01.02.2015 Views

HIPAA and HITECH Compliance for SharePoint - Cipherpoint Software

HIPAA and HITECH Compliance for SharePoint - Cipherpoint Software

HIPAA and HITECH Compliance for SharePoint - Cipherpoint Software

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>HIPAA</strong> <strong>and</strong> <strong>HITECH</strong><br />

<strong>Compliance</strong> <strong>for</strong><br />

<strong>SharePoint</strong>


Problem Overview<br />

The United States Congress passed the Health Insurance Portability <strong>and</strong><br />

Accountability Act (<strong>HIPAA</strong>) into law in 1996. Most people in the security industry<br />

remember the inclusion of the <strong>HIPAA</strong> Privacy rule in 2000, <strong>and</strong> the Security Rule<br />

a few years later. <strong>HIPAA</strong> did result in consumers having more authority over their<br />

in<strong>for</strong>mation <strong>and</strong> improved security conditions as they were. Over the years,<br />

however, <strong>HIPAA</strong> has lacked any real en<strong>for</strong>cement, <strong>and</strong> has been considered by<br />

many to be “toothless” when it comes to incenting healthcare providers <strong>and</strong><br />

other covered entities to implement the programs required to maintain privacy of<br />

patient data.<br />

Several recent developments have changed this, <strong>and</strong> given <strong>HIPAA</strong> its “teeth.”<br />

These changes include the Health In<strong>for</strong>mation Technology <strong>for</strong> Economic <strong>and</strong><br />

Clinical Health (<strong>HITECH</strong>) Act of 2009, <strong>and</strong> a more rigorous en<strong>for</strong>cement posture<br />

from the Department of Health <strong>and</strong> Human Services (DHHS) <strong>and</strong> Centers <strong>for</strong><br />

Medicaid <strong>and</strong> Medicare Services (CMS). <strong>HITECH</strong> in particular brought a breach<br />

notification requirement which requires healthcare organizations to in<strong>for</strong>m the<br />

public when protected healthcare in<strong>for</strong>mation is lost or stolen. It also exp<strong>and</strong>ed<br />

the definition of organizations that must comply with the provisions of <strong>HIPAA</strong> to<br />

include business associates such as service providers. The more aggressive<br />

en<strong>for</strong>cement posture of DHHS <strong>and</strong> CMS have resulted in many public breach<br />

notifications <strong>and</strong> in several recent fines levied on large organizations.<br />

The healthcare industry has taken notice of these more stringent requirements,<br />

stiffer penalties, <strong>and</strong> the public breach disclosure. Security projects to address<br />

<strong>HIPAA</strong> requirements are getting more attention <strong>and</strong> funding in many healthcare<br />

organizations, <strong>and</strong> the use of data encryption to comply with the regulations <strong>and</strong><br />

provide safe harbor in the event of a breach is a top initiative.<br />

Overview of <strong>HIPAA</strong> <strong>and</strong> <strong>HITECH</strong><br />

The <strong>HIPAA</strong> <strong>and</strong> <strong>HITECH</strong> Acts together include specific guidance on privacy,<br />

in<strong>for</strong>mation security, <strong>and</strong> breach notification. A summary of the <strong>HIPAA</strong> <strong>and</strong><br />

<strong>HITECH</strong> provisions that relate to the privacy <strong>and</strong> security of Protected Health<br />

In<strong>for</strong>mation (PHI), <strong>and</strong> electronic PHI (ePHI) is as follows:<br />

• Privacy Rule: The Privacy Rule in <strong>HIPAA</strong> specifies requirements <strong>for</strong> the<br />

appropriate use, disclosure of, <strong>and</strong> access to Protected Health<br />

In<strong>for</strong>mation (PHI) <strong>and</strong> electronic protected healthcare in<strong>for</strong>mation.<br />

• Security Rule: The Security Rule specifies the administrative, physical,<br />

<strong>and</strong> technical controls required to protect ePHI. Note, it does not require<br />

the use of encryption but recommends it where appropriate.<br />

CipherPoint <strong>Software</strong> | www.cipherpoint.com | 888.657.5355 | 4600 S. Syracuse, 9 th Floor, Denver, CO 80237<br />

2


• Administrative Safeguards – these include requirements to per<strong>for</strong>m<br />

risk assessments, to manage risk, requirements to develop <strong>and</strong><br />

review in<strong>for</strong>mation system activity reports, to manage in<strong>for</strong>mation<br />

access, to implement security incident response <strong>and</strong> reporting, <strong>and</strong><br />

to implement a security program <strong>and</strong> train the staff.<br />

• Technical Safeguards – these include common technical security<br />

controls such as user authentication, authorization, access control,<br />

encryption, data integrity, <strong>and</strong> audit logging. <strong>HIPAA</strong> describes the use<br />

of encryption as an addressable versus a m<strong>and</strong>atory requirement <strong>for</strong><br />

both data at rest <strong>and</strong> <strong>for</strong> data in transmission. Making encryption an<br />

addressable requirement means that organizations can choose to<br />

implement alternate approaches, so long as they af<strong>for</strong>d a similar level<br />

of protection. Because of the new breach notification requirement<br />

described below, organizations increasingly prefer encryption versus<br />

alternative approaches.<br />

• Physical Safeguards – these include controls related to physical<br />

access to in<strong>for</strong>mation <strong>and</strong> systems including workstation access<br />

controls, device <strong>and</strong> media controls, <strong>and</strong> facility access control. These<br />

controls address physical loss or theft of ePHI from workstations <strong>and</strong><br />

removable media.<br />

<strong>HITECH</strong> Breach Notification Rule: The <strong>HITECH</strong> breach notification rule requires<br />

that covered entities must promptly notify the affected individuals in the event of<br />

a breach of ePHI. An important aspect of this rule, however, is that it specifies<br />

that the use of encryption can provide safe harbor against breach notification.<br />

See below (emphasis added).<br />

“Entities subject to the HHS <strong>and</strong> FTC regulations that secure health in<strong>for</strong>mation<br />

as specified by the guidance through encryption or destruction are relieved from<br />

having to notify in the event of a breach of such in<strong>for</strong>mation.”i<br />

The guidance from Health <strong>and</strong> Human Services on implementing encryption<br />

references NIST 800-111 from the National Institute of St<strong>and</strong>ards <strong>and</strong><br />

Technology (NIST). That publication includes several recommendations <strong>for</strong><br />

encryption <strong>and</strong> key management. To reduce their guidance to a few bullet<br />

points:<br />

• Give careful thought <strong>and</strong> planning to encryption key management as it<br />

pertains to operationalizing the generation, use, distribution, storage,<br />

retrieval, rotation, <strong>and</strong> destruction of encryption keys.<br />

• Secure the access to <strong>and</strong> storage of the keys.<br />

CipherPoint <strong>Software</strong> | www.cipherpoint.com | 888.657.5355 | 4600 S. Syracuse, 9 th Floor, Denver, CO 80237<br />

3


• Government organizations must use FIPS approved algorithms <strong>and</strong><br />

validated modules.<br />

• Use AES encryption whenever possible<br />

<strong>SharePoint</strong> <strong>and</strong> the Healthcare Industry<br />

Sensitive healthcare data stored in <strong>SharePoint</strong> is concern. Effectively addressing<br />

the issue requires a mix of strong data governance, access control, <strong>and</strong> content<br />

encryption. <strong>SharePoint</strong> use in healthcare is growing. A study from 2009 by<br />

InfoTech Research Group found that 40% of organizations were planning<br />

<strong>SharePoint</strong> implementations. This figure has undoubtedly grown in the past two<br />

years. The ease of use af<strong>for</strong>ded by <strong>SharePoint</strong> sites makes it extremely easy to<br />

store sensitive in<strong>for</strong>mation, including ePHI, in <strong>SharePoint</strong> repositories.<br />

The downside risk of getting security wrong is increasing as well. Figures from<br />

the most recent Ponemon Data Breach study (2011) put the cost of recovering<br />

from data breaches at $268 per record lost, up 22% from the prior year. For<br />

organizations experiencing data breaches involving large numbers of individuals,<br />

the cost adds up fast. The same study found that the average total cost per<br />

organization was $7.2 million. The healthcare industry is not immune to these<br />

developments, <strong>and</strong> in fact some of the largest publicly disclosed data breaches<br />

in 2010 <strong>and</strong> early 2011 were from healthcare payer <strong>and</strong> provider organizations.<br />

Some of the more egregious data breaches involved insiders (administrators <strong>and</strong><br />

clinicians) “taking a peek” at the healthcare in<strong>for</strong>mation of high profile patients,<br />

<strong>and</strong> then leaking this in<strong>for</strong>mation to the press.<br />

CipherPoint solution<br />

CipherPoint software provides transparent encryption, access control, <strong>and</strong><br />

activity logging of sensitive content stored in <strong>SharePoint</strong>. The solution was<br />

specifically architected to provide layered security <strong>and</strong> to keep plat<strong>for</strong>m,<br />

database, <strong>and</strong> system administrators from viewing sensitive or regulated<br />

in<strong>for</strong>mation, including ePHI.<br />

Control Feature Description<br />

Authentication Authentication passthrough<br />

CipherPointSP <strong>and</strong> CipherPointSP Enterprise do<br />

not require their own authentication system.<br />

Organizations continue to authenticate<br />

<strong>SharePoint</strong> users with their existing solution.<br />

Authorization Access Control CipherPointSP Enterprise provides the ability to<br />

CipherPoint <strong>Software</strong> | www.cipherpoint.com | 888.657.5355 | 4600 S. Syracuse, 9 th Floor, Denver, CO 80237<br />

4


Policies<br />

en<strong>for</strong>ce an additional layer of access control to<br />

the protected <strong>SharePoint</strong> lists <strong>and</strong> libraries. This<br />

capability ensures IT staff cannot maliciously or<br />

mistakenly modify permissions.<br />

Audit Logging Activity Logging The CipherPointKM software includes a central<br />

log database of permitted <strong>and</strong> denied access<br />

requests to protected in<strong>for</strong>mation, certain security<br />

configuration changes of your <strong>SharePoint</strong><br />

site/farm, <strong>and</strong> administrative activity on the<br />

CipherPointKM.<br />

AES Encryption Transparent Content<br />

Encryption<br />

The CipherPoint solution uses st<strong>and</strong>ard AES<br />

encryption with 256 bit key lengths.<br />

Key Management<br />

FIPS 140-2<br />

Algorithms <strong>and</strong><br />

modules<br />

Automated key<br />

management<br />

CipherPointKM uses Key Management policies to<br />

allow organization to easily translate their<br />

compliance requirements into an automated key<br />

management process. Based on these reusable<br />

policies, the CipherPointKM software will manage<br />

the creation, rotation, expiration, distribution, <strong>and</strong><br />

storage of cryptographic keys without any<br />

ongoing manual intervention.<br />

The CipherPointKM software uses FIPS 140-2<br />

validated algorithms, r<strong>and</strong>om number sources,<br />

<strong>and</strong> cryptographic modules.<br />

Conclusion<br />

Encryption is an approved method to secure ePHI <strong>and</strong> relieve an organization<br />

from having to disclose a breach. The use of data at rest encryption is one<br />

important layer in an overall defense in depth security <strong>and</strong> compliance program.<br />

When it comes to using <strong>SharePoint</strong> to store <strong>and</strong> manage ePHI, the CipherPoint<br />

solution delivers the controls healthcare organizations need to secure their<br />

sensitive in<strong>for</strong>mation, <strong>and</strong> to meet their compliance requirements. CipherPoint’s<br />

solution <strong>for</strong> healthcare organizations helps them to meet access control, system<br />

activity reporting, transparent encryption, <strong>and</strong> automated key management<br />

<strong>HIPAA</strong> <strong>and</strong> <strong>HITECH</strong> requirements, in a single, easy to deploy solution that is<br />

centrally managed <strong>and</strong> transparent to end-users.<br />

About CipherPoint <strong>Software</strong>, Inc.<br />

CipherPoint secures sensitive <strong>and</strong> regulated content in web-based application<br />

environments including cloud, SaaS, <strong>and</strong> premise-based collaboration plat<strong>for</strong>ms<br />

such as Microsoft <strong>SharePoint</strong>. Headquartered in Denver, Colorado, CipherPoint<br />

was founded by IT security experts with deep experience in building successful<br />

security technology companies. CipherPoint is committed to helping our<br />

CipherPoint <strong>Software</strong> | www.cipherpoint.com | 888.657.5355 | 4600 S. Syracuse, 9 th Floor, Denver, CO 80237<br />

5


customers meet their security objectives, to building value <strong>for</strong> our shareholders,<br />

to fostering a stimulating work environment <strong>for</strong> employees, <strong>and</strong> to improving our<br />

community through volunteering.<br />

CipherPoint's web tier transparent data encryption technology secures content<br />

<strong>and</strong> data from the web tier, af<strong>for</strong>ding the highest level of threat protection to<br />

sensitive <strong>and</strong> regulated content. CipherPoint's initial products secure<br />

in<strong>for</strong>mation in Microsoft <strong>SharePoint</strong>, which is the market leader in content<br />

management <strong>and</strong> collaboration. CipherPoint builds <strong>and</strong> delivers security<br />

technology that is easy to deploy <strong>and</strong> manage, secure, <strong>and</strong> scalable to meet the<br />

needs of large enterprises. Threats to sensitive in<strong>for</strong>mation come from outside<br />

attackers, <strong>and</strong> from insiders including rogue employees <strong>and</strong> IT administrators. In<br />

addition, an increasing number of compliance regulations are requiring<br />

encryption <strong>for</strong> regulated data. Security control strategies are rapidly shifting<br />

away from reliance on perimeter security devices, towards protection of data at<br />

the application layer. With the increased use of collaboration plat<strong>for</strong>ms as<br />

repositories <strong>for</strong> sensitive <strong>and</strong> regulated data, <strong>and</strong> with the dramatic growth in<br />

unstructured data in the enterprise, organizations urgently require advanced<br />

content security solutions that secure in<strong>for</strong>mation from the web-tier.<br />

Copyright 2012, all rights reserved. CipherPoint® is a registered trademark of CipherPoint <strong>Software</strong>, Inc.. CipherPointSP, CipherPointSP St<strong>and</strong>ard,<br />

CipherPointSP Enterprise, CipherPointKM, CipherPointCS, <strong>and</strong> the stylized CipherPoint logo are trademarks of CipherPoint <strong>Software</strong>, Inc. <strong>SharePoint</strong> is a<br />

trademark of Microsoft.<br />

Doc. ID: CPWP003<br />

i http://www.hhs.gov/ocr/privacy/hipaa/underst<strong>and</strong>ing/coveredentities/breachnotificationifr.html<br />

CipherPoint <strong>Software</strong> | www.cipherpoint.com | 888.657.5355 | 4600 S. Syracuse, 9 th Floor, Denver, CO 80237<br />

6

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!