$30 off During Our Annual Pro Sale. View Details »

What do Secure, HIPAA Compliant, Clouds Mean to SOA in Healthcare?

What do Secure, HIPAA Compliant, Clouds Mean to SOA in Healthcare?

Technical discussion about service oriented architecture (SOA) and HIPAA compliant clouds. This talk was presented at the Object Management Group's (OMG) SOA in Healthcare working group in the Summer of 2011. It covered the following major topics:
* What does HIPAA mean in the cloud?
* Are cloud providers covered by HIPAA?
* Cloud safeguards that can meet HIPAA requirements
* Healthcare SOA In the cloud

Shahid N. Shah

July 14, 2011
Tweet

More Decks by Shahid N. Shah

Other Decks in Technology

Transcript

  1. What do Secure, HIPAA Compliant,
    Clouds Mean to SOA in Healthcare?
    By Shahid N. Shah, CEO
    www.HealthcareGuy.com

    View Slide

  2. 2
    www.netspective.com
    Who is Shahid?
    • 20+ years of software engineering and
    multi-site healthcare system deployment
    experience
    • 12+ years of healthcare IT and medical
    devices experience (blog at
    http://healthcareguy.com)
    • 15+ years of technology management
    experience (government, non-profit,
    commercial)
    • 10+ years as architect, engineer, and
    implementation manager on various EMR
    and EHR initiatives (commercial and non-
    profit)
    Author of Chapter 13,
    “You’re the CIO of your Own
    Office”

    View Slide

  3. 3
    www.netspective.com
    Agenda
    What does HIPAA mean in the cloud?
    Are cloud providers covered by HIPAA?
    Cloud safeguards that can meet HIPAA requirements
    Healthcare SOA In the cloud

    View Slide

  4. HIPAA DISCUSSION

    View Slide

  5. 5
    www.netspective.com
    What does HIPAA compliance mean?
    The rules:
    – http://www.hhs.gov/ocr/privacy/hipaa/administrative/privacyrule
    – http://www.hhs.gov/ocr/privacy/hipaa/administrative/securityrule
    – http://www.hhs.gov/ocr/privacy/hipaa/administrative/securityrule/securityrulepdf.pdf
    Read the rules, don’t take anyone else’s informal
    legal opinion (these are federal regulations).

    View Slide

  6. Protected Health Information (PHI)
    • Name
    • Address -- street address, city,
    county, zip code (more than 3
    digits) or other geographic codes
    • Dates directly related to patient
    • Telephone Number
    • Fax Number
    • email addresses
    • Social Security Number
    • Medical Record Number
    • Health Plan Beneficiary Number
    • Account Number
    • Certificate/License Number
    • Any vehicle or device serial
    number
    • Web URL, Internet Protocol (IP)
    Address
    • Finger or voice prints
    • Photographic images
    • Any other unique identifying
    number, characteristic, or code
    (whether generally available in
    the public realm or not)
    • Age greater than 89 (due to the
    90 year old and over population is
    relatively small)
    http://www.ibm.com/developerworks/industry/library/ind-findpii/index.html

    View Slide

  7. 7
    www.netspective.com
    Most important considerations
    Participants (Specific)
    • Covered Entities [CE]
    (plans, providers,
    clearinghouses)
    • Business Associates
    [BA] (needs data to
    help a CE)
    Safeguards (Guidance)
    • Administrative
    • Physical
    • Technical
    http://www.cms.gov/HIPAAGenInfo/06_AreYouaCoveredEntity.asp
    http://www.hhs.gov/ocr/privacy/hipaa/understanding/coveredentities/businessassociates.html
    http://www.hhs.gov/ocr/privacy/hipaa/administrative/securityrule

    View Slide

  8. 8
    www.netspective.com
    Are cloud providers BAs?
    • A “business associate” is a person or entity that
    performs certain functions or activities that involve the
    use or disclosure of protected health information on
    behalf of, or provides services to, a covered entity.
    • A member of the covered entity’s workforce is not a
    business associate. A covered health care provider,
    health plan, or health care clearinghouse can be a
    business associate of another covered entity.
    • BAA: A covered entity’s contract or other written
    arrangement with its business associate must contain
    the elements specified at 45 CFR 164.504(e)

    View Slide

  9. 9
    www.netspective.com
    HHS examples of BAs
    • A third party administrator that assists a health plan with claims
    processing.
    • A CPA firm whose accounting services to a health care provider
    involve access to protected health information.
    • An attorney whose legal services to a health plan involve access to
    protected health information.
    • A consultant that performs utilization reviews for a hospital.
    • A health care clearinghouse that translates a claim from a non-
    standard format into a standard transaction on behalf of a health
    care provider and forwards the processed transaction to a payer.
    • An independent medical transcriptionist that provides transcription
    services to a physician.
    • A pharmacy benefits manager that manages a health plan’s
    pharmacist network.

    View Slide

  10. 10
    www.netspective.com
    HHS examples when BAA is not
    required
    • With persons or organizations (e.g., janitorial
    service or electrician) whose functions or
    services do not involve the use or disclosure of
    protected health information, and where any
    access to protected health information by such
    persons would be incidental, if at all.
    • With a person or organization that acts merely as
    a conduit for protected health information, for
    example, the US Postal Service, certain private
    couriers, and their electronic equivalents.

    View Slide

  11. CLOUD SAFEGUARDS

    View Slide

  12. 12
    www.netspective.com
    Required vs. Addressable Controls
    If a control is addressable, cloud providers can:
    • Implement it if it is reasonable and appropriate
    • Implement an equivalent measure, if that is reasonable
    and appropriate
    • Not implement it at all
    Cloud providers can assess if an implementation specification
    is reasonable and appropriate based upon factors such as:
    • Risk analysis and mitigation strategy
    • Current security controls in place
    • Costs of implementation (to an extent)

    View Slide

  13. 13
    www.netspective.com
    Administrative Safeguards
    Standards Section Implementation Specifications | (R) = Required, (A) = Addressable
    Security Management Process 164.308(a)(1) Risk Analysis (R)
    Risk Management. (R)
    Sanction Policy (R)
    Information System Activity Review (R)
    Assigned Security Responsibility 164.308(a)(2) (R)
    Workforce Security 164.308(a)(3) Authorization and/or Supervision (A)
    Workforce Clearance Procedure (A)
    Termination Procedures (A)
    Information Access Management 164.308(a)(4) Isolating Healthcare Clearinghouse Function (R)
    Access authorization (A)
    Access Establishment and Modification (A)
    Security Awareness and Training 164.308(a)(5) Security Reminders (A)
    Protection from Malicious Software (A)
    Log-in Monitoring (A)
    Password Management (A)
    Security Incident Procedures 164.308(a)(6) Response and Reporting (R)
    Contingency Plan 164.308(a)(7) Data Backup Plan (R)
    Disaster Recovery Plan (R)
    Emergency Mode Operation Plan (R)
    Testing and Revision Procedure (A)
    Applications and Data Criticality Analysis (A)
    Source: HHS, Walsh summary

    View Slide

  14. 14
    www.netspective.com
    Physical Safeguards
    Standards Section Implementation Specifications
    (R) = Required, (A) = Addressable
    Facility Access Controls 164.310(a)(1) Contingency Operations (A)
    Facility Security Plan (A)
    Access Control and Validation Procedures (A)
    Maintenance Records (A)
    Workstation Use 164.310(b) (R)
    Workstation Security 164.310(c) (R)
    Device and Media controls 164.310(d)(1) Disposal (R)
    Media Re-use (R)
    Accountability (A)
    Data backup and Storage (A)
    Source: HHS, Walsh summary

    View Slide

  15. 15
    www.netspective.com
    Technical Safeguards
    Standards Section Implementation Specifications
    (R) = Required, (A) = Addressable
    Access Control 164.312(a)(1) Unique User Identification (R)
    Emergency Access Procedure (R)
    Automatic Logoff (A)
    Encryption and Decryption (A)
    Audit Controls 164.312(b) (R)
    Integrity 164.312(c)(1) Mechanism to Authenticate Electronic PHI (A)
    Person or Entity authentication 164.312(d) (R)
    Transmission Security 164.312(e)(1) Integrity Controls (A)
    Encryption (A)
    Source: HHS, Walsh summary

    View Slide

  16. 16
    www.netspective.com
    MU Privacy, Security, Transport
    Standards
    Item Standard
    Encryption and decryption of
    electronic health information
    NIST FIPS 140-2
    Record actions related to
    electronic health information
    The date, time, patient identification, and user identification
    must be recorded when electronic health information is
    created, modified, accessed, or deleted; and an indication of
    which action(s) occurred and by whom must also be recorded
    Verification that electronic
    health information has not
    been altered in transit
    SHA-1 or higher (NIST FIPS PUB 180-3)
    Record treatment, payment,
    and health care operations
    disclosures
    The date, time, patient identification, user identification, and a
    description of the disclosure must be recorded for disclosures
    for treatment, payment, and health care operations, as these
    terms are defined at 45 CFR 164.501
    Transport REST, DDS, XMPP

    View Slide

  17. HEALTHCARE SOA IN THE CLOUD

    View Slide

  18. 18
    www.netspective.com
    What we expect from “real” services
    • Well defined, easy-to-use, somewhat standardized interface
    • Self-contained with no visible dependencies to other services
    • (almost) Always available but idle until requests come
    • “Provision-able”
    • Easily accessible and usable readily, no “integration” required
    • Coarse grain
    • Independent of consumer context,
    – but a service can have a context
    • New services can be offered by combining existing services
    • Quantifiable quality of service
    – Do not compete on “What” but “How”
    – Performance/Quality
    – Cost
    – …
    Source: Attachmate

    View Slide

  19. 19
    Recap of Service Orientation
    Between Companies Between Divisions Between Apps Within Apps
    Trading Partner
    Integration
    System Integration Application
    Integration
    SODA
    Service
    Infrastructure
    Service orientation is not a technology you can buy and deploy but a way of
    architecting and designing distributed systems. Service orientation means
    different things to different people, especially in the cloud.
    Service
    Invocation
    Enterprise
    Service Bus
    Routing &
    Transformation
    Discovery &
    Directory
    Security &
    Authentication
    Service
    Categories
    Process
    Services
    Activity
    Services
    Entity
    Services
    Data
    Services

    View Slide

  20. 20
    www.netspective.com
    Recap of SOA Reference Architecture

    View Slide

  21. 21
    SOA & Cloud are about integration
    Source: Geoffrey Raines, MITRE

    View Slide

  22. 22
    Cloud and SOA Overlap
    Source: Geoffrey Raines, MITRE

    View Slide

  23. 23
    www.netspective.com
    • Function oriented
    • Build to last
    • Prolonged development
    cycles
    From To
    • Coordination oriented
    • Build to change
    • Incrementally built and
    deployed
     Application silos
     Tightly coupled
     Object oriented
     Known implementation
     Enterprise solutions
     Loosely coupled
     Message oriented
     Abstraction
    Source: Microsoft (Modified)
    Expectations of SOA in the Cloud

    View Slide

  24. From Components to SOA in the Cloud
    • Requires a client library
    • Client / Server
    • Extendable
    • Stateless
    • Fast
    • Small to medium
    granularity
    • Loose coupling via
    – Message exchanges
    – Policies
    • Peer-to-peer
    • Composable
    • Context independent
    • Some overhead
    • Medium to coarse
    granularity

    View Slide

  25. 25
    www.netspective.com
    What keeps health IT folks up at night
    Meaningful Use is
    reprioritizing
    everything
    Legacy systems utilize
    very little resources
    but consume lots of
    hardware
    Our infrastructure
    and network is held
    hostage by legacy
    requirements
    I have lots of data,
    but not enough
    analytics
    Not sure how we’re
    going to manage user
    provisioning across so
    many apps
    How will we
    implement HIPAA
    5010 and ICD10?

    View Slide

  26. 26
    www.netspective.com
    How can the cloud achieve SOA goals?
    Infinite Storage
    You’re generating
    more data than
    you can handle;
    but, there are
    specialists that
    can do that for
    you.
    Hardware Utilization
    Go from 20%
    average
    utilization on
    fixed assets to
    pay as you go
    with hardware on
    demand.
    Infrastructure Maintenance
    Move IT
    resources from
    infrastructure
    maintenance to
    higher-value
    customer-facing
    tasks.
    New Deployments
    Deploy software
    faster to more
    workstations and
    with fewer IT
    resources.

    View Slide

  27. 27
    www.netspective.com
    The Cloud is Nothing New
    Single
    Computer
    Mainframes
    with
    terminals
    Client/Server
    Computing
    Network
    Computing
    Cloud
    Computing
    1960
    1970
    1990
    2000 2012
    Complexity
    Time Distributed
    Centralized

    View Slide

  28. 28
    www.netspective.com
    Beware of Cloud Washing
    Image source: http://infreemation.net/cloud-computing-linear-utility-or-complex-ecosystem
    Not everything is really
    a “Cloud” something

    View Slide

  29. 29
    www.netspective.com
    Nothing to fear, it’s Hosting Evolved

    View Slide

  30. 30
    www.netspective.com
    The Promise of Clouds
    Source: http://www.slideshare.net/markusslideshare/do-clouds-compute-a-framework-for-
    estimating-the-value-of-cloud-computing-presentation

    View Slide

  31. 31
    www.netspective.com
    Not all Clouds Are Created Equal
    Cloud
    Technology
    Can I get out as
    easily as I get in?
    Company
    How financially
    strong is the
    company?
    Likelihood of
    being acquired?
    Survive
    downturns?
    Can it compete
    long term?
    Processes
    Is security tacked-
    on or built-in?
    Do they
    understand
    HIPAA?

    View Slide

  32. 32
    How to Buy Cloud Computing Services
    IaaS Infrastructure as a Service
    Renting use of computing power or storage over the Internet (e.g.,
    Symantec hosted services (70 Petabytes of hosted data), Amazon’s EC2 &
    S3)
    PaaS Platform as a Service
    Renting use of an application environment over the Internet (e.g., Google
    App Engine, Symantec Health)
    SaaS Software as a Service
    Renting execution of software solutions over the Internet (e.g.,
    salesforce.com, Symantec Health Image Share and Analytics Tools)

    View Slide

  33. 33
    NIST Cloud Models in Health Systems
    Public Internet (TIC)
    Cloud Sourcing Models
    Outsourced Health System
    Trust (Security and Data Privacy)
    High
    Low
    Private
    Commercially
    Hosted
    Cloud
    Public
    Cloud
    Health Info
    Exchange (HIE)
    Cloud
    Dedicated Health System
    Network (VPN, TIC)
    Private
    Health System
    Cloud
    Hybrid Health System Cloud
    Source: NIST

    View Slide

  34. 34
    Applications in the Hybrid Cloud
    Cloud
    Routine
    Applications
    Critical
    Applications
    HIGH
    LOW
    Security
    Requirements
    Business
    Applications
    DR
    Document
    Management
    Conventional business
    applications with:
    • Patient Data
    • Employee Information
    • Financial Information
    • Customer Information
    • Government
    Financials
    and Planning
    Mission
    Critical/
    OLTP
    On Premises (traditional)
    Web
    Analytics and
    Reporting
    Software
    Development/
    Test
    Mail and
    Collaboration
    Source: UNISYS

    View Slide

  35. 35
    Health Apps in the Secure Cloud
    Cloud
    Routine
    Applications
    Critical
    Applications
    HIGH
    LOW
    Security
    Requirements
    Business
    Applications
    DR
    Document
    Management
    Conventional business
    applications with:
    • Patient Data
    • Employee Information
    • Financial Information
    • Customer Information
    • Government
    Financials
    and
    Planning
    Mission
    Critical/
    OLTP
    Traditional
    Web
    Analytics
    and
    Reporting
    Software
    Development/
    Test
    Mail and
    Collaboration
    HIGH
    LOW
    Security
    Requirements
    Web
    DR
    Conventional business
    applications with:
    • Patient Data
    • Employee Information
    • Financial Information
    • Customer Information
    • Government
    Analytics
    and
    Reporting
    Financials
    and
    Planning
    Document
    Management
    Mission
    Critical/
    OLTP
    Software
    Development/
    Test
    Mail and
    Collaboration
    Routine
    Applications
    Critical
    Applications
    Business
    Applications
    Cloud Secure Cloud for Regulated & Protected Health Info Traditional
    Source: UNISYS

    View Slide

  36. 36
    www.netspective.com
    Where Hype meets Reality
    Does it make
    economic
    sense?
    How will we
    handle
    security and
    compliance?
    How will we
    handle legal
    matters?
    Will there be
    a “big
    switch”?
    Once we’re
    in, how do
    we get out?
    (portability)
    How do we
    interoperate
    with our
    existing
    “stuff”?
    What happens when the Network fails?

    View Slide

  37. 37
    www.netspective.com
    SOA in Cloud Hype & Misconceptions
    • Vendors first replaced “web services” terminology
    with “SOA” and now “Cloud”
    • Once you implement a web service, it does not mean
    you have an SOA.
    • An SOA should not be the goal: a loosely coupled IT
    system that enables new business models and
    revenue/cost savings opportunities is the goal.
    • There is no need to turn working code into services
    unless there is a need to connect in a way that would
    improve the business.
    • SOA is not for “average” teams. It takes very smart
    engineers and architects to develop a useful SOA
    with a good ROI.

    View Slide

  38. 38
    www.netspective.com
    SOA in Cloud Hype & Misconceptions
    • You can not buy an SOA. SOA is almost an emergent
    property of a system that is designed with service
    orientation in mind.
    – Loose coupling, developing against schema rather than
    types, using open protocols, black boxing your
    functionality
    • Asynchronous services that are loosely coupled are
    not easier to write, they are actually harder (but
    worth it).
    • Versioning and deployment of loosely coupled
    services are not always easier than monolithic
    systems.
    • Reliability of services is still hard, especially with
    multiple Cloud providers and internal data centers.

    View Slide

  39. 39
    www.netspective.com
    Benefits of SOA in the Cloud
    Potential (Direct)
    Business Benefits
    Acceleration of business
    process automation and
    optimization
    Direct business
    benefits are difficult
    to measure so an SOA
    project needs to know
    the goals ahead of
    time.
    Increased capability to support
    M&A activity and trading
    partner integration
    Better reactivity of IT regarding
    new business requirements
    Potential (Indirect)
    Technology Benefits
    Reuse of functionality and
    interfaces
    Indirect technology
    benefits should be
    seen as tangible and
    not just guesses.
    Decoupling of architecture
    building blocks
    Reduction of architecture
    complexity

    View Slide

  40. 40
    www.netspective.com
    How to Ensure SOA is Working
    SOA IT
    Driver
    Reuse of
    functionality
    and interfaces
    Reduced effort for connecting to functionality
    Reduced effort for new interfaces
    Less errors in acceptance tests
    Reduced downtime in operation
    Decoupling of
    architecture
    building blocks
    Easier replacement of components
    Faster releases through independence
    Reduction of
    complexity of
    architecture as
    a whole
    Faster IT delivery of new requirements
    Reduced testing efforts
    Better performance and improved SLA
    Better forward engineering and CM

    View Slide

  41. 41
    www.netspective.com
    Sample of How to Measure SOA ROI
    Measure Data to collect Implementation
    Reduced effort for
    connecting
    functionality
    Collect development and
    maintenance effort
    Document reuse plan vs.
    actual
    Harmonize and
    define structures
    and processes
    Easier replacement of
    components
    Collect maintenance effort
    Setup interdependencies
    matrix
    Setup IT
    architecture
    management
    Continuously
    Measure and
    report efficiency
    Faster delivery of new
    functionality
    Measure IT phases for each
    major requirement
    Conduct satisfaction surveys
    Make each
    phase measurable
    Continuously
    survey and report

    View Slide

  42. 42
    The Government is Vetting Vendors

    View Slide

  43. 43
    www.netspective.com
    Case Study: PACS / Image Archiving
    •Single copy of data
    •Secondary copy nearby
    •Business continuity
    during PACS outage
    Disaster Recovery &
    Business Continuity
    •Audits
    •Abiding by HIPAA/
    HITECH guidelines
    • Internal & external
    security threats
    Compliance
    • No visibility into storage
    consumption
    • Inefficient storage tiers
    • A lot to maintain – hw,
    sw, security, etc.
    Storage
    Management
    •Inability to access data
    when & where needed
    •CD/DVD headaches
    •Concerns over data loss
    Data Access &
    Sharing
    •Study sizes growing
    •Number of images
    increasing
    •Storage growth
    exploding
    Archiving Costs
    Storage Related Costs

    View Slide

  44. 44
    www.netspective.com
    Modality
    PACS
    Local
    Storage
    Image
    Archive(s)
    Symantec Gateway
    Symantec Data Centers
    • PACS transmits images to and from the Gateway using DICOM
    • Optimizes bandwidth and minimizes PACS latency
    • PACS workflow and performance remains intact
    • Image transmission over the Internet using HTTP over SSL
    • Encryption secures at-rest images (AES-256)
    Case Study: Symantec Medical Data
    Archiving and Sharing

    View Slide

  45. 45
    www.netspective.com
    Case Study: Symantec Health Cloud
    Benefits
    •Redundant copies in
    different states
    •Highly available
    •Retrieve to PACS
    •Instant access to images
    Disaster Recovery &
    Business Continuity
    •Meets HIPAA privacy &
    security guidelines
    •Audit logs of all sharing
    activity
    • Highest levels of
    security on all vectors
    Compliance
    •In-depth storage
    analytics
    •Enables efficient storage
    tiering
    •No management
    overhead
    Storage
    Management
    •Secure online image
    sharing
    •Eliminates CD
    incompatibility &
    security issues
    • No downloads or
    training required
    Data Access &
    Sharing
    •Low price per TB can
    reduce archiving costs
    by 50 %
    •No excess capacity
    • A single, predictable
    quarterly service fee
    Archiving Costs

    View Slide

  46. 46
    www.netspective.com
    Additional Cloud Benefit: Centralized
    Image Sharing (real collaboration)
    Hospital
    Specialty
    Clinic
    Physician
    Office
    Imaging
    Center
    Radiology
    Group
    Centralized Image Sharing

    View Slide

  47. CONCLUSION
    Questions?

    View Slide