Top Banner
Risk Assessment: Key to a Successful Information Security Program Sharon Welna Information Security Officer October 23, 2008
45

Risk Assessment: Key to a Successful Information Security Program Sharon Welna Information Security Officer October 23, 2008.

Dec 17, 2015

Download

Documents

Arlene Dennis
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Risk Assessment: Key to a Successful Information Security Program Sharon Welna Information Security Officer October 23, 2008.

Risk Assessment: Key to a Successful Information Security

Program

Sharon WelnaInformation Security Officer

October 23, 2008

Page 2: Risk Assessment: Key to a Successful Information Security Program Sharon Welna Information Security Officer October 23, 2008.

Agenda• Environment

• Legal entities• Network• Regulatory

• Information Security organizational structure• What is a mobile device?• How are mobile devices used in healthcare• Risk Assessment• Risk Mitigation

Nebraska’s Pride is 500-miles wide

Page 3: Risk Assessment: Key to a Successful Information Security Program Sharon Welna Information Security Officer October 23, 2008.

Nebraska’s Pride is 500-miles wide

Sharon Welna, Information Security Officer

EducationBA from UNL (Major: Political Science)MBA from UNO

ConAgra Central Telephone Creighton University Medical Hospital

CIODirector Medical RecordsControllerDirector, IT

Page 4: Risk Assessment: Key to a Successful Information Security Program Sharon Welna Information Security Officer October 23, 2008.

Nebraska’s Pride is 500-miles wide

Partners in Healthcare

The Nebraska Medical Center

UNMC

Patient Care

Education

Research

Outreach

Diversity

UNMC Physicians

Page 5: Risk Assessment: Key to a Successful Information Security Program Sharon Welna Information Security Officer October 23, 2008.

Partnership Vision

Nebraska’s Pride is 500-miles wide

The partnership of UNMC and the Nebraska Health System will be a world-renowned health sciences center that:

• Delivers state-of-the-art health care;• Prepares the best-educated health professionals and

scientists;• Ranks among the leading research centers;• Advances our historic commitment to community

health;• Embraces the richness of diversity to build unity.

Page 6: Risk Assessment: Key to a Successful Information Security Program Sharon Welna Information Security Officer October 23, 2008.

Environment: Legal EntitiesUNMC

College of Nursing College of Medicine College of Pharmacy College of Dentistry College of Public Health Eppley Cancer Institute Munroe Meyer Institute

3,000+ Students 4,000+ Faculty / Staff $90+ Million Research

Nebraska’s Pride is 500-miles wide

Page 7: Risk Assessment: Key to a Successful Information Security Program Sharon Welna Information Security Officer October 23, 2008.

Environment: Legal EntitiesThe Nebraska Medical Center

1997 Partnership 735 Licensed beds 900+ Medical Staff 4,400+ Employees UNMC’s Primary Teaching Hospital

Nebraska’s Pride is 500-miles wide

Page 8: Risk Assessment: Key to a Successful Information Security Program Sharon Welna Information Security Officer October 23, 2008.

Environment: Legal EntitiesUNMC PhysiciansPhysician Practice Group

500 physicians serving in over 50 specialist & sub-specialist areas from family medicine to transplantation

300+ non physician employees

Nebraska’s Pride is 500-miles wide

Page 9: Risk Assessment: Key to a Successful Information Security Program Sharon Welna Information Security Officer October 23, 2008.

Environment: Physical Omaha

MidTown 100 acres 43 buildings 3.9 million square feet

30+ clinics

College of Nursing Lincoln, Kearney, Scottsbluff Norfolk (under development)

College of Dentistry Lincoln

Nebraska’s Pride is 500-miles wide

Page 10: Risk Assessment: Key to a Successful Information Security Program Sharon Welna Information Security Officer October 23, 2008.

Buildings, Moves and More…

Weigel Williamson Center for

Visual Rehabilitation

38th & Jones April 08  

Sorrell Center For Health Science Education

August 08

Page 11: Risk Assessment: Key to a Successful Information Security Program Sharon Welna Information Security Officer October 23, 2008.

Buildings, Moves and More…

Durham Research Center II (Winter 08) 

Patient Financial Services / TNMC Executive Offices Relocation To Mutual of Omaha 3333 Farnam Street

Page 12: Risk Assessment: Key to a Successful Information Security Program Sharon Welna Information Security Officer October 23, 2008.

Buildings, Moves and More…

Village PointNMC Cancer Center (late 08/early 09)

Bellevue Medical CenterHighway 370 and 25th Street Bellevue, Nebraska (2010)

Page 13: Risk Assessment: Key to a Successful Information Security Program Sharon Welna Information Security Officer October 23, 2008.

Environment: Regulatory

HIPAA HealthcareGLBA FinancialFERPA StudentPCI Credit Card

And more

Page 14: Risk Assessment: Key to a Successful Information Security Program Sharon Welna Information Security Officer October 23, 2008.

Environment: Information Security

Entities contractually agreed to follow same policies and procedures

Information Security OfficerPolicies, ProceduresIncident ManagementLegal

Network Technical Services TeamTechnical Security implementation

Nebraska’s Pride is 500-miles wide

Page 15: Risk Assessment: Key to a Successful Information Security Program Sharon Welna Information Security Officer October 23, 2008.

Environment: Wireless800+ access points1 million + square ft Cisco unified wireless network

infrastructure

Nebraska’s Pride is 500-miles wide

Page 16: Risk Assessment: Key to a Successful Information Security Program Sharon Welna Information Security Officer October 23, 2008.

Mobile Devices

Nebraska’s Pride is 500-miles wide

Page 17: Risk Assessment: Key to a Successful Information Security Program Sharon Welna Information Security Officer October 23, 2008.

Medical Mobile Devices

Nebraska’s Pride is 500-miles wide

IV Pumps

Glucose Meters

Page 18: Risk Assessment: Key to a Successful Information Security Program Sharon Welna Information Security Officer October 23, 2008.

Mobile Device UsageElectronic Medical Record viewingPoint of Care devicesTraditional administrative functions

Nebraska’s Pride is 500-miles wide

Page 19: Risk Assessment: Key to a Successful Information Security Program Sharon Welna Information Security Officer October 23, 2008.

Summary12,000 members of the workforceWant to access data from anywhere,

anytime with any device securely

Nebraska’s Pride is 500-miles wide

Page 20: Risk Assessment: Key to a Successful Information Security Program Sharon Welna Information Security Officer October 23, 2008.

Risk Analysis Protect the organization’s ability to perform

its mission

Page 21: Risk Assessment: Key to a Successful Information Security Program Sharon Welna Information Security Officer October 23, 2008.

Risk Analysis: Approach #1Identify riskDetermine risk mitigation alternatives and

costCompare risk mitigation cost to Annual

Loss ExpectancyImplement/do not implement decision

Page 22: Risk Assessment: Key to a Successful Information Security Program Sharon Welna Information Security Officer October 23, 2008.

Risk Analysis: Approach #1

Definitions:

Annualized Rate of Occurrence (ARO)

Single Loss Expectancy (SLE)

Annual Loss Expectancy (ALE)

Risk Formula:

ARO * SLE = ALE

Page 23: Risk Assessment: Key to a Successful Information Security Program Sharon Welna Information Security Officer October 23, 2008.

Single Loss ExpectancyCosts include:

Notification (creating letter, postage etc)800 number set up and staffingStaff time…

Gartner estimate as of August 2007

$300/account

Nebraska’s Pride is 500-miles wide

Page 24: Risk Assessment: Key to a Successful Information Security Program Sharon Welna Information Security Officer October 23, 2008.

Annual Loss ExpectancyCategory Assumption

Annualized Rate of Occurrence (ARO) 2

Single Loss Expectancy (SLE) $300/account * 1,000 accounts = $300,000

Annual Loss Expectancy (ALE) $600,000

Nebraska’s Pride is 500-miles wide

Page 25: Risk Assessment: Key to a Successful Information Security Program Sharon Welna Information Security Officer October 23, 2008.

Risk Analysis: Approach #2NIST

SP 800-30Risk Management Guide for Information

Technology Systems

Page 26: Risk Assessment: Key to a Successful Information Security Program Sharon Welna Information Security Officer October 23, 2008.

NIST 800-30 Guide Purpose Provide a foundation for risk management

program developmentProvide information on cost-effective

security controls

Page 27: Risk Assessment: Key to a Successful Information Security Program Sharon Welna Information Security Officer October 23, 2008.

DefinitionsRisk - “…a function of the likelihood of a

given threat-source’s exercising a particular potential vulnerability, and the resulting impact of that adverse event on the organization.”

Risk management – process of identifying, assessing and reducing risk

Page 28: Risk Assessment: Key to a Successful Information Security Program Sharon Welna Information Security Officer October 23, 2008.

Definitions Threat – “The potential for a threat-source to exercise

(accidentally trigger or intentionally exploit) a specific vulnerability.”

Threat-Source – “Either (1) intent and method targeted at the intentional exploitation of a vulnerability or (2) a situation and method that may accidentally trigger a vulnerability

Page 29: Risk Assessment: Key to a Successful Information Security Program Sharon Welna Information Security Officer October 23, 2008.

Definitions: Vulnerability:

Hardware, firmware, or software flow that leaves an AIS open for potential exploitation. A weakness in automated system security procedures, administrative controls, physical layout or internal controls that could be exploited by a threat to gain unauthorized access to information or disrupt critical processing.

Page 30: Risk Assessment: Key to a Successful Information Security Program Sharon Welna Information Security Officer October 23, 2008.

Risk Assessment Methodology

Step 1: System CharacterizationCollect system-related information including:

Which mobile devicesHow are they being used

Page 31: Risk Assessment: Key to a Successful Information Security Program Sharon Welna Information Security Officer October 23, 2008.

Risk Assessment Methodology

Step 2: Threat IdentificationIdentify potential threat-sources that could

cause harm to the IT system and its environment

Can be natural, human or environmental

Page 32: Risk Assessment: Key to a Successful Information Security Program Sharon Welna Information Security Officer October 23, 2008.

Risk Assessment Methodology

Step 3: Vulnerability IdentificationDevelop list of system vulnerabilities (flaws or

weaknesses) that could be exploitedDevelop Security Requirements Checklist

Page 33: Risk Assessment: Key to a Successful Information Security Program Sharon Welna Information Security Officer October 23, 2008.

Risk Assessment Methodology

Step 4: Control AnalysisControl Methods –

May be technical or non-technical

Control Categories – preventative or detectiveControl Analysis Technique – use of security

requirements checklist

Page 34: Risk Assessment: Key to a Successful Information Security Program Sharon Welna Information Security Officer October 23, 2008.

Risk Assessment Methodology

Step 5: Likelihood DeterminationGoverning factors

Threat-source motivation & capabilityNature of the vulnerabilityExistence & effectiveness of current controls

Levels – High, Medium or Low

Page 35: Risk Assessment: Key to a Successful Information Security Program Sharon Welna Information Security Officer October 23, 2008.

Risk Assessment Methodology

Step 6: Impact AnalysisPrerequisite information

System missionSystem and data criticalitySystem and data sensitivity

Adverse impact described in terms of loss or degradation of integrity, confidentiality, availability

Quantitative vs. qualitative assessment

Page 36: Risk Assessment: Key to a Successful Information Security Program Sharon Welna Information Security Officer October 23, 2008.

Risk Assessment Methodology

Step 7: Risk DeterminationDevelop Risk-Level Matrix

Risk Level = Threat Likelihood x Threat Impact

Develop Risk ScaleRisk Levels with associated Descriptions and

Necessary Actions

Page 37: Risk Assessment: Key to a Successful Information Security Program Sharon Welna Information Security Officer October 23, 2008.

NIST Likelihood

Likelihood Definitions Weight

HighThreat is sufficiently capable, and control to prevent the vulnerability from being exercised are ineffective

1.0

Medium Threat is sufficiently capable, and controls are in place that MAY impede successful exercise of the vulnerability

.5

Low Threat lacks capability or controls are in place to prevent, or at least significantly impede, the vulnerability from being exercised.

.1

Page 38: Risk Assessment: Key to a Successful Information Security Program Sharon Welna Information Security Officer October 23, 2008.

NIST Impact

Impact Exercise of the vulnerability WeightHigh 1. May result in highly costly loss of major tangible

assets or resources;2. May significantly violate, harm or impede organization's mission, reputation or interest; or3. May result in human death or serious injury

100

Medium 1. May result in costly loss of major tangible assets or resources;2. May violate, harm or impede organization's mission, reputation or interest; or3. May result in human injury

50

Low 1. May result in loss of some tangible assets or resources;2. May noticeably affect an organization's mission, reputation or interest;

10

Page 39: Risk Assessment: Key to a Successful Information Security Program Sharon Welna Information Security Officer October 23, 2008.

NIST Risk Level Matrix

ImpactThreat

LikelihoodLow (10)

Medium (50)

High (100)

High (1.0) 10 x 1.0 = 10 50 x 1.0 = 50 100 x 1.0 = 100

Medium (0.5) 10 x 0.5 = 5 50 x 0.5 = 25 100 x 0.5 = 50

Low (0.1) 10 x 0.1 = 1 50 x 0.1 = 5 100 x 0.1 = 10

Page 40: Risk Assessment: Key to a Successful Information Security Program Sharon Welna Information Security Officer October 23, 2008.

NIST RISK MATRIX EXAMPLE

Category Mobile Devices

Vulnerability Device is lost

Threat Confidential data is stored on device

Mitigation Strategies Implemented Encryption

Likelihood High

Likelihood Rating 1.0

Impact Low

Impact Rating 10

Risk Rating 10 (1.0 x 10)

Action Plan (if needed)

Page 41: Risk Assessment: Key to a Successful Information Security Program Sharon Welna Information Security Officer October 23, 2008.

NIST Risk LevelHigh (50-100)

Strong need for corrective measure as soon as possible

Medium (10-49)Plan must be developed and implemented

within a reasonable period of timeLow (1-9)

Determine if corrective action is needed or can risk be accepted

Page 42: Risk Assessment: Key to a Successful Information Security Program Sharon Welna Information Security Officer October 23, 2008.

Risk Assessment Methodology

Step 8: Control RecommendationsFactors to consider

Effectiveness of recommended optionLegislation and regulationOrganizational policyOperational impactSafety and reliability

Page 43: Risk Assessment: Key to a Successful Information Security Program Sharon Welna Information Security Officer October 23, 2008.

Risk Assessment Methodology

Step 9: Results DocumentationRisk Assessment Report

Presented to senior management and mission owners

Describes threats & vulnerabilities, measures risk and provides recommendations on controls to implement

Page 44: Risk Assessment: Key to a Successful Information Security Program Sharon Welna Information Security Officer October 23, 2008.

Risk Mitigation StrategiesSpecific to the deviceLaptops:

Password ProtectionEncryption

BlackberriesVendor recommendationPolicy/procedure to follow if device is lostDevice “wiped” from the server

Nebraska’s Pride is 500-miles wide

Page 45: Risk Assessment: Key to a Successful Information Security Program Sharon Welna Information Security Officer October 23, 2008.

Risk Mitigation StrategiesFlash drives

Encryption requiredWorking towards making it easy to access

data remotely—eliminate the need for a flash drive

Nebraska’s Pride is 500-miles wide