Using NIST Special Publication (SP) 800-171r2/171B to assess and evaluate the Information Security posture of Technology Service Providers who support Covered Entities and/or t

10/09/2019
by   Thomas P. Dover, et al.
0

This paper describes how NIST Special Publication (SP) 800.171r2 (Protecting Controlled but Unclassified Information in Nonfederal Systems and Organizations) and 800.171B (Protecting Controlled but Unclassified Information in Nonfederal Systems and Organizations, and Enhanced Security Requirements for Critical Programs and High Value Assets) can be used to evaluate the security posture of information systems and supporting frameworks relative to HIPAA and HITECH . It will be demonstrated that the provisions and baseline security requirements outlined in 800.171r2 and 171B for the protection of Controlled but Unclassified Information (CUI) can be applied to Electronic Protected Health Information (ePHI). An explanation of how 800.171r2 and 171B align with HIPAA and how this alignment is sufficient for evaluating the security of an IT environment which supports the healthcare sector will be detailed. The process for performing a security analysis will be described and demonstrated. Finally, the benefits of using such an approach to support other forms of risk assessment will be described.

READ FULL TEXT
research
04/22/2020

A NIS Directive compliant Cybersecurity Maturity Assessment Framework

The NIS Directive introduces obligations for the security of the network...
research
04/07/2021

Evaluating Medical IoT (MIoT) Device Security using NISTIR-8228 Expectations

How do healthcare organizations (from small Practices to large HDOs) eva...
research
12/12/2021

Evaluation of Security Training and Awareness Programs: Review of Current Practices and Guideline

Evaluating the effectiveness of security awareness and training programs...
research
08/27/2019

A Security-Aware Access Model for Data-Driven EHR System

Digital healthcare systems are very popular lately, as they provide a va...
research
09/25/2020

Beyond PS-LTE: Security Model Design Framework for PPDR Operational Environment

National disasters can threaten national security and require several or...
research
10/01/2020

An authorship protection technology for electronic documents based on image watermarking

In the field of information technology, information security technologie...
research
06/18/2021

Risk-Oriented Design Approach For Forensic-Ready Software Systems

Digital forensic investigation is a complex and time-consuming activity ...

Please sign up or login with your details

Forgot password? Click here to reset