SlideShare a Scribd company logo
1 of 3
Download to read offline
1
Chapter 7
Simplify and Focus Security Risk Assessments
Here is some advice on Security Risk Assessment, from a national expert. Health Security Solutions' SRA results have been reviewed
by Figliozzi’s auditors on multiple occasions, and have always passed muster. If it is your cost-effective, right-sized rigor that gives
you "compliance comfort", we highly recommend their advice.
Reproduced Courtesy of Health Security Solutions, November 2013
Many eligible providers (EP) are racing to fulfill Meaningful Use requirements as their second year of attestation under Stage 1 draws
to a close. Along with meeting certain thresholds and objectives related to increased patient engagement and improved patient care,
Meaningful Use also requires providers to “conduct or review” a security risk analysis each year of attestation.
When attesting to Stage 1 of Meaningful Use, EP’s are required to conduct a security risk analysis during or prior to the initial 90 day
meaningful use reporting period. According to the language of the Meaningful Use Stage 1 Core Set of Objectives, EP are required to
“conduct or review a security risk analysis… and implement updates as necessary and correct identified security deficiencies as part of
the… risk management process.” The keyword in this core objective statement is review. The language within Meaningful Use and
HIPAA allows EP to perform a review of a previous risk analysis instead of conducting a novel risk analysis each year of attestation.
Performing a review allows EP’s to build upon previous work to determine what (if any) changes to policies and procedures should
occur.
Review vs. Risk Analysis
Determining whether to perform a risk analysis or a review can be a challenge. The first step is to understand the difference between a
security risk analysis and a review. A full security risk analysis evaluates how and where patient information is stored, as well as the
security of stored protected health information (PHI). Final risk analysis reports typically identify assets, threats, vulnerabilities, and
include an impact and likelihood assessment and a risk results analysis. Following a security risk analysis, EP’s should able to use the
provided report to determine the appropriate controls, policies and procedures needed to protect patient information and the devices on
which it is stored.
2
A “review” is carried out based on a previously completed, proficient risk analysis. In order to conduct a review of a risk analysis, EP
must have previously performed a comprehensive security risk analysis. It is impossible to perform an adequate review without first
having the sound foundation of a good risk analysis. A review then evaluates any changes that have occurred since the initial risk
analysis was performed, including added equipment involved in the storage of PHI, changes in office facilities or locations, or new
software systems. Once a review is completed, it should provide the EP with guidelines for further improving the security of PHI
based on a list of threats and vulnerabilities identified during the review.
When is a Review Appropriate?
So how should eligible providers determine whether to perform a full risk analysis or a review? A review is admissible by Meaningful
Use and HIPAA standards based on the idea that security is iterative, i.e., continually adding on to what has been done before.
Therefore, the ability to perform a review as opposed to a full risk analysis hinges upon the adequacy of any previous risk analyses. A
good risk analysis should include inventory of PHI storage devices, identification and prioritization of risks to PHI on the EP’s
network, as well as a reasonable set of policies and procedures necessary to secure patient information. If the EP has previously
conducted an adequate [S1] risk analysis, then a proper review can be carried out.
How do I perform a Review?
Since providing adequate security for PHI is an ongoing process, a proper review involves looking at previous risk analyses and
examining what, if anything has changed since the risk analysis was performed. EP should ask questions such as:
Do I have any new IT assets that should be added to inventory? Specifically, those IT assets in which PHI resides.
Have there been any policy changes since the previous risk analysis? Should these changes be reviewed?
Is there any reason to believe that policies created based on the previous risk analysis should be changed, i.e., have any
security incidents occurred?
If a security breach has occurred, is there a security incident response and reporting procedure that can help identify potential
causes? If so, how can the risk of similar security incidents be mitigated?
Has the business changed locations, added square footage, or carried out significant structural remodeling?
Are we using the same hardware platforms, operating systems, and software programs as during the previous risk analysis?
3
Even with an appropriate risk analysis, review of that risk analysis is not always sufficient for compliance with Meaningful Use Stage
1 requirements. Answers to several of the aforementioned questions can indicate the need for a full risk analysis as opposed to a
review. For example, if an EP’s business has moved locations or the office layout has significantly changed, or if hardware or software
used to manage and store PHI has changed, a full risk analysis may be necessary to elucidate security vulnerabilities at the new facility
or in the new IT systems.
Ultimately, evaluation of every aspect of the original risk analysis is necessary for conducting an adequate review. The review should
incorporate assessment of overall changes in the environment and a methodical consideration of the security risks associated with
those changes. As with every aspect of Meaningful Use attestation and HIPAA compliance, the review should be thoroughly
documented, referencing the prior risk analysis. Each review should result in an additional list of threats and vulnerabilities that can be
added to the Security Management Plan as required by the second HIPAA Security rule.
Recommendations
The language of Meaningful Use allows for the performance of a review, as opposed to a full security risk analysis, in the following
year or two after the initial attestation. If a proper risk analysis was performed the first year, EP can build on the foundation of that
risk analysis to improve security practices in subsequent years. However, most security experts recommend that every covered entity
do a full risk analysis every two to three years.
Update
Since this article was initially published, ONC has published their own tool. The ONC tool provides a structured database designed
for small and mid-sized providers to conduct and document annual Security Risk Assessments. Given the authorship of the tool,
providers should have a high level of confidence in the acceptability of a SRA conducted using it. For more information, see
http://www.healthit.gov/providers-professionals/security-risk-assessment.

More Related Content

Viewers also liked

10 Daily office struggles - and how to overcome them
10 Daily office struggles - and how to overcome them10 Daily office struggles - and how to overcome them
10 Daily office struggles - and how to overcome themGetSmarter
 
10 steps to your career makeover
10 steps to your career makeover10 steps to your career makeover
10 steps to your career makeoverGetSmarter
 
17 Things Powerful People Say
17 Things Powerful People Say17 Things Powerful People Say
17 Things Powerful People SayGetSmarter
 
Tarea del seminario 3
Tarea del seminario 3Tarea del seminario 3
Tarea del seminario 3miguealfaro
 
11 Ways to be Seen as a Leader at Work (Even if it's not in Your Title)
11 Ways to be Seen as a Leader at Work (Even if it's not in Your Title)11 Ways to be Seen as a Leader at Work (Even if it's not in Your Title)
11 Ways to be Seen as a Leader at Work (Even if it's not in Your Title)GetSmarter
 

Viewers also liked (6)

10 Daily office struggles - and how to overcome them
10 Daily office struggles - and how to overcome them10 Daily office struggles - and how to overcome them
10 Daily office struggles - and how to overcome them
 
"A STUDY ON COMMODITY MARKET"
"A STUDY ON COMMODITY MARKET""A STUDY ON COMMODITY MARKET"
"A STUDY ON COMMODITY MARKET"
 
10 steps to your career makeover
10 steps to your career makeover10 steps to your career makeover
10 steps to your career makeover
 
17 Things Powerful People Say
17 Things Powerful People Say17 Things Powerful People Say
17 Things Powerful People Say
 
Tarea del seminario 3
Tarea del seminario 3Tarea del seminario 3
Tarea del seminario 3
 
11 Ways to be Seen as a Leader at Work (Even if it's not in Your Title)
11 Ways to be Seen as a Leader at Work (Even if it's not in Your Title)11 Ways to be Seen as a Leader at Work (Even if it's not in Your Title)
11 Ways to be Seen as a Leader at Work (Even if it's not in Your Title)
 

Recently uploaded

Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...Aggregage
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxWorkforce Group
 
Business Model Canvas (BMC)- A new venture concept
Business Model Canvas (BMC)-  A new venture conceptBusiness Model Canvas (BMC)-  A new venture concept
Business Model Canvas (BMC)- A new venture conceptP&CO
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangaloreamitlee9823
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Centuryrwgiffor
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...amitlee9823
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentationuneakwhite
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsP&CO
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with CultureSeta Wicaksana
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756dollysharma2066
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Sheetaleventcompany
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Serviceritikaroy0888
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMANIlamathiKannappan
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Dave Litwiller
 
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...allensay1
 

Recently uploaded (20)

Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
Business Model Canvas (BMC)- A new venture concept
Business Model Canvas (BMC)-  A new venture conceptBusiness Model Canvas (BMC)-  A new venture concept
Business Model Canvas (BMC)- A new venture concept
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service BangaloreCall Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
Call Girls Hebbal Just Call 👗 7737669865 👗 Top Class Call Girl Service Bangalore
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
Call Girls Kengeri Satellite Town Just Call 👗 7737669865 👗 Top Class Call Gir...
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
Value Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and painsValue Proposition canvas- Customer needs and pains
Value Proposition canvas- Customer needs and pains
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
 
Call Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine ServiceCall Girls In Panjim North Goa 9971646499 Genuine Service
Call Girls In Panjim North Goa 9971646499 Genuine Service
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
Falcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in indiaFalcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in india
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
 

Simplify and Focus Security Risk Assessments

  • 1. 1 Chapter 7 Simplify and Focus Security Risk Assessments Here is some advice on Security Risk Assessment, from a national expert. Health Security Solutions' SRA results have been reviewed by Figliozzi’s auditors on multiple occasions, and have always passed muster. If it is your cost-effective, right-sized rigor that gives you "compliance comfort", we highly recommend their advice. Reproduced Courtesy of Health Security Solutions, November 2013 Many eligible providers (EP) are racing to fulfill Meaningful Use requirements as their second year of attestation under Stage 1 draws to a close. Along with meeting certain thresholds and objectives related to increased patient engagement and improved patient care, Meaningful Use also requires providers to “conduct or review” a security risk analysis each year of attestation. When attesting to Stage 1 of Meaningful Use, EP’s are required to conduct a security risk analysis during or prior to the initial 90 day meaningful use reporting period. According to the language of the Meaningful Use Stage 1 Core Set of Objectives, EP are required to “conduct or review a security risk analysis… and implement updates as necessary and correct identified security deficiencies as part of the… risk management process.” The keyword in this core objective statement is review. The language within Meaningful Use and HIPAA allows EP to perform a review of a previous risk analysis instead of conducting a novel risk analysis each year of attestation. Performing a review allows EP’s to build upon previous work to determine what (if any) changes to policies and procedures should occur. Review vs. Risk Analysis Determining whether to perform a risk analysis or a review can be a challenge. The first step is to understand the difference between a security risk analysis and a review. A full security risk analysis evaluates how and where patient information is stored, as well as the security of stored protected health information (PHI). Final risk analysis reports typically identify assets, threats, vulnerabilities, and include an impact and likelihood assessment and a risk results analysis. Following a security risk analysis, EP’s should able to use the provided report to determine the appropriate controls, policies and procedures needed to protect patient information and the devices on which it is stored.
  • 2. 2 A “review” is carried out based on a previously completed, proficient risk analysis. In order to conduct a review of a risk analysis, EP must have previously performed a comprehensive security risk analysis. It is impossible to perform an adequate review without first having the sound foundation of a good risk analysis. A review then evaluates any changes that have occurred since the initial risk analysis was performed, including added equipment involved in the storage of PHI, changes in office facilities or locations, or new software systems. Once a review is completed, it should provide the EP with guidelines for further improving the security of PHI based on a list of threats and vulnerabilities identified during the review. When is a Review Appropriate? So how should eligible providers determine whether to perform a full risk analysis or a review? A review is admissible by Meaningful Use and HIPAA standards based on the idea that security is iterative, i.e., continually adding on to what has been done before. Therefore, the ability to perform a review as opposed to a full risk analysis hinges upon the adequacy of any previous risk analyses. A good risk analysis should include inventory of PHI storage devices, identification and prioritization of risks to PHI on the EP’s network, as well as a reasonable set of policies and procedures necessary to secure patient information. If the EP has previously conducted an adequate [S1] risk analysis, then a proper review can be carried out. How do I perform a Review? Since providing adequate security for PHI is an ongoing process, a proper review involves looking at previous risk analyses and examining what, if anything has changed since the risk analysis was performed. EP should ask questions such as: Do I have any new IT assets that should be added to inventory? Specifically, those IT assets in which PHI resides. Have there been any policy changes since the previous risk analysis? Should these changes be reviewed? Is there any reason to believe that policies created based on the previous risk analysis should be changed, i.e., have any security incidents occurred? If a security breach has occurred, is there a security incident response and reporting procedure that can help identify potential causes? If so, how can the risk of similar security incidents be mitigated? Has the business changed locations, added square footage, or carried out significant structural remodeling? Are we using the same hardware platforms, operating systems, and software programs as during the previous risk analysis?
  • 3. 3 Even with an appropriate risk analysis, review of that risk analysis is not always sufficient for compliance with Meaningful Use Stage 1 requirements. Answers to several of the aforementioned questions can indicate the need for a full risk analysis as opposed to a review. For example, if an EP’s business has moved locations or the office layout has significantly changed, or if hardware or software used to manage and store PHI has changed, a full risk analysis may be necessary to elucidate security vulnerabilities at the new facility or in the new IT systems. Ultimately, evaluation of every aspect of the original risk analysis is necessary for conducting an adequate review. The review should incorporate assessment of overall changes in the environment and a methodical consideration of the security risks associated with those changes. As with every aspect of Meaningful Use attestation and HIPAA compliance, the review should be thoroughly documented, referencing the prior risk analysis. Each review should result in an additional list of threats and vulnerabilities that can be added to the Security Management Plan as required by the second HIPAA Security rule. Recommendations The language of Meaningful Use allows for the performance of a review, as opposed to a full security risk analysis, in the following year or two after the initial attestation. If a proper risk analysis was performed the first year, EP can build on the foundation of that risk analysis to improve security practices in subsequent years. However, most security experts recommend that every covered entity do a full risk analysis every two to three years. Update Since this article was initially published, ONC has published their own tool. The ONC tool provides a structured database designed for small and mid-sized providers to conduct and document annual Security Risk Assessments. Given the authorship of the tool, providers should have a high level of confidence in the acceptability of a SRA conducted using it. For more information, see http://www.healthit.gov/providers-professionals/security-risk-assessment.