OCR Guidance on Preventing, Mitigating, and Responding to Ransomware
The HHS Office for Civil Rights (OCR) released its Fall Cybersecurity Newsletter, "What Happened to My Data? Update of Preventing, Mitigating and Responding to Ransomware." (December 2, 2019)
OCR
defines ransomware as a type of malicious software (or malware) that attempts to deny
access to a user's data, usually by encrypting the data with a key known only
to the attacker who deployed the ransomware. Generally, in order for a victim
to obtain this key, a ransom payment, which is usually made in cryptocurrency, is required.
These types of attacks pose
a serious threat to HIPAA-covered entities, business associates, and the
electronically protected health information (ePHI) that they hold.
Prevention, Mitigation, and Recovery
According to OCR, while bad
actors have employed new means for identifying victims, their overall methods
of gaining unauthorized access to systems and deploying ransomware remain
generally the same. Phishing emails and vulnerability exploitation (e.g.,
exploiting unpatched operating system or application vulnerabilities) continue
to be the most common attack vectors.
OCR mentions that proper
implementation of several HIPAA Security Rule provisions can help covered
entities and business associates prevent, mitigate, and recover from ransomware
attacks. Here is a breakdown of each.
Security Risk Analysis (SRA) and Risk Management
Under the HIPAA Security
Rule, covered entities and business associates are required to conduct a
thorough and accurate assessment of the potential risks and vulnerabilities to
the confidentiality, integrity, and availability of their ePHI, and implement
security measures sufficient to reduce risks and vulnerabilities to a
reasonable and appropriate level. Yet, a failure to do or a lacking SRA
continues to be the number one deficiency year after year.
Identifying and reducing potential risks and vulnerabilities is key to
making an organization a less inviting target and is crucial to preventing ransomware
attacks. From there, it's just as important to ensure effective security tools such
as anti-malware software and intrusion detection/prevention solutions are
installed to help prevent, detect, and contain attacks.
Information System Activity Review
Covered entities and
business associates are required to regularly review records of information
system activity. Such records can include audit logs, access reports, and
security incident tracking reports.
Effective system monitoring
and review is critical to detecting and containing an attack. Identifying
anomalous activity, especially if the activity is executed with elevated
privileges, can be crucial to identify an attack in progress.
Security Awareness and Training
Perhaps just as important
as an SRA, having a security awareness and training program place is a must.
This is because information system users remain one of the
weakest links in an organization's security posture. OCR goes on to say that social
engineering, including phishing attacks, is one of the most successful
techniques used by threat actors to compromise system security.
A training program should
make users aware of the potential threats they face and inform them on how to
properly respond to them. This is especially true for phishing emails that
solicit login credentials. Additionally, user training on how to report
potential security incidents can greatly assist in an organization's response
process by expediting escalation and notification to proper
individuals.
Security Incident Procedures
An organization's incident
response procedures can greatly limit the damage caused by a ransomware attack.
Organizations may consider addressing ransomware attacks specifically within
its response policies and procedures as mitigation actions may vary between
different types of incidents. Quick isolation and removal of infected devices
from the network and deployment of anti-malware tools can help to stop the
spread of ransomware and to reduce the harmful effects of such ransomware.
Response procedures should be written with sufficient details and be
disseminated to proper workforce members so that they can be implemented and
executed effectively.
Further, organizations may
consider testing their security incident procedures from time to time to ensure
they remain effective. Familiarity with the execution of security incident
procedures should reduce an organization's reaction time and increase its
effectiveness when responding to an actual security incident or
breach. Identifying and responding to suspected security incidents is key
to mitigating potential harm following an intrusion.
Contingency Plan
An effective and robust
contingency plan is essential to recover from a ransomware attack. Proper
implementation of this provision will allow an organization to continue to
operate critical services during an emergency and recover ePHI. Because patient
health and safety may be impacted, tolerance of system downtime is low, and ePHI
availability requirements are high. A covered entity or business associate must
backup ePHI and ensure that it is accessible and recoverable in the event of a
ransomware attack.
Organizations should keep
in mind, that threat actors have recently been actively targeting backup systems
and backup data to prevent recovery. Maintaining recoverable, secure, and
up-to-date backups are one of the most important safeguards against ransomware
attacks.
Additional Security Rule Provisions
OCR mentions the following
additional Security Rule Provisions that should be considered:
- Implementing effective access controls to stop or impede an attacker's movements and access to sensitive data; e.g., by segmenting networks to limit unauthorized access and communications. Further, because of attacks frequently seek elevated privileges (e.g., administrator access), entities may consider solutions that limit the scope of administrator access, as well as solutions requiring stronger authentication mechanisms when granting elevated privileges or access to administrator accounts.
- Ensuring that security measures remain effective as technology changes and new threats and vulnerabilities are discovered (e.g., by updating or patching software and devices to mitigate known vulnerabilities).
While the emergence of
targeted attacks shows that threat actors are adapting to steps taken by
organizations to combat the risk of ransomware infections, OCR believes the
implementation of the robust security measures required by HIPAA can prevent or
greatly reduce the impact of ransomware attacks.
Have Additional Questions?
We can help. Contact us by
email: support@hcp.md or by phone: 855-427-0427.