Security and Privacy in
SharePoint 2010: Healthcare
Marie-Michelle Strah, PhD
Richmond SharePoint User Group
August 31, 2011
http://lifeincapslock.com

http://www.sswug.org/usercenter/profile.aspx?id=563806
          www.broadpoint.net

                 http://www.meetup.com/fedspug-wspdc
Objectives
• ARRA/HITECH: INFOSEC and
  connected health information
• Reference models: security, enterprise
  architecture and compliance for
  healthcare
• Overview of privacy and security in
  SharePoint Server 2010
Planning for Security and the “Black Swan”
Privacy
• Data (opt in/out)
• PHI
• PII

“Black Swans”

• Consumer
  Engagement
• Business
  Associates
= ( ∗  )
Information Security (Collaborative Model)
Equals
People (all actors and agents)
Times
Architecture (technical, physical and
administrative)
From HIPAA to HITECH…
• Health Insurance Portability and
  Accountability Act of 1996 (HIPAA) (Pub L
  104–191, 110 Stat 1936)
• The Health Information Technology for
  Economic and Clinical Health Act (HITECH
  Act), enacted on February 17, 2009
• American Recovery and Reinvestment Act
  of 2009 (ARRA) (Pub L 111-5, 123 Stat 115)
= ( ∗  ) do the HITECH math…
                          Application of HIPAA Security
                          Standards to Business
“Business Associates”:    Associates
• Legal                   42 USC §17931
• Accounting
• Administrative          New Security Breach
• Claims Processing       Requirements
• Data Analysis           42 USC §17932(j)
• QA
• Billing                 Electronic Access Mandatory for
45 CFR §160.103           Patients 42 USC 17935(e)

Consumer Engagement       Prohibited Sale of PHI without
                          Patient Authorization 42 USC
                          §17935(d)
ONC (Office of the
National Coordinator for
Healthcare IT)

• Health Information
  Exchange (HIE)
• Accountable Care
  Organizations (ACO)
• “Meaningful Use”

• Interoperability
• Service Oriented
  Architecture (SOA)
  Models for Healthcare
  Information Technology

• Certification (ANSI) June
  2011
• Conformance Testing
  (NIST)
Microsoft Connected Health Framework Business and Technical
Framework (Joint Architecture)
Electronic Healthcare = Complexity
Increases Opportunity for “Black Swans” (Security and Privacy
Risk)
SOA “Hub” Model reduces complexity and variability while maintaining
                collaboration and interoperability
Codeplex: Health Connection
          Engine
 http://hce.codeplex.com/
 • SOA
 • “Plug and Play”
 • Message represent clinical events, not data
   items
 • EHR data federated
 • Connection to existing messaging
   infrastructures
SharePoint 2010 as part of a
Connected Health Framework

• NOT a standalone solution
• Technical barriers
• Data barriers
• Staffing barriers
 Office Business Applications (Office and
    SharePoint) as part of healthcare
         information architecture
Security Architecture – SPS2010

                                 UPM




                                                                                                Hardware
Authorization




                                                                  Services
                                                      Business Connectivity
                Authentication         Permissions                            Data Level                   Endpoint
                Federated ID           Security                               Security                     Security
                Classic/Claims         Groups                                 LOB Integration              Mobile
                IIS/STS                                                                                    Remote




                                                                                              
   = ( ∗  )
Behavioral Factors:
Security Architecture – SPS2010
             • #hcsm
             • User population
               challenges
                -healthcare/providers
                -business associates
             • “Prurient interest”


                               
 = ( ∗  )
Why data security and privacy should matter to
    your SharePoint Administrator…

    Unfortunately, security and governance are absent
    in many cases

    Jay Simcox: Proactive vs. reactive approach




•   https://www.nothingbutsharepoint.com/sites/eusp/Pages/sharepoint-data-
    security-and-privacy-information-why-should-it-matter-to-you.aspx
Security Planning and SharePoint 2010
• Encryption
• Data at rest/data in motion
• Perimeter topologies
• Segmentation and compartmentalization
  of PHI/PII (logical and physical)
• Wireless (RFID/Bluetooth)
• Business Continuity
• Backup and Recovery
Security Planning and SharePoint 2010
 • Plan permission levels and groups (least
   privileges) – providers and business
   associates
 • Plan site permissions
 • Fine-grained permissions (item-level)
 • Security groups (custom)
 • Contribute permissions
Additional Security Planning
Considerations (SharePoint 2010)
 • Content types (PHI/PII)
 • ECM/OCR
 • Business Connectivity Services and Visio Services
   (external data sources)
    – Excel, lists, SQL, custom data providers
    – Integrated Windows with constrained
      Kerberos
 • Metadata and tagging (PHI/PII)
 • Blogs and wikis (PHI)
SharePoint 2010: Identity and Access
Management in Healthcare
• SharePoint as enabler for healthcare:
   – Access tracking and audits
   – Access controls
• Recommend: third party tools (ControlPoint, AvePoint,
  etc.)
• Recommend: IAM Solutions
   – Mobility
   – Workstations/Proximity
Best Practices - Prevention
• Involve HIPAA specialists early in the planning process.
  (This is NOT an IT problem)
• Consider removing PHI from the equation.
  (Compartmentalization and segregation)
• Evaluate the outsourcing option. (Example: FPWeb)
• Look to experts to help with existing implementations.
  (Domain expertise in healthcare and clinical workflow as
  well as HIPAA/HITECH privacy and security)
• Use connected health framework reference model and
  other HC specific applications (Dynamics CRM for Patient
  Relationship Management/Case Management,
  HealthVault, Amalga, IAM)
Adapting the Joint Commission
Continuous Process Improvement Model…

       Plan

       • Technical, Physical, Administrative Safeguards

       Document

       • Joint Commission, Policies, Procedures, IT Governance

       Train

       • Clinical, Administrative and Business Associates

       Track

       • Training, Compliance, Incidents, Access…. everything

       Review

       • Flexibility, Agility, Architect for Change
Case Studies
• SharePoint 2007 Upgrade – Behavioral
  Health
• SharePoint 2010 and Clinical Trial Data
  – Research (Biotech and Pharma)
• Patient Relationship Management
  (Consumer Engagement) – SharePoint
  2010 and CRM
Questions?
http://lifeincapslock.com

http://www.sswug.org/usercenter/profile.aspx?id=563806
          www.broadpoint.net

                 http://www.meetup.com/fedspug-wspdc

More Related Content

PDF
Securing Microsoft Technologies for HITECH Compliance
PDF
Securing Microsoft Technologies for HITECH Compliance
PDF
EnterpriseCollaboration_SolutionOverview_06Jun2016
PPTX
Data Loss Prevention in O365
PPTX
Shibboleth identity provider (idp) what it is, and why you should consider a ...
PPTX
2010 07 BSidesLV Mobilizing The PCI Resistance 1c
PDF
Hexnode Identity and Access Management solution
PDF
Making Your E Biz Legal
Securing Microsoft Technologies for HITECH Compliance
Securing Microsoft Technologies for HITECH Compliance
EnterpriseCollaboration_SolutionOverview_06Jun2016
Data Loss Prevention in O365
Shibboleth identity provider (idp) what it is, and why you should consider a ...
2010 07 BSidesLV Mobilizing The PCI Resistance 1c
Hexnode Identity and Access Management solution
Making Your E Biz Legal

What's hot (20)

PDF
CyberSecurity in a World of Connected Devices: IoT Security
PPTX
Using Microsoft Dynamic Access Control to create Information Barriers for SEC...
PPTX
Intel IT's Identity and Access Management Journey
PPTX
Need of Adaptive Authentication in defending the borderless Enterprise
PDF
Hitachi ID Identity and Access Management Suite
PPTX
Con 8810 who should have access to what - final
PDF
Requirements for Implementing Data-Centric ABAC
PDF
Veriphyr bright talk 20120523
PDF
Addressing Gaps in Your Cyber Security
PDF
Digital documents & e-discovery
PDF
Entrust Physical & Logical Access Solutions
PPTX
Con8828 justifying and planning a successful identity management upgrade final
PPTX
Con8896 securely enabling mobile access for business transformation - final
PDF
EDW Webinar: Designing Master Data Services for Application Integration
PPTX
Seclore FileSecure HotFolder Walkthrough
PDF
8 i internet_security
PPTX
Identity Management
PDF
IntraLinks Company Overview
PDF
The Weakest Point of Security in IoT
PPTX
Identity & access management
CyberSecurity in a World of Connected Devices: IoT Security
Using Microsoft Dynamic Access Control to create Information Barriers for SEC...
Intel IT's Identity and Access Management Journey
Need of Adaptive Authentication in defending the borderless Enterprise
Hitachi ID Identity and Access Management Suite
Con 8810 who should have access to what - final
Requirements for Implementing Data-Centric ABAC
Veriphyr bright talk 20120523
Addressing Gaps in Your Cyber Security
Digital documents & e-discovery
Entrust Physical & Logical Access Solutions
Con8828 justifying and planning a successful identity management upgrade final
Con8896 securely enabling mobile access for business transformation - final
EDW Webinar: Designing Master Data Services for Application Integration
Seclore FileSecure HotFolder Walkthrough
8 i internet_security
Identity Management
IntraLinks Company Overview
The Weakest Point of Security in IoT
Identity & access management
Ad

Viewers also liked (19)

PPTX
Twitter ppt18.12.2010
PPT
Sam Laird of Mashable on the Digital and Social Media Sports Podcast, episode 4
DOCX
Pourquoi MOI.4
PPTX
American Tales of Social Justice Engagement
PPTX
Sundance Vacations and Travel Advantage Network Case Study
PDF
Edicto 2013
PPTX
My hoilday picture album
PDF
5 Charitable Gifts You Can Buy for the Price of an iPhone 5S
DOCX
Suco de Clorofila do Programa Terrapia
PPTX
The Global Goals for Sustainable Development: The world's most important bran...
PDF
[WEBINAR] Kaliterre : 10 raisons d'intégrer l'éco-conception logicielle
PPTX
Newsworks E.ON effectiveness
PDF
Testing/Manufacture/Izod Impact Tester For Metal Testing
PDF
Mind the Gap - State of the Browser 2015
PDF
Generation digital – Was der digitale Automobilkunde heute von Herstellern un...
PDF
Flat design for a non flat world
DOCX
A avaliação deve orientar a aprendizagem
PDF
Posten Norge Achieves Economies of Scale through Efficient IT Transition
Twitter ppt18.12.2010
Sam Laird of Mashable on the Digital and Social Media Sports Podcast, episode 4
Pourquoi MOI.4
American Tales of Social Justice Engagement
Sundance Vacations and Travel Advantage Network Case Study
Edicto 2013
My hoilday picture album
5 Charitable Gifts You Can Buy for the Price of an iPhone 5S
Suco de Clorofila do Programa Terrapia
The Global Goals for Sustainable Development: The world's most important bran...
[WEBINAR] Kaliterre : 10 raisons d'intégrer l'éco-conception logicielle
Newsworks E.ON effectiveness
Testing/Manufacture/Izod Impact Tester For Metal Testing
Mind the Gap - State of the Browser 2015
Generation digital – Was der digitale Automobilkunde heute von Herstellern un...
Flat design for a non flat world
A avaliação deve orientar a aprendizagem
Posten Norge Achieves Economies of Scale through Efficient IT Transition
Ad

Similar to Security and Privacy in SharePoint 2010: Healthcare (20)

PDF
Securing Microsoft Technologies for HITECH Compliance
PPTX
Balancing data democratization with comprehensive information governance: bui...
PDF
Consumerization of IT: Mobile Infrastructure, Support and Security
PDF
NHIN Privacy & Security
PDF
Big Data Everywhere Chicago: The Big Data Imperative -- Discovering & Protect...
PPTX
Office 365 : Data leakage control, privacy, compliance and regulations in the...
PPTX
Connecting the Healthcare Ecosystem - An Architecture for Improved Health
PDF
Enterprise Security Architecture: From access to audit
PDF
Responsible AI & Cybersecurity: A tale of two technology risks
PPTX
2011 IIA Pittsburgh Grant Thornton LLP Presentation (Nov 2011)
PPTX
B2 - The History of Content Security: Part 2 - Adam Levithan
PPT
Privacy audittalkfinal
PDF
Share point encryption
PPTX
10052012 luc vervenne synergetics van syntax portfolio naar semantische uitwi...
PPTX
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
PDF
Square Pegs In Round Holes: Rethinking Data Availability in the Age of Automa...
PDF
Healthcare Compliance & Regulatory Challenges
PDF
Data Virtualization: Introduction and Business Value (UK)
PDF
6 aproaches
PDF
KASHTECH AND DENODO: ROI and Economic Value of Data Virtualization
Securing Microsoft Technologies for HITECH Compliance
Balancing data democratization with comprehensive information governance: bui...
Consumerization of IT: Mobile Infrastructure, Support and Security
NHIN Privacy & Security
Big Data Everywhere Chicago: The Big Data Imperative -- Discovering & Protect...
Office 365 : Data leakage control, privacy, compliance and regulations in the...
Connecting the Healthcare Ecosystem - An Architecture for Improved Health
Enterprise Security Architecture: From access to audit
Responsible AI & Cybersecurity: A tale of two technology risks
2011 IIA Pittsburgh Grant Thornton LLP Presentation (Nov 2011)
B2 - The History of Content Security: Part 2 - Adam Levithan
Privacy audittalkfinal
Share point encryption
10052012 luc vervenne synergetics van syntax portfolio naar semantische uitwi...
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
Square Pegs In Round Holes: Rethinking Data Availability in the Age of Automa...
Healthcare Compliance & Regulatory Challenges
Data Virtualization: Introduction and Business Value (UK)
6 aproaches
KASHTECH AND DENODO: ROI and Economic Value of Data Virtualization

More from Marie-Michelle Strah, PhD (15)

PDF
Strategic, Privacy and Security Considerations for Adoption of Cloud and Emer...
PDF
It's About the Data, Stupid: Mobile Security and BYOD for Healthcare
PPTX
The Myth of the SharePoint Unicorn: Recruiting and Staffing SharePoint Teams ...
PPTX
Enterprise Architecture Planning: 3 Things You Need to Know About SharePoint ...
PPTX
Relational Productivity Applications: SharePoint 2010 and CRM 2011
PPTX
SharePoint 2010 and Web Services: Extending Dynamics GP 2010 R2
PPTX
Microsoft Convergence DayOne: Leveraging SharePoint within Your Dynamics GP W...
PPTX
Best Practices in Supply Chain Management: SharePoint
PPTX
Best Practices in SharePoint for Healthcare: US Army Medical Command
PPTX
Case Study for a SharePoint SDLC
PPTX
Microsoft Technologies and Work Management Success and Women in SharePoint: D...
PPTX
Change Management and User Adoption in Hierarchical Organizations: SharePoint...
PPTX
Business Process Re-Engineering and Improved Healthcare Outcomes
PPTX
Tricky Fit: Knowledge Management and the DoD (Healthcare) - May 2010 Update
PPTX
Tricky Fit: Knowledge Management and SharePoint (Healthcare)
Strategic, Privacy and Security Considerations for Adoption of Cloud and Emer...
It's About the Data, Stupid: Mobile Security and BYOD for Healthcare
The Myth of the SharePoint Unicorn: Recruiting and Staffing SharePoint Teams ...
Enterprise Architecture Planning: 3 Things You Need to Know About SharePoint ...
Relational Productivity Applications: SharePoint 2010 and CRM 2011
SharePoint 2010 and Web Services: Extending Dynamics GP 2010 R2
Microsoft Convergence DayOne: Leveraging SharePoint within Your Dynamics GP W...
Best Practices in Supply Chain Management: SharePoint
Best Practices in SharePoint for Healthcare: US Army Medical Command
Case Study for a SharePoint SDLC
Microsoft Technologies and Work Management Success and Women in SharePoint: D...
Change Management and User Adoption in Hierarchical Organizations: SharePoint...
Business Process Re-Engineering and Improved Healthcare Outcomes
Tricky Fit: Knowledge Management and the DoD (Healthcare) - May 2010 Update
Tricky Fit: Knowledge Management and SharePoint (Healthcare)

Recently uploaded (20)

PPTX
The various Industrial Revolutions .pptx
PDF
Enhancing plagiarism detection using data pre-processing and machine learning...
PDF
A proposed approach for plagiarism detection in Myanmar Unicode text
PDF
Comparative analysis of machine learning models for fake news detection in so...
DOCX
search engine optimization ppt fir known well about this
PDF
Flame analysis and combustion estimation using large language and vision assi...
PDF
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
PDF
Consumable AI The What, Why & How for Small Teams.pdf
PDF
Taming the Chaos: How to Turn Unstructured Data into Decisions
PPT
What is a Computer? Input Devices /output devices
PDF
The influence of sentiment analysis in enhancing early warning system model f...
PDF
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
PDF
UiPath Agentic Automation session 1: RPA to Agents
PPTX
Custom Battery Pack Design Considerations for Performance and Safety
PPTX
Configure Apache Mutual Authentication
PDF
How IoT Sensor Integration in 2025 is Transforming Industries Worldwide
PDF
Five Habits of High-Impact Board Members
PDF
CloudStack 4.21: First Look Webinar slides
PPTX
Modernising the Digital Integration Hub
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
The various Industrial Revolutions .pptx
Enhancing plagiarism detection using data pre-processing and machine learning...
A proposed approach for plagiarism detection in Myanmar Unicode text
Comparative analysis of machine learning models for fake news detection in so...
search engine optimization ppt fir known well about this
Flame analysis and combustion estimation using large language and vision assi...
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
Consumable AI The What, Why & How for Small Teams.pdf
Taming the Chaos: How to Turn Unstructured Data into Decisions
What is a Computer? Input Devices /output devices
The influence of sentiment analysis in enhancing early warning system model f...
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
UiPath Agentic Automation session 1: RPA to Agents
Custom Battery Pack Design Considerations for Performance and Safety
Configure Apache Mutual Authentication
How IoT Sensor Integration in 2025 is Transforming Industries Worldwide
Five Habits of High-Impact Board Members
CloudStack 4.21: First Look Webinar slides
Modernising the Digital Integration Hub
Final SEM Unit 1 for mit wpu at pune .pptx

Security and Privacy in SharePoint 2010: Healthcare

  • 1. Security and Privacy in SharePoint 2010: Healthcare Marie-Michelle Strah, PhD Richmond SharePoint User Group August 31, 2011
  • 3. Objectives • ARRA/HITECH: INFOSEC and connected health information • Reference models: security, enterprise architecture and compliance for healthcare • Overview of privacy and security in SharePoint Server 2010
  • 4. Planning for Security and the “Black Swan”
  • 5. Privacy • Data (opt in/out) • PHI • PII “Black Swans” • Consumer Engagement • Business Associates
  • 6. = ( ∗ ) Information Security (Collaborative Model) Equals People (all actors and agents) Times Architecture (technical, physical and administrative)
  • 7. From HIPAA to HITECH… • Health Insurance Portability and Accountability Act of 1996 (HIPAA) (Pub L 104–191, 110 Stat 1936) • The Health Information Technology for Economic and Clinical Health Act (HITECH Act), enacted on February 17, 2009 • American Recovery and Reinvestment Act of 2009 (ARRA) (Pub L 111-5, 123 Stat 115)
  • 8. = ( ∗ ) do the HITECH math… Application of HIPAA Security Standards to Business “Business Associates”: Associates • Legal 42 USC §17931 • Accounting • Administrative New Security Breach • Claims Processing Requirements • Data Analysis 42 USC §17932(j) • QA • Billing Electronic Access Mandatory for 45 CFR §160.103 Patients 42 USC 17935(e) Consumer Engagement Prohibited Sale of PHI without Patient Authorization 42 USC §17935(d)
  • 9. ONC (Office of the National Coordinator for Healthcare IT) • Health Information Exchange (HIE) • Accountable Care Organizations (ACO) • “Meaningful Use” • Interoperability • Service Oriented Architecture (SOA) Models for Healthcare Information Technology • Certification (ANSI) June 2011 • Conformance Testing (NIST)
  • 10. Microsoft Connected Health Framework Business and Technical Framework (Joint Architecture)
  • 11. Electronic Healthcare = Complexity Increases Opportunity for “Black Swans” (Security and Privacy Risk)
  • 12. SOA “Hub” Model reduces complexity and variability while maintaining collaboration and interoperability
  • 13. Codeplex: Health Connection Engine http://hce.codeplex.com/ • SOA • “Plug and Play” • Message represent clinical events, not data items • EHR data federated • Connection to existing messaging infrastructures
  • 14. SharePoint 2010 as part of a Connected Health Framework • NOT a standalone solution • Technical barriers • Data barriers • Staffing barriers Office Business Applications (Office and SharePoint) as part of healthcare information architecture
  • 15. Security Architecture – SPS2010 UPM Hardware Authorization Services Business Connectivity Authentication Permissions Data Level Endpoint Federated ID Security Security Security Classic/Claims Groups LOB Integration Mobile IIS/STS Remote = ( ∗ )
  • 16. Behavioral Factors: Security Architecture – SPS2010 • #hcsm • User population challenges -healthcare/providers -business associates • “Prurient interest” = ( ∗ )
  • 17. Why data security and privacy should matter to your SharePoint Administrator… Unfortunately, security and governance are absent in many cases Jay Simcox: Proactive vs. reactive approach • https://www.nothingbutsharepoint.com/sites/eusp/Pages/sharepoint-data- security-and-privacy-information-why-should-it-matter-to-you.aspx
  • 18. Security Planning and SharePoint 2010 • Encryption • Data at rest/data in motion • Perimeter topologies • Segmentation and compartmentalization of PHI/PII (logical and physical) • Wireless (RFID/Bluetooth) • Business Continuity • Backup and Recovery
  • 19. Security Planning and SharePoint 2010 • Plan permission levels and groups (least privileges) – providers and business associates • Plan site permissions • Fine-grained permissions (item-level) • Security groups (custom) • Contribute permissions
  • 20. Additional Security Planning Considerations (SharePoint 2010) • Content types (PHI/PII) • ECM/OCR • Business Connectivity Services and Visio Services (external data sources) – Excel, lists, SQL, custom data providers – Integrated Windows with constrained Kerberos • Metadata and tagging (PHI/PII) • Blogs and wikis (PHI)
  • 21. SharePoint 2010: Identity and Access Management in Healthcare • SharePoint as enabler for healthcare: – Access tracking and audits – Access controls • Recommend: third party tools (ControlPoint, AvePoint, etc.) • Recommend: IAM Solutions – Mobility – Workstations/Proximity
  • 22. Best Practices - Prevention • Involve HIPAA specialists early in the planning process. (This is NOT an IT problem) • Consider removing PHI from the equation. (Compartmentalization and segregation) • Evaluate the outsourcing option. (Example: FPWeb) • Look to experts to help with existing implementations. (Domain expertise in healthcare and clinical workflow as well as HIPAA/HITECH privacy and security) • Use connected health framework reference model and other HC specific applications (Dynamics CRM for Patient Relationship Management/Case Management, HealthVault, Amalga, IAM)
  • 23. Adapting the Joint Commission Continuous Process Improvement Model… Plan • Technical, Physical, Administrative Safeguards Document • Joint Commission, Policies, Procedures, IT Governance Train • Clinical, Administrative and Business Associates Track • Training, Compliance, Incidents, Access…. everything Review • Flexibility, Agility, Architect for Change
  • 24. Case Studies • SharePoint 2007 Upgrade – Behavioral Health • SharePoint 2010 and Clinical Trial Data – Research (Biotech and Pharma) • Patient Relationship Management (Consumer Engagement) – SharePoint 2010 and CRM