Tip

How to address HIPAA data encryption security challenges

Healthcare patient data protection has become a major focus point for compliance infractions, and the best strategy for protecting patients' privacy and information is to help healthcare providers implement a defense-in-depth solution, one that often includes some form of encryption.

    Requires Free Membership to View

Pros of full-disk encryption

Everything on the drive (or drives) is encrypted, including temporary files and swap space. All data is protected when the machine goes into hibernation as well.

Encryption of data is enforceable, alleviating decisions on what or what not to encrypt.

Data is indecipherable when the PC is reassigned.

Encryption decryption is transparent.

Most FDE systems offer support for pre-boot authentication, which can add another layer of protection to the method.

Since all data on the drive is encrypted, even if an alternative boot media is used against an encrypted system, the data on the drive is unreadable and therefore useless to unauthorized resources.

Hard tokens, soft tokens, or passwords can be used in most cases for pre-boot authentication that allows access to the system.

Resources can be shared securely, allowing organizational flexibility.

 This tip will briefly look at full disk encryption as a tool for supporting HIPAA privacy and compliance requirements. We'll also highlight how VARs can position their HIPAA-related data encryption security services to leverage opportunities within their customer bases.

Full disk encryption considerations
Full disk encryption presents both benefits and challenges that need to be addressed. One concern with full disk encryption is if the encryption key -- a password, a USB flash drive with the algorithm key, an RSA token-generating device, a fingerprint, or a combination of the above -- is lost or compromised, all the data on the drive, including the OS itself, is unreadable.

When implementing full disk encryption, it is important to maintain a good program for key management, including policies and procedures for access control, key creation, key revocation and key destruction.

Healthcare IS managers will need to work together with security solution VARs to understand what patient data needs to be encrypted and at what point in the process it needs to be encrypted, then identify which method and approach -- such as encryption in motion and encryption at rest -- best fits the needs of the organization. The following are just a few of the considerations that VARs will need to address for their service offering:

  • Is the client looking for a total solution (desktop, portable, server, storage etc.)?
  • Will there be any points requiring monitoring (active/passive) for policy infringement?
  • How will external parties (vendors, suppliers, remote offices) be impacted?
  • Does the offering meet corporate compliance mandates?
  • What data needs to be encrypted?
  • How will patients access personal information that has been encrypted?
  • Who will be responsible for managing the encrypted data and encryption keys?

Cons of full disk encryption

FDE programs can cause performance issues, including read and write delays.

When FDE systems encrypt on a sector-by-sector basis, disk fragmentation can cause significant problems.

Encryption key management has to be considered. If a key for recovery of data is stored offline, end-user support processes for recovery of data need to be put in place.

Password management processes have to be defined and put into place. If a user loses his or her password, that person has no access to their data.

Once access is granted, full access to all data is achieved, requiring strong password controls.

If the encryption software becomes corrupted, or otherwise fails and can't be recovered with the unique recovery key, the data on the drives cannot be recovered.

 VARs that provide full disk encryption solutions will need to position an end-to-end security approach, and demonstrate knowledge and expertise with a variety of full disk encryption technologies. Service opportunities may lie in managing the enterprise encryption deployment program, ranging from laptops and smart devices to archived data storage.

Antivirus and encryption challenges
While there is some concern about the integration aspects of full disk encryption and the use of antivirus tools, the benefits outweigh those fears. Antivirus tools represent but one of the components that make up an end-to-end security solution for organizations.

One of the encryption integration challenges is that the AV tools need to be able to decrypt the encrypted file, scan the contents and re-encrypt the file without causing file integrity issues. Not all AV products have built-in capability to decrypt and re-encrypt the file it scans. If an existing antivirus tool does not provide for seamless integration, the potential solution is to replace the current antivirus, and this could be costly depending on the size of the organization. There are a number of products and vendors on the market which provide an integrated approach towards endpoint security.

Case in point: Full disk encryption does nothing to improve data leak prevention (DLP) if a user has an encrypted hard drive, and then boots, supplies his or her PIN and then proceeds to copy sensitive files into email or onto USB storage in unencrypted form. Products such as NextLabs Enterprise DLP from NextLabs Inc. and CA DLP from CA Inc. (who acquired Orchestria Corp.) provide device-level policy management and content inspection capabilities that work well with enterprise AV solutions. .

How solution providers can help with HIPAA, data encryption
For healthcare security managers and security solution providers, what it all boils down to is ensuring that the patients' privacy and information is secure. While there are full disk encryption benefits, many have concerns about implementing this type of data protection. Primary reasons for not encrypting sensitive or confidential information are often related to system performance, complexity and cost.

Security solution VARs must work closely with their healthcare customers to better understand their challenges, and be able to respond quickly by addressing the following:

 

  • Asset identification: Work with clients to determine the importance of data and divide it into categories which include very critical (active records that contain sensitive information about the diagnosis and treatment of serious diseases), inactive (historical records) and duplicate data (redundant information located in multiple locations). Data should be classified from the highest to lowest priority; duplicate data should be the lowest. Also, identify what data will require specific types of backup and replication support to mitigate data loss during disaster recovery operations. Inactive data, data that is no longer used, needed or required, should be retained if there are documented compliance reasons. All duplicate data should be deleted or destroyed.

    While there is no downside to deploying FDE in support of the data identification activities, consideration should be exercised with regards to the costs for deploying FDE on redundant and obsolete data information, as well as to being able to retrieve and read archived (long term) data.

  •  

  • Data Access: Particular attention should also be made towards how end users will be able to retrieve and access encrypted information as deemed applicable by laws that mandate patients have the right to access their personal medical records. The end users should be able to access their information whenever necessary and at will. This information consists of active medical records such as SSN, policy numbers, medications, test results, ongoing treatments, and other confidential health information; and archived medical history records such as past treatments, past medications and previous health conditions. This information should also be available between healthcare providers during disaster events to prevent or lessen a serious threat and to meet compliance requests and other healthcare regulations.

     

  • Audits: VARs should either expand their services offerings to include information auditing services or partner with organizations that do. With HIPAA regulations gaining more ground and with the increasing number of infractions resulting in fines, solution providers should implement data and information auditing services to monitor appropriate data retention policies and access controls.

    Audits should also include a periodic review of the full disk encryption key management program (key issuance, key tracking, key revocation, procedures for replacing lost keys, and key destruction) for effectiveness and compliance. Some "red flags" would include personnel with unauthorized access to records and patient data, unusual interest in a particular system, excessive access to patient data and information, frequently "misplaced" patient records, lost patient records, unusual requests for access to patient records, and lack of audit trail for activity against a patient record. Whenever a key management program undergoes any form of update, any and all information that has been encrypted should be recovered, reviewed for applicability and re-encrypted with new keys to ensure the integrity of end-user patient data and privacy.

Conclusion
With recent fines for HIPAA violations making headline news, and not to mention, celebrity hospital records being sold on the Internet, healthcare providers are taking a more proactive approach to protecting patient information. What they are looking for from their solution providers are:

  • Understanding and awareness of the changing regulatory mandate landscape
  • Ability to provide an end–to–end solution, not just piece-meal bits
  • Trusted advisor guidance and support assistance for identifying the right technology solution and peer-to-peer involvement with implementation
  • Data protection solutions that will support technology upgrades and refreshes to align with the business strategies
  • A long term partnership to champion their initiatives for implementing electronic medical records, or EMR, technology with the most appropriate data protection integration for encryption and AV.

    As the healthcare industry moves to more advanced means for capturing and managing patient information, so too must the VARs (resellers and consultants) embrace the need for understanding the limitations of those technologies and be able to stay one step ahead of their clients to continually look for opportunities to anticipate their future needs.

    Send comments on this technical tip editor@searchsecuritychannel.com.

This was first published in March 2010

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

Disclaimer: Our Tips Exchange is a forum for you to share technical advice and expertise with your peers and to learn from other enterprise IT professionals. TechTarget provides the infrastructure to facilitate this sharing of information. However, we cannot guarantee the accuracy or validity of the material submitted. You agree that your use of the Ask The Expert services and your reliance on any questions, answers, information or other materials received through this Web site is at your own risk.