Why healthcare data security on the cloud feels like a black box?

Sumedh Chaudhary
5 min readDec 15, 2022

--

Healthcare data security is a growing concern as more and more sensitive patient information is stored on cloud-based systems. The #cloud offers many benefits for #healthcare organizations, such as increased data storage capacity, accessibility, and collaboration. However, these benefits come with the added responsibility of ensuring that patient data remains secure and compliant with industry regulations during any healthcare #digitaltransformation project on the cloud.

One of the biggest challenges in healthcare data security on the cloud is the issue of data breaches. In recent years, there have been several high-profile cases of healthcare organizations falling victim to cyber-attacks, resulting in the theft of sensitive patient information. These attacks can have serious consequences, including financial losses, damage to an organization’s reputation, and potential harm to patients.

Standard & Poors estimates that the cybersecurity insurance market was $5 billion in 2020 and that figure will grow 20- 30% per year in the short term.

To prevent data breaches, it is crucial for #cio of any healthcare organization to implement robust security measures on their cloud-based systems. This includes using strong, unique passwords for all user accounts, regularly updating security protocols, and implementing encryption for all stored data. In addition, organizations should carefully monitor their systems for any suspicious activity and have a plan in place for responding to potential threats. Even for experienced professionals in healthcare industry, things get confusing with all the jargon, rules and standards that apply to their healthcare data project.

When we talk about healthcare data security, the elephant in the room is compliance with HIPAA besides other industry regulations.

In the United States, the Health Insurance Portability and Accountability Act (HIPAA) was enacted by the United States Congress in 1996 and it went into effect on July 1, 1997. #hipaa sets strict standards for the protection of patient data. This includes requirements for access controls, data integrity, and transmission security. Organizations that fail to comply with HIPAA regulations can face significant fines and other penalties. There is also the General Data Protection Regulation (GDPR), a regulation in European Union (EU) law on data protection and privacy for all individuals within the EU and the European Economic Area (EEA). It also addresses the export of personal data outside the EU and EEA. The #gdpr aims to give control back to individuals over their personal data and to simplify the regulatory environment for international business by unifying the regulation within the EU. It became enforceable on May 25, 2018.

According to an IDC report, 58% of organizations are citing data security in the cloud and 53% privacy or GDPR concerns, cloud strategies are significantly impacted by concerns over trust.

Most public clouds Amazon Web Services (AWS), Microsoft Cloud, Google Cloud, IBM Cloud etc.) provide out-of-the-box tools for a HIPAA compliant cloud solution without need to implement expensive FedRAMP requirements. The minimum requirements for HIPAA compliance are listed below:

1. Monitor for Access Control:

2. Monitor for Suspicious Activities:

3. Implement Firewall Security:

4. Protect against Network Threats:

In the United States, key healthcare data security regulations to consider before your next cloud transformation project. Please note there are several other state and local regulations that are quite dated but are a subset of one of the below key regulations:

Even though many organizational budgets do not allow it, due to lack of awareness and fear of breach, many healthcare data organizations are opting for a FedRAMP solution when they could very well achieve their compliance goals with less cumbersome solutions.

  1. HITECH (Health Information Technology for Economic and Clinical Health) is a US federal law that aims to promote the adoption and meaningful use of health information technology, including electronic health records (EHRs) and other health information systems. It includes provisions for the protection of health information, such as requiring the use of secure data transmission and storage methods.
  2. NIST (National Institute of Standards and Technology) is a non-regulatory agency of the US Department of Commerce. It is responsible for developing standards, guidelines, and best practices for information technology, including cybersecurity. NIST works closely with other government agencies, industry stakeholders, and academia to advance the state of IT and ensure the security and reliability of information systems.

Not to confuse with healthcare data security, in the United States there are several data standards for healthcare industry. The most commonly used standards are:

  1. HL7 (Health Level Seven): HL7 is a set of international standards for exchanging healthcare-related information between software applications. It covers various aspects of healthcare data, including clinical, administrative, and financial information.
  2. LOINC (Logical Observation Identifiers Names and Codes): LOINC is a standardized system for identifying medical laboratory observations. It provides a unique identifier for each type of observation, as well as a universal code system for reporting and exchanging laboratory results.
  3. SNOMED CT (Systematized Nomenclature of Medicine — Clinical Terms): SNOMED CT is a comprehensive medical terminology used for electronic health records (EHRs) and other clinical information systems. It provides a standardized vocabulary for describing clinical concepts and recording clinical information.
  4. ICD-10 (International Classification of Diseases, 10th revision): ICD-10 is a standardized system for coding diseases and medical conditions. It is used by healthcare providers, payers, and researchers to classify and report on medical diagnoses and procedures.

These standards are used to ensure that healthcare data is consistent, accurate, and interoperable, which allows for better coordination of care and improved patient outcomes and does not directly impact healthcare data security. To ensure compliance with healthcare data security regulations, organizations should regularly audit their systems and conduct risk assessments. They should also work with their cloud service providers to ensure that their systems meet all relevant regulations and standards. In addition, organizations should provide regular training to their employees on data security best practices to help prevent accidental breaches.

Healthcare data security is complicated for several reasons. First, healthcare data is sensitive and personal, and therefore must be protected to maintain patient privacy and trust. This means that healthcare organizations must have robust security measures in place to prevent unauthorized access, disclosure, or misuse of patient data. Second, healthcare data is often highly fragmented, with different systems and providers storing and managing different aspects of a patient’s health information. This makes it difficult to ensure that all data is secure and protected, as there are many potential points of vulnerability. Third, the healthcare industry is constantly evolving, with new technologies and systems being introduced all the time. This can create additional security challenges, as healthcare organizations must keep up with these changes and ensure that their security measures are always up to date and effective.

Overall, the complexity of healthcare data and the constantly changing nature of the industry make healthcare data security a complex and challenging task. In conclusion, healthcare data security on the cloud is a critical concern for organizations that handle sensitive patient information. By implementing strong security measures, regularly monitoring their systems, and ensuring compliance with regulations, healthcare organizations can protect their patients’ data and maintain the trust of their clients.

Disclaimer: Opinions expressed are solely my own and do not express the views or opinions of my employer

Originally published at https://www.linkedin.com.

--

--