Your network is the heartbeat of your organization; without it no emails get sent, no applications are accessed, no third-party resources of any kind are available—in short, to a large extent, no meaningful work of any kind gets done that requires communication with colleagues, both inside and outside of the organization. So, it goes without saying that to maintain your network’s heartbeat you must monitor it for signs of well-being. Compliance with the HIPAA rules (Privacy, Security and Breach Notification—collectively “Rules” or “the Rules”) also requires that you monitor your network.
Monitoring your network requires, among other things, that you regularly “scan” it to determine whether it is functioning properly and to what degree (if any) it is being compromised by persons or entities ("Persons") inside, or outside of your network. Without periodic scans, there is no way to determine whether your network is being persistently accessed inappropriately or, worse yet, has already been penetrated by an adversary.
But for network scanning, it is highly improbable that organizations would have detected and mitigated the impact of the “WannaCry”[1] ransomware in a timely manner. The consensus today among cybersecurity experts is that your network’s perimeter can no longer be defended. You are therefore forced to assume that your network has, or will be, penetrated. No number of firewalls, proxy servers, and other perimeter defense mechanisms can prevent your adversaries from readily penetrating your outward facing defenses.
Of course, that does not mean that you do not continue to use these defenses, in fact you must. However, you must also assume that sophisticated adversaries will find a way in, and the critical question becomes “what happens then?” There are some experts who suggest that the best you can do is to apply your efforts toward significantly reducing the “dwell time”—that is, the amount of time that your adversary has already spent within your perimeter “poking around” for vulnerabilities to exploit.
Regardless of how you may choose to attack this challenge, regular periodic scans must be one of the tools in your toolset. Although the HIPAA Rules do not expressly state that network scans (“Scanning”) must be performed—it is inferred by HHS as a kind of “rule of reason;” because compliance with other parts of the Rules would be impossible without it. For example, HHS recently stated in guidance entitled: FACT SHEET: Ransomware and HIPAA[2] the following:
It is expected that covered entities and business associates will use this process of risk analysis and risk management not only to satisfy the specific standards and implementation specifications of the Security Rule, but also when implementing security measures to reduce the particular risks and vulnerabilities to ePHI throughout an organization’s entire enterprise, identified as a result of an accurate and thorough risk analysis, to a reasonable and appropriate level. For example, although there is a not a Security Rule standard or implementation specification that specifically and expressly requires entities to update the firmware of network devices, entities, as part of their risk analysis and risk management process, should, as appropriate, identify and address the risks to ePHI of using networks devices running on obsolete firmware, especially when firmware updates are available to remediate known security vulnerabilities. [Emphasis Added].
Discovering outdated firmware would be next to impossible without Scanning. Further, you are likely to be found in “willful neglect” of the Rules, where penalties are assessed at $50,000.00 per violation, if you are not Scanning on a timetable that is “reasonable and appropriate.” This is not your Daddy’s HIPAA anymore! The Persons that are attempting to harm your patient’s PHI and your reputation are growing by orders of magnitude. HHS’ warnings post WannaCry have be ratcheted up because the unequivocal message from WannaCry was clear—we know where you live and we’re coming for you!
[1] See https://en.wikipedia.org/wiki/WannaCry_ransomware_attack.
[2] See https://www.hhs.gov/sites/default/files/RansomwareFactSheet.pdf.
FREE Webinar!
Description:
This webinar will summarize the lessons learned by the healthcare industry from WannaCry & perform a postmortem on WannaCry's impact.
Date and Time, including Time Zone
June 15, 2017 2:00 EST
Looking for a simplified way to keep up with HIPAA? For a limited time, we are making available our "Showing HHS Visible, Demonstrable, Evidence" webinar when you sign up for our
FREE monthly newsletter.