5 hours 25 minutes
Hello again and welcome to the Hcs PP certification course with Sai Buri controls to remediate risk.
My name is Shalane Hutchins.
Today we're gonna talk about types of controls and controls related to time.
We talked about controls earlier in the course
and we're going to review them again In the context of risk management.
These three categories of controls administrative,
and technical are expanded upon in the NIST SP 800-66 specifically map to the requirements to find in the hip of security rule.
They can also serve as recommended practices for health care organizations, business associates and other organizations not covered by HIPAA laws.
This defines administrative controls as actions and policies and procedures to manage the selection, development, implementation and maintenance of security measures to protect electronic ph. I and to manage the conduct of the covered entities workforce
in relation to the protection of that information.
The specific administrative control areas are
security management process,
meaning all controls related to conducting a thorough risk assessment and implementing a risk management program,
a signed security responsibility
who is assigned and responsible for risk
who may rely on business units or data owners to assistant identification of risks
and some organizations. There may be a security officer assigned and in smaller organizations, the security person may wear multiple hats
or for security.
These air job controls, such as segregation of duties,
job description, documentation, mandatory vacations and least privileged access.
Additionally, clear termination procedures should be in place to ensure credentials and access to sensitive data is removed upon departure
information, access management,
comprehensive access control policies and management to ensure that personnel have access toe on Lee. The information that is needed to perform their jobs.
Security awareness, training,
security awareness training is a method to inform employees about their roles and expectations surrounding their roles and the information security requirements,
security incident procedures.
Security incidents need to be investigated and followed up on promptly as this is a key mechanism and minimizing losses from an incident and reducing the chance of her parents.
A contingency plan.
A contingency plan or business continuity plan is designed to prepare for any occurrence that could have the ability to impact the company's objectives negatively.
And third party
controls related to third parties are largely administrative as their managed on a contractual rather than operational or technical basis.
This defines physical controls as physical measures, policies and procedures to protect covered entities, Elektronik information systems and related buildings and equipment from natural and environmental hazards and unauthorized intrusion
Facility access controls
should manage the installation maintenance, an ongoing operation of the CCTV surveillance systems, the alarm systems and the card reader access control systems.
Ah, workstation inventory should be well documented, including policies and procedures for effectively deploying servers, laptops and network devices to reduce downtime.
Device and media controls should be documented and enforced to include policies and procedures for adding to inventory and tracking throughout the lifecycle, including backup and ultimately disposal to ensure that sensitive health records are not lost or leaked.
Mystifies technical controls as the technology and policy and procedures for its use that protect Elektronik ph. I and control access to it.
Specific technical control areas are access controls.
Technical access controls need to be well managed to ensure that sensitive health information is only accessible to those that need it to perform their work.
This includes the need to develop policies and procedures that allocate unique user names, toe all staff
tracks and regularly reviews all access to sensitive data
and updates permissions accordingly.
information systems that contain sensitive health information should be monitored and audited on a regular basis, depending upon the nature of a given system. There a system attributes and status information that are written into laws.
These logs should be reviewed for anomalous activities,
and procedure should dictate when certain activity should be reported for further investigation.
Integrity is the principle that information should be protected from intentional, unauthorised or accidental changes.
Sensitive health information stored in files, databases,
systems and networks must be relied upon to make accurate diagnosis and recommendations.
Controls are in place to ensure that information is modified through accepted practices. Sample control and sample controls include air correcting memory,
magnetic disk storage, digital signatures and check some technology.
The core of transmission security is to establish policies and implement procedures for using encryption technology to ensure the confidentiality of sensitive health information while in transit,
healthcare organizations should review their networks as well as the interconnections with third parties to ensure that all egress points and weak spots in the network are covered by these procedures.
Controls related to time allude to a subset of security controls that are of importance during various stages of an information systems lifecycle as it relates to an incident.
Preventive controls are defined by NIST as those that deter, detect and or reduce impacts to the system.
Preventive measures are preferable and that the cost is less than the majority of recovery activities.
Studies show that the relative costs of fixing defects in production is 30 toe 100 times more expensive.
Detective controls reduce the risk of exposing sensitive personal and health information. Detective controls include firewalls, intrusion intrusion detection and prevention systems,
data loss prevention or DLP,
network access controls or KNACK
and other mechanisms to deter malicious actors from accessing this highly sensitive information.
The key is developing layer defenses and strong detective controls toe identify when a breach has occurred and, to the extent possible, reduce the effectiveness of the breach.
Corrective controls relate to those activities required when addressing a security incident.
if malware is discovered on the system, the Incident Response Team made disconnect the machine from the network in order to ensure that it doesn't spread to other systems in the organization
Recovery controls relate to those activities that provide for the timely restoration of a system, service or operation to her protection state after a security incident.
This is the time when recovery plans are executed, lessons are learned, our lessons learned are incorporated back into the recovery planning process and the activities and outcomes are communicated to the stakeholders.
So in summary, what we talked about today, where different types of controls and controls related to time
next up is risk of response.