meaningful use security risk analysis passing your audit

25
Meaningful Use Security Risk Analysis Passing Your Audit

Upload: dominic-mcgee

Post on 13-Jan-2016

220 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Meaningful Use Security Risk Analysis Passing Your Audit

Meaningful Use Security Risk AnalysisPassing Your Audit

Page 2: Meaningful Use Security Risk Analysis Passing Your Audit

• Introduction

• Meaningful Use Requirement – Protect Electronic Health Information

• Security Risk Analysis

• Meaningful Use Audits

• Questions

Agenda

Page 3: Meaningful Use Security Risk Analysis Passing Your Audit

Introduction

Adam Kehler, CISSP, CEH

Privacy and Security Specialist

PA REACH East & West

[email protected]

Page 4: Meaningful Use Security Risk Analysis Passing Your Audit

Meaningful Use

1. In Stage 1, eligible professionals must conduct or review a security risk analysis in accordance with the requirements under 45 CFR 164.308(a)(1) and implement security updates as necessary and correct identified security deficiencies as part of its risk management process.

2. In Stage 2, eligible professionals need to meet the same security risk analysis requirements as Stage 1, but must also address the encryption/security of data at rest.

• Note: a security risk analysis needs to be reviewed and updated for each reporting period for Stage 1 and Stage 2.

Page 5: Meaningful Use Security Risk Analysis Passing Your Audit

HIPAA Security Rule

“Under the HIPAA Security Rule, you are required to conduct an accurate and thorough analysis of the potential risks and vulnerabilities to the confidentiality, integrity, and availability of ePHI. Once you have completed the risk analysis, you must take any additional “reasonable and appropriate” steps to reduce identified risks to reasonable and appropriate levels. (45 CFR 164.308(a)(1)(ii))”

Page 6: Meaningful Use Security Risk Analysis Passing Your Audit

Myths & Facts

1. ALL providers must conduct a risk analysis; no exceptions.

2. Simply installing a certified EHR does not mean you’ve met the security requirements of the risk analysis

3. Your EHR vendor is not responsible for your compliance with the HIPAA Security Rule or risk analysis

4. You do not have to outsource your analysis (though you may wish to)

5. You must update your risk analysis periodically or as changes occur.

Page 7: Meaningful Use Security Risk Analysis Passing Your Audit

What is a Security Risk Analysis?

Page 8: Meaningful Use Security Risk Analysis Passing Your Audit

What is a Security Risk Analysis?

• There is no single method or “best practice” that guarantees compliance

• But most risk analysis and risk management processes have steps in common.

• OCR and NIST have provided guidance and recommendations.

Page 9: Meaningful Use Security Risk Analysis Passing Your Audit

Common Steps

1. Define the scope

2. Data Collection

3. Identify and document potential threats to ePHI

4. Assess Current Security Measures

5. Determine the Likelihood of Threat Occurrence

6. Determine the Potential Impact of Threat Occurrence

7. Determine the Level of Risk

8. Finalize Documentation

9. Continuous Risk Analysis

Page 10: Meaningful Use Security Risk Analysis Passing Your Audit

Example

Risk = Threat x Vulnerability x Impact

Page 11: Meaningful Use Security Risk Analysis Passing Your Audit

Why Not Just a Checklist

1. Every organization is different.

2. What is reasonable for one situation or organization is not reasonable for another.

3. Technology and threats are always changing.

So instead, it is simply required to identify your risks and do what is reasonable and appropriate to address them.

Page 12: Meaningful Use Security Risk Analysis Passing Your Audit

Meaningful Use Audits

Page 13: Meaningful Use Security Risk Analysis Passing Your Audit

Meaningful Use

1. In Stage 1, eligible professionals must conduct or review a security risk analysis in accordance with the requirements under 45 CFR 164.308(a)(1) and implement security updates as necessary and correct identified security deficiencies as part of its risk management process.

2. In Stage 2, eligible professionals need to meet the same security risk analysis requirements as Stage 1, but must also address the encryption/security of data at rest.

• Note: a security risk analysis needs to be reviewed and updated for each reporting period for Stage 1 and Stage 2.

Page 14: Meaningful Use Security Risk Analysis Passing Your Audit

Medicare Audits

• Conducted by Figliozzi and Co. for Medicare

• Individual states arrange for Medicaid audits

• Can be a pre- or post-payment audit

• A right to appeal an audit determination is available

• Failure of an audit requires that incentive monies be returned

• Approximately 5% of MU participants will be audited

Page 15: Meaningful Use Security Risk Analysis Passing Your Audit

ValidationSecurity risk analysis of the certified EHR technology was performed prior to the end of the reporting period.

Suggested DocumentationReport that documents the procedures performed during the analysis and the results. Report should be dated prior to the end of the reporting period and should include evidence to support that it was generated for that provider’s system (e.g., identified by National Provider Identifier (NPI), CMS Certification Number (CCN), provider name, practice name, etc.).

MU SRA Audit Guidance - Medicare

Page 16: Meaningful Use Security Risk Analysis Passing Your Audit

Medicaid Audits – West Virginia

• Receive a letter from the WV Dept. of HHS

• Will start as a desk audit; could follow-up with onsite audit if necessary

• Letter contains a questionnaire to be filled out

• Return questionnaire and supporting documentation via enclosed CD or flash drive (encrypt!)

Page 17: Meaningful Use Security Risk Analysis Passing Your Audit

Medicaid Audits

Page 18: Meaningful Use Security Risk Analysis Passing Your Audit
Page 19: Meaningful Use Security Risk Analysis Passing Your Audit

Medicaid Audits – Information Request

Page 20: Meaningful Use Security Risk Analysis Passing Your Audit

Ensure that the Security Risk Analysis is a bona fide Security Risk Analysis of the Certified EHR Technology and not a narrative description of security controls in use at the organization nor a security gap analysis.

“The documentation provided for this measure is … not an actual security risk analysis specific to the CEHRT system. Acceptable documentation would be proof that a security risk analysis was performed prior to the end of the reporting period (i.e. a report that outlines procedures performed and the results of an analysis).”

Audit Issues

Page 21: Meaningful Use Security Risk Analysis Passing Your Audit

“The documentation provided is not a valid security risk analysis. Acceptable documentation would be proof that a security risk analysis of the certified EHR technology was performed prior to the end of the reporting period (i.e. report which documents the procedures performed during the analysis and the results of the analysis. If material deficiencies were identified, mitigation of these deficiencies must be included).”

Audit Issues

Page 22: Meaningful Use Security Risk Analysis Passing Your Audit

Ensure that the SRA report documents the correct date of the SRA and does not include extraneous dates.

“The supplied security risk assessment was performed as of XX/XX/20XX. However, per CMS Regulations, a new review would have to occur for each subsequent reporting period. Therefore, we will need the security risk assessment that was completed for the 20XX attestation (i.e. report which documents the procedures performed during the analysis, the noted threats/vulnerabilities, and the results of the analysis).”

Audit Issues

Page 23: Meaningful Use Security Risk Analysis Passing Your Audit

Ensure that remediation plans are complete.

“The …Remediation [Plan] of the risk analysis supplied was not completed.”

“A security risk management gap analysis was supplied. However, the results of the analysis, risks identified, and remediation plan to address the risks are also needed.”

Audit Issues

Page 24: Meaningful Use Security Risk Analysis Passing Your Audit

• Ensure what you are doing constitutes a “Security Risk Analysis” and is not just a checklist or description of security controls

• Document the steps you followed• Document a risk mitigation strategy• Update your security risk analysis for each reporting period (i.e.

annually)• If you are not comfortable with doing it yourself, seek outside help

Recommendations

Page 25: Meaningful Use Security Risk Analysis Passing Your Audit

Questions