You are on page 1of 10

Explanation of the Most Common

Types of Information Assurance Risks


Part II
Technical Risks
Risk 1. Lack of unique user identification for every
workforce member prior to obtaining access to ePHI
Explanation: A user identifier is typically a name Secondary Mitigation: User activity in
or a number or a combination of numbers and information systems containing PHI must be
characters put together to form a string of tracked and monitored on a regular basis to watch
characters that uniquely identify a user. This unique for unauthorized access.
user identifier allows the information system to
track the activities that a user makes in the
information system. This is done so that every user Success criteria: Periodic audits need to be
of the system can be held accountable for his/her performed that prove that:
functions performed on the information systems
that have ePHI in it. Unauthorized access to ePHI has not taken
Major Mitigation: Physician practices must place.
determine a user identification strategy that best Regular monitoring of user activity has been
fits with the organization's policies and processes. carried out religiously.
Some organizations use employee codes, variations
of names or even identifiers that have been
randomly generated by using a combination of
characters and numbers. The advantage of using
randomly generated identifiers is that it is difficult
for an unauthorized user to guess it. On the flip
side, it may be difficult for the actual user to
remember it. Physician practices must consider all
these factors while determining a user identifier. 2
www.netspective.com
Risk 2: Lack of unique passwords for each member of the workforce. Sharing of
passwords. Access to ePHI is not based on the job function of the workforce

Explanation: Passwords allow the team to gain Secondary Mitigation: The workforce member's
access to information systems using ePHI. Each access to ePHI must be periodically reviewed and
password has to be unique and assigned to updates made as their job functions change so as
individual users. A password given to a user, to ensure minimum access to ePHI. Access details
whether it is system generated or assigned must be documented and updated. Periodic audits
should not be shared with anyone. Users in an must be carried out. A sanction policy must be
organization may require more or less access to implemented for sharing passwords.
ePHI based on their job function and so all users
will not need equal access to ePHI.
Success criteria: Reports from the periodic
Major Mitigation: Access to systems containing audits will show how the defined policies are
ePHI should be given to only those individuals carried out and how they are periodically
who require the access as part of their job updated. User access logs also can be referred to
function. Additionally the access given to the verify users' access to ePHI based on their job
workforce should be only the minimum access functions.
needed for them to carry out their job function.
Users should have the privilege to change the
passwords and the passwords must be changed
periodically so that the passwords are not
compromised in any way. Each member of the
workforce should be trained on the password
protection policies and should be held
www.netspective.com 3
Risk 3: Lack of policies and procedures in place to provide
appropriate access to ePHI in emergency situations
Explanation: During an emergency situation, it is Success criteria: Emergency situations happen
vital that doctors still have access to ePHI. rarely and hence proof that the procedures and
There must be documented instructions along with policies are in fact working can only be proved for
practices and policies that need to be in place so sure when such an emergency occurs. However,
that they are readily available for access in an every physician practice must be well equipped in
emergency. The authorized personnel must be all aspects to face such an emergency. Frequent
aware of how to get to these emergency audits and periodic emergency drills need to be
procedures and operations in the event of an carried out to mimic emergencies and test out the
emergency. Physician practices must also policies and procedures in place.
determine the various types of emergency
situations that would require access to ePHI.
Major Mitigation: Emergency procedures,
processes and policies should be easily and readily
accessible in the event of an emergency. The
severity of emergencies may vary, for example, an
emergency may result from an electrical power
outage due to a natural or manmade disaster.
Workforce members must be trained on the
procedures and processes so that they are
equipped to handle critical situations. With well
trained workforce members, there is little chance
www.netspective.com 4
Risk 4: Lack of automatic logoff capability for applications
or workstations accessing ePHI
Explanation: Sometimes users, working on Secondary Mitigation: There needs to be a
workstations running applications that access ePHI, may shorter log off period for computers in high traffic
forget to logoff or sometimes may not have the time to areas.
log off when they move away from their workstation.
This may pose a threat since the workstation is left Success criteria: Applications that log logoff
unattended and unauthorized users can easily access activities along with the time when the logoff had
ePHI, tamper with it or even steal the data. An effective taken place, show if the automatic logoff has
way to prevent this kind of unauthorized access is
taken place after a specific period of inactivity.
automatic logoff.
Random and periodic testing of automatic logoff
by the system administrators on all workstations
Major Mitigation:The mitigation can be carried out in 2 accessing ePHI can verify if this risk has been
ways: taken care off.

Configure the applications that access ePHI to


automatically logoff after a predetermined period of
inactivity.
For systems with limited capabilities, activate a
password protected screen saver after a period of
inactivity.

www.netspective.com 5
Risk 5: Lack of audit control mechanisms to record and examine
activity in information systems that contain or use ePHI

Explanation: It is necessary that information Secondary Mitigation: The organization


systems be equipped with audit controls that must have more than one person to
track and record system activity. This is conduct the audit process and report the
important especially for detecting security
results. It may also be a good idea to have
violations. Most audit controls also provide audit
reports of the system activity.
IT vendors explain how audits are
conducted and have the process
documented.
Major Mitigation:

Evaluate and understand the current Success criteria: Data gathered from
technical infrastructure, hardware and audit controls and periodic review of data
software security capabilities can help verify if the audit control
Perform a risk analysis, determine the risks mechanisms are tracking activity in
and possible mitigation/avoidance strategies. information systems. Auditing the audit
Decide on the audit controls that work for control system by outside third party
information systems in the physician's organizations can verify the proper working
practice containing ePHI. of the audit controls in the organization.

www.netspective.com 6
Risk 6: Lack of proper mechanisms to authenticate ePHI

Explanation: It is essential that the integrity of ePHI is Secondary Mitigation: Designing policies and
given high importance. Compromises to the integrity of procedures to ensure integrity of ePHI is
ePHI occurs due to human errors that caused incorrect
maintained. The policies and procedures must
information to be stored into database, or due to
system crashes the stored information gets include all the above mentioned mitigation steps,
altered/damaged. ePHI integrity can also be and additionally can include policy that ensures
compromised if the back ups are not ensured to be data integrity tests are conducted ion regular
accurate. Intentional unauthorized access to ePHI basis. All log-in attempts can be logged and
through hacking can also destroy the integrity of ePHI. checked to ensure the access controls are in place
as intended.
Major Mitigation: Controls to validate human data
entries, and that check for errors must be employed.
Success criteria: Audit of the logs from the
Also controls that ensure the accuracy of back-ups of
data must be in place. Intrusion detection services can
different tools/services can help to know whether
be used to detect intrusions or attempts to tamper the risks have been mitigated. If data integrity
data. Vulnerability scanning can also be employed tests are run, those logs can also be audited to
which will scan the systems on a predetermined basis. know the exact status. Also the reports of the risk
Malware scanning tools must be used and configured to analysis/risk assessment can be used to
scan the systems in frequent intervals to ensure no understand whether the risk is mitigated and the
malware is present. Patches for applications, OS etc current controls are effective or more controls are
must be tested and ensured to be latest. to be added.

www.netspective.com 7
Risk 7: Lack of proper authentication.

Explanation: The first step to gain access to ePHI Secondary Mitigation: A combination of
must be authentication, which is verifying whether authentication mechanisms can be used for a
the entity trying to access ePHI is really the one it more advanced level of authentication, a
claims to be. If persons or entities (can be other
multifactor authentication.
software programs) are not authenticated, this can
lead to the risk of ePHI being compromised. Proper
authentication also needs to be done, before ePHI is Success criteria: Each and every access to the
shared with anyone in any manner. Without doing so, systems need to be logged. An audit of these logs
ePHI may end up in wrong hands. can give a clear picture. Also the risk
analysis/assessment reports will give a clear
Major Mitigation: In the simplest form, indication whether any risks exists, and whether
authentication mechanism includes a user name and the controls are effective or not.
password, which has to be used to gain access. This
authentication mechanism can be either at the
workstation level or at the application or both,
depending on the level of security that is needed.
There must defined policies and procedures which
lays out the authentication mechanisms to be
followed. These policies and procedures must include
the mechanism to be adopted when sharing ePHI with
another person/entity.

www.netspective.com 8
Risk 8: Lack of encryption of ePHI in transmission and at rest

Explanation: ePHI is vulnerable to be Major Mitigation: ePHI should be encrypted and


compromised in all the states it is in. Whether there must also be reasonable and appropriate
mechanisms in place to prevent access to ePHI so that
it is at rest (in databases and files), or in
it is not accessed by persons or software programs
motion (being transmitted through networks), that have not been granted access rights.
or in use (being updated, or read), or is
disposed (discarded paper files or electronic There are many different encryption methods and
storage media). Using encryption puts an extra technologies to encrypt data in motion (SSL, VPN) or
layer of security to ePHI because even if at rest. Choose the methods and technologies that
someone gains access or reads ePHI, if it is best meet the physician's office requirements.
encrypted then the chances of ePHI getting
compromised diminishes. It makes the data Success criteria: The risk analysis/assessment
unreadable and unusable by unauthorized reports will provide a clear indication of whether these
persons. When ePHI is transmitted through type of risks exists or has been mitigated with
appropriate controls.
networks, it is possible that it will be accessed
by unauthorized persons, thus compromising
Auditing logs that track access to ePHI can be verified
ePHI. These type of unauthorized access
periodically to check if there has been unauthorized
hacking may not be immediately known, but access by persons or software programs that have not
can cause many damages. been granted access rights.

www.netspective.com 9
Visit
http://www.netspective.com/opsfolio
E-mail : enquires@netspective.cc
Call : (202) 657-4064

Thank You

You might also like