HIPAA Regulatory Compliance

Similar documents
Secure Access & SWIFT Customer Security Controls Framework

Understand & Prepare for EU GDPR Requirements

All the resources you need to get buy-in from your team and advocate for the tools you need.

HIPAA Compliance Checklist

Bomgar Discovery Report

Policy and Procedure: SDM Guidance for HIPAA Business Associates

Top 5 Reasons. The Business Case for Bomgar Remote Support

How Managed File Transfer Addresses HIPAA Requirements for ephi

HIPAA Security Checklist

HIPAA Security Checklist

These rules are subject to change periodically, so it s good to check back once in a while to make sure you re still compliant.

ORA HIPAA Security. All Affiliate Research Policy Subject: HIPAA Security File Under: For Researchers

HIPAA Security Rule Policy Map

HIPAA Security and Privacy Policies & Procedures

Information Technology Security Plan Policies, Controls, and Procedures Protect: Identity Management and Access Control PR.AC

Guide: HIPPA Compliance. Corporate HIPAA Compliance Guide. Privacy, productivity and remote access. gotomypc.com

HIPAA Federal Security Rule H I P A A

HIPAA COMPLIANCE FOR VOYANCE

HIPAA Requirements. and Netwrix Auditor Mapping. Toll-free:

HIPAA Controls. Powered by Auditor Mapping.

hidglobal.com HID ActivOne USER FRIENDLY STRONG AUTHENTICATION

Guide: HIPAA. GoToMeeting and HIPAA Compliance. Privacy, productivity and remote support. gotomeeting.com

Comprehensive Database Security

HIPAA Privacy & Security Training. Privacy and Security of Protected Health Information

New York Department of Financial Services Cybersecurity Regulation Compliance and Certification Deadlines

SECURITY PRACTICES OVERVIEW

Remote Access to a Healthcare Facility and the IT professional s obligations under HIPAA and the HITECH Act

Security in Bomgar Remote Support

Ekran System v Program Overview

Support for the HIPAA Security Rule

UT HEALTH SAN ANTONIO HANDBOOK OF OPERATING PROCEDURES

CipherCloud CASB+ Connector for ServiceNow

Healthcare Privacy and Security:

Integrating HIPAA into Your Managed Care Compliance Program

CyberArk Privileged Threat Analytics

HIPAA COMPLIANCE WHAT YOU NEED TO DO TO ENSURE YOU HAVE CYBERSECURITY COVERED

Demonstrating Compliance in the Financial Services Industry with Veriato

HIPAA Security. 3 Security Standards: Physical Safeguards. Security Topics

201 CMR COMPLIANCE CHECKLIST Yes No Reason If No Description

Securing Privileged Access and the SWIFT Customer Security Controls Framework (CSCF)

INCREASE APPLICATION SECURITY FOR PCI DSS VERSION 3.1 SUCCESS AKAMAI SOLUTIONS BRIEF INCREASE APPLICATION SECURITY FOR PCI DSS VERSION 3.

Privileged Account Security: A Balanced Approach to Securing Unix Environments

What is HIPPA/PCI? Understanding HIPAA. Understanding PCI DSS

ISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

Five Ways to Improve Electronic Patient Record Handling for HIPAA/HITECH with Managed File Transfer

Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud

HIPAA Compliance & Privacy What You Need to Know Now

Securing Your Most Sensitive Data

EXHIBIT A. - HIPAA Security Assessment Template -

Best Practices in Securing a Multicloud World

Security Rule for IT Staffs. J. T. Ash University of Hawaii System HIPAA Compliance Officer

HIPAA/HITECH Privacy & Security Checklist Assessment HIPAA PRIVACY RULE

A HOLISTIC APPROACH TO IDENTITY AND AUTHENTICATION. Establish Create Use Manage

Secure Messaging Mobile App Privacy Policy. Privacy Policy Highlights

efolder White Paper: HIPAA Compliance

Why you should adopt the NIST Cybersecurity Framework

SECURITY & PRIVACY DOCUMENTATION

Xerox FreeFlow Print Server. Security White Paper. Secure solutions. for you and your customers

Database Auditing and Forensics for Privacy Compliance: Challenges and Approaches. Bob Bradley Tizor Systems, Inc. December 2004

HIPAA AND SECURITY. For Healthcare Organizations

SOC-2 Requirement Solution Brief. EventTracker 8815 Centre Park Drive, Columbia MD SOC-2

Complete document security

HIPAA Privacy and Security. Kate Wakefield, CISSP/MLS/MPA Information Security Analyst

Information Technology Security Plan Policies, Controls, and Procedures Identify Governance ID.GV

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Secret Server HP ArcSight Integration Guide

Challenges and. Opportunities. MSPs are Facing in Security

Finding and Securing ephi in SharePoint and SharePoint Online

DEEP FREEZE CLOUD FOR HIPAA COMPLIANCE

Sample Security Risk Analysis ASP Meaningful Use Core Set Measure 15

Teradata and Protegrity High-Value Protection for High-Value Data

3 rd Party Certification of Compliance with MA: 201 CMR 17.00

Internal Audit Report DATA CENTER LOGICAL SECURITY

The Common Controls Framework BY ADOBE

the SWIFT Customer Security

Office 365 Buyers Guide: Best Practices for Securing Office 365

University of Pittsburgh Security Assessment Questionnaire (v1.7)

Projectplace: A Secure Project Collaboration Solution

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS

EXCERPT. NIST Special Publication R1. Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations

NEW DATA REGULATIONS: IS YOUR BUSINESS COMPLIANT?

GDPR Controls and Netwrix Auditor Mapping

Cyber Security Program

Go mobile. Stay in control.

DIRECTIVE ON INFORMATION TECHNOLOGY SECURITY FOR BANK PERSONNEL. June 14, 2018

Security in the Privileged Remote Access Appliance

PROTECT AND AUDIT SENSITIVE DATA

VANGUARD WHITE PAPER VANGUARD INSURANCE INDUSTRY WHITEPAPER

McAfee Embedded Control for Healthcare

Standard CIP Cyber Security Systems Security Management

WHITE PAPERS. INSURANCE INDUSTRY (White Paper)

Juniper Vendor Security Requirements

A company built on security

for the Dental Industry

Microsoft Office 365 TM & Zix Encryption

Technical Reference [Draft] DRAFT CIP Cyber Security - Supply Chain Management November 2, 2016

How AlienVault ICS SIEM Supports Compliance with CFATS

CERT Symposium: Cyber Security Incident Management for Health Information Exchanges

HIPAA Security. 1 Security 101 for Covered Entities. Security Topics

Transcription:

Secure Access Solutions & HIPAA Regulatory Compliance Privacy in the Healthcare Industry Privacy has always been a high priority in the health profession. However, since the implementation of the Health Insurance Portability and Accountability Act of 1996, organizations within the healthcare industry have been compelled to use extra precaution in handling protected health information. To prevent unauthorized use or disclosure of this information, several security regulations have been set in place. Some of the required regulations include audit controls, unique user identification, transmission security, and emergency access procedure, with addressable implementation specifications including encryption and automatic logoff. The Health Insurance Portability and Accountability Act (HIPAA) addresses the security of private patient healthcare data. Failure to abide by HIPAA regulations can lead to higher business costs, civil monetary penalties and negative media exposure. RECORDS The average cost per stolen record in health care is $363 IBM/PONEMON COST OF DATA BREACH STUDY: GLOBAL ANALYSIS

+ + + Manage All The Access To Your Network With Bomgar Bomgar s secure access solutions enable security professionals to control, monitor, and manage access to critical systems by privileged users. The Bomgar Remote Support and Privileged Access products integrate seamlessly with Bomgar Vault and Bomgar Verify for a true defense-in-depth strategy that also enhances productivity and meets compliance requirements. REMOTE SUPPORT PRIVILEGED ACCESS VAULT VERIFY Quickly access and fix nearly any remote device, running various operating systems, located anywhere in the world all while increasing productivity, improving performance, and delivering a superior customer experience. Provides administrators, vendors, and business users with the access capabilities they need to be more productive, while protecting high value infrastructure, assets, and applications from cyber breaches. Enterprise password manager that lets users store passwords securely, find privileged credentials and safely share administrative passwords. Easy-to-use, tokenless two-factor authentication solution that lets users choose and manage their own devices for a second factor of authentication.

Meeting Compliance When it comes to remote and secure access, compliance ensures that the organization s data is kept secure and helps mitigate security risks. Bomgar can help you meet a variety of HIPAA standards including Subpart C Security Standards for the Protection of Electronic Protected Health Information with our secure access solutions. 106.308 ADMINISTRATIVE SAFEGUARDS 164.308 (1)(i) Standard: Security management process. Implement policies and procedures to prevent, detect, contain, and correct security violations. 164.308 (a)(1) (D) Information system activity review (Required). Implement procedures to regularly review records of information system activity, such as audit logs, access reports, and security incident tracking reports. 164.308 (a) (3) (i) Standard: Workforce security. Implement policies and procedures to ensure that all members of its workforce have appropriate access to electronic protected health information, as provided under paragraph (a)(4) of this section, and to prevent those workforce members who do not have access under paragraph (a)(4) of this section from obtaining access to electronic protected health information. 164.308 (3) (A) Authorization and/or supervision (Addressable). Implement procedures for the authorization and/or supervision of workforce members who work with electronic protected health information or in locations where it might be accessed. 164.308(3) (c) Termination procedures (Addressable). Implement procedures for terminating access to electronic protected health information when the employment of, or other arrangement with, a workforce member ends or as required by determinations made as specified in paragraph (a)(3)(ii)(b) of this section. 164.308 (ii) (D) Password management (Addressable). Procedures for creating, changing, and safeguarding passwords. Bomgar fits into your existing security infrastructure. Create user profiles and configure Bomgar settings to fit organizational security policies. With Bomgar, session activity is automatically logged and may be recorded in a video format. There are built-in capabilities allowing specifically authorized users to generate comprehensive reports for analysis. Bomgar can also integrate with Security Information and Event Management (SIEM) tools for advanced analysis of audit logs. SIEM integration permits alerting for suspicious activity. Unique user IDs can be configured manually or, more typically, Bomgar may be integrated with an existing enterprise directory such as Microsoft Active Directory, another LDAP directory, or RADIUS for user authentication. Bomgar offers highly granular control over user access and privileges. System administrators can establish granular session permissions and can configure parameters such as access time constraints and areas of access. Access can be approved on an ad hoc basis. When user accounts are integrated with Active Directory or another enterprise directory, access and privilege authorization within Bomgar is handled automatically as a natural byproduct of the changes made within the enterprise directory. Such integration removes Bomgar as a separate component that must be managed during employee termination processing. Administrators can create vendor and user profiles with specific permissions to actively manage vendors and privileged users. When integrated with an enterprise directory it is that directory that enforces established procedures for creating, changing, and safeguarding passwords. With Bomgar Vault, passwords can be automatically generated, checked in/out, and rotated according to preset rules. Administrators establish password requirements, such as length and complexity, and rules for the frequency of password changes. 164.308 (5) (C) Implement procedures for monitoring log-in attempts and reporting discrepancies. All remote access session activity is logged. 164.308 (6) (ii) Implementation specification: Response and reporting (Required). Identify and respond to suspected or known security incidents; mitigate, to the extent practicable, harmful effects of security incidents that are known to the covered entity or business associate; and document security incidents and their outcomes. Bomgar provides extensive logging of remote session activity and administrative actions. The logs can be supplied to SIEM tools for advanced analysis and alerting.

164.310 PHYSICAL SAFEGUARDS 164.310 (a) (1) Standard: Facility access controls. Implement policies and procedures to limit physical access to its electronic information systems and the facility or facilities in which they are housed, while ensuring that properly authorized access is allowed. The most popular option for customers adhering to rigorous physical security compliance requirements is an on-premise deployment within their own network. Thus, physical security would be completely within the purview of the HIPAA compliant organization. However, the Bomgar cloud services may also be used without sacrificing HIPAA compliance. 164.312 TECHNICAL SAFEGUARDS 164.312(a) (1) Standard: Access control. Implement technical policies and procedures for electronic information systems that maintain electronic protected health information to allow access only to those persons or software programs that have been granted access rights as specified in 164.308(a)(4). 164.312 (a) (2) (i) Unique user identification (Required). Assign a unique name and/or number for identifying and tracking user identity. 164.312 (a) (2) (iii) Automatic logoff (Addressable). Implement electronic procedures that terminate an electronic session after a predetermined time of inactivity. 164.312 (b) Standard: Audit controls. Implement hardware, software, and/or procedural mechanisms that record and examine activity in information systems that contain or use electronic protected health information. 164.312 (d) Standard: Person or entity authentication. Implement procedures to verify that a person or entity seeking access to electronic protected health information is the one claimed. 164.312 (e) (2) (i) and (ii) Integrity controls (Addressable). Implement security measures to ensure that electronically transmitted electronic protected health information is not improperly modified without detection until disposed of. Encryption (Addressable). Implement a mechanism to encrypt electronic protected health information whenever deemed appropriate. Users accessing Bomgar may be authenticated via enterprise directories such as Microsoft Active Directory, other LDAP directories, RADIUS, or multifactor authentication systems such as Bomgar Verify. Privilege authorization of users is defined through Bomgar group policies which may be associated with the enterprise directory group memberships of the users. The Bomgar group policy attributes authorize the systems eligible for the users to access plus the default privileges of the users while accessing remote systems. The user default privileges may be customized to accommodate situations were a user s privileges might need to differ depending on the remote system being accessed. With Bomgar, user identification is maintained by an organization s enterprise directory, such as Microsoft Active Directory which provide authentication and authorization services. The Bomgar user licensing model removes any financial incentive for user licenses to be shared amongst individuals. This provides direct accountability for all remote access activities tied to enterprise directory identities. Sessions may be configured to automatically terminate after a specified idle time interval. Sessions may also be manually terminated by supervisory personnel or an authorized system administrator. With Bomgar, session activity is automatically logged and may be optionally recorded to a video format. There are built-in capabilities allowing privileged users to generate comprehensive reports for analysis. See response to 164.312(a)(1) All communications between the user and the remote systems are encrypted using TLS 1.2 originated with an x.509 certificate supplied by the enterprise and signed by an appropriate Certification Authority (CA). Bomgar recommends certificates signed by a public trusted CA. Bomgar provides a range of cipher suites that may be appropriately restricted by authorized system administrators. All remote system communications are initiated outbound from the client toward the Bomgar Remote Support or Privileged Access appliance using TCP/IP port 443 and using the public key certificate resident in the client software running on the remote device.

Improve Cybersecurity & Compliance Bomgar & Healthcare: A Perfect Fit Bomgar Secure Access solutions reside within your own environment, enabling support for closed networks without compromising security measures. This allows organizations to meet the HIPAA requirement to authorize, monitor and control all methods of remote access. ARCHITECTURE: Centralized, security-hardened appliance never passes data through a third-party USER AUTHENTICATION: Integrates with existing identity management and authentication methods ACCESS CONTROLS: 50+ permissions can be assigned individually or through group policies for privileged users & IT vendors AUDIT: Full audit trail and video recording of session events TWO-FACTOR AUTHENTICATION: Easy-to-use tokenless 2FA CREDENTIAL MANAGEMENT: Store, randomize, and inject credentials without exposing them to users No other secure access solution is more tailored to meet the needs of healthcare organizations than Bomgar. With a cost-effective licensing model and a secure, robust, architecture capable of supporting up to tens of thousands of critical systems, Bomgar is the ideal choice for large, geographically dispersed environments. Bomgar enables you to: IMPROVE cybersecurity by closing the door on the #1 attack pathway for hackers REPLACE multiple ineffective remote access tools with a single, comprehensive solution INCREASE productivity by ditching excel sheets and sticky notes for credential injection STANDARDIZE the authentication process by adding tokenless 2FA and integrating with Smart Cards and external directories SECURE access across hybrid environments to support diverse IT infrastructure components SIMPLIFY regulatory compliance IMPLEMENT a solution your users will love ABOUT Bomgar is the leader in Secure Access solutions that empower businesses. Bomgar s leading remote support, privileged access management, and identity management solutions help support and security professionals improve productivity and security by enabling secure, controlled connections to any system or device, anywhere in the world. More than 12,000 organizations across 80 countries use Bomgar to deliver superior support services and reduce threats to valuable data and systems. Bomgar is privately held with offices in Atlanta, Jackson, Washington D.C., Frankfurt, London, Paris, and Singapore. Connect with Bomgar at www.bomgar.com. CONTACT I INFO@.COM I 866-205-3650 (U.S.) I +44 (0)1628-480-210 (U.K./EMEA) I.COM 2017 CORPORATION. ALL RIGHTS RESERVED WORLDWIDE. AND THE LOGO ARE TRADEMARKS OF CORPORATION; OTHER TRADEMARKS SHOWN ARE THE PROPERTY OF THEIR RESPECTIVE OWNERS.