Running Head: Hypothetical Health Cryptographic Controls 1: Executive Summary
Running Head: Hypothetical Health Cryptographic Controls 1: Executive Summary
Running Head: Hypothetical Health Cryptographic Controls 1: Executive Summary
Executive Summary
HYPOTHETICAL HEALTH CRYPTOGRAPHIC CONTROLS 2
This report details the cryptographic controls, security policies, applicable laws, and
regulations for Hypothetical Health, an Insurance Company (HHIC). HHIC transmits, stores, and
processes Protected Health Information (PHI), and as a result, is a regulated corporation that
must follow certain laws and regulations that define how to properly secure this type of
information. By implementing these security measures, HHIC will lower the risk profile of a
security incident which would be potentially detrimental to the corporation, its employees,
customers, and providers.
HYPOTHETICAL HEALTH CRYPTOGRAPHIC CONTROLS 3
HHIC has an ethical and legal responsibility to protect all of our customer's PHI and
Personally Identifiable Information (PII) from unlawful and unauthorized access. Our goal at
HHIC is that we execute the proper security policies and security controls that will enable us to
effectively protect all of our customer's PII and PHI. HHIC also has an ethical and legal
responsibility to protect the PII of our employees and investors. By implementing the correct
security controls and policies, it will lower the risk of any legal ramifications should a data
breach occur.
The laws and regulations in which HHIC must comply contain penalties and fines.
Compliance violations or incidents involving a breach of PHI exposes HHIC to these steep fines
and penalties. There are four tiers of culpability, each with increasing per-violation penalty
amounts with a maximum annual limit of $1,785,651 for each tier (HIPAASecuritySuite.com,
2020). For clarification, each record exposed constitutes a single violation. It is certainly
conceivable that a single error in configuration or an omission of a security control could result
in instantaneously reaching the maximum annual limit. For example, in 2010 RiteAid
improperly disposed of physical materials that contained PHI, resulting in a $1M settlement
(Secretary & (OCR), 2017). It is in the following sections and tables that contain the security
HIPAA contains the following rules, which are the regulations for the protection of PHI.
HYPOTHETICAL HEALTH CRYPTOGRAPHIC CONTROLS 4
1) Privacy Rule
a. Establishes national standards to protect individuals’ medical records and
other personal health information (HHS, 2017)
2) Security Rule
a. Requires appropriate administrative, physical, and technical safeguards to
ensure the confidentiality, integrity, and security of electronic protected
health information (HHS, 2017)
3) Breach Notification Rule
a. Requires HIPAA covered entities and their business associates to provide
notification following a breach of unsecured protected health
information. (HHS, 2017)
Health Information Technology for Economic and Clinical Health (HITECH) Act
The HITECH Act facilitates the use of Electronic Health Records (EHRs), so the
information could more easily be shared between the consumers, doctors, and hospitals, etc.,
therefore, reducing the overall costs of health care. Encryption and breach notification are also
HB 18-1128 focuses on protecting consumer data privacy. The following list is the key
Assumptions:
Security Policies
Appendix A details the Administrative, Physical and Technical safeguards that need to be
put in place for compliance, and Appendix A maps directly to the HHIC security policies that are,
or need to be drafted for compliance.
The customers, providers, and HHIC workers are susceptible to social engineering
The Internet, Firewalls, and Web Servers are threatened by myriad bad actors including
Nation-State Actors, Cyber Criminals, Script Kiddies, Hacktivists, and any nefarious entity that
has access to the internet. If these components are breached, the corporate data and corporate
LAN become susceptible to the attacker navigating throughout the system by gaining access to
administrative credentials, private keys, and different user roles within the network.
All of these threats put HHIC at risk of financial loss, negative public opinion, loss of
customers, and legal ramifications. The following list highlights some of the events that could
1) Data Breaches
2) Malware/Ransomware Attacks
3) Data Loss or Manipulation
HYPOTHETICAL HEALTH CRYPTOGRAPHIC CONTROLS 6
Measure ption
TLS Strongest internet cryptographic 1.3
protocol
Strong NIST 800-63B password standards N/A
Password
Requirements
2-Factor The traditional login process with N/A
Remote Workers
Only
#4 Off-Site Backup
Measure tion
Data at “HIPAA Encryption requirements? Not AES-128
#5 Outer Firewall
Measure
Firewall Internet traffic to our internal Close unused ports
Automated Software
Updates
Configure Security
Logs/Audits
Intrusion Barney (2015) discusses the Configure and
Measure
Public Key Industry-standard public-key TLS 1.3
encrypted
Public/Priv Part of the PKI configuration RSA Crypto Key
encryption algorithm
Data Prevent unauthorized: Network traffic
allowed through
servers
Measure
Virtual “With a Virtual Private Network (VPN), SSL Tunnel
800-113
#8, #19, #20 Inner Firewall, Inner Firewall to Corporate LAN, User and Provider Data
the VPN.
Transmission Prevent unauthorized traffic to Access Control Lists
Security Network Log Monitoring and
corporate LAN and Provider Data. Alerts
transmission of PHR
Data
#10, #21, #23 Corporate LAN, Corporate LAN to User and Provider Data, Corporate Data
#11, #22 Wireless Access Point, Wireless Access Point to Corporate LAN
#13, #14, #15 Customers, Providers, and Remote Worker VPN to Outer Firewall
References
Barney, B. (2015, December 7). Intrusion Detection System: What's Missing in HIPAA Security.
Retrieved from https://www.securitymetrics.com/blog/intrusion-detection-system-
whats-missing-hipaa-security
Health Insurance Reform: Security Standards. (2003, February 20). Retrieved from
https://www.hhs.gov/sites/default/files/ocr/privacy/hipaa/administrative/securityrule/
securityrulepdf.pdf?language=es
HHS Office of the Secretary,Office for Civil Rights, & Ocr. (2017, June 16). HIPAA for
Professionals. Retrieved from https://www.hhs.gov/hipaa/for-professionals/index.html
HIPAASecuritySuite.com. (2020, March 26). HIPAA Violation Fines and Penalties: What Are They
in 2020?, Your Key To HIPAA Compliance®. Retrieved October 27, 2020, from
https://hipaasecuritysuite.com/hipaa-violation-fines-and-penalties-what-are-they-in-
2020/
Mesoznik, K. (2020, June 21). How a VPN Can Help with HIPAA Compliance. Retrieved from
https://www.perimeter81.com/blog/cloud/hipaa-compliance-vpn/
Puranik, M. (2019, February 20). Two-Factor Authentication: A Top Priority for HIPAA
Compliance. Retrieved from https://www.techopedia.com/two-factor-authentication-a-
top-priority-for-hipaa-compliance/2/33761
Secretary, H., & (OCR), O. (2017, June 07). Rite Aid Agrees to Pay $1 Million to Settle HIPAA
Privacy Case. Retrieved October 27, 2020, from https://www.hhs.gov/hipaa/for-
professionals/compliance-enforcement/examples/rite-aid/index.html
Taylor, S. (2020, March 18). Benefits of VPN for HIPAA Compliance. Retrieved from
https://www.totalhipaa.com/benefits-vpn/
The Fox Group. (2019, May 02). HIPAA Encryption Requirements or Best Practices. Retrieved
from https://www.foxgrp.com/hipaa-compliance/hipaa-encryption-requirements/
Tracy, M., Jansen, W., Scarfone, K., & Butterfield, J. (2007, February 20). Guidelines on
Electronic Mail Security. Retrieved from
https://csrc.nist.gov/publications/detail/sp/800-45/version-2/final
HYPOTHETICAL HEALTH CRYPTOGRAPHIC CONTROLS 14
Glossary
interface card.
NIST National Institute of Standards and
standards.
Phishing A social engineering attack that is
transmissions
TLS 1.3 Transport Layer Security version 1.3 is
outer firewall.
HYPOTHETICAL HEALTH CRYPTOGRAPHIC CONTROLS 16
Table 1 HIPAA Security Standards Matrix (Health Insurance Reform: Security Standards 2003)