Security

HIPAA and cloud computing: What you need to know

Share this post:

Screen Shot 2015-03-31 at 11.07.01 PM

Many of my clients are in the healthcare field, so a common question is if data can be managed on IBM cloud computing solutions in compliance with the Health Insurance Portability and Accountability Act (HIPAA). The relevant part of this law, enacted by the U.S. Congress in 1996, establishes rules for the storage and transmission of electronic health information. In summary, these rules are:

  • Privacy Rule: regulates the use and disclosure of protected health information
  • Security Rule: sets national standards for the security of electronic protected health information
  • Breach Notification Rule: requires that entities and business associates notify affected individuals (and others) following a breach of unsecured protected health information

In 2009, the Health Information Technology for Economic and Clinical Health (HITECH) Act strengthened and clarified these rules. In 2010, the Omnibus rule refined the definitions of covered entities, such as health care providers, and business associates, such as IT service providers. A cloud service provider, such as SoftLayer, an IBM company, is considered a business associate and must demonstrate compliance with relevant provisions of HIPAA-HITECH rules.

Hosting an application in compliance with HIPAA-HITECH rules is a shared responsibility between the customer and SoftLayer. A Business Associate Agreement (BAA), which clearly defines the respective responsibilities of SoftLayer and the customer, must be signed. Sensitive workloads are best hosted on SoftLayer’s bare metal or private dedicated cloud offerings. Responsibility is divided as follows:

  • SoftLayer is solely responsible for the security of the physical data center hosting the SoftLayer provided infrastructure
  • SoftLayer is responsible for the managing the environment and Softlayer administrators according to security best practices required by HIPAA controls
  • Customer is responsible for managing the workloads, with the exception of the physical infrastructure, so as to comply with HIPAA-HITECH rules

A customer should work with subject matter experts and legal advisors to ensure that they have put in place the required controls. SoftLayer’s infrastructure as a service (IaaS) platform provides a number of offerings to help achieve HIPAA-HITECH compliance, including:

  • Strict access control and physical security for data centers, including two-factor access authentication and CCTV monitoring
  • Servers, labeled with a barcode only, obscure their identity and ensure only authorized and approved access
  • Completely automated management of the environment: hands-on management of devices is only done when physical access is required and in response to a customer raised ticket
  • A complete history of all SoftLayer actions taken on any device
  • Access to SoftLayer hosted storage is through only the private network and not the Internet-accessible public network
  • Servers and storage are wiped when de-provisioned; if the wipe is unsuccessful or the server/storage fails, the device is decommissioned and physically destroyed.
  • Flexible portal and application programming interface (API) that allows the design of comprehensive failover, disaster recovery and high availability solutions

In addition, SoftLayer provides services to assist customers in creating security and privacy solutions, including:

  • Vulnerability scanning
  • Host-based intrusion protection
  • Anti-virus protection
  • Firewall and network-based threat protection
  • Two factor authentication to the SoftLayer customer portal
  • SSL certificates that enable confidentiality of data-in-transit

In summary, the security solution to achieve HIPAA-HITECH compliance is a shared responsibility. SoftLayer’s dedicated bare metal or private virtualized cloud offerings should be used for sensitive workloads. A Business Associate Agreement (BAA) needs to be signed as part of the sales agreement. Subject matter and legal experts should be consulted for expertise and guidance.

I’d be interested to hear about your experiences with hosting workloads that require HIPAA-HITECH compliance. Comment below or connect with me on Twitter @allanrtate to continue the discussion.


Add Comment
No Comments

Leave a Reply

Your email address will not be published.Required fields are marked *

More Security Stories

Boosting security in the cloud with SaaS

IT security threats can be daily, and can come from anywhere, through any application. As IT and business leaders look at implementing Software as a Service (SaaS) applications, a key consideration is the security of putting data in the cloud. As the Chief Information Security Officer of IBM’s cloud business, I can tell you that […]

Continue reading

The impact of discipline and standards in automaking and software

This is the third in a series of three articles examining how a disciplined approach can help maximize the value of software innovations. The automotive industry had endured the same growing pains as software products and services, with missed deadlines, over-budget projects and failures to live up to customer expectations. Automakers leveraged the knowledge of […]

Continue reading

Data security is a must for building a digital business

Then-FBI Director Robert Mueller said in 2012, “There are only two types of companies: those that have been hacked and those that will be.” Companies — both business-to-business and business-to-consumer — are driven more than ever to rapidly adapt to digital business. The ways companies and their customers seek and consume information, make purchase decisions, […]

Continue reading