Best Pen test strategy for HITRUST/HIPAA/Zero Trust frameworks - CYBRI

Best Pen test strategy for HITRUST/HIPAA/Zero Trust frameworks

|

BY Paul Kubler

Why the need for the HITRUST Approach?

The Health Information Trust Alliance, HITRUST, is an organization governed by several organizations from the healthcare industry and technology companies. HITRUST created and maintains the Common Security Framework (CSF), a framework to help healthcare organizations and their providers show their security and compliance in a consistent and streamlined manner.

Assembling and maintaining all the components of risk management and compliance programs comes with unique challenges. HITRUST understands and has built an integrated approach to solving these problems with components that are aligned, maintained, and comprehensive to support your organization’s goals.

The HITRUST CSF is a prescriptive set of controls that meets the requirements of multiple regulations and standards.

The framework provides a way to comply with standards such as ISO/IEC 27000-series HIPAA, since the HITRUST incorporates various security, privacy, and other regulatory requirements from existing frameworks.

What is the difference between HITRUST and HIPAA?

While HIPAA is a law created by law for compliance and regulation, HITRUST is a framework created by security industry experts, which includes components of HIPAA.

HITRUST gives organizations a way to show evidence of compliance with HIPAA-mandated security controls along with aligning to frameworks like ISO27001. HITRUST takes the requirements of HIPAA and builds on them, incorporating them into a framework based on security and risk.

Evolution of Zero Trust to support the healthcare environment

Many healthcare applications leverage Citrix and other virtual desktop technology to deliver Cerner, Allscripts and other medical applications to the various endpoint devices including tablets, nurses workstations, and mobile devices. Many of the medical applications originally only deployed on-premise now have a variety of cloud and hosted offerings. These medical software companies offered cloud options to help medical facilities ramp on the platform while minimizing hardware costs. 

Gartner helped define the term, “SASE or Service Access Service Edge”. 

SASE grew because CIO’s and CISO’s needed to define a new network edge or a secured entry point for end-users to connect to prior to gaining access to the actual corporate network. Previously, users would end their remote connection via virtual private networks or “VPNs” into a device within their companies’ data center to access the various medical applications.

In a SASE model, organizations could leverage a “cloud-based SASE” service to become the new network edge. Users would connect to the SASE service first, then companies would activate their “Zero Trust” endpoint security model by defining authentication policies prior to the user accessing the internal corporate network. The SASE solution would leverage the service provider’s SD-WAN for ease-of-use global proximity point of presence connectivity for less latency while implementing a consistent security endpoint security model. Medical applications could be accessed faster and with a greater level of security prior to the connection of the medical portals.

Pen testing and vulnerability scanning for HITRUST and zero trust frameworks 

The achievement of HITRUST certification requires a satisfactory completion of a HITRUST validated assessment by an external assessor firm . Organizations will need to hire HITRUST qualified firms with a strong background in the entire certification process. Another critical role an organization should be leveraging is a 3rd pen tester to engage with a series of black, gray, and white box engagements prior to the formal assessment for certification. The 3rd party pen could pose as a white hat hacker in tandem with the internal HITRUST group or the outside pen tester could execute a black box test. Both 3rd party pen test engagements should around the HITRUST/HIPAA medical record data controls to include identifying the following possible vulnerabilities:

  • Third-party access to data 
  • The use of mobile devices
  • The number of users accessing the HITRUST/Hipaa platforms 
  • Normal daily transactions are impactful to the controls of the system system.

Combined with ongoing vulnerability scanning of the HITRUST/HIPAA platforms, pen testing also should be executed after remediations have been completed.

Pen testing Zero Trust access layer into the HITRUST model

In current Zero Trust/SASE models, once the user has authenticated and their device has passed the security compliance requirements, is the corporate network and data safe? Well, yes in many cases.  The device is validated for patch levels, compliance, and users’ access is restricted either by application or network. 

However, how will the corporate know that the user is really that person? Leveraging a 3rd party pen tester will shed some light on how vulnerable or secure the new remote access is. Zero trust architectures along with SASE cloud access providers are designed to be very secure. However, the validation of the access of the users through the Zero trust layer into the internal HITRUST/Hipaa platforms is 100% on the organization. By leveraging 3rd party pen testing, organizations demonstrate a continuous monitoring and secure posture validation process and culture.

Discuss your project now

Related Content

Previous
Next

Schedule a personalized demo with CYBRI.

Don't wait, reputation damages & data breaches could be costly.

Tell us a little about your company so we can ensure your demo is as relevant as possible. We’ll take the scheduling from there!
Michael B.
Michael B.Managing Partner, Barasch & McGarry
Read More
I am an attorney who represents thousands of people in the 9/11 community. CYBRI helped my company resolve several cybersecurity issues. I definitely recommend working with CYBRI.
Tim O.
Tim O.CEO at Cylera
Read More
I’m using CYBRI and have been very impressed with the experience and quality of the experts and CYBRI’s customer service. It has been a super seamless process that I’m happy and pleased with – I recommend CYBRI to all businesses.
Sergio V.
Sergio V.CTO at HealthCare.com
Read More
I hired CYBRI to help my company with various cybersecurity services, specifically HIPAA and CCPA. I have been satisfied with the quality of work performed by the cybersecurity expert. The customer service is excellent. I would recommend CYBRI for all of your cybersecurity needs.
L.D. Salmanson
L.D. SalmansonCEO at Cherre.com
Read More
We worked with CYBRI on assessing vulnerabilities and understanding the risks of our client-facing web assets. We are satisfied with the results and the professionalism of the Red Team members. Highly recommend CYBRI to all businesses.
Marco Huslmann
Marco HuslmannCTO MyPostcard
Read More
CYBRI is a great solution that helps streamline the penetration testing process. I strongly recommend them and will work with them again.
Alex Rothberg
Alex RothbergCTO IntusCare
Read More
I highly recommend CBYRI to businesses that need penetration testing to ensure their business infrastructure is secure.
John Tambuting
John TambutingCTO Pangea.app
Read More
I am confident CYBRI is the right penetration testing choice if you are looking to build a secure business environment.
Previous
Next

Discuss your Project







    Michael B.
    Michael B.Managing Partner, Barasch & McGarry
    Read More
    I am an attorney who represents thousands of people in the 9/11 community. CYBRI helped my company resolve several cybersecurity issues. I definitely recommend working with CYBRI.
    Tim O.
    Tim O.CEO at Cylera
    Read More
    I’m using CYBRI and have been very impressed with the experience and quality of the experts and CYBRI’s customer service. It has been a super seamless process that I’m happy and pleased with – I recommend CYBRI to all businesses.
    Sergio V.
    Sergio V.CTO at HealthCare.com
    Read More
    I hired CYBRI to help my company with various cybersecurity services, specifically HIPAA and CCPA. I have been satisfied with the quality of work performed by the cybersecurity expert. The customer service is excellent. I would recommend CYBRI for all of your cybersecurity needs.
    L.D. Salmanson
    L.D. SalmansonCEO at Cherre.com
    Read More
    We worked with CYBRI on assessing vulnerabilities and understanding the risks of our client-facing web assets. We are satisfied with the results and the professionalism of the Red Team members. Highly recommend CYBRI to all businesses.
    Marco Huslmann
    Marco HuslmannCTO MyPostcard
    Read More
    CYBRI is a great solution that helps streamline the penetration testing process. I strongly recommend them and will work with them again.
    Alex Rothberg
    Alex RothbergCTO IntusCare
    Read More
    I highly recommend CBYRI to businesses that need penetration testing to ensure their business infrastructure is secure.
    John Tambuting
    John TambutingCTO Pangea.app
    Read More
    I am confident CYBRI is the right penetration testing choice if you are looking to build a secure business environment.
    Previous
    Next

    Find mission-critical vulnerabilities before hackers do.

    CYBRI’s manual pen tests are performed by U.S.-based highly certified Red Team experts.

    We help businesses detect & remediate catastrophic vulnerabilities in applications, cloud, and networks.