Most Recent Posts
AC Version 12.3
by beagle - 06/15/2025 8:57 PM
AI?
by ChrisFNP - 06/12/2025 3:29 PM
A Tale of Woe: Only Partial Backups
by JamesNT - 06/12/2025 3:00 PM
AI?
by ESMI - 06/11/2025 10:28 AM
Search for never seen patients
by Bert - 06/07/2025 12:47 PM
How to get in touch with tech support
by ChrisFNP - 06/04/2025 10:33 AM
Artificial Intelligence
by imcffp - 06/03/2025 4:46 AM
Member Spotlight
koby
koby
Canaan CT
Posts: 839
Joined: May 2009
Newest Members
ESMI, It's me, Paradise Family, MedCode, MZ Medical Billi
4,594 Registered Users
Previous Thread
Next Thread
Print Thread
Rate Thread
Joined: Apr 2012
Posts: 82
Member
OP Offline
Member
Joined: Apr 2012
Posts: 82
How are people complying with Core Measure 15: Security Risk Analysis? Do you hire third party to do the analysis? Or do you have a template and do it on your own? What analysis will withstand the audit?

Joined: Mar 2011
Posts: 837
Likes: 10
Member
Offline
Member
Joined: Mar 2011
Posts: 837
Likes: 10
Wing and a prayer.


Tom Duncan
Family Practice
Astoria OR
Joined: Dec 2010
Posts: 463
Member
Offline
Member
Joined: Dec 2010
Posts: 463
A while back I believe it was Sandeep who posted a link for meeting Core 15 using a self-assessment tool. That's how I met the requirement.
http://www.texmed.org/WorkArea/DownloadAsset.aspx?id=25071
However, I agree with Tom as to the best way to withstanding an audit.


John Howland, M.D.
Family doc, Massachusetts
Joined: Apr 2011
Posts: 2,316
Likes: 2
G
Member
Offline
G
Member
Joined: Apr 2011
Posts: 2,316
Likes: 2
Yep that's the one. The main thing is that they want you to document what information processes PHI and whether not it's vulnerable. It can help people identify some obvious risks that they previously thought were not so obvious. If we're going by AC standards, most professional security risk "analyzers" should note that allowing Everyone on the shared permissions is a big security risk since it requires only physical access to the network to compromise the data.

Joined: Apr 2011
Posts: 2,316
Likes: 2
G
Member
Offline
G
Member
Joined: Apr 2011
Posts: 2,316
Likes: 2
Also buying a server (Active Directory) and adding Everyone to the permissions list just really defeats the point of having a server.

Joined: Apr 2012
Posts: 82
Member
OP Offline
Member
Joined: Apr 2012
Posts: 82
Thank you Sandeep.

That spreadsheet is very complicated. Do you have to answer all the questions on that? Some of the things are very subjective, like "VERY LIKELY " and "MEDIUM" and "LOW" etc.

And what practical solution do you propose for setting permissions?

Joined: Apr 2011
Posts: 2,316
Likes: 2
G
Member
Offline
G
Member
Joined: Apr 2011
Posts: 2,316
Likes: 2
Originally Posted by SanjeevP
That spreadsheet is very complicated. Do you have to answer all the questions on that? Some of the things are very subjective, like "VERY LIKELY " and "MEDIUM" and "LOW" etc. /quote]
It is very subjective. But there are a lot of aspects that are pretty concrete like listing the assets and possible methods of access.?

It seems complicated but it just takes a long time to fill out. There are some subjective portions that require to assess the possibility of certain events. (e.g. a break in). Whether or not things like disk encryption are necessary. Disk encryption just protects physical theft for example.

You can just recycle it for the following years. Usually you want to reduce the number of risks each year.

Originally Posted by SanjeevP
And what practical solution do you propose for setting permissions?

You can grant users access individually using Shared Folders feature in the SBS console, but a better way would be to use the Security Groups feature of the console.

You can make a group called AC Users and grant them full permissions to the folder.

Joined: Jun 2009
Posts: 1,811
Member
Offline
Member
Joined: Jun 2009
Posts: 1,811
Originally Posted by SanjeevP
Thank you Sandeep.

That spreadsheet is very complicated. Do you have to answer all the questions on that? Some of the things are very subjective, like "VERY LIKELY " and "MEDIUM" and "LOW" etc.

And what practical solution do you propose for setting permissions?

Hate finding an "Everyone" permissions folder; delete it from permissions when I find it. Agree with Sandeep about using Active Directory to manage the permissions on the folder if there is a DC.

For folks running a non-server environment, create an "acuser", give it permissions on the share, then use those credentials to mount the share from every other machine. GTG


Indy
"Boss"

Indy's Blog

www.BestForYourPractice.com
Our Name is Our Creed
Joined: Feb 2011
Posts: 679
Likes: 1
Member
Offline
Member
Joined: Feb 2011
Posts: 679
Likes: 1
Indy,
For us non-servers, can you translate your method above into non-technical lingo with instructions for us to follow?


Donna
Joined: Jun 2009
Posts: 1,811
Member
Offline
Member
Joined: Jun 2009
Posts: 1,811
Donna,

On the machine that is serving AC, create a non-administrate/standard/limited user named acuser. Give it a decently complex password.

You go the AC folder, right click to get to the properties.

One of the Tabs should be Sharing. Go into the Sharing Tab, and if Everyone is in the list remove it. Select/Add the user acuser. Give acuser full control (permissions) on the directory.

Now go to each machine that connects to the ac server, and map that AC folder as a network drive. When it asks for you to login to that folder, make the user acuser, and click the check-box that says to reconnect at login.

If there is interest, I can go through this in more detail with screen shots.

BTW Donna, great to hear you are joining us in San Diego!


Indy
"Boss"

Indy's Blog

www.BestForYourPractice.com
Our Name is Our Creed
Joined: Feb 2011
Posts: 679
Likes: 1
Member
Offline
Member
Joined: Feb 2011
Posts: 679
Likes: 1
Thanks, Indy, that clarifies it. I did not understand "mount the share". I think mine are set to everyone, so I'll see about changing it.

Looking forward to our next meetup!


Donna
Joined: Dec 2007
Posts: 1,244
Member
Offline
Member
Joined: Dec 2007
Posts: 1,244
SanjeevP,

I practice in Maine, and our REC gave us that same exact spreadsheet.
Yes, it's complicated.
Yes, it takes a long time to fill it out the first time.
However you can update it and use the same spreadsheet in subsequent years of MU attestation.

If you want to survive a CMS audit when they came knocking on your door three years later asking for the money back, I would STRONGLY suggest that you complete it. I have this spread sheet for each of the THREE years that I've attested to MU (2011, 2012, and 2013).

Simply having passwords on your server and in AC will definitely NOT sustain audit.
Sorry for the hard truth, but I'm passing along both what i've researched from CMS and the REC in Maine.
Please be careful attesting to this requirement, it's the most complicated of all.
Remember it's an INVENTORY, it's not a requirement of compliance. You have to identify the status of potential security breaches. You don't actually have to fix them, but you need a plan in order to address the deficiencies even if you don't actually fix the deficiencies. that being said, if you identify deficiencies you really SHOULD fix them to prevent a violation of HIPAA and the revisions to security passed in the HITECH act (OMNIBUS ruling).
sincerely,
Adam


Adam Lauer, DO (solo FP)
Twin City Family Medicine
Brewer, ME
Joined: Apr 2012
Posts: 82
Member
OP Offline
Member
Joined: Apr 2012
Posts: 82
Thanks!


Moderated by  DocGene, JBS, Wendell365 

Link Copied to Clipboard
ShoutChat
Comment Guidelines: Do post respectful and insightful comments. Don't flame, hate, spam.
Who's Online Now
0 members (), 52 guests, and 29 robots.
Key: Admin, Global Mod, Mod
Top Posters(30 Days)
Bert 5
imcffp 3
ESMI 2
beagle 2
Top Posters
Bert 12,879
JBS 2,986
Wendell365 2,366
Sandeep 2,316
ryanjo 2,084
Leslie 2,002
Wayne 1,889
This board is dedicated to the memory of Michael "Indy" Astleford. February 6, 1961 -- April 16, 2019




SiteLock
Powered by UBB.threads™ PHP Forum Software 7.7.5