical
records within the practice have been lost or compromised.
Low would be defined as having a modest or insignificant impact on the medical practice; the medical practice can continue to offer treatment to patients and some medical records may be lost or
compromised.
NOTE: A loss or compromise of 500 medical records or more may qualify as a breach that requires the practice to notify the US Department of Health and Human Services Office for
Civil Rights within a defined time frame.
9. Risk Rating - This column requires no action by the respondent. The column automatically calculates the risk rating to the medical practice based upon the inputs from the 'Impact Rating' and
'Likelihood of Occurrence' columns.
NEXT STEP: After completing the questions on this tab, please proceed to the tab labeled Technology (Step 2b).
References:
HIPAA Security Rule
OCR Security Rule Guidance: http://www.hhs.gov/ocr/privacy
COBIT Framework for IT Governance and Control, version 4.1
NIST Special Publication 800-66
ISO/IEC 17799 (2005) Part 1
Payment Card Industry, Data Security Standards PCI DSS v1.1
Security Program Security breaches occur Agreements with third parties, such as IT 0
when dealing with third vendors, which involve accessing,
parties due to a lack of processing, communicating with or managing
security considerations the organization's information or information
in the related third party processing facilities, or adding products or
agreement. [TVS002] services to information processing facilities
cover all relevant security requirements.
Contracts between business associates and
covered entities address administrative,
physical, and technical safeguards that
reasonably and appropriately protect the
confidentiality, integrity, and availability of High
information. [RCM002]
- Verify and ensure Business Associate
agreements are in place with all third parties
that use or disclose PHI. This includes those
that even have access to PHI like IT service
providers and EHR vendors.
Risk Management Information around risks Risk assessments are conducted to identify, - REC helping to start the
& Compliance and related control quantify, prioritize and manage risks. The risk assessment process by
options are not prioritization is accomplished by creating and using this spreadsheet as a
presented to using criteria for risk acceptance and foundation for the risk
management before objectives which are important to the assessment as well as risk
management decisions organization. [RCM004] management plan.
are made. [TVS004] - Ensure this risk assessment is accurate - No prior risk assessments
with all information that has been filled out as conducted
well as the risk ratings (likelihood and impact)
that have also been completed based on the
information provided.
- After verifying the accuracy of information,
the Medium and High risk items from the
Findings-Remediation tab should be
addressed by making the necessary business Likely High Medium
decisions on whether to mitigate, transfer, or
accept the risks. It is recommended to
mitigate risks that are easy to address.
- It is important to continue the risk
assessment process by assessing additional
risks to your facility, systems, and all other
assets to ensure a thorough and up-to-date
risk assessment is conducted.
Training & Applications and A training curriculum for employees has been - No formal information
Awareness technology solutions are established to educate and train users for security training but
not correctly and correct and secure use of applications and periodic HIPAA training
securely used since a technology solutions. [RCM006] (random).
training curriculum for - The REC has provided a privacy and - No one dedicated to the
employees has not been security toolkit which includes PowerPoint role of training.
established or regularly training that could be utilized for regular - No IT orientation
updated. [TVS006] training.
- Training could include new employee
High
orientation for all new personnel and
contractors as well as weekly or monthly
email security reminders.
- Security reminders could also be posted in
public areas (kitchen, hallways, etc.) to help
train employees.
Network Security Sensitive systems co- If possible sensitive systems have a - No network diagram or
located with less dedicated, and isolated, computing details regarding the
sensitive systems are environment. [RCM011] configurations being used
accessed by - A complete network diagram that outlines are currently available.
unauthorized parties. the boundaries of the network is High
[TVS011] recommended to help gain an overview of the
computing environment(s) being protected.
Network Security Technical vulnerabilities Timely information about technical - No vulnerability testing
are exploited to gain vulnerabilities of information systems being has been completed.
inappropriate or used is obtained, the organization's exposure
unauthorized access to to the vulnerabilities is evaluated and
information systems due appropriate measures are taken to address
to lack of controls for the associated risk. [RCM013]
those vulnerabilities. - Vulnerability testing should be performed
[TVS013] regularly to obtain information bout technical Very Likely High High
vulnerabilities to the systems.
- A policy and procedure surrounding this
process should be in place and should
include the steps taken, where necessary,
once vulnerabilities are found.
Logical Access Unauthorized users are All users are assigned a unique identifier - No policy or procedure
able to gain access to (user ID) for their business use. This unique around the use of unique
operating systems by ID shall be used exclusively on computing user ID's
claiming to be an systems within the medical practice which
authorized user. process EPHI, and a suitable authentication
[TVS016] technique is chosen to validate the identity of
a user. [RCM016]
- The Information Security Policy template
provided by the REC contains a section on High
the use of unique user ID's, if adopted. Refer
to section IS-1.2.
- Unique user ID's should extend beyond the
EHR and include other systems, i.e.
workstations and servers.
Operations Systems and data are Policies and procedures are implemented that - No current policies and
Management exposed to malicious address the prevention, detection and procedures surrounding the
software and/or removal of malicious code in the computer use and updating of
unauthorized use. operating environment. This would cover all antivirus software
[TVS018] computers or devices, such as printers and
thumb drives, which connect to computers.
[RCM018]
- The Information Security Policy template
provided by the REC can help with the policy
needed regarding antivirus protection. This is High
outlined in section IS-1.4 of the policy.
- Procedures regarding the administration,
whether centrally or locally managed, should
also be in place and include what actions to
take whenever any detections occur
Operations Media (e.g., documents, Operating procedures are established to - No procedures in place
Management computer media (e.g. protect documents, computer media (e.g., surrounding the handling of
tapes, disks), tapes, disks), input/output data and system media.
input/output data, documentation. This is done to protect
system documentation) sensitive information from unauthorized
is compromised by disclosure, modification, removal, and
unauthorized parties destruction. [RCM020]
due to ineffective - The Information Security Policy template
handling procedures. provided by the REC can be a good starting
[TVS020] point for how media is handled within the High
facility. Refer to sections IS-1.9 and IS-1.10 of
the Information Security Policy template.
- Handling of media should include
expectations of employees, use of encryption,
wiping and destruction, storage, etc.
Operations The production Development, test, and operational facilities - Testing that relates to the
Management environment is impacted are separated from one another. This is done EHR occurs though the
due to the lack of to reduce the risks of unauthorized access or EHR vendor and not
separation of unauthorized changes to the computer performed internally.
development and operational system or to any software High
production applications running upon the operating
environments. [TVS022] system. [RCM022]
Operations The integrity of a Employee duties and employees 'areas of - Job duties are separated
Management business process is responsibility' are separated; this is to reduce within the EHR based on
compromised due to the potential opportunities for unauthorized or their job roles but not
lack of segregation of unintentional modification or misuse of the formally outlined within any
duties (e.g., maker & organization's computing systems or assets. policy or procedure.
checker). [TVS023] [RCM023]
- The Information Security Policy template
can be a good start to help address the
segregation of duties within the facility but
High
should be updated as needed as well as
adopted as a formal policy. Refer to section
IS-1.2 of the information security policy
template.
- Appropriate and detailed job descriptions
can also help outline the areas of
responsibility between employees.
Incident Security incidents are A consistent approach to managing - Incidents are reported but
Management not managed with a information security incidents, consistent with not consistent in the
consistent and effective applicable law, is in place to handle approach and no formalized
approach. [TVS025] information security events and weaknesses incident response plan is
once they are reported. Activities such as currently in place.
incident reporting, organizational response,
relocation of operations, evidence collection
and system recovery are all components of
incident response. [RCM025]
- An incident response plan should also be in
place to address how incidents are to be
responded to and outlines the escalation
steps necessary.
- The Information Security Policy template
provided by the REC can be a good starting High
point for addressing a breach which does
contain a breach assessment tool that could
be part of an incident response plan.
Appendix E of the template contains the
following items:
Security Incident Report
Security Incident Investigation form
Security Incident Log
Security Breach Assessment Tool
1. Asset Management Category - This list has already been pre-populated to assist the respondent and requires no action. This cell contains the typical technology process which corresponds with
the Threat-Vulnerability Statement in the next cell.
2. Threat-Vulnerability Statement - The Threat-Vulnerability Statement is also pre-populated and requires no action on the part of the respondent.
3. Recommended Control Measures - This column requires no action by the respondent. This is a recommended action which is provided for respondents to consider in developing their
Information Security posture.
4. Existing Control - This column is pre-populated from the response in the Technology column of the Screening Questions (Step 1) tab and requires no action by the respondent.
5. Existing Control Effectiveness - This is a Drop-Down list in which the respondent will select the best answer to describe the degree to which their counter-measures address the Threat-
Vulnerability statement earlier in the row. When making a selection, respondents should also consider how effective their counter-measures are in relation to the Recommended Control Measures
which is suggested in the previous cell. The available choices are Effective, Partially Effective or Not Effective.
For example, the Threat-Vulnerability statement that “Facilities are protected by appropriate entry controls” would be evaluated as to how effectively the workspaces where EPHI can be accessed are
protected. Additionally, the respondent would also want to consider how effectively the medical facility itself is secured and protected. These are some of the factors which must be considered in
offering a response.
6. Exposure Potential - This cell is pre-populated from the response on the Screening Questions (Step 1) tab and requires no action. This cell represents the response of ‘Addressed, Partially-
Addressed or Not-Addressed’ relative to the Threat-Vulnerability statement. The purpose is to offer additional guidance and empower the respondent in their selections on the following choices of
Impact and Likelihood.
7. Likelihood - As with the Impact Rating, this a subjective judgment by the respondent as to how likely an 'Undesirable Event', such as power outage or fire, are to occur to the medical practice.
Please select from the appropriate corresponding choice of Low, Medium or High for each Business Asset.
Very Likely would be defined as having a probable chance of occurrence.
Likely would be defined as having a significant chance of occurrence.
Not Likely would be defined as modest or insignificant chance of occurrence.
8. Impact - In the event that an 'Undesirable Event ' such as a power outage or a fire occurs, what is the level of impact to the practice? The response is a completely subjective judgment by the
practitioner as to what the impact of an occurrence of the threat would have upon the medical practice. Please select from the appropriate corresponding choice of High, Medium or Low for each
Technology (Step 2b)
Business Asset. 37 October 21, 2011
High would be defined as having a catastrophic impact on the medical practice; the medical practice is incapable of offering medical treatments or services and a significant number of medical
Likely would be defined as having a significant chance of occurrence.
Not Likely would be defined as modest or insignificant chance of occurrence.
8. Impact - In the event that an 'Undesirable Event ' such as a power outage or a fire occurs, what is the level of impact to the practice? The response is a completely subjective judgment by the
practitioner as to what the impact of an occurrence of the threat would have upon the medical practice. Please select from the appropriate corresponding choice of High, Medium or Low for each
Business Asset.
High would be defined as having a catastrophic impact on the medical practice; the medical practice is incapable of offering medical treatments or services and a significant number of medical
records have been lost or compromised.
Medium would be defined as having a significant impact; the medical practice may offer a reduced array of treatment services to patients. A moderate number of medical records within the practice
have been lost or compromised.
Low would be defined as a modest or insignificant impact; the medical practice can continue to offer treatment to patients and some medical records may be lost or compromised.
NOTE: A loss or compromise of 500 medical records or more may qualify as a breach that requires the practice to notify the US Department of Health and Human Services Office for
Civil Rights within a defined time frame.
9. Risk Rating - This column requires no action by the respondent. The column is automatically calculates the risk rating to the medical practice based upon the inputs from the 'Impact Rating' and
'Likelihood of Occurrence' columns.
NEXT STEP: After completing the questions on this tab, please proceed to the tab marked Findings-Remediation (Step 3).
References:
HIPAA Security Rule
OCR Security Rule Guidance: http://www.hhs.gov/ocr/privacy
COBIT Framework for IT Governance and Control, version 4.1
NIST Special Publication 800-66
ISO/IEC 17799 (2005) Part 1
Payment Card Industry, Data Security Standards PCI DSS v1.1
Risk
Management Vulnerability Recommended Control Measures Existing Control Likelihood Impact
Effectiveness Potential Rating
Category Statement
Risk Information around Risk assessments are conducted to identify, - No regular assessments of
Management & risks and related quantify, prioritize and manage risks. The technology is performed;
Compliance control options are prioritization is accomplished by creating and including vulnerability testing,
not presented to using criteria for risk acceptance and objectives patch management, or other
management before which are important to the organization. review of systems to help
Not Effective Likely High Medium
management [RCM004] determine risks associated
decisions are made. - It is important to expand upon this risk with them so appropriate
[TVS004] assessment by assessing the risk of each asset action(s) can be taken.
itself.
Training & Applications and A training curriculum for employees has been - The use of technology
Awareness technology solutions established to educate and train users for correct regarding a training curriculum
are not correctly and and secure use of applications and technology is not currently being utilized.
securely used since a solutions. [RCM006]
training curriculum for - Technology use for a training curriculum could
employees has not include the use of regular email newsletters that Not Effective High
been established or include security reminders, an Intranet site, or a
regularly updated. training service provided over the Internet.
[TVS006]
Personnel Employee, contractor Procedures are in place to ensure the properly - User accounts are disabled
Security or third party user managed exit from the organization of within the EHR
terminations or employees, contractors or third parties and that
change of all equipment is returned and the removal of all
responsibilities could access rights are completed. [RCM009]
result in a security - Accounts/access to all systems should be
breach due to lack of properly managed for employees and
a defined contractors. This includes local workstation
management process access, server access, etc. in addition to the Partially Effective Not Likely High Low
for terminations or user accounts within the EHR.
changes in
responsibilities.
[TVS009]
Network Security Sensitive systems co- If possible sensitive systems have a dedicated, - Network Configuration
located with less and isolated, computing environment. [RCM011] Firewall in place?
sensitive systems are - Verify and ensure firewall capabilities exist Wireless encryption?
accessed by between the public Internet and internal network Remote access type?
unauthorized parties. beyond the basic port blocking and NATing Remote access encryption? Partially Effective Likely High Medium
[TVS011] functions of the Cisco router.
Network Security Technical Timely information about technical vulnerabilities - No vulnerability testing
vulnerabilities are of information systems being used is obtained, currently being performed
exploited to gain the organization's exposure to the vulnerabilities internally or from a third party
inappropriate or is evaluated and appropriate measures are taken
unauthorized access to address the associated risk. [RCM013]
to information - Regular vulnerability testing can be performed
systems due to lack using free or commercial scanning tools. The
of controls for those results provide information about technical
vulnerabilities. vulnerabilities that may need to be addressed
[TVS013] within the systems. Not Effective Very Likely High High
Example tools include: Microsoft Baseline
Security Analyzer, Nessus, and nmap.
- Vulnerability assessments should include
servers, workstations, switches, firewalls,
routers, etc. to ensure all entry points within the
systems are assessed for vulnerabilities.
Logical Access Users that no longer Management reviews and makes the appropriate - No regular review of
have a business need corrections to the access right(s) of individual accounts currently being
for information users at regular intervals using a formal performed within the EHR,
systems access still process¹. [RCM017] servers, and other systems.
have access to the - Reviewing of user accounts could be Not Effective Likely High Medium
information. [TVS017] accomplished on a regular basis by comparing
HR active employee lists to the lists within the
EHR and other systems.
Operations Systems and data are Policies and procedures are implemented that 0
Management exposed to malicious address the prevention, detection and removal of
software and/or malicious code in the computer operating
unauthorized use. environment. This would cover all computers or
[TVS018] devices, such as printers and thumb drives,
which connect to computers. [RCM018]
- All workstations and servers should have
protection from malicious software. This should Not Effective Not Likely High Low
include at least antivirus protection but could also
include full security suites or Endpoint Security
packages
- Antivirus software should be updated at least
daily and full scans ran on a regular basis
Operations The change Formal 'change policies and procedures' have - No internal tracking or
Management management process been established to manage the implementation reporting of changes to the
in place does not of changes to assure the adherence to standards systems
adequately protect and security practices. [RCM024] - EHR vendor does keep
the environment from - It is recommended to have all changes records of any changes
disruptive changes in recorded and tracked. This is usually performed through the use of
production. [TVS024] accomplished through a helpdesk ticket system their ticketing system
or even through the use of a database or Excel Partially Effective Likely Medium Medium
spreadsheet in some cases. Appendix G of the - Windows Updates
information security policy template provided by Workstations update
the REC contains a Change Management automatically?
Tracking Log that can help in this area. Servers are updated
regularly?
NOTE: All columns with the exception of the 'Additional Steps' column, are automatically populated based upon user input proivided in the preceding tabs (Steps 1, 2a and 2b). Please
allow a few moments for this tab to populate with the data from the previous tabs.
Risk Found - This column requires no action by the respondent and will self-populate from risks identified as being either MEDIUM or HIGH in the Risk Rating column from the previous Steps 2a and
2b tabs. If the risk is deemed LOW, then this is insignificant need not be considered further in the overall Risk Matrix.
Risk Rating - This column requires no action by the respondent and will self-populate from risks identified as being either MEDIUM or HIGH in the Risk Rating column from the previous Steps 2a and
2b tabs. Risk Rating would be the rating the accompanying the Asset or Application. Only the Asset or Application in Steps 2a and 2b tabs as Medium or High are to be displayed and rated on this
chart.
Existing Control Measures Applied - This column requires no action by the respondent and will self-populate from the Existing Control Measures are listed in the previous Step 2 (both Step 2a and
2b from the previous tabs). This is what corrective actions practitioner is taking, if any corrective actions are taken, to mitigate and reduce the threat or vulnerability. Control Measures can be an Alarm
System, Sprinkler System or Computer Access restrictions and will be listed again in this space.
Recommended Control Measures - This column contains the Recommended Control Measures which self-populated in Steps 2a and 2b on the previous tabs. This column requires no action by the
respondent and will self-populate.
Owner: The person that is assigned responsibility for determining how to address the risk.
Remediation Steps: The response is a judgment by the practitioner as to what supplemental measures may be taken, within the current availability of resources, to achieve a sound state of security
and to ensure the continuation of operations. There is no right or wrong answer. This is an opportunity for the respondent to consider and document any additional measures they wish to take to
address and reduce the risk.
Target Date: The date by which mediation of the risk should be complete.
NEXT STEP (OPTIONAL): The final step in this risk assessment process is to talk to your REC for clarification and additional information.
Technology