Upgrade to Pro — share decks privately, control downloads, hide ads and more …

HIPAA Dev Ops: Architecting Layers of Responsibility

HIPAA Dev Ops: Architecting Layers of Responsibility

Originally presented at AWS re:Invent 2014, as part of a panel talk, "HLS401: Architecting for HIPAA Compliance on AWS"

Full panel slides here: http://www.slideshare.net/AmazonWebServices/hls401-architecting-for-hipaa-compliance-on-aws-aws-reinvent-2014

Video here: https://www.youtube.com/watch?v=c_06psX2obI

Frank Macreery

November 12, 2014
Tweet

More Decks by Frank Macreery

Other Decks in Programming

Transcript

  1. © 2014 Amazon.com, Inc. and its affiliates. All rights reserved.

    May not be copied, modified, or distributed in whole or in part without the express consent of Amazon.com, Inc. November 12, 2014 | Las Vegas HIPAA Dev Ops: Architecting Layers of Responsibility Frank Macreery, Aptible
  2. Layers of Responsibility Physical Safeguards • Facility Management • Physical

    Contingency Plans General Technical Safeguards • Encryption • Backups • Instance Access (SSH) Application-Specific
 Technical Safeguards • Authentication • Access Controls • PHI Access Logs
  3. Division of Responsibility • CloudFormation template sets up secure network

    layout • Chef (OpsWorks) recipes + custom tools manage general security functions like SSL termination, EBS volume encryption, and backups • Applications run within Docker containers and manage their own framework-specific security/logging
  4. General Safeguard: Unique SSH Identities • Regulatory Requirement: "Assign a

    unique name and/or number for identifying and tracking user identity. " • Aptible implementation: IAM + OpsWorks • Other potential solutions: Custom Chef recipes + data bag for authorized keys
  5. OpsWorks Deny by Default • SSH access is granted: –

    Only to IAM user – Only on a temporary basis • Chef-configured cron task locks down instances hourly gem install opsworks-cli opsworks allow frank --stack my-stack opsworks lockdown --stack my-stack
  6. General Safeguard: Auditing SSH Access • Regulatory Requirement: "Implement hardware,

    software, and/or procedural mechanisms that record and examine activity in information systems that contain or use electronic protected health information" • Aptible implementation: OpsWorks + Deny by Default + CloudTrail • Other potential solutions: Authy, syslog + Logstash + Elasticsearch + Kibana
  7. Addressing Application-Specific Safeguards • Challenge: Many frameworks, many libraries, many

    specific implementation decisions • Solution: One "compliance API" to manage audit artifacts and mapping from artifact type to requirements, many clients
  8. Application-Specific Safeguard: Authentication Authentication Audit Log (Satisfies requirements) § 164.312(a)(1):

    Access control § 164.312(a)(2)(i): Unique user identification § 164.312(d): Person or entity authentication (…)
  9. Please give us your feedback on this presentation © 2014

    Amazon.com, Inc. and its affiliates. All rights reserved. May not be copied, modified, or distributed in whole or in part without the express consent of Amazon.com, Inc. Join the conversation on Twitter with #reinvent HLS401: Architecting for HIPAA Compliance on AWS