Skip to content
laptop_with_cybersecurity_framework_protection

Table of Contents

Risk Management Jul 01, 2022

7 Frameworks to Protect your Organization from Cybersecurity Risks

Healthcare faces an escalating risk of cyberattacks. Go beyond HIPAA to secure your healthcare organization's data with these 7 cybersecurity frameworks.

Bad actors are now focusing on healthcare organizations and partners more than ever before

A history of under-investment in data security and vulnerable legacy systems has put healthcare organizations in a dangerous position if they do not rapidly take steps to protect their information. Data is at the heart of patient outcomes in healthcare, and health systems risk losing their most valuable assets to bad actors if they do not quickly adapt to the new reality of risk. Luckily, several institutions maintain best-practice frameworks to secure their crucial data. Below are 7 industry-leading cybersecurity frameworks deciphered for healthcare. 

HIPAA

HIPAA is a starting point for securing health data for most organizations. The law, passed in 1996, provides a set of standards that every health organization must follow regarding electronic healthcare transactions, code sets, unique health identifiers and security. These standards are introduced as code sets, the most recent of which was published in 2013. Some of the standards include:

 

  • Encrypted email attachments if they are sent beyond a firewalled, internal server
  • Organizations and associates must create “Procedures for creating, changing, and safeguarding passwords”
  • Organizations must consider using encryption for ePHI, but may use an alternative if it provides equivalent protection. The decision to not use encryption must be documented. Advanced Encryption Standard (AES) 128, 192 or 256-bit encryption, OpenPGP, and S/MIME
  • All HIPAA-related documents must be retained for 6 years since creation, or 6 years since policy implementation
  • Medical records must be retained and disposed of in accordance with state law
  • Disposed PHI must be rendered “unreadable, indecipherable and otherwise cannot be reconstructed.”
  • Data breaches must be reported to affected individuals no later than 60 days after the discovery of the breach

 

backquote image

Although HIPAA compliance is more secure than nothing, it remains a bare legal minimum for health systems. Ideally, additional levels of security measures must be taken.

NIST CSF

The National Institute of Standards and Technology (NIST) aims to improve the standards set by the HIPAA Security Rule by laying the groundwork for a more strategic, dynamic approach for compliant organizations. Rather than a simple checklist, the NIST CSF includes a system to identify weak points, respond, and recover from data breaches/attacks. Its CSF framework is organized into five core functions:

 

  • IDENTIFY physical and information assets and establish a risk management strategy as appropriate for the organization’s risk tolerance and business environment;
  • PROTECT the assets and data from malicious attacks or
     
    unintentional compromise;
  • DETECT and monitor the environment for security events
     
    and incidents;
  • RESPOND to attempted or successful attacks; and
  • RECOVER from the attack, while using the lessons learned
     
    to adjust security policies and fill in any existing gaps

A white paper by Symantec goes into depth on the framework’s provisions for healthcare.

CIS Controls

Organizations looking for a straightforward approach to securing their data may be interested in the community-driven CIS Controls framework. Maintained by community volunteers with experience in their respective industries, the CIS Controls framework provides a set of tools for hardware and software management, emphasizing offsite data redundancy. It offers a tiered set of implementation groups, so organizations can find the exact set of tools appropriate for their needs.

ISO 27000 Series

ISO 27000 sets itself apart from the other framework options by being an international standard, meant to stack up to the EU’s more stringent data protection requirements. Like NIST, it has subsets for different kinds of organizations, with ISO 27799 being the designation for healthcare. Organizations looking for very strict data protection should investigate the ISO series of standards.

HITRUST

HITRUST’s CSF differentiates itself from NIST and ISO by being a single overarching framework for security and privacy. As a bonus, HITRUST offers a reporting model for SOC 2 as part of the assessment and implementation of controls required by the CSF.

SOC 2

SOC 2 is a certification for data security pioneered by the American Institute of CPSs. Instead of a rigid set of requirements applied universally, SOC 2 certifications are tailored to an organization's needs. SOC certifications are issued with 5 principles in mind:

  • Security – data protected against unauthorized access
  • Availability -
  • Processing Integrity – data reaches the right people at the right time
  • Confidentiality – certain data, such as plans or intellectual property, is restricted to people within the organization using encryption and firewalls
  • Privacy – data that is personally identifiable (i.e. SSN, address, health, race, sexuality, religion) is given an additional level of protection

PCI

For the highest standards of cybersecurity, health organizations can opt for PCI compliance. PCI is an evolving set of standards derived from the banking sector, designed to protect against credit card fraud. But since medical information can be used to gain access to a victim’s finances, malevolent hackers will target healthcare organizations, making PCI standards also applicable here.

The framework includes rigid standards for how information is sent, received, stored, and discarded. While the IT department will usually be tasked with implementing PCI, the department of a health system that handles bank processing and merchant agreements is held responsible for maintaining the standard.

 

healthcare_worker_reviewing_ehr

Choosing a Cybersecurity Framework for your Organization’s Needs

CIS Controls, ISO, and HITRUST, as well as other options, offer distinct standards that build on the level of security offered by HIPAA compliance. Whichever framework is right for your organization, it is important to implement it at all ins and outs of data in the health system, and leadership should set up a roadmap to ensure that their organization continues to achieve compliance in the future. For more information about health cybersecurity, here are 5 Steps to protect your Medical Organization’s Data.

 

 

 

Related Resources

Fostering a Just Culture in Healthcare with Medplace's Efficient Case Review

Fostering a Just Culture in Healthcare with Medplace's Efficient Case Review

Claim leaders agree that a Just Culture prevents potential nuclear verdicts. Learn how Medplace makes it easy to foster a Just Culture usin...

August 28, 2023

Reducing Healthcare Overhead with Efficient Record Organization

Reducing Healthcare Overhead with Efficient Record Organization

Struggling with claims delays, information overload, and rising legal costs? Learn how AI solves records organization and addresses your ne...

August 22, 2023

Tackling Cybersecurity Threats Head-On

Tackling Cybersecurity Threats Head-On

Remote work and escalating cyber attacks means patient data is at risk. Here's how top hospitals are tackling cyber threats head-on.

July 27, 2023