Compliance

Latest Round of OCR Audits Highlight HIPAA Risk Analysis and Risk Management Shortcomings

Coalfire Assessment Team

January 13, 2021
Blog Images 2022 Stethoscope with paperwork tile

This content is provided "as is" and is more than a year old. No representations are made that the content is up-to date or error-free.

Phase 2 OCR audit summary

The Office for Civil Rights (OCR) at the U.S. Department of Health and Human Services (HHS) has released its latest report with findings from their 2016 and 2017 series of audits as required under the Health Insurance Portability and Accountability Act of 1996 (HIPAA)/HITECH Privacy, Security, and Breach Notification Rules (HIPAA Rules).

In all, 166 covered entities (CEs) and 41 business associates (BAs) underwent audits against the HIPAA Rules. While compliance with breach notification and posting Notice of Privacy Practices (NPP) were found to rate well, most covered entities came up short in the remaining five areas that were audited. The majority of covered entities did not meet requirements for:

  • Properly safeguarding protected health information (PHI)
  • Ensuring the right of individual access
  • Providing appropriate content in their NPP

And finally, the majority of CEs and BAs failed to adhere to requirements for risk analysis and risk management, despite provisions from the prior set of audits conducted in 2012. Ultimately, over 80% of audit ratings did not meet appropriate compliance activities for risk analysis and risk management.

Risk analysis and risk management audit background

Now, one may ask, “why are risk analysis and risk management requirements not being met for something that’s been around for a quarter century?” The answer is: there has consistently been a failure to perform a risk analysis as defined in the OCR methodology. OCR has defined a nine-step process and recommends the use of NIST (National Institute of Standards and Technology) information security products to meet the HIPAA Security Rule Implementation Specifications for Risk Analysis and Risk Management. If this first step isn’t taken, then there is a high likelihood that an entity will fall in the 80% of those who don’t meet sufficient HIPAA risk analysis and risk management practices.

The following question will likely be, “Okay, so how do we follow protocol for conducting a risk analysis with merit and maintain an effective, ongoing risk management program moving forward?” First, don’t do what most audited entities have done, which includes:

  • Performing a “check-the-box” analysis that does not adhere to the nine essential elements of an OCR risk analysis.
    • Many entities believe this option to be cost-effective. A more accurate term would be “insufficient.”
  • Assign risk responsibilities to in-house staff where identifying high security risks conflicts with their self-interests. Work can quickly become skewed and cover up legitimate risks.

The above tactics have a history of resulting in financial, operational, and reputational harm. Failure to invest in effective resources in the short term can render costs much higher in the long run.

Additionally, the healthcare industry has an extensive amount of legacy systems and processes that increase attack surfaces from both inside and outside actors. A comprehensive risk management program can make significant inroads into reducing or even eliminating risk that otherwise wouldn’t be discovered without conducting an OCR-ready risk analysis and remediation.

Coalfire risk analysis and risk management methodology

Risk Analysis

A Coalfire risk analysis focuses on providing clients with a defensible, OCR-ready, risk analysis and risk management plan that aligns and conforms with the HIPAA Security Rule Standards and Implementation Specifications including 45 C.F.R. § 164.308(a)(1)(ii)(A) and 45 C.F.R. § 164.308(a)(1)(ii)(B) and OCR “Guidance on Risk Analysis Requirements Under the HIPAA Security Rule.”

Several strategies are practiced by Coalfire in order to differentiate itself from the risk analysis and risk management practices that have been deemed insufficient in four out of every five OCR audits.

Requirement

Other Practices (>80%)

Coalfire Practices

Thorough analysis of threats to PHI

“Check-the-box” assessment of HIPAA Rules requirements

In-depth environmental analysis of all PHI assets

Industry best practices for risk analysis methodology

Home-grown processes

Finely tuned methodology built on OCR and NIST requirements and standards

Consultant expertise

First- or second-year associate consultants, handling other industry verticals

Senior consultants with 5+ years specializing in healthcare risk

OCR-ready reports

Unfamiliar with OCR’s nine essential elements of a HIPAA risk analysis

Reports accepted by OCR as reasonable and appropriate in addressing Risk Analysis and Risk Management requirements

Partnership in cybersecurity

“One and done” project

Multi-year deals with clients that recognize the value added to long-term Information Security Management Programs

Risk Management

Coalfire’s information security risk management methodology assesses the threat environment to determine potential vulnerabilities related to:

  • Administrative Safeguards
  • Technical Safeguards
  • Documentation Controls
  • Physical Safeguards
  • Privacy Safeguards

Coalfire’s approach implements key provisions of the NIST Risk Management Framework (RMF) document compendium (e.g., SP 800-30, 37, 39, 53, and 66) as recommended by OCR. Additional threats and vulnerabilities related to the ePHI (electronic protected health information) environments, which do not have specific HIPAA references but are important cybersecurity concerns, will be assessed to ensure a “comprehensive and thorough” set of deliverables.

The full audit report is available at HHS.