Maintaining HIPAA compliant passwords is a key step towards protecting ePHI.
Maintaining HIPAA compliant passwords is a key step towards protecting ePHI. However, HIPAA requirements do not go into a lot of detail about passwords:
This means we need to think about the first principles or best practices of data security to adequately implement this security control. The intent of password management in this requirement is to protect ePHI, so we need to look at two things for guidance:
One reason we can’t simply apply password implementation rules across the board in healthcare is that not all credentials carry the same risk of being exploited, and overly restrictive password policies can make it more difficult for healthcare providers to offer care in a timely manner. If we are thoughtful about password requirements, we can adequately safeguard ePHI while supporting the work of the healthcare provider.
Watch the following video to learn about HIPAA passwords:
Let’s look at two examples to understand how password implementation might differ based on risk. (Note: Risk assessments are extensive and dive deeply into the entire healthcare ecosystem being considered. These examples should be taken as high-level illustrations intended to help you understand how to get started.)
In the first example, a healthcare provider logs into a workstation to view ePHI that is encrypted and stored on a local server. The workstation and the server are located on an internal subnet that is only accessible from designated workstations within that office, neither the workstations nor the server can be accessed remotely, and the subnet is hard wired, with no Wi-Fi access.
As a result, you might choose to implement a password policy that calls for shorter, simpler passwords, a longer timeout period before the password must be re-entered, and fewer required password changes each year.
Download the HIPAA Training Trends Infographic here.
In the second example, a doctor working from home accesses ePHI through a cloud-based application. The risks associated with this example include brute force attacks that could successfully get past simpler, shorter passwords, or phishing attacks that supply the attacker with account credentials.
In this case, your passwords should be as strong as possible, and you should have multi-factor authentication in place as well.
When determining what your password policy should be, it’s a good idea to start with a defined standard.
NIST-800-63 Digital Identity Guidelines is a beefy publication that offers the following password requirements.
Other well-known standards include PCI DSS, CIS CSC, etc.
Implementing a functional password policy starts with performing a risk assessment. Part of the risk assessment includes enumerating all the systems that require passwords, all the places ePHI exists, and all the people who potentially have access to those systems.
Map out the ePHI data flows to include relevant information so that you can apply password policies in meaningful ways, as determined by risk. Remember that each individual accessing ePHI needs their own unique ID, and passwords should never be shared. Finally, logins need to be logged so that access to ePHI can be traced to individuals.