Research Use of Restricted Data: The HRS Experience. The Health and Retirement Study The University of Michigan

Similar documents
NW NATURAL CYBER SECURITY 2016.JUNE.16

NORTH AMERICAN SECURITIES ADMINISTRATORS ASSOCIATION Cybersecurity Checklist for Investment Advisers

Virtual Server Service

University of Pittsburgh Security Assessment Questionnaire (v1.7)

Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud

Support for the HIPAA Security Rule

Altius IT Policy Collection

Introduction to SURE

EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led

Information Security BYOD Procedure

IAM Security & Privacy Policies Scott Bradner

Red Flags/Identity Theft Prevention Policy: Purpose

HIPAA Security. 3 Security Standards: Physical Safeguards. Security Topics

EXHIBIT A. - HIPAA Security Assessment Template -

Employee Security Awareness Training Program

Post-Secondary Institution Data-Security Overview and Requirements

Altius IT Policy Collection Compliance and Standards Matrix

Education Network Security

California State Polytechnic University, Pomona. Server and Network Security Standard and Guidelines

Wireless Communication Stipend Effective Date: 9/1/2008

DETAILED POLICY STATEMENT

Altius IT Policy Collection Compliance and Standards Matrix

HEALTH AND RETIREMENT STUDY. Cross-Wave Geographic Information (State) Restricted Data Data Description and Usage

HIPAA Security and Privacy Policies & Procedures

7. How do I obtain a Temporary ID? You will need to visit HL Bank or mail us the econnect form to apply for a Temporary ID.

90% 191 Security Best Practices. Blades. 52 Regulatory Requirements. Compliance Report PCI DSS 2.0. related to this regulation

PROService REMOTE SERVICE APPLICATION. Frequently asked questions

PTS Customer Protection Agreement

Cyber Insurance PROPOSAL FORM. ITOO is an Authorised Financial Services Provider. FSP No

Cyber security tips and self-assessment for business

TRAINING REQUIREMENTS FOR THE CARE AND USE OF HAMSTERS IN RESEARCH

HIPAA Federal Security Rule H I P A A

Integrated Cloud Environment Security White Paper

ORA HIPAA Security. All Affiliate Research Policy Subject: HIPAA Security File Under: For Researchers

LCU Privacy Breach Response Plan

Information Use Policy NATIONAL RURAL ELECTRIC COOPERATIVE ASSOCIATION

Information Security Data Classification Procedure

Network Security Policy

Certification Guidelines: Credential Standards and Requirements Table

Apex Information Security Policy

Texas Health Resources

HIPAA Compliance Checklist

Certification Guidelines: Credential Standards and Requirements Table

Guidelines for Data Protection Document Information

Virginia Commonwealth University School of Medicine Information Security Standard

PetaLibrary Storage Service MOU

SECURITY & PRIVACY DOCUMENTATION

ISSP Network Security Plan

Required Textbook and Materials. Course Objectives. Course Outline

2015 HFMA What Healthcare Can Learn from the Banking Industry

Information Security Policy

CASA External Peer Review Program Guidelines. Table of Contents

Gramm Leach Bliley Act 15 U.S.C GLBA/HIPAA Information Security Program Committee GLBA, Safeguards Rule Training, Rev.

Stanislaus County HMIS Security & Data Quality Audit

QuickBooks Online Security White Paper July 2017

Complete document security

Annual Report on the Status of the Information Security Program

Bring Your Own Device. Peter Silva Technical Marketing Manager

Request for Qualifications for Audit Services March 25, 2015

University of Sunderland Business Assurance PCI Security Policy

Electronic Distribution of ERISA Disclosures

Red Flags Program. Purpose

Decrypting the Security Risk Assessment (SRA) Requirement for Meaningful Use

FORM 0928A Section O Hospitals

HikCentral V1.3 for Windows Hardening Guide

Department of Computer Science & Engineering. Welcome New Graduate Students

MIS5206-Section Protecting Information Assets-Exam 1

2018 IT Priorities: Cybersecurity, Cloud Outsourcing & Risk Management. Follow Along

Information Technology Standards

HikCentral V.1.1.x for Windows Hardening Guide

SECURITY PRACTICES OVERVIEW

DRAFT 2012 UC Davis Cyber-Safety Survey

Information Technology Security Plan Policies, Controls, and Procedures Identify Governance ID.GV

Information Classification & Protection Policy

Subject: University Information Technology Resource Security Policy: OUTDATED

CAMP USER S GUIDE IFMA CREDENTIALS CREDENTIALS APPLICATION AND MAINTENANCE PROGRAM

INFORMATION ASSET MANAGEMENT POLICY

Access to University Data Policy

K12 Cybersecurity Roadmap

Instructor: Eric Rettke Phone: (every few days)

EXAMPLE 3-JOINT PRIVACY AND SECURITY CHECKLIST

Table of Contents. Page 1 of 6 (Last updated 27 April 2017)

Healthcare Privacy and Security:

General Social Survey (GSS) NORC

Ready Theatre Systems RTS POS

How do you track devices that have been approved for use? Are you automatically alerted if an unapproved device connects to the network?

Solution Pack. Managed Services Virtual Private Cloud Security Features Selections and Prerequisites

Integrating Information Security Protections In Supplier Agreements: Guidance for Business and Technology Counsel

Annex 3 to NIST Special Publication Recommended Security Controls for Federal Information Systems

Frequently Asked Questions About Getting On NCAtrak

Vendor Security Questionnaire

Policy and Procedure: SDM Guidance for HIPAA Business Associates

2272 : Implementing and Supporting Microsoft Windows XP Professional

Recommendations for Implementing an Information Security Framework for Life Science Organizations

Networking Fundamentals Training

DIRECTIVE ON INFORMATION TECHNOLOGY SECURITY FOR BANK PERSONNEL. June 14, 2018

Checklist: Credit Union Information Security and Privacy Policies

MENTAL RETARDATION BULLETIN

itexamdump 최고이자최신인 IT 인증시험덤프 일년무료업데이트서비스제공

Data Security and Privacy Principles IBM Cloud Services

Transcription:

Research Use of Restricted Data: The HRS Experience Michael A. Nolte Senior Research Associate Janet J. Keller Research Associate The Health and Retirement Study The University of Michigan

Introduction The Health and Retirement Study (HRS) contacts a sample of more than 22,000 Americans over the age of 50 every two years (1992-2003, 2004 survey in field) Supported by the National Institute on Aging (U01 AGO 9740) Covers: physical and mental health, insurance coverage, financial status, family support systems, labor market status, and retirement planning. Level of detail increases confidentiality risks.

HRS Data Products Public Data: available without cost to researchers and analysts (user registration required) Restricted Data: available only under specific conditions Affiliation with an institution with an NIH-certified Human Subjects Review Process Current Receipt of United States Federal Research Funds

HRS Restricted Data Products SSA Administrative Data (Earnings, Benefits, WSEI, SSI) Detailed Geographic Identifiers: State, County, ZipCode, Tract/BNA) Respondent Geographic Markers (Birthplace, Residence, Mobility) Detailed Industry and Occupation codes Pension Information Medicare Claims and Summary Information (from CMS) Cause of Death (from National Death Index)

Why Restrict Access to Data: A Compromise Solution Allow researchers to access confidential data Preserve respondent privacy and prevent re-identification

Restricted Data Access Methods Restricted Data Agreement (http://hrsonline.isr.umich.edu/rda/index.html) MiCDA Data Enclave (http://micda.psc.isr.umich.edu/enclave/) Virtual Enclave (under development)

HRS Restricted Data Application Process

RDA Pros and Cons Users obtain access to HRS restricted data products, but User burden Eligibility requirements Data protection plan Yearly inspection, annual report and bi-annual renewal Pre-publication review (under certain circumstances) HRS burden Administrative overhead Data protection plans: users expect support from HRS.

The Need to Protect Restricted Data Users may not be aware of security issues HRS staff must keep up with Internet developments Complexity grows in direct proportion to Internet security threats Options (see Checklist for details) Standalone workstation or private network (good) Internet-connected workstation/network (bad)

Internet connections are a problem Standalone workstation requires Physical protection (locked office) System OS configured using NIST guidelines File encryption Internet workstation requires Physical protection for workstation (also server, network components) Firewall supplemented by intrusion detection system Anti-virus and anti-spyware software installed and updated System OS configured using NIST guidelines (+ update procedures) File encryption

Alternative: The HRS/MiCDA Data Enclave Solution for users who cannot implement their own data protection plan Restricted data users conduct all analysis with the confines of a secure facility maintained and staffed by HRS. Private network: server, workstations, printers not connected to outside world Workstation access to restricted data limited to authenticated users Physical access to facility is controlled

The Enclave Solution: Advantages Allows access for researchers who do not qualify for a Restricted Data Agreement (graduate students, junior faculty, commercial users) Provides a venue for special projects. (cross-category merges of files from various sources) Disclosure review procedures limit risk of potential confidentiality breaches Serves users with special needs

The Enclave Solution: Disadvantages Inconvenient for non-local users Expensive to implement and operate Staffing issues for HRS Users are subject to restrictions on research activities (pre-export disclosure review)

Option 3? We want to Minimize the security burden for researchers Give HRS better control over security model definition and implementation Help non-local users who do not qualify for RDA Let s see what it would take to set up a Virtual Enclave

The Virtual Enclave Concept: Overview All analysis takes place on server Server is hardened, located behind firewall, monitored by Intrusion Detection System Thin client connection to the server VPN tunnel using SSH-2 (authentication via digital certificate) Remote Desktop Protocol connection (high encryption) to server running Windows Terminal Services Procedures for supervision of remote workstation specified in MOU negotiated between HRS and remote site

Virtual Enclave: Technical Background Private Network RDP Link Management Console (Intrusion Detection) Secure Server Firewall (port 22 open) Public Network RDP thru VPN Remote Workstation Ξ Ξ Ξ Custom Linux client with built-in SSH and RDP support Virtual Private Network (VPN) connection from client to server using SSH (authentication via Digital Certificate) Desktop Protocol (RDP) connection from client through VPN to server

Server Issues Server configured for high security environment (non-routable network behind firewall, etc.) Programs and data files accessible by user are limited User programs requiring inbound or outbound Internet connections are removed or modified Access to client resources (disk storage, printers, serial ports) removed No user access to server network resources (e.g., printers)

Example ssh2.exe -c 3des-cbc -L 5000:localhost:3389 user1@xxx.xxx.xxx.xxx user1's password: Authentication successful. Last login: Sun Jul 4 15:27:33 2004 from 198.108.24.2 Microsoft Windows XP [Version 5.1.2600] (C) Copyright 1985-2001 Microsoft Corp. C:\Documents and Settings\user1>

Example user1 now has full access to server resources

Virtual Enclave: Advantages Researchers obtain access to all HRS restricted data products. Researchers avoid travel and lodging costs Researchers and/or their sponsors are responsible only for the remote site Once the server side environment is implemented, multiple sites and VPN links can be added at little cost to HRS. User fees help defray costs charged to HRS

Virtual Enclave: Potential Problems Remote site requires a sponsoring organization (monitoring staff, equipment, workspace) Server side maintenance costs: (software, server, communications equipment, staff, security, VPN link management) Users need funding to pay HRS cost recovery fees Staff costs at HRS end: Confidentiality review of user analysis results, custom linux client maintenance, server maintenance, long-distance interaction between HRS staff and remote users and more!

Conclusion RDA most convenient, but strings are attached Enclave works for local users; does not meet external user needs Virtual enclave still under development; implementation uncertain Restricted data = non-trivial overhead costs

If you want to learn more HRS restricted data Web site: http://hrsonline.isr.umich.edu/rda Developing a data protection plan: http://hrsonline.isr.umich.edu/rda/rdapkg_prot.htm The Restricted Data Environment: Issues Relating to Network- Connected Clients: http://hrsonline.isr.umich.edu/rda/rstdataenv.htm Michigan Center on the Demography of Aging Data Enclave (MiCDA) Web site: http://micda.psc.isr.umich.edu/enclave/ MiCDA Disclosure Review: http://micda.psc.isr.umich.edu/enclave/disclosurereview.pdf Maintaining restricted data confidentiality http://hrsonline.isr.umich.edu/rda/rdapkg_disclim.htm

References Bott, E. and Siechert, C. Microsoft Windows Security Inside Out for Windows XP and Windows 2000, Microsoft Press, ISBN 0-7356- 1623-9 Lockhart, A. Network Security Hacks, O Reilly, ISBN 0-596-00643-8 McNab, C. Network Security Assessment, O Reilly, ISBN 0-596- 00611-X Northcutt, S., Zeltser, L., Winters, S., Fredrick, K. Ritchey, R. Inside Network Perimeter Security, New Riders, ISBN 0-7357- 1232-8 Souppaya, M., Johnson, P.M., Kent, K. Harris, A. Guidance for Securing Microsoft Windows XP Systems for IT Professionals: A NIST Security Configuration Checklist, Special Publication 800-68 (Draft), June 2004