Your Top Five Cyber Risks in Five Clicks with the Free Cyber Risk Analysis

FREE RISK ANALYSIS
Request Demo

NIST Cybersecurity Framework

Is NIST CSF Replacing HIPAA In Healthcare?

down-arrow

In the recently released Cynergistek report on the state of healthcare sector cybersecurity framework adoption, I noticed an interesting trend - the rise in NIST CSF adoption and a surprising fall in HIPAA security rule compliance. I wanted to dive in and examine what might be causing this shift in healthcare industry framework usage.

The HIPAA Security Rule

I’ll briefly summarize the current standard for healthcare organizations - the HIPAA Security Rule. A supplement of HIPAA (Health Insurance Portability and Accountability Act of 1996), developed by the Department of Health and Human Services, the HIPAA Security Rule emerged as a means to ensure that protect patients’ digital data.

There are six main sections or categories of the Security Rule (from NIST SP 800-66):

  1. Security standards: General Rules - includes the general requirements all covered entities must meet; establishes flexibility of approach; identifies standards and implementation specifications (both required and addressable); outlines decisions a covered entity must make regarding addressable implementation specifications, and requires maintenance of security measures to continue reasonable and appropriate protection of electronically protected health information.
  2. Administrative Safeguards - are defined in the Security Rule as the “administrative actions and policies, and procedures to manage the selection, development, implementation, and maintenance of security measures to protect electronically protected health information and to manage the conduct of the covered entity's workforce in relation to the protection of that information.”
  3. Physical Safeguards - are defined as the “physical measures, policies, and procedures to protect a covered entity's electronic information systems and related buildings and equipment, from natural and environmental hazards, and unauthorized intrusion.”
  4. Technical Safeguards - are defined as “the technology and the policy and procedures for its use that protect electronically protected health information and control access to it.”
  5. Organizational Requirements - includes standards for business associate contracts and other arrangements, including memoranda of understanding between a covered entity and a business associate when both entities are government organizations and requirements for group health plans.
  6. Policies and Procedures and Documentation Requirements - requires implementation of reasonable and appropriate policies and procedures to comply with the standards, implementation specifications, and other requirements of the Security Rule; maintenance of written (which may be electronic) documentation and/or records that includes policies, procedures, actions, activities, or assessments required by the Security Rule; and retention, availability, and update requirements related to the documentation.

Is The HIPAA Security Rule Enough?

When it comes to patient care, information security leaders in the healthcare sector have an obligation to pursue gold-standard frameworks to ensure that patient information and patient records are secure.

In Cynergistek’s report, the healthcare industry is starting to see a decline in HIPAA Security Rule compliance - declining 2% for the industry as a whole year-over-year. What this says to me is that the industry, as with any highly regulated sector, is facing new regulations from multiple sources.

While HIPAA is the core of patient privacy, more and more standards are emerging that focus on specific subsectors (health insurance, for example, being faced with state-specific regulations built on the Model law). For CISOs working in these sectors, it is no longer enough to take these regulations as they come. Having a cohesive strategy to ensure that critical information stays secure requires using frameworks that leverage first principles that are at the core of these standards and regulations.

Enter the NIST CSF for Healthcare

The National Institute for Standards and Technology’s Cybersecurity Framework is one of the most adopted frameworks regardless of industry. Originally developed under an executive order for improving critical infrastructure cybersecurity, the robust nature of the framework and its five Framework Core functions - identify, protect, detect, respond, recover - has allowed it to scale beyond critical infrastructure. 

What struck me from Cynergistek’s report was the Security Rule compliance dropped by 2% year-over-year, and NIST Cybersecurity Framework adoption and compliance rose by the same amount - 2%. This speaks volumes about how healthcare organizations are working to manage their cybersecurity and cybersecurity risk. The NIST Framework is the guiding framework that informed the development of the DFARS mandate for the DoD supply chain (NIST Special Publication 800-171), the NYDFS cybersecurity regulation for financial services, and the Model Law for insurance. As the industry is faced with more regulations, checkbox thinking is no longer sufficient. Rather, working to implement the NIST CSF empowers organizations to build on the first principles of these regulations rather than being trapped in a reactionary loop.

 

Futureproofing Healthcare Cybersecurity With The NIST CSF

Managing cybersecurity risk for any organization is rapidly evolving into a board-level issue. For some industries, it is a matter of remaining competitive and securing business. For healthcare organizations, the importance is much greater. To effectively manage cyber risk, proactiveness is no longer optional. The NIST CSF and its outcomes-based approach help organizations implement the appropriate activities and controls necessary for their organization specifically while also meeting the necessary compliance requirements. 

The NIST CSF has proven to be that gold standard across industries and with an update time that moves the pace of technology development rather than regulatory bodies (with version 1.1 being released in 2017). Building a compliance and risk management program around the CSF allows information security teams to integrate new regulations easily, rather than reacting to new checkbox lists whenever a new rule is published.

You may also like

Putting the “R” back in GRC - ...
on October 22, 2024

Cyber GRC (Governance, Risk, and Compliance) tools are software solutions that help organizations manage and streamline their cybersecurity, risk management, and compliance ...

October Product Update
on October 17, 2024

The team at CyberSaint is thrilled to announce the latest additions and updates to the CyberStrong solution. To start off, we’ve made it easier to create an assessment and risk ...

Transforming Cyber Risk ...
on October 12, 2024

In today’s complex cyber landscape, managing risks effectively isn’t just about identifying threats—it’s about understanding their impact and knowing how to prioritize ...

Step-by-Step Guide: How to Create ...
on September 23, 2024

Cyber risk management has become more critical in today's challenging digital landscape. Organizations face increased pressure to identify, assess, and mitigate risks that could ...

From Fragmentation to Integration: ...
on September 17, 2024

Organizations are often inundated with many security threats and vulnerabilities in today's fast-paced cybersecurity landscape. As a result, many have turned to point ...

How to Create a Comprehensive ...
on September 9, 2024

Cyber threats are becoming more frequent, sophisticated, and damaging in today's rapidly evolving digital landscape. Traditional approaches to cyber risk management, which often ...