Access to RosettaHealth systems and application is limited for all users, including but not limited to workforce members, volunteers, business associates, contracted providers, and consultants. Access by any other entity is allowable only on a minimum necessary basis. All users are responsible for reporting an incident of unauthorized user or access of the organization’s information systems. These safeguards have been established to address the HIPAA Security regulations including the following:
Applicable Standards
Applicable Standards from the HITRUST Common Security Framework
-
01.d - User Password Management
-
01.f - Password Use
-
01.r - Password Management System
-
01.a - Access Control Policy
-
01.b - User Registration
-
01.j - User Authentication for External Connections
-
01.q - User Identification and Authentication
-
01.v - Information Access Restriction
-
02.i - Removal of Access Rights
-
06.e - Prevention of Misuse of Information Assets
-
01.l - Remote Diagnostic and Configuration Port Protection
-
01.e - Review of User Access Rights
Applicable Standards from the HIPAA Security Rule
-
164.308(a)(4)(ii)(C) - Access Establishment and Modification
-
164.308(a)(3)(ii)(B) - Workforce Clearance Procedures
-
164.308(a)(4)(ii)(B) - Access Authorization
-
164.312(d) - Person or Entity Authentication
-
164.312(a)(2)(i) - Unique User Identification
-
164.308(a)(5)(ii)(D) - Password Management
-
164.312(a)(2)(iii) - Automatic Logoff
-
164.308(a)(3)(ii)(C) - Termination Procedures
Access Establishment and Modification
-
Requests for employee access to RosettaHealth Platform systems is made to the Security Officer. The request must include what systems the employee is requesting to access (ex RH-Prod, RH-Dev, DropBox, …).
-
The Security Officer will grant access to systems as dictated by the employee’s job function and if the following preconditions are met.
-
A background investigation has been satisfactorily completed
-
If the request includes access to any RosettaHealth system that may contain ePHI the employee must complete the required HIPAA training first.
-
-
The Security Officer (or their designee) will create the appropriate permissions on the requested systems.
- If the request includes access to the RosettaHealth production environment, then the Security Officer (or their designee) will create a ticket in the ClearData Portal requesting the appropriate access. (ex AWS console access, VPN access, SSH access, …)
-
Privileged users (ex RosettaHealth System Admins) must first access systems using unique user accounts on the VPN before switching to privileged users and performing privileged tasks.
-
For production systems, this is enforced by creating non-privileged user accounts that must invoke
sudo
to perform privileged tasks. -
Two-factor authentication is accomplished using private key as the second factor.
-
VPN connections use 256-bit AES 256 encryption, or equivalent.
-
-
Modification to employee(s) access privileges are initiated by Security Officer based on any of the following events:
-
Employee termination
-
Change in employee job function.
-
Increased risk or known attempted unauthorized access, immediate steps are taken by the Security Officer to limit access and reduce risk of unauthorized access
-
-
All access privileges to RosettaHealth systems and services is reviewed by the RosettaHealth Security Officer and updated, on at least an annual basis or when a change in access for a workforce member is required. This is to ensure that proper authorizations are in place commensurate with job functions.
Workforce Clearance
-
The level of security assigned to a user to the organization’s information systems is based on the minimum necessary amount of data access required to carry out legitimate job responsibilities assigned to a user’s job classification and/or to a user needing access to carry out treatment, payment, or healthcare operations.
-
All access requests are treated on a “least-privilege principle.”
-
RosettaHealth maintains a minimum necessary approach to access to Customer data. As such, RosettaHealth, including all workforce members, does not readily have access to any ePHI.
Access Authorization
-
Role based access categories (ex. system admin, mirth admin, support admin) for each RosettaHealth system and application are pre-approved by the Security Officer, or an authorized delegate of the Security Officer.
-
RosettaHealth utilizes firewalls to prevent unauthorized access, and monitor traffic for denial of service attacks.
Person or Entity Authentication
-
Each workforce member has and uses a unique user ID and password that identifies him/her as the user of the information system(s). This is used to authenticate to
-
Each Customer has and uses a unique identifier that identifies him/her as the user of the information system.
-
IP address and/or Organization OID (IHE Services)
-
username / password (HISPDirect Services)
-
PreShardKey / port (HL7 Services)
-
Unique User Identification
-
Access to the RosettaHealth Platform is controlled by requiring unique identifiers for each Customer. These identifiers vary per service.
-
IP address and/or Organization OID (IHE Services)
-
username / password (HISPDirect Services)
-
PreShardKey / port (HL7 Services)
-
-
Passwords requirements mandate strong password controls (see below).
-
Passwords are not displayed at any time and are not transmitted or stored in plain text.
Automatic Logoff
-
Users are required to make information systems inaccessible by any other individual when unattended by the users (ex. by using a password protected screen saver or logging off the system).
-
Information systems that can potentially access ePHI automatically log users off the systems after 20 minutes of inactivity.
-
The Security Officer pre-approves exceptions to automatic log off requirements.
Workstation Usage
Only RosettaHealth owned workstations can be used to access production systems and must be operated in accordance with Employees policy.
Wireless Access Use
- RosettaHealth production systems are not accessible directly over wireless channels within the hosting environment.
Employee Access Termination Procedures
-
Human Resources is required to notify the Security Officer upon completion and/or termination of access needs and facilitating completion of the termination checklist. This checklist includes:
-
VPN access granted by ClearDATA for access to production environment
-
VPN access controlled by RosettaHealth for access to development environment
-
Access to RosettaHealth DropBox account
-
Access to RosettaHealth 1Password account
-
Access to RosettaHealth GoogleApps account
-
Access to FreshDesk Support Portal
-
Access to Slack messaging service
-
Access to PagerDuty monitoring service
-
Access to Uptrends intruder.io monitoring service
-
Access to BitBucket SCM
-
-
Human Resources is required to notify the Security Officer to terminate a user’s access rights if there is evidence or reason to believe the following (these incidents are also reported on an incident report and is filed with the Privacy Officer):
-
The user has been using their access rights inappropriately;
-
A user’s password has been compromised (a new password may be provided to the user if the user is not identified as the individual compromising the original password);
-
An unauthorized individual is utilizing a user’s User Login ID and password (a new password may be provided to the user if the user is not identified as providing the unauthorized individual with the User Login ID and password).
-
-
The Security Officer will terminate users’ access rights immediately upon notification and will coordinate with the appropriate RosettaHealth employees to terminate access to any non-production systems managed by those employees.
-
The Security Officer audits and may terminate access of users that have not logged into organization’s information systems/applications for an extended period of time.
Workforce Password Management
-
Workforce User IDs and passwords are used to control access to RosettaHealth systems and may not be disclosed to anyone for any reason.
-
Workforce users may not allow anyone, for any reason, to have access to any information system using another user’s unique user ID and password.
-
Password configurations for the ClearDATA managed VPN are set to require:
-
a minimum length of 8 characters;
-
a mix of upper case characters, lower case characters, and numbers or special characters;
-
60-day password expiration;
-
prevention of password reuse using a history of the last 6 passwords;
-
where supported, modifying at least 4 characters when changing passwords;
-
account lockout after 5 invalid attempts.
-
-
All system and application passwords must be stored and transmitted securely.
-
Where possible, passwords should be stored in a hashed format using a salted cryptographic hash function (SHA-256 or equivalent).
-
Passwords that must be stored in non-hashed format must be encrypted at rest pursuant to the requirements in Data Integrity
-
Transmitted passwords must be encrypted in flight pursuant to the requirements in Data Integrity
-
-
Passwords are inactivated immediately upon an employee’s termination.
-
Password change methods must use a confirmation method to correct for user input errors.
-
If a user believes their user ID has been compromised, they are required to immediately report the incident to the Security Officer.
-
In cases where a user has forgotten their password, the following procedure is used to reset the password.
-
If the user is a RosettaHealth Customer, they are to submit a ticket request to the RosettaHealth support
-
An administrator with password reset privileges is notified and connects directly with the user requesting the password reset.
-
The administrator verifies the identity of the user.
-
Once verified, the administrator resets the password.
-
SaaS Customer Access to Systems
-
RosettaHealth grants SaaS customer secure system access via
-
Site-to-Site VPN connections. This access is between the customer system and specific RosettaHealth services (ex HL7 Service) via SecureSwan VPN. These connections are secured and encrypted each customer is granted access via a specific port. Ports are not shared between customers.
-
HealthBus API. This access is granted to customers who use the HealthBus REST API. All calls to the HealthBus API require basic authentication using unique username/password for each account. Customers are responsible for implementing and enforcing their own password policies.
-
SMTP/IMAP. This access is granted to customers who choose to use the SSMPT and SIMAP interfaces. All calls require basic authentication using unique username/password for each account. Customers are responsible for implementing and enforcing their own password policies.
-
IHE API. This access is granted to customers who use the HealthBus IHE API. All calls to the IHE API require a either a combination of IP address/unique OID or ssl certificate sha-1 hash/unique OID for authentication.
-
-
In the case of an investigation, RosettaHealth will assist customers, at RosettaHealth’s discretion, and law enforcement in forensics.