Let's Build a Responsible Cyber Society

Visit
www.ceac.in


Visit
www.arbitration.in


 

Total Information Assurance Framework for Health Care Industry

(TIAF4HC)

By

Naavi

Health Care industry world over is concerned with the need to protect the Privacy of patient information. While there is a focus on the Privacy and Information Security requirements of Health Care industry in USA in the form of HIPAA-HITECH acts, in India the health care industry is yet to develop the required focus.

Indian Health Care industry is in the initial stages of adopting IT into its operations and very few of the hospitals have gone beyond the first stages of implementation of IT. At the current stage the managements are more interested in the functional aspects of IT and are not providing the right priority to Information Security.

It is however necessary to remind the Indian Health Care industry that India has a law that is similar to HIPAA in the form of Information Technology Act 2000 as amended in 2008 (ITA 2008). Under the provisions of this act and the rules notified under Section 43A on April 11, 2011, information relating to “Physical, Physiological and Mental Health condition” (Health Information) is considered as “Sensitive Personal Information” and requires to be protected by a “Reasonable Security Practice”. Failure in meeting this obligation will place a civil liability for payment of compensation under Section 43A of the Act. It may also result in criminal liability under Section 72A in certain cases.

In view of this provision of ITA 2008, it is essential for Indian Health Care industry to implement an information assurance program that may be considered as “Reasonable Security Practice”.

Naavi who has developed a general information security framework IISF-309 for ITA 2008 compliance and LIPS1008 framework for legal information protection in India has now developed a separate framework tailored for the Indian Health Care industry. This adopts the best practices of HIPAA and ISO 27001 already reflected in IISF309 and LIPS 1008 but is customized for the requirements of the Health Care industry.  It takes into account the present status of the industry where the information security adoption is at a preliminary stage as compared to industries such as the banking industry. Though this framework is presented for the Health Care industry, it is also suitable for other industries where the use of IT is yet to mature.

The framework is tentatively recognized as ‘Total Information Assurance Framework for Indian Health Care industry” (TIAF4HC). It is recommended for consideration by the industry for adoption as the industry standard.

The inaugural version of the framework would be referred to as TIAF4HC (v1/1112).

The detailed specifications will be developed by Ujvala Consultants Pvt Ltd and explained through these columns in a series of articles.

 

The Background

Information Security is normally recognized with three parameters namely

a)     Confidentiality

b)    Integrity

c)     Availability

This is the CIA approach which is used in the basic ISO 27001 approach.

The “Techno Legal Information Security” principle that Naavi has been suggesting extends the above three pronged approach to two other parameters such as Authentication and Non Repudiation that is recognized as an “Information Assurance” approach. With legal compliance comes an assurance of mitigation of the “Liability Risk”. Mitigation of “Liability Risk” arises both from the ability to defend against being held liable for a breach as well as the ability to recover compensation for the breach from another. Hence in this approach the end objective extends from DRP-BCP to DLS-OLS. (DLS=Defensive legal shield and OLS=Offensive legal sword).

The COBIT approach is often associated with the term “Information Assurance” rather than Information Security.

Considering the practical difficulties in implementation of Information Security, Naavi has been advocating a “Three Dimensional” model which extends the “Techno legal” approach further to include “Behavioral Science”. In this approach the importance of the “People factor” is recognized not merely by the need for awareness training but from the point of view of making them behave in a secure manner.

Naavi has tried to codify these thoughts in the “Theory of Information Security” and the Indian Information Security Framework.

The “Theory of Information Security” is built around a “Pentagon Model” where implementation of Information Security in an organization is considered as bound by five aspects namely

a)     Awareness

b)    Acceptance

c)     Availability

d)    Mandate

e)     Inspiration.

The theory postulates that for achieving a satisfactory implementation of Information Security in an organization, the users should first be “Aware” of the threats, vulnerabilities and security aspects. However mere “awareness” does not lead to implementation and the users need to “accept” the need for security. This requires a change to be brought in the minds of the users. In view of the “human” factor involved in this conversion the term “Control” used in other frameworks are used as “Strategies” in this approach.

“Availability” refers to all aspects of security that are within the control of the organization such as placement of appropriate software tools necessary for the information security.

“Mandate” recognizes both the existence of external legal compulsions but also the strategic value of internal sanctions that support the legal impositions and security objectives.

While “Availability” and “Awareness” are controlled by the organization, “Mandate” is imposed by the law and  can be supported additionally as a strategic internal policy, “Acceptance” and “Inspiration” is predominantly controlled by the users themselves. The Organization can only facilitate “Acceptance” or ”Inspiration” by appropriate strategies but the user has the greater say in the end result.

Based on the above thoughts, Naavi presented the IISF 309 framework to provide the necessary guidance to the organization for implementation of Information Security.

The IISF 309  was an attempt to zero in on the responsibilities of different parts of an organization towards achieving the Information Assurance objectives. In the version 5 of the framework, 25 different steps have been identified. This includes top management decisions, policy formulations as well as requirements to be fulfilled by the different departments such as the HR,IT or General administration. Detailed specifications have also been drawn on each of the 25 steps to be implemented for three different levels of implementation.

While working on the IISF framework which was based on the TISM, for the purpose of “measurability” , certain suggestions have also been made similar to CMMI model of identifying the level of maturity capability reached in an organization at a point of time and how it can be monitored over a period of time.

It may be said that these suggestions are subject to a need for further refinement through research both at the academic and industry level.

In the light of this background, Naavi looked at the requirements of the Health Care industry in India and the outcome has been the industry specific suggested framework “TIAF4HC”.

TIAF4HC is an “Information Assurance Framework” specifically designed to meet the requirements of Indian Health Care industry such as the Hospitals. Companies engaged in medical transcription or insurance billing or providing other services to the US clients are already having the mandatory framework of HIPAA-HITECH.

While HIPAA-HITECH framework is a good framework for adoption by any Health Care or other companies, it was felt that there was a need to provide a compliance path with gradual implementation of security measures rather than providing one large framework such as HIPAA-HITECH and determine whether a company is “Compliant” or “Non Compliant”.

Though we say that “Security is as strong as the weakest link” and there are no “half measures”, in practice, no organization can jump to the highest level of information security in one step. Auditors are therefore confronted frequently with the question of whether the suggested framework is commensurate with the nature and size of activity of the organization. In the absence of proper guidance to break the compliance into smaller achievable steps, auditors were forced to compromise on their reports stating that certain controls were considered “Not Necessary”. This involved a subjective assessment often under unavoidable pressure from the management. While some auditors stood their ground and dubbed a client “Non Compliant” for reasons they considered reasonable and fair, the management felt that the auditor was needlessly rigid in his approach.

While a rigid approach of the auditor is acceptable in the case of a “Mandatory Audit” conducted by a regulatory agency, when a progressive management initiates an audit as an improvement measure of its own volition, the rigidity of the auditor could be considered misplaced and dysfunctional.

Naavi has been an advocate of “Self Regulation” and hence even where ITA 2008 compliance audit has not been mandatory, he has strongly favoured such an audit as good corporate governance.

However many managements feel that they are not “Big Enough” for ISO 27001 or COBIT or ITA 2008 audit and hence end up not doing anything at all towards security.

Similarly Indian health care industry at present may not be ready for a full HIPAA implementation and hence they are not considering any structured approach to information assurance.

Instead of just lamenting on the non compliance, Naavi therefore felt the need to put in place a suggestion which can be implemented by most organizations who would like to achieve acceptable levels of Information Assurance in smaller steps. The feeling of having achieved “Level 1” or “Level 2” would act as a motivation for the organizations to start an information assurance program which they would otherwise not begin at all.

This approach which is generally referred to as TIAF4MI (Total Information Assurance Framework for modular implementation) is referred to as TIAF4HC as a health care industry specific framework.

Though the approach originated in the light of the felt need of the Health Care industry in India, it is Naavi’s considered opinion that the approach may also be found suitable for other organizations trying honestly to achieve greater levels of information assurance competence but are not ready to take a single large leap to “satisfactory zone of safety”.

TIAF4MI/TIAF4HC tries to achieve this objective of “Satisfactory information assurance through small doses” rather than attempting an over dose which may be rejected by the system altogether.

Breaking the “Satisfactory Information Assurance” into achievable sub goals and the manner in which this classification is made in the framework is considered the USP of this framework.

The end result of achieving say all levels of assurance under IAF4MI may be same as or should be better than a faithful implementation of assurance under COBIT or under HIPAA or under ISO 27001.

But IAF4MI is designed to assist a voluntary compliance program better than the other formats.

Let’s look deeper into the concept of Information Assurance through modular implementation in the next part of the article.

Modular Approach to Information Assurance

Information Assurance (IA) is an augmented concept of Information Security and extends the three core principles of IS namely Confidentiality, Integrity and Availability (CIA), to Authentication and Non Repudiation, and incorporates Legal compliance as the second dimension. 

For each of these aspects of information assurance, the management need to ensure “Availability of the tools” and impose necessary “Mandates”.

The “People Factor/Behavioural Science aspect” which is referred to as the “Third Dimension of Information Security” cuts across all dimensions of Information assurance such as Confidentiality, Integrity, Availability, Authentication and Non Repudiation.

At each of these levels the stake holders need to be made “Aware”, their “Acceptance” need to be obtained and steps to be taken to “Inspire” them into implementing the security requirements.

Under the Modular approach to Information Assurance, it is suggested that we re-order the Information Security/Asssurance objectives into different levels as follows.

 

Level

Assurance Objective

Actions

I

Availability of required information to users

Create Awareness*,

 Obtain Acceptance*,

 Make tools Available*,

 Mandate* requirements and

 Promote Inspiration*

II

Integrity of information across time and space

III

Confidentiality of information on a need to know basis

IV

Authentication of information to fix ownership for all information events

V

Non Repudiation of action by any user

 (* Refer Theory of Information Security Motivation)

It may be observed that the usual depiction of CIA +Authentication and Non Repudiation has been put under a hierarchy with priority of achievement moving from Level I to Level V.

The above chart can also be presented in the more familiar Pyramid form as follows:

 

The TIAF4MI model ensures that most organizations which adopt IT for business can achieve Level I. This level is basically functional and most managements address this issue in the first phase since this is directly responsible for the conduct of business. DRP and BCP is part of this level at the simplest form. At level II, the data integrity aspects need to be taken into account At level III confidentiality aspects need to be addressed. Level IV normally has a close relation to Level III and has to be addressed more or less together. Level V addresses the legal aspects of non-repudiation including evidence management.

 A further sub division of A, B and C can be made at each level to distinguish between different levels of implementation maturity such as “Implemented”, “Implemented and tested for functionality”, “Implemented, certified as sustainable” etc.

A more detailed specification would be developed for each level and to some extent will have to be customized for different industries and different organizations.

The objective of the “Framework” is to  provide a direction to an organization to start implementing information security step by step and reach an acceptable level over a period of time. Each level will be a sort of a milestone to mark their journey. For an  auditor, the framework provides a guideline to measure the compliance and provide its certification on whether the organization has reached a given level of compliance.

Further refinement of the framework will be done in due course based on the feedback received and the experience of Naavi and Ujvala Consultants Pvt Ltd. I welcome the views and suggestions from the public in this respect.

Naavi

November 17/18, 2012

[PS: Naavi's approach to IA is broader than the usually recognized definition of IA. Hence Naavi has decided to use the term "Total Information Assurance" in place of Information Assurance in all his discussions. As a result the acronyms will also be changed from IA to TIA where ever applicable in all references in future...Naavi ...19th November 2012]

DOWNLOAD PDF VERSION


Related Article:

Total Information Assurance For Modular Implementation(TIAF4MI)

[Comments welcome]

 


 


Visit
www.Naavi.net

Visit
www.lookalikes.in