0% found this document useful (0 votes)
356 views

It Security Risk Assessment Guidelines

This document provides guidelines for conducting HIPAA security risk assessments. It outlines a 3-phase risk assessment process: 1) System Documentation to describe the system and boundaries, 2) Risk Determination to identify threats, vulnerabilities and risks, and 3) Safeguard Determination to recommend controls and residual risks. The risk assessment report documents these findings to inform an agency's security compliance and risk management. It establishes a framework for identifying, analyzing, and addressing risks to protected health information systems.

Uploaded by

santsj78
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as RTF, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
356 views

It Security Risk Assessment Guidelines

This document provides guidelines for conducting HIPAA security risk assessments. It outlines a 3-phase risk assessment process: 1) System Documentation to describe the system and boundaries, 2) Risk Determination to identify threats, vulnerabilities and risks, and 3) Safeguard Determination to recommend controls and residual risks. The risk assessment report documents these findings to inform an agency's security compliance and risk management. It establishes a framework for identifying, analyzing, and addressing risks to protected health information systems.

Uploaded by

santsj78
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as RTF, PDF, TXT or read online on Scribd
You are on page 1/ 23

HIPAA Security Risk Assessment Guidelines v1.

0 April 28, 200

Page 1

Information Security Risk Assessment Guidelines


Introduction and Overview
In!"rmati"n security risk assessment is an "n#g"ing pr"cess "! disc"vering, c"rrecting and preventing security pr"$lems. %&e risk assessment is an integral part "! a risk management pr"cess designed t" pr"vide appr"priate levels "! security !"r in!"rmati"n systems. In!"rmati"n security risk assessments are part "! s"und security practices and are re'uired $y t&e ("mm"n)ealt& *nterprise In!"rmati"n Security P"licy. Risk assessments and related d"cumentati"n are als" an integral part "! c"mpliance )it& HIPAA security standards +see $el"),. %&e risk assessment )ill &elp eac& agency determine t&e accepta$le level "! risk and t&e resulting security re'uirements !"r eac& system. %&e agency must t&en devise, implement and m"nit"r a set "! security measures t" address t&e level "! identi!ied risk. -"r a ne) system t&e risk assessment is typically c"nducted at t&e $eginning "! t&e System .evel"pment /i!e (ycle +S./(,. -"r an e0isting system, risk assessments may $e c"nducted "n a regular $asis t&r"ug&"ut t&e S./( and1"r "n an ad#&"c $asis in resp"nse t" speci!ic events suc& as )&en ma2"r m"di!icati"ns are made t" t&e system3s envir"nment "r in resp"nse t" a security incident "r audit. %&is risk assessment met&"d"l"gy is $ased "n t&e CMS Information Security RA Methodology, devel"ped $y t&e !ederal .epartment "! Healt& and Human Services, (enters !"r 4edicare and 4edicaid Services +(4S,, )&ic& is availa$le at ))).cms.&&s.g"v1it1security1d"cs1RA5met&.pd!. It is presented in t&ree p&ases6

System ."cumentati"n P&ase Risk .eterminati"n P&ase Sa!eguard .eterminati"n P&ase


%&e risk assessment rep"rt6

Summari7es t&e system arc&itecture and c"mp"nents, and its "verall level "! security8 Includes a list "! t&reats and vulnera$ilities, t&e system3s current security c"ntr"ls, and its
risk levels8

Rec"mmends sa!eguards, and descri$es t&e e0pected level "! risk t&at )"uld remain i!
t&ese sa!eguards )ere put in place8 S&")s )&ere an "rgani7ati"n needs t" c"ncentrate its remedial )"rk8 (an $e used as input t" t&e agency3s $usiness c"ntinuity plan8 Presents t&ese !indings t" management.

Note on HIPAA Security


("mm"n)ealt& agencies de!ined as ("vered *ntities +(*3s,, and t&"se )&" are 9usiness Ass"ciates "! (*3s, must c"mply )it& t&e HIPAA security rule, :; (-R parts 1<0, 1<2 and 1<:. %&e HIPAA security !rame)"rk calls !"r due diligence $ased "n g""d $usiness practices, !"r systems &andling electr"nic pr"tected &ealt& in!"rmati"n +*PHI,. (reating an In!"rmati"n Risk Assessment Rep"rt satis!ies t&e Rule3s re'uirements t" analy7e risks, !"rmulate appr"priate sa!eguards, and d"cument t&e risk management decisi"n#making pr"cess +:; (-R part 1<:. 08+a,+1,+ii,+A,+9,, and in!"rms t&e agency3s acti"ns in c"mplying )it& "t&er parts "! t&e rule.

HIPAA Security Risk Assessment Guidelines v1.0 April 28, 200

Page 2

Team Members
A sample representative risk assessment team may include t&e !uncti"ns listed $el"). *ac& team mem$er may per!"rm m"re t&an "ne !uncti"n. HIPAA#a!!ected agencies s&"uld secure t&e inv"lvement "! t&eir HIPAA security "!!icer. S"me !uncti"ns "verlap, !"r !uncti"ns )&ere team mem$ers revie) eac& "t&er3s )"rk. See Appendi0 ( !"r m"re detail "n t&ese r"les. Risk assessment manager System "r net)"rk administrat"r %ec&nical revie)er System $usiness ")ner System tec&nical ")ner *0ecutive sp"ns"r In!"rmati"n security "!!icer

The Risk Assessment Report


A Risk Assessment +RA, Rep"rt applies t" a selected in!"rmati"n system. An in!"rmati"n system is a gr"up "! c"mputing and net)"rk c"mp"nents t&at s&are a $usiness !uncti"n, under c"mm"n ")ners&ip and management. %&e Rep"rt )ill include6

A d"cumented system invent"ry, listing all system c"mp"nents and esta$lis&ing t&e
system $"undary !"r t&e purp"ses "! t&e Rep"rt8 ."cumentati"n "! t&e system3s p"licies and pr"cedures, and details "! its "perati"n8 /ist "! t&reat 1 vulnera$ility pairs, )it& severity "! impact and likeli&""d "! "ccurrence8 /ist "! sa!eguards !"r c"ntr"lling t&ese t&reats and vulnera$ilities8 /ist "! rec"mmended c&anges, )it& appr"0imate levels "! e!!"rt !"r eac&8 -"r eac& rec"mmended c&ange, t&e resulting reducti"n in risk8 %&e level "! residual risk t&at )"uld remain a!ter t&e rec"mmended c&anges are implemented.

%&e Rep"rt )ill re!lect t&e security p"licies and "$2ectives "! t&e agency3s in!"rmati"n tec&n"l"gy management. It )ill $e presented in a !ace#t"#!ace meeting )it& t&e system $usiness and tec&nical ")ners, t&e risk assessment manager, and "t&er pr"2ect team mem$ers. A Risk Assessment Rep"rt is n"t intended t" create "r include t&e !"ll")ing, &")ever it s&"uld $e used as input !"r6

A system security plan, ne) security arc&itecture, audit rep"rt, "r system accreditati"n8 System security p"licies, "r assignment "! sta!! resp"nsi$ility !"r system security8 .etailed data!l")s8 *0act d"llar c"st estimates "r 2usti!icati"ns8 Assignment "r acceptance "! legal resp"nsi$ility !"r t&e security "! t&e system8 In#dept& analysis "r res"luti"n "! speci!ic security incidents "r vi"lati"ns8 ("ntract revie).

Appendi0 . pr"vides a template !"r t&e d"cumentati"n "! t&e Risk Assessment rep"rt.

HIPAA Security Risk Assessment Guidelines v1.0 April 28, 200

Page

Tasks
%&is c&art s&")s t&e se'uence "! &ig&#level tasks. %&e c"mplete list "! tasks and durati"ns )ill $e created, estimated and sc&eduled $y t&e team.

ID 1 2

Risk Assessment Project


% System Documentation Phase 1.0 Set $"undary !"r selected system 1.1 Rec"rd system identi!icati"n in!"rmati"n 1.2 ."cument system purp"se and desc. 1. ."cument t&e system security level 2 System Risk Determination Phase 2.1 Identi!y t&reats and vulnera$ilities 2.2 .escri$e risks 2. Identi!y e0isting c"ntr"ls 2.: .etermine likeli&""d "! "ccurrence 2.; .etermine severity "! impact 2.< .etermine risk levels 3 Safeguard Determination Phase .1 Rec"mmend c"ntr"ls and sa!eguards .2 .etermine residual likeli&""d "! "ccurrence . .etermine residual severity "! impact .: .etermine residual risk level Re!ort !resentation" archi#ing and sign$off

Mar 2003 5 6 7 8 !0 !! !2 !3 !" !5

: ; < = 8 > 10 11 12 1 1: 1; 1< 1= 18

System Documentation Phase


."cument system identi!icati"n8 ."cument system purp"se and descripti"n8 ."cument t&e system security level.
%&e team must make a decisi"n a$"ut )&ere t" dra) t&e $"undaries "! t&e system t" $e assessed.

Risk Determination Phase


Identi!y t&reats8 Identi!y vulnera$ilities8
HIPAA Security Risk Assessment Guidelines v1.0 April 28, 200 Page :

.escri$e risks8 Identi!y e0isting c"ntr"ls8 .etermine likeli&""d "! "ccurrence8 .etermine severity "! impact8 .etermine risk level.

%&e team must decide )&et&er t" include "nly c"ntr"ls t&at are currently implemented, "r t" include c"ntr"ls t&at are $udgeted and sc&eduled !"r implementati"n.

Safeguard Determination Phase


Rec"mmend c"ntr"ls and sa!eguards8 .etermine residual +remaining, likeli&""d "! "ccurrence i! c"ntr"ls and sa!eguards are implemented8 .etermine residual severity "! impact i! candidate c"ntr"ls and sa!eguards are implemented8 .etermine residual risk levels.

Risk Assessment Process


1.0 System Documentation hase
%&e System ."cumentati"n P&ase pr"vides a descripti"n "! t&e system and t&e data it &andles, as c"mputing assets used t" !ul!ill t&e "rgani7ati"n3s $usiness missi"n. %&is p&ase esta$lis&es a !rame)"rk !"r su$se'uent risk assessment p&ases. %&e system ")ner pr"vides t&e system identi!icati"n, including t&e system descripti"n, $usiness !uncti"n and assets. -"r ne) systems, t&ese are de!ined )&en t&e system is !irst c"nceived and devel"ped during t&e S./(3s design and implementati"n p&ases +see Appendi0 9,. Phase %& 'ey (eam )em*er s& +ut!ut& Set t&e $"undaries !"r t&e set "! c"mp"nents t&at c"nstitute t&e in!"rmati"n system. An in!"rmati"n system is a gr"up "! c"mputing and supp"rting c"mp"nents t&at s&are a $usiness !uncti"n, under c"mm"n ")ners&ip and management. System administrat"r %ec&nical revie)er System tec&nical ")ner Hig&#level d"cumentati"n and net)"rk diagram s&")ing t&e system and ad2acent systems, )it& a line s&")ing t&e cut#"!! !"r t&e sc"pe "! t&is risk assessment.

%,% System Identification


/ist t&e system name, "t&er related in!"rmati"n, and t&e resp"nsi$le "rgani7ati"n. See t&e System Identi!ication ta$le in Appendi0 .. (ask %,%& ("mplete and veri!y system identi!icati"n and resp"nsi$le c"ntacts.
Page ;

HIPAA Security Risk Assessment Guidelines v1.0 April 28, 200

'ey (eam )em*er s& +ut!ut&

System administrat"r %ec&nical revie)er System tec&nical ")ner Risk assessment manager ("mplete !#! Sy$tem Identification ta$le in Appendi0 ..

%,2 System Pur!ose and Descri!tion


%" identi!y t&e assets c"vered $y t&e RA, pr"vide a $rie! descripti"n "! t&e !uncti"n and purp"se "! t&e system and t&e "rgani7ati"nal $usiness pr"cesses it supp"rts, including !uncti"ns and pr"cessing "! data.

(echnical Descri!tion and -n#ironmental .actors

General descripti"n "! !uncti"n and purp"se t&e system General !uncti"nal re'uirements 9usiness pr"cesses supp"rted Applicati"ns supp"rted, services running General in!"rmati"n !l") ?et)"rk diagram )it& system $"undaries .escripti"n "! p&ysical c"mp"nents P&ysical c"mp"nent asset and tag num$ers P&ysical l"cati"n, envir"nmental c"ntr"ls in place *nvir"nmental !act"rs t&at give rise t" security c"ncerns %ec&nical and $usiness users, list "! system user acc"unts System ")ners&ip6 S&ared "r dedicated

System /onnections and Information Sharing

("nnected c"mp"nents /A? and @A? c"nnecti"ns and t"p"l"gy, !ire)all c"n!igurati"ns S"!t)are dependencies Inter!aces ."cument t&e system3s $usiness !uncti"n, c"mp"nents, envir"nment, c"nnecti"ns. System administrat"r %ec&nical revie)er System tec&nical ")ner System $usiness ")ner In!"rmati"n security "!!icer ("mplete !#2 Sy$tem %ur&o$e and De$cri&tion ta$le in Appendi0 ..

(ask %,2& 'ey (eam )em*er s& +ut!ut&

HIPAA Security Risk Assessment Guidelines v1.0 April 28, 200

Page <

%,3 System Security 0e#el


.escri$e and d"cument t&e in!"rmati"n &andled $y t&e system, and identi!y t&e "verall system security level. %&e classi!icati"n levels and t&e categ"ries assigned t" di!!erent types "! in!"rmati"n s&"uld c"rresp"nd t" t&e agency3s in!"rmati"n classi!icati"n designati"ns. In!"rmati"n security levels and designati"ns s&"uld $e part "! t&e agency3s in!"rmati"n security p"licy. Appendi0 A, Information Security 'e(el$) pr"vides e0amples "! security levels and &") t&ey can $e assigned t" di!!erent categ"ries "! in!"rmati"n. -"r t&is step, t&e team )ill d"cument t&e sensitivity "! t&e in!"rmati"n &andled $y t&e system, t&en classi!y t&e resulting level "! security re'uirements !"r t&e system itsel!. %&is element includes a general descripti"n "! t&e in!"rmati"n, t&e in!"rmati"n3s sensitivity, and system criticality. It includes re'uirements !"r c"n!identiality, integrity, availa$ility, audita$ility and acc"unta$ility as dictated $y t&e agency3s in!"rmati"n security p"licy. (ask %,3& 'ey (eam )em*er s& +ut!ut& ."cument t&e criticality and sensitivity "! t&e in!"rmati"n t&e system &andles, )it& $rie! re!erences t" t&e agency3s in!"rmati"n security p"licy, and t&e "verall system security re'uirements. %ec&nical revie)er System $usiness ")ner System tec&nical ")ner ("mplete !#3 Information Security 'e(el$ and *(erall Sy$tem Security 'e(el ta$le in Appendi0 ..

".0 Risk Determination hase


%&e g"al "! t&e Risk .eterminati"n P&ase is t" calculate t&e level "! risk !"r eac& t&reat 1 vulnera$ility pair $ased "n t&e likeli&""d "! a t&reat e0pl"iting a vulnera$ility, and t&e severity "! impact t&at t&e e0pl"ited vulnera$ility )"uld &ave "n t&e system, its data and its $usiness !uncti"n. ("nsider t&e impact in terms "! l"ss "! c"n!identiality, integrity "r availa$ility "! t&e data classi!ied in %ask 1. . In!"rmati"n )ill $e c"llected in t&e !"rm "! 'uesti"nnaires, intervie)s, d"cumentati"n revie), and aut"mated scanning t""ls. %&e Risk .eterminati"n P&ase is c"mprised "! si0 steps6

1. Identi!y p"tential dangers t" in!"rmati"n and system +t&reats,. 2. Identi!y t&e system )eakness t&at c"uld $e e0pl"ited +vulnera$ilities, ass"ciated t"
generate t&e t&reat 1 vulnera$ility pair.

3. Identi!y e0isting c"ntr"ls t" reduce t&e risk "! t&e t&reat e0pl"iting t&e vulnera$ility. 4. .etermine t&e likeli&""d "! "ccurrence !"r a t&reat e0pl"iting a related vulnera$ility given 5. 6.
t&e e0isting c"ntr"ls. .etermine t&e severity "! impact "n t&e system $y an e0pl"ited vulnera$ility. .etermine t&e risk level !"r a t&reat1vulnera$ility pair given t&e e0isting c"ntr"ls.

%&is si0#step pr"cess !"r Risk .eterminati"n is c"nducted !"r eac& identi!ied t&reat 1 vulnera$ility pair. Ase t&e Risk .eterminati"n %a$le in Appendi0 . t" d"cument t&e analysis per!"rmed in t&is p&ase.

HIPAA Security Risk Assessment Guidelines v1.0 April 28, 200

Page =

2,% Identify (hreats and 1ulnera*ilities


-irst, identi!y t&reats t&at c"uld e0pl"it system vulnera$ilities. Re!er t" t&e CMS +hreat Identification Re$ource +))).cms.&&s.g"v1it1security1d"cs1%&reat5I.5res"urce.pd!, !"r p"ssi$le envir"nmental, p&ysical, &uman, natural, and tec&nical t&reats. Asing t&e "utput "! task 1.2, c"nsider t&e system3s c"nnecti"ns, dependencies )it& "t&er systems, in&erited risks and c"ntr"ls, risks !r"m s"!t)are !aults and sta!! err"rs and malici"us intent, and suc& !act"rs as pr"0imity t" t&e Internet, inc"rrect !ile permissi"ns, risks !r"m maintenance pr"cedures and pers"nnel c&anges. ?e0t, c"nsider t&e p"tential vulnera$ilities ass"ciated )it& eac& t&reat, t" pr"duce a pair. A vulnera$ility can $e ass"ciated )it& "ne "r m"re t&reats. ("llect input !r"m previ"us risk assessments, audits, system de!iciency rep"rts, security advis"ries, scanning t""ls, security test results, system devel"pment testing, industry and g"vernment listings, suc& as sans."rg, security!"cus.c"m, vend"r advis"ries, and t&e ?IS% vulnera$ility data$ase at icat.nist.g"v.

(ask 2,%& 'ey (eam )em*er s& +ut!ut&

.escripti"ns "! t&reat1vulnera$ility pairs. System administrat"r %ec&nical revie)er System tec&nical ")ner ("mplete t&e BItem ?".C, B%&reat ?ameC and BDulnera$ility ?ameC c"lumns in 2#0 Ri$, Determination ta$le in Appendi0 ..

2,2 Descri*e Risks


.escri$e &") eac& vulnera$ility creates a risk t" t&e system in terms "! c"n!identiality, integrity, availa$ility, audita$ility "r acc"unta$ility elements t&at may result in a c"mpr"mise "! t&e system.

(ask 2,2& 'ey (eam )em*er s& +ut!ut&

.escri$e risks in relati"n t" t&reat1vulnera$ility pairs. System administrat"r %ec&nical revie)er System tec&nical ")ner ("mplete t&e BRisk .escripti"nC c"lumn "! t&e 2#0 Ri$, Determination ta$le in Appendi0 ..

2,3 Identify -2isting /ontrols


Identi!y e0isting c"ntr"ls t&at reduce t&e likeli&""d "r pr"$a$ility "! a t&reat e0pl"iting a system vulnera$ility, and1"r reduce t&e magnitude "! impact "! t&e e0pl"ited vulnera$ility "n t&e system. *0isting c"ntr"ls may $e management, "perati"nal "r tec&nical c"ntr"ls depending "n t&e t&reat 1 vulnera$ility and t&e risk t" t&e system. (ask 2,3& 'ey (eam .escripti"n "! system c"ntr"ls, cr"ss#re!erenced )it& t&reat 1 vulnera$ility pairs. System administrat"r %ec&nical revie)er
Page 8

HIPAA Security Risk Assessment Guidelines v1.0 April 28, 200

)em*er s& +ut!ut&

System tec&nical ")ner ("mplete t&e B*0isting ("ntr"lsC c"lumn "! 2#0 Ri$, Determination ta$le in Appendi0 ..

2, Determine 0ikelihood of +ccurrence


*stimate t&e likeli&""d t&at a t&reat )ill e0pl"it a vulnera$ility. /ikeli&""d "! "ccurrence is $ased "n a num$er "! !act"rs t&at include system arc&itecture, system envir"nment, in!"rmati"n system access and e0isting c"ntr"ls8 t&e presence, m"tivati"n, tenacity, strengt& and nature "! t&e t&reat8 t&e presence "! vulnera$ilities8 and t&e e!!ectiveness "! e0isting c"ntr"ls. Re!er t" t&is ta$le t" )&en estimating t&e likeli&""d t&at t&e t&reat )ill $e reali7ed and e0pl"it t&e vulnera$ility "n t&e system. 0ikelihood of +ccurrence 0e#els Descri!tion Anlikely ever t" "ccur /ikely t" "ccur t)"1t&ree times every !ive years /ikely t" "ccur "nce every year "r less /ikely t" "ccur "nce every si0 m"nt&s "r less /ikely t" "ccur "nce per m"nt& "r less /ikely t" "ccur multiple times per m"nt& /ikely t" "ccur multiple times per day

0ikelihood ?egligi$le Dery /") /") 4edium Hig& Dery Hig& *0treme

(ask 2, & 'ey (eam )em*er s& +ut!ut&

%&reat 1 vulnera$ility pairs )it& likeli&""d "! success!ul e0pl"itati"n. System administrat"r %ec&nical revie)er System tec&nical ")ner (ateg"ri7e t&reat 1 vulnera$ility pairs $y likeli&""d "! "ccurrence, c"mplete t&e B/ikeli&""d "! EccurrenceC c"lumn "! 2#0 Ri$, Determination ta$le in Appendi0 ..

2,3 Determine Se#erity of Im!act


.etermine t&e magnitude "r severity "! impact "n t&e system3s "perati"nal capa$ilities and t&e in!"rmati"n it &andles, i! t&e t&reat is reali7ed and e0pl"its t&e ass"ciated vulnera$ility. .etermine t&e severity "! impact !"r eac& t&reat 1 vulnera$ility pair $y evaluating t&e p"tential l"ss in eac& security categ"ry +c"n!identiality, integrity, availa$ility, audita$ility, acc"unta$ility, $ased "n t&e system3s in!"rmati"n security level as e0plained in Appendi0 A.

Im!act Se#erity 0e#els Insigni!icant 4in"r Signi!icant .amaging Seri"us /ittle "r n" impact 4inimal e!!"rt t" repair, rest"re "r rec"n!igure Small $ut tangi$le &arm, may$e n"ticea$le $y a limited audience, s"me em$arrassment, s"me e!!"rt t" repair .amage t" reputati"n, l"ss "! c"n!idence, signi!icant e!!"rt t" repair ("nsidera$le system "utage, l"ss "! c"nnected cust"mers, $usiness c"n!idence, c"mpr"mise "! large am"unt in!"rmati"n
Page >

HIPAA Security Risk Assessment Guidelines v1.0 April 28, 200

(ritical

*0tended "utage, permanent l"ss "! res"urce, triggering $usiness c"ntinuity pr"cedures, c"mplete c"mpr"mise "! in!"rmati"n

(ask 2,3& 'ey (eam )em*er s& +ut!ut&

%&reat 1 vulnera$ility pairs )it& severity "! success!ul e0pl"itati"n. System administrat"r %ec&nical revie)er System tec&nical ")ner System $usiness ")ner (ateg"ri7e t&reat 1 vulnera$ility pairs $y severity "r magnitude "! impact, and c"mplete t&e BImpact SeverityC c"lumn "! 2#0 Ri$, Determination ta$le in Appendi0 ..

2,4 Determine Risk 0e#els


Risk level is t&e likeli&""d "! "ccurrence multiplied $y t&e severity "! impact. %&e !inal value is su$2ect t" t&e system $usiness and tec&nical ")ners3 discreti"n.

Risk determination -"r eac& t&reat 1 vulnera$ility pair, assess t&e !"ll")ing6 - /ikeli&""d "! t&e t&reat attempting t" e0ercise t&e vulnera$ility8 - 4agnitude "! impact i! t&e t&reat 1 vulnera$ility e0pl"it is success!ul8 - Ade'uacy "! planned "r e0isting security c"ntr"ls !"r reducing "r eliminating risk8 Note& (he !roject team must decide 5hether to use only currently im!lemented controls for this analysis" or to include controls that are *udgeted and scheduled for installation" and document that decision in the Re!ort, - Resulting risk t" t&e in!"rmati"n "n t&e system !r"m t&e t&reat and vulnera$ility.

%&is ta$le s&")s t&e resulting risk level, !"r eac& degree "! likeli&""d and eac& level "! severity. Risk 0e#els
0ikelihood of +ccurrenc e Im!act Se#erity Insignificant )inor Significant Damaging Serious /ritical

/") Negligi*l e 1ery 0o5 0o5 )edium High 1ery High -2treme /") /") /") /") /") /")

/")

/")

/")

/")

/")

/") /") /") 4"derate 4"derate 4"derate

/") 4"derate 4"derate Hig& Hig& Hig&

/") 4"derate Hig& Hig& Hig& Hig&

4"derate Hig& Hig& Hig& Hig& Hig&

4"derate Hig& Hig& Hig& Hig& Hig&

(ask 2,4&

%&reat 1 vulnera$ility pairs )it& assigned risk levels.


Page 10

HIPAA Security Risk Assessment Guidelines v1.0 April 28, 200

'ey (eam )em*er s& +ut!ut&

System administrat"r %ec&nical revie)er System tec&nical ")ner System $usiness ")ner ("m$ine t&e likeli&""d "! "ccurrence )it& magnitude "! impact t" derive t&e risk level !"r eac& t&reat 1 vulnera$ility pair. ("nsider t&e risks t" t&e in!"rmati"n "n t&e system, and c"mplete t&e BRisk /evelC c"lumn "! 2#0 Ri$, Determination ta$le in Appendi0 ..

#.0 Sa!e$uard Determination hase


%&e sa!eguard determinati"n p&ase inv"lves identi!icati"n "! additi"nal c"ntr"ls, sa!eguards "r c"rrective acti"ns t" minimi7e t&e t&reat e0p"sure and vulnera$ility t" e0pl"itati"n !"r eac& t&reat1 vulnera$ility pair )it& a m"derate "r &ig& risk level. %&e residual risk level is t&e am"unt "! risk t&at )"uld remain i! t&e rec"mmended c"ntr"l "r sa!eguard )ere implemented. Sa!eguard determinati"n steps6

1. Identi!y c"ntr"ls and sa!eguards t" reduce t&e risk level "! eac& risk#t&reat pair, i! t&e risk 2. 3. 4.
level is m"derate "r &ig&. .etermine t&e residual likeli&""d "! "ccurrence "! t&e t&reat i! t&e rec"mmended sa!eguard is implemented. .etermine t&e residual impact severity "! t&e e0pl"ited vulnera$ility "nce t&e rec"mmended sa!eguard is implemented. .etermine t&e residual risk level !"r t&e system.

("nsider sa!eguards related t" testing and maintenance, impr"ved audit capa$ility, and restricting p&ysical access.

3,% Recommend /ontrols and Safeguards


Identi!y c"ntr"ls and sa!eguards t" reduce t&e risk presented $y eac& t&reat 1 vulnera$ility pair )it& a m"derate "r &ig& risk level as identi!ied in t&e Risk .eterminati"n P&ase. @&en identi!ying a c"ntr"l "r sa!eguard, c"nsider6

1. 2. 3. 4. 5. 6.

Security area )&ere it $el"ngs, suc& as management, "perati"nal, tec&nical. 4et&"d it empl"ys t" reduce t&e "pp"rtunity !"r t&e t&reat t" e0pl"it t&e vulnera$ility. Its e!!ectiveness in mitigating t&e risk t" in!"rmati"n. P"licy and arc&itectural parameters re'uired !"r its implementati"n in t&e envir"nment. In!"rmati"n security categ"ry +c"n!identiality, integrity, availa$ility, access c"ntr"l, audit, etc., t" )&ic& t&e sa!eguard applies. @&et&er t&e c"st "! t&e sa!eguard is c"mmensurate )it& its reducti"n in risk.

I! m"re t&an "ne sa!eguard is identi!ied !"r t&e same t&reat 1 vulnera$ility pair, list t&em in t&is c"lumn in separate r")s and c"ntinue )it& t&e analysis steps. %&e residual risk level must $e evaluated during t&is p&ase "! t&e assessment and may $e !urt&er evaluated in risk management activities "utside t&e sc"pe "! t&is pr"2ect. I! t&e rec"mmended sa!eguard cann"t $e c"mpletely implemented in t&e envir"nment due t" c"st, management, "perati"nal "r tec&nical c"nstraints, d"cument t&e circumstances and c"ntinue )it& t&e analysis.

HIPAA Security Risk Assessment Guidelines v1.0 April 28, 200

Page 11

("nsider c"ntr"l elements implemented as p"licies and pr"cedures, training, and impr"ved p"licy en!"rcement. (ask 3,%& 'ey (eam )em*er s& +ut!ut& (reate a list "! current, planned "r availa$le sa!eguards and c"ntr"ls suita$le !"r pr"tecting t&e in!"rmati"n System administrat"r System tec&nical ")ner %ec&nical revie)er /ist "! sa!eguards and c"ntr"ls, )it& implementati"n c"nsiderati"ns. ("mplete t&e BRec"mmended Sa!eguardC c"lumn in 3#0 Safeguard Determination ta$le in Appendi0 ..

3,2 Determine Residual 0ikelihood of +ccurrence


-"ll") t&e directi"ns in secti"n 2.: "! t&e Risk .eterminati"n p&ase, )&ile assuming t&e selected sa!eguard &as $een implemented. (ask 3,2& 'ey (eam )em*er s& +ut!ut& (ateg"ri7e t&reat 1 vulnera$ility pairs $y likeli&""d "! "ccurrence, assuming t&e selected sa!eguard &as $een implemented. System administrat"r %ec&nical revie)er System tec&nical ")ner ("mplete t&e BResidual /ikeli&""d "! EccurrenceC c"lumn "! 3#0 Safeguard Determination ta$le in Appendi0 ..

3,3 Determine Residual Se#erity of Im!act


-"ll") t&e directi"ns in secti"n 2.; "! t&e Risk .eterminati"n p&ase )&ile assuming t&e selected sa!eguard &as $een implemented. (ask 3,3& 'ey (eam )em*er s& +ut!ut& (ateg"ri7e t&reat 1 vulnera$ility pairs $y severity "r magnitude "! impact "! a success!ul e0pl"itati"n, assuming t&e selected sa!eguard &as $een implemented. System administrat"r %ec&nical revie)er System tec&nical ")ner System $usiness ")ner ("mplete t&e BResidual Impact SeverityC c"lumn "! 3#0 Safeguard Determination ta$le in Appendi0 ..

3, Determine Residual Risk 0e#els


.etermine t&e residual risk level !"r t&e t&reat1vulnera$ility pair and its ass"ciated risk "nce t&e rec"mmended sa!eguard is implemented. %&e residual risk level is determined $y e0amining t&e likeli&""d "! "ccurrence "! t&e t&reat e0pl"iting t&e vulnera$ility and t&e impact severity !act"rs in categ"ries "! ("n!identiality, Integrity and Availa$ility. -"ll") t&e directi"ns in Secti"n 2.< "! t&e Risk .eterminati"n p&ase t" determine t&e residual risk level "nce t&e rec"mmended sa!eguard is implemented.

HIPAA Security Risk Assessment Guidelines v1.0 April 28, 200

Page 12

.epending "n t&e nature and circumstances "! t&reats and vulnera$ilities, a rec"mmended sa!eguard may reduce t&e risk level t" B/").C 4ake a n"te "! t&e situati"n )it& a descripti"n $el") t&e ta$le, i! needed, i! suc& special c"nditi"ns e0ist. -"r ne) systems, t&e ne0t steps )"uld include creating a sensitivity assessment, system security re'uirements, risk assessment rep"rt, and system security plan in t&e S./(. (ask 3, & 'ey (eam )em*er s& +ut!ut& Repeat t&e derivati"n t&e risk level !"r eac& t&reat 1 vulnera$ility pair !r"m task 2.<, t&is time assuming t&e selected sa!eguard &as $een implemented. System administrat"r %ec&nical revie)er System tec&nical ")ner System $usiness ")ner ("mplete t&e BResidual Risk /evelC c"lumn "! 3#0 Safeguard Determination ta$le in Appendi0 ..

HIPAA Security Risk Assessment Guidelines v1.0 April 28, 200

Page 1

A!!endi2 A& Information Security 0e#els


System $usiness and tec&nical ")ners must determine t&e appr"priate security levels $ased "n t&e "rgani7ati"n3s c"n!identiality, integrity and availa$ility re'uirements !"r t&e in!"rmati"n, as )ell as its criticality t" t&e "rgani7ati"n3s $usiness missi"n. %&ese re'uirements are usually c"ntained in t&e agency3s statut"ry, regulat"ry and p"licy !rame)"rks. %&is is t&e $asis !"r assessing t&e risks t" $usiness "perati"ns and assets and in selecting appr"priate security c"ntr"ls and tec&ni'ues. 9el") are sample in!"rmati"n security levels t&at esta$lis& c"mm"n criteria !"r security $y in!"rmati"n categ"ry. %&e !irst ta$le de!ines t&e in!"rmati"n security levels. %&e sec"nd ta$le pr"vides security level e0amples !"r t&e vari"us in!"rmati"n categ"ries. In cases )&ere in!"rmati"n "! varying security levels are c"m$ined in "ne system, t&e &ig&est security level takes precedence. It is each agency6s res!onsi*ility to determine information security le#els for each information category *ased on its !articular *usiness and legal re7uirements, (he e2am!les *elo5 are !ro#ided for illustration !ur!oses only,

Examples of Information Security Levels


Security %eve& /") Description 4"derately seri"us Dery seri"us '(p&anation ?"ticea$le impact "n an agency3s missi"ns, !uncti"ns, "r reputati"n. A $reac& "! t&is security level )"uld result in a negative "utc"me8 "r )"uld result in damage, re'uiring repairs, t" an asset "r res"urce. Severe impairment t" an agency3s missi"ns, !uncti"ns, image, and reputati"n. %&e impact )"uld place an agency at a signi!icant disadvantage8 "r )"uld result in ma2"r damage, re'uiring e0tensive repairs t" assets "r res"urces. ("mplete l"ss "! missi"n capa$ility !"r an e0tended peri"d8 "r )"uld result in t&e l"ss "! ma2"r assets "r res"urces and c"uld p"se a t&reat t" &uman li!e.

4"derate

Hig&

(atastr"p&ic

Examples of Information Security Levels by Information Category


In!ormation )ate$ory '(p&anation and '(amp&es System Security %eve&*
Page 1:

HIPAA Security Risk Assessment Guidelines v1.0 April 28, 200

/a) en!"rcement and state security in!"rmati"n /i!e#critical in!"rmati"n In!"rmati"n a$"ut pers"ns

-inancial, $udgetary, c"mmercial, pr"prietary and trade secret in!"rmati"n Pu$lic in!"rmati"n

In!"rmati"n related t" investigati"ns !"r la) en!"rcement purp"ses8 security plans, c"ntingency plans, emergency "perati"ns plans, incident rep"rts, rep"rts "! investigati"ns, risk "r vulnera$ility assessments certi!icati"n rep"rts8 d"es n"t include general plans, p"licies, "r re'uirements. In!"rmati"n critical t" li!e#supp"rt systems +i.e., in!"rmati"n )&ere inaccuracy, l"ss, "r alterati"n c"uld result in l"ss "! li!e,. In!"rmati"n related t" pers"nnel, medical, and similar data +e.g., salary data, s"cial security in!"rmati"n, pass)"rds, user identi!iers +I.s,, **E, pers"nnel pr"!ile +including &"me address and p&"ne num$er,, medical &ist"ry, empl"yment &ist"ry +general and security clearance in!"rmati"n,, and arrest1criminal investigati"n &ist"ry,. In!"rmati"n related t" !inancial in!"rmati"n and applicati"ns, c"mmercial in!"rmati"n received in c"n!idence, "r trade secrets +i.e., pr"prietary, c"ntract $idding in!"rmati"n, sensitive in!"rmati"n a$"ut empl"yees "r citi7ens,. Als" included is in!"rmati"n a$"ut payr"ll, aut"mated decisi"n making, pr"curement, invent"ry, "t&er !inancially related systems, and site "perating and security e0penditures. Any in!"rmati"n t&at is declared !"r pu$lic c"nsumpti"n $y "!!icial aut&"rities. %&is includes in!"rmati"n c"ntained in press releases. It als" includes in!"rmati"n placed "n pu$lic access )"rld#)ide#)e$ servers.

Hig&

Hig& 4"derate

4"derate

/")

HIPAA Security Risk Assessment Guidelines v1.0 April 28, 200

Page 1;

A!!endi2 8& Security in the System De#elo!ment 0ife /ycle


+!r"m CMS Information Security RA Methodology, Alt&"ug& in!"rmati"n security must $e c"nsidered in all p&ases "! t&e li!e "! a system, t&e System .evel"pment /i!e (ycle identi!ies !"ur speci!ic steps t&at are needed t" ensure t&at in!"rmati"n at (4S is pr"perly pr"tected. %&ese include t&e In!"rmati"n Sensitivity Assessment +Secti"n 10.; "! t&e 9usiness (ase Analysis,, System Re'uirements ."cument, t&e RA Rep"rt and t&e System Security Plan. Step 1 # %&e In!"rmati"n Sensitivity Assessment +ISA, Prior to !roject initiation" the system o5ner !re!ares a 8usiness /ase Analysis 98/A:" 5hich includes the ISA 9section %;,3 of the 8/A:, In this ste!" the system o5ner categori<es the data according to sensiti#ity and identifies high$le#el security re7uirements that a!!ly to the system under consideration for de#elo!ment, Information from the ISA is one of the factors considered in determining if the system 5ill go for5ard into de#elo!ment and 5hat le#el of information security 5ill *e needed, -lements from the ISA !ro#ide the initial in!ut to the RA, Step 2 FSystem Re'uirements ."cument +speci!ically Security Re'uirements, As an initial ste! of the de#elo!ment !rocess" system re7uirements are documented for e#ery system, (he security re7uirements ser#e as a *aseline for security 5ithin the system, (he /)S )inimum Information Security Standards is a tool to assist in defining security re7uirements, +ther re7uirements may *e determined *y *usiness or functional re7uirements, Step F Risk Assessment Rep"rt During the de#elo!ment !rocess" a risk assessment is conducted and the result RA Re!ort documents the #ulnera*ilities that ha#e *een identified in the system" the risks to the system resulting from the #ulnera*ilities and the efforts designed to reduce those risks" through the use of safeguards, (he RA Re!ort !ro#ides in!ut to the System Security Plan and other risk management acti#ities,

Step : F System Security Plan (he System Security Plan incor!orates all of the elements re7uired for the system o5ner to determine if the system should *e certified as meeting *oth /)S !olicy and *usiness re7uirements, Information from the RA Re!ort is incor!orated into the System Security Plan in Section 2 = )anagement /ontrols, Security steps als" c"rresp"nd t" p&ases in t&e Integrated I% Investment 4anagement R"ad 4ap +REA.4AP, !"r system devel"pment. %&e REA.4AP is (4S3s implementati"n standard !"r S./( and Investment 4anagement and can $e !"und at cms.&&s.g"v1it1r"admap. In -igure 9#1, t&e system devel"pment li!e cycle and REA.4AP are s&")n "n t&e rig&t and le!t sides )it& t&e in!"rmati"n security delivera$les and t""ls entered in t&e center secti"n $et)een t&em. %&is !"rmat illustrates t&e relati"ns&ip "! t&e in!"rmati"n security tasks t" $"t& pr"cesses.

HIPAA Security Risk Assessment Guidelines v1.0 April 28, 200

Page 1<

Figure B-1. Security in the System evelopment Life Cycle an! C"S#s $oa!map
I( In#estment )anagement Road )a!

System Security in the SD0/


Security Deli#era*les 9rectangle: > Resources 9o#al:

Pre#.evel"pment
1. *0press need !"r system 2. Assess?determine data sensiti#ity 3. Define initial security re7uirements

9usiness (ase Analysis 10.; # In!"rmati"n Sensitivity

Ac'uisiti"ns
# 9(A 10.; F In!"rmati"n Sensitivity Assessment

.evel"pment
1. Identi!y detailed system security re'uirements during system design. 2. .evel"p appr"priate security c"ntr"ls )it& evaluati"n G test pr"cedures pri"r pr"curement acti"ns . .evel"p s"licitati"n d"cuments t" include security re'uirements G evaluati"n1test pr"cedures :. Apdate security re'uirements as tec&n"l"gies are implemented ;. Identi!y security re'uirements !"r pr"curement "! (E%S applicati"ns c"mp"nents <. Per!"rm design revie) t" ensure security c"ntr"ls are c"nsidered pri"r t" pr"ducti"n =. *nsure security !eatures are c"n!igured, ena$les, tested, and d"cumented during devel"pment 8. Apdate, design, per!"rm and d"cument ne)ly devel"ped security c"ntr"ls @, Document system security tests and risk assessment 10. *nsure c"mpliance )it& -ederal la)s, regulati"ns, p"licies and standards %%, /ertify system and o*tain system accreditation 12. Pr"vide security training

Re'uirements .e!initi"n
$ Define System Re7uirements # In!"rmati"n Security Risk Assessment

4inimum Security Standards

.esign and *ngineering


# Security %est Plan1(ases

HIPAA Security Risk Assessment Guidelines v1.0 April 28, 200

Page 1=

System Re'uirements ."cument +includes security,

.evel"pment
# S"!t)are %est Plan # Pr"gram S"!t)are Anit and Integrati"n # %est (ase Scenari"s # %est .ata

%&reat Identi!icati"n Res"urce

%esting and Implementati"n


# Per!"rm System Acceptance %esting $ (est or 1alidation Result Re!ort # Security %est Results

P"st#.evel"pment
1. ."cument all security activities 2. Per!"rm security "perati"ns and administrati"n a. Per!"rm $ackups $. Pr"vide security training c. 4aintain G revie) user admin G access privileges d. Apdate security s"!t)are as re'uired e. Apdate security pr"cedures as re'uired . Per!"rm "perati"nal assurance a. Per!"rm G d"cument peri"dic security audits $. Per!"rm G d"cument m"nit"ring "! system security c. *valuate G d"cument results "! security m"nit"ring d. Per!"rm G d"cument c"rrective acti"ns

e. %est c"ntingency plans "n a regular $asis f. Perform Risk Assessment and u!date Security Plan" as needed" 5ith each configuration change or e#ery year
:. ."cument disp"sal "! in!"rmati"n ;. Ase c"ntr"ls t" ensure c"n!identiality "! in!"rmati"n

Identify -ulnera.ilitie$

Risk Assessment +Risk .eterminati"n

HIPAA Security Risk Assessment Guidelines v1.0 April 28, 200

Page 18

and Sa!eguard *valuati"n,

Implementati"n $ System Security Risk Assessment # System Security Plan

System Security Plan

Risk Assessment and System Security Plan

Eperati"ns G 4aintenance
$ A!dated Risk Assessment $ A!dated System Security Plan

HIPAA Security Risk Assessment Guidelines v1.0 April 28, 200

Page 1>

A!!endi2 /& Assessment (eam )em*ers and .unctions


-uncti"nal R"le Risk Assessment 4anager 9ackgr"und .rives t&e risk assessment pr"cess, c""rdinates tasks, delivera$les and sc&edule, c"mp"ses t&e rep"rt )it& input !r"m all team mem$ers. Eperates and maintains t&e system !r"m a tec&nical, day#t"# day standp"int8 usually t&e BPrimary System ("ntactC in t&e Sy$tem Identification ta$le. Anderstands t&e tec&nical c"mp"nents "! t&e system, $ut )as n"t inv"lved in designing, $uilding "r "perating t&e system $eing assessed. Resp"nsi$le !"r t&e system, "r t&e services it pr"vides, !r"m a $usiness "r cust"mer standp"int8 understands t&e system3s purp"se $ut n"t necessarily t&e details "! its tec&nical implementati"n. Has supervis"ry resp"nsi$ility !"r t&e "perati"n "! t&e system. *0ecutive management#level resp"nsi$ility !"r t&e system. Resp"nsi$le !"r t&e agency3s security p"licies and "$2ectives, and its "verall risk pr"!ile. Ergani7ati"n *mail P&"ne

System "r net)"rk administrat"r

%ec&nical Revie)er

System $usiness ")ner

System tec&nical ")ner *0ecutive sp"ns"r In!"rmati"n security "!!icer

HIPAA Security Risk Assessment Guidelines v1.0 April 28, 200

Page 20

A!!endi2 D& Information Security Risk Assessment (em!late


1.0 System Documentation
%,% System Identification Agency ?ame E!!icial System ?ame System Acr"nym System 9usiness E)ner System %ec&nical E)ner System Security E)ner Additi"nal System Stake&"lders

System /"cati"n -ull Address ("ntract ?um$er, ("ntract"r names, p&"ne num$ers and emails, i! applica$le System type+s, +main!rame, applicati"n 1 data$ase 1 net)"rk 1 !ile server, )"rkstati"n, Primary System ("ntact+s,, ?ame and %itle +usually t&e system administrat"r, Ergani7ati"n ?ame -ull Address *mail Address P&"ne and pager num$ers

%,2 System Pur!ose and Descri!tion -uncti"n and purp"se "! t&e system

General !uncti"nal re'uirements

9usiness pr"cesses, applicati"ns and services supp"rted System c"mp"nents *nvir"nmental !act"rs ?et)"rk diagram )it& system $"undaries +attac&, General in!"rmati"n !l")

HIPAA Security Risk Assessment Guidelines v1.0 April 28, 200

Page 21

%ec&nical and $usiness users +list, System ")ners&ip +s&ared "r dedicated,

%,3 Information Security 0e#els and +#erall System Security 0e#el In!"rmati"n (ateg"ry In!"rmati"n Security /evel In!"rmati"n (ateg"ry In!"rmati"n Security /evel In!"rmati"n (ateg"ry In!"rmati"n Security /evel Everall System Security /evel

".0 Risk Determination


2,; Risk Determination (a*le
Item No, (hreat Name 1ulnera$ *ility Name Risk Descri!$ tion -2isting /ontrols 0ikeli$ hood of +ccur$ rence Im!act Se#erity Risk 0e#el

HIPAA Security Risk Assessment Guidelines v1.0 April 28, 200

Page 22

#.0 Sa!e$uard Determination


3,; Safeguard Determination (a*le Item No, 9from Risk Determination (a*le: Recommended Safeguard Descri!tion Residual 0ikelihood of +ccurrence Residual Im!act Se#erity Residual Risk 0e#el

Si$natures
Su$mitted $y6 55555555555555555555555 .ate6 555555555 Risk Assessment 4anager

Revie)ed $y6 H%itleI

55555555555555555555555 .ate6 555555555

Appr"ved $y6 H%itleI

55555555555555555555555 .ate6 555555555

HIPAA Security Risk Assessment Guidelines v1.0 April 28, 200

Page 2

You might also like