A HIPAA Security and Privacy Compliance Audit and Risk Assessment Mitigation Approach

A HIPAA Security and Privacy Compliance Audit and Risk Assessment Mitigation Approach

Young B. Choi, Christopher E. Williams
Copyright: © 2021 |Pages: 18
DOI: 10.4018/IJCRE.2021070103
OnDemand:
(Individual Articles)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

Data breaches have a profound effect on businesses associated with industries like the US healthcare system. This task extends more pressure on healthcare providers as they continue to gain unprecedented access to patient data, as the US healthcare system integrates further into the digital realm. Pressure has also led to the creation of the Health Insurance Portability and Accountability Act, Omnibus Rule, and Health Information Technology for Economic and Clinical Health laws. The Defense Information Systems Agency also develops and maintains security technical implementation guides that are consistent with DoD cybersecurity policies, standards, architectures, security controls, and validation procedures. The objective is to design a network (physician's office) in order to meet the complexity standards and unpredictable measures posed by attackers. Additionally, the network must adhere to HIPAA security and privacy requirements required by law. Successful implantation of network design will articulate comprehension requirements of information assurance security and control.
Article Preview
Top

Network Design Security Requirements And Control

The evolution of the computer industry and consequent development of the Internet has brought about revolution, but what has remained consistent are the threats, vulnerabilities, and risks to information and information systems. According to Kovacich (2016), “What has changed is the level of sophistication of the threats—the attacks and the threat agents—as well as the exponentially growing number of them all over the world and from various sources” (p. 4).

Schoenfield (2015) states, “System architecture is the descriptive representation of the system’s component functions and the communication flows between those components” (p. 58). In order to make informed network architecture decisions, one must immediately pose some important questions. What components make up the network architecture? Which network functions are relevant? What is a communication flow?

Network Purpose

The purpose of a physician's network is to safely and securely facilitate the duties and responsibilities of Confidentiality, Integrity, and Availability (CIA). According to Schoenfield (2015), network security architecture practices includes the following:

  • 1.

    Sensitive data will be safeguarded in storage, transmission, and processing (consisting of patient medical data records, scheduling, and billing information).

  • 2.

    Network access will be controlled (need-to-know, authentication, and authorization).

  • 3.

    Protecting and safeguarding network equipment (systems are maintained in such a way that they remain available for use) (p.14).

Network Equipment

The physician’s network (Figure 1) is based on a wireless architecture, consisting of two wireless access points in support of workstations (running Windows 10), printers, and IP phones for ten patient rooms, two doctor’s offices, and Wi-Fi capable laptops and cell phones. The following six servers have been implemented with a switching component:

  • 1.

    Domain Controller/Active Directory Server – Microsoft Windows

  • 2.

    Scheduling Server – Running Snap Software

  • 3.

    Billing Server – Running QuickBooks Software

  • 4.

    Email Sever – Running Microsoft Exchange Software

  • 5.

    Patient Database Server – Utilizing Oracle 12

  • 6.

    Web Server – Internet (TCP/IP)

  • 7.

    DMZ Server – Security added component

Figure 1.

Physician’s Network

IJCRE.2021070103.f01

The network also consists of three Next Generation firewalls that add an additional level of security to the network architecture.

Complete Article List

Search this Journal:
Reset
Volume 5: 1 Issue (2024)
Volume 4: 2 Issues (2022): 1 Released, 1 Forthcoming
Volume 3: 2 Issues (2021)
Volume 2: 2 Issues (2020)
Volume 1: 2 Issues (2019)
View Complete Journal Contents Listing