33
Safeguarding Health Information NIST/OCR Conference September 3, 2015 Cora Han Division of Privacy and Identity Protection Federal Trade Commission The views expressed are those of the speaker and not necessarily those of the FTC

NIST Computer Security Resource Center - …necessarily those of the FTC Don’t collect personal information you don’t need. Hold on to information only as long as you have a legitimate

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: NIST Computer Security Resource Center - …necessarily those of the FTC Don’t collect personal information you don’t need. Hold on to information only as long as you have a legitimate

Safeguarding Health InformationNIST/OCR Conference

September 3, 2015

Cora HanDivision of Privacy and Identity ProtectionFederal Trade Commission

The views expressed are those of the speaker and not necessarily those of the FTC

Page 2: NIST Computer Security Resource Center - …necessarily those of the FTC Don’t collect personal information you don’t need. Hold on to information only as long as you have a legitimate
Page 3: NIST Computer Security Resource Center - …necessarily those of the FTC Don’t collect personal information you don’t need. Hold on to information only as long as you have a legitimate
Page 4: NIST Computer Security Resource Center - …necessarily those of the FTC Don’t collect personal information you don’t need. Hold on to information only as long as you have a legitimate
Page 5: NIST Computer Security Resource Center - …necessarily those of the FTC Don’t collect personal information you don’t need. Hold on to information only as long as you have a legitimate

Don’t collect personal information you don’t need.

Hold on to information only as long as you have a legitimate business need.

Don’t use personal information when it’s not necessary.

Page 6: NIST Computer Security Resource Center - …necessarily those of the FTC Don’t collect personal information you don’t need. Hold on to information only as long as you have a legitimate
Page 7: NIST Computer Security Resource Center - …necessarily those of the FTC Don’t collect personal information you don’t need. Hold on to information only as long as you have a legitimate

Restrict access to sensitive data.

Limit administrative access.

Page 8: NIST Computer Security Resource Center - …necessarily those of the FTC Don’t collect personal information you don’t need. Hold on to information only as long as you have a legitimate
Page 9: NIST Computer Security Resource Center - …necessarily those of the FTC Don’t collect personal information you don’t need. Hold on to information only as long as you have a legitimate

Insist on complex and unique passwords.

Store passwords securely.

Guard against brute force attacks.

Protect against authentication bypass.

Page 10: NIST Computer Security Resource Center - …necessarily those of the FTC Don’t collect personal information you don’t need. Hold on to information only as long as you have a legitimate
Page 11: NIST Computer Security Resource Center - …necessarily those of the FTC Don’t collect personal information you don’t need. Hold on to information only as long as you have a legitimate

Keep sensitive information secure throughout its lifecycle.

Use industry-tested and accepted methods.

Ensure proper configuration.

Page 12: NIST Computer Security Resource Center - …necessarily those of the FTC Don’t collect personal information you don’t need. Hold on to information only as long as you have a legitimate
Page 13: NIST Computer Security Resource Center - …necessarily those of the FTC Don’t collect personal information you don’t need. Hold on to information only as long as you have a legitimate

Segment your network.

Monitor activity on your network.

Page 14: NIST Computer Security Resource Center - …necessarily those of the FTC Don’t collect personal information you don’t need. Hold on to information only as long as you have a legitimate
Page 15: NIST Computer Security Resource Center - …necessarily those of the FTC Don’t collect personal information you don’t need. Hold on to information only as long as you have a legitimate

Ensure endpoint security.

Put sensible access limits in place.

Page 16: NIST Computer Security Resource Center - …necessarily those of the FTC Don’t collect personal information you don’t need. Hold on to information only as long as you have a legitimate
Page 17: NIST Computer Security Resource Center - …necessarily those of the FTC Don’t collect personal information you don’t need. Hold on to information only as long as you have a legitimate

Train your engineers in secure coding.

Follow platform guidelines for security.

Verify that privacy and security features work.

Test for common vulnerabilities.

Page 18: NIST Computer Security Resource Center - …necessarily those of the FTC Don’t collect personal information you don’t need. Hold on to information only as long as you have a legitimate
Page 19: NIST Computer Security Resource Center - …necessarily those of the FTC Don’t collect personal information you don’t need. Hold on to information only as long as you have a legitimate

Put it in writing.

Verify compliance.

Page 20: NIST Computer Security Resource Center - …necessarily those of the FTC Don’t collect personal information you don’t need. Hold on to information only as long as you have a legitimate
Page 21: NIST Computer Security Resource Center - …necessarily those of the FTC Don’t collect personal information you don’t need. Hold on to information only as long as you have a legitimate

Update and patch third-party software.

Heed credible security warnings and move quickly to fix them.

Page 22: NIST Computer Security Resource Center - …necessarily those of the FTC Don’t collect personal information you don’t need. Hold on to information only as long as you have a legitimate
Page 23: NIST Computer Security Resource Center - …necessarily those of the FTC Don’t collect personal information you don’t need. Hold on to information only as long as you have a legitimate

Securely store sensitive files.

Protect devices that process personal information.

Keep safety standards in place when data is enroute.

Dispose of sensitive data securely.

Page 24: NIST Computer Security Resource Center - …necessarily those of the FTC Don’t collect personal information you don’t need. Hold on to information only as long as you have a legitimate

ftc.gov/datasecurity

Page 25: NIST Computer Security Resource Center - …necessarily those of the FTC Don’t collect personal information you don’t need. Hold on to information only as long as you have a legitimate

business.ftc.gov

Page 26: NIST Computer Security Resource Center - …necessarily those of the FTC Don’t collect personal information you don’t need. Hold on to information only as long as you have a legitimate

business.ftc.gov

Page 27: NIST Computer Security Resource Center - …necessarily those of the FTC Don’t collect personal information you don’t need. Hold on to information only as long as you have a legitimate

business.ftc.gov

Page 28: NIST Computer Security Resource Center - …necessarily those of the FTC Don’t collect personal information you don’t need. Hold on to information only as long as you have a legitimate

business.ftc.gov

Page 29: NIST Computer Security Resource Center - …necessarily those of the FTC Don’t collect personal information you don’t need. Hold on to information only as long as you have a legitimate

business.ftc.gov

Page 30: NIST Computer Security Resource Center - …necessarily those of the FTC Don’t collect personal information you don’t need. Hold on to information only as long as you have a legitimate

business.ftc.gov

Page 31: NIST Computer Security Resource Center - …necessarily those of the FTC Don’t collect personal information you don’t need. Hold on to information only as long as you have a legitimate

bulkorder.ftc.gov

Page 33: NIST Computer Security Resource Center - …necessarily those of the FTC Don’t collect personal information you don’t need. Hold on to information only as long as you have a legitimate