Future of Healthcare: The Transforming Healthcare Industry [Free Download]

The healthcare environment is extremely dynamic, forcing organizations to find the right solution to match the rising challenges. Many of these solutions introduce new and emerging technologies, leaving healthcare organizations with increased vulnerabilities. Healthcare organizations of every size and type can be breached, so exploring every security solution is critical. In 2016, major cyber-attacks on healthcare increased by 63%, resulting in 93 major cyber-attacks including:

  • Banner Health – 3.6 million records
  • Newkirk Products – 3.4 million records
  • 21st Century Oncology – 2.2 million records

As we move closer to year-end, many organizations begin strategic planning for 2018. Security and privacy statistics within healthcare underline new trends including emerging threats and evolving regulations. Considering these potential industry challenges, which are anticipated to grow in size and severity, A-LIGN has released Future of Healthcare: The Transforming Healthcare Industry.

This whitepaper can be used as a guide to educate your organization and its employees to begin appropriately preparing for 2018 security and compliance initiatives by providing valuable insights, regarding the industry, regulations, and the security measures your organization can enact to prevent and protect against a potential cyber-attack. A-LIGN’s experienced assessors have more than 20 years of experience in the data protection and security industry, and intimately understand the environment from both the client and assessor perspective.

“As we monitor and analyze the current healthcare landscape, it’s apparent that many organizations are becoming vulnerable to new and emerging risks. Therefore, we seek to empower our clients through education and security audits, to prevent them from becoming a victim of a cyberattack and enhancing their information security,” said Steve Simmons, HITRUST Assessor Council Board Member and Director of Compliance at A-LIGN.

The Future of Healthcare: The Transforming Healthcare Industry whitepaper provides your organization:

  • An overview of the security and privacy landscape within healthcare including trends, statistics, and potential risks
  • A review of the evolving healthcare regulations, specifically HITRUST, it’s recent revisions and the 2017 roadmap
  • A description of compliance and audit solutions configured for both the healthcare industry and HITRUST regulation

To tackle information security challenges, organizations must begin to take the first step to protecting their data. Click here to download A-LIGN’s whitepaper, Future of Healthcare: The Transforming Healthcare Industry.

Ask an Assessor: Death Master File

The Death Master File (DMF) is a protected file that includes information regarding the deceased such as:

  • Name
  • Date of Birth
  • Date of Death
  • Social Security Number

Since November 28, 2016, organizations have faced a stricter certification process to be granted access to the DMF. In that time, A-LIGN has served as an Accredited Conformity Assessment Body (ACAB) that has submitted written attestation to validate that the appropriate controls are in place to maintain the confidentiality and security of DMF information. Senior Manager, Sue Wells, took the time to discuss the challenges that organizations face when seeking DMF certification and how A-LIGN can help.

Learn more: Becoming Certified to Access the Limited Access Death Master File

Death Master File FAQ

What lessons have we learned from our DMF successes, as assessors, that we can utilize to help future clients that require DMF access?

Some of our DMF clients have never had any type of audit before, so there is a learning curve for those organizations to understand the process, such as document requests. For organizations that have never been certified before, they need to understand the steps to achieve certification:

  1. A-LIGN conducts testing against the approved standard.
  2. Once testing is complete, organizations must go to the National Technical Information Service (NTIS) website to pay the required fees. Organizations pay $1,575 annually for certification to NTIS, and an additional $525 every 3 years when 3rd party certification must be completed again. These fees are separate from those paid to the ACAB for attestation, as they are paid directly to NTIS. Once fees are paid, the organization will be provided a processing number.
  3. From there, organizations must obtain the attestation form from the NTIS website and provide A-LIGN with the processing number to complete the attestation.
  4. A-LIGN files the attestation documentation.

What information do companies seeking DMF certification need to know regarding their vendors and how they may impact their ability to be certified?

If significant technical safeguards used to protect the DMF are provided by a third-party, they may have to obtain information directly from that third party to provide to A-LIGN, as the DMF attestation form does not provide for the ability to carve-out other organizations. In this event, the technical safeguards would need to be verified.

What standards can organizations certify against?

Since 2015, A-LIGN has successfully helped several organizations achieve certification by certifying against standards such as SOC 2, PCI DSS, and NIST 800-53.

Helping You Achieve DMF Certification

NTIS can conduct both scheduled and unscheduled compliance audits, and organizations that fail to comply with the set provisions may be subject to fines of up to $250,000 per year. As an ACAB, A-LIGN can attest to your organization’s ability to protect DMF information. We have extensive experience in testing the required controls and can guide your organization through the certification process with ease.

Have questions about accessing the DMF? Contact us at info@a-lign.com or call 1-888-702-5446 to have an experienced assessor answer your questions regarding DMF certification.

[Webinar] A-LIGN Presents: Using HITRUST CSF v9 to Meet Your Compliance Requirements

A-LIGN, a global information security and cyber risk advisory, and compliance solutions provider, is committed to staying current on emerging regulations and changes in security frameworks. On September 19, A-LIGN Managing Consultant and HITRUST CCSFP, Blaise Wabo, will host a HITRUST webinar called Using HITRUST CSF v9 to Meet Your Compliance Requirements, to educate healthcare organizations on the changes announced in HITRUST CSF v9. You can register for the webinar here.

See also: Preparing for HITRUST CSF v9 Enhancements

Blaise Wabo will lead this webinar by addressing the healthcare risk environment, citing the emerging trends and technologies that make standards like HITRUST necessary, review the incorporation with guidance such as the FFIEC Information Security Examination Handbook, and observe how HITRUST can be used to support regulatory need.

“As technology in the healthcare industry evolves and hackers become more sophisticated, it’s important that organizations and their business associates adapt their security programs to efficiently manage regulatory compliance and risk management. The updates to HITRUST CSF v9 helps maintain relevance by addressing new and emerging risks faced by the healthcare industry,” said Blaise Wabo.

HITRUST Resources

A-LIGN has published numerous resources to assist organizations navigate the compliance lanscape, including a whitepaper called How HITRUST Mitigates the Challenges Facing Healthcare, illustrating how HITRUST can be implemented to minimize risk and alleviate pain points found in healthcare organizations.

“Our goal is to help simplify security solutions, such as HITRUST to help healthcare organizations achieve their compliance initiatives. By monitoring industry trends and providing educational resources, we can empower organizations and help them protect against the evolving information security risks within healthcare,” said Director of Compliance, Steve Simmons.

See also: Which HITRUST Assessment Scope Is Right for My Organization?

Statistics show an exponential growth in data breaches within the healthcare industry with projected continuous growth throughout 2018. To tackle information security challenges, organizations must begin to take the first step to protecting their data.

Are you looking for more information on HITRUST CSF and ways to build a security program at your healthcare organization? Contact the security professionals at A-LIGN at info@a-lign or 888-702-5446 to find out how we can help.

Register for the webinar here: http://bit.ly/2x1YOm1  

Back to Basics: What is HITRUST?

What is HITRUST?

A-LIGN’s HITRUST Assessors are often asked: What is HITRUST and why do I need it? As healthcare organizations face stricter regulatory needs in light of an increase in healthcare-related breaches, many organizations are considering HITRUST as an option for risk management and mitigation.

What is HITRUST?

HITRUST, or the Health Information Trust Alliance, was created in order to develop a consistent system for healthcare organizations and business associates to manage information security. The scalable framework is valuable to any organization that creates, accesses, stores or exchanges personal health information or financial information.

HITRUST uses many existing standards and regulations as a framework, such as HIPAA, HITECH, PCI DSS, COBIT, NIST, ISO and more. By utilizing a variety of standards, the HITRUST Common Security Framework (CSF) offers extensive certification options for organizations.  These include a variety of different implementation requirements that depend on the risks that your organization faces, as well as prescriptive requirements that ensure clarity. Controls can be modified based on organization size and type, system and regulatory requirements.

Watch: Putting the Pieces Together: What is HITRUST and How Does It Fit into the Compliance Puzzle?

Who requests that I become HITRUST certified?

Organizations are typically asked by their partners and/or business associates to provide a CSF Assurance report. For example, large healthcare organizations such as Anthem Inc., Health Care Services Corp., and Highmark Inc., are requiring that their business associates take steps to become HITRUST CSF compliant.

Why do I have to do it?

Many organizations require that their business associates and partners utilize HITRUST as a consistent information security system. As a result, becoming HITRUST compliant allows your organization a point of differentiation amongst competition.

Additionally, becoming HITRUST compliance allows your organization to minimize the risk of a potential breach, which can be damaging to client relationships and the reputation of your organization. Click here to learn more about our HITRUST services.

Interested in learning more about HITRUST? Contact one of our certified HITRUST practitioners at info@a-lign.com or 1-888-702-5446.

HITRUST Assessment Scoping Guidelines

HITRUST-assessmentWe are asked routinely “which controls will A-LIGN test as part of the HITRUST assessment?”.  The answer to that question depends on the environment and the outcome of the scoping process.  Scoping occurs in the initial phases of your HITRUST assessment process in order to determine which controls will be included in your assessment.

When determining the scope of an assessment, there are three major factors that affect the risk within an organization. These are the type and size of an organization, the system that is being utilized, and what external regulations affect the organization. In combination, these three factors determine the appropriate implementation requirements.

However, one of the first things an organization should determine before attempting to configure their scope is why they are seeking HITRUST compliance. Are they seeking to satisfy the requirements of business associates? Are they looking to utilize the certification to demonstrate their level of information security and increase marketability through differentiation? Is it a regulatory requirement?

By determining this information, it makes the scoping process much easier by developing a better understanding of the needs of your organization and those affected by its decision to receive a HITRUST assessment.

Type and Size of an Organization

The type and size of the organization affects the risk and complexity of the organization being assessed.  The organizational factors impact the controls which are included in the scope.  This is driven by the volume of business, which is determined by factors such as the number of transactions or number of records.  It is also driven by the geographic location of the organization, whether in one state, multiple states or even global.

It may be helpful for large companies to break down the organization into the different business units. Because many healthcare organizations have many different functions within the entity, they should be broken down by their distinct operational differences. At times, it is also necessary to separate the organization by geographic segments in order to more appropriately comply with regional differences in regulation.

Systems in Use

Once the organizational size and type are clear, determining which systems are in use is the next step. When referring to the systems that are in use, focus on those that are used in the transmission, storage, or processing of electronic protected health information (ePHI) or other types of PHI.

Important factors include the accessibility of the systems:

  • From the Internet or other remote access operation.
  • Through a third-party of any kind.
  • From any public location.
  • From other systems.

Regulatory Factors

Regulatory factors have also affect the scope of the assessment and can be dependent on geographic determinations, as well as the other compliance needs of an organization.  For example, if the organization also processes payment card data, the PCI DSS standard may be included in scope, or a state specific data security standard may be included in the assessment.

Setting the proper scope is an important first step when pursuing HITRUST certification.  The scope drives the subsequent steps in the process.  If you have questions or would like additional information on HITRUST or how to establish the proper scope, please contact one of A-LIGN’s HITRUST CSF assessors to learn more.

Interested in learning more about HITRUST?

Contact one of our certified HITRUST practitioners at info@a-lign.com or 1-888-702-5446

An Overview of the HITRUST CSF and Related Frameworks

HITRUST-CSF
The HITRUST CSF is a comprehensive, certifiable security framework that pulls from HIPAA/HITECH, ISO 27001, NIST SP 800-53, COBIT, and PCI DSS, combining them to create a powerful framework.

The HITRUST CSF provides an integrated, prescriptive framework that works with the needs of the healthcare industry in order to comply with the necessary standards. This framework is able to be scaled for the various sizes and types of organizations and their control systems. It also allows for the tailoring and scaling of controls with HITRUST oversight to ensure that the integrity of the systems remain in-tact and application remains consistent.

The HITRUST CSF and ISO 27001

HITRUST recognizes the complex, global nature of healthcare industry and the need for an industry-specific approach to information protection. Because of this, ISO/IEC 27001 was chosen as the foundation from which the HITRUST CSF was built upon due to its place as an international standard for information security that could be modified and implemented for any organization.

ISO 27001 differs greatly from the HITRUST CSF, as ISO 27001 is not control-compliance based, but is instead a management/process model for the Information Management System that is assessed. One of the major benefits of the HITRUST CSF over ISO 27001 is the ability to select and create practical controls. While ISO 27001 does have the ability to tailor controls in order to better-fit organizations who cannot implement a specific control, but it is not as complete in its ability to be tailored or scaled.

The HITRUST CSF and NIST 800-53

The HITRUST CSF also pulls from NIST SP 800-53, which was designed for United States government agencies. However, the standards are applicable to many different types of organizations. One of the key differences between NIST 800-53 and the HITRUST CSF is that NIST 800-53 does not address the specific needs within the healthcare industry.

Both NIST 800-53 and HITRUST CSF are compliance solutions that assess a set of controls through gap analysis of any controls considered within the scope for the organization or system.

One of the issues with NIST 800-53 that the HITRUST CSF takes care of is the ability to scale controls to the specific organization. NIST 800-53 has no formal mechanism for an organization to do so. NIST 800-53 does have the ability to tailor controls in certain situations when an organization is unable to implement a specific control, though it is more limited than the HITRUST CSF.  However, this is limited because NIST 800-53 defines control parameters based on the highest potential impact, regardless of the size or type of organization.

The HITRUST CSF and PCI DSS

PCI DSS is a payment card industry standard used to protect payment card data. Founded by the five major card brands, Visa, MasterCard, American Express, Discover and JCB, PCI DSS defines controls to enhance credit and debit card security.

In many ways, HITRUST has used this type of methodology in the creation of the HITRUST healthcare standard. HITRUST receives input from their board of directors, who are industry experts from major healthcare organizations, to tailor the framework to the industry’s needs.

Overview

While there are a variety of different audit options for any organization, the HITRUST CSF provides scalable, prescriptive solutions for organizations of any type. By pulling from major pre-existing frameworks and working with healthcare organizations to better-understand their needs, the HITRUST CSF provides a complete, certifiable security standard.

Looking for the right healthcare compliance solution for your organization?

Talk to one of our HITRUST professionals now by emailing info@a-lign.com or call 1-888-702-5446

HITRUST Assessment Types & HITRUST Integration with SOC 2

Don’t make the climb to compliance more difficult than it has to be. With a comprehensive framework for organizations of any size, system or regulatory requirement, the HITRUST CSF allows for organizations to easily assess their current compliance while providing implementation requirements based on an organization’s risk factors.

Types of HITRUST Assessments

HITRUST has two methods to approach complying with the HITRUST CSF with each providing their own unique benefits, depending on the needs of an organization. They include the Self-Assessment, and a Validated Assessment, which leads to HITRUST certification. They each function on varying degrees of assurance based on the cost, effort-level, and time required. The benefits of any type of HITRUST CSF Assessment include:

  • Scalability for organizations of any size
  • Allows for organizations to understand their current level of compliance with the CSF and areas of general risk

HITRUST Self-Assessment

The HITRUST MyCSF is designed to be completed by an organization in order to minimize time and resources when demonstrating compliance with the CSF. The self-assessment can also be used as a stepping stone to a validated assessment. The benefits include:

  • Low to medium level of effort needed to complete
  • Can be quickly completed

However, one of the disadvantages of completing a self-assessment report is that it provides the lowest level of assurance, as no validation comes from the self-assessment: it simply results in a HITRUST issued CSF Self-Assessment report.

Validated Assessment

A Validated Assessment is a more rigorous assessment process, with an increase in assurance level performed by a CSF assessor firm to validate the information gathered by the organization. One of the benefits of receiving a CSF validated assessment includes providing an increased assurance level to the relying entity.

The process is more rigorous due to on site testing at the entity to be performed by an authorized CSF assessor. A validated assessment requires a medium to high level of effort for completion, due to the on-site time and rigorous testing procedures. Upon completion, HITRUST reviews the complete assessment and issues a Validated Report as the outcome if the organization has failed to receive a rating of 3 or higher on any of the controls.

Certified Assessment

While an organization goes through the same audit-process when receiving either a validated assessment or a certified assessment, becoming HITRUST certified means that the organization received at least a 3 on HITRUST’s scale and has shown a high-level of maturity.

The benefits of receiving a CSF certified assessment include:

  • The report is good for 2 years, with an interim assessment completed at the one-year mark.
  • Provides the most complete assurance level certified by HITRUST. The organization that receives a certified assessment must meet all of the certification requirements of the CSF.

A certified assessment is only earned once an organization successfully demonstrates that they are able to meet all of the controls in the CSF required for certification at the appropriate level based on organizational needs.

Integration with SOC 2

What is SOC 2?

SOC 2 reports describe the internal controls at a service organization, based on the AICPA’s Trust Principles:

  • Common Criteria (Security)
  • Availability
  • Processing Integrity
  • Confidentiality
  • Privacy

SOC 2 reports provide users with management assertions, a description of both the system and the controls, tests and the results of the tests, and the independent service auditor’s report.  The SOC 2 is widely used by service organizations that provide services to other business entities.

HITRUST and the American Institute of Certified Public Accountants (AICPA) have developed a collaborative approach that aligns the AICPA’s Trust Principles with the HITRUST CSF criteria.  This allows licensed CPA firms, who are also CSF assessor firms to issue a SOC 2 plus HITRUST report that includes both the SOC 2 criteria and HITRUST CSF.  This makes HITRUST and SOC 2 complementary services through this converged reporting model. The benefits for your organization include:

  • Save time
  • Save on costs
  • Gain efficiency
  • Increase your client satisfaction

This streamlining process allows organizations to simplify the process of leveraging their HITRUST CSF for SOC 2 reporting.

Is HITRUST implementation right for your organization?

Contact us today at info@a-lign.com or call 1-888-702-5446 to find out your options for data protection and compliance.

Understanding the HITRUST Specification and Scoring

HITRUST’s Risk Management Framework

In order for an organization to better assess potential risks and create safeguards for adequate protection of potentially sensitive information, HITRUST has created a comprehensive risk management framework that supports a basic 4-step process:

  1. Identify risks and define the protection requirements
  2. Specify controls
  3. Implement and manage controls
  4. Assess and report

A-LIGN’s HITRUST experts will cover the implementation and certification requirements of HITRUST.

Implementation Requirements

Risk Levels

Implementation levels are built upon three unique risk factors:

  1. Organization factors

For example, the type of organization, or the size of the organization.

  1. System factors

For example, internet connections, or the use of mobile devices in the organization.

  1. Regulatory factors

For example, state or specialized industry requirements.

The risk levels are placed into three different designations (Level 1, Level 2, and Level 3) dependent on the complexity and risk systems within the organization. Because of this, organizations would not have consistent levels across the board. The prescriptive system is as follows:

Level 1

This is the minimum security requirement set for any system, of any size and serves as a baseline for the industry in order to meet all HIPAA Security Rule requirements.

Level 2

All of the functionality and control of Level 1, but with additional functionality and/or an increase in the strength of a Level 1 control. Level 2 is only required for an organization that has a system with an increased risk due to the complexity of their organization, system or regulatory factors.

Level 3

All of the functionality and control of Levels 1 and 2, but with additional functionality and/or an increase in the strength of Level 1 and 2 controls. Level 3 is only required for an organization that has a system with an increased risk due to the complexity of their organization, system or regulatory factors.

Certification Requirements

HITRUST-scoring-graph

Each section is scored as a percentage of your final score. Scores are determined through the percentages available in Figure 1.

HITRUST-Scoring

To receive a final score, you multiply the scoring category percentage (Fig. 1) by the score (Fig. 2). For example:

HITRUST-Scoring-chart

In the sample, the organization would serve a 68.75 in the access controls section. This percentage is then converted into a 15-level maturity rating in order to find your final score.

HITRUST-final-Scoring

In the example from Figure 3, a score of a 68.75 would merit a maturity level of 3.

In order to receive a certified report, each domain MUST score at least a 3 on the HITRUST’s 1- to 5+ scale. If you do not earn a score of 3+ or higher, you will raise a Corrective Action Plan (CAP). You can still be certified with CAPs as long as the overall score of the domain is a 3. Any domains that do not receive at least a 3 will result in the generation of a validated report.

There are 64 controls required for certification, and the focus should be on continual improvement in all control groups.

Corrective Action Plans (CAPs)

Once HITRUST has delivered an organization’s draft report, certification CAPs will be entered into the tool. Basic Cap management functionality will be opened up for any organization that does not have the CAP management module. CAPs at that point can be entered for each control identified as deficient. Once the CAP is reviewed by HITRUST, the modifications are added to the next draft version of the HITRUST report.

Need more information or have further questions about HITRUST scoring? 

Talk to one of our HITRUST professionals now by emailing info@a-lign.com or call 1-888-702-5446.

The Challenges Facing Healthcare & How HITRUST Can Help

The Healthcare industry currently faces strict regulatory needs, causing many challenges when considering the options for risk management and mitigation. These challenges include but are not limited to:

  • Inconsistent implementation of acceptable minimum controls.
  • Inefficiencies associated with varying interpretation of control objectives and safeguards.
  • Increasing scrutiny from regulators, auditors, underwriters, customers and business partners.
  • Growing risk and liability including data breaches, regulatory violations and extortion.
  • Public and regulatory concern over industry breaches.
  • Inability to implement security in medical devices and applications.
  • Rapidly changing business, technology, and regulatory environment.

In order to mitigate these challenges, HITRUST can be implemented to minimize risk and alleviate healthcare pain points.

What is HITRUST?

HITRUST, or the Health Information Trust Alliance, was established to create a certifiable standard to approach regulatory compliance and risk. Developed in collaboration with healthcare and security professionals, this framework provides a comprehensive, flexible and consistent system to address compliance and manage risk. Because of this, it is the most widely adopted framework in the healthcare industry.  Controls can be tailed based on the following factors:

  • Organization size and type
  • System complexity and use
  • Regulatory requirements

At its core, the HITRUST CSF (Common Security Framework) is built upon other standards and authoritative sources relevant to the healthcare industry, including ISO 27001, NIST SP 800-53 Rev4, HIPAA: Security, Breach and Privacy rules, and can be completed according to SOC 2 criteria. In compiling these standards, HITRUST is able to align existing controls and requirements from standards, regulations, business and third-party requirements by incorporating compliance and risk management principles. HITRUST supports CSF certification and defines a process to effectively and efficiently evaluate security and compliance risk, which includes the HIPAA Final Rule Requirement.  Annual updates to the HITRUST framework are based on:

  • New security standards and regulations
  • Changes to existing authoritative sources
  • Breach data
  • Industry feedback, best practices and lessons learned.

Advantages of HITRUST Implementation

Consistent.  With a single benchmarking method, HITRUST leverages and enhances existing standards and regulations to provide organization of any size with prescriptive implementation requirements.

Efficient.  Obtains industry consensus and incorporates best practices on the most effective way to address information security.

Cost-reducing.  With a single, unified approach to compliance across the organization, it allows service organizations to be assessed once, and reported often.

Risk-minimization.  The facilitation of internal and external measurement incorporates existing healthcare compliance requirements. Implementation increases trust and transparency among business partners and consumers.

Is HITRUST implementation right for your organization?  

Contact us today at info@a-lign.com or call 1-888-702-5446 to find out your options for data protection and compliance.