Title: Key Points
1(No Transcript)
2Key Points
- Regulatory business requirements
- Identity management or role based access (RBAC)
planning implementation - Maintenance audit requirements
- Barriers to successful implementation
- Build or buy?
- Resources
3Regulatory Business Requirements
- HIPAA Privacy Rule minimum necessary
requirement - Concept of least privilege
- Legal operational risk management
- Limit access creep or increased access due to
longevity - Operational efficiencies match data access to
position
4Regulatory Business Requirements
- Access limited by data sensitivity
- Identity management not limited to just workforce
need to account for external entity access - Identity management tied to authentication,
authorization and access management - Requires reqular audits
5Identity Management Planning Implementation
- Project management required
- Definition phase -
- Goals what do you want to accomplish (e.g.,
financial controls, limit access to proprietary
data, manage employee data access when positions
change, etc.) - Define access methodology (e.g., geographic, by
job classification, by data type, etc.
6Identity Management Planning Implementation
- Definition phase continued -
- Estimate number of roles required
- System, folder and data inventory (manual or
automated) - Identify resources (IT business)
- Identify resource constraints (development and
production support) - How tos of maintenance audit
7Identity Management Planning Implementation
- Definition phase continued -
- Regulatory requirements (I.e., HIPAA,
Gram-Leach-Bliley, Medicare, state statute, etc.) - Time line account for regulatory requirements
reality - Identify applications data repositories that
require controlled access
8Identity Management Planning Implementation
- Project charter, plan time line development
review (see sample) - Define project in phases (I.e., business
inventory, establishing infrastructure, etc.) - Business community buy in requires significant
resource investment - Resource allocation software acquisition (if
appropriate for inventory, maintenance, etc.)
9Identity Management Planning Implementation
- Requires application functionality evaluation
can applications and data repositories support
access management? - May require upgrading or replacing applications
- Define budget determined by development costs,
upgrade costs, acquisition costs, on-going
maintenance costs
10Identity Management Planning Implementation
- Initial planning phase should be tied to risk
analysis (e.g., where are threats
vulnerabilities to inappropriate data exposure) - Application/data repository initial assessment
needs to account for on-going audit capability - Include audit program development in planning
phase
11Identity Management Planning Implementation
- Role inventory involves business, IT and human
resources (HR) - Survey management and staff (see sample surveys)
sample or census - Survey results determine business needs and
privacy risks
12Identity Management Planning Implementation
- Active Directory as a management tool
- Match positions to roles and roles to systems,
screens and data - Determine on-going maintenance audit
requirements who does it and what does it
entail?
13Identity Management Planning Implementation
- Maintenance and audit processes critical
- Test and implement maintenance tool
- Load role and user data
- Management and staff training
- Implement with defined review periods does it
work? - Audit and update role integrity and exception
limitation
14Maintenance Audit Requirements
- Resource process required to maintain
accuracy/integrity part of on-going budgeting - Lack of attention to detail after rollout negates
up front resource investment - Tie to position number and job classification
(where appropriate) - Maintain role definition separate from user
tracking
15Maintenance Audit Requirements
- Limit exceptions and track
- Tracking must include history audit, system
troubleshooting and forensic investigation - Back up data, staff and documentation
- Regular role review and update
- Audit at regularly scheduled intervals, annually
and whenever major system or business changes
occur
16Maintenance Audit Requirements
- Maintenance and audit production and test
- Remember external user tracking contractors,
business associates, affiliates, etc. - New system implementation embed identity
management controls within development cycle
17Barriers to Successful Implementation
- No standard healthcare identity management model
- Access provisioning relatively new to healthcare
and vendors (especially EHR vendors) - Enterprise solutions may be costly and not suited
for small organizations - Confusion abounds how complex does this have to
be?
18Barriers to Successful Implementation
- Business resources critical IS cant define
roles - Because HIPAA says so doesnt work
- Timing issues privacy/security risks currently
exist - Skimping at any phase limits project success
19Barriers to Successful Implementation
- Difficulties in tracking employee movement within
departments and non-permanent staff - Too many roles difficult to maintain
- Too few roles increase exceptions and defeat
purpose of identity management
20Barriers to Successful Implementation
- Insufficient maintenance resources
- Weak processes equal weak protections
- Audit logs/reports if produced must be looked at
to avoid legal risk - Weak authentication, authorization, access
termination controls limit effectiveness
21Build or Buy?
- Large vs. small organizations
- Manual systems for small offices
- The greater the complexity, the greater the
justification for automated identity management - Support staff resource availability also drives
solution
22Build or Buy?
- Computer Associates, BMC, etc. large
organizations only need apply - Open Network and others more targeted solutions
with a price tag - Tools standardize at a cost but may limit staff
resource requirements - Customized/home grown solutions higher system
maintenance requirements but designed to meet
specific organizational needs
23Build or Buy?
- Determine current application/data repository
limitations (e.g., EHR capabilities, database
logging capabilities, etc.) - Existing system functionality assists in
determining build or buy decision - Current application may suffice if provide
identity management functionality, controls,
audit logs, etc. may not need to do more than
adjust current applications and practices
24Build or Buy - Example
- Simple tools in a small to medium sized
organization to track roles - Database (desktop or server) or spreadsheet
development - Limited roles require minimal complexity
- Combine manual processes with electronic tracking
25Build or Buy - Example
- Large organizations
- Computer Associates, BMC, etc. enterprise tool
for more than identity management - Limiting roles when configuring systems
- Automated system queries role integrity
validation (more difficult with legacy systems)
26Summary
- Regulatory requirement and good business sense
- Dont skimp on planning or resources
- Sell it resources required, ROI difficult to
measure, easier to sell as insurance policy - Adequate maintenance resources regular audits
key to reap identity management benefits - Identity management complexity depends on needs
and not regulations
27Resources
- National Institute of Standards Technology
(NIST) RBAC Web Site http//csrc.nist.gov/rbac - Hewlett Packard on Identity Management
http//www.hpl.hp.com/techreports/1999/HPL-1999-59
.html - SANS on Identity Management http//www.sans.org/
infosecFAQ/securitybasics/RBAC.htm
28Resources
- KnowledgeStorm (search on access control)
http//www.KnowledgeStorm.com - Role based management vs. RBAC
http//www.doc.ic.ac.uk/ecl1/papers/rbac97.pdf - Workgroup for Electronic Data Interchange (WEDI)
http//www.wedi.org
29Resources Vendors
- OpenNetwork http//www.opennetwork.com
- Waveset http//www.waveset.com
- Computer Associates http//www.computerassociate
s.com - Blockade Systems http//www.blockade.com
- Not an endorsement examples only
30QA