HIPAA Assessment. Prepared For: ABC Medical Center Prepared By: Compliance Department

Similar documents
Network Detective. Prepared For: Your Customer / Prospect Prepared By: Your Company Name

Security Assessment. Prepared For: Prospect Or Customer Prepared By: Your Company Name

Payment Card Industry (PCI) Data Security Standard

How do you track devices that have been approved for use? Are you automatically alerted if an unapproved device connects to the network?

Policy and Procedure: SDM Guidance for HIPAA Business Associates

IT SECURITY RISK ANALYSIS FOR MEANINGFUL USE STAGE I

HIPAA Security and Privacy Policies & Procedures

How To Establish A Compliance Program. Richard E. Mackey, Jr. SystemExperts Corporation

HIPAA Compliance Assessment Module

What are PCI DSS? PCI DSS = Payment Card Industry Data Security Standards

201 CMR COMPLIANCE CHECKLIST Yes No Reason If No Description

ISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002

Juniper Vendor Security Requirements

NEN The Education Network

SERVER HARDENING CHECKLIST

CYBERSECURITY. Recent OCR Actions & Cyber Awareness Newsletters. Claire C. Rosston

Ensuring Desktop Central Compliance to Payment Card Industry (PCI) Data Security Standard

90% 191 Security Best Practices. Blades. 52 Regulatory Requirements. Compliance Report PCI DSS 2.0. related to this regulation

Checklist: Credit Union Information Security and Privacy Policies

HIPAA Compliance Module. Using the HIPAA Module without Inspector Instructions. User Guide RapidFire Tools, Inc. All rights reserved.

HIPAA Security Checklist

HIPAA Security Checklist

Support for the HIPAA Security Rule

Vendor Security Questionnaire

3 rd Party Certification of Compliance with MA: 201 CMR 17.00

Controls Electronic messaging Information involved in electronic messaging shall be appropriately protected.

7.16 INFORMATION TECHNOLOGY SECURITY

University of Alabama at Birmingham MINIMUM SECURITY FOR COMPUTING DEVICES RULE July 2017

Total Security Management PCI DSS Compliance Guide

ISO/IEC Solution Brief ISO/IEC EventTracker 8815 Centre Park Drive, Columbia MD 21045

HIPAA Security. 3 Security Standards: Physical Safeguards. Security Topics

What s New with HIPAA? Policy and Enforcement Update

Internal Audit Report DATA CENTER LOGICAL SECURITY

Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud

Payment Card Industry Internal Security Assessor: Quick Reference V1.0

PCI DSS Compliance. Verba SOLUTION GUIDE. Introduction. Verba and the Payment Card Industry Data Security Standard

Employee Security Awareness Training Program

Update on HIPAA Administration and Enforcement. Marissa Gordon-Nguyen, JD, MPH October 7, 2016

Point ipos Implementation Guide. Hypercom P2100 using the Point ipos Payment Core Hypercom H2210/K1200 using the Point ipos Payment Core

ORA HIPAA Security. All Affiliate Research Policy Subject: HIPAA Security File Under: For Researchers

PCI Compliance Assessment Module with Inspector

Information Technology General Control Review

Cyber security tips and self-assessment for business

Healthcare Privacy and Security:

Information Technology Update

Standard CIP 007 3a Cyber Security Systems Security Management

HIPAA Federal Security Rule H I P A A

Standard CIP Cyber Security Systems Security Management

Payment Card Industry Self-Assessment Questionnaire

Security Architecture

mhealth SECURITY: STATS AND SOLUTIONS

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

EXHIBIT A. - HIPAA Security Assessment Template -

CompTIA Security+(2008 Edition) Exam

Start the Security Walkthrough

Information Security Policy

Security+ SY0-501 Study Guide Table of Contents

STATE OF NEW JERSEY. ASSEMBLY, No th LEGISLATURE. Sponsored by: Assemblywoman ANNETTE QUIJANO District 20 (Union)

Daxko s PCI DSS Responsibilities

OUR CUSTOMER TERMS CLOUD SERVICES MCAFEE ENDPOINT PROTECTION ESSENTIAL FOR SMB

Addressing PCI DSS 3.2

Security Standards for Electric Market Participants

Standard CIP Cyber Security Systems Security Management

Assessing Your Incident Response Capabilities Do You Have What it Takes?

2018 IT Priorities: Cybersecurity, Cloud Outsourcing & Risk Management. Follow Along

Information Technology Procedure IT 3.4 IT Configuration Management

ADIENT VENDOR SECURITY STANDARD

Neil Peters-Michaud, CHAMP Cascade Asset Management ITAM Awareness Month December 2016

University of Pittsburgh Security Assessment Questionnaire (v1.7)

Department of Public Health O F S A N F R A N C I S C O

Web Cash Fraud Prevention Best Practices

PCI DSS and VNC Connect

MEETING ISO STANDARDS

A Mobile Security Checklist: The Top Ten Threats to Your Enterprise Today. White Paper

BEETLE /mopos Tablet Mobile POS solution

2017 Annual Meeting of Members and Board of Directors Meeting

Carbon Black PCI Compliance Mapping Checklist

Lakeshore Technical College Official Policy

CYBERSECURITY IN THE POST ACUTE ARENA AGENDA

Inside the OCR Investigation/Audit Process 2018 PBI HEALTH LAW INSTITUTE TUESDAY, MARCH 13, 2017 GREGORY M. FLISZAR, J.D., PH.D.

Technology Security Failures Common security parameters neglected. Presented by: Tod Ferran

Wireless Handheld Device Security

Standard CIP 007 4a Cyber Security Systems Security Management

ISO27001 Preparing your business with Snare

These rules are subject to change periodically, so it s good to check back once in a while to make sure you re still compliant.

GUIDE. MetaDefender Kiosk Deployment Guide

Cyber Security. February 13, 2018 (webinar) February 15, 2018 (in-person)

Enforcing PCI Data Security Standard Compliance Marco Misitano, CISSP, CISA, CISM Business Development Manager Security Cisco Italy

Easy-to-Use PCI Kit to Enable PCI Compliance Audits

Computer Security: Cyber Essentials KAMI VANIEA 1

Judiciary Judicial Information Systems

Access Control Procedure

Cyber Essentials Questionnaire Guidance

SECURITY & PRIVACY DOCUMENTATION

University of Maine System Payment Card Industry Data Security Standard (PCI DSS) Guide for Completing Self Assessment Questionnaire (SAQ) SAQ C

Introduction. Controlling Information Systems. Threats to Computerised Information System. Why System are Vulnerable?

The SANS Institute Top 20 Critical Security Controls. Compliance Guide

Texas Health Resources

HIPAA RISK ADVISOR SAMPLE REPORT

Cyber Security. Our part of the journey

Transcription:

HIPAA Assessment Prepared For: ABC Medical Center Prepared By: Compliance Department

Agenda Environment Assessment Overview Risk and Issue Score Next Steps

Environment NETWORK ASSESSMENT (changes) Domain Controllers 2 Number of Organizational Units 20 Users # Enabled 59 Last Login within 30 days 23 Last Login older than 30 days 36 # Disabled 39 Last Login within 30 days 1 Last Login older than 30 days 38 Security Group Groups with Users 50 # Total Groups 106 Computers in Domain Total Computers 88 Last Login within 30 days 58 Last Login older than 30 days 30 # Enabled Users # Disabled Users Employee - ephi authorization 111 0 Employee - no ephi authorization 2 0 Vendor - ephi authorization 0 0 Vendor - no ephi authorization 1 0 Former Employee 5 0 Former Vendor 3 0

Assessment Overview The following areas were assessed. Potential issues were found in the areas highlighted in RED. Environment -Facility Access Controls Users -Information System Activity Review -Termination Procedures -Access Authorization -Existing Seurity Measures Related to Access Controls -Password Management -Administrative Access Control -Audit Controls -Person or Entity Authentication Wireless -Access Authorization -Access Establishment -Workforce Security Servers and Local Computers -Protection Against Malicious Software -Applications and Data Criticality Analysis -Business Associate Agreements Firewall -Access Authorization -Protection Against Malicious Software Email -Applications and Data Criticality Analysis

Risk and Issue Score Current Risk Score Current Issue Score

Unsupported Operating Systems (97 pts) Issue: 2 computers were found using an operating system that is no longer supported. Unsupported operating systems no longer receive vital security patches and present an inherent risk. Recommendation: Upgrade or replace computers with operating systems that are no longer supported. Exception Explanation: We have removed all systems with unsupported operating systems from the network

Terminated vendor account enabled (96 pts) Issue: One or more accounts are still enabled for terminated vendors. This poses a risk of unauthorized access. Recommendation: Disable accounts for all terminated vendors.

Terminated employee account enabled (96 pts) Issue: One or more accounts are still enabled for terminated employees. This poses a risk of unauthorized access. Recommendation: Disable accounts for all terminated employees.

Company WiFi open or using insecure security (i.e., WEP) (94 pts) Issue: Open or insecure WiFi protocols may allow an attacker access to the company s network and resources. Recommendation: Enabled WiFi security and use a more secure protocols such as WPA2.

Anti-spyware not installed (94 pts) Issue: Malware protection is required but not identified as being installed on computers in the network. Recommendation: Install a commercial grade anti-spyware program on the computers indicated in the Endpoint Security section of the Evidence of HIPAA Compliance report.

Automatic screen lock not turned on. (94 pts) Issue: Automatic screen lock prevents unauthorized access when users leave their computers. Having no screen lock enable allows authorized access to network resources. Recommendation: Enable automatic screen lock on the following computers:

Anti-virus not installed (94 pts) Issue: Malware protection is required but not identified as being installed on computers in the network. Recommendation: Install a commercial grade anti-virus program on the computers indicated in the Endpoint Security section of the Evidence of HIPAA Compliance report.

Potential free hosted web-based email solution in use (93 pts) Issue: The use of free hosted web-based email may allow transmission of ephi outside of the company through entities that you may not have a signed Business Associate agreement. Recommendation: Identify the necessity of using the free hosted email services and discontinue their use.

Anti-spyware not turned on (92 pts) Issue: Malware protection is required but not identified as being enabled on computers in the network. Recommendation: Enable anti-spyware program on the computers indicated in the Endpoint Security section of the Evidence of HIPAA Compliance report.

Anti-virus not turned on (92 pts) Issue: Malware protection is required but not identified as being enabled on computers in the network. Recommendation: Enable anti-virus program on the computers indicated in the Endpoint Security section of the Evidence of HIPAA Compliance report.

Anti-spyware not up to date (90 pts) Issue: Out-of-date definitions may not properly protect a computer from attacks by malicious software. Recommendation: Ensure anti-spyware programs on the computers indicated in the Endpoint Security section of the Evidence of HIPAA Compliance report are up-to-date.

LOTS of Security patches missing on computers with ephi (90 pts) Issue: Security patches are missing on computers designated as having ephi. Maintaining proper security patch levels is required by HIPAA to prevent unauthorized access and the spread of malicious software. Lots is defined as missing 3 or more patches and may be an indicator of issues with the patching system. Recommendation: Address patching on computers with missing security patches.

Non-administrative generic logons have access to Network Share on system with ephi (85 pts) Issue: Generic accounts which could be in use by multiple people cannot be properly restricted and should not have access to network shares with ephi. Recommendation: Remove access to Network Shares on systems with ephi.

User password set to never expire (80 pts) Issue: User accounts with passwords set to never expire present a risk of use by authorized users. They are more easily compromised than passwords that are routinely changed. Recommendation: Investigate all accounts with passwords set to never expire and configure them to expire regularly.

Unrestricted network share with ephi (80 pts) Issue: Network shares containing ephi were found as completely unrestricted (granting access to 'Everyone'). Recommendation: Investigate the network shares containing ephi with unrestricted access. Limit access to the minimum necessary.

Workstations with ephi not backed up (78 pts) Issue: Security Center reports that computers identified as having ephi are not backed up. Recommendation: Ensure that data is properly backed up on computers with ephi. See the Endpoint Security section of the Evidence of HIPAA Compliance for a list of computers.

Account lockout disabled (77 pts) Issue: Account lockout (disabling an account after a number of failed attempts) significantly reduces the risk of an attacker acquiring a password through a brute force attack. Recommendation: Enable account lockout for all users.

Passwords less than 6 characters allowed (75 pts) Issue: Passwords are not required to be 6 or more characters, allowing users to pick extremely short passwords which are vulnerable to brute force attacks. Recommendation: Enable enforcement of password length to 6 more characters.

USB drives detected in use (unencrypted) (75 pts) Issue: Theft is the most common form of data breach. Unencrypted USB drives in an environment with ephi may allow data loss through theft. Recommendation: Eliminate the use of unencrypted USB drives.

Inconsistent password policy / Exceptions to password policy (68 pts) Issue: Password policies are not consistently applied from one computer to the next. A consistent password policy ensure adherence to password best practices. Recommendation: Eliminate inconsistencies and exceptions to the password policy.

USB drives detected in use (50 pts) Issue: The use of USB drives increase the change of data loss through theft and should be discouraged to the extent possible. Recommendation: Reduce or eliminate the use of USB drives in the environment.

Audit user login in not turned on (30 pts) Issue: Login auditing is required for proper identification of access to computers and resources. In the event of a breach, audit logs can be used to identify unauthorized access and the severity of the breach. Recommendation: Enable user login auditing.

User not logged in in 90 days (not terminated) (25 pts) Issue: Inactive user accounts were found that could potentially indicate terminated employees or vendors. Recommendation: Investigate all inactive accounts and disable accounts from terminated employees and vendors.

User has not logged in in 30 days (13 pts) Issue: Users that have not logged in in 30 days could be from a former employee or vendor and should be disabled or removed. Recommendation: Disable or remove user accounts for users that have not logged in in 30 days.

Computer with ephi does not have object level auditing on (11 pts) Issue: Object level auditing helps identify users who have accessed files and other system resources. Object level auditing may impose an unacceptable performance impact and should be considered for use on high risk computers or environments. Recommendation: Evaluate the pros and cons of enabling object level access or ensure alternative methods for breach identification are in place.

Agree on List of Issues to Resolve Present Project Estimates and Costs Establish Timelines Set Milestones Get Signoff to Begin Work