SlideShare a Scribd company logo
Secure Cloud Computing
for the Health Enterprise
  By Joel Amoussou, CEO, Efasoft Inc.
Contents



                  1   Regulatory Framework

                  2   Cloud Security Practices

                  3    Security Management

                  4   Auditing & Compliance




www.efasoft.com
Healthcare Apps in the Cloud


                  Cloud Services: IaaS, SaaS, PaaS
                  Cloud Services: IaaS, SaaS, PaaS




          CDSS          EMR            5010          Analytics
                                      ICD10



www.efasoft.com
Drivers




                                          t
                                       en
                                     ym
                                Pa
                                ed
                              as
                                                     ity
                                                  bil




                            -B
                                               ala



                       ge
                                          Sc


                       sa
                                        e

                      U
                                     siv
                               Mas
                                             ty
                                     Elastici
                                                         e
                                               nin g Tim
                                         ovisio

                  $
                                       r
                               Q uick P

                                Low Capital Costs

www.efasoft.com
Regulatory Framework



                                 HIPAA


                    HITECH Act – HIPAA Security Updates


                          State and Federal Laws


                             Meaningful Use


                    Recommendations on Patient Consent




www.efasoft.com
Impact of Regulations


                  HITECH Act
                                         US Patriot Act
   •HIPAA applies to Cloud Service
   Providers (CSPs) and online PHR
                                       •Canada Health Infoway
   vendors as Business Associates???
                                       certification requirements refer
   •Breach Notification                to HIPAA

   •Accounting of disclosure           •British Columbia and Nova
                                       Scotia prohibit storing patient
   •Marketing and sale of PHI          data at providers (including
                                       CSPs) located in the US
   •Patient access and disclosure
   restrictions

   •Minimum data set



www.efasoft.com
Tiger Team Recommendations


  Collection, Use and Disclosure
  Limitation: Third party service      When the decision to disclose or
organizations may not collect, use    exchange the patient's identifiable
or disclose personally identifiable      health information from the
    health information for any          provider's record is not in the
purpose other than to provide the       control of the provider or that
services specified in the business     provider's organized health care
  associate or service agreement       arrangement ("OHCA"), patients
    with the data provider, and           should be able to exercise
     necessary administrative            meaningful consent to their
 functions, or as required by law.               participation.




www.efasoft.com
Addressing HIPAA in the Cloud

 Access                                                          Disaster
 Control                 Audit              Backup
                                                                 Recovery




•SSH Keys                                •Snapshot of
                                         block storage        •Monitoring
•No password-based                       volumes
                        •Event logs to                        •Availability
shell access
                        secured          •Encrypt and         Zones
                        dedicated        Keep backups out     (geographic
•Strong Encryption of
                        server           of the cloud         redundancy)
data and filesystems
                        •Backup log      •Cloud storage is    •Clustering
•Private decryption
                        files            replicated across
keys out of the cloud
                                         multiple             •Replication
•Security groups                         availability zones

•Secure Transport

www.efasoft.com
Security Issues in the Cloud


                  1                      2                        3

       •Reassigned IP          •CSP staff access to VM
       addresses               instances and guest OS    •Isolation in
                                                         multitenancy
       •BGP Prefix Hijacking   •Encryption not always
                               possible while            •OWASP Top 10
       •DNS Attacks            processing data in the
                               cloud (as opposed to      •Data Lineage
       •DoS and DDoS Attacks   data at rest)
                                                         •Data Provenance
       •Security groups not
       physically separated                              •Data Remanence
                                                         (NIST 800-88)




www.efasoft.com
Security Controls in the Cloud


          1
          1       Image hardening and patching

           2
           2        Host based IDS/IPS such as OSSEC


           3
           3      Health Monitoring & Security event logs


           4
           4      Effective Key Management (NIST 800-57)


           5
           5        Default deny-all mode, Host Firewall




www.efasoft.com
Identity and Access Management
                 (IAM)
                                   SPML
                                Provisioning

                                   B



    SAML 2.0            A                          C      XACML
     Identity                                           Authorization
 Federation/SSO
                                   IAM




      WS-I Security         E                  D       Oauth
      Profile (SOA in                              Authentication
        the Cloud)                                  across CSPs
www.efasoft.com
Security Management Standards


                  ITIL: IT Service Management


                      ISO 17799: Code of Practice


                        ISO 20000: Security Techniques Overview


                       ISO 27001: Security Techniques Requirements


                   ISO 27002: Code of Practice



www.efasoft.com
Auditing & Compliance

                          COBIT                ISO 27001




               SAS 70                GRC*                 ISO 27002




                        SysTrust               WebTrust



*Governance, Risk Management, and Compliance

 www.efasoft.com
Collaboration




        Health Enterprise            Cloud Service
                                     Provider
        Understand
        responsibilities (who does   Provide transparency into
        what about security?)        security practices and
                                     policies.




www.efasoft.com
www.efasoft.com
joel@efasoft.com

More Related Content

PPS
Mii Oracle Biz Map 2009
PDF
AnyConnect Secure Mobility
PDF
Cloud Security:Threats & Mitgations
PDF
Topdanmark- Cisco
PPTX
PCI DSS v 3.0 and Oracle Security Mapping
PDF
OpSource Enterprise-Class Security
PPTX
Protéger ses données, identités & appareils avec Windows 10
PDF
Bloombase Spitfire SOA Security Server Specifications
Mii Oracle Biz Map 2009
AnyConnect Secure Mobility
Cloud Security:Threats & Mitgations
Topdanmark- Cisco
PCI DSS v 3.0 and Oracle Security Mapping
OpSource Enterprise-Class Security
Protéger ses données, identités & appareils avec Windows 10
Bloombase Spitfire SOA Security Server Specifications

What's hot (9)

PPT
Secure webl gate way
PPTX
Defending the Data Center: Managing Users from the Edge to the Application
PPTX
From Physical to Virtual to Cloud
PDF
ISA Server 2006 Administration
PPTX
Select your career path
PDF
Isa server 2006 guide
PPTX
From Cisco ACS to ISE
PDF
Cyberoam cr300i
PPTX
Security Avalanche
Secure webl gate way
Defending the Data Center: Managing Users from the Edge to the Application
From Physical to Virtual to Cloud
ISA Server 2006 Administration
Select your career path
Isa server 2006 guide
From Cisco ACS to ISE
Cyberoam cr300i
Security Avalanche
Ad

Similar to Secure Cloud Computing for the Health Enterprise (20)

PDF
Cloud Security - Made simple
PDF
Cloud computing due diligence WTF?
PPTX
17h30 aws enterprise_app_jvaria
PDF
Cloud Security: Perception Vs. Reality
PPTX
What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...
PDF
Neupart Isaca April 2012
PDF
Enterprise Applications on AWS
PPT
Cloudy with a chance of downtime
PDF
Cloudsecurity
PDF
Who owns security in the cloud
PDF
Seguridad en SQL Azure Windows azure
PDF
Enterprise Strategy for Cloud Security
PDF
Cloud Security Alliance - Guidance
PDF
Cloud Webinar Neiditz Weitz Mitchell Goodman
PPTX
Enterprise Security in Hybrid Cloud ISACA-SV 2012
PPTX
Enterprise Security in Cloud
PDF
Peering Through the Cloud Forrester EMEA 2010
PDF
Information Security and Cloud Computing
PDF
110307 cloud security requirements gourley
Cloud Security - Made simple
Cloud computing due diligence WTF?
17h30 aws enterprise_app_jvaria
Cloud Security: Perception Vs. Reality
What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...
Neupart Isaca April 2012
Enterprise Applications on AWS
Cloudy with a chance of downtime
Cloudsecurity
Who owns security in the cloud
Seguridad en SQL Azure Windows azure
Enterprise Strategy for Cloud Security
Cloud Security Alliance - Guidance
Cloud Webinar Neiditz Weitz Mitchell Goodman
Enterprise Security in Hybrid Cloud ISACA-SV 2012
Enterprise Security in Cloud
Peering Through the Cloud Forrester EMEA 2010
Information Security and Cloud Computing
110307 cloud security requirements gourley
Ad

Recently uploaded (20)

PDF
Zenith AI: Advanced Artificial Intelligence
PPTX
Benefits of Physical activity for teenagers.pptx
PDF
Unlock new opportunities with location data.pdf
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PPTX
The various Industrial Revolutions .pptx
PDF
Hybrid model detection and classification of lung cancer
PDF
Enhancing emotion recognition model for a student engagement use case through...
PPTX
Tartificialntelligence_presentation.pptx
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PPTX
Chapter 5: Probability Theory and Statistics
PDF
Architecture types and enterprise applications.pdf
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PDF
Hindi spoken digit analysis for native and non-native speakers
PDF
Developing a website for English-speaking practice to English as a foreign la...
PDF
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
PDF
Five Habits of High-Impact Board Members
PPTX
observCloud-Native Containerability and monitoring.pptx
DOCX
search engine optimization ppt fir known well about this
Zenith AI: Advanced Artificial Intelligence
Benefits of Physical activity for teenagers.pptx
Unlock new opportunities with location data.pdf
A contest of sentiment analysis: k-nearest neighbor versus neural network
The various Industrial Revolutions .pptx
Hybrid model detection and classification of lung cancer
Enhancing emotion recognition model for a student engagement use case through...
Tartificialntelligence_presentation.pptx
Univ-Connecticut-ChatGPT-Presentaion.pdf
Chapter 5: Probability Theory and Statistics
Architecture types and enterprise applications.pdf
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
Taming the Chaos: How to Turn Unstructured Data into Decisions
Final SEM Unit 1 for mit wpu at pune .pptx
Hindi spoken digit analysis for native and non-native speakers
Developing a website for English-speaking practice to English as a foreign la...
A Late Bloomer's Guide to GenAI: Ethics, Bias, and Effective Prompting - Boha...
Five Habits of High-Impact Board Members
observCloud-Native Containerability and monitoring.pptx
search engine optimization ppt fir known well about this

Secure Cloud Computing for the Health Enterprise

  • 1. Secure Cloud Computing for the Health Enterprise By Joel Amoussou, CEO, Efasoft Inc.
  • 2. Contents 1 Regulatory Framework 2 Cloud Security Practices 3 Security Management 4 Auditing & Compliance www.efasoft.com
  • 3. Healthcare Apps in the Cloud Cloud Services: IaaS, SaaS, PaaS Cloud Services: IaaS, SaaS, PaaS CDSS EMR 5010 Analytics ICD10 www.efasoft.com
  • 4. Drivers t en ym Pa ed as ity bil -B ala ge Sc sa e U siv Mas ty Elastici e nin g Tim ovisio $ r Q uick P Low Capital Costs www.efasoft.com
  • 5. Regulatory Framework HIPAA HITECH Act – HIPAA Security Updates State and Federal Laws Meaningful Use Recommendations on Patient Consent www.efasoft.com
  • 6. Impact of Regulations HITECH Act US Patriot Act •HIPAA applies to Cloud Service Providers (CSPs) and online PHR •Canada Health Infoway vendors as Business Associates??? certification requirements refer •Breach Notification to HIPAA •Accounting of disclosure •British Columbia and Nova Scotia prohibit storing patient •Marketing and sale of PHI data at providers (including CSPs) located in the US •Patient access and disclosure restrictions •Minimum data set www.efasoft.com
  • 7. Tiger Team Recommendations Collection, Use and Disclosure Limitation: Third party service When the decision to disclose or organizations may not collect, use exchange the patient's identifiable or disclose personally identifiable health information from the health information for any provider's record is not in the purpose other than to provide the control of the provider or that services specified in the business provider's organized health care associate or service agreement arrangement ("OHCA"), patients with the data provider, and should be able to exercise necessary administrative meaningful consent to their functions, or as required by law. participation. www.efasoft.com
  • 8. Addressing HIPAA in the Cloud Access Disaster Control Audit Backup Recovery •SSH Keys •Snapshot of block storage •Monitoring •No password-based volumes •Event logs to •Availability shell access secured •Encrypt and Zones dedicated Keep backups out (geographic •Strong Encryption of server of the cloud redundancy) data and filesystems •Backup log •Cloud storage is •Clustering •Private decryption files replicated across keys out of the cloud multiple •Replication •Security groups availability zones •Secure Transport www.efasoft.com
  • 9. Security Issues in the Cloud 1 2 3 •Reassigned IP •CSP staff access to VM addresses instances and guest OS •Isolation in multitenancy •BGP Prefix Hijacking •Encryption not always possible while •OWASP Top 10 •DNS Attacks processing data in the cloud (as opposed to •Data Lineage •DoS and DDoS Attacks data at rest) •Data Provenance •Security groups not physically separated •Data Remanence (NIST 800-88) www.efasoft.com
  • 10. Security Controls in the Cloud 1 1 Image hardening and patching 2 2 Host based IDS/IPS such as OSSEC 3 3 Health Monitoring & Security event logs 4 4 Effective Key Management (NIST 800-57) 5 5 Default deny-all mode, Host Firewall www.efasoft.com
  • 11. Identity and Access Management (IAM) SPML Provisioning B SAML 2.0 A C XACML Identity Authorization Federation/SSO IAM WS-I Security E D Oauth Profile (SOA in Authentication the Cloud) across CSPs www.efasoft.com
  • 12. Security Management Standards ITIL: IT Service Management ISO 17799: Code of Practice ISO 20000: Security Techniques Overview ISO 27001: Security Techniques Requirements ISO 27002: Code of Practice www.efasoft.com
  • 13. Auditing & Compliance COBIT ISO 27001 SAS 70 GRC* ISO 27002 SysTrust WebTrust *Governance, Risk Management, and Compliance www.efasoft.com
  • 14. Collaboration Health Enterprise Cloud Service Provider Understand responsibilities (who does Provide transparency into what about security?) security practices and policies. www.efasoft.com