Protected Health Information – Threats & Vulnerabilities
Threats for protected health information emanate both from external attacks and internal sources.
How to combat?
Access Control: Protect ePHI from unauthorized disclosure
- Allow system access only to authorized persons or applications
- For a web environment, implement a web access management solution
- Consider role-based access control
- Assign unique user identification
- Ensure the use, monitoring, and audit recording of emergency credentials
- Establish automatic logoff and re-authentication after a period of inactivity
- Limit access to encrypted applications to those who can decrypt the data
Integrity of Audit Controls: Protect information from alteration or destruction
- Implement mechanism to authenticate ePHI
- Implement methods to corroborate that information has not been altered or destroyed
Transmission Security: Protect ePHI that is being transmitted over a network
- Consider encryption for best protection and safe harbor
- Ensure strong encryption up to 2048 bits (asymmetric) and 128 bits (symmetric)
- Verify data integrity with digital signatures or SSL certificates
The recommendations of the PHI project to secure PHI lay stress on the following technological aspects, in addition to the procedural and policy enforcement:
- Risk management (risk identification, threat analysis, etc.)
- Asset management (physical and information)
- Identity management (user IDs, passwords, etc.)
- Vulnerability management (secure configuration, patches, etc.)
- Operations management (logs, laptops, desktops, change management, network, mobile devices, removable media, etc.)
- Information protection (encryption, key management, etc.)
- Threat management (intrusion detection, incident response, etc.)
- Security control testing (penetrations testing, audits, etc.)
Multi-pronged Strategy – Need of the Hour
ManageEngine IT Security & Compliance solutions aid in:
|
Try
|
Disclosure: ManageEngine has co-sponsored the “ Protected Health Information (PHI) Project ,” an initiative launched by the American National Standards Institute (ANSI) to evaluate the financial impact of unauthorized access to Protected Health Information (PHI). This blog series draws information from the report “The Financial Impact of Breached Protected Health Information: A Business Case for Enhanced PHI Security”.
Bala
ManageEngine IT Security & Compliance Solutions
Quick Video | Free Trial Download | White Papers | Success Stories