Tft2 Task 2 - Legal Analysis

630 Words3 Pages
This paper is an analysis of the security breach affecting the healthcare provider’s network and EHR system. The paper will focus of the creation of three organizational policy statements that could have helped to prevent this attack. 1. Audit of user access rights and privileges All user accounts will be audited and reviewed at an interval of at least every 90 days, and/or when any personnel changes (promoted, demoted, fired, etc) are made. Management will make use of a formal process to review each account to ensure each user has only minimum access needed to perform his/her job function. The company will make use of (third party or proprietary) software (see number 3) that will automatically log and notify administrators and/or management when any users’ privileges and/or rights are changed and/or elevated. Users’ access rights and privileges must be routinely reviewed to maintain effective control over networks, data and systems. This policy would have helped management and/or administrators to detect the unauthorized accounts and their subsequent privilege elevation. It is important to point out that this particular policy alone may not necessarily prevent attacks, but when implemented will help to build another layer of security. This policy was drafted using standard ISO/IEC 27002, 2005 11.2.4. 2. Remote access limitations Remote access to the companies’ network will only be granted using two-factor authentication. Remote access will only be allowed from a group of whitelisted IP addresses and/or networks. The company will make use of (third party or proprietary) software (see number 3) that will automatically log all remote access attempts (success or failure) Allowing remote access to the company network and EHR system essentially provides the potential for unauthorized access to anyone in the world. Limiting remote
Open Document