SlideShare une entreprise Scribd logo
1  sur  5
SAMPLE
SECURITY
RISK
ASSESSMENT
REPORT

January 29

2014

This security risk assessment exercise has been performed to support the
requirements of the Department of Health and Human Services (HHS),
Office for the Civil Rights (OCR) and other applicable state data privacy laws
and regulations.

Prepared for
<Company
Name>
Table of Contents
1. Executive Summary
2. Risk Assessment Approach
3. Scoping
4. System Characterization
5. Threat Statement
6. Risk Assessment Results
7. Summary

2, Davis Drive NC 27709

|

ehr20.com |

info@ehr20.com

| 802-448 2255
EXECUTIVE SUMMARY
Under the HIPAA Privacy and Security Rule, business associates are required to perform active
risk prevention and safeguarding of patient information that are very important to patient privacy.
The HITECH act allows only minimum necessary to be disclosed when handling protected
health information (PHI).
This security risk assessment exercise has been performed to support the requirements
of the Department of Health and Human Services (HHS), Office for the Civil Rights (OCR) and
other applicable state data privacy laws and regulations. Upon completion of this risk
assessment, a detail risk management plan need to be developed based on the gaps identified
from the risk analysis. The gaps identified and recommendations provided are based on the
input provided by the staff, budget, scope and other practical considerations.
RISK ASSESSMENT APPROACH
Our risk assessment approach is expected to identify only reasonably anticipated threats or
hazards to the security or integrity of electronic Protected Health Information (“ePHI”).
Assessing risks is only a first step. The results of the risk assessment have to be used to
develop and implement appropriate policies and procedures. IT, management and support
representatives have been interviewed in order to complete the risk assessment. Interviews,
questionnaires and automated scanning tools are used for gathering information required for
this security risk analysis. When mitigating significant risks, not all are equally important. Take
into account the cost of intervention and the business impact of loss of confidentiality, integrity,
or availability of data.
SCOPING
Please refer to the ePHI inventory sheet for the complete list of system hardware, software and
other applications that are processing electronic Protected Health Information (ePHI). Scoping
exercise is done on systems, processes and applications based ePHI data created, shared,
stored and transmitted.
SYSTEM CHARACTERIZATION
Systems are characterized, including hardware (server, router, switch), software (e.g.,
application, operating system, protocol), system interfaces (e.g., communication link), data, and
users based on ownership of the systems, ePHI processing and location of data.
THREAT STATEMENT
EHR 2.0 has conducted risk assessment to determine the extent of the potential threat and the
risk associated with IT systems owned or operated by Company Name To determine the
likelihood of a future adverse event, threats to ePHI handled by Company Name Inc. are
analyzed in conjunction with the potential vulnerabilities and the controls in place for the IT
systems. EHR 2.0’s assessment framework includes guidance from NIST, US-CERT, and other

2, Davis Drive NC 27709

|

ehr20.com |

info@ehr20.com

| 802-448 2255
authoritative sources along with expertise from decades of experiences in protecting IT systems
and complying with several regulatory requirements including PCI-DSS, SoX, and HIPAA.
RISK ASSESSMENT RESULTS

Risk Topics
Addressed
High
Medium
Not Addressed
High
Medium
Partially Addressed
High
Medium
Grand Total

Total Number of
Domains
10
9
1
15
5
10
20
14
6
45

For a detailed list of observation please review the risk analysis sheet. Following are the list the
key observations:
1. Encryption of data at rest
a) Desktop –based applications which could potentially store PHI data need to
have at least encrypted volume for storage
2. Business continuity and disaster recover planning
a. Need to identify key systems which are required without which Company Name
provide service and validate the plan by testing the backup.

SAMPLE

3. Information Access Review and Auditing
a. Key system access need to be reviewed periodically including AD service
accounts and exception based monitoring to be in place

4. Network scanning
a. It’s a good practice to continuously run basic vulnerability scanning of the
network to make sure the network infrastructure is patched, ports restricted, etc.

5. Administrative Controls
2, Davis Drive NC 27709

|

ehr20.com |

info@ehr20.com

| 802-448 2255
a. Background checks for employees
b. IT professionals administering data need to be provided more in depth security
and compliance training
6. Information security policy
a. Develop comprehensive information security policy (master doc.)
b. Develop simple, easy-to-use department-wise policy on information access,
usage and sharing. This policy document needs to be used for training each
department employees handling ePHI.

SAMPLE

7. Insurance
a. Ensure any potential network breach, virus infection and regulatory fines are
covered under your business general liability insurance or cover using specialty
products like Cyber Liability insurance.
Detail line items are available in the risk analysis spreadsheet with specific next
steps.

SUMMARY
Since cost, timeliness, and ease of use are a few of the many important factors in managing the
identified risks, Company Name should attempt to implement security measures sufficient to
reduce risks and vulnerabilities to a reasonable and appropriate level. In addition, an active
security risk management plan needs to be in place to handle any evolving security threats.

Disclaimer: EHR 2.0 conducts assessment and prepares recommendations based on point-in-time interaction with customer’s
workforce, analysis of systems and existing processes. EHR 2.0 is not directly liable for any inaccuracies reported due to the
change in processes, people and technology.

2, Davis Drive NC 27709

|

ehr20.com |

info@ehr20.com

| 802-448 2255

Contenu connexe

Tendances

NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An Overview
Tandhy Simanjuntak
 
8. operations security
8. operations security8. operations security
8. operations security
7wounders
 

Tendances (20)

NIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An OverviewNIST CyberSecurity Framework: An Overview
NIST CyberSecurity Framework: An Overview
 
IT General Controls Presentation at IIA Vadodara Audit Club
IT General Controls Presentation at IIA Vadodara Audit ClubIT General Controls Presentation at IIA Vadodara Audit Club
IT General Controls Presentation at IIA Vadodara Audit Club
 
Understanding and complying with RBI’s Cyber security guidelines for Email sy...
Understanding and complying with RBI’s Cyber security guidelines for Email sy...Understanding and complying with RBI’s Cyber security guidelines for Email sy...
Understanding and complying with RBI’s Cyber security guidelines for Email sy...
 
ISO 27001 Benefits
ISO 27001 BenefitsISO 27001 Benefits
ISO 27001 Benefits
 
Iso 27001 Checklist
Iso 27001 ChecklistIso 27001 Checklist
Iso 27001 Checklist
 
NIST Risk Management Framework (RMF)
NIST Risk Management Framework (RMF)NIST Risk Management Framework (RMF)
NIST Risk Management Framework (RMF)
 
CCNA Security 02- fundamentals of network security
CCNA Security 02-  fundamentals of network securityCCNA Security 02-  fundamentals of network security
CCNA Security 02- fundamentals of network security
 
ISO/IEC 27001:2013 An Overview
ISO/IEC 27001:2013  An Overview ISO/IEC 27001:2013  An Overview
ISO/IEC 27001:2013 An Overview
 
PCI DSS Implementation: A Five Step Guide
PCI DSS Implementation: A Five Step GuidePCI DSS Implementation: A Five Step Guide
PCI DSS Implementation: A Five Step Guide
 
Introduction to NIST’s Risk Management Framework (RMF)
Introduction to NIST’s Risk Management Framework (RMF)Introduction to NIST’s Risk Management Framework (RMF)
Introduction to NIST’s Risk Management Framework (RMF)
 
Guide to Risk Management Framework (RMF)
Guide to Risk Management Framework (RMF)Guide to Risk Management Framework (RMF)
Guide to Risk Management Framework (RMF)
 
IT Audit For Non-IT Auditors
IT Audit For Non-IT AuditorsIT Audit For Non-IT Auditors
IT Audit For Non-IT Auditors
 
Asset, Vulnerability, Threat, Risk & Control
Asset, Vulnerability, Threat, Risk & ControlAsset, Vulnerability, Threat, Risk & Control
Asset, Vulnerability, Threat, Risk & Control
 
ISO 27001 - Information Security Management System
ISO 27001 - Information Security Management SystemISO 27001 - Information Security Management System
ISO 27001 - Information Security Management System
 
Compare and Contrast Security Controls and Framework Types
Compare and Contrast Security Controls and Framework TypesCompare and Contrast Security Controls and Framework Types
Compare and Contrast Security Controls and Framework Types
 
Auditing application controls
Auditing application controlsAuditing application controls
Auditing application controls
 
Cybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationCybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your Organization
 
8. operations security
8. operations security8. operations security
8. operations security
 
SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1SOC Architecture Workshop - Part 1
SOC Architecture Workshop - Part 1
 
Automation of Information (Cyber) Security
Automation of Information (Cyber) SecurityAutomation of Information (Cyber) Security
Automation of Information (Cyber) Security
 

En vedette

Risk assessment presentation
Risk assessment presentationRisk assessment presentation
Risk assessment presentation
mmagario
 
It infrastructure management
It infrastructure managementIt infrastructure management
It infrastructure management
Shoaib Patel
 
Risk assessment on information security
Risk assessment on information securityRisk assessment on information security
Risk assessment on information security
Angelo Sala
 
Example security risk assessment tool july 2010
Example security risk assessment tool july 2010Example security risk assessment tool july 2010
Example security risk assessment tool july 2010
WarrenGreen
 
Security Policy Checklist
Security Policy ChecklistSecurity Policy Checklist
Security Policy Checklist
backdoor
 

En vedette (20)

Risk asssessment
Risk asssessmentRisk asssessment
Risk asssessment
 
Meaningful Use and Security Risk Analysis
Meaningful Use and Security Risk AnalysisMeaningful Use and Security Risk Analysis
Meaningful Use and Security Risk Analysis
 
Sample Risk Assessment
Sample Risk AssessmentSample Risk Assessment
Sample Risk Assessment
 
HIPAA security risk assessments
HIPAA security risk assessmentsHIPAA security risk assessments
HIPAA security risk assessments
 
Elements of security risk assessment and risk management
Elements of security risk assessment and risk managementElements of security risk assessment and risk management
Elements of security risk assessment and risk management
 
Risk assessment presentation
Risk assessment presentationRisk assessment presentation
Risk assessment presentation
 
Prepayment Audit Suggested Documentation
Prepayment Audit Suggested DocumentationPrepayment Audit Suggested Documentation
Prepayment Audit Suggested Documentation
 
Apigee dc failover
Apigee dc failoverApigee dc failover
Apigee dc failover
 
The software-security-risk-report
The software-security-risk-reportThe software-security-risk-report
The software-security-risk-report
 
Cloud Security: Risks and Recommendations for New Entrants
Cloud Security: Risks and Recommendations for New EntrantsCloud Security: Risks and Recommendations for New Entrants
Cloud Security: Risks and Recommendations for New Entrants
 
It infrastructure management
It infrastructure managementIt infrastructure management
It infrastructure management
 
Risk assessment on information security
Risk assessment on information securityRisk assessment on information security
Risk assessment on information security
 
Example security risk assessment tool july 2010
Example security risk assessment tool july 2010Example security risk assessment tool july 2010
Example security risk assessment tool july 2010
 
Security Analysis Report
Security Analysis ReportSecurity Analysis Report
Security Analysis Report
 
Preparing for Infrastructure Management (Part 1)
Preparing for Infrastructure Management (Part 1)Preparing for Infrastructure Management (Part 1)
Preparing for Infrastructure Management (Part 1)
 
It infrastructure manager performance appraisal
It infrastructure manager performance appraisalIt infrastructure manager performance appraisal
It infrastructure manager performance appraisal
 
Security Policy Checklist
Security Policy ChecklistSecurity Policy Checklist
Security Policy Checklist
 
Giving Presentations to Senior Managers
Giving Presentations to Senior ManagersGiving Presentations to Senior Managers
Giving Presentations to Senior Managers
 
Enterprise Cloud Risk And Security
Enterprise Cloud Risk And SecurityEnterprise Cloud Risk And Security
Enterprise Cloud Risk And Security
 
Business Risks
Business RisksBusiness Risks
Business Risks
 

Similaire à EHR meaningful use security risk assessment sample document

pdfcoffee.com_iso-iec-27002-implementation-guidance-and-metrics-pdf-free.pdf
pdfcoffee.com_iso-iec-27002-implementation-guidance-and-metrics-pdf-free.pdfpdfcoffee.com_iso-iec-27002-implementation-guidance-and-metrics-pdf-free.pdf
pdfcoffee.com_iso-iec-27002-implementation-guidance-and-metrics-pdf-free.pdf
Elyes ELEBRI
 
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
abhichowdary16
 
Risk Assessment Famework
Risk Assessment FameworkRisk Assessment Famework
Risk Assessment Famework
lneut03
 
Iso 27001 metrics and implementation guide
Iso 27001 metrics and implementation guideIso 27001 metrics and implementation guide
Iso 27001 metrics and implementation guide
mfmurat
 
Start With A Great Information Security Plan!
Start With A Great Information Security Plan!Start With A Great Information Security Plan!
Start With A Great Information Security Plan!
Tammy Clark
 
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
LynellBull52
 
Running Head SECURITY AWARENESSSecurity Awareness .docx
Running Head SECURITY AWARENESSSecurity Awareness              .docxRunning Head SECURITY AWARENESSSecurity Awareness              .docx
Running Head SECURITY AWARENESSSecurity Awareness .docx
toltonkendal
 
Facility Environmental Audit Guidelines
Facility Environmental Audit GuidelinesFacility Environmental Audit Guidelines
Facility Environmental Audit Guidelines
amburyj3c9
 

Similaire à EHR meaningful use security risk assessment sample document (20)

pdfcoffee.com_iso-iec-27002-implementation-guidance-and-metrics-pdf-free.pdf
pdfcoffee.com_iso-iec-27002-implementation-guidance-and-metrics-pdf-free.pdfpdfcoffee.com_iso-iec-27002-implementation-guidance-and-metrics-pdf-free.pdf
pdfcoffee.com_iso-iec-27002-implementation-guidance-and-metrics-pdf-free.pdf
 
Cyb 690 cybersecurity program template directions the foll
Cyb 690 cybersecurity program template directions the follCyb 690 cybersecurity program template directions the foll
Cyb 690 cybersecurity program template directions the foll
 
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
17-MOD 6 Conducting Security Audits & MOD 7 Information Security Audit Prepar...
 
The IT Analysis Paralysis
The IT Analysis Paralysis The IT Analysis Paralysis
The IT Analysis Paralysis
 
The Fundamentals of HIPAA Privacy & Security Risk Management
The Fundamentals of HIPAA Privacy & Security Risk ManagementThe Fundamentals of HIPAA Privacy & Security Risk Management
The Fundamentals of HIPAA Privacy & Security Risk Management
 
Risk Assessment Famework
Risk Assessment FameworkRisk Assessment Famework
Risk Assessment Famework
 
Information Security Assessment Offering
Information Security Assessment OfferingInformation Security Assessment Offering
Information Security Assessment Offering
 
RiskWatch for Credit Unions™
RiskWatch for Credit Unions™RiskWatch for Credit Unions™
RiskWatch for Credit Unions™
 
ByteCode pentest report example
ByteCode pentest report exampleByteCode pentest report example
ByteCode pentest report example
 
Iso 27001 metrics and implementation guide
Iso 27001 metrics and implementation guideIso 27001 metrics and implementation guide
Iso 27001 metrics and implementation guide
 
Standards & Framework.ppt
Standards & Framework.pptStandards & Framework.ppt
Standards & Framework.ppt
 
Standards & Framework.pdf
Standards & Framework.pdfStandards & Framework.pdf
Standards & Framework.pdf
 
Start With A Great Information Security Plan!
Start With A Great Information Security Plan!Start With A Great Information Security Plan!
Start With A Great Information Security Plan!
 
Mbm Hipaa Hitech Ss Compliance Risk Assessment
Mbm Hipaa Hitech Ss Compliance Risk AssessmentMbm Hipaa Hitech Ss Compliance Risk Assessment
Mbm Hipaa Hitech Ss Compliance Risk Assessment
 
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
· Processed on 09-Dec-2014 901 PM CST · ID 488406360 · Word .docx
 
Running Head SECURITY AWARENESSSecurity Awareness .docx
Running Head SECURITY AWARENESSSecurity Awareness              .docxRunning Head SECURITY AWARENESSSecurity Awareness              .docx
Running Head SECURITY AWARENESSSecurity Awareness .docx
 
Facility Environmental Audit Guidelines
Facility Environmental Audit GuidelinesFacility Environmental Audit Guidelines
Facility Environmental Audit Guidelines
 
Application security Best Practices Framework
Application security   Best Practices FrameworkApplication security   Best Practices Framework
Application security Best Practices Framework
 
Securing Mobile Healthcare Application
Securing Mobile Healthcare ApplicationSecuring Mobile Healthcare Application
Securing Mobile Healthcare Application
 
MBM eHealthCare Solutions HIPAA-HITECH & Meaningful Use Risk Analysis
MBM eHealthCare Solutions HIPAA-HITECH & Meaningful Use Risk AnalysisMBM eHealthCare Solutions HIPAA-HITECH & Meaningful Use Risk Analysis
MBM eHealthCare Solutions HIPAA-HITECH & Meaningful Use Risk Analysis
 

Plus de data brackets

Presence Health Resolution Agreement with OCR
Presence Health Resolution Agreement with OCRPresence Health Resolution Agreement with OCR
Presence Health Resolution Agreement with OCR
data brackets
 
HIPAA Settlement New York Presbyterian and Columbia Universtiy
HIPAA Settlement New York Presbyterian and Columbia UniverstiyHIPAA Settlement New York Presbyterian and Columbia Universtiy
HIPAA Settlement New York Presbyterian and Columbia Universtiy
data brackets
 
Skagit county- HIPAA violation settlement agreement with HHS
Skagit county- HIPAA violation settlement agreement with HHSSkagit county- HIPAA violation settlement agreement with HHS
Skagit county- HIPAA violation settlement agreement with HHS
data brackets
 
Adult & Pediatric Dermatology, Corrective Action Plan
Adult & Pediatric Dermatology, Corrective Action PlanAdult & Pediatric Dermatology, Corrective Action Plan
Adult & Pediatric Dermatology, Corrective Action Plan
data brackets
 

Plus de data brackets (20)

Presence Health Resolution Agreement with OCR
Presence Health Resolution Agreement with OCRPresence Health Resolution Agreement with OCR
Presence Health Resolution Agreement with OCR
 
Oregon Health & Science University HIPAA Fines
Oregon Health & Science University HIPAA FinesOregon Health & Science University HIPAA Fines
Oregon Health & Science University HIPAA Fines
 
Catholic Health Care Services Resolution Agreement
Catholic Health Care Services Resolution Agreement Catholic Health Care Services Resolution Agreement
Catholic Health Care Services Resolution Agreement
 
NYP RA and Cap april 2016
NYP RA and Cap april 2016 NYP RA and Cap april 2016
NYP RA and Cap april 2016
 
NYP RA and CAP april 2016
NYP RA and CAP april 2016 NYP RA and CAP april 2016
NYP RA and CAP april 2016
 
Raleigh Orthopedic RA and CAP April 2016
Raleigh Orthopedic RA and CAP April 2016Raleigh Orthopedic RA and CAP April 2016
Raleigh Orthopedic RA and CAP April 2016
 
HIPAA Violation Fines: North memorial Hospistal Settlement
 HIPAA Violation Fines: North memorial Hospistal Settlement  HIPAA Violation Fines: North memorial Hospistal Settlement
HIPAA Violation Fines: North memorial Hospistal Settlement
 
Lincare HIPAA remediated decision by administrative judge
Lincare HIPAA remediated decision by administrative judgeLincare HIPAA remediated decision by administrative judge
Lincare HIPAA remediated decision by administrative judge
 
Lincare HIPAA Notice of Proposed Determination remediated
Lincare HIPAA Notice of Proposed Determination remediatedLincare HIPAA Notice of Proposed Determination remediated
Lincare HIPAA Notice of Proposed Determination remediated
 
Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule and ...
Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule and ...Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule and ...
Health Insurance Portability and Accountability Act (HIPAA) Privacy Rule and ...
 
Office of Inspector General Study on OCR's HIPAA audit program
Office of Inspector General Study on OCR's HIPAA audit programOffice of Inspector General Study on OCR's HIPAA audit program
Office of Inspector General Study on OCR's HIPAA audit program
 
Cancer Care Group HIPAA Settlement Agreement
Cancer Care Group HIPAA Settlement AgreementCancer Care Group HIPAA Settlement Agreement
Cancer Care Group HIPAA Settlement Agreement
 
Parkview HIPAA Settlement - Resolution Agreement
Parkview HIPAA Settlement - Resolution AgreementParkview HIPAA Settlement - Resolution Agreement
Parkview HIPAA Settlement - Resolution Agreement
 
HIPAA Settlement New York Presbyterian and Columbia Universtiy
HIPAA Settlement New York Presbyterian and Columbia UniverstiyHIPAA Settlement New York Presbyterian and Columbia Universtiy
HIPAA Settlement New York Presbyterian and Columbia Universtiy
 
Qca agreement
Qca agreementQca agreement
Qca agreement
 
Concentra agreement
Concentra agreementConcentra agreement
Concentra agreement
 
Skagit county- HIPAA violation settlement agreement with HHS
Skagit county- HIPAA violation settlement agreement with HHSSkagit county- HIPAA violation settlement agreement with HHS
Skagit county- HIPAA violation settlement agreement with HHS
 
Adult & Pediatric Dermatology, Corrective Action Plan
Adult & Pediatric Dermatology, Corrective Action PlanAdult & Pediatric Dermatology, Corrective Action Plan
Adult & Pediatric Dermatology, Corrective Action Plan
 
Affinity agreement
Affinity agreementAffinity agreement
Affinity agreement
 
Shasta agreement
Shasta agreementShasta agreement
Shasta agreement
 

Dernier

Dernier (20)

♛VVIP Hyderabad Call Girls Chintalkunta🖕7001035870🖕Riya Kappor Top Call Girl ...
♛VVIP Hyderabad Call Girls Chintalkunta🖕7001035870🖕Riya Kappor Top Call Girl ...♛VVIP Hyderabad Call Girls Chintalkunta🖕7001035870🖕Riya Kappor Top Call Girl ...
♛VVIP Hyderabad Call Girls Chintalkunta🖕7001035870🖕Riya Kappor Top Call Girl ...
 
(👑VVIP ISHAAN ) Russian Call Girls Service Navi Mumbai🖕9920874524🖕Independent...
(👑VVIP ISHAAN ) Russian Call Girls Service Navi Mumbai🖕9920874524🖕Independent...(👑VVIP ISHAAN ) Russian Call Girls Service Navi Mumbai🖕9920874524🖕Independent...
(👑VVIP ISHAAN ) Russian Call Girls Service Navi Mumbai🖕9920874524🖕Independent...
 
(Low Rate RASHMI ) Rate Of Call Girls Jaipur ❣ 8445551418 ❣ Elite Models & Ce...
(Low Rate RASHMI ) Rate Of Call Girls Jaipur ❣ 8445551418 ❣ Elite Models & Ce...(Low Rate RASHMI ) Rate Of Call Girls Jaipur ❣ 8445551418 ❣ Elite Models & Ce...
(Low Rate RASHMI ) Rate Of Call Girls Jaipur ❣ 8445551418 ❣ Elite Models & Ce...
 
💎VVIP Kolkata Call Girls Parganas🩱7001035870🩱Independent Girl ( Ac Rooms Avai...
💎VVIP Kolkata Call Girls Parganas🩱7001035870🩱Independent Girl ( Ac Rooms Avai...💎VVIP Kolkata Call Girls Parganas🩱7001035870🩱Independent Girl ( Ac Rooms Avai...
💎VVIP Kolkata Call Girls Parganas🩱7001035870🩱Independent Girl ( Ac Rooms Avai...
 
Call Girls Horamavu WhatsApp Number 7001035870 Meeting With Bangalore Escorts
Call Girls Horamavu WhatsApp Number 7001035870 Meeting With Bangalore EscortsCall Girls Horamavu WhatsApp Number 7001035870 Meeting With Bangalore Escorts
Call Girls Horamavu WhatsApp Number 7001035870 Meeting With Bangalore Escorts
 
Best Rate (Guwahati ) Call Girls Guwahati ⟟ 8617370543 ⟟ High Class Call Girl...
Best Rate (Guwahati ) Call Girls Guwahati ⟟ 8617370543 ⟟ High Class Call Girl...Best Rate (Guwahati ) Call Girls Guwahati ⟟ 8617370543 ⟟ High Class Call Girl...
Best Rate (Guwahati ) Call Girls Guwahati ⟟ 8617370543 ⟟ High Class Call Girl...
 
VIP Service Call Girls Sindhi Colony 📳 7877925207 For 18+ VIP Call Girl At Th...
VIP Service Call Girls Sindhi Colony 📳 7877925207 For 18+ VIP Call Girl At Th...VIP Service Call Girls Sindhi Colony 📳 7877925207 For 18+ VIP Call Girl At Th...
VIP Service Call Girls Sindhi Colony 📳 7877925207 For 18+ VIP Call Girl At Th...
 
Call Girls Coimbatore Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Coimbatore Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Coimbatore Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Coimbatore Just Call 9907093804 Top Class Call Girl Service Available
 
Call Girls Nagpur Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Nagpur Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Nagpur Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Nagpur Just Call 9907093804 Top Class Call Girl Service Available
 
Manyata Tech Park ( Call Girls ) Bangalore ✔ 6297143586 ✔ Hot Model With Sexy...
Manyata Tech Park ( Call Girls ) Bangalore ✔ 6297143586 ✔ Hot Model With Sexy...Manyata Tech Park ( Call Girls ) Bangalore ✔ 6297143586 ✔ Hot Model With Sexy...
Manyata Tech Park ( Call Girls ) Bangalore ✔ 6297143586 ✔ Hot Model With Sexy...
 
Top Rated Bangalore Call Girls Richmond Circle ⟟ 9332606886 ⟟ Call Me For Ge...
Top Rated Bangalore Call Girls Richmond Circle ⟟  9332606886 ⟟ Call Me For Ge...Top Rated Bangalore Call Girls Richmond Circle ⟟  9332606886 ⟟ Call Me For Ge...
Top Rated Bangalore Call Girls Richmond Circle ⟟ 9332606886 ⟟ Call Me For Ge...
 
Call Girls Cuttack Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Cuttack Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Cuttack Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Cuttack Just Call 9907093804 Top Class Call Girl Service Available
 
VIP Call Girls Indore Kirti 💚😋 9256729539 🚀 Indore Escorts
VIP Call Girls Indore Kirti 💚😋  9256729539 🚀 Indore EscortsVIP Call Girls Indore Kirti 💚😋  9256729539 🚀 Indore Escorts
VIP Call Girls Indore Kirti 💚😋 9256729539 🚀 Indore Escorts
 
Call Girls Kochi Just Call 8250077686 Top Class Call Girl Service Available
Call Girls Kochi Just Call 8250077686 Top Class Call Girl Service AvailableCall Girls Kochi Just Call 8250077686 Top Class Call Girl Service Available
Call Girls Kochi Just Call 8250077686 Top Class Call Girl Service Available
 
All Time Service Available Call Girls Marine Drive 📳 9820252231 For 18+ VIP C...
All Time Service Available Call Girls Marine Drive 📳 9820252231 For 18+ VIP C...All Time Service Available Call Girls Marine Drive 📳 9820252231 For 18+ VIP C...
All Time Service Available Call Girls Marine Drive 📳 9820252231 For 18+ VIP C...
 
VIP Hyderabad Call Girls Bahadurpally 7877925207 ₹5000 To 25K With AC Room 💚😋
VIP Hyderabad Call Girls Bahadurpally 7877925207 ₹5000 To 25K With AC Room 💚😋VIP Hyderabad Call Girls Bahadurpally 7877925207 ₹5000 To 25K With AC Room 💚😋
VIP Hyderabad Call Girls Bahadurpally 7877925207 ₹5000 To 25K With AC Room 💚😋
 
Lucknow Call girls - 8800925952 - 24x7 service with hotel room
Lucknow Call girls - 8800925952 - 24x7 service with hotel roomLucknow Call girls - 8800925952 - 24x7 service with hotel room
Lucknow Call girls - 8800925952 - 24x7 service with hotel room
 
Call Girls Bareilly Just Call 8250077686 Top Class Call Girl Service Available
Call Girls Bareilly Just Call 8250077686 Top Class Call Girl Service AvailableCall Girls Bareilly Just Call 8250077686 Top Class Call Girl Service Available
Call Girls Bareilly Just Call 8250077686 Top Class Call Girl Service Available
 
The Most Attractive Hyderabad Call Girls Kothapet 𖠋 6297143586 𖠋 Will You Mis...
The Most Attractive Hyderabad Call Girls Kothapet 𖠋 6297143586 𖠋 Will You Mis...The Most Attractive Hyderabad Call Girls Kothapet 𖠋 6297143586 𖠋 Will You Mis...
The Most Attractive Hyderabad Call Girls Kothapet 𖠋 6297143586 𖠋 Will You Mis...
 
Call Girls Varanasi Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Varanasi Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Varanasi Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Varanasi Just Call 9907093804 Top Class Call Girl Service Available
 

EHR meaningful use security risk assessment sample document

  • 1. SAMPLE SECURITY RISK ASSESSMENT REPORT January 29 2014 This security risk assessment exercise has been performed to support the requirements of the Department of Health and Human Services (HHS), Office for the Civil Rights (OCR) and other applicable state data privacy laws and regulations. Prepared for <Company Name>
  • 2. Table of Contents 1. Executive Summary 2. Risk Assessment Approach 3. Scoping 4. System Characterization 5. Threat Statement 6. Risk Assessment Results 7. Summary 2, Davis Drive NC 27709 | ehr20.com | info@ehr20.com | 802-448 2255
  • 3. EXECUTIVE SUMMARY Under the HIPAA Privacy and Security Rule, business associates are required to perform active risk prevention and safeguarding of patient information that are very important to patient privacy. The HITECH act allows only minimum necessary to be disclosed when handling protected health information (PHI). This security risk assessment exercise has been performed to support the requirements of the Department of Health and Human Services (HHS), Office for the Civil Rights (OCR) and other applicable state data privacy laws and regulations. Upon completion of this risk assessment, a detail risk management plan need to be developed based on the gaps identified from the risk analysis. The gaps identified and recommendations provided are based on the input provided by the staff, budget, scope and other practical considerations. RISK ASSESSMENT APPROACH Our risk assessment approach is expected to identify only reasonably anticipated threats or hazards to the security or integrity of electronic Protected Health Information (“ePHI”). Assessing risks is only a first step. The results of the risk assessment have to be used to develop and implement appropriate policies and procedures. IT, management and support representatives have been interviewed in order to complete the risk assessment. Interviews, questionnaires and automated scanning tools are used for gathering information required for this security risk analysis. When mitigating significant risks, not all are equally important. Take into account the cost of intervention and the business impact of loss of confidentiality, integrity, or availability of data. SCOPING Please refer to the ePHI inventory sheet for the complete list of system hardware, software and other applications that are processing electronic Protected Health Information (ePHI). Scoping exercise is done on systems, processes and applications based ePHI data created, shared, stored and transmitted. SYSTEM CHARACTERIZATION Systems are characterized, including hardware (server, router, switch), software (e.g., application, operating system, protocol), system interfaces (e.g., communication link), data, and users based on ownership of the systems, ePHI processing and location of data. THREAT STATEMENT EHR 2.0 has conducted risk assessment to determine the extent of the potential threat and the risk associated with IT systems owned or operated by Company Name To determine the likelihood of a future adverse event, threats to ePHI handled by Company Name Inc. are analyzed in conjunction with the potential vulnerabilities and the controls in place for the IT systems. EHR 2.0’s assessment framework includes guidance from NIST, US-CERT, and other 2, Davis Drive NC 27709 | ehr20.com | info@ehr20.com | 802-448 2255
  • 4. authoritative sources along with expertise from decades of experiences in protecting IT systems and complying with several regulatory requirements including PCI-DSS, SoX, and HIPAA. RISK ASSESSMENT RESULTS Risk Topics Addressed High Medium Not Addressed High Medium Partially Addressed High Medium Grand Total Total Number of Domains 10 9 1 15 5 10 20 14 6 45 For a detailed list of observation please review the risk analysis sheet. Following are the list the key observations: 1. Encryption of data at rest a) Desktop –based applications which could potentially store PHI data need to have at least encrypted volume for storage 2. Business continuity and disaster recover planning a. Need to identify key systems which are required without which Company Name provide service and validate the plan by testing the backup. SAMPLE 3. Information Access Review and Auditing a. Key system access need to be reviewed periodically including AD service accounts and exception based monitoring to be in place 4. Network scanning a. It’s a good practice to continuously run basic vulnerability scanning of the network to make sure the network infrastructure is patched, ports restricted, etc. 5. Administrative Controls 2, Davis Drive NC 27709 | ehr20.com | info@ehr20.com | 802-448 2255
  • 5. a. Background checks for employees b. IT professionals administering data need to be provided more in depth security and compliance training 6. Information security policy a. Develop comprehensive information security policy (master doc.) b. Develop simple, easy-to-use department-wise policy on information access, usage and sharing. This policy document needs to be used for training each department employees handling ePHI. SAMPLE 7. Insurance a. Ensure any potential network breach, virus infection and regulatory fines are covered under your business general liability insurance or cover using specialty products like Cyber Liability insurance. Detail line items are available in the risk analysis spreadsheet with specific next steps. SUMMARY Since cost, timeliness, and ease of use are a few of the many important factors in managing the identified risks, Company Name should attempt to implement security measures sufficient to reduce risks and vulnerabilities to a reasonable and appropriate level. In addition, an active security risk management plan needs to be in place to handle any evolving security threats. Disclaimer: EHR 2.0 conducts assessment and prepares recommendations based on point-in-time interaction with customer’s workforce, analysis of systems and existing processes. EHR 2.0 is not directly liable for any inaccuracies reported due to the change in processes, people and technology. 2, Davis Drive NC 27709 | ehr20.com | info@ehr20.com | 802-448 2255