HIPAA Compliance Module. Using the HIPAA Module without Inspector Instructions. User Guide RapidFire Tools, Inc. All rights reserved.

Similar documents
PCI Compliance Assessment Module

Datto BDR Needs Assessment Module

HIPAA Compliance Assessment Module

PCI Compliance Assessment Module with Inspector

Inspector Software Appliance User Guide

Remote Data Collector Installation and User Guide

Reporter User Guide RapidFire Tools, Inc. All rights reserved Ver 4T

Comodo One Software Version 3.26

HIPAA Assessment. Prepared For: ABC Medical Center Prepared By: Compliance Department

INSTALLATION GUIDE. Virtual Appliance for Inspector and Reporter 9/20/2018 1:32 PM

ForeScout Extended Module for Tenable Vulnerability Management

QUICK START GUIDE. SQL Server Assessment Module. Instructions to Perform a SQL Server Assessment 8/22/2018 4:45 PM

rat ITarian Software Version 3.26 Network Assessment Tool Quick Start Guide Guide Version Broad Street Clifton, NJ 07013

Detector Service Delivery System (SDS) Version 3.0

NORTH AMERICAN SECURITIES ADMINISTRATORS ASSOCIATION Cybersecurity Checklist for Investment Advisers

Nessus v6 SCAP Assessments. November 18, 2014 (Revision 1)

Tenable.io User Guide. Last Revised: November 03, 2017

This guide details the deployment and initial configuration necessary to maximize the value of JetAdvantage Insights.

enicq 6 Installation Guide

Chapter 5: Vulnerability Analysis

HIPAA RISK ADVISOR SAMPLE REPORT

ManageEngine EventLog Analyzer Quick Start Guide

Comodo One Software Version 3.3

KeyData Web System Administrator Manual Version 1: 8 December 2010

Table Of Contents INTRODUCTION... 6 USER GUIDE Software Installation Installing MSI-based Applications for Users...9

IBM emessage Version 9 Release 1 February 13, User's Guide

Malwarebytes Endpoint Security Quick Start Guide Version October 2014

UNICORN Administration and Technical Manual

WhatsUp Gold. Evaluation Guide

How do you track devices that have been approved for use? Are you automatically alerted if an unapproved device connects to the network?

ForeScout Extended Module for Qualys VM

Ekran System v Program Overview

Carbon Black PCI Compliance Mapping Checklist

DSS User Guide. End User Guide. - i -

ISO COMPLIANCE GUIDE. How Rapid7 Can Help You Achieve Compliance with ISO 27002

End User Manual. December 2014 V1.0

ForeScout Extended Module for VMware AirWatch MDM

INSTALLATION GUIDE. RapidFire Tools Server for Cyber Hawk 9/20/2018 2:28 PM

Forescout. eyeextend for Palo Alto Networks Wildfire. Configuration Guide. Version 2.2

PCI DSS v3.2 Mapping 1.4. Kaspersky Endpoint Security. Kaspersky Enterprise Cybersecurity

Ekran System v Program Overview

Download installation package and documentation Installation procedure. Network installation Installing updates

Pass4suresVCE. Pass4sures exam vce dumps for guaranteed success with high scores

penelope case management software AUTHENTICATION GUIDE v4.4 and higher

INCIDENT RESPONDER'S FIELD GUIDE INCIDENT RESPONDER'S INCIDENT RESPONSE PLAN FIELD GUIDE LESSONS FROM A FORTUNE 100 INCIDENT RESPONSE LEADER

MET/TEAM 2.2 AND MET/CAL 9.1 UPDATE

Total Security Management PCI DSS Compliance Guide

OPC UA Configuration Manager PTC Inc. All Rights Reserved.

Getting Started & How to Complete a DoD Insider Threat Assessment v

OPC UA Configuration Manager Help 2010 Kepware Technologies

CS 356 Operating System Security. Fall 2013

Keys to a more secure data environment

Comodo Unknown File Hunter Software Version 5.0

CounterACT VMware vsphere Plugin

Endpoint Security. powered by HEAT Software. Patch and Remediation Best Practice Guide. Version 8.5 Update 2

CYBERSECURITY RISK LOWERING CHECKLIST

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Support for the HIPAA Security Rule

Installation Guide. EventTracker Enterprise. Install Guide Centre Park Drive Publication Date: Aug 03, U.S. Toll Free:

HPE Intelligent Management Center

QUICK START GUIDE. Exchange Assessment Module. Instructions to Perform an Exchange Assessment 8/22/2018 4:37 PM

Comodo Endpoint Security Manager Professional Edition Software Version 3.3

ForeScout Extended Module for Advanced Compliance

Freshservice Discovery Probe User Guide

IBM BigFix Compliance PCI Add-on Version 9.5. Payment Card Industry Data Security Standard (PCI DSS) User's Guide IBM

ROCHE/GENENTECH PRACTICAL WORKING GUIDE FOR REQUESTORS

Sophos Enterprise Console advanced startup guide

Sync User Guide. Powered by Axient Anchor

Comodo SecureBox Management Console Software Version 1.9

RBS OpenEMR Multisite Setup Improper Access Restriction Remote Code Execution of 5

CoreMax Consulting s Cyber Security Roadmap

"Charting the Course... MOC A: Administering System Center Configuration Manager. Course Summary

EXAMGOOD QUESTION & ANSWER. Accurate study guides High passing rate! Exam Good provides update free of charge in one year!

ForeScout CounterACT. Security Policy Templates. Configuration Guide. Version

Customer Compliance Portal. User Guide V2.0

ForeScout CounterACT. Plugin. Configuration Guide. Version 2.1

ROCK-POND REPORTING 2.1

Best Practices in Securing a Multicloud World

A company built on security

GRS Enterprise Synchronization Tool

Practical Network Defense Labs

Sophos Enterprise Console Help. Product version: 5.3

Expert PR Taxes User s Manual Payroll November p f P.O. Box San Juan PR

Security Configuration Assessment (SCA)

INSTALLATION GUIDE. Trimble PipeDesigner 3D Software

Managing Microsoft 365 Identity and Access

ForeScout Extended Module for Carbon Black

Azure for On-Premises Administrators Practice Exercises

Tenable.io Evaluation Workflow. Last Revised: August 22, 2018

Sample Security Risk Analysis ASP Meaningful Use Core Set Measure 15

VMware Mirage Web Manager Guide

EntraPass Installation Guide Kantech-OnBoard systems

Endpoint Security Manager

IBM Endpoint Manager. OS Deployment V3.5 User's Guide

Workflow Templates in Compliance 360 Version 2018

Quick Start Guide. Kaseya 2009

InventoryControl Quick Start Guide

AUTHORITY FOR ELECTRICITY REGULATION

Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud

IBM Security SiteProtector System User Guide for Security Analysts

Transcription:

HIPAA Compliance Module Using the HIPAA Module without Inspector Instructions User Guide 2017 RapidFire Tools, Inc. All rights reserved. V20180216

Contents Purpose of this Guide... 4 About Network Detective HIPAA Compliance Module... 4 Overview... 5 HIPAA Assessment Project Initial Set-up... 6 Creating a Site... 6 Starting a HIPAA Assessment... 7 HIPAA Risk Assessment... 8 HIPAA Risk Profile... 8 Using the Checklist Feature for Assessment Process Guidance... 10 Planning the On-site Data Collection... 12 Scans Performed During the HIPAA Assessment Process... 13 Optional Internal Network Vulnerability Scan and Local Scanning of Unreachable Computers... 14 PHASE A INITIAL DATA COLLECTION... 15 Phase A - Step 1: Complete the HIPAA On-site Survey... 15 Assessment Status and Checklist Updates and Progress Tracking... 17 Phase A - Step 2: Initiate External Vulnerability Scan... 20 Phase A - Step 3: Initiate the HIPAA Network Scan Using the HIPAA Data Collector and Import Scan Results... 24 Running the HIPAA Data Collector - Network Scan... 24 Importing the HIPAA Network Scan Data... 35 Phase A - Step 4: Use Push Deploy Tool to Initiate Push of HIPAA Local Scans on Selected Systems and Import Scan Results... 39 Run the HIPAA Local Computer Scan using the Push Deploy Tool based scanner... 39 Importing the HIPAA Local Computer Scan Data into the HIPAA Assessment... 47 PHASE B GET SECONDARY DATA... 51 Phase B - Step 1: Run HIPAA Data Collector selecting Local Scan on the Computers that were Unreachable during Push Deploy Tool Scanning (OPTIONAL)... 51 Phase B - Step 2: Complete the Inactive Computer Identification Worksheet... 52 Phase B - Step 3: Complete the User Identification Worksheet... 55 Phase B - Step 4: Complete the Computer Identification Worksheet... 58 Phase B - Step 5: Complete the Network Share Identification Worksheet... 61 PHASE C DOCUMENT EXCEPTIONS... 64 Complete the Security Exception Worksheet (Optional)... 64 1

GENERATING REPORTS... 67 Customizing Your Reports... 69 Using the Reports... 71 Risk Assessment and Management Plans... 71 HIPAA Policy and Procedure Document... 71 HIPAA Risk Analysis... 71 HIPAA Risk Profile... 72 HIPAA Management Plan... 72 Evidence of HIPAA Compliance... 72 HIPAA On-site Survey... 72 Disk Encryption Report... 73 Documented Surveys and Worksheets... 74 User Identification Worksheet... 74 Computer Identification Worksheet... 74 Network Share Identification Worksheet... 74 Security Exception Worksheet... 75 Login History by Computer Report... 75 Share Permission Report... 75 External Vulnerability Scan Detail Report... 75 Appendix I Group Policy Reference... 76 Forward and Introduction... 76 Policies for Windows Firewall... 76 Policies for Windows Services... 76 3 rd party Firewalls and Group Policy Considerations... 77 Appendix II Site Assessment Reports and Supporting Documents Locations... 78 Appendix III HIPAA Risk Profile Use for Ongoing HIPAA compliance assessments... 81 Appendix IV Adding an Inspector to a Site... 82 Adding an Inspector to a Site... 82 Appendix V Key Terminology... 84 Appendix VI Run the HIPAA Local Computer Data Collector on Unreachable Computers... 85 Appendix VII Time Saving Features to Reduce Survey and Worksheet Completion Time... 92 Completing Worksheet and Surveys... 92 2

Entering Assessment Responses into Surveys and Worksheets... 92 Survey and Worksheet Question Response Types... 92 Time Savings Tip to Reduce Survey and Worksheet Data Input Time... 93 Saving Time Inputting Reponses in Worksheets Through the Use of the Bulk Entry Feature... 93 Worksheet Completion Time Saving Techniques when Using the Classic User Interface... 95 Saving Time Inputting Reponses in Worksheets Through the Use of Shift+Select... 95 Saving Time Inputting Reponses in Worksheets Through the Use of Select All Rows option.... 98 Appendix VIII Initiate Internal Vulnerability Scan on the Inspector Appliance and Download Results (OPTIONAL) 99 Viewing the Status of an Inspector Scan... 104 Downloading Inspector Scans... 106 3

Purpose of this Guide The purpose of this document is to provide users of Network Detective HIPAA Compliance module instruction on how to perform a HIPAA Risk Assessment. It will guide you through the initial use of the software as well as the more advanced features. To become familiar with some of the definitions of the terms used throughout this guidebook, please refer to Appendix V Key Terminology. About Network Detective HIPAA Compliance Module HIPAA is a risk-based compliance framework, with a Risk Assessment being the first requirement in the HIPAA Security Rule. The Risk Assessment must identify the vulnerabilities to the security of electronic Protect Health Information (ephi) threats that can act on the vulnerabilities, including the likelihood and the impact if that occurs. Network Detective s is the first professional tool to combine and integrate automated data collection, with a structured framework for collecting supplemental assessment information not available through automated tools. It is the first solution to allow for the automatic generation of the key documents that are necessary to demonstrate compliance with the Security Rule. It includes comprehensive checklists that cover the Administrative, Physical, and Technical safeguards defined in the HIPAA Security Rule. More than just documents to satisfy a compliance requirement, Network Detective provides factual evidence, expert advice, and direction to minimize or eliminate the risk of a data breach. You can compare Network Detective s to getting a medical exam. Network Detective automates the lab tests for the technology environment. It includes interview surveys to gather information manually. In addition, it provides a recommended treatment plan. 4

Overview Network Detective HIPAA Compliance Module is composed of the HIPAA Data Collector, Network Detective Application, Surveys, Worksheets, and the Push Deploy Tool. The process to create a HIPAA assessment involves three major steps: Phase A) Initial Data Collection, Phase B) Get Secondary Data, and Phase C) Document Exceptions in the form of compensating controls. Phases of a HIPAA Assessment Using the HIPAA Module There are two types of HIPAA assessments that can be performed using the HIPAA Module: 1) HIPAA Risk Assessment 2) HIPAA Risk Profile The Risk Assessment is a complete assessment that includes all worksheets and surveys. You should plan on a day to complete a full assessment on a typical 15-user network. The Risk Profile requires selecting a prior Risk Assessment and reduces the time to complete the assessment by using worksheets and surveys from the Risk Assessment. 5

HIPAA Assessment Project Initial Set-up Creating a Site The first step in the assessment is creating a Site using Network Detective. All Network Detective assessments are organized into Sites. A Site can be a physical location or a logical grouping, such as a customer account name. Before making a selection you must decide on your assessment strategy. See the Network Detective User Guide for information on sites. a. For a single location you will create one site. b. For organizations with multiple locations, you must decide if you want one set of reports, or separate reports for each location. Select New Site Enter the site name. For sites with multiple locations, enter a more detailed description. 6

Starting a HIPAA Assessment Important: Throughout the HIPAA assessment process, there are a number of steps where surveys, automated scans, and data collection worksheets are completed in a specific order. By default, all of the worksheets that are used to collect and document assessment data are not immediately visible in the HIPAA module s Assessment Window. These worksheets are created as a result of automated scan data collection and data collected in both surveys and worksheets that are presented and used throughout the process. In the case that you are attempting to perform a HIPAA assessment remotely, you will need to coordinate with on-site personnel in order to complete the surveys and questionnaires that dynamically appear throughout the HIPAA assessment process. To start a HIPAA Risk Assessment, from the Home screen, select and open the Site you wish to use for your Assessment. Click on the Start button. 7

Select either a HIPAA Risk Assessment for an Annual or Quarterly assessment or a HIPAA Risk Profile for a monthly update. A completed HIPAA Risk Assessment is required prior to running a monthly assessment using the HIPAA Risk Profile. For more details, refer to Appendix III found on page 81. HIPAA Risk Assessment HIPAA Risk Profile Required at least Annually Recommended Quarterly as part of a Quarterly Compliance Review Requires that all manual WORKSHEETS be completed Example 15-user network in 4 6 hours Monthly Review Does NOT require WORKSHEETS Requires selecting a prior RISK ASSESSMENT (will use existing worksheets) MUCH faster with little manual input Example- 15-user network in less than one hour 8

Enter a Label to identify the assessment. Enter a Comment to help further identify the assessment. Select the Next button to proceed to create/start the new assessment. Once the assessment is started, the HIPAA Assessment Checklist will be presented. 9

Using the Checklist Feature for Assessment Process Guidance The Checklist will guide you through the assessment process and ensure you have gathered enough data to produce the best assessment possible. As you import scans, complete questionnaires, and fill out worksheets, the Checklist will automatically be revised adding additional suggestions and indicating where additional information may help produce richer results. As you progress through the assessment process additional work items will be added to the Checklist. The assessment s Checklist is always available within the Assessment Window. The Checklist will be updated continuously with the need to perform and Import Scans and to fill out Questionnaires and Worksheets as you work through your HIPAA Compliance Assessment. Throughout the assessment process, the Checklist will update the list of Open Items and Completed Items to present to you a list of assessment actions that have been completed and a list of outstanding actions. At any time, you can Refresh the Checklist or Print a Checklist. As you perform your assessment, Completed Items will be noted by a particular Checklist item having a Checkmark placed in the center of the Checklist item graphic as illustrated below. 10

During the assessment process, Required and Optional actions will be referenced throughout the Checklist. This Checklist will have new Open Items (i.e. assessment tasks) added to the Checklist based on the phase and/or steps that have been performed by the user within the assessment process. These Checklist items created and updated within the list are related to the performance and importing of scans, the answering of questionnaires, or the completion of worksheets that are dynamically created throughout the assessment process. 11

Planning the On-site Data Collection There are various ways to collect data for a HIPAA Compliance Risk Assessment. These methods can vary based on time, cost, client expectation, level of detail needed to identify remediation needs, etc. Initial Assessment Types of collections: HIPAA Risk Assessment Quick Audit Full Audit + External Scan + Network Scan + Computer Scan on 1-3 computers + All worksheets + External Scan + Network Scan + Computer Scan on all computers + All worksheets HIPAA Risk Profile Quick Audit + External Scan + Network Scan + Computer Scan on 1-3 computers + NO worksheets Full Audit + External Scan + Network Scan + Computer Scan on all computers + NO worksheets 12

Scans Performed During the HIPAA Assessment Process The Initial Data Collection phase of the HIPAA compliance assessment consists of the following required and optional scans: External Vulnerability Scan HIPAA Network Scan Using the HIPAA Data Collector HIPAA Scans on Local Computers (using the Push Deploy Tool) Optional Local Computer Scans (using the HIPAA Data Collector for unreachable computers) Optional Internal Vulnerability Scan (requires the Network Detective Inspector) The Inspector network and local computer scans and the HIPAA Data Collector scans make use of multiple technologies/approaches for collecting information on the client network, including: Network Scan Active Directory WMI Remote Registry ICMP File System Scanning Windows Registry Windows Shares and Permissions Security Center 13

Optional Internal Network Vulnerability Scan and Local Scanning of Unreachable Computers Throughout the assessment process, Optional scans may need to be undertaken based on the availability of servers and workstations during automated and network scans, based on a need to sample scan machines outside of the network that you are assessing, or based on the need to more thoroughly scan for internal network vulnerabilities. These scans would include: Optional Scan Type Run HIPAA Local Data Collector scan on the Computers that were unreachable (Refer to Appendix VI for instructions on how to run this scan) Internal Vulnerability Scan (requires Inspector) (Refer to Appendix VIII for instructions on how to run this scan) Description Run the "Local Scan any computers that cannot be scanned remotely (i.e. blocked by a firewall, not connected to the domain, or otherwise inaccessible). Run the Local Scan directly the computer itself. An Inspector initiated scan that checks for Open Ports and Protocol Vulnerabilities that could be exploited ONCE a hacker is in your network or by employees. Essentially INSIDE attacking INSIDE. This scan complements the external vulnerability scan performed with the HIPAA module, which finds weaknesses at the network edge that could be exploited by external sources. 14

PHASE A INITIAL DATA COLLECTION Phase A - Step 1: Complete the HIPAA On-site Survey Completing the HIPAA On-Site Survey is the first step in the HIPAA compliance assessment process. To access the HIPAA On-Site Survey, From the Site s Dashboard, select the selector control on the left side of the InForm Bar located at the bottom of the Assessment Window. To open the HIPAA On-Site Survey, click on the name label for the HIPAA On-Site Survey entry in the InForm Questionnaire/Worksheet list located below the InForm Bar at the bottom of the Assessment Window: Survey and Worksheet Question Response Types Throughout the HIPAA Risk Assessment process, the Network Detective s InForm-based Surveys and Worksheets used throughout the HIPAA Module must be completed. Responses to the questions posed in surveys and worksheets are from the available Response Types below: Response Type Description Example Use Text Response Free-form text response Describe the condition of the data center. Multiple Choice Multiple fixed responses Does the firewall have IPS? - Yes - No Checklist Item An item that is marked off if done Check the security of the door locks When stepping throughout the Survey and Worksheet completion process throughout your assessment, you are required to provide answers to the Topics presented. In each row within the Survey or Worksheet, there are Instructions presented. 15

To complete a Survey or Worksheet, review the Topics and Instructions listed in a Survey or Worksheet and document the answers accordingly. TIME SAVINGS TIP: To learn more about how to save time completing Surveys and Worksheets, please see Appendix VII Time Saving Features to Reduce Survey and Worksheet Completion Time found on page 92. Completing the HIPAA On-site Survey Upon editing (opening) the HIPAA On-site Survey, the following window is presented: To document the responses to the Instructions/Questions presented in this survey: 1. Review the Topic Question. 2. Review the Instructions. Instructions provide guidance and are not included in the reports. 3. Enter the Response in the Response field. A Response must be given for each entry to complete the all of the surveys within the HIPAA assessment process with the exclusion of the Exception Management process that 16

is performed from within the Security Exceptions Worksheet found later in the HIPAA Module s assessment process. 4. Select the Notes icon to enter any Notes relevant to the topic question s response in the Notes Field 5. Select the Respondent icon to enter the name of individual that responded or provided information to respond to the topic s question or requirement in the Respondent field. 6. Save your answers periodically and Save when you are done. 7. Select Close to close the survey worksheet when you are done. You can return to the HIPAA On-site Survey by selecting the worksheet s name label listed under the InForm Bar in the Assessment Window. Assessment Status and Checklist Updates and Progress Tracking As surveys, scans, and worksheets are completed throughout the HIPAA Module s Data Collection process, the assessment s Status and Checklist information presented within the Network Detective Assessment Window updates throughout the assessment process. For example, once the HIPAA On-Site Survey is completed, the Status and Checklist tracking data for the Assessment will be updated to show the number of Active Completed and Open Checklist items. You can view the Completed items and the Open items that are additional steps to be completed within the Checklist. Refer to the figure below. 17

After each step in the data collection and assessment process, it is recommended that the Checklist information be reviewed at regular intervals in order to plan and execute the next steps that are to be performed within the assessment. Initiated and Completed Scans Impact on Checklist Items Status Information Checklist items and their status that reference the collection of data collection through automated scans will not be updated to the Completed status until the scan is imported or downloaded into the Active Assessment. As scan data files are imported into the Assessment, the scan data files are listed under the Scans Bar within the Scans section located towards the bottom of the Assessment Window. Status information on other scans such as the HIPAA Network Scan, the Push Deploy Tool Local Computer for HIPPA Scan, HIPAA Data Collector Local Computer Scan are tracked and maintained in the Checklist and the Scans section of the Network Detective Assessment Window. 18

The status and Checklist information for these scans will be updated as completed when each scans data files are imported into the assessment itself and listed in the Scans section of the Assessment Window. Status Information Associated with Questionnaires and Worksheets Added to the Assessment Process As new questionnaires and worksheets are added to the list of forms under the InForm Bar located within the InForm section of the Assessment Window or as questionnaires and worksheets are completed, their status will be updated with an In Progress or Completed status label. The Inform list window below presents questionnaire and worksheet status information. 19

Phase A - Step 2: Initiate External Vulnerability Scan To configure and start the External Vulnerability Scan, select the selector control on the left side of the Scans Bar, which is located at the bottom of the Assessment Window. Select Initiate External Scan button to start the scan s setup process. Enter the range of IP addresses you would like to scan. You may enter up to 16 external addresses. 20

Select Add to add a range of external IP addresses to the scan. If you do not know the external range, you can use websites such as whatismyip.com to determine the external IP address of a customer. Enter the IP range for the scan. For just one address, enter the same value for the Starting and Ending IP Address. You can initiate the External Vulnerability Scan before visiting the client s site to perform the data collection. This way, the External Scan data should be available when you are ready to generate the client s reports. 21

In the Initiate External Vulnerability Scan window, enter an email address to be notified when the scan is completed. Click Next to send the request to the servers that will perform the scan. Scans can take several hours to complete. You will receive an e-mail when the scan is complete. Note that the Assessment Window will be updated to reflect the External Vulnerability Scan has been initiated. Refer to the list under Scans Bar located within the Assessment Window as detailed in the figure below. The scan s status of 0 of 1 complete will be updated to complete once the scan is completed and you will receive the scan is complete email message. Note the External Vulnerability Scan s complete status below. Upon viewing the Checklist for the assessment, the Checklist now details the status indicating that the External Vulnerability Scan is complete as displayed below. 22

The next step in the HIPAA assessment process is to use HIPAA Data Collector to run the HIPAA Network Scan. 23

Phase A - Step 3: Initiate the HIPAA Network Scan Using the HIPAA Data Collector and Import Scan Results Running the HIPAA Data Collector - Network Scan NOTE: THE FOLLOWING NETWORK SCANNING PROCESS IS ONLY USED WHEN INSPECTOR IS NOT USED WITH THE HIPAA MODULE. The HIPAA Data Collector is a self-extracting zip file that executes an.exe. This collector is completely non-invasive. This collector is not installed on the domain controller or on any other machine on the client s network and does not make any changes to the system. The HIPAA Data Collector makes use of multiple technologies/approaches for collecting information on the client network, including: Network Scan Active Directory WMI Remote Registry ICMP File System Scanning Windows Registry Windows Shares and Permissions Security Center Step 1 - Launch the HIPAA Data Collector To perform a HIPAA Network scan, visit the RapidFire Tools software download website and download and run the HIPAA Data Collector. The HIPAA Data Collector s self-extracting.zip file that does not install on the client computer. Use the unzip option to unzip the files into a temporary location and start the collector. Step 2 Configure the HIPAA Data Collector Network Scan Starting the HIPAA Data Collector application will present the following screen. 24

If you are running on a computer in the network, such as the domain controller, to run a network scan, select the HIPAA Network Data Collector option. Select the Next button and the Credentials window will be presented. Step 3 Configure the HIPAA Data Collector Network Scan The Credentials window will be displayed to enable you to configure the type of network you are scanning (either an Active Directory domain or Workgroup). Then you can assign the required administrative credentials necessary to access the network environment during the scanning process. 25

Enter the Credentials by performing these steps: 1. Enter the type of network you are scanning (Active Directory Domain or Workgroup). 2. Enter a username and password with administrative rights to connect to the local Domain Controller and Active Directory. If in a domain, clicking the Next button will test a connection to the local Domain Controller and Active Directory to verify your credentials. If you are scanning a Workgroup environment, enter credentials, which can access the individual workstations as a local administrator. 3. Select the Next button. At this point in the process, the Local Domains window will be presented. Note: If you select to scan a Workgroup, then the Local Domains select step in this process will be skipped. 26

Step 4 Configure the Local Domains Select the Domains to gather information from by performing these steps: 1. Select to gather information from ALL domains detected or from Domains and OUs you select. 2. Select the Next button. You will then be requested to confirm the Domain and OU when the Domain and OU Confirmation window is presented as seen below. 27

Select the OK button to confirm the Domain and OUs you have selected. At this point in the process, the External Domains screen will be presented. Step 5 Configure the External Domains Enter the name(s) of the organization s External Domains. 28

A Whois query and MX (mail) record detection will be performed upon selecting the Next button. The IP Ranges screen will be presented. Step 6 Configure the Network IP Address Range to be Scanned Enter the Starting and Ending IP Addresses for the range(s) you want to scan in the fields that are highlighted in blue. Scans may affect network performance. Select Perform minimal impact scan if this is an issue. Then select the Next button. The SNMP Information screen will be presented. 29

Step 7 Configure the SNMP Community String Information Enter any additional SNMP community strings used on the network. Then click on the Next button. The Microsoft Base Security Analyzer (MBSA) screen will be presented. 30

Step 8 Configure the Scan to Run MBSA and the Patch Analysis Microsoft Baseline Security Analyzer (MBSA) window enables you to select to run the MBSA and Patch Analysis during the Network Scan. If MBSA is needed, please follow instructions to install the MBSA software as directed in the MBSA window. After installation, select the Refresh button to include MBSA in the data collection scan. Select the MBSA and Patch Analysis. Then select the Next button. MBSA is in the process of being deprecated. Follow the steps in this guide and use the Push Deploy Tool as instructed instead. This will collect information such as Patch Analysis for all Windows operating systems. 31

Step 9 Verify and Run the Scan Select the folder that you want to store the scan data file in after the scan is completed. You may change the scan s Output Assessment File Folder location and Basename for the scan data. Enter any Comments and then select Start. The Collection Progress window will then be displayed as presented below. 32

Step 10 Monitor the Network Scan s Collection Progress The Network Scan s status is detailed in the Collection Progress window. The Collection Progress window presents the progress status of a number of scanning processes that are undertaken. MBSA is an external program provided by Microsoft. It can take 1-5 minutes per node to run. More than one node is checked at a time. Usually 256 nodes take about 30 minutes. Patch analysis can take more than 8 minutes per computer. At any time, you can Cancel Data Collection, which will not save any data. By selecting Wrap It Up, you can terminate the scan and generate reports using the incomplete data collected. Upon the completion of the scan, the Finish window will be displayed. 33

Step 11 Complete the HIPAA Data Collector Network Scan Process The Finish window indicates that the scan is complete and enables you to review the scan output file s location and the scan s Results Summary. Click on Done button to close the HIPAA Data Collector window. Note the location where the scan s output file is stored. 34

Importing the HIPAA Network Scan Data The final step in this process is to import the data collected during the HIPAA Network Scan into the Active HIPAA assessment. Click on the Import Scan File button in the Network Detective Assessment window: The Select the Scan Results window will be displayed thereby allowing you to import the.hdf file produced by the HIPAA Network Data Scan into the Assessment. Browse and select the HIPAA Network Scan data file from the folder you selected during the Network Scan process. Then click the Next button to import the scan data. 35

The Network Detective Merge window will be displayed. The success of the scan s import will be confirmed by the Scan Archive Created window being displayed as presented below. 36

Select the Finish button to complete the scan file import process. After the.hdf file import, the Assessment Window will be updated to reflect the addition of the HIPAA Network Scan data under the Import Scans section of the Assessment Window. In addition, the Status and Check List information indicators will be updated to present the assessment s current status. Refer to the figure below. After the network scan file is imported, the Scans section of the Assessment window will be updated to list the files imported into the assessment as seen below. 37

38

Phase A - Step 4: Use Push Deploy Tool to Initiate Push of HIPAA Local Scans on Selected Systems and Import Scan Results Run the HIPAA Local Computer Scan using the Push Deploy Tool based scanner NOTE: THE FOLLOWING LOCAL COMPUTER SCANNING PROCESS IS ONLY USED WHEN INSPECTOR IS NOT USED WITH THE HIPAA MODULE. Steps to Run the HIPAA Local Computer Scan Using the Push Deploy Tool The Push Deploy Tool pushes the local data collector to machines in a specified range and saves the scan files to a specified directory (which can also be a network share). The benefit of the tool is that a local scan can be run simultaneously on each computer from a centralized location to reduce or eliminate the need to spend time at each computer within the network to run a local scan. The output files (.ZIP files) from the local scans can either be: 1. stored on a USB drive and taken off site to be imported into the active assessment within Network Detective. 2. automatically uploaded to the RapidFire Tools secure cloud storage area using the Client Connector Network Detective add-on and later downloaded from the secure cloud storage area directly to the Network Detective application for use in report generation. Step 1 Install and Run the Push Deploy Tool Visit www.rapidfiretools.com/nd to download the Push Deploy Tool. To perform a local computer scan extract the contents of the NetworkDetectivePushDeployTool.ZIP file either to a USB drive, or, directly to any machine on the target network. Then right click and Run as Administrator the NetworkDetectivePushDeployTool.exe contained within the folder named NetworkDetectivePushDeployTool that was created by the.zip file extraction. 39

Step 2 Configure the Push Deploy Tool to Perform Local Computer Scan and Add Credentials Starting the Push Deploy Tool will present the following window. Next, select the HIPAA Deep Scan option. Set the Storage Folder location and select the HIPAA Deep Scan option. Note: This Storage Folder location can be located on a network share drive to centralize scan file storage. 40

If the entry of credentials is required or credentials are not present in the Credentials list, then type in the administrator level Username and Password Credentials necessary to access the local computers on the network. Next, then select the Add option. Note: For the Push Deploy Tool to push the local scans to computers throughout the network to perform local computer scans, you need to ensure that the Windows Management Instrumentation (WMI) service is running and able to be managed remotely on the computers that you wish to scan. Sometimes Windows Firewall blocks Remote Management of WMI, so this service may need to be allowed to operate through the Firewall. Push/Deploy also relies on using the Admin$ share to copy and run the data collector locally. Admin$ must be present on the computers you wish to scan, and be accessible with the login credentials you provide for the scan. For Workgroup based networks, the Administrator credentials for all workstations and servers that are to be scanned are recommended to be the same. In cases where a Workgroup-based network does not have a one set of Administrator credentials for all machines to be scanned, use the Add option to add all of the Administrator credentials for the Workgroup. Multiple sets of Administrator credentials will be listed in the Credentials. Next, select the Next button. Step 3 Add the Computers to Scan The Computers and Status window allows you to: Add a Single Computer to be scanned Add (computers) from File that are to be scanned Add (computers) from IP Range that are to be scanned Or. to Save Computers to File in order to export a list of computers to be scanned again in future assessments 41

Process to Configure Computers to be Scanned Method As previously referenced, there are three methods to creating/adding a list of computers to be scanned by the Push Deploy tool. Method 1 - Add a Single Computer to be Scanned To use the Add Single Computer method to select computers to be scanned, then type in the computer s IP address as shown below, then click on the Add Single Computer link to the right of the IP address entry field. Method 2 - Add (computers) from File that are to be Scanned 42

Click on the Add from File link and select the text file that contains the computer IP addresses that are to be included within the scanning process. Select the file that contains the IP addresses to be scanned, and then click on the Open button. The file that contains the IP addresses can be created using the Push Deploy Tools Save Computers to File feature, or created manually with a text editor using the required text formatting structure so that the IP addresses are recognized by the Push Deploy Tool. Upon the file s selection and opening the IP address and computer information will be imported into the Push Deploy Tool and presented in the Computers and Status window for verification prior to starting the scan. Method 3 - Add (computers) from IP Range that are to be Scanned Click on the Add from IP Range and to define the Starting and Ending computer IP addresses range that are to be included within the scanning process. 43

When you have input the IP address range into the IP Range window, select the OK button. After one or more of the abovementioned methods have been used to define the computer IP addresses to be scanned, the computer names and IP addresses will be listed in the Computer and Collection Status window. 44

Step 4 Initiating the Scan After creating/adding a list of one or more computers to scan, start the scan either by selecting the unpause button in the Computer and Status window, or, by selecting the Next button in the Computer and Status Window and the scan will be initiated. The status of each computer s scan activity will be highlighted within the Computers and Status window as presented below. Upon the completion of all of the scheduled scans, the scan data collected is stored within the Storage Location folder presented in the Collected Data Files window of the Push Deploy Tool. Step 5 Verify that the Quick Local Computer Scan Data has been Collected To verify the inclusion of the scan data produced by the Push Deploy Tool within your assessment, select the Next button and the Collected Data Files window will be displayed. 45

Step 6 Verify that HIPAA Local Computer Scan Files are Available from Scan Process To review or access the files produced by the Push Deploy Tool s scans, select the On Finish: Open Storage Folder option in the Collected Data Files window and then select the Finish button. After all of the HIPAA Local Computer Scans are complete for the computers that were selected to undergo this scan, the next phase in the process is to import the scan data files produced by the Local Scan into the current HIPAA Assessment. 46

Importing the HIPAA Local Computer Scan Data into the HIPAA Assessment The final phase in this process is to import the data collected during the HIPAA Computer Scan performed by the Push Deploy Tool s local computer scanner into the HIPAA Risk Assessment. Click on the Import Scan File button in the Network Detective Assessment window: The following Select Scan Results window will be displayed. This window enables you to Browse, select, and import the HIPAA Local Computer Scan s.zip file(s) for all of the computers scanned into the Assessment. Click on the Browse button in the Network Detective Wizard s Select the Scan Results window to select a single scan data file or a group of scan data files to import. The Open Network Assessment Data File window will then be displayed. 47

Select a single file or multi-select multiple files that you would like to import. Then select the Open button. This action will display the Select the Scan Results window in the Wizard noting the file name of the file selected for import. 48

Select the Next button to start the import (data Merge) process. The Network Detective Merger window will be displayed. Select the Merge Now button. The Scan Archive Created window below will be displayed indicating that the Merge (import) process is complete. 49

Next, select the Finish button in the Scan Archive Created window. Upon reviewing the Imported Scans list within the Assessment Window, the.cdf,.sdf, and.wdf files have been added the Computer Scan, Security Scan, and WiFi Scan data collected by the Push Deploy Tool scanning process to the HIPAA Assessment. 50

PHASE B GET SECONDARY DATA Phase B - Step 1: Run HIPAA Data Collector selecting Local Scan on the Computers that were Unreachable during Push Deploy Tool Scanning (OPTIONAL) Using the HIPAA Data Collector, run the local scan any computers that cannot be scanned remotely (i.e. blocked by a firewall, not connected to the domain, or otherwise inaccessible). Use the HIPAA Data Collector to run the HIPAA Local Scan on selected computer systems manually. To use the HIPAA Data Collector to run the Local Scan please refer to Appendix - VI found on page 85. 51

Phase B - Step 2: Complete the Inactive Computer Identification Worksheet The Inactive Computer Identification Worksheet contains a list of computers that have not been logged into for a long period of time. This list of computers was identified during the network scan phase of the automated data collection. In this worksheet, you document the usage status of (for example: Verified Active, Possibly Active, or Verified Inactive). To open and complete the Inactive Computer Identification Worksheet, click on the name label for the Inactive Computer Identification Worksheet entry in the InForm Questionnaire/Worksheet list located below the InForm Bar at the bottom of the Assessment window. The Inactive Computer Identification Worksheet window will be displayed. 52

To document the responses to the Instructions/Questions presented in this survey: 1. Review the Topic Question. 2. Review the Instructions. Instructions provide guidance and are not included in the reports. 3. Enter the Response in the Response field. A Response must be given for each entry to complete the worksheet. To save time you may select from a list of responses contained within the list provided in the Response field to pre-populate each computer s usage status record. For each computer you can select the Response field and change the default response to the response required. 53

Complete the worksheet for all of the inactive computers listed. TIME SAVINGS TIP: To learn more about how to save time completing Surveys and Worksheets, please see Appendix VII Time Saving Features to Reduce Survey and Worksheet Completion Time found on page 92. 4. Select the Notes icon to enter any Notes relevant to the topic question s response in the Notes Field 5. Select the Respondent icon to enter the name of individual that responded or provided information to respond to the topic s question or requirement in the Respondent field. 6. Select the Save option to save your answers periodically and Save when you are done. 7. Select the Close option to close the survey worksheet when you are done. You can return to the Inactive Computer Identification Worksheet by clicking on the name label for the Inactive Computer Identification Worksheet located under the InForm Bar at the bottom of the Assessment Window. After completing the Inactive Computer Identification Worksheet, the word Completed will be displayed next to this questionnaire s label in the InForm section of the Assessment Window. 54

Phase B - Step 3: Complete the User Identification Worksheet The User Identification Worksheet enables you to identify each user and document if they are authorized to access electronic Protected Health Information (ephi). The User Identification Worksheet contains a list of users that have been identified as having ephi access rights during the network scan phase of the automated data collection. In this worksheet, you document the type of user account (for example: Employee ephi Authorization, Employee - no ephi Authorization, Vendor ephi Authorization, Vendor no ephi Authorization, Former Employee, Former Vendor, Service Account, etc.). To open and complete the User Identification Worksheet, click on the name label for the User Identification Worksheet entry in the InForm Questionnaire/Worksheet list located below the InForm Bar at the bottom of the Assessment window. From the Assessment Window, edit the User Identification Worksheet. 55

To document the responses to the Instructions/Questions presented in this worksheet: 1. Review the Topic Question. 2. Review the Instructions. Instructions provide guidance and are not included in the reports. 3. Enter the Response in the Response field. A Response must be given for each entry to complete the worksheet. To save time you may select from a list of responses contained within the list provided in the Response field to pre-populate each user record. 56

For each user you can select the Response field and change the default response to the response required. Complete the worksheet for all of the users listed. TIME SAVINGS TIP: To learn more about how to save time completing Surveys and Worksheets, please see Appendix VII Time Saving Features to Reduce Survey and Worksheet Completion Time found on page 92. 4. Select the Notes icon to enter any Notes relevant to the topic question s response in the Notes Field 5. Select the Respondent icon to enter the name of individual that responded or provided information to respond to the topic s question or requirement in the Respondent field. 6. Select the Save option to save your answers periodically and Save when you are done. 7. Select the Close option to close the survey worksheet when you are done. You can return to the User Identification Worksheet by clicking on the name label for the User Identification Worksheet located under the InForm Bar at the bottom of the Assessment Window. After completing the User Identification Worksheet, the word Completed will be displayed next so this questionnaire s label in the InForm section of the Assessment Window. 57

Phase B - Step 4: Complete the Computer Identification Worksheet The Computer Identification Worksheet contains a list of the computers that have been identified during the network scan phase of the automated data collection. The computers identified are operating within a particular domain or workgroup as well as include non-domain devices. In this worksheet, you identify each computer that stores ephi, does not store ephi, or accesses ephi. To open and complete the Computer Identification Worksheet, click on the name label for the Computer Identification Worksheet entry in the InForm Questionnaire/Worksheet list located below the InForm Bar at the bottom of the Assessment window. Upon editing the Computer Identification Worksheet, the following window is presented: 58

Within this worksheet, there is a list of computers that have been identified during the network scanning process. These computers are either in a Domain, Workgroup, and/or are Nondomain devices. For each device, either the machine name or IP address of the device is displayed in the Topic column. There additional details about the devices listed in the worksheet that are documented in the Notes field, including OS version, IP address, Description data, Last Login, and possibly a CPU version. To document the responses to the Instructions/Questions presented in this worksheet: 1. Review the Topic Question. 2. Review the Instructions. Instructions provide guidance and are not included in the reports. 3. Enter the Response in the Response field. A Response must be given for each entry to complete the worksheet. To save time you may select from a list of responses contained within the list provided in the Response field to pre-populate each user record. For each computer you can select the Response field and change the default response to the response required. Complete the worksheet for all of the computers listed. TIME SAVINGS TIP: To learn more about how to save time completing Surveys and Worksheets, please see Appendix VII Time Saving Features to Reduce Survey and Worksheet Completion Time found on page 92. 4. Select the Notes icon to enter any Notes relevant to the topic question s response in the Notes Field 59

5. Select the Respondent icon to enter the name of individual that responded or provided information to respond to the topic s question or requirement in the Respondent field. 6. Select the Save option to save your answers periodically and Save when you are done. 7. Select the Close option to close the survey worksheet when you are done. You can return to the Computer Identification Worksheet by clicking on the name label for the Computer Identification Worksheet located under the InForm Bar at the bottom of the Assessment Window. After completing the Computer Identification Worksheet, the word Completed will be displayed next so this questionnaire s label in the InForm section of the Assessment Window. 60

Phase B - Step 5: Complete the Network Share Identification Worksheet The Network Share Identification Worksheet is used to identify and document each network share servers and workstations operating within the environment scanned by the HIPAA Module that contains ephi, does not contain ephi, or document that you do not know if the share contains ephi or not. To open and complete the Network Share Identification Worksheet, click on the name label for the Network Share Identification Worksheet entry in the InForm Questionnaire/Worksheet list located below the InForm Bar at the bottom of the Assessment window. Upon editing the Network Share Identification Worksheet, the following window is presented: 61

The Network Share Identification Worksheet presents a list of network share locations with the network. These network share locations are listed in the worksheet to enable you to document an examination of the features contained within the applications. The final Network Share Identification assessment will be a result of responses to a series of questions used to document whether ephi is stored in the share location, ephi is not stored in the share location, or if you do not know if the share location contains ephi or not. To document the responses to the Instructions/Questions presented in this worksheet: 1. Review the Topic Question. 2. Review the Instructions. Instructions provide guidance and are not included in the reports. 3. Enter the Response in the Response field. A Response must be given for each entry to complete the worksheet. To save time you may select from a list of responses contained within the list provided in the Response field to pre-populate each user record. For each network share you can select the Response field and change the default response to the response required. Complete the worksheet for all of the share locations listed. TIME SAVINGS TIP: To learn more about how to save time completing Surveys and Worksheets, please see Appendix VII Time Saving Features to Reduce Survey and Worksheet Completion Time found on page 92. 4. Select the Notes icon to enter any Notes relevant to the topic question s response in the Notes Field 5. Select the Respondent icon to enter the name of individual that responded or provided information to respond to the topic s question or requirement in the Respondent field. 62

6. Select the Save option to save your answers periodically and Save when you are done. 7. Select the Close option to close the survey worksheet when you are done. You can return to the Network Share Identification Worksheet by clicking on the name label for the Network Share Identification Worksheet located under the InForm Bar at the bottom of the Assessment Window. After completing the Network Share Identification Worksheet, the word Completed will be displayed next so this questionnaire s label in the InForm section of the Assessment Window. 63

PHASE C DOCUMENT EXCEPTIONS Complete the Security Exception Worksheet (Optional) The Security Exception Worksheet is an optional worksheet that compiles the issues discovered by the Push Deploy Tool Scans, HIPAA Data Collector, Surveys and Assessment Worksheets used throughout the HIPAA assessment process to enable security exceptions to be specified along with compensating controls to manage the exceptions. To open and complete the Security Exception Worksheet, click on the name label for the Security Exception Worksheet entry in the InForm Questionnaire/Worksheet list located below the InForm Bar at the bottom of the Assessment window. Upon editing the Security Exception Worksheet, the following window is presented: 64

Exceptions are grouped by a number of exception types that may include: Audit Controls, Group Policy Exceptions, Former Employee/Vendor Enabled Accounts, Remote Access Cloud Services, Firewall, Office Environment, Wireless, Endpoint Protection, and External Vulnerability Scan categories. 1. Review the Topic Question. 2. Review the Instructions. Instructions provide guidance and are not included in the reports. 3. Enter the Response in the Response field. A Response must be given for each entry to complete the worksheet. TIME SAVINGS TIP: To learn more about how to save time completing Surveys and Worksheets, please see Appendix VII Time Saving Features to Reduce Survey and Worksheet Completion Time found on page 92. 4. Select the Notes icon to enter any Notes relevant to a particular Exception explanation topic s response. Please note that the Security Exception Worksheet is the only worksheet that does not require a response for each and every topic. Enter your Response if applicable, otherwise, leave the entry blank. 65

5. Select the Respondent icon to enter the person providing the information concerning the Exception explanation in the Respondent field. 6. Select the Save option to save your answers periodically and Save when you are done. 7. Select the Close option to close the survey worksheet when you are done. You can return to the Security Exception Worksheet by clicking on the name label for the Network Share Identification Worksheet located under the InForm Bar at the bottom of the Assessment Window. After completing the Security Exception Worksheet, the word Completed will be displayed next so this questionnaire s label in the InForm section of the Assessment Window. 66

GENERATING REPORTS To generate reports, open an assessment and select the Reports link at the top of the Assessment Window. The Create Reports window will be displayed. The reports that are displayed in black text (versus the gray text) can be selected and generated. To generate reports, select the HIPAA Assessment reports you want to generated and then click on the Create Reports button. The Generating Reports window will be displayed. 67

After the reports are generated, the following window is displayed presenting the HIPAA folder on the computer used for the assessment that contains the report document files: 68

To view a list of the report files, the supporting worksheets, and surveys double click on the HIPAA folder: The Supporting Documents folder contains copies of all of the completed worksheets and surveys that you completed through the HIPAA assessment process. Customizing Your Reports Reports can be customized including logos, design themes, and cover images. Enter your information, upload your logo, choose a theme, and select or upload cover images. 69

For more information about how to set the Report Preferences, please refer to the Network Detective User Guide. 70

Using the Reports There are a number of reports that are produced as a result of an assessment using the HIPAA Module. In general, these reports fall into three document categories: Risk assessment and management plans Evidence of HIPAA Compliance (including an evidence cross-reference to the specific HIPAA Regulations). Supporting documents consisting of the completed surveys and worksheets used during the assessment process Risk Assessment and Management Plans The following are the risk assessment and management plan reports. HIPAA Policy and Procedure Document The Network Detective HIPAA Security Rule Policy and Procedures guide includes suggested HIPAA policies and procedures required for compliance. Policies are rules that an organization adopts stating that they will do something. The guide includes both suggested policies and references the specific HIPAA requirements. Also provided are suggestions for procedures to implement to comply with the policies. Policies, procedures, and end-user training are effective tools to protect against data breaches. They are required for compliance but are important lines of defense against data breaches. HIPAA Risk Analysis HIPAA is a risk-based security framework and the Risk Analysis is the first requirement of the HIPAA Security Rule. A Risk Analysis is the foundation for the entire security program. It identifies the locations of electronic Protected Health Information (ephi,) vulnerabilities to the security of the data, threats that might act on the vulnerabilities, and estimates both the likelihood and the impact of a threat acting on a vulnerability. 71

The Risk Analysis helps HIPAA Covered Entities and Business Associates identify the locations of their protected data, how the data moves within, and in and out of, the organization. It identifies what protections are in place and where there is a need for more. The Risk Analysis results in a list of items that must be remediated to ensure the security and confidentiality of ephi. The value of a Risk Analysis cannot be overstated. Every major data breach enforcement of HIPAA, some with penalties over $ 1 million, has cited the absence of, or an ineffective, Risk Analysis as the underlying cause of the data breach. The Risk Analysis should be reviewed or updated at least annually, more often if anything significant changes that could affect ephi. HIPAA Risk Profile A Risk Analysis is a snapshot in time, while compliance is an ongoing effort. The Network Detective HIPAA Risk Profile updates a Risk Analysis to show progress in avoiding and mitigating risks. Whether performed monthly or quarterly, the Risk Profile updates the Risk Analysis and documents progress in addressing previously identified risks, and finds new ones that may have otherwise been missed and resulted in a data breach. HIPAA Management Plan Based on the findings in the Risk Analysis, the organization must create a Risk Management plan with tasks required to minimize, avoid, or respond to risks. Beyond gathering information, Network Detective provides a risk-scoring matrix that an organization can use to prioritize risks and appropriately allocate money and resources. The Risk Management plan defines the strategies and tactics the organization will use to address its risks. Evidence of HIPAA Compliance Just performing HIPAA-compliant tasks is not enough. Audits and investigations require evidence that compliant tasks have been followed, and kept for six years after an event or incident occurs. Documentation can be in different forms and stored in various systems. The keys to proper documentation are to be able to access it, and that it contains enough details to satisfy an auditor or investigator. HIPAA On-site Survey The On-site Survey contains questions that cannot be answered by collecting data from the network. Information is gathered about the organization s Security Officer, and about security of the wireless network. 72

The On-site Survey worksheet includes an extensive list of questions about physical and technical security that cannot be gathered automatically. The survey includes questions ranging from how facility doors are locked, firewall information, how faxes are managed, and whether servers are on-site, in a data center, or in the Cloud. Disk Encryption Report Encryption is such an effective tool used to protect data that if an encrypted device is lost then it does not have to be reported as a data breach. The Disk Encryption Report identifies each drive and volume across the network, whether it is fixed or removable, and if Encryption is active. 73

Documented Surveys and Worksheets User Identification Worksheet The User Identification Worksheet takes the list of users gathered by the Push Deploy Tool and/or Data Collector and lets you identify whether they are an employee or vendor. Users who should have been terminated and should have had their access terminated can also be identified. This is an effective tool to determine if unauthorized users have access to protected information. It also is a good indicator of the efforts the organization goes to so terminated employees and vendors have their access quickly disabled. Another benefit is that you can review the user list to identify generic logons, such as Nurse, Billing Office, etc., which are not allowed by HIPAA since each user is required to be uniquely identified. To save time the system allows you to enter default settings for all users and just change some as needed. Computer Identification Worksheet The Computer Identification Worksheet takes the list of computers gathered by the Data Collector and lets you identify those that store or access ephi. This is an effective tool in developing data management strategies including secure storage and encryption. To save time the system allows you to enter default settings for all computers and just change some as needed. Network Share Identification Worksheet The Network Share Identification Worksheet takes the list of network shares gathered by the Data Collector and lets you identify those that store or access ephi. This is an effective tool in developing data management strategies including secure storage and encryption. To save time the system allows you to enter default settings for all network shares and just change some as needed. 74

Security Exception Worksheet The report is used present the details associated with security exceptions and how Security Exceptions will be managed or have been implemented to enable HIPAA compliance. This worksheet allows the HIPAA Compliance readiness specialist to document explanations on suspect items. The readiness specialist is enabled to document and explain why various discovered items are not true issues and possible false positives. These exceptions can be documented on an item-by-item level (For example: at the granularity at users, ports, applications, etc.) The Security Exception Worksheet compiles the issues discovered by the HIPAA Compliance Data Collection including the completion of the surveys and worksheets. The benefit of this feature is that it adds back in the human element into the assessment and allows for explanation of special circumstances and specific environment requirements. The Security Exception Worksheet does not alleviate the need for safe guards but allows for description of alternative means of mitigating the identified security risk. The process is consistent with industry standard HIPAA assessment and risk management processes Login History by Computer Report The Login History by Computer Report shows login audit history. The report is used crossreferenced with the ephi worksheets to look for unauthorized logins. Share Permission Report The Share Permission Report shows all network shares and both the associated network share permissions and file system permissions. External Vulnerability Scan Detail Report The External Vulnerability Scan Detail Report shows the result of a vulnerability scan performed against the external (Internet facing) IP addresses. 75

Appendix I Group Policy Reference Forward and Introduction Some networks are more restrictive than others are, and in some cases, the Network Detective Data Collector may query a device and have the request blocked or return less information than is required. To obtain more information, Group Policies can be modified, or a Local Data Collection to fill-in-the-blanks can be performed. This document is a reference for modifying Group Policies, and will indicate which Group Policies are needed to ensure a full data collection. This document is for reference only; RapidFire Tools is in no way responsible for, or able to assist with, any modifications to Group Policies made via this document. If you choose to make changes, perform a backup first, only make changes once you have assessed the overall impact, and of course, exercise caution. Policies for Windows Firewall Computer Configuration > Administrative Templates > Network > Network Connections > Windows Firewall > Domain Profile Windows Firewall: Allow ICMP exceptions Enabled Allow inbound echo request Windows Firewall: Allow file and printer sharing exception Enabled Allow unsolicited incoming messages from local subnet Windows Firewall: Allow remote administration exception Enabled Allow unsolicited incoming messages from local subnet Windows Firewall: Allow local port exceptions Enabled Windows Firewall: Define inbound port exceptions TCP: 135, 139, 445 UDP: 137, 138 Windows Firewall: Allow Remote Desktop exception Enabled Allow unsolicited incoming messages from local subnet Policies for Windows Services Computer Configuration > Windows Settings > Security Settings > System Services Windows Management Instrumentation (WMI) Startup Type: Automatic Remote Registry 76

Startup Type: Automatic Remote Procedure Call (RPC) Startup Type: Automatic 3 rd party Firewalls and Group Policy Considerations 3rd party firewalls should be disabled or configured similar to Windows Firewall Machines automatically refresh policies every 60-120 minutes, but rebooting a machine or manually performing a gpupdate /force will update policies quicker 77

Appendix II Site Assessment Reports and Supporting Documents Locations The reports document files produced by the HIPAA Module are stored in a folder located on the hard disk of the computer operating the HIPAA Module. For example, the figure below illustrates the location of the Assessment Report folder a HIPAA assessment for a site named Customer A. In the folder path referenced in the Windows Explorer folder window displayed below, the reference to Customer A is a reference to the HIPAA assessment s Site Name associated with the actual assessment. To access the reports, you would double click on the assessment reports folder w. In this example the assessment reports folder is named: Assessment 20150716-Reports. Windows Explorer will then display folder named HIPPA as shown below. 78

The HIPAA folder is the location where the HIPAA assessment s report documents, HIPAA Evidence of Compliance, and supporting survey and worksheet documents are stored. Upon doubling clicking the HIPAA folder in Windows Explorer, the reports and supporting documents for the assessment are available for viewing and editing. Opening the Supporting Documents folder will enable access to all of the supporting documents as seen below. 79

80

Appendix III HIPAA Risk Profile Use for Ongoing HIPAA compliance assessments A HIPAA Risk Analysis should be done no less than once a year. However, the Network Detective includes an abbreviated version of the HIPAA Risk Analysis assessment and reporting process within the Network Detective HIPAA Module. This process is called the HIPAA Risk Profile. The HIPAA Risk Profile designed to provide interim reporting in a streamlined and almost completely automated manner. Whether performed monthly or quarterly, the Risk Profile updates the Risk Analysis and documents progress in addressing previously identified risks, and finds new ones that may have otherwise been missed and resulted in a data breach. An important aspect of this abbreviated process is the need that the HIPAA Module has been already used to perform a HIPAA Risk Assessment of your customer s Network on a previous occasion. 81

Appendix IV Adding an Inspector to a Site Please follow the steps below to Associate Inspector with your assessment s Site: Before using the Inspector Software Appliance, the Inspector must be associated with a Site in the Network Detective Application. Adding an Inspector to a Site After starting a new assessment, or within an existing assessment, in order to Associate an Inspector Software Appliance with the Assessment Project, you must first select the V symbol to expand the assessment properties view. This action will expand the Assessment s properties for you to view and to add a Software Appliance to the Assessment. To add an Appliance to an Assessment, from the Assessment Window select the Appliance button, then the Appliances Add button as noted above. 82

Select the Appliance ID of the Appliance from the drop down menu. Note: When users have purchased a Network Detective Hardware Appliance, the Appliance ID can be found on a printed label on the Hardware Appliance itself. After successfully adding an Appliance, it will appear under the Appliance bar in the Assessment Window. To view a list of all Appliances and their associated Sites, navigate to the Appliance tab from the top bar of the Network Detective Home screen. This will show a summary of all Appliances, their activity status, and other useful information. To return to the Site that you are using to perform your assessment, click on Home above and select the Site that you are using to perform your assessment. 83

Appendix V Key Terminology ephi Electronic Patient Health Information. 84

Appendix VI Run the HIPAA Local Computer Data Collector on Unreachable Computers A full HIPAA assessment requires running the Local Computer Data Collector on all computers in the network. When computers are unreachable during the Push Local Scan process undertaken using Push Deploy Tool, the HIPAA Data Collector should be used to perform the scan on each of these computers. NOTE: THIS LOCAL COMPUTER SCANNING PROCESS USING THE HIPAA DATA COLLECTOR RUNNING ON THE LOCAL MACHINE IS ONLY USED WHEN THE PUSH DEPLOY TOOL IS USED WITH THE HIPAA MODULE AND ON UNREACHABLE COMPUTERS Step 1- Launch the HIPAA Data Collector To perform a HIPAA Network scan, visit the RapidFire Tools software download website and download and run the HIPAA Data Collector. The HIPAA Data Collector s self-extracting.zip file that does not install on the client computer. Use the unzip option to unzip the files into a temporary location and start the collector. Then the Data Collector is started, the Scan Type window will be displayed. The Computer Scan will augment data collection when remote protocols are not available from a computer. 85

As referenced previously, a full HIPAA assessment requires running the Local Computer Data Collector on all computers that were to be included in the assessment that were missed when the Local Push Scan was performed using Push Deploy Tool. Step 2 Select the Local Computer Scan Select HIPAA Local Computer Data Collector option. Click on the Next button. The Verify and Run window will then be displayed. Step 3 Verify and Run the Scan The Verify and Run window enables you to change the output location for the scan data, change the name of the file, and add comments. After setting the Output Assessment File s folder location, the Basename of the scan s output file, and adding a Comment, select Start to initiate the scan. Step 4 Monitor Collection Progress The Collection Progress window will be displayed during the scan process. 86

Track the scan s progress through the Collection Progress window. At any time, you may Cancel Data Collection without saving any data. You may select Wrap It Up to stop a scan and use the incomplete data that was collected. Upon the completion of the scan, the Finish window will be displayed. Note the scan output file s location and click on the Done button to complete the process. 87

Step 5 Importing the HIPAA Computer Scan Data from Local Computer Scan The final step in this process is to import the data collected during the HIPAA Local Computer Scan. Click on the Import Scan File button in the Network Detective Assessment window: The following Select Scan Results window will be displayed. Select the Browse button to select the scan file to import. The following Open Network Data Assessment File window will be displayed. 88

The Import File process enables you to import the HIPAA scan file (.HDF file) produced by the HIPAA Computer Data Scan into the Risk Assessment being performed. Select the file name of the scan file to be imported into the assessment. During the import of the scan file, there will be a need to merge the HIPAA Local Computer Scan data with the HIPAA Network Scan data that was previously produced and imported into the HIPAA assessment. Select the Open button in the Open Network Assessment Data File window. This action will display the following Select the Scan Results window indicating that the file has been selected for import. 89

Select the Next button in the Select the Scan Results window. This action will display the following Network Detective Merger window: 90

To perform the import/merge, select the Merge Now button to initiate the import and data merge process. The Scan Archive Created window below will then be displayed indicating that the Merge (import) process is complete. Next, select the Finish button in the Scan Archive Created window. The next step is to proceed with completing the Inactive Computer Identification Worksheet as instructed in Phase B - Step 2: Complete the Inactive Computer Identification Worksheet found on page 52. 91

Appendix VII Time Saving Features to Reduce Survey and Worksheet Completion Time Completing Worksheet and Surveys Throughout the assessment process, HIPAA assessment data is gathered though the use of automated scans and by documenting information in a series of surveys and worksheets. These surveys and worksheets are dynamically generated when the assessment is initially started and when data is collected throughout the assessment process. Assessment response data is collected through: use of automated scans importing responses from Word documents typing the information directly into surveys and worksheets forms Entering Assessment Responses into Surveys and Worksheets Throughout the assessment process a number of Surveys and Worksheets will be generated and require completion. In a survey or worksheet form, there are three fields that can be filled with information. These fields are the Response field, the Notes field, and the Responded By field. Survey and Worksheet Question Response Types Throughout the HIPAA Risk Assessment process the Network Detective s InForm-based Surveys and Worksheets used throughout the HIPAA Module must be completed and typically support three types of responses: Response Type Description Example Use Text Response Free-form text response Describe the condition of the data center. Multiple Choice Multiple fixed responses Does the firewall have IPS? - Yes - No Checklist Item An item that is marked off if done Check the security of the door locks 92

Entering Responses Use the response column to enter your answers for the various topics. Notes are used to augment or supplement the information in the responses. Files and SWOT are used to attach pictures and other files, as well as specify strength, weakness, opportunities, and threat entries. Time Savings Tip to Reduce Survey and Worksheet Data Input Time Saving Time Inputting Reponses in Worksheets Through the Use of the Bulk Entry Feature You can save time inputting multiple Responses to answer questions presented in a worksheet using the Bulk Response feature. For example, in the Inactive Computer ID Worksheet, the same response needs to be applied to a number of Topics and Questions. Follow these steps to use the Bulk Response feature: After opening the worksheet, select the Bulk Entry Option.Then follow the steps below to setup the Bulk Entry within the Worksheet you are updating: A. Select the worksheet s Category page that should be updated using the Bulk Entry feature. B. Select all of the suspected Inactive Computers that you want to assign a common Response. C. Select the list of available responses that you want to use for your Response entry. D. Select the specific Response from the list that you want to enter for the selected Inactive Computers.. E. Enter in a Note that you would like to include with your Response to be assigned to the selected Inactive Computers. F. Enter the name of the name of the Respondent that provided the selected Response information. 93

G. Select the Apply to Selected button to assign your selected Response to the selected Inactive Computers. The Response, Note, and Respondent you defined will be applied to the selected Inactive Computers listed in the Worksheet. H. View the assigned responses to verify the bulk entries are correct. After you have verified that all of the responses you assigned are correct, select the Save button to save the updated worksheet. Then select the Close button to close the Worksheet. 94

Worksheet Completion Time Saving Techniques when Using the Classic User Interface Saving Time Inputting Reponses in Worksheets Through the Use of Shift+Select You can save time inputting multiple Responses to answers instruction questions using the Inform Shift+Select multi-response field select feature. For example, in the User ID Worksheet below, the same response needs to be applied to a number of Instruction questions. First, select the Response field at the top-most question you want to answer. Next, select press the Shift Key down. 95

Then select the bottom-most field in the column range that you wish to respond. Then select the Response from the list. Release the Shift Key. At this point in the process, all of the Response fields selected will be filled with the response you selected as illustrated below in the following window. 96

Upon completion of the worksheet, select Save to store the responses. 97

Saving Time Inputting Reponses in Worksheets Through the Use of Select All Rows option. You can save time inputting multiple Responses to answers instruction questions using the Inform Select All Rows multi-response field select feature. For example, in the Computer Identification Worksheet, the same response needs to be applied to a number of Instruction questions. 1. First, select the Response field at the top-most question you want to answer. 2. Next, right-click on the Response field to display the Select All Rows menu option. 3. Then select the Select All Rows option. All rows in the worksheet will now be selected. 4. Next, select the Response field on the top row and select the Response of your choice. At this point in the process, all of the Response fields selected within the worksheet will be filled with the response you selected as illustrated below. 5. Next, click a field in the Topic column to Deselect all rows. 6. Upon completion of the worksheet, Select Save to store the responses. 98

Appendix VIII Initiate Internal Vulnerability Scan on the Inspector Appliance and Download Results (OPTIONAL) The addition of the internal vulnerability assessment to your HIPAA compliance assessment will enhance the risk assessment and reporting practices being performed upon the network. Initiating the Internal Vulnerability Scan on the Inspector Appliance The Internal Vulnerability Scan will enhance the risk assessment and risk reports by performing an internal scan looking for common vulnerabilities. The scan can be initiated from the Network Detective Application. Please note that the scan make take several hours to complete. Click on the Initiate Appliance Scan button to initiate the scheduling of an Internal Vulnerability scan. The Create Task window will be displayed in order to configure the Internal Vulnerability Scan configuration parameters. 99

Select the IT Assessments tab, next select the Internal Vulnerability Scan option, and then select Next. The Ports to Scan window will be displayed. The Ports to Scan setup option allows you to select one of two available scanning options. One option, referenced as the Standard Scan, is used to scan Standard TCP ports and Top 1000 UDP ports. The second option, referenced as the Comprehensive Scan, is used to execute a comprehensive scan of all TCP ports and Top 1000 UDP ports. To proceed, select the appropriate number of ports to scan for your assessment s purposes. Then select the Next button. The IP Ranges screen will be displayed. At this point the Network Detective HIPAA Module will connect with the Inspector appliance and Auto-Detect an IP address range that can be scanned. Alternatively, you can manually set the IP address range that you would like to scan during the scheduled internal vulnerability scan. IMPORTANT: THE AUTO-DETECT FEATURE WILL IDENTIFY THE IP RANGE OF THE INTERNAL SUBNET THAT IS FROM THE INSPECTOR. THIS COULD RESULT IN A SUBSTANTIALLY LARGER NUMBER OF IP ADDRESSES THAT WILL BE SCANNED VERSES THE ACTUAL NUMBER OF WORKSTATIONS, SERVERS, AND OTHER IP-BASED NETWORK COMPONENTS WHICH COULD BE A FAR SMALLER NUMBER. 100

IF THIS INTERNAL VULNERABILTIY SCAN IS CONFIGUED TO INTERROGATE A LARGE NUMBER OF IP ADDRESSES THAT ARE NOT USED BY ANY DEVICE, THE VULNERABILITY SCAN MAY RESULT IN TAKING AN EXPONENTIALLY LONGER TIME THAN NECESSARY. Define the IP Range that you would like to scan and select Next button. The Create Task - Verify and Schedule window will be displayed. To have an Email Notification sent to you when the scan task completes, select the Send email notification when schedule completes option, and type in the email address where the notification should be sent. 101

Click on the Finish button to complete the scheduling of the internal vulnerability scan task, which will display the Appliance Tasks and Queue window. The scheduled internal vulnerability scan can be confirmed in the Appliance Tasks and Queue window is that displayed in the Task Library list referenced below. Upon viewing the scan task, you can select the run now option link under the Queue column to initiate the scan, which will place the scan into the Queued Tasks list. Alternatively, you can click on schedule link to execute the scan sometime in the future by selecting the interval (daily, weekly, monthly, annually, or just once) option and the time that the scan should be scheduled to run. 102

When you click the schedule link, The CRON Builder scheduler window is displayed and is used to set the schedule action s execution time. Note the Pending task present in the Queued Task list after the Run Now option has been selected for the Vulnerability Scan in the window below. Time Savings Tip: Once you have placed the internal vulnerability scan task into the Queued Tasks list, you can continue on to use Inspector to perform other scan tasks. 103

Checking Internal Vulnerability Scan Execution Status and Downloading Scans Viewing the Status of an Inspector Scan To check on the status of the scheduled internal vulnerability scan you must first select the selector symbol to expand the assessment Site s properties view. This action will expand the assessment Site s properties to enable you to view the status associated with any scan tasks, or to add an Appliance to the Site. If an Inspector has been Associated with the Site, you may view any Running Tasks as presented in the window below. Viewing Scheduled or Queued Inspector Tasks To view any scheduled or Queued Tasks that have been configured in the Inspector, you must use the Manage option to view these Tasks. To access the Queued Tasks list within the Inspector for viewing, you must first select the selector symbol to expand the assessment properties view. This action will expand the Assessment s properties for you to view an Appliance that is Associated with a Site being used to perform to the Assessment. 104

You can view the queued Inspector tasks by selecting the Manage appliance option to access Manage Appliance Window containing the Queued Tasks list in order to check the status of a scheduled scan. The status of the scan may be set to Pending or Running along with a percentage of the task s performance completion as illustrated in the window below. To view the Settings for the Scan Task itself, double click on the name of the Scan listed in the Task Type column. 105

When the internal vulnerability scan task is completed, the task will be removed from the Queued Tasks list. Downloading Inspector Scans Go to the Active Assessment of the Site associated with the Appliance. From the Assessment Window, select Download Scans from the Scans bar. Selecting Download Scans will present the Download Files window. This window presents a list of files that can be downloaded and imported into the HIPAA assessment. To complete the scan results file s downloading and importing process, select the check box next to the scan file you wish to download then select the Download Selected button. 106

The file will then be downloaded and imported into the assessment. The success of this process will be confirmed by an updating of the Scans section of the Assessment Window. After being successfully downloaded, the Scan will immediately be displayed under the Scans Bar and available for data exploration or report generation. 107