Aligning with HIPAA mandates in healthcare

Similar documents
May the (IBM) X-Force Be With You

IBM Security. Endpoint Manager- BigFix. Daniel Joksch Security Sales IBM Corporation

Le sfide di oggi, l evoluzione e le nuove opportunità: il punto di vista e la strategia IBM per la Sicurezza

IBM Security Vaš digitalni imuni sistem. Dejan Vuković Security BU Leader South East Europe IBM Security

IBM Security Access Manager

Integrated, Intelligence driven Cyber Threat Hunting

Cybersecurity. You have been breached; What Happens Next THE CHALLENGE FOR THE FINANCIAL SERVICES INDUSTRY

Fabrizio Patriarca. Come creare valore dalla GDPR

The McGill University Health Centre (MUHC)

IBM Security technology and services for GDPR programs GIULIA CALIARI SECURITY ARCHITECT

Detect Fraud & Financial Crime

How to Secure Your Cloud with...a Cloud?

IBM BigFix Compliance

Cisco & IBM Security SECURING THE THREATS OF TOMORROW, TODAY, TOGETHER

IBM services and technology solutions for supporting GDPR program

Combatting advanced threats with endpoint security intelligence

Be effective in protecting against the cybercrime

IBM Future of Work Forum

Accelerating growth and digital adoption with seamless identity trust

FFIEC Cyber Security Assessment Tool. Overview and Key Considerations

Securing global enterprise with innovation

locuz.com SOC Services

Threat Intelligence to enhance Cyber Resiliency KEVIN ALBANO GLOBAL THREAT INTELLIGENCE LEAD IBM X-FORCE INCIDENT RESPONSE AND INTELLIGENCE SERVICES

IBM Exam 00M-662 Security Systems Sales Mastery Test v2 Version: 7.1 [ Total Questions: 72 ]

Notice on Names and Logos Used in This Presentation

Continuous Diagnostics and Mitigation demands, CyberScope and beyond

HIPAA Security and Privacy Policies & Procedures

IBM Cloud Security for the Cloud. Amr Ismail Security Solutions Sales Leader Middle East & Pakistan

Healthcare Cognitive Security

Predators are lurking in the Dark Web - is your network vulnerable?

SECURITY & PRIVACY DOCUMENTATION

IBM Cloud IBM Cloud for VMware Solutions Zeb Ahmed Senior Offering Manager and BCDR Leader VMware on IBM Cloud VMworld 2017 Content: Not for publicati

IBM Application Security on Cloud

IBM Security Network Protection Solutions

IBM Security Strategy Intelligence, Integration and Expertise

Introduction. Deployment Models. IBM Watson on the IBM Cloud Security Overview

Eight important criteria for selecting a managed security services provider

IBM Security Guardium Data Activity Monitor

MEETING ISO STANDARDS

What It Takes to be a CISO in 2017

SIEM: Five Requirements that Solve the Bigger Business Issues

Best Practices in Securing a Multicloud World

HIPAA Compliance Checklist

Penetration testing a building automation system

CipherCloud CASB+ Connector for ServiceNow

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT

Mapping BeyondTrust Solutions to

Data Security and Privacy Principles IBM Cloud Services

IT SECURITY RISK ANALYSIS FOR MEANINGFUL USE STAGE I

The SANS Institute Top 20 Critical Security Controls. Compliance Guide

Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud

Service. Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution

IBM Software IBM InfoSphere Information Server for Data Quality

Securing Your Cloud Introduction Presentation

Cybersecurity Roadmap: Global Healthcare Security Architecture

The New Era of Cognitive Security

SYMANTEC DATA CENTER SECURITY

LTI Security Services. Intelligent & integrated Approach to Cyber & Digital Security

Technology Risk Management in Banking Industry. Rocky Cheng General Manager, Information Technology, Bank of China (Hong Kong) Limited

IT Security Mandatory Solutions. Andris Soroka 2nd of July, RIGA

Ponemon Institute s 2018 Cost of a Data Breach Study

IBM Security Guardium Analyzer

Support for the HIPAA Security Rule

The Common Controls Framework BY ADOBE

1 Copyright 2011, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 7

New York Department of Financial Services Cybersecurity Regulation Compliance and Certification Deadlines

RSA Solution Brief. Managing Risk Within Advanced Security Operations. RSA Solution Brief

Symantec Security Monitoring Services

IBM Security QRadar Version Architecture and Deployment Guide IBM

the SWIFT Customer Security

ISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002

ForeScout Extended Module for Splunk

Security by Default: Enabling Transformation Through Cyber Resilience

Oracle Buys Automated Applications Controls Leader LogicalApps

Compliance with CloudCheckr

Designing and Building a Cybersecurity Program

Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS

Avanade s Approach to Client Data Protection

GDPR: An Opportunity to Transform Your Security Operations

The HITRUST CSF. A Revolutionary Way to Protect Electronic Health Information

Security Terminology Related to a SOC

Automating the Top 20 CIS Critical Security Controls

COUNTERING CYBER CHAOS WITH HIPAA COMPLIANCE. Presented by Paul R. Hales, J.D. May 8, 2017

IBM MaaS360 Kiosk Mode Settings

University of Pittsburgh Security Assessment Questionnaire (v1.7)

Enhanced Threat Detection, Investigation, and Response

New York Cybersecurity. New York Cybersecurity. Requirements for Financial Services Companies (23NYCRR 500) Solution Brief

Gujarat Forensic Sciences University

Guide: HIPPA Compliance. Corporate HIPAA Compliance Guide. Privacy, productivity and remote access. gotomypc.com

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

IBM PowerSC. Designed for Enterprise Security & Compliance in Cloud and Virtualised environments. Highlights

DFARS Compliance. SLAIT Consulting SECURITY SERVICES. Mike D Arezzo Director of Security Services. SLAITCONSULTING.com

"Charting the Course... Certified Information Systems Auditor (CISA) Course Summary

IBM Security QRadar Version 7 Release 3. Community Edition IBM

Policy and Procedure: SDM Guidance for HIPAA Business Associates

Cyber Security in M&A. Joshua Stone, CIA, CFE, CISA

Enhancing the Cybersecurity of Federal Information and Assets through CSIP

Privileged Account Security: A Balanced Approach to Securing Unix Environments

Checklist: Credit Union Information Security and Privacy Policies

INTELLIGENCE DRIVEN GRC FOR SECURITY

Transcription:

How IBM can help you develop a successful plan designed to meet security and privacy requirements Let s get started

3 Introduction 4 Aligning with other security frameworks 5 How IBM can help build and support your security framework 6 Why IBM A1 Appendix

Introduction As just about anyone dealing with the Health Insurance Portability and Accountability Act or HIPAA likely knows, understanding and complying with the complexities of the regulation can be challenging. And that is especially true when it comes to implementing the HIPAA Security Rule, which requires covered entities to implement reasonable and appropriate standards in order to protect the con identiality, integrity, and availability of electronic protected health information (ephi) that they create, receive, maintain or transmit. IBM has been playing a significant role in helping healthcare providers, payers and life sciences organizations understand and comply with the broad set of HIPAA requirements, including the HIPAA Security Rule. We ve had firsthand experience supporting organizations of all sizes in helping to assess their needs and meet their specific regulatory requirements. That experience has allowed us to develop a broad portfolio of products and services designed to help address our clients specific needs and support them in organizing their compliance teams efforts to implement the directives of HIPAA. 3

Aligning with other security frameworks Healthcare organizations may choose to employ additional security framework options in addition to those of HIPAA. For example, the National Institute of Standards and Technology (NIST) released the Framework for Improving Critical Infrastructure Cybersecurity in 2014, providing a riskbased approach to helping organizations in all industries understand, communicate and manage cybersecurity risks. In the healthcare industry, where covered entities must comply with the HIPAA Security Rule, the NIST Cybersecurity Framework can offer additional support for managing compliance. Organizations that have already aligned their security programs to either the NIST Cybersecurity Framework or the HIPAA Security Rule may find they ve developed a strong basis for assessing risk, measuring compliance and identifying potential gaps in their programs. And addressing these gaps can bolster their compliance with the HIPAA Security Rule and improve their ability to secure ephi and other critical information and business processes. But it s important to note that healthcare organizations shouldn t assume that they re in compliance with the HIPAA Security Rule even if they ve aligned their security program to the NIST Cybersecurity Framework. Similarly, while it may be relevant to certain controls, the HIPAA Security Rule does not require covered entities to integrate the NIST Cybersecurity Framework into their security management programs. Covered entities and business associates should perform their own security risk assessments to identify potential gaps and mitigate ephi threats to their systems. Three types of prescribed safeguards HIPAA clearly identifies requirements for three types of safeguards for entities covered by ephi regulations. 1 2 3 Administrative safeguards HIPAA administrative safeguards require documented policies and procedures for day-to-day operations when handling PHI, managing employee conduct as it relates to PHI and managing the selection, development and use of security and privacy controls. For instance, administrative safeguards require written procedures that cover access to PHI and associated controls, audit controls and data integrity controls. Physical safeguards HIPAA physical safeguards comprise a series of security measures designed to protect the environment in which systems containing ephi reside including buildings and equipment from natural and environmental hazards, as well as unauthorized intrusion. Physical safeguards include access controls, workstation controls, and data and media controls. Technical safeguards The technical safeguards mandated by HIPAA include security measures that specify how to use technology to protect and control access to ephi. For example, technical safeguards lay out requirements for workforce security and information access. 4

How IBM can help build and support your security framework IBM Security solutions offer a broad portfolio that can help you address the HIPAA Security Rule requirements and help you to incorporate the NIST framework and other frameworks. In doing so, we can help you meet your more comprehensive HIPAA compliance goals and objectives of enhancing cost efficiency and simplifying management to help you avoid perceived gaps in coverage as threats evolve and change. For organizations with more mature security strategies and more complex and demanding protection needs, IBM Security solutions provide a broad set of controls and integrated actions designed to support various risk profiles. An overview of HIPAA-related IBM solutions Security categories Security management process 164.308 (a) (1) Assigned security responsibility 164.308 (a) (2) Worforce security 164.308 (a) (3) Administration Physical Technical Information access management 164.308 (a) (4) Security awareness and training 164.308 (a) (5) Security intelligence Advanced fraud protection Identity and access management Data secuirity Infrastructure security (mobile, network, endpoint, mainframe) Application security Intelligence analysis (i2) Security services Security incident procedures 164.308 (a) (6) Contingency plan 164.308 (a) (7) Evaluation 164.308 (a) (8) Business associate contracts and other arrangements 164.308 (b) Facillity access controls 164.310 (a) Workstation use 164.310 (b) Workstation security 164.310 (c) Device and media 164.310 (d) Access control 164.312 (a) Audit control 164.312 (b) Integrity 164.312 (c ) Person or Entity Authorization 164.312 (d) Transmission Security 164.312 (e) This is a summary showing where IBM offers solutions related to specific HIPAA standards. For a more detailed listing, please see the appendix. 5

Why IBM HIPAA can present healthcare organizations with several challenges where information security is concerned. And while the HIPAA Security Rule requirements offer covered entities considerable flexibility regarding the ways in which to meet requirements, it can be challenging to determine which path to compliance is the optimal one to take for your organization. IBM offers a broad set of solutions and services designed to help your organization develop and implement the more comprehensive HIPAA security compliance strategies your organization needs to reach its goals. Within that context, we deliver leading technology and an experienced practice, intended to consider your unique account situation. For more information To learn more about the IBM Security portfolio of solutions, please contact your IBM representative or IBM Business Partner, or visit: ibm.com/security Additionally, IBM Global Financing offers numerous payment options to help you acquire the technology you need to grow your business. We provide full lifecycle management of IT products and services, from acquisition to disposition. For more information, visit: ibm.com/financing When you collaborate with IBM, you gain access to a security team of 8,000 people supporting more than 12,000 customers in 133 countries. As a proven leader in enterprise security, we hold more than 3,500 security patents. And with an approach that includes advanced cognitive computing, we enable organizations like yours to continue to innovate while mitigating risk. So you can continue to grow your business while using processes designed to secure your most critical data and processes. 6

Appendix 1 IBM Security solutions may be used to help align to a HIPAA regulatory environment Category Full product name Short name/abbreviation Short description IBM QRadar Advisor with Watson IBM QRadar Advisor with Watson Combines the cognitive capabilities of Watson and QRadar Security Analytics Platform to uncover hidden threats and automate insights IBM Security QRadar Incident Forensics QRIF Reduce time to investigate incidents, and remediate more thoroughly IBM Security QRadar Log Manager QRadar LM Turn-key log management, SMB to enterprise (upgradeable to SIEM) IBM Security QRadar QFlow Collector Qflow Layer 7 application monitoring of physical network traffic (includes VFlow) IBM Security QRadar Network Insights QNI Enables attack prediction through real-time network traffic analysis Security Intelligence IBM Security QRadar SIEM QRadar SIEM Security intelligence & IBM Sense Analytics, protecting assets & information from advanced threats IBM QRadar on Cloud QRoC Outsources security intelligence deployment/support, by offering QRadar as a service IBM QRadar User Behavior Analytics QRadar UBA An app that provides early visibility to insider threats IBM Security QRadar Vulnerability Manager QVRM Intelligent scanning - identifies and prioritizes vulnerabilities integrates for prioritization insights i2 Intelligence Analysis Platform (including i2 Enterprise Insight Analysis and i2 Analyst s Notebook) i2 A system that facilitates the analysis, production, and reporting of security intelligence Resilient Incident Response Platform Resilient IRP Allows security teams to easily configure incident response plans/technologies IBM Security Trusteer Fraud Protection Suite Fraud Protection Suite Designed to detect, enforce, investigate and remediate fraud fast and efficiently IBM Security Trusteer Pinpoint Detect Pinpoint Detect Real-time detection of Man-in-the-Browser malware infected devices IBM Security Trusteer Pinpoint Malware Detection Pinpoint Malware Detection Designed to provide conclusive detection of criminals and account takeover attempts Advanced Fraud Protection IBM Security Trusteer Rapport Rapport Client-based endpoint detection, mitigation/remediation against financial malware/ phishing attacks IBM Security Trusteer Rapport for Mitigation Rapport for Mitigation Mitigation/remediation against financial malware IBM Security Trusteer Mobile SDK Mobile SDK Android/iOS library for native mobile apps detect compromised/vulnerable devices IBM Security Trusteer Mobile Browser Mobile Browser Secure mobile browser for safe web access IBM Security Access Manager for ESSO SAM ESSO SSO, password management, session management, compliance and user productivity gains IBM Security Access Manager SAM All-in-one access appliance for web, mobile and cloud IBM Security Access Manager for DataPower SAM for DataPower Web access management software module for IBM DataPower Gateways IBM Cloud Identity Connect CIC Securely connect employees to cloud services Identity and Access Management (People) IBM Cloud Identity Service CIS Multitenant identity and access management service offered from the public cloud IBM Security Identity and Access Assurance IAA or SIAA Discounted bundle - SAM, IGI Lifecycle, Directory Suite, QRadar Log Manager IBM Security Identity and Access Manager SIAM Discounted bundle - SAM base appliance and IGI Lifecycle IBM Security Identity Governance and Intelligence IGI Govern access and evaluate regulatory compliance bring IT and LoBs together IBM Security Identity Manager SIM Creates, modifies and terminates user privileges throughout users lifecycles IBM Security Privileged Identity Manager PIM Keeps admin (privileged user) ID usage tracked and under control IBM Security Directory Suite SDS Real-time, event-driven, general-purpose data integration environment (includes Directory Server) Return to How IBM can help Next page

Appendix 2 Category Full product name Short name/abbreviation Short description IBM Guardium Activity Monitor for Databases Guardium DAM Real time data activity monitoring with blocking/masking capabilities IBM Guardium Activity Monitor for Files Guardium FAM Discover/track/control sensitive file access (local/networked file systems) IBM Guardium Vulnerability Assessment Guardium VA Vulnerability assessment for databases IBM Guardium Data Encryption Guardium DES DBMS encryption (Oracle, SQL Server, DB2, IMS, ) and file encryption IBM Guardium Data Encryption for DB2 and IMS Databases Guardium DES for z/os Data encryption for both DB2 and IMS databases on z/os Data Security IBM Guardium Data Redaction Guardium Data Redaction Designed to protect sensitive data in documents and forms from unintentional disclosure IBM Multi-Cloud Data Encryption MDE Designed to protect databases, file shares, data warehouses, and big data implementations in private/hybrid/public clouds IBM Multi-Cloud Data Protection Multi-Cloud Data Protection Designed to safeguard critical data where it resides, with cloud-based capabilities Agile 3 GRC Command & Control Center Agile 3 A dashboard designed to provide visibility to identify potential risks to sensitive assets IBM Security Key Lifecycle Manager RSKLM Enterprise management of encryption keys (key server on distributed platforms) IBM Security Key Lifecycle Manager for z/os SKLM for z/os Enterprise management of encryption keys (key server on mainframe) IBM Key Protect Key Protect Manages the lifecycle of encryption keys for apps across Bluemix IBM Application Security on Cloud ASoC Provides static, dynamic and interactive application security testing on cloud apps Application Security IBM Security AppScan Enterprise AppScan Enterprise Enterprise dynamic (unattended, parallel) app scanning and reporting IBM Security AppScan Source AppScan Source Static testing of application source code for vulnerabilities IBM Security AppScan Standard AppScan Standard Dynamic testing of running web applications for vulnerabilities IBM MaaS360 MaaS360 Enterprise mobile platform - security/management for applications/documents/devices IBM X-Force Exchange Commercial API X-Force Exchange Comm API API that makes a wide range of IBM Security Threat Intelligence available IBM BigFix Compliance BigFix Compliance Designed to protect endpoints. Better meet security compliance. Designed to reduce costs and enhance agility IBM BigFix Patch BigFix Patch Server management lifecycle management; security and compliance and server automation Infrastructure Security (Mobile, Network, Server and Endpoint) IBM BigFix Inventory BigFix Inventory Software asset management designed to discover all licensed/unlicensed software for all devices IBM BigFix Detect BigFix Detect Integrates attack detection with remediation capabilities for endpoint security IBM BigFix Lifecycle BigFix Lifecycle Find/fix endpoint problems - connected or not, fixed or mobile, virtual or physical IBM Security zsecure Admin zsecure Admin Solution to improve administration, audit, and compliance for System z IBM Security zsecure Audit zsecure Audit Provides highly customizable reporting and analysis of audit records IBM Security zsecure Alert zsecure Alert Real-time threat monitoring extending RACF/ACF2 real-time notification capabilities IBM Security zsecure Command Verifier zsecure CV Designed to control compliance by preventing erroneous or out-of-policy RACF commands Security Strategy, Risk and Compliance SSRC Assess, evaluate, and recommend to improve security risk management Security Intelligence and Operations Consulting SIOC Advise for the development of intelligence-driven security operations Infrastructure and Endpoint Security IES Managed security services for network, web, and messaging security Security Services Data and Application Security DAS Consulting and managed services for data security, including encryption X-Force Red Offensive Security XFP Security testing program focused on vulnerability management, rapid testing, and analytics X-Force Incident Response and Intelligence Services XF IRIS Prepare clients to respond to threats and incidents across the entire incident lifecycle Identity and Access Management IAM Consulting services recommending and integrating IAM components IT Risk Management Services ITRMS Create an IAM strategy and assist in deploying appropriate IAM solutions Return to How IBM can help Legal

Copyright IBM Corporation 2017 IBM Security 75 Binney Street Cambridge MA 02142 Produced in the United States of America September 2017 IBM, the IBM logo, ibm.com, Agile Command and Control Center, AppScan, BigFix, Guardium, i2, MaaS360, QRadar, Resilient, Trusteer, X-Force and zsecure are trademarks of International Business Machines Corp., registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the web at Copyright and trademark information at ibm.com/legal/copytrade.shtml This document is current as of the initial date of publication and may be changed by IBM at any time. Not all offerings are available in every country in which IBM operates. THE INFORMATION IN THIS DOCUMENT IS PROVIDED AS IS WITHOUT ANY WARRANTY, EXPRESS OR IMPLIED, INCLUDING WITHOUT ANY WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND ANY WARRANTY OR CONDITION OF NON-INFRINGEMENT. IBM products are warranted according to the terms and conditions of the agreements under which they are provided. The client is responsible for ensuring compliance with laws and regulations applicable to it. IBM does not provide legal advice or represent or warrant that its services or products will ensure that the client is in compliance with any law or regulation. Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective. IBM DOES NOT WARRANT THAT ANY SYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE IMMUNE FROM, THE MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY. 3 WGB03046-USEN-02