7.2 Physical Controls
HIPAA requires also several physical controls
regulating facility access and management. These
regulations define that only authorized users can
access the physical servers in a cloud data center.
Additionally, disposing of hard disks which were
used for storing PHI data has to be controlled. Not
only hard disks have to be cleared, but they also
have to be physically destroyed. These physical
aspects of ensuring compliance are carried out by
the cloud provider. In our case, we rely on IBM
SoftLayer HIPAA compliance (IBM Cloud
Softlayer) to ensure implementing these controls
when bringing sensitive patient records into the
cloud.
8 LESSONS LEARNED
During the work on implementing HIPAA
regulations for WHC, several points became
apparent. One insight is that typical failures when
hosting sensitive medical data from a non-cloud
deployment are also relevant in the cloud. An
example is a failure to implement timeout of a
session after 30 min of inactivity, or incorrectly set
permissions for a user that made data improperly
visible. Fortunately, standard protection methods,
such as data encryption or encrypted message
transmission, are equally effective in the cloud.
While the security threats are similar to those in a
large data center, cloud environment imposes
separation of responsibilities for security protection
between a cloud provider and application
developers. The cloud provider is responsible for the
physical security and the cloud user for the
application-level security.
Another observation was that bringing sensitive
medical data into the cloud requires modification of
how cloud resources are used. Some features which
are guaranteed in a private data center where an
administrator has full control of all resources,
require special handling in the cloud. For example,
WHC uses private virtual deployment where only
WHC virtual machines are hosted on dedicated
physical servers. Additionally, location of the PHI
data in the cloud has to be controlled to ensure
compliance with the regulation.
Implementing a HIPAA compliant cloud
demands data persistence and business continuity
techniques which increase cost. We implemented
data backup, created a disaster recovery plan, and
enabled data replication between multiple sites.
While these measures ensure that data can be
restored after an unforeseen event, or after
accidental or malicious deletion or corruption of
data, they increase cost of operation, and introduce
complexity into the management of the cloud.
Auditability of a HIPAA regulated cloud
includes a large amount of logging, tracking and
persisting access logs. Providing the auditing service
to track logs in centralized location is a more trusted
solution than logging built within an application.
9 CONCLUSIONS
In this paper, we describe how we implemented a
diverse set of compliance features required by
HIPAA to enable bringing sensitive medical data in
the IBM WHC cloud. The WHC cloud provides a
dedicated, secure and regulated cloud infrastructure
for hosting PHI data.
HIPAA demands conducting risk analysis,
specifying security policies and incident procedures,
limiting access to PHI data, servers and storage,
encrypting data at rest and in motion, ensure data
integrity, monitor system activity, and manage user
identity. We implement security measures such as
firewalls, intrusion prevention systems, anti-virus
software, encryption, activity monitoring, identity
and access management.
A cloud-specific multitenancy allows multiple
customers to share compute and storage
infrastructure. We isolate customers at the physical
server level, control data location, and ensure data
encryption and encryption key management. To
meet HIPAA requirements for auditing and data
persistence, we implement data back-up, disaster
recovery plan, and an auditing system.
REFERENCES
U.S. Department of Health & Human Services, 1996.
“Health Insurance Portability and Accountability Act”
HIPAA. [Online]. Available: https://aspe.hhs.gov/
report/health-insurance-portability-and-accountability-
act-1996.
US Department of Education, 1974. “Family Educational
Rights and Privacy Act (FERPA),” 1974. [Online].
Available: https://www2.ed.gov/policy/gen/guid/fpco.
/ferpa/index.html?src=rn.
Armbrust, M., Fox, A., Griffith, R., Joseph, A. D., Katz,
R., Konwinski, A., Lee, G., Patterson, D., Rabkin, A.,
Stoica, I., and Zaharia, M., 2010. “A View of Cloud
Computing,” Communications of the ACM, vol. 53,
no. 4, 2010.