<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>RSI Security</title>
	<atom:link href="https://blog.rsisecurity.com/feed/" rel="self" type="application/rss+xml" />
	<link>https://blog.rsisecurity.com</link>
	<description>Blog</description>
	<lastBuildDate>Thu, 25 Mar 2021 09:08:18 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=4.9.16</generator>
	<item>
		<title>What is a HITRUST Self-Assessment Questionnaire?</title>
		<link>https://blog.rsisecurity.com/what-is-a-hitrust-self-assessment-questionnaire/</link>
		<comments>https://blog.rsisecurity.com/what-is-a-hitrust-self-assessment-questionnaire/#respond</comments>
		<pubDate>Wed, 24 Mar 2021 08:03:55 +0000</pubDate>
		<dc:creator><![CDATA[RSI Security]]></dc:creator>
				<category><![CDATA[HITRUST]]></category>

		<guid isPermaLink="false">https://blog.rsisecurity.com/?p=9366</guid>
		<description><![CDATA[<p>Companies in the healthcare industry are attractive targets for cybercrime, so they need to comply with HIPAA and HITECH frameworks. But many of these companies also need to comply with&#8230;</p>
<p>The post <a rel="nofollow" href="https://blog.rsisecurity.com/what-is-a-hitrust-self-assessment-questionnaire/">What is a HITRUST Self-Assessment Questionnaire?</a> appeared first on <a rel="nofollow" href="https://blog.rsisecurity.com">RSI Security</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><span style="font-weight: 400;">Companies in the healthcare industry are attractive targets for</span><a href="https://blog.rsisecurity.com/what-are-cyber-crimes/"><span style="font-weight: 400;"> cybercrime</span></a><span style="font-weight: 400;">, so they need to comply with HIPAA and HITECH frameworks. But many of these companies also need to comply with other codes, such as PCI-DSS. Luckily, the </span><a href="https://hitrustalliance.net/"><span style="font-weight: 400;">HITRUST Alliance</span></a><span style="font-weight: 400;">’s </span><a href="https://hitrustalliance.net/hitrust-csf/"><span style="font-weight: 400;">Common Security Framework</span></a><span style="font-weight: 400;"> (CSF) simplifies implementation across all of them. Thus, a </span><span style="font-weight: 400;">HITRUST Self Assessment Questionnaire</span><span style="font-weight: 400;"> is the first step toward streamlined compliance and cybersecurity.</span></p>
<p><span id="more-9366"></span></p>
<p><span style="font-weight: 400;">Let’s discuss. </span></p>
<p><span style="font-weight: 400;"> </span></p>
<h2><b>What is a </b><b>HITRUST Self-Assessment Questionnaire</b><b>?</b></h2>
<p><span style="font-weight: 400;">To </span><a href="https://www.rsisecurity.com/compliance-advisory-services/hitrust/"><span style="font-weight: 400;">achieve full compliance with the HITRUST CSF</span></a><span style="font-weight: 400;">, you will need to complete more than just a Self Assessment. But the Self-Assessment Questionnaire is a valuable tool for getting started with implementation — it is also an excellent tool for saving time and money on the journey toward Certification, as it makes later testing easier for you and your (required) third-party assessors.</span></p>
<p><span style="font-weight: 400;">This article will break down everything you need to know, including:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">A deep dive into HITRUST Self-Assessment and other forms of assessment</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">A comprehensive overview of what it takes to implement all HITRUST controls</span></li>
</ul>
<p><span style="font-weight: 400;">By the time we’re done, you’ll be ready to self-assess or fully verify your HITRUST compliance. But first, let’s address the elephant in the room: does your business even need to comply?</span></p>
<p><span style="font-weight: 400;"> </span></p>
<h3><b>Does Your Company Need to Self-Assess?</b></h3>
<p><span style="font-weight: 400;">There is no legal requirement for HITRUST compliance anywhere in the US. However, in many cases, businesses may face de facto requirements with respect to industry standards or client expectations. HITRUST offers optimum protection against a wide variety of risks, so compliance can provide a competitive advantage over other companies that don’t implement its safeguards.</span></p>
<p><span style="font-weight: 400;">Moreover, depending on the nature of your business, several elements of HITRUST are required for legal operation. For example, businesses in the healthcare industry need to comply with the</span> <a href="https://www.rsisecurity.com/compliance-advisory-services/hipaa/"><span style="font-weight: 400;">Health Insurance Portability and Accountability Act of 1996</span></a> <span style="font-weight: 400;">(HIPAA). And any such companies that also process credit card transactions need to comply with the </span><a href="https://www.pcisecuritystandards.org/"><span style="font-weight: 400;">Payment Card Industry</span></a> <a href="https://www.pcisecuritystandards.org/documents/PCI_DSS_v3-2-1.pdf?agreement=true&amp;time=1603254257793"><span style="font-weight: 400;">Data Security Standard</span></a><span style="font-weight: 400;">. Mapping across these and others can create challenges.</span></p>
<p><span style="font-weight: 400;">HITRUST combines these and other frameworks into one. It might not be a strict requirement for your business, but it can offer an efficient solution for all your other compliance obligations.</span></p>
<p>&nbsp;</p>
<div class="su-button-center"><a href="https://www.rsisecurity.com/compliance-advisory-services/hitrust/" class="su-button su-button-style-flat" style="color:#FFFFFF;background-color:#2D89EF;border-color:#246ec0;border-radius:13px;-moz-border-radius:13px;-webkit-border-radius:13px" target="_blank" rel="noopener noreferrer"><span style="color:#FFFFFF;padding:0px 32px;font-size:23px;line-height:46px;border-color:#6cadf4;border-radius:13px;-moz-border-radius:13px;-webkit-border-radius:13px;text-shadow:none;-moz-text-shadow:none;-webkit-text-shadow:none"> Speak with a HITRUST expert today!</span></a></div>
<p>&nbsp;</p>
<h2><b>Understanding HITRUST Self-Assessment</b></h2>
<p><span style="font-weight: 400;">Overall, HITRUST Self Assessment involves far more than just completion of the </span><span style="font-weight: 400;">HITRUST Self- Assessment Questionnaire</span><span style="font-weight: 400;">. The primary requirement comprises signing up for the MyCSF tool, the platform from which you’ll fill out the questionnaire, score your Assessment, and browse analytical insights into your readiness for full Certification. However, all that visibility doesn’t come cheap. Registration costs $2500 per 90 days, and the test itself costs $3750.</span></p>
<p><span style="font-weight: 400;">Another important cost factor to keep in mind is that Assessment, even just Self-Assessment, can be expected to last well over 90 days, meaning multiple registrations may be required.</span></p>
<p><span style="font-weight: 400;">Self-Assessment itself is straightforward — it requires simply testing the extent to which all Control References are installed and maintained (see below). Importantly, your Self-Assessment thereof doesn’t validate these practices. For that, you’ll need external verification for full Certification.</span></p>
<p><span style="font-weight: 400;"> </span></p>
<h3><b>Other Levels of HITRUST CSF Assessment</b></h3>
<p><span style="font-weight: 400;">For companies seeking full compliance with the HITRUST CSF, completing the Self-Assessment Questionnaire process is far from the last step. Full compliance periods require CSF validation or certification, depending upon scores. Typically, they last for one or two years. To achieve them, the other primary </span><a href="https://hitrustalliance.net/product-tool/csf-assessment/"><span style="font-weight: 400;">forms of CSF Assessment</span></a><span style="font-weight: 400;">, per HITRUST, include the following:</span></p>
<ul>
<li aria-level="1"><b>Validated Assessment<span style="font-weight: 400;"> – An Authorized External Assessor tests the implementation of all controls, then reports findings to HITRUST for a Quality Assurance Review; Certification is granted for two years, pending an Interim Assessment after one year</span></b></li>
<li aria-level="1"><strong>Interim Assessment</strong><span style="font-weight: 400;"> – An Authorized External Assessor tests implementation and maintenance of controls at the one-year mark of Certification, extending it for a year</span></li>
</ul>
<p><span style="font-weight: 400;">Besides, another important form of assessment has been adopted via the </span><a href="https://hitrustalliance.net/news/hitrust-offers-new-bridge-assessment-and-certificate-to-help-organizations-overcome-challenges-maintaining-hitrust-csf-certification-due-to-covid-19-disruption/"><span style="font-weight: 400;">“Bridge” program</span></a><span style="font-weight: 400;"> to facilitate coverage for businesses struggling to meet recertification deadlines due to COVID-19:</span></p>
<ul>
<li aria-level="1"><b>Bridge Assessment<span style="font-weight: 400;"> – An Authorized External Assessor performs a special Bridge Assessment for qualifying companies, extending a form of Certification for 90 days following the end of the last period (to be subtracted from the next Certified period)</span></b></li>
</ul>
<p><span style="font-weight: 400;">Across these assessment methods, the core of compliance still requires implementing and maintaining all of the HITRUST CSF controls. So, let’s take a look at what exactly that entails.</span></p>
<p><span style="font-weight: 400;"> <img class="alignnone wp-image-9309" src="https://blog.rsisecurity.com/wp-content/uploads/2021/03/laptop-5-300x148.jpg" alt="" width="760" height="375" srcset="https://blog.rsisecurity.com/wp-content/uploads/2021/03/laptop-5-300x148.jpg 300w, https://blog.rsisecurity.com/wp-content/uploads/2021/03/laptop-5-768x379.jpg 768w, https://blog.rsisecurity.com/wp-content/uploads/2021/03/laptop-5-1024x505.jpg 1024w, https://blog.rsisecurity.com/wp-content/uploads/2021/03/laptop-5-1170x577.jpg 1170w, https://blog.rsisecurity.com/wp-content/uploads/2021/03/laptop-5-585x289.jpg 585w, https://blog.rsisecurity.com/wp-content/uploads/2021/03/laptop-5.jpg 1279w" sizes="(max-width: 760px) 100vw, 760px" /></span></p>
<h2><b>Implementing the HITRUST Approach</b></h2>
<p><span style="font-weight: 400;">The most important parts of a </span><span style="font-weight: 400;">HITRUST Self-Assessment checklist</span><span style="font-weight: 400;"> are the Control Categories (14), Objective Names (49), and Control References (156) that make up the CSF. Your Self — and eventually Validated — Assessment depends primarily on implementing the following:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><b>Control Category 0.0: Information Security Management</b><span style="font-weight: 400;"> –</span>
<ul>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">One Objective Name governing top-level controls for policy maintenance</span></li>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">One Control Reference specifying requirements for policy and implementation</span></li>
</ul>
</li>
<li style="font-weight: 400;" aria-level="1"><b>Control Category 0.1: Access Control Security</b><span style="font-weight: 400;"> –</span>
<ul>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">Seven Objective Names restricting access to data through authentication</span></li>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">25 Control References specifying password strength, session length, etc.</span></li>
</ul>
</li>
<li style="font-weight: 400;" aria-level="1"><b>Control Category 0.2: Human Resources Security</b><span style="font-weight: 400;"> –</span>
<ul>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">Four Objective Names governing general approach to personnel management</span></li>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">Nine Control References specifying approaches to recruitment, hiring, etc.</span></li>
</ul>
</li>
<li style="font-weight: 400;" aria-level="1"><b>Control Category 0.3: Risk Management Policy</b><span style="font-weight: 400;"> –</span>
<ul>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">One Objective Name governing programmatic approach to risk mitigation</span></li>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">Four Control References specifying monitoring and analytical requirements</span></li>
</ul>
</li>
<li style="font-weight: 400;" aria-level="1"><b>Control Category 0.4: Security Policy</b><span style="font-weight: 400;"> –</span>
<ul>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">One Objective Name governing baseline definitions of security and privacy</span></li>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">Two Control References specifying requirements for timely updates to the policy</span></li>
</ul>
</li>
<li style="font-weight: 400;" aria-level="1"><b>Control Category 0.5: Information Security Organization</b><span style="font-weight: 400;"> – </span>
<ul>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">Two Objective Names governing organization of internal and external parties</span></li>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">11 Control References defining respective responsibilities, privileges, etc.</span></li>
</ul>
</li>
<li style="font-weight: 400;" aria-level="1"><b>Control Category 0.6: Regulatory Framework Compliance</b><span style="font-weight: 400;"> –</span>
<ul>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">Three Objective Names governing approaches to legal and audit requirements</span></li>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">Ten Control References specifying controls for individual compliance rules</span></li>
</ul>
</li>
<li style="font-weight: 400;" aria-level="1"><b>Control Category 0.7: Asset Management Security</b><span style="font-weight: 400;"> –</span>
<ul>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">Two Objective Names governing inventory control and responsibilities</span></li>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">Five Control References setting rules for classification, ownership, etc.</span></li>
</ul>
</li>
<li style="font-weight: 400;" aria-level="1"><b>Control Category 0.8: Physical and Environmental Security</b><span style="font-weight: 400;"> –</span>
<ul>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">Two Objective Names restricting physical and proximal access to sensitive data</span></li>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">13 Control References defining boundaries and use of devices and spaces</span></li>
</ul>
</li>
<li style="font-weight: 400;" aria-level="1"><b>Control Category 0.9: Communications and Operations Security</b><span style="font-weight: 400;"> –</span>
<ul>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">Ten Objective Names governing requirements for secure wireless network traffic </span></li>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">32 Control References specifying controls to monitor and control communications</span></li>
</ul>
</li>
<li style="font-weight: 400;" aria-level="1"><b>Control Category 0.10: Information Systems Management</b><span style="font-weight: 400;"> –</span>
<ul>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">Six Objective Names governing overall hardware and software security</span></li>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">13 Control References establishing controls for apps, encryption, etc.</span></li>
</ul>
</li>
<li style="font-weight: 400;" aria-level="1"><b>Control Category 0.11: Security Incident Management</b><span style="font-weight: 400;"> –</span>
<ul>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">Two Objective Names governing detection and response to events</span></li>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">Five Control References specifying defense protocols, contingencies, etc.</span></li>
</ul>
</li>
<li style="font-weight: 400;" aria-level="1"><b>Control Category 0.12: Business Continuity Management</b><span style="font-weight: 400;"> – </span>
<ul>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">One Objective Name ensuring the seamless continuation of services</span></li>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">Five Control References defining testing and planning to that end</span></li>
</ul>
</li>
<li style="font-weight: 400;" aria-level="1"><b>Control Category 0.13: Privacy Security Practices</b><span style="font-weight: 400;"> –</span>
<ul>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">Seven Objective Names governing personal accountability standards</span></li>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">21 Control References specifying individual practice requirements</span></li>
</ul>
</li>
</ul>
<p><span style="font-weight: 400;">Implementing the CSF and other </span><a href="https://hitrustalliance.net/documents/csf_rmf_related/HITRUST-RMF-Whitepaper.pdf"><span style="font-weight: 400;">Risk Management Frameworks</span></a><span style="font-weight: 400;"> in the </span><a href="https://hitrustalliance.net/content/uploads/HITRUST-Approach.pdf"><span style="font-weight: 400;">HITRUST Approach</span></a><span style="font-weight: 400;"> can be highly challenging. </span></p>
<p><span style="font-weight: 400;">That’s where we can help. </span></p>
<p><span style="font-weight: 400;"> </span></p>
<h3><b>Professional Assessment and Cyberdefense with RSI Security </b></h3>
<p><a href="https://www.rsisecurity.com"><span style="font-weight: 400;">RSI Security</span></a><span style="font-weight: 400;"> is an Authorized External Assessor ready to work with you on HITRUST implementation and compliance elements. Our comprehensive suite of </span><a href="https://www.rsisecurity.com/compliance-advisory-services/hitrust/"><span style="font-weight: 400;">HITRUST services</span></a><span style="font-weight: 400;"> includes everything from tailored planning and implementation of required controls to robust training and analysis for your staff. </span></p>
<p><span style="font-weight: 400;">Additionally, we help with guidance through Self and Validated Assessment itself. </span></p>
<p><span style="font-weight: 400;">We know firsthand how vital, albeit challenging, </span><a href="https://www.rsisecurity.com/compliance-advisory-services/"><span style="font-weight: 400;">compliance</span></a><span style="font-weight: 400;"> can be. But we also know that it’s hardly the end of your cybersecurity journey — instead, it’s just the start of your cyberdefense. We can help with everything it takes to keep your stakeholders safe, whether it’s </span><span style="font-weight: 400;">HITRUST Self Assessment Questionnaire</span><span style="font-weight: 400;"> or a new cybersecurity architecture.</span> <a href="https://www.rsisecurity.com/contact"><span style="font-weight: 400;">Contact RSI Security today</span></a><span style="font-weight: 400;">!</span></p>
<p><span style="font-weight: 400;"> </span></p>
<div class="su-button-center"><a href="https://www.rsisecurity.com/compliance-advisory-services/hitrust/" class="su-button su-button-style-flat" style="color:#FFFFFF;background-color:#2D89EF;border-color:#246ec0;border-radius:13px;-moz-border-radius:13px;-webkit-border-radius:13px" target="_blank" rel="noopener noreferrer"><span style="color:#FFFFFF;padding:0px 32px;font-size:23px;line-height:46px;border-color:#6cadf4;border-radius:13px;-moz-border-radius:13px;-webkit-border-radius:13px;text-shadow:none;-moz-text-shadow:none;-webkit-text-shadow:none"> Speak with a HITRUST expert today!</span></a></div>
<p>&nbsp;</p>
<p>The post <a rel="nofollow" href="https://blog.rsisecurity.com/what-is-a-hitrust-self-assessment-questionnaire/">What is a HITRUST Self-Assessment Questionnaire?</a> appeared first on <a rel="nofollow" href="https://blog.rsisecurity.com">RSI Security</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://blog.rsisecurity.com/what-is-a-hitrust-self-assessment-questionnaire/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>A Guide to HITRUST Password Requirements and Best Practices</title>
		<link>https://blog.rsisecurity.com/a-guide-to-hitrust-password-requirements-and-best-practices/</link>
		<comments>https://blog.rsisecurity.com/a-guide-to-hitrust-password-requirements-and-best-practices/#respond</comments>
		<pubDate>Wed, 24 Mar 2021 07:46:32 +0000</pubDate>
		<dc:creator><![CDATA[RSI Security]]></dc:creator>
				<category><![CDATA[HITRUST]]></category>

		<guid isPermaLink="false">https://blog.rsisecurity.com/?p=9361</guid>
		<description><![CDATA[<p>Robust cybersecurity architecture begins with essentials like access control and user credential management. This is especially true for businesses in the healthcare industry, where unauthorized access via a weak or&#8230;</p>
<p>The post <a rel="nofollow" href="https://blog.rsisecurity.com/a-guide-to-hitrust-password-requirements-and-best-practices/">A Guide to HITRUST Password Requirements and Best Practices</a> appeared first on <a rel="nofollow" href="https://blog.rsisecurity.com">RSI Security</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><span style="font-weight: 400;">Robust cybersecurity architecture begins with essentials like access control and user credential management. This is especially true for businesses in the healthcare industry, where unauthorized access via a weak or stolen password can compromise </span><a href="https://blog.rsisecurity.com/what-is-phi-protected-health-information/"><span style="font-weight: 400;">protected health information security (PHI)</span></a><span style="font-weight: 400;">. </span><span style="font-weight: 400;">HITRUST password requirements</span><span style="font-weight: 400;"> simplify the measures required to keep all your stakeholders safe. Read on to learn more about what they entail.</span></p>
<p><span style="font-weight: 400;"> </span><span id="more-9361"></span></p>
<h2><b>Guide to </b><b>HITRUST Password Requirements</b></h2>
<p><span style="font-weight: 400;">Targeted cyberattacks can lead to guessing, hacking, cracking, or even theft of passwords. Users cannot be trusted to make their account credentials strong on their own accord. Your company needs to guarantee safety with robust minimum requirements and frequent updates, along with other password safeguards. HITRUST’s framework offers uniform standards to optimize them.</span></p>
<p><span style="font-weight: 400;">This guide breaks down everything you need to know into two primary sections:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">A full explainer of </span><span style="font-weight: 400;">HITRUST password requirements</span><span style="font-weight: 400;">, including all relevant controls</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Other password security best practices, including helpful resources</span></li>
</ul>
<p><span style="font-weight: 400;">By the end of this blog, you’ll be well equipped to secure your passwords up to HITRUST standards and well beyond. But first, let’s take a quick look at the broader </span><a href="https://blog.rsisecurity.com/how-can-healthcare-organizations-leverage-hitrust-framework/"><span style="font-weight: 400;">HITRUST framework.</span></a></p>
<p><span style="font-weight: 400;"> </span></p>
<h3><b>What is HITRUST and Who Needs to Comply?</b></h3>
<p><span style="font-weight: 400;">The </span><a href="https://blog.rsisecurity.com/who-is-the-hitrust-alliance/"><span style="font-weight: 400;">HITRUST Alliance</span></a><span style="font-weight: 400;">,</span><span style="font-weight: 400;"> formerly known as the “Health Information Trust Alliance,” endeavors to protect companies in the healthcare industry through the </span><a href="https://hitrustalliance.net/content/uploads/HITRUST-Approach.pdf"><span style="font-weight: 400;">HITRUST Approach</span></a><span style="font-weight: 400;">. This includes adopting several risk management and cybersecurity frameworks, most notably the </span><a href="https://hitrustalliance.net/hitrust-csf/"><span style="font-weight: 400;">Common Security Framework</span></a><span style="font-weight: 400;"> (CSF). The CSF integrates controls from various regulatory texts, such as </span><a href="https://www.rsisecurity.com/compliance-advisory-services/hipaa/"><span style="font-weight: 400;">HIPAA</span></a><span style="font-weight: 400;">,</span> <a href="https://www.hhs.gov/hipaa/for-professionals/special-topics/hitech-act-enforcement-interim-final-rule/index.html"><span style="font-weight: 400;">HITECH</span></a><span style="font-weight: 400;">, and </span><a href="https://www.rsisecurity.com/compliance-advisory-services/pci/"><span style="font-weight: 400;">PCI-DSS</span></a><span style="font-weight: 400;">,</span><span style="font-weight: 400;"> simplifying the adoption of all of them simultaneously.</span></p>
<p><span style="font-weight: 400;">HITRUST compliance is not a legal requirement for any organization. But the inputs for the CSF are legally required for many organizations in specific contexts. Healthcare organizations need to be HIPAA compliant, and all businesses that process card payments need to be PCI-DSS compliant. HITRUST offers efficiency, as well as optimal security.</span></p>
<p><span style="font-weight: 400;">Let’s take a close look at the </span><span style="font-weight: 400;">HITRUST password requirements</span><span style="font-weight: 400;">, as they appear in the CSF.</span></p>
<p><img class="alignnone wp-image-9313" src="https://blog.rsisecurity.com/wp-content/uploads/2021/03/laptop-work-300x156.jpg" alt="" width="779" height="405" srcset="https://blog.rsisecurity.com/wp-content/uploads/2021/03/laptop-work-300x156.jpg 300w, https://blog.rsisecurity.com/wp-content/uploads/2021/03/laptop-work-768x400.jpg 768w, https://blog.rsisecurity.com/wp-content/uploads/2021/03/laptop-work-1024x533.jpg 1024w, https://blog.rsisecurity.com/wp-content/uploads/2021/03/laptop-work-1170x609.jpg 1170w, https://blog.rsisecurity.com/wp-content/uploads/2021/03/laptop-work-585x305.jpg 585w, https://blog.rsisecurity.com/wp-content/uploads/2021/03/laptop-work.jpg 1277w" sizes="(max-width: 779px) 100vw, 779px" /></p>
<h2><b>HITRUST Requirements for Passwords</b></h2>
<p><span style="font-weight: 400;">The core of the HITRUST CSF comprises 156 “Control References.” These spread across 49 “Objective Names,” which themselves are housed in 14 “Control Categories.” Across the HITRUST CSF, the primary requirements that deal directly with passwords are the following:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">HITRUST password length requirements</span><span style="font-weight: 400;"> and strength requirements include a minimum of eight characters for a given password or 15 characters for accounts with the most privileged access. Complexity measures include at least one number and/or special character and at least one letter in upper and lower case for privileged accounts.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">HITRUST password history requirements vary in range, depending on the level of security required for a given user. For the most highly privileged accounts, passwords must be changed every 60 days, and no combinations from the previous 12 passwords may be used. For accounts with fewer access privileges, none of the previous six passwords may be used.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">HITRUST encryption requirements</span><span style="font-weight: 400;"> intersect with user credentials concerning user account management and access to the cloud or remote servers. Storing sensitive information, including passwords, also requires encryption to protect them even if stolen.</span></li>
</ul>
<p><span style="font-weight: 400;">Other requirements related to user credentials, accounts, and access include multi-factor authentication for specific accounts and the Category of “Access Control.”</span></p>
<p><span style="font-weight: 400;"> </span></p>
<a href="https://www.rsisecurity.com/compliance-advisory-services/hitrust/" class="su-button su-button-style-flat" style="color:#FFFFFF;background-color:#2D89EF;border-color:#246ec0;border-radius:13px;-moz-border-radius:13px;-webkit-border-radius:13px" target="_blank" rel="noopener noreferrer"><span style="color:#FFFFFF;padding:0px 32px;font-size:23px;line-height:46px;border-color:#6cadf4;border-radius:13px;-moz-border-radius:13px;-webkit-border-radius:13px;text-shadow:none;-moz-text-shadow:none;-webkit-text-shadow:none"> Assess your HITRUST compliance</span></a>
<p>&nbsp;</p>
<h3><b>Breakdown of Access Control Requirements</b></h3>
<p><span style="font-weight: 400;">There is only one Control Category related directly to password length, strength, and other qualities: “Control Category 01.0, Access Control.” Coincidentally, this is also a Category with some of the most Objectives (seven) and Control References (25). Let’s take a closer look at them:</span></p>
<ul>
<li aria-level="1"><b>Objective 01.01: Business requirement for access control<span style="font-weight: 400;"> </span></b></li>
</ul>
<ul>
<li style="list-style-type: none;">
<ul>
<li style="list-style-type: none;">
<ul>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">Reference 01.a: developing a strong access control policy</span></li>
</ul>
</li>
</ul>
</li>
</ul>
<ul>
<li aria-level="1"><b>Objective 01.02: Authorized access to information systems<span style="font-weight: 400;"> </span></b></li>
</ul>
<ul>
<li style="list-style-type: none;">
<ul>
<li style="list-style-type: none;">
<ul>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">Reference 01.b: control registration of all user accounts</span></li>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">Reference 01.c: manage access privileges of user accounts</span></li>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">Reference 01.d: manage users’ passwords and accounts</span></li>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">Reference 01.e: regularly review users’ rights of access</span></li>
</ul>
</li>
</ul>
</li>
</ul>
<ul>
<li aria-level="1"><b>Objective 01.03: User responsibilities<span style="font-weight: 400;"> </span></b></li>
</ul>
<ul>
<li style="list-style-type: none;">
<ul>
<li style="list-style-type: none;">
<ul>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">Reference 01.f: govern users’ use of passwords and accounts</span></li>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">Reference 01.g: account for user equipment left unattended</span></li>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">Reference 01.h: require clean and secure workstations</span></li>
</ul>
</li>
</ul>
</li>
</ul>
<ul>
<li aria-level="1"><b>Objective 01.04: Network access control<span style="font-weight: 400;"> </span></b></li>
</ul>
<ul>
<li style="list-style-type: none;">
<ul>
<li style="list-style-type: none;">
<ul>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">Reference 01.i: create policy restricting access to networks</span></li>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">Reference 01.j: authenticate access via an external connection</span></li>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">Reference 01.k: identify all equipment connected to networks</span></li>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">Reference 01.l: monitor and protect remote and port access points</span></li>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">Reference 01.m: implement segregation of and within networks</span></li>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">Reference 01.n: control connections to, from, and across networks</span></li>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">Reference 01.o: control routing of and to internal and external networks</span></li>
</ul>
</li>
</ul>
</li>
</ul>
<ul>
<li aria-level="1"><b>Objective 01.05: Operating system access control<span style="font-weight: 400;"> </span></b></li>
</ul>
<ul>
<li style="list-style-type: none;">
<ul>
<li style="list-style-type: none;">
<ul>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">Reference 01.p: ensure secure procedures for logging into accounts</span></li>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">Reference 01.q: implement authentication and identification of users</span></li>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">Reference 01.r: implement a robust password management system</span></li>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">Reference 01.s: monitor and control all use of system utilities</span></li>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">Reference 01.t: require automatic session time-out for inactivity</span></li>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">Reference 01.u: limit duration of access sessions, within reason</span></li>
</ul>
</li>
</ul>
</li>
</ul>
<ul>
<li aria-level="1"><b>Objective 01.06: Application and information access control<span style="font-weight: 400;"> </span></b></li>
</ul>
<ul>
<li style="list-style-type: none;">
<ul>
<li style="list-style-type: none;">
<ul>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">Reference 01.v: restrict access to sensitive information</span></li>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">Reference 01.w: logically isolate sensitive information</span></li>
</ul>
</li>
</ul>
</li>
</ul>
<ul>
<li aria-level="1"><b>Objective 01.07: Mobile computing and teleworking<span style="font-weight: 400;"> </span></b></li>
</ul>
<ul>
<li style="list-style-type: none;">
<ul>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">Reference 01.x: monitor and control mobile access</span></li>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">Reference 01.y: implement telework security measures</span></li>
</ul>
</li>
</ul>
<p><span style="font-weight: 400;">While only a few of these Objectives and References deal directly with passwords specifically, access control’s overall Category offers broader protection through other measures. This is true of HITRUST’s framework, as well as in other regulatory texts (HIPAA, PCI-DSS, etc.).</span></p>
<p><span style="font-weight: 400;"> <img class="alignnone wp-image-9305" src="https://blog.rsisecurity.com/wp-content/uploads/2021/03/desk-300x149.jpg" alt="" width="737" height="366" srcset="https://blog.rsisecurity.com/wp-content/uploads/2021/03/desk-300x149.jpg 300w, https://blog.rsisecurity.com/wp-content/uploads/2021/03/desk-768x382.jpg 768w, https://blog.rsisecurity.com/wp-content/uploads/2021/03/desk-1024x510.jpg 1024w, https://blog.rsisecurity.com/wp-content/uploads/2021/03/desk-1170x582.jpg 1170w, https://blog.rsisecurity.com/wp-content/uploads/2021/03/desk-585x291.jpg 585w, https://blog.rsisecurity.com/wp-content/uploads/2021/03/desk.jpg 1276w" sizes="(max-width: 737px) 100vw, 737px" /></span></p>
<h2><b>Other Password Security Best Practices</b></h2>
<p><span style="font-weight: 400;">Besides the baseline password requirements for HITRUST compliance, there are many other security measures your company can take to keep its user credentials safe. For example, many cybersecurity experts recommend utilizing a passphrase rather than a password. Splitting up the credential into two or more distinct strings of characters makes it more difficult to guess.</span></p>
<p><span style="font-weight: 400;">A more advanced approach involves two or </span><a href="https://blog.rsisecurity.com/the-factors-of-multifactor-authentication/"><span style="font-weight: 400;">multi-factor authentication</span></a><span style="font-weight: 400;">, which authorizes access through a username and password or phrase, in addition to some combination of:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Something the user </span><i><span style="font-weight: 400;">owns</span></i><span style="font-weight: 400;">, such as a secondary device used to confirm the identity</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Something the user </span><i><span style="font-weight: 400;">knows</span></i><span style="font-weight: 400;">, such as a security question only they can answer</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Something the user </span><i><span style="font-weight: 400;">is</span></i><span style="font-weight: 400;">, such as a biometric scan of a retina, fingerprint, etc.</span></li>
</ul>
<p><span style="font-weight: 400;">All these methods help to keep passwords safe from guessing, cracking, and theft. But if passwords </span><i><span style="font-weight: 400;">are</span></i><span style="font-weight: 400;"> compromised, robust encryption can help ensure that hackers cannot view or use the credentials. RSI Security’s </span><a href="https://www.rsisecurity.com/identity-access-management/"><span style="font-weight: 400;">identity and access management services</span></a><span style="font-weight: 400;"> include all of these measures, alongside powerful analytics and management.</span></p>
<p><span style="font-weight: 400;"> </span></p>
<h2><b>Professional Compliance and Cybersecurity</b></h2>
<p><span style="font-weight: 400;">Here at RSI Security, we know how critical compliance is for companies within the healthcare industry. We also understand the value HITRUST offers in simplifying all the controls you need for HIPAA compliance. </span></p>
<p><span style="font-weight: 400;">Our suite of </span><a href="https://www.rsisecurity.com/compliance-advisory-services/hitrust/"><span style="font-weight: 400;">HITRUST compliance services</span></a><span style="font-weight: 400;"> builds upon this value, helping to make HITRUST implementation and compliance a simple, straightforward process. Our experts will work with your internal IT to determine gaps, </span><a href="https://www.rsisecurity.com/patch-availability-report/"><span style="font-weight: 400;">report on patches</span></a><span style="font-weight: 400;">, and even help you develop them.</span></p>
<p><a href="https://www.rsisecurity.com/contact"><span style="font-weight: 400;">Contact RSI Security today</span></a><span style="font-weight: 400;"> for help implementing </span><span style="font-weight: 400;">HITRUST password requirements</span><span style="font-weight: 400;"> and all other controls. We’re also happy to help integrate these and other </span><a href="https://www.rsisecurity.com/compliance-advisory-services/"><span style="font-weight: 400;">regulatory requirements</span></a><span style="font-weight: 400;"> into the fabric of your company, optimizing your broader </span><a href="https://www.rsisecurity.com/architecture-implementation/"><span style="font-weight: 400;">cybersecurity architecture</span></a><span style="font-weight: 400;"> and keeping your stakeholders safe. No matter the needs and means of your company, we have you covered.</span></p>
<p><span style="font-weight: 400;"> </span></p>
<div class="su-button-center"><a href="https://www.rsisecurity.com/compliance-advisory-services/hitrust/" class="su-button su-button-style-flat" style="color:#FFFFFF;background-color:#2D89EF;border-color:#246ec0;border-radius:13px;-moz-border-radius:13px;-webkit-border-radius:13px" target="_blank" rel="noopener noreferrer"><span style="color:#FFFFFF;padding:0px 32px;font-size:23px;line-height:46px;border-color:#6cadf4;border-radius:13px;-moz-border-radius:13px;-webkit-border-radius:13px;text-shadow:none;-moz-text-shadow:none;-webkit-text-shadow:none"> Speak with a HITRUST expert today!</span></a></div>
<p>&nbsp;</p>
<p>The post <a rel="nofollow" href="https://blog.rsisecurity.com/a-guide-to-hitrust-password-requirements-and-best-practices/">A Guide to HITRUST Password Requirements and Best Practices</a> appeared first on <a rel="nofollow" href="https://blog.rsisecurity.com">RSI Security</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://blog.rsisecurity.com/a-guide-to-hitrust-password-requirements-and-best-practices/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>What is the HIPAA Enforcement Rule?</title>
		<link>https://blog.rsisecurity.com/what-is-the-hipaa-enforcement-rule/</link>
		<comments>https://blog.rsisecurity.com/what-is-the-hipaa-enforcement-rule/#respond</comments>
		<pubDate>Tue, 23 Mar 2021 08:06:07 +0000</pubDate>
		<dc:creator><![CDATA[RSI Security]]></dc:creator>
				<category><![CDATA[HIPAA / Healthcare Industry]]></category>

		<guid isPermaLink="false">https://blog.rsisecurity.com/?p=9367</guid>
		<description><![CDATA[<p>For businesses in the healthcare industry, the Health Insurance Portability and Accountability Act of 1996 (HIPAA) is essential for keeping clients and stakeholders safe. HIPAA defines what counts as “protected&#8230;</p>
<p>The post <a rel="nofollow" href="https://blog.rsisecurity.com/what-is-the-hipaa-enforcement-rule/">What is the HIPAA Enforcement Rule?</a> appeared first on <a rel="nofollow" href="https://blog.rsisecurity.com">RSI Security</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><span style="font-weight: 400;">For businesses in the healthcare industry, the </span><a href="https://aspe.hhs.gov/report/health-insurance-portability-and-accountability-act-1996"><span style="font-weight: 400;">Health Insurance Portability and Accountability Act of 1996</span></a><span style="font-weight: 400;"> (HIPAA) is essential for keeping clients and stakeholders safe. HIPAA defines what counts as “</span><a href="https://blog.rsisecurity.com/what-is-phi-protected-health-information/"><span style="font-weight: 400;">protected health information” (PHI),</span></a><span style="font-weight: 400;"> and its three prescriptive rules (Privacy, Security, and Breach Reporting) ensure its protection. The fourth, the </span><span style="font-weight: 400;">HIPAA Enforcement Rule</span><span style="font-weight: 400;">, defines what happens when a company fails to follow the other three. </span></p>
<p><span id="more-9367"></span></p>
<p><span style="font-weight: 400;">Read on to learn more!</span></p>
<p><span style="font-weight: 400;"> </span></p>
<h2><b>What is the </b><b>HIPAA Enforcement Rule</b><b>?</b></h2>
<p><span style="font-weight: 400;">HIPAA enforcement falls under the </span><a href="https://www.hhs.gov/"><span style="font-weight: 400;">US Department of Health and Human Services</span></a><span style="font-weight: 400;"> (HHS) jurisdiction, along with other governmental agencies. Below, we’ll walk through everything you need to know about HIPAA enforcement across two main sections:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">A comprehensive look at the </span><span style="font-weight: 400;">HIPAA Enforcement Rule</span><span style="font-weight: 400;">, including tiers of non-compliance penalties and the investigation processes for identifying noncompliance violations</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">An overview of the remaining HIPAA rules, including principles of the </span><a href="https://blog.rsisecurity.com/what-are-the-top-5-components-of-the-hipaa-privacy-rule/"><span style="font-weight: 400;">Privacy Rule</span></a><span style="font-weight: 400;">, safeguards of the</span><a href="https://blog.rsisecurity.com/what-you-should-know-about-the-hipaa-security-rule/"><span style="font-weight: 400;"> Security Rule</span></a><span style="font-weight: 400;">, and reporting for the Breach Notification Rule</span></li>
</ul>
<p><span style="font-weight: 400;">By the end of this blog, you’ll be well equipped to avoid the HIPAA enforcement rule’s penalties for non-compliance altogether. </span></p>
<p><span style="font-weight: 400;"> </span></p>
<h2><b>Enforcement Rule: Penalties and Procedures</b></h2>
<p><span style="font-weight: 400;">The </span><a href="https://www.hhs.gov/hipaa/for-professionals/special-topics/enforcement-rule/index.html"><span style="font-weight: 400;">HIPAA Enforcement Rule</span></a><span style="font-weight: 400;"> involves strict monitoring for and enforcement of the Privacy Rule since 2003 and the Security and Breach Notification Rules since 2009. The HHS reserves the right to hold businesses accountable with fines and other penalties for noncompliance:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><b>Civil money penalties </b><span style="font-weight: 400;">– Companies may be fined up to $1,500,000 over a year across all individual fines, which break down into four categories:</span>
<ul>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">$100 &#8211; $50,000 dollars if the entity committed a violation but “did not know”</span></li>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">$1,000 &#8211; $50,000 dollars if the entity had “reasonable cause” for violation</span></li>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">$10,000 &#8211; $50,000 dollars for companies’ “willful neglect” with correction</span></li>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">$50,000 dollars flat for companies’ “willful neglect” without correction</span></li>
</ul>
</li>
<li style="font-weight: 400;" aria-level="1"><b>Criminal penalties</b><span style="font-weight: 400;"> – Companies may be subject to criminal penalties for the most heinous instances of intentional noncompliance and fraud violations. These include:</span>
<ul>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">$50,000 dollars and up to one-year imprisonment for intentional misuse of (e)PHI</span></li>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">$100,000 dollars and up to five years imprisonment if false pretenses are involved</span></li>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">$250,000 dollars and up to ten years imprisonment for violations for personal gain</span></li>
</ul>
</li>
</ul>
<p><span style="font-weight: 400;">Aside from the basic thresholds detailed just about, the severity of the fine or penalty incurred depends on numerous factors. The HHS may exercise discretion to resolve an issue without assessing a fine, for instance, or apply a lower-tier fine to what should be a higher-tier offense.</span></p>
<p><span style="font-weight: 400;"> </span></p>
<a href="https://www.rsisecurity.com/compliance-advisory-services/hipaa/" class="su-button su-button-style-flat" style="color:#FFFFFF;background-color:#2D89EF;border-color:#246ec0;border-radius:13px;-moz-border-radius:13px;-webkit-border-radius:13px" target="_blank" rel="noopener noreferrer"><span style="color:#FFFFFF;padding:0px 32px;font-size:23px;line-height:46px;border-color:#6cadf4;border-radius:13px;-moz-border-radius:13px;-webkit-border-radius:13px;text-shadow:none;-moz-text-shadow:none;-webkit-text-shadow:none"> Assess your HIPAA / HITECH compliance</span></a>
<p>&nbsp;</p>
<h3><b>Enforcement Process: Ensuring Compliance</b></h3>
<p><span style="font-weight: 400;">To determine which fines or penalties a violation deserves, the HHS follows a strict </span><a href="https://www.hhs.gov/hipaa/for-professionals/compliance-enforcement/enforcement-process/index.html"><span style="font-weight: 400;">Enforcement process</span></a><span style="font-weight: 400;">. The process begins with the </span><a href="https://www.hhs.gov/ocr/index.html"><span style="font-weight: 400;">Office of Civil Rights</span></a><span style="font-weight: 400;"> (OCR) and stays within the OCR for civil penalties cases. Where criminal activity is suspected, the OCR works in conjunction with the US </span><a href="https://www.justice.gov/"><span style="font-weight: 400;">Department of Justice</span></a><span style="font-weight: 400;">. Altogether, the process has three main stages:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><b>Intake and review </b><span style="font-weight: 400;">– The OCR determines whether an immediate resolution is appropriate (an obvious non-violation) or if there is a potential civil or criminal violation, leading into&#8230;</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Investigation(s)</b><span style="font-weight: 400;"> – The OCR and DOJ begin a thorough auditing process to determine if and how one or more violations have occurred and the entity’s accountability, leading to&#8230;</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Resolution </b><span style="font-weight: 400;">– The OCR and DOJ may find that no violation has occurred, reach an agreement regarding voluntary corrective action, or issue a formal finding.</span></li>
</ul>
<p><span style="font-weight: 400;">Depending on what the OCR and DOJ decide, a company may face civil </span><i><span style="font-weight: 400;">and</span></i><span style="font-weight: 400;"> criminal penalties for a particularly egregious violation. HHS publishes a list of relevant </span><a href="https://www.hhs.gov/hipaa/for-professionals/compliance-enforcement/examples/index.html"><span style="font-weight: 400;">Case Examples</span></a><span style="font-weight: 400;"> that break down the reasoning behind some past cases (anonymized for security).</span></p>
<p><span style="font-weight: 400;"> <img class="alignnone wp-image-9247" src="https://blog.rsisecurity.com/wp-content/uploads/2021/03/work-300x142.png" alt="" width="752" height="356" srcset="https://blog.rsisecurity.com/wp-content/uploads/2021/03/work-300x142.png 300w, https://blog.rsisecurity.com/wp-content/uploads/2021/03/work-768x364.png 768w, https://blog.rsisecurity.com/wp-content/uploads/2021/03/work-585x277.png 585w, https://blog.rsisecurity.com/wp-content/uploads/2021/03/work.png 893w" sizes="(max-width: 752px) 100vw, 752px" /></span></p>
<h3><b>Covered Entities: Who Needs to Comply?</b></h3>
<p><span style="font-weight: 400;">Given the stark penalties detailed above, avoiding enforcement is extremely important for all companies who need to comply. But which companies are these, exactly? The HHS maintains a (non-exhaustive) list of </span><a href="https://www.hhs.gov/hipaa/for-professionals/covered-entities/index.html"><span style="font-weight: 400;">HIPAA Covered Entities</span></a><span style="font-weight: 400;">, of which there are three main categories:</span></p>
<ul>
<li aria-level="1"><b><span style="font-weight: 400;">Healthcare providers, such as doctors, hospitals, nursing homes, and pharmacies</span></b></li>
<li aria-level="1"><span style="font-weight: 400;">Health insurance plans, including insurance providers and coordinating companies </span></li>
<li aria-level="1"><span style="font-weight: 400;">Healthcare clearinghouses, or companies that process (non)standard health data</span></li>
</ul>
<p><span style="font-weight: 400;">These companies aren’t the only ones who need to worry about enforcement. As of 2009, covered entities’ </span><a href="https://www.hhs.gov/hipaa/for-professionals/privacy/guidance/business-associates/index.html"><span style="font-weight: 400;">business associates</span></a><span style="font-weight: 400;"> also need to comply with HIPAA. Failure to do so can have significant consequences for both the business associate and the covered entity. Template </span><a href="https://www.hhs.gov/hipaa/for-professionals/covered-entities/sample-business-associate-agreement-provisions/index.html"><span style="font-weight: 400;">business associate contracts</span></a><span style="font-weight: 400;"> can help account for this and keep all parties in the clear.</span></p>
<p><span style="font-weight: 400;"> </span></p>
<h2><b>What are the Other HIPAA Rules?</b></h2>
<p><span style="font-weight: 400;">As noted above, four main rules make up the core of </span><a href="https://www.hhs.gov/hipaa/for-professionals/index.html"><span style="font-weight: 400;">HIPAA for professionals</span></a><span style="font-weight: 400;"> — the three non Enforcement Rules define the prescriptive regulations a company must follow to protect PHI. However, this was not always the case. At first, HIPAA included only the Privacy Rule, with the Security Rule added shortly afterward to protect electronic PHI (“ePHI”).</span></p>
<p><span style="font-weight: 400;">Major changes came to HIPAA following the passing of the </span><a href="https://www.congress.gov/bill/111th-congress/house-bill/1/text"><span style="font-weight: 400;">H.R.1 &#8211; American Recovery and Reinvestment Act</span></a><span style="font-weight: 400;"> (ARRA) in 2009. HITECH, a key component of ARRA, added the Breach Notification Rule to HIPAA and significantly increased the penalties of Enforcement, and broadened the scope of covered entities to include business associates. HIPAA Enforcement is thus synonymous with </span><a href="https://www.hhs.gov/hipaa/for-professionals/special-topics/hitech-act-enforcement-interim-final-rule/index.html"><span style="font-weight: 400;">HITECH Enforcement</span></a><span style="font-weight: 400;"> — let’s take a look at </span><i><span style="font-weight: 400;">all</span></i><span style="font-weight: 400;"> the rules it has.</span></p>
<p><span style="font-weight: 400;"> </span></p>
<h3><b>Privacy Rule: Authorized Use and Disclosure</b></h3>
<p><span style="font-weight: 400;">The </span><a href="https://www.hhs.gov/hipaa/for-professionals/privacy/index.html"><span style="font-weight: 400;">HIPAA Privacy Rule</span></a><span style="font-weight: 400;"> exists to define rights and requirements regarding PHI. It designates what constitutes an appropriate (permitted or required) use of PHI and the conditions under which it can be accessed. The HHS’s </span><a href="https://www.hhs.gov/hipaa/for-professionals/privacy/laws-regulations/index.html"><span style="font-weight: 400;">Privacy Rule summary</span></a><span style="font-weight: 400;"> comprises two significant principles:</span></p>
<ul>
<li style="list-style-type: none;">
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Uses and disclosures of PHI are prohibited unless </span><i><span style="font-weight: 400;">required</span></i><span style="font-weight: 400;"> (expressly requested by the subject of the PHI or by a government agency) or </span><i><span style="font-weight: 400;">permitted</span></i><span style="font-weight: 400;"> (disclosures to the subject or a representative, uses undertaken in the public interest, and incidental disclosure, etc.)</span></li>
<li style="font-weight: 400;" aria-level="1"><b><span style="font-weight: 400;">All permitted disclosures, except certain required cases, need to be limited in scope to the </span><a href="https://blog.rsisecurity.com/what-is-the-hipaa-minimum-necessary-rule/"><span style="font-weight: 400;">minimum necessary</span></a><span style="font-weight: 400;"> amount that satisfies the permitted or required use case</span></b></li>
<li style="font-weight: 400;" aria-level="1">The <span>HIPAA Privacy Rule is enforced by</span><span> assessing the extent to which these principles are operationalized across a company’s cybersecurity architecture, personnel, and practices.</span></li>
</ul>
</li>
</ul>
<p><span style="font-weight: 400;"> </span></p>
<h3><b>Security Rule: Confidentiality, Integrity, Availability</b></h3>
<p><span style="font-weight: 400;">The </span><a href="https://www.hhs.gov/hipaa/for-professionals/security/index.html"><span style="font-weight: 400;">HIPAA Security Rule</span></a><span style="font-weight: 400;"> exists to extend the Privacy Rule principles out across a covered entity’s security architecture. The HHS’ </span><a href="https://www.hhs.gov/hipaa/for-professionals/security/laws-regulations/index.html"><span style="font-weight: 400;">Security Rule summary</span></a><span style="font-weight: 400;"> specifies three safeguards covered entities must implement to ensure confidentiality, integrity, and availability of (e)PHI:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Administrative safeguards, including management of security processes and personnel, identification and access, workforce training, and regular assessment or evaluation</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Physical safeguards, including restrictions of access to physical spaces and devices</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Technical safeguards, including robust access, audit, and integrity controls, as well as regular monitoring, analysis, and corrective measures for transmission security</span></li>
</ul>
<p><span style="font-weight: 400;">The </span><span style="font-weight: 400;">HIPAA Security Rule is enforced by</span><span style="font-weight: 400;"> assessing how effectively these safeguards contribute to the company’s risk analysis and management, proactively preventing threats to ePHI.</span></p>
<p><span style="font-weight: 400;"> </span></p>
<h3><b>Breach Notification Rule: Reporting Security Events</b></h3>
<p><span style="font-weight: 400;">Finally, the </span><a href="https://www.hhs.gov/hipaa/for-professionals/breach-notification/index.html"><span style="font-weight: 400;">HIPAA Breach Notification Rule</span></a><span style="font-weight: 400;"> exists as part of a contingency plan to follow if a data breach happens. A </span><a href="https://blog.rsisecurity.com/consequences-of-a-data-breach/"><span style="font-weight: 400;">data breach </span></a><span style="font-weight: 400;">is defined as any use not permitted by the Privacy Rule (with some exceptions). Should this occur, covered entities need to provide:</span></p>
<ul>
<li style="list-style-type: none;">
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Individual notice to all impacted parties, delivered by mail or email without unreasonable delay (within 60 days), in addition to a statement on the company’s home page (select cases)</span></li>
<li style="font-weight: 400;" aria-level="1"><b><span style="font-weight: 400;">Secretary notice to the HHS via </span><a href="https://www.hhs.gov/hipaa/for-professionals/breach-notification/breach-reporting/index.html"><span style="font-weight: 400;">Breach Reporting form</span></a><span style="font-weight: 400;">, annually for breaches impacting fewer than 500 people, and within 60 days for violations affecting more than 500 people</span></b></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Media notice to a prominent local or national media outlet, within 60 days, for any breach that impacts more than 500 people within the defined geographic location of that outlet</span></li>
</ul>
</li>
</ul>
<p><span style="font-weight: 400;">HIPAA’s Privacy and Security rules are enforced by</span><span style="font-weight: 400;"> assessing a company’s security practices at rest, but Breach Notification enforcement analyzes a company’s response </span><i><span style="font-weight: 400;">after</span></i><span style="font-weight: 400;"> a security event.</span></p>
<p><span style="font-weight: 400;"> </span></p>
<h2><b>How to Avoid HIPAA Enforcement</b></h2>
<p><span style="font-weight: 400;">To avoid the penalties of Enforcement, it’s crucial not to garner any complaints that would initiate the Enforcement Process detailed above. Your best option is working with a service provider to achieve and maintain compliance across your whole organization. To that end, RSI Security’s suite of </span><a href="https://www.rsisecurity.com/compliance-advisory-services/hipaa/"><span style="font-weight: 400;">HIPAA compliance services</span></a><span style="font-weight: 400;"> comprises everything you need to implement all the HIPAA rules and fully secure your clients’ PHI. </span></p>
<p><span style="font-weight: 400;">Whatever you need, we have it covered.</span></p>
<p><span style="font-weight: 400;">The most important thing to understand about the </span><span style="font-weight: 400;">HIPAA Enforcement Rule</span><span style="font-weight: 400;"> is how to ensure it never affects your organization. To see just how simple this process can be and how strong your company’s overall cyberdefenses can become, </span><a href="https://www.rsisecurity.com/contact"><span style="font-weight: 400;">contact RSI Security today</span></a><span style="font-weight: 400;">!</span></p>
<p><span style="font-weight: 400;"> </span></p>
<div class="su-button-center"><a href="https://www.rsisecurity.com/compliance-advisory-services/hipaa/" class="su-button su-button-style-flat" style="color:#FFFFFF;background-color:#2D89EF;border-color:#246ec0;border-radius:13px;-moz-border-radius:13px;-webkit-border-radius:13px" target="_blank" rel="noopener noreferrer"><span style="color:#FFFFFF;padding:0px 32px;font-size:23px;line-height:46px;border-color:#6cadf4;border-radius:13px;-moz-border-radius:13px;-webkit-border-radius:13px;text-shadow:none;-moz-text-shadow:none;-webkit-text-shadow:none"> Speak with a HIPAA / HITECH expert today!</span></a></div>
<p>&nbsp;</p>
<p>The post <a rel="nofollow" href="https://blog.rsisecurity.com/what-is-the-hipaa-enforcement-rule/">What is the HIPAA Enforcement Rule?</a> appeared first on <a rel="nofollow" href="https://blog.rsisecurity.com">RSI Security</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://blog.rsisecurity.com/what-is-the-hipaa-enforcement-rule/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Your Complete CMMC Assessment Guide </title>
		<link>https://blog.rsisecurity.com/complete-cmmc-assessment-guide/</link>
		<comments>https://blog.rsisecurity.com/complete-cmmc-assessment-guide/#respond</comments>
		<pubDate>Tue, 23 Mar 2021 07:49:46 +0000</pubDate>
		<dc:creator><![CDATA[RSI Security]]></dc:creator>
				<category><![CDATA[CMMC]]></category>

		<guid isPermaLink="false">https://blog.rsisecurity.com/?p=9362</guid>
		<description><![CDATA[<p>Any company that takes on lucrative contracts with the US Department of Defense (DoD) and becomes part of the Defense Industrial Base sector (DIB) needs to keep its cybersecurity practices&#8230;</p>
<p>The post <a rel="nofollow" href="https://blog.rsisecurity.com/complete-cmmc-assessment-guide/">Your Complete CMMC Assessment Guide </a> appeared first on <a rel="nofollow" href="https://blog.rsisecurity.com">RSI Security</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><span style="font-weight: 400;">Any company that takes on lucrative contracts with the US </span><a href="https://www.defense.gov/"><span style="font-weight: 400;">Department of Defense</span></a><span style="font-weight: 400;"> (DoD) and becomes part of the </span><a href="https://www.cisa.gov/defense-industrial-base-sector"><span style="font-weight: 400;">Defense Industrial Base sector</span></a><span style="font-weight: 400;"> (DIB) needs to keep its cybersecurity practices up to date. You will also need to adhere to the </span><a href="https://www.rsisecurity.com/compliance-advisory-services/cmmc/"><span style="font-weight: 400;">Cybersecurity Maturity Model Certification </span></a><span style="font-weight: 400;">(CMMC), including self-assessment and outside auditing, to confirm your compliance. This </span><span style="font-weight: 400;">CMMC assessment guide</span><span style="font-weight: 400;"> will break down what it takes to get started.</span></p>
<p><span style="font-weight: 400;"> </span><span id="more-9362"></span></p>
<h2><b>Complete </b><b>CMMC Assessment Guide</b></h2>
<p><span style="font-weight: 400;">CMMC is a publication of the </span><a href="https://www.acq.osd.mil/"><span style="font-weight: 400;">Office of the Under Secretary of Defense for Acquisition and Sustainment</span></a><span style="font-weight: 400;"> (OUSD-A&amp;S). It simplifies the adopting practices required by the </span><a href="https://blog.rsisecurity.com/how-to-become-dfars-compliant/"><span style="font-weight: 400;">Defense Federal Acquisition Regulation Supplement</span></a><span style="font-weight: 400;"> (DFARS), including all of </span><a href="https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-171r2.pdf"><span style="font-weight: 400;">Special Publication 800-171</span></a><span style="font-weight: 400;">.</span></p>
<p><span style="font-weight: 400;">Implementing and assessing all requirements for compliance can be highly complex. In this guide, we’ll walk you through everything you need to know to be fully compliant, including:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">The general focus of each level, including practice and process maturity goals</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">A detailed breakdown of every control required at each level</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Some resources to help you achieve compliance at all levels</span></li>
</ul>
<p><span style="font-weight: 400;">By the time we’re done, you’ll be well prepared to get started with assessment and certification or move on to the next stage in your cybersecurity journey. But first, let’s cover some basic CMMC definitions.</span></p>
<p><span style="font-weight: 400;"> </span></p>
<h3><b>CMMC Framework Basics: Levels and Domains</b></h3>
<p><span style="font-weight: 400;">At the CMMC’s core are 17 “Domains.” Each targets several “Capabilities” (43 total) across its “Practices,” or controls (171 total). These controls are implemented gradually across five “Maturity Levels.” These elements of the CMMC core break down as follows:</span><span style="font-weight: 400;"><br />
</span></p>
<p><b>Maturity Levels</b><span style="font-weight: 400;">:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><b>Maturity Level 1</b><span style="font-weight: 400;"> – Safeguarding Federal Contract Information (FCI)</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Maturity Level 2</b><span style="font-weight: 400;"> – Transitioning into Level 3 (and protection of CUI)</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Maturity Level 3</b><span style="font-weight: 400;"> – Protecting CUI (controlled unclassified information)</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Maturity Level 4</b><span style="font-weight: 400;"> – Finalizing CUI protection and preparing for APTs</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Maturity Level 5 </b><span style="font-weight: 400;">– Preventing APTs (Advanced Persistent Threats)</span></li>
</ul>
<p><span style="font-weight: 400;">At each Level, new and existing Practices are held to “process maturity” standards, measuring how integrated it is across the company. Practices must be revisited and upgraded at each successive level.</span></p>
<p><b>Cybersecurity Domains</b><span style="font-weight: 400;">:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><a href="https://www.rsisecurity.com/identity-access-management/"><span style="font-weight: 400;">Access and Control (AC)</span></a></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Asset Management (AM)</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Audit and Accountability (AU)</span></li>
<li style="font-weight: 400;" aria-level="1"><a href="https://www.rsisecurity.com/education-awareness/"><span style="font-weight: 400;">Awareness and Training (AT)</span></a></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Configuration Management (CM)</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Identification and Authentication (IA)</span></li>
<li style="font-weight: 400;" aria-level="1"><a href="https://www.rsisecurity.com/services/incident-management/"><span style="font-weight: 400;">Incident Response (IR)</span></a></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Maintenance (MA)</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Media Protection (MP)</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Personnel Security (PS)</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Physical Protection (PE)</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Recovery (RE)</span></li>
<li style="font-weight: 400;" aria-level="1"><a href="https://www.rsisecurity.com/third-party-risk-management/"><span style="font-weight: 400;">Risk Management (RM)</span></a></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Security Assessment (CA)</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Situational Awareness (SA)</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Systems and Communications Protection (SC)</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">System and Information Integrity (SI)</span><span style="font-weight: 400;"><br />
</span></li>
</ul>
<p><span style="font-weight: 400;">Now, let’s discuss all of the Levels’ general focuses, practice and process maturity goals, and the control breakdowns to prepare for assessment at every level. All content in the sections below is sourced directly from </span><a href="https://www.acq.osd.mil/cmmc/docs/CMMC_ModelMain_V1.02_20200318.pdf"><span style="font-weight: 400;">CMMC V1.02</span></a><span style="font-weight: 400;">, unless otherwise noted.</span></p>
<p><span style="font-weight: 400;"> </span></p>
<a href="https://www.rsisecurity.com/compliance-advisory-services/cmmc/" class="su-button su-button-style-flat" style="color:#FFFFFF;background-color:#2D89EF;border-color:#246ec0;border-radius:13px;-moz-border-radius:13px;-webkit-border-radius:13px" target="_blank" rel="noopener noreferrer"><span style="color:#FFFFFF;padding:0px 32px;font-size:23px;line-height:46px;border-color:#6cadf4;border-radius:13px;-moz-border-radius:13px;-webkit-border-radius:13px;text-shadow:none;-moz-text-shadow:none;-webkit-text-shadow:none"> Assess your CMMC Compliance</span></a>
<p>&nbsp;</p>
<h2><b>CMMC Level 1 Overview: Safeguarding FCI</b></h2>
<p><span style="font-weight: 400;">The first CMMC Maturity Level focuses on safeguards for federal contract information (FCI), one of the two types of data CMMC is designed to protect. Its Practice goals constitute “basic Cyber hygiene,” and Processes at Level 1 must be merely “performed” (not measured).</span></p>
<p><span style="font-weight: 400;">In total, </span><a href="https://blog.rsisecurity.com/overview-of-cmmc-level-1-requirements/"><span style="font-weight: 400;">CMMC Level 1 </span></a><span style="font-weight: 400;">comprises 17 practices, encompassing six Domains. This is the second-fewest Practices of any Level, and combined with the relatively lenient Process goal, </span><span style="font-weight: 400;">CMMC basic assessment</span><span style="font-weight: 400;"> at Level 1 is designed for accessibility. Let’s take a closer look at what it entails.</span></p>
<p><span style="font-weight: 400;"> </span></p>
<h3><b>Breakdown of Level 1 Controls by Domain</b></h3>
<p><span style="font-weight: 400;">The 17 Practices added at Level 1 break down as follows:</span></p>
<ul>
<li aria-level="1"><b>Level 1 AC <span style="font-weight: 400;">– Fundamental controls to authenticate access to sensitive FCI (four Practices)</span></b></li>
<li aria-level="1"><strong>Level 1 IA</strong> <span style="font-weight: 400;">– Basic parameters further defining authentication methodology (two Practices)</span></li>
<li aria-level="1"><strong>Level 1 MP</strong> <span style="font-weight: 400;">– A principle for deleting traces of FCI stored on hardware and software before reuse, repurpose, recycle, sale, or other disposals thereof (one Practice) </span></li>
<li aria-level="1"><strong>Level 1 PE</strong><span style="font-weight: 400;"> – Basic controls for monitoring physical and proximal access (four Practices)</span></li>
<li aria-level="1"><strong>Level 1 SC</strong> <span style="font-weight: 400;">– Basic controls for network traffic within defined borders (two Practices)</span></li>
<li aria-level="1"><strong>Level 1 SI</strong> <span style="font-weight: 400;">– Fundamental protocols for regular monitoring of systems (four Practices)</span></li>
</ul>
<p><span style="font-weight: 400;"> </span></p>
<h2><b>CMMC Level 2 Overview: Preparing for CUI</b></h2>
<p><span style="font-weight: 400;">The second CMMC Maturity Level focuses less on any inherent goal and more on a transitional one, preparing for complete protection of controlled unclassified information at Level 3. Its Practices’ goals constitute “intermediate cyber hygiene,” and Processes must be performed and “documented.”</span></p>
<p><span style="font-weight: 400;">Level 2 adds 55 new Practices, the second most of any Level, for a running total of 72. Since all these Practices need to be documented, this is the first Level at which Process Maturity requires official measurement and </span><span style="font-weight: 400;">CMMC assessment tool</span><span style="font-weight: 400;">s. Let’s take a closer look.</span></p>
<p><span style="font-weight: 400;"> </span></p>
<h3><b>Breakdown of Level 2 Controls by Domain</b></h3>
<p><span style="font-weight: 400;">The 55 Practices added at Level 2 break down as follows:</span></p>
<ul>
<li aria-level="1"><b>Level 2 AC<span style="font-weight: 400;"> – Stronger access controls, including the application of “least privilege” principle and individual session management (ten Practices)</span></b></li>
<li aria-level="1"><b>Level 2 AU</b><span style="font-weight: 400;"> – Initial controls to guarantee regular auditing and audit logging (four Practices)</span></li>
<li aria-level="1"><b>Level 2 AT </b><span style="font-weight: 400;">– Initial controls specifying training requirements for all staff (two Practices)</span></li>
<li aria-level="1"><b>Level 2 CM </b><span style="font-weight: 400;">– Initial controls requiring immediate deletion and replacement of default security settings installed by the manufacturer on hardware, software, etc. (six Practices)</span></li>
<li aria-level="1"><b>Level 2 IA <span style="font-weight: 400;">– Stronger requirements for length and complexity of credentials (five Practices)</span></b></li>
<li aria-level="1"><strong>Level 2 IR</strong> <span style="font-weight: 400;">– Initial protocols for management of incidents as they occur (five Practices)</span></li>
<li aria-level="1"><strong>Level 2 MA</strong> <span style="font-weight: 400;">– Initial controls specifying regular intervals for maintenance and the need for special service after updates, attacks, and other relevant events (four Practices)</span></li>
<li aria-level="1"><strong>Level 2 MP</strong> <span style="font-weight: 400;">– Stronger restrictions on access to FCI and CUI media (three Practices)</span></li>
</ul>
<ul>
<li style="list-style-type: none;">
<ul>
<li style="font-weight: 400;" aria-level="1"><b>Level 2 PS </b><span style="font-weight: 400;">– Initial controls integrating cybersecurity into recruiting, hiring, onboarding, promoting, firing, and other personnel movement procedures (two Practices)</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Level 2 PE </b><span style="font-weight: 400;">– Physical controls extending beyond perimeter protections (one Practice)</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Level 2 RM</b><span style="font-weight: 400;"> – Initial controls for systematic management of risks or threats (three Practices)</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Level 2 CA</b><span style="font-weight: 400;"> – Initial controls for regular assessment of security architecture (three Practices)</span></li>
</ul>
</li>
</ul>
<ul>
<li aria-level="1"><b>Level 2 SC<span style="font-weight: 400;"> – Stronger network communications controls, such as encryption protocols and restriction of remote access to networks containing FCI and CUI (two Practices)</span></b></li>
<li aria-level="1"><strong>Level 2 SI</strong> <span style="font-weight: 400;">– Stronger controls to guarantee integrity, including immediate corrective response to identified flaws and weaknesses in system architecture (three Practices)</span></li>
</ul>
<p><span style="font-weight: 400;"> <img class="alignnone wp-image-9308" src="https://blog.rsisecurity.com/wp-content/uploads/2021/03/laptop-1-300x144.jpg" alt="" width="763" height="366" srcset="https://blog.rsisecurity.com/wp-content/uploads/2021/03/laptop-1-300x144.jpg 300w, https://blog.rsisecurity.com/wp-content/uploads/2021/03/laptop-1-768x368.jpg 768w, https://blog.rsisecurity.com/wp-content/uploads/2021/03/laptop-1-1024x490.jpg 1024w, https://blog.rsisecurity.com/wp-content/uploads/2021/03/laptop-1-1170x560.jpg 1170w, https://blog.rsisecurity.com/wp-content/uploads/2021/03/laptop-1-585x280.jpg 585w, https://blog.rsisecurity.com/wp-content/uploads/2021/03/laptop-1.jpg 1280w" sizes="(max-width: 763px) 100vw, 763px" /></span></p>
<h2><b>CMMC Level 3 Overview: Protecting CUI</b></h2>
<p><span style="font-weight: 400;">The third CMMC Maturity Level focuses on the full protection of CUI, which coincides with the implementation of all NIST SP 800-171 controls. Practices goals for </span><a href="https://blog.rsisecurity.com/overview-of-cmmc-level-3-requirements/"><span style="font-weight: 400;">Level 3</span></a><span style="font-weight: 400;"> constitute “good cyber hygiene,” and Processes at Level 3 must be documented and actively “managed.”</span></p>
<p><span style="font-weight: 400;">Level 3 adds 58 new Practices, the most of any Level, making the running total now 130. Plus, the management of all 130 controls makes Level 3 a milestone in compliance and security. The final two Levels will move far beyond cyber hygiene and into advanced proactive measures.</span></p>
<p><span style="font-weight: 400;"> </span></p>
<h3><b>Breakdown of Level 3 Controls by Domain</b></h3>
<p><span style="font-weight: 400;">The 58 Practices added at Level 3 break down as follows:</span></p>
<ul>
<li aria-level="1"><b>Level 3 AC <span style="font-weight: 400;">– Stronger methods for access restriction, including limitations of what capabilities are afforded to accounts with privileged access status (eight Practices)</span></b></li>
</ul>
<ul>
<li style="list-style-type: none;">
<ul>
<li style="font-weight: 400;" aria-level="1"><b>Level 3 AM</b><span style="font-weight: 400;"> – Initial definitions of CUI-specific asset handling requirements (one Practice)</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Level 3 AU </b><span style="font-weight: 400;">– Greater specificity for audits and audit logging controls, including the safeguarding, monitoring, and recovery of logged audit data (seven Practices)</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Level 3 AT </b><span style="font-weight: 400;">– More targeted training controls, focusing on internal threats (one Practice)</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Level 3 CM</b><span style="font-weight: 400;"> – Stronger controls of device configurations beyond removing defaults, including “black-” or “white-listing” of individual settings for security (three Practices)</span></li>
</ul>
</li>
</ul>
<ul>
<li aria-level="1"><b>Level 3 IA <span style="font-weight: 400;">– Final controls for user accounts, such as multi-factor authentication (MFA) and limitations on recycling of previously used credentials (four Practices)</span></b></li>
<li aria-level="1"><strong>Level 3 IR</strong> <span style="font-weight: 400;">– Stronger internal and external incident reporting protocols (two Practices)</span></li>
<li aria-level="1"><strong>Level 3 MA</strong><span style="font-weight: 400;"> – Final requirements for routine and special maintenance (two Practices)</span><strong>Level 3 MP</strong><span style="font-weight: 400;"><strong> –</strong> Stronger media protections, including tight restrictions on transport and transmission of sensitive data, as well as strong encryption (four Practices)</span></li>
</ul>
<ul>
<li style="list-style-type: none;">
<ul>
<li style="font-weight: 400;" aria-level="1"><b>Level 3 PE </b><span style="font-weight: 400;">– A final extension of physical protections irrespective of location (one Practice)</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Level 3 RE</b><span style="font-weight: 400;"> – Specifications for performance and maintenance of backups (one Practice)</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Level 3 RM</b><span style="font-weight: 400;"> – Stronger risk analysis targeting areas lacking vendor support (three Practices)</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Level 3 CA</b><span style="font-weight: 400;"> – Assessment controls targeting internally developed apps (two Practices)</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Level 3 SA</b><span style="font-weight: 400;"> – Initial controls for analysis and sharing of threat intelligence (one Practice)</span></li>
</ul>
</li>
</ul>
<ul>
<li aria-level="1"><b>Level 3 SC<span style="font-weight: 400;"> – Significantly stronger and broader controls for all elements of network communication, including encryption and VoIP safeguards (15 Practices)</span></b></li>
<li aria-level="1"><strong>Level 3 SI</strong><span style="font-weight: 400;"> – Stronger filtering and response protocols for identified flaws (three Practices)</span></li>
</ul>
<p>&nbsp;</p>
<h2><b>CMMC Level 4 Overview: Preparing for APT</b></h2>
<p><span style="font-weight: 400;">The fourth CMMC Maturity Level focuses on further optimizing CUI protection and moving into proactive measures to counteract advanced persistent threats. Its Practice goals constitute “proactive” measures, and Processes at </span><a href="https://blog.rsisecurity.com/overview-of-cmmc-level-4-requirements/"><span style="font-weight: 400;">Level 4</span></a><span style="font-weight: 400;"> must be managed and “reviewed.”</span></p>
<p><span style="font-weight: 400;">Level 4 adds on 26 Practices. Practices’ running total is now 156, all of which now require a deeper level of regular institution-wide review and corrective action to ensure ongoing security.</span></p>
<p><span style="font-weight: 400;"> <img class="alignnone wp-image-9304" src="https://blog.rsisecurity.com/wp-content/uploads/2021/03/computers-300x139.jpg" alt="" width="751" height="348" srcset="https://blog.rsisecurity.com/wp-content/uploads/2021/03/computers-300x139.jpg 300w, https://blog.rsisecurity.com/wp-content/uploads/2021/03/computers-768x357.jpg 768w, https://blog.rsisecurity.com/wp-content/uploads/2021/03/computers-1024x476.jpg 1024w, https://blog.rsisecurity.com/wp-content/uploads/2021/03/computers-1170x543.jpg 1170w, https://blog.rsisecurity.com/wp-content/uploads/2021/03/computers-585x272.jpg 585w, https://blog.rsisecurity.com/wp-content/uploads/2021/03/computers.jpg 1277w" sizes="(max-width: 751px) 100vw, 751px" /></span></p>
<h3><b>Breakdown of Level 4 Controls by Domain</b></h3>
<p><span style="font-weight: 400;">The 26 Practices added at Level 4 break down as follows:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><b>Level 4 AC</b><span style="font-weight: 400;"> – Stronger monitoring for and restrictions on the flow of information (three Practices)</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Level 4 AM</b><span style="font-weight: 400;"> – A final control facilitating analysis of inventoried assets (one Practice)</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Level 4 AU</b><span style="font-weight: 400;"> – Stronger controls enabling automation and analysis of stored audit log information, as well as logging and security of audit analyses (two Practices)</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Level 4 AT</b><span style="font-weight: 400;"> – Final training specifications focused on advanced social engineering and other scams specifically targeting uninformed personnel (two Practices)</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Level 4 CM</b><span style="font-weight: 400;"> – Smoother configuration management through “white-listing” (one Practice)</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Level 4 IR</b><span style="font-weight: 400;"> – Stronger, proactive analytics for preventing incidents, including mobilization of intelligence on past attacks and establishment of a 24/7 response center (two Practices)</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Level 4 RM</b><span style="font-weight: 400;"> – Stronger, predictive analytical controls including the use of threat profiles and the management of one or more risk monitoring supply chains (four Practices)</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Level 4 CA</b><span style="font-weight: 400;"> – Final controls for ongoing improvement of security processes (three Practices)</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Level 4 SA</b><span style="font-weight: 400;"> – Final controls specifying “threat hunting” capabilities (two Practices)</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Level 4 SC</b><span style="font-weight: 400;"> – Stronger controls for isolating and protecting network communications, as well as analyzing potentially harmful code in communications infrastructure (five Practices)</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Level 4 SI</b><span style="font-weight: 400;"> – Protocols for integrating external and internal intelligence (one Practice)</span></li>
</ul>
<p><span style="font-weight: 400;"> </span></p>
<h2><b>CMMC Level 5 Overview: Preventing APT</b></h2>
<p><span style="font-weight: 400;">The fifth and final CMMC Maturity Level focuses almost entirely on the most advanced protections for APT available. The final stage of Practices constitute advanced and progressive measures, and Processes at Level 5 must be reviewed and continuously “optimized.”</span></p>
<p><span style="font-weight: 400;">Level 5 adds only 15 new Practices, the fewest of any level, bringing the final total to 171. But the final Process goal includes keeping Practices up to date and actively seeking out ways to improve and perfect them over time. Let’s take a look at the final slate of Practices.</span></p>
<p><span style="font-weight: 400;"> </span></p>
<h3><b>Breakdown of Level 5 Controls by Domain</b></h3>
<p><span style="font-weight: 400;">The 15 Practices added at Level 5 break down as follows:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><b>Level 5 AC</b><span style="font-weight: 400;"> – A final protection for risks related to wireless access points (one Practice)</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Level 5 AU</b><span style="font-weight: 400;"> – A final control for identifying and correcting oversights in audit (one Practice)</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Level 5 CM</b><span style="font-weight: 400;"> – A final control for validating the integrity of security settings on software and hardware identified as critical or otherwise essential to the business (one Practice)</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Level 5 IR</b><span style="font-weight: 400;"> – Final controls specifying proactive, preventative measures for incidents, such as in-depth analysis of forensic data and unannounced exercises (four Practices)</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Level 5 RE</b><span style="font-weight: 400;"> – A final control for continuity, redundancy, and availability (one Practice)</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Level 5 RM</b><span style="font-weight: 400;"> – Final controls for an annual review of risk management architecture and periodic updates to exception protocols for non-whitelisted software (two Practices)</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Level 5 SC</b><span style="font-weight: 400;"> – Final controls specifying a port and commercial precautions (three Practices)</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Level 5 SI</b><span style="font-weight: 400;"> – Final controls for analysis of both systems and personnel (two Practices)</span></li>
</ul>
<p><span style="font-weight: 400;"> </span></p>
<h2><b>Professional Compliance and Cybersecurity</b></h2>
<p><span style="font-weight: 400;">Across all of these levels, implementing and assessing all required controls can be challenging, especially for smaller to medium-sized companies with more modest IT budgets. RSI Security offers a suite of </span><a href="https://www.rsisecurity.com/compliance-advisory-services/cmmc/"><span style="font-weight: 400;">CMMC compliance advisory services</span></a> <span style="font-weight: 400;">to help your company achieve certification. This </span><span style="font-weight: 400;">CMMC assessment guide</span><span style="font-weight: 400;"> is far from the only resource we offer; </span><a href="https://www.rsisecurity.com/contact"><span style="font-weight: 400;">contact RSI Security today</span></a> <span style="font-weight: 400;">to see how easy CMMC compliance can be!</span></p>
<p><span style="font-weight: 400;"> </span></p>
<div class="su-button-center"><a href="https://www.rsisecurity.com/compliance-advisory-services/cmmc/" class="su-button su-button-style-flat" style="color:#FFFFFF;background-color:#2D89EF;border-color:#246ec0;border-radius:13px;-moz-border-radius:13px;-webkit-border-radius:13px" target="_blank" rel="noopener noreferrer"><span style="color:#FFFFFF;padding:0px 32px;font-size:23px;line-height:46px;border-color:#6cadf4;border-radius:13px;-moz-border-radius:13px;-webkit-border-radius:13px;text-shadow:none;-moz-text-shadow:none;-webkit-text-shadow:none"> Speak with a CMMC compliance expert today!</span></a></div>
<p>&nbsp;</p>
<p>The post <a rel="nofollow" href="https://blog.rsisecurity.com/complete-cmmc-assessment-guide/">Your Complete CMMC Assessment Guide </a> appeared first on <a rel="nofollow" href="https://blog.rsisecurity.com">RSI Security</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://blog.rsisecurity.com/complete-cmmc-assessment-guide/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>What is a HITRUST Bridge Assessment?</title>
		<link>https://blog.rsisecurity.com/what-is-a-hitrust-bridge-assessment/</link>
		<comments>https://blog.rsisecurity.com/what-is-a-hitrust-bridge-assessment/#respond</comments>
		<pubDate>Mon, 22 Mar 2021 08:07:57 +0000</pubDate>
		<dc:creator><![CDATA[RSI Security]]></dc:creator>
				<category><![CDATA[HITRUST]]></category>

		<guid isPermaLink="false">https://blog.rsisecurity.com/?p=9368</guid>
		<description><![CDATA[<p>Many companies sit at the intersection of multiple sectors. This can be a lucrative position, but it also requires surveying the specific cybersecurity risks across industries. To address the needs&#8230;</p>
<p>The post <a rel="nofollow" href="https://blog.rsisecurity.com/what-is-a-hitrust-bridge-assessment/">What is a HITRUST Bridge Assessment?</a> appeared first on <a rel="nofollow" href="https://blog.rsisecurity.com">RSI Security</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><span style="font-weight: 400;">Many companies sit at the intersection of multiple sectors. This can be a lucrative position, but it also requires surveying the specific cybersecurity risks across industries. To address the needs of these companies, </span><a href="https://blog.rsisecurity.com/who-is-the-hitrust-alliance/"><span style="font-weight: 400;">HITRUST Alliance</span></a><span style="font-weight: 400;"> published the </span><a href="https://hitrustalliance.net/hitrust-csf/"><span style="font-weight: 400;">Common Security Framework</span></a><span style="font-weight: 400;"> (CSF). However, to accommodate companies struggling to meet compliance requirements after the COVID-19 pandemic, the </span><span style="font-weight: 400;">HITRUST bridge assessment </span><span style="font-weight: 400;">can be the difference between lapsing in protection and recovering fully. </span></p>
<p><span id="more-9368"></span></p>
<p><span style="font-weight: 400;">Let’s take a closer look.</span></p>
<p><span style="font-weight: 400;"> </span></p>
<h2><b>What is a </b><b>HITRUST Bridge Assessment</b><b>?</b></h2>
<p><a href="https://blog.rsisecurity.com/everything-you-need-to-know-about-hitrust-compliance/"><span style="font-weight: 400;">HITRUST CSF compliance </span></a><span style="font-weight: 400;">is exceptionally comprehensive. Even previously certified institutions may struggle to meet validation deadlines — especially given the pandemic and its aftermath. Bridge assessments aren’t a replacement for full compliance. Instead, they are available to help these organizations extend their window and eventually achieve complete recertification.</span></p>
<p><span style="font-weight: 400;">In this blog, we’ll break down everything you need to know about the </span><span style="font-weight: 400;">HITRUST bridge assessment</span><span style="font-weight: 400;"> and overall HITRUST CSF compliance. Topics covered below include:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">What the bridge assessment is, along with how (and why) to take advantage of it</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Where the bridge assessment leaves off, or what you’ll need for full compliance</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Why and how to verify or certify full compliance</span></li>
</ul>
<p><span style="font-weight: 400;">By the time we’re done, you’ll be well-positioned to move forward into bridge assessment in the short term, then full compliance in the long term. But first, let’s review what exactly HITRUST is.</span></p>
<p><span style="font-weight: 400;"> </span></p>
<h3><b>What is HITRUST, and Why is it Important?</b></h3>
<p><span style="font-weight: 400;">Companies’ concerns about “HITRUST” usually refer to compliance with the HITRUST CSF specifically. But the CSF itself is just one part of the overall </span><a href="https://hitrustalliance.net/content/uploads/HITRUST-Approach.pdf"><span style="font-weight: 400;">HITRUST Approach</span></a><span style="font-weight: 400;">, a much more holistic system or program of data protection, information risk management, and compliance.</span></p>
<p><span style="font-weight: 400;">The HITRUST Approach includes all solutions HITRUST offers (the CSF, </span><a href="https://hitrustalliance.net/documents/csf_rmf_related/HITRUST-RMF-Whitepaper.pdf"><span style="font-weight: 400;">Risk Management Frameworks</span></a><span style="font-weight: 400;">, etc.). Its principles constitute a cyclical set of steps toward robust cybersecurity:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><b>Identify and Define</b><span style="font-weight: 400;"> – Focused on monitoring for, defining, and analyzing risks</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Specify</b><span style="font-weight: 400;"> – Focused on determining which solutions are appropriate for defined risks</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Implement and Manage</b><span style="font-weight: 400;"> – Focused on mitigation and resolution of security incidents</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Assess and Report</b><span style="font-weight: 400;"> – Focused on logging, analyzing, and correcting vulnerabilities</span></li>
</ul>
<p><span style="font-weight: 400;">This approach is crucial, not least because of its simplicity. As you’ll see below, implementing the HITRUST frameworks themselves can be complex and challenging. Simplicity at the top level allows for a streamlined approach without compromising the quality and integrity of security.</span></p>
<p><span style="font-weight: 400;">Similarly, the Bridge Assessment program is a means toward simplification to make recertification slightly more accessible, especially in the crisis many companies are facing.</span></p>
<p><span style="font-weight: 400;"> </span></p>
<a href="https://www.rsisecurity.com/compliance-advisory-services/hitrust/" class="su-button su-button-style-flat" style="color:#FFFFFF;background-color:#2D89EF;border-color:#246ec0;border-radius:13px;-moz-border-radius:13px;-webkit-border-radius:13px" target="_blank" rel="noopener noreferrer"><span style="color:#FFFFFF;padding:0px 32px;font-size:23px;line-height:46px;border-color:#6cadf4;border-radius:13px;-moz-border-radius:13px;-webkit-border-radius:13px;text-shadow:none;-moz-text-shadow:none;-webkit-text-shadow:none"> Assess your HITRUST compliance</span></a>
<p>&nbsp;</p>
<h2><b>Leveraging HITRUST Bridge Assessment</b></h2>
<p><span style="font-weight: 400;">HITRUST implemented the Bridge Assessment early in 2020 to assist companies struggling to achieve timely reassessment. HITRUST’s </span><a href="https://hitrustalliance.net/news/hitrust-offers-new-bridge-assessment-and-certificate-to-help-organizations-overcome-challenges-maintaining-hitrust-csf-certification-due-to-covid-19-disruption/"><span style="font-weight: 400;">press release for the Bridge program</span></a><span style="font-weight: 400;"> notes that, due to the immediate and long-term impacts of the COVID-19 pandemic, many businesses have had trouble submitting their CSF Validated Assessments before deadlines.</span></p>
<p><span style="font-weight: 400;">Companies facing these troubles are prone to many other consequences. </span></p>
<p><span style="font-weight: 400;">On the one hand, HITRUST is a primary means by which many companies comply with other legally mandated frameworks. On the other hand, a lapse in compliance often portends lax cybersecurity as a whole, meaning these companies are at risk of being exposed to the dangers of</span><a href="https://blog.rsisecurity.com/what-are-cyber-crimes/"><span style="font-weight: 400;"> cybercrime.</span></a></p>
<p><span style="font-weight: 400;">The Bridge Assessment and resulting HITRUST CSF Bridge Certificate comprise an ideal solution for companies in a bind. It is not an “extension” of existing certification, nor is it a “replacement” for traditional certification. Due to the less intensive assessment procedure, Bridge Certification provides a lesser level of assurance. It’s a means to prove companies’ controls are unlikely to have degraded after certification, and full compliance is soon to come.</span></p>
<p><span style="font-weight: 400;">But Bridge Assessment is by no means simple to achieve. Let’s take a close look at the process and requirements through which companies can accomplish CSF Bridge Certification.</span></p>
<p><img class="alignnone wp-image-9305" src="https://blog.rsisecurity.com/wp-content/uploads/2021/03/desk-300x149.jpg" alt="" width="759" height="377" srcset="https://blog.rsisecurity.com/wp-content/uploads/2021/03/desk-300x149.jpg 300w, https://blog.rsisecurity.com/wp-content/uploads/2021/03/desk-768x382.jpg 768w, https://blog.rsisecurity.com/wp-content/uploads/2021/03/desk-1024x510.jpg 1024w, https://blog.rsisecurity.com/wp-content/uploads/2021/03/desk-1170x582.jpg 1170w, https://blog.rsisecurity.com/wp-content/uploads/2021/03/desk-585x291.jpg 585w, https://blog.rsisecurity.com/wp-content/uploads/2021/03/desk.jpg 1276w" sizes="(max-width: 759px) 100vw, 759px" /></p>
<h3><b>How the </b><b>HITRUST Bridge Assessment</b><b> Works</b></h3>
<p><span style="font-weight: 400;">Companies may be eligible for Bridge Assessment (and Certification) for 90 days after the expiration of their previous CSF Certification period. Furthermore, according to HITRUST’s </span><a href="https://hitrustalliance.net/content/uploads/HITRUST-CSF-Bridge-Assessment.pdf"><span style="font-weight: 400;">guide to the Bridge Assessment</span></a><span style="font-weight: 400;">, the Bridge Certification process breaks down as follows:</span></p>
<ul>
<li aria-level="1"><b>Step 1<span style="font-weight: 400;"> – Obtaining a HITRUST CSF Bridge Assessment object within the </span><a href="https://hitrustalliance.net/product-tool/mycsf/"><span style="font-weight: 400;">myCSF toolkit</span></a><span style="font-weight: 400;">; this requires registration at an initial cost of $3,000 (and later fees in some cases)</span></b></li>
</ul>
<ul>
<li aria-level="1"><strong>Step 2</strong><span style="font-weight: 400;"> – Assessment from a HITRUST Authorized External Assessor, comprising a selection of 19 requirement statements selected from the overall HITRUST controls</span></li>
</ul>
<ul>
<li style="list-style-type: none;">
<ul>
<li style="list-style-type: none;">
<ul>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">If the controls had already been tested for validated assessment, they might count toward Bridge Assessment without requiring a retest (with restrictions)</span></li>
</ul>
</li>
</ul>
</li>
</ul>
<ul>
<li aria-level="1"><b>Step 3<span style="font-weight: 400;"> – The company’s management and the Authorized External Assessor must confirm three criteria:</span></b></li>
</ul>
<ul>
<li style="list-style-type: none;">
<ul>
<li style="list-style-type: none;">
<ul>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">Confirm no reportable breaches have occurred since the previous CSF Certification</span></li>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">Confirm no significant changes to security since the previous CSF Certification</span></li>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">Confirm intention to complete full CSF Certification before Bridge expires</span></li>
</ul>
</li>
</ul>
</li>
</ul>
<ul>
<li aria-level="1"><b>Step 4<span style="font-weight: 400;"> – Performance of a “fast track” Quality Assurance Review, by a first-party HITRUST official, on the assessment submitted by the Authorized External Assessor</span></b></li>
</ul>
<ul>
<li aria-level="1"><strong>Step 5</strong><span style="font-weight: 400;"> – Issuance of official HITRUST CSF Bridge Certificate to the organization</span></li>
</ul>
<ul>
<li aria-level="1"><strong>Step 6</strong><span style="font-weight: 400;"> – Submitting a completed, validated assessment to HITRUST before the end of the Bridge Certificate’s expiration date (90 days after the prior Certificate’s expiration date)</span></li>
</ul>
<ul>
<li style="list-style-type: none;">
<ul>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">Any time covered by Bridge Certification is subtracted from the subsequent HITRUST CSF Certification (i.e., three months of the entire 24-month period)</span></li>
</ul>
</li>
</ul>
<p><span style="font-weight: 400;">Ultimately, the relationship between the Bridge Certification and CSF Certification is forgiving in some ways and demanding in others. Having CSF controls firmly established facilitates Bridge Assessment and bypasses rigorous analysis. But taking advantage of Bridge Certification won’t net you any “extra” month of coverage since they are subtracted from your next period.</span></p>
<p><span style="font-weight: 400;"> </span></p>
<h2><b>Understanding HITRUST CSF Certification</b></h2>
<p><span style="font-weight: 400;">As noted above, Bridge Certification is not an extension or replacement for compliance. You’ll still need to implement </span><i><span style="font-weight: 400;">all</span></i><span style="font-weight: 400;"> CSF controls beyond the 19 assessed for the Bridge Certificate. Colloquial nicknames for the Bridge Assessment, such as “</span><span style="font-weight: 400;">HITRUST gap assessment</span><span style="font-weight: 400;">,” belie the importance of understanding CSF to </span><i><span style="font-weight: 400;">avoid</span></i><span style="font-weight: 400;"> gaps in your overall HITRUST coverage.</span></p>
<p><span style="font-weight: 400;">In total, the HITRUST CSF comprises 156 “Control References” to implement, spread across its 49 “Objective Names” and 14 “ Control Categories.” These are influenced by, and often directly adapted from, the requirements of other compliance frameworks. The </span><a href="https://blog.rsisecurity.com/why-you-should-adopt-the-cybersecurity-nist-framework/"><span style="font-weight: 400;">NIST Cybersecurity Framework</span></a><span style="font-weight: 400;">, </span><a href="https://blog.rsisecurity.com/what-is-hipaa/"><span style="font-weight: 400;">HIPAA</span></a><span style="font-weight: 400;">, </span><a href="https://blog.rsisecurity.com/what-is-hitech/"><span style="font-weight: 400;">HITECH</span></a><span style="font-weight: 400;">, and PCI Data Security Standard are some of the primary sources.</span></p>
<p><span style="font-weight: 400;">The full text of the CSF is available for </span><a href="https://hitrustalliance.net/csf-license-agreement/"><span style="font-weight: 400;">free download</span></a><span style="font-weight: 400;">, but only for organizations that sign a qualifying license agreement. In practice, this means few organizations have access to the text itself. But don’t worry: below, we’ll provide a synopsis of all the controls your business will need to implement for compliance, sourced directly from HITRUST CSF v.9.4.1.</span></p>
<p><span style="font-weight: 400;"> <img class="alignnone wp-image-9211" src="https://blog.rsisecurity.com/wp-content/uploads/2019/06/third-party-office-man2-300x108.jpg" alt="" width="753" height="271" srcset="https://blog.rsisecurity.com/wp-content/uploads/2019/06/third-party-office-man2-300x108.jpg 300w, https://blog.rsisecurity.com/wp-content/uploads/2019/06/third-party-office-man2-768x275.jpg 768w, https://blog.rsisecurity.com/wp-content/uploads/2019/06/third-party-office-man2-1024x367.jpg 1024w, https://blog.rsisecurity.com/wp-content/uploads/2019/06/third-party-office-man2-1170x420.jpg 1170w, https://blog.rsisecurity.com/wp-content/uploads/2019/06/third-party-office-man2-585x210.jpg 585w, https://blog.rsisecurity.com/wp-content/uploads/2019/06/third-party-office-man2.jpg 1344w" sizes="(max-width: 753px) 100vw, 753px" /></span></p>
<h3><b>Breakdown of the HITRUST CSF Framework</b></h3>
<p><span style="font-weight: 400;">While the </span><a href="https://blog.rsisecurity.com/hitrust-security-control-framework/"><span style="font-weight: 400;">HITRUST framework</span></a><span style="font-weight: 400;"> also provides Specifications, Mapping, and other guidance for each Reference, the References themselves are most analogous to individual Controls. All in all, the Control Categories, Objective Names, and Controls References break down as follows:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><b>Control Category 0.0: Information Security Management</b><span style="font-weight: 400;"> – Governing top-level controls for effective security management, across one objective and one Control Reference</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Control Category 0.1: Access Control Security</b><span style="font-weight: 400;"> – Governing measures taken to restrict access to sensitive information, across seven Objectives and 25 Control References</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Control Category 0.2: Human Resources Security</b><span style="font-weight: 400;"> – Governing approaches to personnel management and security, across four Objectives and nine Control References</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Control Category 0.3: Risk Management Policy</b><span style="font-weight: 400;"> – Governing approaches to monitoring, analyzing, and mitigating risks, across one Objective and four Control References</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Control Category 0.4: Security Policy</b><span style="font-weight: 400;"> – Governing minimum required specifications for maintaining a robust security policy, across one Objective and two Control References</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Control Category 0.5: Information Security Organization</b><span style="font-weight: 400;"> – Governing management of internal and external data, across two Objectives and 11 Control References</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Control Category 0.6: Regulatory Framework Compliance</b><span style="font-weight: 400;"> – Governing mapping and implementation of all required controls, across three Objectives and ten Control References</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Control Category 0.7: Asset Management Security</b><span style="font-weight: 400;"> – Governing management of inventory and related responsibilities, across two Objectives and five Control References</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Control Category 0.8: Physical and Environmental Security</b><span style="font-weight: 400;"> – Governing restrictions for access to devices and entire areas, across two Objectives and 13 Control References</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Control Category 0.9: Communications and Operations Security</b><span style="font-weight: 400;"> – Governing security precautions for network traffic, across ten Objectives and 32 Control References</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Control Category 0.10: Information Systems Management</b><span style="font-weight: 400;"> – Governing acquisition, maintenance, and development of IT, across six Objectives and 13 Control References</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Control Category 0.11: Security Incident Management</b><span style="font-weight: 400;"> – Governing security incident reporting, response, and recovery, across two Objectives and five Control References</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Control Category 0.12: Business Continuity Management</b><span style="font-weight: 400;"> – Governing processes implemented for continuity of services, across one Objective and five Control References</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Control Category 0.13: Privacy Security Practices</b><span style="font-weight: 400;"> – Governing general principles and approaches to privacy at all levels, across seven Objectives and 21 Control References</span></li>
</ul>
<p><span style="font-weight: 400;">Implementation of all controls across all Categories is not enough to guarantee complete verification or certification. Your business will need to submit a self-assessment (in addition to third-party validation), depending on the target level of compliance assurance sought by the company.</span></p>
<p><span style="font-weight: 400;"> </span></p>
<h2><b>Achieving Full HITRUST Certification</b></h2>
<p><span style="font-weight: 400;">Compliance requires reporting on (and potentially verifying) your implementation of all CSF controls. At the most basic level, and outside of Bridge-related compliance, companies can choose to self-assess their performance by submitting the Self-Assessment Report, available from HITRUST directly or through subscription to the </span><a href="https://hitrustalliance.net/product-tool/mycsf/"><span style="font-weight: 400;">MyCSF toolkit</span></a><span style="font-weight: 400;">. In addition, other self-service tools include the </span><a href="https://hitrustalliance.net/content/uploads/HITRUST-Academy-Overview.pdf"><span style="font-weight: 400;">HITRUST Academy</span></a><span style="font-weight: 400;"> and HITRUST Readiness Assessment.</span></p>
<p><span style="font-weight: 400;"> There are two levels to consider to achieve full compliance: validation and certification.</span></p>
<p><span style="font-weight: 400;">According to HITRUST’s guide to </span><a href="https://hitrustalliance.net/product-tool/csf-assessment/"><span style="font-weight: 400;">CSF Assessments</span></a><span style="font-weight: 400;">, both require working with an Authorized External Assessor. Both also require submitting a</span><a href="https://blog.rsisecurity.com/how-often-do-i-need-a-hitrust-csf-assessment-report/"><span style="font-weight: 400;"> HITRUST CSF Validated Assessment Report.</span></a><span style="font-weight: 400;"> If the Report meets HITRUST’s score requirements, your company may qualify for Certification. If it doesn’t, you may still be eligible for Validation. Validation lasts for one calendar year, while certification lasts for two years (pending the submission of an Interim Assessment after one year).</span></p>
<p><span style="font-weight: 400;">Unlike the Bridge Assessment, a HITRUST CSF Interim Assessment does not subtract or in any other way </span><i><span style="font-weight: 400;">negatively</span></i><span style="font-weight: 400;"> impact the total number of months your certification lasts.</span></p>
<p>&nbsp;</p>
<h3><b>How Compliance Advisory Services Can Help</b></h3>
<p><span style="font-weight: 400;">As noted above, full compliance (verification or certification) requires a third-party’s assistance for at least the final assessment stage. Given the challenges of implementing all the necessary controls, it’s in many organizations’ best interests to work with a service provider from the first touchpoint of the process. </span></p>
<p><span style="font-weight: 400;">To that end, here at RSI Security, we offer a suite of </span><a href="https://www.rsisecurity.com/compliance-advisory-services/hitrust/"><span style="font-weight: 400;">HITRUST advisory services</span></a><span style="font-weight: 400;">, including:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Guidance with and facilitation of HITRUST Self Assessment</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">HITRUST gap assessment</span><span style="font-weight: 400;"> to identify weaknesses or oversights</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Comprehensive Verification, Interim, Bridge, and full Certification</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Troubleshooting and long-term maintenance of CSF implementation</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Marketing support for publishing and capitalizing on compliance</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Integrated third-party risk management (TPRM) program</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Targeted healthcare and health adjacent advisory</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Mapping to other cybersecurity frameworks</span></li>
</ul>
<p><span style="font-weight: 400;">With over a decade of experience helping companies achieve HITRUST compliance, as well as compliance with other regulatory frameworks, we are well-positioned to help you get Certified.</span></p>
<p><span style="font-weight: 400;"> </span></p>
<h2><b>Professional Certification and Cyberdefense</b></h2>
<p><span style="font-weight: 400;">The talented team of experts here at </span><a href="https://www.rsisecurity.com/"><span style="font-weight: 400;">RSI Security</span></a><span style="font-weight: 400;"> is happy to help your company with all of its compliance and cybersecurity planning and implementation — no matter the nature and size of your business. We’ll tailor a suite of IT and security services to meet your needs and means.</span></p>
<p><span style="font-weight: 400;">For many companies, compliance with a robust regulatory framework like HITRUST is a one-size-fits-all solution to their cybersecurity concerns. For many others, however, compliance is just the start of the cybersecurity journey. </span></p>
<p><span style="font-weight: 400;">And for all cybersecurity needs, there’s us. </span></p>
<p><span style="font-weight: 400;">To see how valuable a </span><span style="font-weight: 400;">HITRUST bridge assessment</span><span style="font-weight: 400;"> can be for your company, </span><a href="https://www.rsisecurity.com/"><span style="font-weight: 400;">contact RSI Security today</span></a><span style="font-weight: 400;">!</span></p>
<p>&nbsp;</p>
<div class="su-button-center"><a href="https://www.rsisecurity.com/compliance-advisory-services/hitrust/" class="su-button su-button-style-flat" style="color:#FFFFFF;background-color:#2D89EF;border-color:#246ec0;border-radius:13px;-moz-border-radius:13px;-webkit-border-radius:13px" target="_blank" rel="noopener noreferrer"><span style="color:#FFFFFF;padding:0px 32px;font-size:23px;line-height:46px;border-color:#6cadf4;border-radius:13px;-moz-border-radius:13px;-webkit-border-radius:13px;text-shadow:none;-moz-text-shadow:none;-webkit-text-shadow:none"> Speak with a HITRUST expert today!</span></a></div>
<p>&nbsp;</p>
<p>The post <a rel="nofollow" href="https://blog.rsisecurity.com/what-is-a-hitrust-bridge-assessment/">What is a HITRUST Bridge Assessment?</a> appeared first on <a rel="nofollow" href="https://blog.rsisecurity.com">RSI Security</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://blog.rsisecurity.com/what-is-a-hitrust-bridge-assessment/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Basic Patient Data Rights Under HIPAA</title>
		<link>https://blog.rsisecurity.com/basic-patient-data-rights-under-hipaa/</link>
		<comments>https://blog.rsisecurity.com/basic-patient-data-rights-under-hipaa/#respond</comments>
		<pubDate>Sat, 20 Mar 2021 07:51:39 +0000</pubDate>
		<dc:creator><![CDATA[RSI Security]]></dc:creator>
				<category><![CDATA[HIPAA / Healthcare Industry]]></category>

		<guid isPermaLink="false">https://blog.rsisecurity.com/?p=9363</guid>
		<description><![CDATA[<p>The Health Insurance Portability and Accountability Act of 1996 (HIPAA) significantly improved the healthcare industry’s cybersecurity landscape. HIPAA’s impacts went beyond the healthcare practices and associated businesses; there are also&#8230;</p>
<p>The post <a rel="nofollow" href="https://blog.rsisecurity.com/basic-patient-data-rights-under-hipaa/">Basic Patient Data Rights Under HIPAA</a> appeared first on <a rel="nofollow" href="https://blog.rsisecurity.com">RSI Security</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><span style="font-weight: 400;">The </span><a href="https://aspe.hhs.gov/report/health-insurance-portability-and-accountability-act-1996"><span style="font-weight: 400;">Health Insurance Portability and Accountability Act of 1996</span></a><span style="font-weight: 400;"> (HIPAA) significantly improved the healthcare industry’s cybersecurity landscape. HIPAA’s impacts went beyond the healthcare practices and associated businesses; there are also several </span><span style="font-weight: 400;">HIPAA patient rights</span><span style="font-weight: 400;"> granted to healthcare consumers. At the most basic level, these include reasonable expectations of privacy and access. Let’s take a closer look.</span></p>
<p><span style="font-weight: 400;"> </span><span id="more-9363"></span></p>
<h2><b>Essential Patient Data Rights Under HIPAA</b></h2>
<p><span style="font-weight: 400;">The </span><a href="https://www.hhs.gov/"><span style="font-weight: 400;">US Department of Health and Human Services</span></a><span style="font-weight: 400;"> (HHS) developed HIPAA to distinguish data on health and payment records as “</span><a href="https://blog.rsisecurity.com/what-is-phi-protected-health-information/"><span style="font-weight: 400;">protected health information”</span></a><span style="font-weight: 400;"> (PHI). Later, the HITECH Act expanded the definition to account for electronic PHI (ePHI). Together, both acts grant patients fundamental rights. Below, we break down everything you need to know about them, including:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Rights of privacy and accessibility granted directly by the HIPAA Privacy Rule</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Other de facto rights related to the remaining HIPAA rules</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Ways companies can accommodate their patients’ rights and needs</span></li>
</ul>
<p><span style="font-weight: 400;">By the end of this blog, you’ll know your patients’ rights and expectations, and how to meet and exceed their expectations. We’ll end with resources to help you ensure compliance.</span></p>
<p><span style="font-weight: 400;"> </span></p>
<h2><b>Primary </b><b>HIPAA Patient Rights</b></h2>
<p><span style="font-weight: 400;">The most critical </span><a href="https://www.hhs.gov/hipaa/for-individuals/guidance-materials-for-consumers/index.html"><span style="font-weight: 400;">patient rights under HIPAA</span></a><span style="font-weight: 400;"> have to do with patients’ right to access their PHI. Patients are guaranteed unfettered access to all medical records and payment history related to healthcare goods and services purchased. Patients have the right to share this information as they please, provided that they do not infringe upon others’ privacy.</span></p>
<p><span style="font-weight: 400;">Patients need access to their medical records to make informed decisions about their care. For example, it’s helpful to have all your medical information available when deciding whether or not to proceed with surgery, which treatment options to consider, as well as preventative methods. However, patients also need to know that these records are safe and that other individuals are not accessing them without the patient’s consent. To that effect, the Privacy Rule lays out the exact terms under which use and access are authorized.</span></p>
<p><span style="font-weight: 400;"> </span></p>
<a href="https://www.rsisecurity.com/compliance-advisory-services/hipaa/" class="su-button su-button-style-flat" style="color:#FFFFFF;background-color:#2D89EF;border-color:#246ec0;border-radius:13px;-moz-border-radius:13px;-webkit-border-radius:13px" target="_blank" rel="noopener noreferrer"><span style="color:#FFFFFF;padding:0px 32px;font-size:23px;line-height:46px;border-color:#6cadf4;border-radius:13px;-moz-border-radius:13px;-webkit-border-radius:13px;text-shadow:none;-moz-text-shadow:none;-webkit-text-shadow:none"> Assess your HIPAA / HITECH compliance</span></a>
<p>&nbsp;</p>
<h3><b>Accessibility and Privacy of PHI</b></h3>
<p><span style="font-weight: 400;">The HIPAA </span><a href="https://www.hhs.gov/hipaa/for-professionals/privacy/index.html"><span style="font-weight: 400;">Privacy Rule</span></a><span style="font-weight: 400;"> provides patients the right to request</span><span style="font-weight: 400;"> access to their individual PHI. This is one of the two cases in which use or disclosure of PHI is not only permitted but specifically required — the other involves a direct request by HHS or other governmental agencies for legal purposes. Per the </span><a href="https://www.hhs.gov/hipaa/for-professionals/privacy/laws-regulations/index.html"><span style="font-weight: 400;">summary of the Privacy Rule</span></a><span style="font-weight: 400;">, permitted uses include:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Uses and disclosures necessary for treatment, payment, and healthcare operations</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Uses and disclosures for which the patient has a reasonable opportunity to object</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Uses and disclosures incidental to other permitted or required uses and disclosures</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Uses and disclosures made in the public interest, such as in public benefit projects</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Uses and disclosures of limited data sets for approved research</span></li>
</ul>
<p><span style="font-weight: 400;">Furthermore, patients’ access to their own PHI must be unrestricted. This is not the case for other permitted uses, which must be limited to the </span><a href="https://blog.rsisecurity.com/what-is-the-hipaa-minimum-necessary-rule/"><span style="font-weight: 400;">minimum necessary requirement</span></a><span style="font-weight: 400;">.</span></p>
<p><span style="font-weight: 400;"> <img class="alignnone wp-image-9309" src="https://blog.rsisecurity.com/wp-content/uploads/2021/03/laptop-5-300x148.jpg" alt="" width="754" height="372" srcset="https://blog.rsisecurity.com/wp-content/uploads/2021/03/laptop-5-300x148.jpg 300w, https://blog.rsisecurity.com/wp-content/uploads/2021/03/laptop-5-768x379.jpg 768w, https://blog.rsisecurity.com/wp-content/uploads/2021/03/laptop-5-1024x505.jpg 1024w, https://blog.rsisecurity.com/wp-content/uploads/2021/03/laptop-5-1170x577.jpg 1170w, https://blog.rsisecurity.com/wp-content/uploads/2021/03/laptop-5-585x289.jpg 585w, https://blog.rsisecurity.com/wp-content/uploads/2021/03/laptop-5.jpg 1279w" sizes="(max-width: 754px) 100vw, 754px" /></span></p>
<h2><b>Other </b><b>HIPAA Patient Rights</b></h2>
<p><span style="font-weight: 400;">HIPAA laws provide patients with peace of mind</span><span style="font-weight: 400;">, knowing their sensitive information is being protected to the best of the healthcare providers’ abilities. The HIPAA </span><a href="https://www.hhs.gov/hipaa/for-professionals/compliance-enforcement/index.html"><span style="font-weight: 400;">Enforcement Rule</span></a><span style="font-weight: 400;"> ensures that healthcare providers who don’t adequately protect patients’ health records face severe civil and criminal penalties — along with the consequences of cybercrime.</span></p>
<p><span style="font-weight: 400;">For example, covered entities who neglect HIPAA rules can face fines of up to $50 thousand dollars </span><i><span style="font-weight: 400;">per</span></i><span style="font-weight: 400;"> violation, totaling up to $1.5 million dollars over the course of a year. In addition, intentional violations can carry fees of up to $250 thousand dollars and up to 10 years of jail time. While these measures don’t enforce security on their own, they do so by threat of penalty. The stringent nature of these penalties is what provides peace of mind to patients.</span></p>
<p><span style="font-weight: 400;">Let’s take a closer look at the other rules companies have to follow that provide patients rights.</span></p>
<p><span style="font-weight: 400;"> </span></p>
<h3><b>Confidentiality, Integrity, and Availability</b></h3>
<p><span style="font-weight: 400;">Under HIPAA, patients have the right to</span><span style="font-weight: 400;"> a reasonable expectation of privacy and security. The </span><a href="https://www.hhs.gov/hipaa/for-professionals/security/index.html"><span style="font-weight: 400;">Security Rule</span></a><span style="font-weight: 400;"> builds on the baseline protections of the Privacy Rule, defining safeguards that ensure confidentiality, integrity, and availability of PHI through risk analysis and management.</span></p>
<p><span style="font-weight: 400;">According to HHS’s </span><a href="https://www.hhs.gov/hipaa/for-professionals/security/laws-regulations/index.html"><span style="font-weight: 400;">summary of the Security Rule</span></a><span style="font-weight: 400;">, its primary protections include:</span></p>
<ul>
<li aria-level="1"><b>Administrative safeguards<span style="font-weight: 400;"> – Top-level management of security processes and personnel, identity and access protocols, workforce training, and corrective evaluation</span></b></li>
<li aria-level="1"><strong>Physical safeguards</strong><span style="font-weight: 400;"> – Practices and procedures for monitoring and restricting access to physical devices connected to PHI, as well as physical spaces in which PHI is accessible</span></li>
<li aria-level="1"><strong>Technical safeguards</strong><span style="font-weight: 400;"> – Specific controls governing access to, auditing of, and integrity throughout cybersecurity infrastructure, especially communications over networks</span></li>
</ul>
<p><span style="font-weight: 400;">While these safeguards are not framed as “</span><span style="font-weight: 400;">HIPAA rights,</span><span style="font-weight: 400;">” they constitute the safety precautions a patient can expect.</span></p>
<p><span style="font-weight: 400;"> </span></p>
<h3><b>Security Breach Notifications, Guaranteed</b></h3>
<p><span style="font-weight: 400;">Under HIPAA, patients have the right to</span><span style="font-weight: 400;"> know if, when, and how their data was accessed inappropriately. The </span><a href="https://www.hhs.gov/hipaa/for-professionals/breach-notification/index.html"><span style="font-weight: 400;">Breach Notification Rule</span></a><span style="font-weight: 400;"> requires immediate reporting of data breaches to all parties impacted “without unreasonable delay.” In practice, covered entities must notify stakeholders by mail within 60 days of the breach’s discovery. If contact information for ten or more stakeholders is missing, the company must post a notification on its home page.</span></p>
<p><span style="font-weight: 400;">The Breach Notification Rule also requires two other forms of </span><a href="https://www.hhs.gov/hipaa/for-professionals/breach-notification/breach-reporting/index.html"><span style="font-weight: 400;">Breach Reporting</span></a><span style="font-weight: 400;">:</span></p>
<ul>
<li aria-level="1"><b>Secretary notice<span style="font-weight: 400;"> – For all</span><a href="https://blog.rsisecurity.com/what-are-the-different-types-of-data-breaches/"><span style="font-weight: 400;"> data breaches</span></a><span style="font-weight: 400;">, the covered entity must provide notice to the Secretary of the HHS, within a timeframe determined by the size of the breach:</span></b></li>
<li style="list-style-type: none;">
<ul>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">Breaches impacting over 500 people require immediate notice (within 60 days)</span></li>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">Breaches impacting less than 500 people require notice within the calendar year</span></li>
</ul>
</li>
<li style="font-weight: 400;" aria-level="1"><b>Media notice</b><span style="font-weight: 400;"> – For any data breach that impacts more than 500 people within a given geographic area, the covered entity must notify a prominent media outlet in that area </span></li>
</ul>
<p><span style="font-weight: 400;">Across HIPAA’s four rules, patients’ rights are guaranteed by companies’ willingness and ability to comply. Compliance is essential not just for safety but for upholding patients’ </span><span style="font-weight: 400;">HIPAA rights</span><span style="font-weight: 400;">.</span></p>
<p><span style="font-weight: 400;"> <img class="alignnone wp-image-9305" src="https://blog.rsisecurity.com/wp-content/uploads/2021/03/desk-300x149.jpg" alt="" width="757" height="376" srcset="https://blog.rsisecurity.com/wp-content/uploads/2021/03/desk-300x149.jpg 300w, https://blog.rsisecurity.com/wp-content/uploads/2021/03/desk-768x382.jpg 768w, https://blog.rsisecurity.com/wp-content/uploads/2021/03/desk-1024x510.jpg 1024w, https://blog.rsisecurity.com/wp-content/uploads/2021/03/desk-1170x582.jpg 1170w, https://blog.rsisecurity.com/wp-content/uploads/2021/03/desk-585x291.jpg 585w, https://blog.rsisecurity.com/wp-content/uploads/2021/03/desk.jpg 1276w" sizes="(max-width: 757px) 100vw, 757px" /></span></p>
<h2><b>Accommodating Patients’ Rights and Needs</b></h2>
<p><span style="font-weight: 400;">Compliance is the key to guaranteeing patient rights. But maintaining compliance can be challenging, especially for smaller to medium-sized businesses with modest or stressed IT budgets. Enter RSI Security.</span></p>
<p><span style="font-weight: 400;">Our comprehensive </span><a href="https://www.rsisecurity.com/compliance-advisory-services/hipaa/"><span style="font-weight: 400;">HIPAA and HITECH compliance advisory services</span></a><span style="font-weight: 400;"> include:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Implementation and testing of Privacy Rule and Security Rule protections</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Auditing and monitoring of Breach Notification infrastructure and readiness</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Thorough risk analysis of your company and its patient data environment(s)</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Internal, external, network, and other forms of compliance </span><a href="https://www.rsisecurity.com/penetration-testing/"><span style="font-weight: 400;">penetration testing</span></a></li>
</ul>
<p><span style="font-weight: 400;">Regardless of the challenges, HIPAA implementation can entail, RSI Security will tailor solutions to your company’s exact needs and means. Our expert team has helped companies achieve HIPAA compliance for over a decade. Whatever you need, we have it covered.</span></p>
<p><span style="font-weight: 400;"> </span></p>
<h3><b>Professional HIPAA Compliance Advisory</b></h3>
<p><span style="font-weight: 400;">Here at RSI Security, we know how critical </span><a href="https://www.rsisecurity.com/compliance-advisory-services/"><span style="font-weight: 400;">compliance</span></a><span style="font-weight: 400;"> is for businesses in every industry, especially healthcare. We also know that compliance is hardly the end of cybersecurity; in fact, it’s just the beginning.</span></p>
<p><span style="font-weight: 400;">To fully protect clients, businesses should implement a powerful </span><a href="https://www.rsisecurity.com/architecture-implementation/"><span style="font-weight: 400;">cyberdefense architecture</span></a><span style="font-weight: 400;"> complete with perimeter security (like </span><a href="https://www.rsisecurity.com/webfilter/"><span style="font-weight: 400;">web filtering</span></a><span style="font-weight: 400;">), </span><a href="https://www.rsisecurity.com/threat-vulnerability-management/"><span style="font-weight: 400;">threat and vulnerability management</span></a><span style="font-weight: 400;">, </span><a href="https://www.rsisecurity.com/managed-detection-response/"><span style="font-weight: 400;">detection and response</span></a><span style="font-weight: 400;">, and robust </span><a href="https://www.rsisecurity.com/education-awareness/"><span style="font-weight: 400;">training and awareness</span></a><span style="font-weight: 400;">. To see how our suite of </span><a href="https://www.rsisecurity.com/managed-security-services/"><span style="font-weight: 400;">managed IT and security services</span></a><span style="font-weight: 400;"> can help you guarantee your clients’ </span><span style="font-weight: 400;">HIPAA patient rights</span><span style="font-weight: 400;"> and bolster your overall defenses, </span><a href="https://www.rsisecurity.com/"><span style="font-weight: 400;">contact RSI Security today</span></a><span style="font-weight: 400;">!</span></p>
<p><span style="font-weight: 400;"> </span></p>
<div class="su-button-center"><a href="https://www.rsisecurity.com/compliance-advisory-services/hipaa/" class="su-button su-button-style-flat" style="color:#FFFFFF;background-color:#2D89EF;border-color:#246ec0;border-radius:13px;-moz-border-radius:13px;-webkit-border-radius:13px" target="_blank" rel="noopener noreferrer"><span style="color:#FFFFFF;padding:0px 32px;font-size:23px;line-height:46px;border-color:#6cadf4;border-radius:13px;-moz-border-radius:13px;-webkit-border-radius:13px;text-shadow:none;-moz-text-shadow:none;-webkit-text-shadow:none"> Speak with a HIPAA / HITECH expert today!</span></a></div>
<p>&nbsp;</p>
<p>The post <a rel="nofollow" href="https://blog.rsisecurity.com/basic-patient-data-rights-under-hipaa/">Basic Patient Data Rights Under HIPAA</a> appeared first on <a rel="nofollow" href="https://blog.rsisecurity.com">RSI Security</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://blog.rsisecurity.com/basic-patient-data-rights-under-hipaa/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Healthcare Penetration Testing for HIPAA Compliance</title>
		<link>https://blog.rsisecurity.com/healthcare-penetration-testing-for-hipaa-compliance/</link>
		<comments>https://blog.rsisecurity.com/healthcare-penetration-testing-for-hipaa-compliance/#respond</comments>
		<pubDate>Fri, 19 Mar 2021 08:09:30 +0000</pubDate>
		<dc:creator><![CDATA[RSI Security]]></dc:creator>
				<category><![CDATA[HIPAA / Healthcare Industry]]></category>

		<guid isPermaLink="false">https://blog.rsisecurity.com/?p=9369</guid>
		<description><![CDATA[<p>The Health Insurance Portability and Accountability Act of 1996 (HIPAA) has helped healthcare providers protect patients’ information for over 20 years. However, over the years, the number and complexity of&#8230;</p>
<p>The post <a rel="nofollow" href="https://blog.rsisecurity.com/healthcare-penetration-testing-for-hipaa-compliance/">Healthcare Penetration Testing for HIPAA Compliance</a> appeared first on <a rel="nofollow" href="https://blog.rsisecurity.com">RSI Security</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><span style="font-weight: 400;">The </span><a href="https://blog.rsisecurity.com/what-is-hipaa/"><span style="font-weight: 400;">Health Insurance Portability and Accountability Act of 1996</span></a><span style="font-weight: 400;"> (HIPAA) has helped healthcare providers protect patients’ information for over 20 years. However, over the years, the number and complexity of cyber threats have grown exponentially. Many companies turn to </span><span style="font-weight: 400;">HIPAA penetration testing</span><span style="font-weight: 400;"> to protect their stakeholders and outpace cybercriminals who view healthcare providers as lucrative targets. </span></p>
<p><span id="more-9369"></span></p>
<p><span style="font-weight: 400;">Let’s take a close look at what comprises </span><span style="font-weight: 400;">healthcare penetration testing</span><span style="font-weight: 400;"> and how it can keep your business safe.</span></p>
<p><span style="font-weight: 400;"> </span></p>
<h2><b>Healthcare Penetration Testing</b><b> for HIPAA Compliance</b></h2>
<p><span style="font-weight: 400;">The </span><a href="https://www.hhs.gov/"><span style="font-weight: 400;">US Department of Health and Human Services</span></a><span style="font-weight: 400;"> (HHS) presides over the HIPAA framework. The HHS collaborates with cybersecurity experts and government agencies to develop requirements that protect healthcare companies, their partner companies, and their patients.</span></p>
<p><span style="font-weight: 400;">Penetration testing is a method that tests the strength of these requirements, making it an essential element of </span><a href="https://blog.rsisecurity.com/achieving-hipaa-compliance/"><span style="font-weight: 400;">HIPAA compliance</span></a><span style="font-weight: 400;"> (though it’s not a HIPAA </span><i><span style="font-weight: 400;">requirement</span></i><span style="font-weight: 400;">). Below, we’ll walk through everything you need to know on the subject, providing:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">A detailed overview of</span><a href="https://blog.rsisecurity.com/hipaa-compliance-checklist-what-you-need-to-know/"><span style="font-weight: 400;"> HIPAA requirements </span></a><span style="font-weight: 400;">related to penetration testing</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">A comprehensive guide to the conventional forms of </span><a href="https://www.rsisecurity.com/penetration-testing/"><span style="font-weight: 400;">penetration testing</span></a></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">A cohesive synthesis of how penetration testing facilitates compliance</span></li>
</ul>
<p><span style="font-weight: 400;">By the end of this blog, you’ll know </span><span style="font-weight: 400;">healthcare penetration testing</span><span style="font-weight: 400;"> inside and out. But first, let’s address a pressing question: why isn’t pen-testing a </span><i><span style="font-weight: 400;">requirement</span></i><span style="font-weight: 400;"> of HIPAA compliance?</span></p>
<p><span style="font-weight: 400;"> </span></p>
<h3><b>Penetration Testing: Not Required for HIPAA</b></h3>
<p><span style="font-weight: 400;">Penetration testing is not a named requirement in the HIPAA framework. It would be possible for a company to reach complete HIPAA and HITECH compliance without conducting a single pen-test. However, pen-testing enables some of the most profound and most proactive risk analyses. Companies will have a much easier time complying with HIPAA’s strenuous Privacy and Security Rule protections by leveraging pen-test services.</span></p>
<p><span style="font-weight: 400;">Since as early as 2008, the</span> <a href="https://blog.rsisecurity.com/what-is-nist-and-why-is-it-critical-to-cybersecurity/"><span style="font-weight: 400;">National Institute for Standards and Technology</span></a> <span style="font-weight: 400;">(NIST) has </span><i><span style="font-weight: 400;">recommended</span></i><span style="font-weight: 400;"> penetration testing to satisfy HIPAA’s requirements. </span><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-66r1.pdf"><span style="font-weight: 400;">Special Publication (SP) 800-66</span></a><span style="font-weight: 400;">, which guides HIPAA implementation, names penetration testing as a critical measure toward achieving HIPAA Security Rule protections.</span></p>
<p><span style="font-weight: 400;">Why is </span><span style="font-weight: 400;">healthcare penetration testing</span><span style="font-weight: 400;"> so essential? HIPAA doesn’t officially require it, but HIPAA’s efficacy depends upon it heavily.</span></p>
<p><span style="font-weight: 400;"> </span></p>
<a href="https://www.rsisecurity.com/compliance-advisory-services/hipaa/" class="su-button su-button-style-flat" style="color:#FFFFFF;background-color:#2D89EF;border-color:#246ec0;border-radius:13px;-moz-border-radius:13px;-webkit-border-radius:13px" target="_blank" rel="noopener noreferrer"><span style="color:#FFFFFF;padding:0px 32px;font-size:23px;line-height:46px;border-color:#6cadf4;border-radius:13px;-moz-border-radius:13px;-webkit-border-radius:13px;text-shadow:none;-moz-text-shadow:none;-webkit-text-shadow:none"> Assess your HIPAA / HITECH compliance</span></a>
<p>&nbsp;</p>
<h2><b>HIPAA Compliance 101</b></h2>
<p><span style="font-weight: 400;">The HHS first implemented HIPAA to protect the privacy and security of </span><a href="https://blog.rsisecurity.com/what-is-phi-protected-health-information/"><span style="font-weight: 400;">protected health information (PHI)</span></a><span style="font-weight: 400;">. It would later build upon these protections with the HITECH Act, which raised the stakes of enforcement and added a new </span><a href="https://www.hhs.gov/hipaa/for-professionals/breach-notification/index.html"><span style="font-weight: 400;">Breach Notification Rule</span></a><span style="font-weight: 400;">. But the key areas pen-testing applies to are the original Privacy Rule and Security Rule, detailed below.</span></p>
<p><span style="font-weight: 400;">HIPAA’s privacy and security protections apply to all of the following </span><a href="https://www.hhs.gov/hipaa/for-professionals/covered-entities/index.html"><span style="font-weight: 400;">covered entities</span></a><span style="font-weight: 400;">:</span></p>
<ul>
<li aria-level="1"><b>Healthcare providers<span style="font-weight: 400;"> – Private practices such as doctors, dentists, and psychologists; facilities such as hospitals, nursing homes, and pharmacies; medical employees</span></b></li>
<li aria-level="1"><strong>Health insurance plans</strong><span style="font-weight: 400;"> – Health insurance companies and private companies that distribute health plans; governmental programs such as Medicare, Medicaid, etc.</span></li>
<li aria-level="1"><strong>Healthcare clearinghouses</strong><span style="font-weight: 400;"> – Entities that translate non-standard health information to standard formats, including certain service providers, digital platforms, etc.</span></li>
</ul>
<p><span style="font-weight: 400;">Additionally, </span><a href="https://www.hhs.gov/hipaa/for-professionals/privacy/guidance/business-associates/index.html"><span style="font-weight: 400;">business associates</span></a><span style="font-weight: 400;"> of these parties must also implement HIPAA protections. All parties are responsible for each others’ non-compliance through </span><a href="https://www.hhs.gov/hipaa/for-professionals/covered-entities/sample-business-associate-agreement-provisions/index.html"><span style="font-weight: 400;">business associate contracts</span></a><span style="font-weight: 400;">. In practice, this means penetration testing is a robust business strategy for all parties involved.</span></p>
<p><span style="font-weight: 400;"> </span></p>
<h3><b>Privacy Rule Requirements</b></h3>
<p><span style="font-weight: 400;">The</span> <a href="https://blog.rsisecurity.com/what-are-the-top-5-components-of-the-hipaa-privacy-rule/"><span style="font-weight: 400;">Privacy Rule</span></a><span style="font-weight: 400;"> is the core of HIPAA protections. It was the first finalized rule (in 2000) and established PHI’s initial definitions and the covered entities mentioned above. The Privacy rule also defined initial parameters of </span><a href="https://www.hhs.gov/hipaa/for-professionals/compliance-enforcement/index.html"><span style="font-weight: 400;">Enforcement</span></a><span style="font-weight: 400;">, which would then become its own rule.</span></p>
<p><span style="font-weight: 400;">According to the HHS’s </span><a href="https://www.hhs.gov/hipaa/for-professionals/privacy/laws-regulations/index.html"><span style="font-weight: 400;">Privacy Rule summary</span></a><span style="font-weight: 400;">, it comprises the following requirements:</span></p>
<ul>
<li aria-level="1"><b>Restricting unauthorized use and disclosure<span style="font-weight: 400;"> – Covered entities cannot allow access to PHI unless the specific individual’s request for access meets one of the following criteria:</span></b></li>
</ul>
<ul>
<li style="list-style-type: none;">
<ul>
<li style="list-style-type: none;">
<ul>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">Disclosure by or for treatment payment or operations</span></li>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">Disclosure of the individual’s PHI is agreed to by the individual</span></li>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">Exposure or use incidental to authorized disclosures or uses</span></li>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">Disclosure or use in the public interest or for public benefit</span></li>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">Disclosure of a limited data set for approved research</span></li>
</ul>
</li>
</ul>
</li>
</ul>
<ul>
<li aria-level="1"><b>Limiting authorized uses and disclosures<span style="font-weight: 400;"> – All use of PHI, except for requests by the individual or governmental agencies, must be limited to the </span><a href="https://blog.rsisecurity.com/what-is-the-hipaa-minimum-necessary-rule/"><span style="font-weight: 400;">minimum necessary principle</span></a></b></li>
</ul>
<p><span style="font-weight: 400;">Covered entities can leverage pen-testing to identify unauthorized uses and their risk factors. Pen tests can also help determine if authorized access meets the minimum necessary principle.</span></p>
<p><span style="font-weight: 400;"> </span></p>
<h3><b>Security Rule Requirements</b></h3>
<p><span style="font-weight: 400;">The </span><a href="https://blog.rsisecurity.com/what-you-should-know-about-the-hipaa-security-rule/"><span style="font-weight: 400;">Security Rule</span></a><span style="font-weight: 400;"> builds on Privacy rule protections, extending them to the realm of electronic PHI (ePHI). Its first form surfaced in 2003 to ensure the confidentiality, integrity, and availability of ePHI through risk analysis and three categories of safeguards.</span></p>
<p><span style="font-weight: 400;">According to the HHS’s </span><a href="https://www.hhs.gov/hipaa/for-professionals/security/laws-regulations/index.html"><span style="font-weight: 400;">Security Rule summary</span></a><span style="font-weight: 400;">, it comprises the following requirements:</span></p>
<ul>
<li aria-level="1"><b>Administrative Safeguards<span style="font-weight: 400;"> – Focused on top-level controls for the whole company:</span></b></li>
<li style="list-style-type: none;">
<ul>
<li style="list-style-type: none;">
<ul>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">Security process management focused on analysis and mitigation of risks</span></li>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">Security personnel management and designation of critical responsibilities</span></li>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">Access and identity management, utilizing the minimum necessary principle</span></li>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">Workforce training and development of a workplace culture of awareness</span></li>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">Evaluation and assessment of security policies’ and practices’ effectiveness</span></li>
</ul>
</li>
</ul>
</li>
</ul>
<ul>
<li aria-level="1"><b>Physical Safeguards<span style="font-weight: 400;"> – Focused on controlling access to devices and areas:</span></b></li>
<li style="list-style-type: none;">
<ul>
<li style="list-style-type: none;">
<ul>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">Control of access to and use of facilities through proper authorization</span></li>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">Monitoring and control of workstations and devices connected to ePHI</span></li>
</ul>
</li>
</ul>
</li>
</ul>
<ul>
<li aria-level="1"><b>Technical Safeguards<span style="font-weight: 400;"> – Focused on technological specifications and settings:</span></b></li>
</ul>
<ul>
<li style="list-style-type: none;">
<ul>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">Control over remote access to systems containing ePHI</span></li>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">Regular auditing, logging, and analysis of logs to correct security flaws</span></li>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">Control over proper maintenance, alteration, and destruction of ePHI</span></li>
<li style="font-weight: 400;" aria-level="2"><span style="font-weight: 400;">Control and restriction of access to ePHI via public network transmissions</span></li>
</ul>
</li>
</ul>
<p><span style="font-weight: 400;">Across these protections, penetration testing is directly applicable to the evaluation specifications under the Administrative Safeguards. However, pen-tests are also apt for identifying and correcting </span><i><span style="font-weight: 400;">all</span></i><span style="font-weight: 400;"> confidentiality, integrity, and availability ePHI threats.</span></p>
<p><span style="font-weight: 400;"> <img class="alignnone wp-image-9298" src="https://blog.rsisecurity.com/wp-content/uploads/2021/03/computer-4-300x147.jpg" alt="Best Threat Detection and Response Solutions" width="757" height="371" srcset="https://blog.rsisecurity.com/wp-content/uploads/2021/03/computer-4-300x147.jpg 300w, https://blog.rsisecurity.com/wp-content/uploads/2021/03/computer-4-768x377.jpg 768w, https://blog.rsisecurity.com/wp-content/uploads/2021/03/computer-4-1024x503.jpg 1024w, https://blog.rsisecurity.com/wp-content/uploads/2021/03/computer-4-1170x574.jpg 1170w, https://blog.rsisecurity.com/wp-content/uploads/2021/03/computer-4-585x287.jpg 585w, https://blog.rsisecurity.com/wp-content/uploads/2021/03/computer-4.jpg 1273w" sizes="(max-width: 757px) 100vw, 757px" /></span></p>
<h2><b>Penetration Testing 101</b></h2>
<p><span style="font-weight: 400;">Often referred to as “ethical hacking,” </span><a href="https://www.rsisecurity.com/penetration-testing/"><span style="font-weight: 400;">penetration testing</span></a><span style="font-weight: 400;"> involves simulating an attack on your company to study the behavior of the “attacker.” This technique is uniquely apt for addressing HIPAA requirements by unveiling weaknesses and preparing all personnel for an actual attack.</span></p>
<p><span style="font-weight: 400;">NIST’s </span><a href="https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-115.pdf"><span style="font-weight: 400;">SP 800-115: Technical Guide to Information Security Testing and Assessment</span></a><span style="font-weight: 400;"> provides a framework for penetration testing for many situations. It comprises four primary stages:</span></p>
<ul>
<li aria-level="1"><b>Planning<span style="font-weight: 400;"> – The contracted hacker and the target company negotiate expectations and boundaries for the simulated attack, including special focuses and off-limits data</span></b></li>
</ul>
<ul>
<li aria-level="1"><strong>Discovering</strong><span style="font-weight: 400;"> – The hacker scans, inventories, and analyzes the target company’s security infrastructure, including its relative strengths and weaknesses</span></li>
</ul>
<ul>
<li aria-level="1"><strong>Attacking</strong><span style="font-weight: 400;"> – The hacker launches the attack on the company, seeking to infiltrate a specific target or take control of the whole system as efficiently and covertly as possible</span></li>
</ul>
<ul>
<li aria-level="1"><strong>Reporting</strong><span style="font-weight: 400;"> – The hacker finishes the attack and “exits” the company’s systems undetected, then reports back on their findings to facilitate corrective action</span></li>
</ul>
<p><span style="font-weight: 400;">There are two primary forms of pen-tests: external and internal. Each offers different insights into how a hacker would compromise your defenses and seize your PHI (or other valuable information). Let’s take a close look at each, starting with external pen-testing.</span></p>
<p><span style="font-weight: 400;"> </span></p>
<h3><b>External Penetration Testing</b></h3>
<p><span style="font-weight: 400;">Sometimes referred to as “black hat testing” or “black box testing,” external penetration testing is the most basic and comprehensive way to study an attack “from scratch.” The pen-testing team of ethical hackers is given no inside information (or very little information) to simulate all elements of a potential attack. Typically, an external pen-test goal is to track the exact entry points through which the hacker gains access to the “inside” of your system. These weaknesses are then corrected in collaboration with the hacker team to close all unguarded entry points.</span></p>
<p><a href="https://blog.rsisecurity.com/how-does-an-external-penetration-test-work/"><span style="font-weight: 400;">External pen-tests</span></a><span style="font-weight: 400;"> are often conducted from vantage points outside of your company’s premises. Remote attackers begin by identifying weak points in your cloud architecture, wireless networks, and web applications. Simultaneously, they may also engage in social engineering schemes such as general phishing or targeted “spear” phishing campaigns. In some cases, the attack ends once the hacker is spotted. In others, it only ends when the hacker is stopped.</span></p>
<p><span style="font-weight: 400;">Concerning HIPAA requirements detailed above, external pen-testing is especially beneficial for business associates seeking general awareness of vulnerabilities impacting their ePHI.</span></p>
<p><span style="font-weight: 400;"> </span></p>
<h3><b>Internal Penetration Testing</b></h3>
<p><span style="font-weight: 400;">Also commonly known as “white hat testing” or “white box testing,” </span><a href="https://blog.rsisecurity.com/what-are-the-steps-to-conducting-an-internal-pen-test/"><span style="font-weight: 400;">internal penetration testing </span></a><span style="font-weight: 400;">is a more targeted form of ethical hacking. It involves simulating an attack directed by a person with privileged knowledge of the company’s cybersecurity architecture.</span></p>
<p><span style="font-weight: 400;">An internal pen test’s planning stage is often much more involved than an external pen test. It includes negotiating what precisely the attacker has access to, such as:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Physical access to a computer or smart device connected to private servers</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">User account credentials, current or old, with privileged status and access</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Enough knowledge of private network details to override safeguards</span></li>
</ul>
<p><span style="font-weight: 400;">Since the hacker already begins “inside” the company’s systems, in one way or another, the goal of an internal pen-test is not to study how they infiltrate barriers. Instead, the analysis focuses on exactly how the hacker behaves once inside, how quickly they seize control of the whole system, or how they approach targeting a specific protected dataset (ePHI).</span></p>
<p><span style="font-weight: 400;">Like external pen-testing, internal pen-tests are extremely valuable for the business associates of covered entities. Pen-tests are also one of the best tools to analyze the largest and most complex stashes of ePHI, such as those presided over by healthcare providers themselves.</span></p>
<p><span style="font-weight: 400;"> <img class="alignnone wp-image-9296" src="https://blog.rsisecurity.com/wp-content/uploads/2021/03/computer-3-300x114.jpg" alt="" width="763" height="290" srcset="https://blog.rsisecurity.com/wp-content/uploads/2021/03/computer-3-300x114.jpg 300w, https://blog.rsisecurity.com/wp-content/uploads/2021/03/computer-3-768x291.jpg 768w, https://blog.rsisecurity.com/wp-content/uploads/2021/03/computer-3-1024x388.jpg 1024w, https://blog.rsisecurity.com/wp-content/uploads/2021/03/computer-3-1170x443.jpg 1170w, https://blog.rsisecurity.com/wp-content/uploads/2021/03/computer-3-585x222.jpg 585w, https://blog.rsisecurity.com/wp-content/uploads/2021/03/computer-3.jpg 1278w" sizes="(max-width: 763px) 100vw, 763px" /></span></p>
<h2><b>HIPAA Penetration Testing</b><b> 101</b></h2>
<p><span style="font-weight: 400;">Many companies utilize a hybrid “grey hat testing” or “grey box testing” approach to optimize penetration testing for covered entities and business associates. For example, RSI Security’s </span><a href="https://www.rsisecurity.com/penetration-testing/"><span style="font-weight: 400;">pen testing services</span></a><span style="font-weight: 400;"> include external and internal pen-testing elements applied to all areas of a company’s cybersecurity infrastructure. Some individual tests we offer include:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Firewall penetration testing for your company’s outermost web filtering layers</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Network security penetration testing focused on wireless networking devices</span></li>
<li style="font-weight: 400;" aria-level="1"><a href="https://blog.rsisecurity.com/how-to-conduct-cloud-penetration-testing/"><span style="font-weight: 400;">Cloud computing penetration testing</span></a><span style="font-weight: 400;"> for AWS and other shared servers</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Web application, mobile application, and </span><a href="https://blog.rsisecurity.com/what-you-need-to-know-about-mobile-penetration-testing/"><span style="font-weight: 400;">mobile device penetration testing</span></a></li>
</ul>
<p><span style="font-weight: 400;">All of our pen testing services are highly customizable. We’ll tailor our simulated attack, report, and analysis to your compliance and general cyberdefense needs. This includes mapping onto HIPAA-specific requirements and any other regulatory frameworks.</span></p>
<p><span style="font-weight: 400;"> </span></p>
<h3><b>Comprehensive HIPAA Advisory</b></h3>
<p><span style="font-weight: 400;">As powerful a tool as penetration testing is and as apt as it can be in facilitating full HIPAA implementation and compliance, it’s far from the only cybersecurity service you’ll need. For more comprehensive coverage, RSI Security offers a suite of </span><a href="https://www.rsisecurity.com/compliance-advisory-services/hipaa/"><span style="font-weight: 400;">HIPAA compliance services</span></a><span style="font-weight: 400;">. We’ll work with internal IT personnel to plan your </span><a href="https://blog.rsisecurity.com/what-is-the-purpose-of-cybersecurity-architecture/"><span style="font-weight: 400;">cybersecurity architecture</span></a><span style="font-weight: 400;"> from scratch. We can also analyze your existing measures and generate a </span><a href="https://www.rsisecurity.com/patch-availability-report/"><span style="font-weight: 400;">patch report</span></a><span style="font-weight: 400;"> on your architecture gaps (and how to fix them).</span></p>
<p><span style="font-weight: 400;">Wherever you are in your journey toward complete HIPAA and HITECH compliance, we are happy to help get you to the next stage. And penetration testing is just one part of that holistic process. See our </span><a href="https://www.rsisecurity.com/files/Data_Sheets/HIPAA_Data_Sheet_RSI.pdf"><span style="font-weight: 400;">HIPAA services datasheet</span></a><span style="font-weight: 400;"> for more information on our compliance package.</span></p>
<p><span style="font-weight: 400;"> </span></p>
<h2><b>Professional Risk Analysis and Compliance</b></h2>
<p><span style="font-weight: 400;">RSI Security’s HIPAA package is just one part of our comprehensive suite of </span><a href="https://www.rsisecurity.com/compliance-advisory-services/"><span style="font-weight: 400;">compliance services</span></a><span style="font-weight: 400;">. We know just how essential HIPAA compliance is for covered entities and business associates. We also know many of these impacted companies work within multiple industries, many of which require their own regulatory contexts: from </span><a href="https://www.rsisecurity.com/compliance-advisory-services/pci/"><span style="font-weight: 400;">PCI-DSS</span></a><span style="font-weight: 400;"> to </span><a href="https://www.rsisecurity.com/compliance-advisory-services/cmmc/"><span style="font-weight: 400;">CMMC</span></a><span style="font-weight: 400;"> to </span><a href="https://www.rsisecurity.com/compliance-advisory-services/hitrust/"><span style="font-weight: 400;">HITRUST</span></a><span style="font-weight: 400;"> and beyond.</span></p>
<p><span style="font-weight: 400;">That’s why </span><span style="font-weight: 400;">HIPAA penetration testing</span><span style="font-weight: 400;"> and compliance are just two of the many </span><a href="https://www.rsisecurity.com/managed-security-services/"><span style="font-weight: 400;">managed IT and security services</span></a><span style="font-weight: 400;"> we offer. Our team of experts has helped businesses of all sizes bolster their cybersecurity for over a decade. To see just how powerful your cyberdefenses can be </span><i><span style="font-weight: 400;">beyond</span></i><span style="font-weight: 400;"> compliance requirements,</span> <a href="https://www.rsisecurity.com/contact"><span style="font-weight: 400;">contact RSI Security today</span></a><span style="font-weight: 400;">!</span></p>
<p><span style="font-weight: 400;"> </span></p>
<div class="su-button-center"><a href="https://www.rsisecurity.com/compliance-advisory-services/hipaa/" class="su-button su-button-style-flat" style="color:#FFFFFF;background-color:#2D89EF;border-color:#246ec0;border-radius:13px;-moz-border-radius:13px;-webkit-border-radius:13px" target="_blank" rel="noopener noreferrer"><span style="color:#FFFFFF;padding:0px 32px;font-size:23px;line-height:46px;border-color:#6cadf4;border-radius:13px;-moz-border-radius:13px;-webkit-border-radius:13px;text-shadow:none;-moz-text-shadow:none;-webkit-text-shadow:none"> Speak with a HIPAA / HITECH expert today!</span></a></div>
<p>&nbsp;</p>
<p>The post <a rel="nofollow" href="https://blog.rsisecurity.com/healthcare-penetration-testing-for-hipaa-compliance/">Healthcare Penetration Testing for HIPAA Compliance</a> appeared first on <a rel="nofollow" href="https://blog.rsisecurity.com">RSI Security</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://blog.rsisecurity.com/healthcare-penetration-testing-for-hipaa-compliance/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Your Complete Cybersecurity Hygiene Checklist</title>
		<link>https://blog.rsisecurity.com/your-complete-cybersecurity-hygiene-checklist/</link>
		<comments>https://blog.rsisecurity.com/your-complete-cybersecurity-hygiene-checklist/#respond</comments>
		<pubDate>Fri, 19 Mar 2021 07:57:55 +0000</pubDate>
		<dc:creator><![CDATA[RSI Security]]></dc:creator>
				<category><![CDATA[Managed Security Service Provider (MSSP)]]></category>

		<guid isPermaLink="false">https://blog.rsisecurity.com/?p=9364</guid>
		<description><![CDATA[<p>Maintaining a regular hygiene routine is the key to living a healthy lifestyle. The same is true for achieving a strong security infrastructure. With a cybersecurity hygiene checklist, you can easily&#8230;</p>
<p>The post <a rel="nofollow" href="https://blog.rsisecurity.com/your-complete-cybersecurity-hygiene-checklist/">Your Complete Cybersecurity Hygiene Checklist</a> appeared first on <a rel="nofollow" href="https://blog.rsisecurity.com">RSI Security</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><span style="font-weight: 400;">Maintaining a regular hygiene routine is the key to living a healthy lifestyle. The same is true for achieving a strong security infrastructure. </span><span style="font-weight: 400;">With a </span><span style="font-weight: 400;">cybersecurity hygiene checklist</span><span style="font-weight: 400;">, you can easily maintain a robust cybersecurity posture while promoting healthy information management practice. </span><a href="https://blog.rsisecurity.com/why-is-cyber-hygiene-important/"><span style="font-weight: 400;">Cyber hygiene</span></a><span style="font-weight: 400;"> means maintaining a security-centric stance and routine that enables your organization to mitigate potential breaches. </span></p>
<p><span id="more-9364"></span></p>
<p><span style="font-weight: 400;">This article will explore the three components of a cyber hygiene checklist and how you can implement it into your organization. </span></p>
<p>&nbsp;</p>
<h2><b>Cyber Hygiene Checklist</b></h2>
<p><span style="font-weight: 400;">The cyber hygiene checklist should help your organization develop and adhere to a security routine, maximizing its benefits. This commitment will also help improve the overall cybersecurity posture of the organization.</span></p>
<p><span style="font-weight: 400;">To make the checklist easier to digest, we have broken it down into three main categories:</span></p>
<ol>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">People </span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Processes </span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Technology</span></li>
</ol>
<p><span style="font-weight: 400;">These three categories are the building blocks to any organization and are also the main ingredients to a robust </span><a href="https://blog.rsisecurity.com/what-is-the-purpose-of-cybersecurity-architecture/"><span style="font-weight: 400;">cybersecurity architecture.</span></a></p>
<p>&nbsp;</p>
<h2><b>People</b></h2>
<p><span style="font-weight: 400;">People form the bulk of any organization. They should also form the mainstay of your cyber defense. Unfortunately, this is not the case. Untrained staff tends to do this opposite and are a liability instead of an asset.</span></p>
<p><span style="font-weight: 400;">Human error remains the number one reason for data breaches. For this reason, the “people” aspect of your business should make up the majority of your </span><a href="https://blog.rsisecurity.com/cyber-hygiene-a-complete-guide/"><span style="font-weight: 400;">cyber hygiene</span></a><span style="font-weight: 400;"> practices.</span></p>
<p><span style="font-weight: 400;">The “people” hygiene checklist would include:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Policies to protect against phishing</span></li>
<li style="font-weight: 400;" aria-level="1"><a href="https://www.rsisecurity.com/education-awareness/"><span style="font-weight: 400;">Continuous security awareness training</span></a></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Correct workstation use</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">BYOD policies</span></li>
</ul>
<p>&nbsp;</p>
<a href="https://www.rsisecurity.com/request-demo/" class="su-button su-button-style-flat" style="color:#FFFFFF;background-color:#2D89EF;border-color:#246ec0;border-radius:13px;-moz-border-radius:13px;-webkit-border-radius:13px" target="_blank" rel="noopener noreferrer"><span style="color:#FFFFFF;padding:0px 32px;font-size:23px;line-height:46px;border-color:#6cadf4;border-radius:13px;-moz-border-radius:13px;-webkit-border-radius:13px;text-shadow:none;-moz-text-shadow:none;-webkit-text-shadow:none"> Assess your cybersecurity</span></a>
<p>&nbsp;</p>
<h3><b>Policies to protect against phishing</b></h3>
<p><span style="font-weight: 400;">Attackers are using phishing more, both as a way to scam customers and as a means to gain access to business information systems. Although organizations can stop most phishing attempts by blocking links from being opened, it is still an issue you must address at the human level.</span></p>
<p><span style="font-weight: 400;">This protection means implementing policies on how to handle emails from unknown sources. It should be standard that employees must never open links from anonymous email addresses on a company workstation or any device connected to the organizational network. </span></p>
<p><span style="font-weight: 400;">The hygiene aspect of this policy is to maintain a level of awareness around phishing within the organization. It might mean weekly email reminders to all staff and possibly sending “fake phishing emails” to test organizational readiness.</span></p>
<p><img class="alignnone wp-image-9305" src="https://blog.rsisecurity.com/wp-content/uploads/2021/03/desk-300x149.jpg" alt="" width="759" height="377" srcset="https://blog.rsisecurity.com/wp-content/uploads/2021/03/desk-300x149.jpg 300w, https://blog.rsisecurity.com/wp-content/uploads/2021/03/desk-768x382.jpg 768w, https://blog.rsisecurity.com/wp-content/uploads/2021/03/desk-1024x510.jpg 1024w, https://blog.rsisecurity.com/wp-content/uploads/2021/03/desk-1170x582.jpg 1170w, https://blog.rsisecurity.com/wp-content/uploads/2021/03/desk-585x291.jpg 585w, https://blog.rsisecurity.com/wp-content/uploads/2021/03/desk.jpg 1276w" sizes="(max-width: 759px) 100vw, 759px" /></p>
<h3><b>Continuous Awareness Training to Protect against Social Engineering</b></h3>
<p><span style="font-weight: 400;">Similar to phishing, general security awareness to combat social engineering should form part of your routine.</span></p>
<p><span style="font-weight: 400;">While phishing is more specific to link baiting, social engineering can cover a wide array of vulnerable access points. This, of course, still refers to the human network of the organization. </span><a href="https://blog.rsisecurity.com/tailored-social-engineering/"><span style="font-weight: 400;">Social engineering</span></a><span style="font-weight: 400;"> is an excellent way for attackers to exploit a weakness in the human network. And as the saying goes, </span><i><span style="font-weight: 400;">you are only as strong as your weakest link. </span></i><span style="font-weight: 400;">Ensure that your organization makes a habit of security awareness training, specifically to combat social engineering. </span></p>
<p><span style="font-weight: 400;">Much like phishing, you will need to combat this at the root level. You will only be resilient if the training covers as many scenarios as possible. </span></p>
<p><span style="font-weight: 400;">For example, using social media in the workplace might encourage attackers to befriend employees and use that connection as a channel to gather intel on the information system.</span></p>
<p>&nbsp;</p>
<h3><b>Implementing Bring Your Own Device (BYOD) Policies</b></h3>
<p><span style="font-weight: 400;">With the rise of remote working, using personal devices is becoming a mainstay in the work environment. </span><a href="https://blog.rsisecurity.com/pros-cons-of-bring-your-own-device-byod/"><span style="font-weight: 400;">Bring Your Own Device (BYOD)</span></a><span style="font-weight: 400;"> means employees bring their own devices into the workspace.</span></p>
<p><span style="font-weight: 400;">This method of working has many benefits to employee efficiency and can help reduce operational costs. However, there are some drawbacks. The information systems security can suffer from numerous non-standard devices attaching to the network. </span><span style="font-weight: 400;">Often less of a problem with smaller businesses, but there is a blessing in disguise here. It provides an opportunity to boost your security posture if you implement a BYOD policy.</span></p>
<p><span style="font-weight: 400;">The policy should cover how individuals should protect themselves from online threats. And as part of the procedure, a “hygiene” routine should be established into the policy, which means employees regularly virus scan their own devices and utilize techniques like </span><a href="https://blog.rsisecurity.com/the-factors-of-multifactor-authentication/"><span style="font-weight: 400;">Multi-Factor Authentication (MFA)</span></a><span style="font-weight: 400;"> when connecting to organizational networks. </span></p>
<p><span style="font-weight: 400;">Using this policy transfers well to remote-working environments and builds a culture of security within your staff. </span></p>
<p>&nbsp;</p>
<h2><b>Processes</b></h2>
<p><span style="font-weight: 400;">The next category you will want to cover in your cyber hygiene checklist is the processes. The processes are all the procedures that aid in organizational security. </span><span style="font-weight: 400;">There are some reasonably standard processes that you will want to build into your cyber hygiene routine. These processes are often referenced in some reputable cybersecurity frameworks like the NIST 800 and the </span><a href="https://blog.rsisecurity.com/what-is-the-center-for-internet-security-cis/"><span style="font-weight: 400;">CIS CSC. </span></a><span style="font-weight: 400;">Keeping track of these processes can even drastically help reduce the chance of a data breach.</span></p>
<p>&nbsp;</p>
<h3><b>Inventory of software assets</b></h3>
<p><span style="font-weight: 400;">The most basic form of </span><a href="https://blog.rsisecurity.com/cyber-hygiene-best-practices/"><span style="font-weight: 400;">cyber hygiene</span></a><span style="font-weight: 400;"> is inventory management. The first form is keeping an inventory of software assets. Essentially, this means keeping a list of all installed or used software on the information system. </span><span style="font-weight: 400;">This inventory makes it easier for you to identify what systems need updating and those that providers no longer support. </span></p>
<p><span style="font-weight: 400;">However, this is a basic example of what keeping a software inventory can do for you. Later on, you will also see that keeping a stock of software assets helps in vulnerability management.</span></p>
<p>&nbsp;</p>
<h3><b>Inventory of hardware assets</b></h3>
<p><span style="font-weight: 400;">Much like the inventory of software assets, the list of hardware assets keeps track of all hardware used on the information system. </span><span style="font-weight: 400;">This stock tracks all the workstations, servers, and devices hooked up to the organizational network. </span></p>
<p><span style="font-weight: 400;">Keeping a list of these items helps in threat detection. For example, knowing how many laptops are authorized to access the company wifi means you know when there is one too many. It could indicate that the extra laptop maybe an attacker who has just gained access to the information system.</span></p>
<p><img class="alignnone wp-image-9247" src="https://blog.rsisecurity.com/wp-content/uploads/2021/03/work-300x142.png" alt="" width="792" height="375" srcset="https://blog.rsisecurity.com/wp-content/uploads/2021/03/work-300x142.png 300w, https://blog.rsisecurity.com/wp-content/uploads/2021/03/work-768x364.png 768w, https://blog.rsisecurity.com/wp-content/uploads/2021/03/work-585x277.png 585w, https://blog.rsisecurity.com/wp-content/uploads/2021/03/work.png 893w" sizes="(max-width: 792px) 100vw, 792px" /></p>
<h3><b>Vulnerability Management </b></h3>
<p><span style="font-weight: 400;">One of the more critical undertakings when it comes to cyber hygiene is vulnerability management. If you are trying to build a security-conscious organization, you will need to incorporate a system to scan your information system consistently.  </span><span style="font-weight: 400;">This scanning system identifies any vulnerabilities that an attacker could exploit. The management aspect comes into play when deciding on what to do when you discover a vulnerability.  </span></p>
<p><span style="font-weight: 400;">Depending on the vulnerability’s risk, your organization might choose to ignore it or patch it. It is usually a balancing act between the available security budget and the opportunity cost of leaving the vulnerability unpatched.</span></p>
<p><span style="font-weight: 400;">In most cases, it is ok to ignore vulnerabilities that pose a low risk to sensitive data or critical business infrastructure.  </span></p>
<p>&nbsp;</p>
<h3><b>Threat Analysis</b></h3>
<p><span style="font-weight: 400;">Just as essential as vulnerability management, threat analysis should form part of your </span><a href="https://blog.rsisecurity.com/top-cyber-hygiene-tips-you-need-to-know/"><span style="font-weight: 400;">cyber hygiene </span></a><span style="font-weight: 400;">repertoire. </span></p>
<p><span style="font-weight: 400;">This process requires your organization to stay on top of the threat landscape. Attackers continuously look for new attack avenues, exploit vulnerabilities, and develop new threats, like ransomware and trojans. </span></p>
<p><span style="font-weight: 400;">Anti-virus and a strong firewall should be able to deal with the more traditional types of threats. But new threats and exploits spread amongst hacker communities like wildfire. A new threat that targets your industry could be discussed on forums and other channels used by hackers.  </span></p>
<p><span style="font-weight: 400;">Keep an eye on white-hacker forums and threat-watch boards that will broadcast discovered vulnerabilities and threats that affect widely used operating systems and devices.  </span></p>
<p>&nbsp;</p>
<h3><b>Controlled User Access</b></h3>
<p><span style="font-weight: 400;">Many businesses in the start-up phase or those that have yet to integrate an IT department will often neglect one of the most critical aspects of information system management. And that is controlled user access. Many operating systems have controlled user access or privilege settings built into them. </span></p>
<p><span style="font-weight: 400;">This system allows the administrative user to set the privileges of all other users on the network. Controlled user access protocols mean that lower privileged accounts do not have access to sensitive data or business-critical information. </span></p>
<p><span style="font-weight: 400;">Attackers can quickly gain access to this type of information by accessing an admin account, which is why you should always enable Multi-Factor Authentication (MFA) on all high-level accounts.</span></p>
<p>&nbsp;</p>
<h2><b>Technology</b></h2>
<p><span style="font-weight: 400;">Although organizations mainly consist of people and management frameworks, you can always employ tools to make your life easier. </span><span style="font-weight: 400;">And with the cyber hygiene checklist, there are some tools of the trade that no cybersecurity professional will leave out of their toolbox. </span></p>
<p><span style="font-weight: 400;">There are a wide array of cybersecurity solutions that work for specific industries and situations. However, the ones on this hygiene checklist are tried and tested to implement well in any information system. You should always strive to apply them to your business information system.   </span></p>
<p>&nbsp;</p>
<h3><b>Anti-Malware and Anti-Virus</b></h3>
<p><span style="font-weight: 400;">You can’t take one step out into cyberspace without hearing about malware and viruses. These threats not only attack businesses but are a severe concern for customers too. </span><span style="font-weight: 400;">Thankfully, the security industry has been developing solutions to combat this problem since its inception, anti-malware and anti-virus.</span></p>
<p><span style="font-weight: 400;">No information system is genuinely safe without this basic defense solution. If you have no security budget, at least invest a little bit into a decent anti-virus program. </span></p>
<p>&nbsp;</p>
<h3><b>Firewalls</b></h3>
<p><span style="font-weight: 400;">Much like an anti-virus, a firewall is another essential tool for any organization willing to combat cyber threats. Technologically speaking, this is your first line of defense. </span><span style="font-weight: 400;">The firewall will block any troublesome traffic that is trying to access your information system. Most operating systems will come with a built-in firewall. </span></p>
<p><span style="font-weight: 400;">But if you can afford it, invest in your security by using a next-gen firewall. These firewalls move beyond just port and protocol inspection and work on the application layer too. </span><span style="font-weight: 400;">Meaning they are better suited to the modern business environment. </span></p>
<p>&nbsp;</p>
<h3><b>SIEM systems</b></h3>
<p><a href="https://blog.rsisecurity.com/training-for-security-information-and-event-management/"><span style="font-weight: 400;">Security Incidents and Events Management (SIEM)</span></a><span style="font-weight: 400;"> systems are arguably the best technology investment for cyber defense. The SIEM will continuously scan the information system and flag any suspicious events, such as users logging in during out-of-office hours. </span><span style="font-weight: 400;">In terms of good cyber hygiene, your team should be consistently updating and celebrating the SIEM so it can return better results. </span></p>
<p><span style="font-weight: 400;">It is one of those cases where the more it is used, the better it gets at doing its job.     </span></p>
<p>&nbsp;</p>
<h3><b>MFA and 2FA</b></h3>
<p><span style="font-weight: 400;">We have mentioned Multi-Factor Authentication (MFA) in a few sections of this article already. But it is a super important tool in combating intrusion that we will go into a bit more detail here; it is technology, after all.  </span><span style="font-weight: 400;">The baby sister of MFA is Two-Factor Authentication (2FA), generally speaking, this is accepted as a standard layer of security on many mainstream platforms. </span></p>
<p><span style="font-weight: 400;">For example, if you have a Google account, it will sometimes ask you to verify your login using a code sent to your phone. </span></p>
<p><span style="font-weight: 400;">As part of your cyber hygiene routine, you should employ at least 2FA on as many systems as possible. MFA is a more secure form as it adds extra layers like biometric data (think fingerprint unlocking on your smartphone).</span></p>
<p><span style="font-weight: 400;">Make sure to update staff on MFA use and teach them to be more conscious of how they log into their business accounts.</span></p>
<p>&nbsp;</p>
<h2><b>Closing Remarks</b></h2>
<p><span style="font-weight: 400;">Like brushing your teeth, your information security is consistent practice and will need regular maintenance if you want the best results. </span><span style="font-weight: 400;">This </span><span style="font-weight: 400;">cyber hygiene checklist</span><span style="font-weight: 400;"> went over some key aspects to integrate into your security practice, branching over three categories:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">People </span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Processes</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Technology</span></li>
</ul>
<p><span style="font-weight: 400;">Some parts of the routine will require more maintenance than others, but the whole practice is applied holistically, where each element helps build on the others.</span></p>
<p><span style="font-weight: 400;">If you are looking to improve your cybersecurity posture, look no further than </span><a href="https://www.rsisecurity.com/"><span style="font-weight: 400;">RSI Security</span></a><span style="font-weight: 400;">. The nation&#8217;s premier security provider is here to instill the best cyber hygiene practice right for your business. </span><span style="font-weight: 400;">Get in contact with us today, and </span><a href="https://www.rsisecurity.com/managed-security-services/"><span style="font-weight: 400;">schedule a consultation here</span></a><span style="font-weight: 400;">.  </span></p>
<p><span style="font-weight: 400;"> </span></p>
<div class="su-button-center"><a href="https://www.rsisecurity.com/request-demo/" class="su-button su-button-style-flat" style="color:#FFFFFF;background-color:#2D89EF;border-color:#246ec0;border-radius:13px;-moz-border-radius:13px;-webkit-border-radius:13px" target="_blank" rel="noopener noreferrer"><span style="color:#FFFFFF;padding:0px 32px;font-size:23px;line-height:46px;border-color:#6cadf4;border-radius:13px;-moz-border-radius:13px;-webkit-border-radius:13px;text-shadow:none;-moz-text-shadow:none;-webkit-text-shadow:none"> Speak with a Cybersecurity expert today!</span></a></div>
<p>&nbsp;</p>
<p>The post <a rel="nofollow" href="https://blog.rsisecurity.com/your-complete-cybersecurity-hygiene-checklist/">Your Complete Cybersecurity Hygiene Checklist</a> appeared first on <a rel="nofollow" href="https://blog.rsisecurity.com">RSI Security</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://blog.rsisecurity.com/your-complete-cybersecurity-hygiene-checklist/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>How To Make A Personally Identifiable Information Policy</title>
		<link>https://blog.rsisecurity.com/how-to-make-a-personally-identifiable-information-policy/</link>
		<comments>https://blog.rsisecurity.com/how-to-make-a-personally-identifiable-information-policy/#respond</comments>
		<pubDate>Thu, 18 Mar 2021 08:15:29 +0000</pubDate>
		<dc:creator><![CDATA[RSI Security]]></dc:creator>
				<category><![CDATA[PII / PAN Scanner]]></category>

		<guid isPermaLink="false">https://blog.rsisecurity.com/?p=9370</guid>
		<description><![CDATA[<p>For years, individuals have trusted companies with their data. After many instances of data breaches reaching the mainstream news, the public’s negative perceptions of data misuse are increasing. Data producers have&#8230;</p>
<p>The post <a rel="nofollow" href="https://blog.rsisecurity.com/how-to-make-a-personally-identifiable-information-policy/">How To Make A Personally Identifiable Information Policy</a> appeared first on <a rel="nofollow" href="https://blog.rsisecurity.com">RSI Security</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><span style="font-weight: 400;">For years, individuals have trusted companies with their data. After many instances of data breaches reaching the mainstream news, the public’s negative perceptions of data misuse are increasing. </span><span style="font-weight: 400;">Data producers have become more suspicious of how organizations are using their data. It has never been more critical for your organization to develop a </span><span style="font-weight: 400;">personally identifiable information policy</span><span style="font-weight: 400;">, and this article will show you how.</span></p>
<p><span id="more-9370"></span></p>
<p><span style="font-weight: 400;">Let’s discuss. </span></p>
<p>&nbsp;</p>
<h2><b>Do I Need A </b><b>Personally Identifiable Information Policy</b><b>?</b></h2>
<p><span style="font-weight: 400;">A </span><a href="https://blog.rsisecurity.com/what-is-personally-identifiable-information-pii/"><span style="font-weight: 400;">Personally Identifiable Information (PII)</span></a><span style="font-weight: 400;"> policy is a mechanism for better managing PII within your organization. While you might have an obligation to protect personal data, having a PII policy is not compulsory, unlike a privacy policy, which we will see later on. </span><span style="font-weight: 400;">However, a PII policy will drastically reduce any potential privacy risks before attackers can exploit them, which we explore in this article.</span></p>
<p><span style="font-weight: 400;">Unlike data mapping and privacy policies, it is not a regulatory requirement for an organization to have a PII policy. It will make life much easier regarding personal data protection, employee security awareness training, and compliance strategy for your organization to go through the process of constructing a PII policy. </span></p>
<p><span style="font-weight: 400;">Let’s find out what makes a good PII policy.  </span></p>
<p>&nbsp;</p>
<h3><b>What Is PII </b></h3>
<p><span style="font-weight: 400;">Before jumping into policy creation, you will need to understand what constitutes personally identifiable information. A few regulations cover PII protection, and most of them share a similar definition of PII.</span></p>
<p><span style="font-weight: 400;">Essentially, PII is any form of data that, if exposed, allows another entity to identify that data’s producer.</span></p>
<p><span style="font-weight: 400;">Below you will find some personally identifiable information examples:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Names and addresses</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Gender or sexual orientation</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Religious or political affiliations</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Identification numbers like SSN</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Financial information: bank numbers, credit card info</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Race</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Telephone numbers</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Government records: criminal, tax, etc.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Email</span></li>
</ul>
<p><span style="font-weight: 400;">You should note that this is not a complete list of PII. Any data that you think could identify a person is PII. For example, in some more advanced cases of attackers can use metadata to steal people’s identity. Like knowing buying habits and hobbies allows the more creative fraudster to spoof identification verification processes.</span></p>
<p><img class="alignnone wp-image-9252" src="https://blog.rsisecurity.com/wp-content/uploads/2021/03/laptop-300x137.jpg" alt="" width="766" height="350" srcset="https://blog.rsisecurity.com/wp-content/uploads/2021/03/laptop-300x137.jpg 300w, https://blog.rsisecurity.com/wp-content/uploads/2021/03/laptop.jpg 768w, https://blog.rsisecurity.com/wp-content/uploads/2021/03/laptop-585x267.jpg 585w" sizes="(max-width: 766px) 100vw, 766px" /></p>
<h3><b>Regulations That Cover PII</b></h3>
<p><span style="font-weight: 400;">As stated previously, there is a significant shift in the regulatory landscape where governments are pushing companies to adopt a more security and privacy-conscious PII attitude.</span></p>
<p><span style="font-weight: 400;">The big daddy of data protection law is the </span><a href="https://blog.rsisecurity.com/eu-gdpr-explained/"><span style="font-weight: 400;">GDPR</span></a><span style="font-weight: 400;">. It’s almost impossible to visit any website nowadays without being bombarded with cookies and privacy policies. Thanks to regulations like the GDPR, businesses need to pay more attention to the handling of individuals’ data. </span></p>
<p><span style="font-weight: 400;">The GDPR is not the only regulation, and it also only protects European data subjects. California has stepped forward as a proponent of privacy rights with the </span><a href="https://www.rsisecurity.com/compliance-advisory-services/ccpa/"><span style="font-weight: 400;">California Consumer Privacy Act (CCPA)</span></a><span style="font-weight: 400;">. Conversely, the CCPA only pertains to Californian residents. </span></p>
<p><span style="font-weight: 400;">More states and other countries will likely begin adopting data protection laws. The trend is not looking to slow down; it’s better to remain ahead of the curve.</span></p>
<p><span style="font-weight: 400;">If your organization is processing any Californian consumers or EU data subjects’ data, then a PII policy will help you in your compliance mapping strategy.</span></p>
<p>&nbsp;</p>
<a href="https://www.rsisecurity.com/request-demo/" class="su-button su-button-style-flat" style="color:#FFFFFF;background-color:#2D89EF;border-color:#246ec0;border-radius:13px;-moz-border-radius:13px;-webkit-border-radius:13px" target="_blank" rel="noopener noreferrer"><span style="color:#FFFFFF;padding:0px 32px;font-size:23px;line-height:46px;border-color:#6cadf4;border-radius:13px;-moz-border-radius:13px;-webkit-border-radius:13px;text-shadow:none;-moz-text-shadow:none;-webkit-text-shadow:none"> Request a Free Consultation</span></a>
<p>&nbsp;</p>
<h2><b>Privacy Policy vs. PII Policy</b></h2>
<p><span style="font-weight: 400;">The privacy policy is a term thrown around a lot in online business, and for a good reason. Most data protection laws and those pertaining to Western enterprises require your website or online business to have a privacy policy. </span></p>
<p><span style="font-weight: 400;">But there is a distinction to be made between a privacy policy and a PII policy. While both approaches surround the use of personal data, a privacy policy is outward-facing, and a PII policy is inward-facing. </span></p>
<p><span style="font-weight: 400;">Privacy policies are for your customers to see. It gives them options on how you can use their data. It lays out how you use their data and how you are complying with regulations. The better privacy policies will also tell customers and data subjects how they can access the data you hold and the process of deleting the data.</span></p>
<p><span style="font-weight: 400;">However, a PII policy is an organizational policy meant for personnel. The policy dictates how the business’s internal mechanism will handle PII and how staff should conduct their job function if it requires PII processing.</span></p>
<p><span style="font-weight: 400;">In the coming sections, we will explore in more detail the ingredients that go into the making of a PII policy and, finally, the recipe to an acceptable PII policy.</span></p>
<p>&nbsp;</p>
<h2><b>PII Policy Ingredients</b></h2>
<p><span style="font-weight: 400;">Before developing and implementing a PII policy, you will want to take some time to prepare. Knowing the data you hold, the processes used, the states of data, and understanding the regulatory requirements will help you develop the best policy for your business.</span></p>
<p>&nbsp;</p>
<h3><b>Data Mapping</b></h3>
<p><span style="font-weight: 400;">Some data protection regulations, namely the GDPR, call for your business to employ a data map. Thankfully, if you comply with the law, you will already have a developed data map. </span></p>
<p><span style="font-weight: 400;">The data map will significantly help in developing your PII policy. Essentially, a data map, as the name suggests, is a map of all the personal data on your information system. It tracks the journey data takes across the information systems from collection to deletion. </span><span style="font-weight: 400;">We have a wealth of information about data mapping on our blog, which you can </span><a href="https://blog.rsisecurity.com/your-personal-data-inventory-template/"><span style="font-weight: 400;">check out here</span></a><span style="font-weight: 400;">. </span></p>
<p><span style="font-weight: 400;">But let’s briefly go over the basics of data mapping, later we will see how this will help develop a PII policy.</span></p>
<p><span style="font-weight: 400;">A data map is relatively simple to conduct; here is a quick step guide to data mapping:</span></p>
<ol>
<li style="font-weight: 400;" aria-level="1"><b>Taking Inventory</b><span style="font-weight: 400;">: assess the kind of PII you are processing and see where it is stored. </span>
<ol>
<li style="font-weight: 400;" aria-level="2"><i><span style="font-weight: 400;">Understand its format</span></i><span style="font-weight: 400;">: on hard drives, in the cloud, on a piece of paper? </span></li>
</ol>
</li>
<li style="font-weight: 400;" aria-level="1"><b>Source</b><span style="font-weight: 400;">: where is the personal data being collected? Is it coming from a website portal? A call center?</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Process</b><span style="font-weight: 400;">: How is the data being used? Is it for sales purposes? Is the organization offering services that require it? Who is allowed access?</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Destination</b><span style="font-weight: 400;">: where does the data end up? Is the process streamlined? The destination element is different from inventory because the inventory is just to get you started. The destination will end up forming part of the map.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Destruction</b><span style="font-weight: 400;">: How is the data being destroyed? Is it being disposed of properly? Does it have a defined life cycle? What happens to the data of inactive users?</span></li>
</ol>
<p><span style="font-weight: 400;">Once you have answered these questions, you can begin to build the data map. The completed plan will then help in developing a policy. With it, you have a visual aid and a bird’s eye view of who has access. </span></p>
<p><span style="font-weight: 400;">The data map is a significant part of the PII policy; you only want authorized personnel to have access and control.</span></p>
<p><img class="alignnone wp-image-9298" src="https://blog.rsisecurity.com/wp-content/uploads/2021/03/computer-4-300x147.jpg" alt="Best Threat Detection and Response Solutions" width="727" height="356" srcset="https://blog.rsisecurity.com/wp-content/uploads/2021/03/computer-4-300x147.jpg 300w, https://blog.rsisecurity.com/wp-content/uploads/2021/03/computer-4-768x377.jpg 768w, https://blog.rsisecurity.com/wp-content/uploads/2021/03/computer-4-1024x503.jpg 1024w, https://blog.rsisecurity.com/wp-content/uploads/2021/03/computer-4-1170x574.jpg 1170w, https://blog.rsisecurity.com/wp-content/uploads/2021/03/computer-4-585x287.jpg 585w, https://blog.rsisecurity.com/wp-content/uploads/2021/03/computer-4.jpg 1273w" sizes="(max-width: 727px) 100vw, 727px" /></p>
<h3><b>States of Data</b></h3>
<p><span style="font-weight: 400;">The “states of data” is the next thing you will need to consider when creating a PII policy. Data can be in three different “states”:</span></p>
<ul>
<li style="list-style-type: none;">
<ul>
<li style="font-weight: 400;" aria-level="1"><b>Data in use</b><span style="font-weight: 400;">: this is any personal data currently being processed, providing a service, or facilitating an employee’s job function.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Data at rest<span style="font-weight: 400;">: refers to any data stored at the end-points of an information system.</span></b></li>
<li style="font-weight: 400;" aria-level="1"><b>Data in motion<span style="font-weight: 400;">: this is any data currently in transit, either over internal or external networks.</span></b></li>
</ul>
</li>
</ul>
<p><span style="font-weight: 400;">The three different states of data will play a role in shaping the PII policy. Each segment state will have additional personnel and business partners interacting with them. Understanding the data states will also allow the organization to apply the appropriate data protection measures.</span></p>
<p>&nbsp;</p>
<h3><b>Regulatory Requirements</b></h3>
<p><span style="font-weight: 400;">Your industry might have specific regulations that you will need to factor in when developing a PII policy. Standard regulations are mentioned in this article, such as the </span><a href="https://www.rsisecurity.com/compliance-advisory-services/gdpr/"><span style="font-weight: 400;">General Data Protection Regulation (GDPR)</span></a><span style="font-weight: 400;"> and the</span><a href="https://blog.rsisecurity.com/ccpa-compliance-what-you-need-to-know/"><span style="font-weight: 400;"> California Consumer Privacy Act (CCPA),</span></a><span style="font-weight: 400;"> either or both of which are likely to apply. </span><span style="font-weight: 400;">However, there are specific laws that pertain to specific industries. For example, if you work in the healthcare industry, you will need to include HIPAA and HITECH in your policy.</span></p>
<p><span style="font-weight: 400;">Finally, employee data is still PII. And even though consumers are at the forefront of data protection discussion, the critical infrastructure industry still requires PII protection. </span></p>
<p><span style="font-weight: 400;">Suppose a business that is part of the bulk energy supply (BES) infrastructure has a data leak, and employee information is leaked. This leak poses a threat to the individual’s privacy and could also be used to attack the energy infrastructure provider. The fallout could have catastrophic effects on thousands of lives. </span></p>
<p>&nbsp;</p>
<h3><b>Technical Safeguards</b></h3>
<p><span style="font-weight: 400;">The final piece of the puzzle is assessing what technical safeguards will need to be employed. This factor is vital to the policy because some personnel in the organization will not be technically capable.</span></p>
<p><span style="font-weight: 400;">This means that whatever safeguard you use, the staff will need to understand how to use it properly. For example, if you choose to install and use a PII scanner, anyone connected to the information system will need to train in PII scanning. </span></p>
<p><span style="font-weight: 400;">The same goes for all other safeguards, some of which may be:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Password management tools</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Accounts and user policy tools</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Network security and connectivity software</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Cloud storage security</span></li>
</ul>
<p>&nbsp;</p>
<h2><b>PII Policy, The Recipe</b></h2>
<p><span style="font-weight: 400;">Continuing to use the cooking analogy, if the preparations were the ingredients, now it’s time to start cooking. The policy is the recipe that the organization will need to follow to make a perfect privacy protection meal. </span><span style="font-weight: 400;">Essentially, these are the rules that the security management will have to implement and that staff will have to address.</span></p>
<p>&nbsp;</p>
<h3><b>Access Controls</b></h3>
<p><span style="font-weight: 400;">The first part of the policy should discuss access controls. Access controls are the technical safeguards implemented on the information system that restricts access to authorized users. </span><span style="font-weight: 400;">When it comes to PII, you will need to restrict access on a job function basis. Because the policy governs the internal mechanisms, some will need to access personal data to complete their job function.</span></p>
<p><span style="font-weight: 400;">If you use the “data states” as a basis of the policy, it will create access controls that are much more manageable; let’s explore. </span></p>
<ul>
<li style="list-style-type: none;">
<ul>
<li style="font-weight: 400;" aria-level="1"><b>Data in rest</b><span style="font-weight: 400;">: data in rest is generally of little use to any organization members actively engaged with customers. The data is static in a storage system; for this reason, it might make sense only to give access controls to the security team or the organization’s data custodians. It will be their job to ensure the secure execution of personal data to genuine users.  </span></li>
<li style="font-weight: 400;" aria-level="1"><b>Data in use<span style="font-weight: 400;">: this data state is a bit trickier to control. It might be flying through various information systems on a busy day, accessed by both the producers (customer) and data processors. The information system must have an active SIEM tool to track the data’s movement and alert the organization if abnormal patterns are detected. As part of the policy, the members who require access for their job function should be the only ones who have access to “data in use,” and they will need training in SIEM detection.</span></b></li>
<li style="font-weight: 400;" aria-level="1"><b>Data in motion<span style="font-weight: 400;">: this state is another pretty straightforward one. Simply put, it’s for the network guys. “Access” is a strange word to use here because you don’t precisely access data in motion. But there are controls in place that govern movement, where network security specialists will have to take over.</span></b></li>
</ul>
</li>
</ul>
<p><span style="font-weight: 400;">Now that you have decided who gets access to what, it&#8217;s time to implement the how. </span></p>
<p>&nbsp;</p>
<h3><b>Establish Rules Of Access</b><span style="font-weight: 400;"> </span></h3>
<p><span style="font-weight: 400;">The rules of access are how PII can be used and processed within the organization. Setting up access controls shows who can access the data, but you must also develop a policy on how it should be processed. </span></p>
<p><span style="font-weight: 400;">Some examples of rules within the policy may be:</span></p>
<ul>
<li style="list-style-type: none;">
<ul>
<li style="font-weight: 400;" aria-level="1"><b>Time locked access</b><span style="font-weight: 400;">: office hours are generally between 9-5 for most companies. It will make sense to enact a policy that allows authorized employees to access personal data during office hours. This rule will not only make it easier to detect possible breaches (if data access occurs outside office hours), but it will also limit access during remote work. As it encourages job completion, if working from home, to occur during standard office hours. </span></li>
<li style="font-weight: 400;" aria-level="1"><b>Password management policy</b><span style="font-weight: 400;">: all authorized accounts will need to follow a password management policy. An approach like this means passwords that access sensitive data will need to have a lifecycle, i.e., replaced every 30 to 90 days. Other rules go into password management, which you can </span><a href="https://blog.rsisecurity.com/enterprise-password-management-best-practices/"><span style="font-weight: 400;">read about here</span></a><span style="font-weight: 400;">.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Transferring personal data<span style="font-weight: 400;">: network security plays a significant role in personal data. Many organizations will have some network system, whether local or on the cloud, that manages their data. The PII policy should dictate the rules of transfer. What kind of networks it safe to send it over, and what platforms are allowed (i.e., email or otherwise).</span></b></li>
<li style="font-weight: 400;" aria-level="1"><b>Third-party Networks<span style="font-weight: 400;">: it is likely, given the global business environment, that your business has an extensive third-party network. Within that network of third parties, personal data may be shared. It is paramount that you bring all business partners and service providers under one risk management umbrella. This requirement is slowly making its way into regulations. It will soon become a legal requirement for organizations, so it is best to be one step ahead and discuss PII management with your network today.</span></b></li>
</ul>
</li>
</ul>
<p><span style="font-weight: 400;">The rules should extend to fit the size and culture of the organization. You should also consider what the needs of your organization are and mold them to the policy.</span></p>
<p>&nbsp;</p>
<h2><b>Conclusion</b></h2>
<p><span style="font-weight: 400;">Don’t let negative public perception hurt your business or reputation. Show your customers that their data and their privacy are your top priority. </span><span style="font-weight: 400;">With a personally identifiable information policy, you can ensure that everyone in your organization instills a sense of privacy by design and default. </span></p>
<p><span style="font-weight: 400;">Let us help you design the best </span><span style="font-weight: 400;">personally identifiable information policy</span><span style="font-weight: 400;"> for your business. RSI Security is the nation’s premier cybersecurity provider, and with the experience under our belt, you can ensure that we can meet your security needs. </span><span style="font-weight: 400;">Get in contact and schedule a consultation today.</span></p>
<p>&nbsp;</p>
<div class="su-button-center"><a href="https://www.rsisecurity.com/request-demo/" class="su-button su-button-style-flat" style="color:#FFFFFF;background-color:#2D89EF;border-color:#246ec0;border-radius:13px;-moz-border-radius:13px;-webkit-border-radius:13px" target="_blank" rel="noopener noreferrer"><span style="color:#FFFFFF;padding:0px 32px;font-size:23px;line-height:46px;border-color:#6cadf4;border-radius:13px;-moz-border-radius:13px;-webkit-border-radius:13px;text-shadow:none;-moz-text-shadow:none;-webkit-text-shadow:none"> Speak with a Cybersecurity expert today!</span></a></div>
<p>&nbsp;</p>
<p>The post <a rel="nofollow" href="https://blog.rsisecurity.com/how-to-make-a-personally-identifiable-information-policy/">How To Make A Personally Identifiable Information Policy</a> appeared first on <a rel="nofollow" href="https://blog.rsisecurity.com">RSI Security</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://blog.rsisecurity.com/how-to-make-a-personally-identifiable-information-policy/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>The GDPR Special Categories of Personal Data</title>
		<link>https://blog.rsisecurity.com/the-gdpr-special-categories-of-personal-data/</link>
		<comments>https://blog.rsisecurity.com/the-gdpr-special-categories-of-personal-data/#respond</comments>
		<pubDate>Wed, 17 Mar 2021 08:18:40 +0000</pubDate>
		<dc:creator><![CDATA[RSI Security]]></dc:creator>
				<category><![CDATA[GDPR]]></category>

		<guid isPermaLink="false">https://blog.rsisecurity.com/?p=9371</guid>
		<description><![CDATA[<p>What separates the General Data Protection Regulation (GDPR) from its predecessors is its ability to recognize how the data landscape has changed over the past two decades. One way the regulation&#8230;</p>
<p>The post <a rel="nofollow" href="https://blog.rsisecurity.com/the-gdpr-special-categories-of-personal-data/">The GDPR Special Categories of Personal Data</a> appeared first on <a rel="nofollow" href="https://blog.rsisecurity.com">RSI Security</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><span style="font-weight: 400;">What separates the </span><a href="https://www.rsisecurity.com/compliance-advisory-services/gdpr/"><span style="font-weight: 400;">General Data Protection Regulation (GDPR) </span></a><span style="font-weight: 400;">from its predecessors is its ability to recognize how the data landscape has changed over the past two decades. </span><span style="font-weight: 400;">One way the regulation has accomplished that is by combining privacy protection with modern-day data processing techniques. And it has done so primarily through its recognition of </span><span style="font-weight: 400;">special categories of data</span><span style="font-weight: 400;">. </span><span style="font-weight: 400;">The GDPR  Special Categories of Data</span><span style="font-weight: 400;"> is a subsection of personal data that regulators have deemed as extra sensitive. </span><span style="font-weight: 400;">This subsection of personal data requires additional security measures that ensure the privacy of the subject being processed.</span></p>
<p><span id="more-9371"></span></p>
<p><span style="font-weight: 400;">This article will discuss that data and how you as a processor can best protect it. </span></p>
<p>&nbsp;</p>
<h2><b>Special Categories of Personal Data</b></h2>
<p><span style="font-weight: 400;">What makes data special? According to the GDPR, special category data (SD) is personal data that, if leaked or lost, could have serious privacy concerns for the data subject. In the next section, we will explore the difference between regular personal data and special categories. </span></p>
<p><span style="font-weight: 400;">The kind of data that the GDPR considers “special category” are listed below:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Racial or ethnic origin</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Political opinions</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Religious or philosophical beliefs</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Trade union membership</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Biometric or genetic data</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Health data</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Data concerning sexual orientation or sexual life</span></li>
</ul>
<p><span style="font-weight: 400;">The privacy risks surrounding special categories of data go beyond identity fraud. Using the data mentioned above to identify a data subject could have adverse effects and could cause:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Reputational damage or embarrassment</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Discrimination or personal harm</span></li>
</ul>
<p><span style="font-weight: 400;">For this reason, the regulation distinguishes special categories in an article of its own and outlines restricted means of processing, which we will discuss later. </span></p>
<p>&nbsp;</p>
<h3><b>Personal Data vs. Special Category Data</b></h3>
<p><span style="font-weight: 400;">What is something that you own but everyone else uses?</span></p>
<p><i><span style="font-weight: 400;">Your name.</span></i><span style="font-weight: 400;"> </span></p>
<p><span style="font-weight: 400;">Your name is a form of </span><a href="https://blog.rsisecurity.com/what-is-personally-identifiable-information-pii/"><span style="font-weight: 400;">Personally Identifiable Information (PII)</span></a><span style="font-weight: 400;"> but does not fall under special categories. Personal data and special category data are both a form of PII. The difference is that the regulation puts more restrictions on the processing of special categories. </span></p>
<p><span style="font-weight: 400;">As we mentioned prior, exposure to SD can significantly impact the data subject’s rights and freedoms. However, this is not the case for personal data; finding out someone’s name is unlikely to have a massive impact on their rights and freedoms.</span></p>
<p><span style="font-weight: 400;">We should clarify that the “rights and freedoms” do not refer to the ones mentioned in the GDPR (for example, the Right to be forgotten). But instead, refer to the general rights and freedoms afforded to all EU citizens; this is what makes the special categories data “special.” </span></p>
<p><span style="font-weight: 400;">Some examples of a general right would be: </span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Freedom of thought, conscience, and religion</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Freedom of expression</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">The right to bodily integrity</span></li>
</ul>
<p><span style="font-weight: 400;">The idea being that processing this kind of data could interfere with these types of rights and freedoms. Hence, organizations need to take extra care when dealing with this type of data.</span></p>
<p><span style="font-weight: 400;">While other personal data types are also considered sensitive, the loss would not raise the same issues as special categories would.</span></p>
<p><span style="font-weight: 400;">You will still need to apply the same safeguards to both types of data. The reason being that in a data leak, aggregated personal data can give attackers access to your customers’ digital livelihood, exposing them to all manner of identity fraud and financial loss. </span></p>
<p><span style="font-weight: 400;">Lastly, unlike personal data, you cannot process special categories under the legitimate interest category, and lawful processing is a more stringent requirement. This would only apply to businesses anyway, and government bodies have slightly different rules, which we will explore next.</span></p>
<p>&nbsp;</p>
<a href="https://www.rsisecurity.com/request-demo/" class="su-button su-button-style-flat" style="color:#FFFFFF;background-color:#2D89EF;border-color:#246ec0;border-radius:13px;-moz-border-radius:13px;-webkit-border-radius:13px" target="_blank" rel="noopener noreferrer"><span style="color:#FFFFFF;padding:0px 32px;font-size:23px;line-height:46px;border-color:#6cadf4;border-radius:13px;-moz-border-radius:13px;-webkit-border-radius:13px;text-shadow:none;-moz-text-shadow:none;-webkit-text-shadow:none"> Request a Free Consultation</span></a>
<p>&nbsp;</p>
<h2><b>When Can You Process Special Category Data?</b></h2>
<p><span style="font-weight: 400;">There are rare cases when a business can process this category of special data. The lawful processing of special category data falls under article 9 of the regulation. </span></p>
<p><span style="font-weight: 400;">Within the article, the processing of this kind of data is strictly prohibited unless you can satisfy the article’s conditions. There are complicated legalese in the article, so we will simplify it, but you can </span><a href="https://gdpr-info.eu/art-9-gdpr/"><span style="font-weight: 400;">find it here</span></a><span style="font-weight: 400;"> if you wish to check out article 9 in its entirety.</span></p>
<p><span style="font-weight: 400;">If you are a business, you can only process this kind of data if you have express consent from the data subject. There is no legitimate business interest that will allow you to process special categories lawfully. </span></p>
<p><span style="font-weight: 400;">And it is essential to mention that even with express consent from the data subject, member states can still explicitly prohibit the processing at their discretion. Member states are just EU countries included within the regulation. </span></p>
<p><span style="font-weight: 400;">This means that even though the French government allows French data subjects to consent, the German government might not. Please keep in mind that this is just an example, so please check with local law enforcement whether this is possible or not, and don’t hesitate to contact an </span><a href="https://www.rsisecurity.com/compliance-advisory-services/gdpr/"><span style="font-weight: 400;">expert for compliance </span></a><span style="font-weight: 400;">advice. </span></p>
<p><span style="font-weight: 400;">However, there are cases where processing is still lawful, although consent is not received. In brief, the exceptions are</span><i><span style="font-weight: 400;">:</span></i><span style="font-weight: 400;"> </span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Obligations in the field of employment </span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Protect the vital interest of the data subject, and the data subject is incapable of giving consent.</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Foundation or non-profit with a religious, philosophical, or trade union membership aim, with a legitimate interest (keeping in mind that appropriate safeguards must still be employed)</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Personal data that is manifestly made public by the data subject</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Courts acting in their judicial capacity</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Reasons of substantial public interest</span></li>
</ul>
<p><span style="font-weight: 400;">It is unlikely that business will satisfy any of these reasons. In the cases that express consent is given, and whether or not you have other lawful grounds to process that data, the protection of data falling under the designation of special categories is important.</span></p>
<p><img class="alignnone wp-image-9252" src="https://blog.rsisecurity.com/wp-content/uploads/2021/03/laptop-300x137.jpg" alt="" width="762" height="348" srcset="https://blog.rsisecurity.com/wp-content/uploads/2021/03/laptop-300x137.jpg 300w, https://blog.rsisecurity.com/wp-content/uploads/2021/03/laptop.jpg 768w, https://blog.rsisecurity.com/wp-content/uploads/2021/03/laptop-585x267.jpg 585w" sizes="(max-width: 762px) 100vw, 762px" /></p>
<h3><b>Protecting Special Category Data</b></h3>
<p><span style="font-weight: 400;">Protecting special categories does not differ that much if you are already employing high-standard security methods. But some precautions must be highlighted when dealing with processing. </span></p>
<p><span style="font-weight: 400;">The GDPR outlines two main safeguarding techniques that will also result in compliance if implemented correctly:</span></p>
<ol>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Organizational Safeguards</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Techncial Safregaruds</span></li>
</ol>
<p><span style="font-weight: 400;">However, there is no specific mention of how the organization should implement these safeguards. Neither is there any mention of what the organization should be using (in terms of software solutions or method).</span></p>
<p><span style="font-weight: 400;">But the cyber industry has worked closely with regulators. It is consistently developing new frameworks and agreeing on best practice methods, which we will take you through in the coming sections.</span></p>
<p>&nbsp;</p>
<h2><b>Organizational Safeguards</b></h2>
<p><span style="font-weight: 400;">When it comes to protecting special categories of data, the organizational safeguards will form most of the strategy. Managerial safeguards are the techniques of data protection that are on a company-wide scale. </span></p>
<p><span style="font-weight: 400;">It doesn’t look at the information system in isolation but rather as a living system that involves many moving parts.</span></p>
<p><span style="font-weight: 400;">You will often see policies as the main driver behind organizational safeguarding implementation.</span></p>
<p>&nbsp;</p>
<h3><b>Risk-Based Approach To Special Category Data</b></h3>
<p><span style="font-weight: 400;">The GDPR stresses the importance of taking a risk-based approach to security. Essentially, organizational security becomes a good management practice over applying the latest software solutions as a catch-all to your security needs.</span></p>
<p><span style="font-weight: 400;">This is especially true regarding special category processing. Human error is still the main culprit of data breaches. Applying appropriate technical safeguards is one thing, but if a staff member ends up losing the data in an unencrypted storage device, the whole exercise is pointless. </span></p>
<p><span style="font-weight: 400;">So when we refer to a “risk-based approach,” we mean realizing all the potential ways the information system could fail for reasons other than technical cyberattack (i.e., breaches bypassing encryption). </span></p>
<p><span style="font-weight: 400;">What does it look like to have a risk-based approach to select categories of data protection?</span></p>
<p><span style="font-weight: 400;">Generally, you will take a risk-based approach through enacting an organizational security policy. </span></p>
<p><span style="font-weight: 400;">Here are some examples of organizational policies regarding the processing of special category data you want to employ.</span></p>
<p>&nbsp;</p>
<p><b>Access Controls</b><span style="font-weight: 400;">: you should limit who has control over the special categories of data. Access should only be authorized to personnel who require it for their job function. Another form of access control can come from a password management policy. All staff who have authorized permission will need to adhere to the password management policy as an extra security layer. Employing these additional steps will show good faith with the regulators and keeping you on the right side of the law.</span></p>
<p>&nbsp;</p>
<p><b>Privacy Risk Assessments</b><span style="font-weight: 400;">: All staff members involved in processing special categories will need to be aware of the privacy risks associated with processing this kind of data. When forming the risk assessment, you should involve as many personnel as possible and keep them up to date on all policies regarding:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">Threat analysis</span></li>
<li style="font-weight: 400;" aria-level="1"><a href="https://www.rsisecurity.com/threat-vulnerability-management/"><span style="font-weight: 400;">Vulnerability management</span></a></li>
<li style="font-weight: 400;" aria-level="1"><a href="https://www.rsisecurity.com/managed-detection-response/"><span style="font-weight: 400;">Incident response management and planning</span></a></li>
</ul>
<p><span style="font-weight: 400;">Involvement in these business operations will help mitigate privacy risks.</span></p>
<p>&nbsp;</p>
<p><b>When in doubt, framework it out</b><span style="font-weight: 400;">: you don’t need to build a security strategy from the ground up. Take advantage of the many security frameworks that established organizations have worked hard to develop. Many industries already use frameworks like:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><a href="https://www.rsisecurity.com/center-for-internet-security/"><span style="font-weight: 400;">CIS CSC</span></a></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">NIST 800 SP</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">ISO 27001</span></li>
<li style="font-weight: 400;" aria-level="1"><span style="font-weight: 400;">NIST Cybersecurity Framework</span></li>
</ul>
<p><span style="font-weight: 400;">Take some time to examine which one will work best for you, and use it as a road map to security implementation. Many will already cover necessary data protection and more. In short, it will help you achieve privacy by design and default.</span></p>
<p><img class="alignnone wp-image-6220" src="https://blog.rsisecurity.com/wp-content/uploads/2019/12/training-2-300x106.jpeg" alt="Hipaa Training for HR" width="750" height="265" srcset="https://blog.rsisecurity.com/wp-content/uploads/2019/12/training-2-300x106.jpeg 300w, https://blog.rsisecurity.com/wp-content/uploads/2019/12/training-2-768x270.jpeg 768w, https://blog.rsisecurity.com/wp-content/uploads/2019/12/training-2-585x206.jpeg 585w, https://blog.rsisecurity.com/wp-content/uploads/2019/12/training-2.jpeg 898w" sizes="(max-width: 750px) 100vw, 750px" /></p>
<h3><b>Staff Awareness Training</b></h3>
<p><span style="font-weight: 400;">Enacting policy is one thing, but no one following it is an entire challenge in itself. Designing an acceptable security policy will only get you so far. You need to make a concerted effort to ensure all staff is on the same page as you.</span></p>
<p><span style="font-weight: 400;">A</span><a href="https://www.rsisecurity.com/education-awareness/"><span style="font-weight: 400;"> staff awareness training</span></a><span style="font-weight: 400;"> program will do just that. The policies designed through implementing organizational safeguards will guide you in developing a training program. The policies essentially become the training requirements.</span></p>
<p><span style="font-weight: 400;">Coupled with the proper use of technical safeguards (discussed in the next section), you will have a complete staff awareness training program.</span></p>
<p>&nbsp;</p>
<h2><b>Technical Safeguards</b></h2>
<p><span style="font-weight: 400;">The technical safeguarding of special categories of data will involve the use of software solutions. </span></p>
<p><span style="font-weight: 400;">The GDPR does mention the use of technical safeguards, but only one article mentions the direct use, which is encryption. However, other forms of safeguarding go beyond just encrypted or pseudonymization of personal data, which we will explore in this section.</span></p>
<p>&nbsp;</p>
<h3><b>Encryption Methods</b></h3>
<p><span style="font-weight: 400;">The number one technical safeguard is the use of encryption. </span><a href="https://blog.rsisecurity.com/encryption-101/"><span style="font-weight: 400;">Encryption</span></a><span style="font-weight: 400;"> is directly mentioned in the regulation, so you can’t discuss technical safeguards without talking about encryption methods.</span></p>
<p><span style="font-weight: 400;">Some common type of encryption methods that would be appropriate to use in protecting special categories of data are:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><b>PKI infrastructure</b><span style="font-weight: 400;">: critical public infrastructure is a common enterprise encryption solution as it works well for sizeable private information systems. It is adaptable to the number of users, and it is also commonly used on the internet today.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>SHA 256 and Hashing</b><span style="font-weight: 400;">: Hashing is an encryption technique used in password protection. Some blockchains will also use hashing cryptography as a means of security, and it transfers well to data protection. </span></li>
<li style="font-weight: 400;" aria-level="1"><b>Pseudonymization</b><span style="font-weight: 400;">: another technique mentioned directly in the regulation. This process involves removing specific “identifiers” from the data. This way, attackers who do get a hold of the data cannot make a logical assumption about to whom the data belongs.</span></li>
</ul>
<p><span style="font-weight: 400;">The main goal of encryption is to ensure the integrity of the special categories of data. Encryption ensures the “message” or data, in this case, has not been tampered with or altered in any way. It also means that any breach would mean that the data remains secured behind an encryption wall.</span></p>
<p><span style="font-weight: 400;">Ideally, the encryption would stop the breach from happening, but it is best to be extra secure and encrypted the data itself. </span></p>
<p>&nbsp;</p>
<h3><b>Social Proofing</b></h3>
<p><span style="font-weight: 400;">Social proofing is an organizational issue, but the technical aspects also make it a technical safeguard. Essentially, social proofing is ensuring that your personnel doesn’t fall prey to social engineering.</span></p>
<p><span style="font-weight: 400;">This form of safeguarding should be the main focus of the </span><a href="https://blog.rsisecurity.com/the-importance-of-cybersecurity-awareness-training/"><span style="font-weight: 400;">staff awareness training program. </span></a><span style="font-weight: 400;">However, it should not be limited to only social proofing (staff training in proper workstation use and the appropriate handling of sensitive data is vital). </span></p>
<p><span style="font-weight: 400;">Some techniques of social proofing involve:</span></p>
<ul>
<li style="font-weight: 400;" aria-level="1"><b>Spam and phishing awareness</b><span style="font-weight: 400;">: staff should be aware of links and spam emails and how to detect and avoid them.</span></li>
<li style="font-weight: 400;" aria-level="1"><b>Social media phishing</b><span style="font-weight: 400;">: hackers are becoming more sophisticated. They will target staff members and attempt to befriend them to access sensitive parts of the information system.</span></li>
</ul>
<p><span style="font-weight: 400;">The staff must know social proofing techniques when dealing with special categories of data, as the potential privacy risks attributed to this type of data are very high.</span></p>
<p>&nbsp;</p>
<h2><b>Conclusions</b></h2>
<p><span style="font-weight: 400;">You will need to take extra precautions if you are processing special categories of data and ensure that you are legally allowed to process it in the first place. </span><span style="font-weight: 400;">However, the security process of protecting that data does not differ too much from the standard security approach. </span></p>
<p><span style="font-weight: 400;">As long as you are always employing best practice models, you can assure your data subjects that their data protection is your top priority.</span></p>
<p><span style="font-weight: 400;">And if you are looking for the best practice approach to data protection, get in contact with RSI Security today.</span></p>
<p><span style="font-weight: 400;">We can help you reach your GDPR compliance goals. Whether you are processing special categories of personal data or need help developing a compliance strategy, RSI security is here for you. Schedule</span><a href="https://www.rsisecurity.com/compliance-advisory-services/gdpr/"><span style="font-weight: 400;"> a consultation here</span></a><span style="font-weight: 400;">.</span></p>
<p>&nbsp;</p>
<div class="su-button-center"><a href="https://www.rsisecurity.com/request-demo/" class="su-button su-button-style-flat" style="color:#FFFFFF;background-color:#2D89EF;border-color:#246ec0;border-radius:13px;-moz-border-radius:13px;-webkit-border-radius:13px" target="_blank" rel="noopener noreferrer"><span style="color:#FFFFFF;padding:0px 32px;font-size:23px;line-height:46px;border-color:#6cadf4;border-radius:13px;-moz-border-radius:13px;-webkit-border-radius:13px;text-shadow:none;-moz-text-shadow:none;-webkit-text-shadow:none"> Speak with a Cybersecurity expert today!</span></a></div>
<p>&nbsp;</p>
<p>The post <a rel="nofollow" href="https://blog.rsisecurity.com/the-gdpr-special-categories-of-personal-data/">The GDPR Special Categories of Personal Data</a> appeared first on <a rel="nofollow" href="https://blog.rsisecurity.com">RSI Security</a>.</p>
]]></content:encoded>
			<wfw:commentRss>https://blog.rsisecurity.com/the-gdpr-special-categories-of-personal-data/feed/</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
