Risk management

MedStack Confidential

Metadata

Acquire and maintain independent information security certifications

Acquire and maintain a Threat and Risk Assessment (TRA) and a Privacy Impact Assessment (TRA)

Review information security internally

Distribute the results of reviews to

Risk management and treatment

Enforcement

References

CodeSectionTitleText
ISO 8.2 Information security risk assessment The organization shall perform information security risk assessments at planned intervals or when significant changes are proposed or occur, taking account of the criteria established in 6.1.2 a). The organization shall retain documented information of the results of the information security risk assessments.
ISO 8.3 Information security risk treatment The organization shall implement the information security risk treatment plan. The organization shall retain documented information of the results of the information security risk treatment.
ISO A.18.2 Information security reviews Objective: To ensure that information security is implemented and operated in accordance with the organizational policies and procedures.
CHI SR1 Threat and Risk Assessment Organizations hosting components of the EHRi must – and organizations connecting to the EHRi should – assess threats and risks to these components by careful review of a Threat and Risk Assessment (TRA). At a minimum, a TRA must include: a) An inventory of all information assets supporting the EHRi components, including data, services and technology. that must be protected and a determination of which assets include PHI; b) An assessment, for each information asset, of how critical it will be to maintain the confidentiality, integrity and availability of the asset, and accountability for the asset; c) A vulnerability analysis, including a comprehensive listing of the privacy and security vulnerabilities of the hosted EHRi components and a listing of the actual or planned safeguards that can protect against those vulnerabilities; d) A risk analysis that determines the residual risk after actual or planned safeguards are put in place; and e) A recommendation of whether residual risk is to be: i) further reduced (by adding specific safeguards to the system or scaling back system functionality); ii) transferred to a third party; or iii) accepted by the organization.
CHI SR4 Independent Review of Security Policy Implementation Organizations connecting to the EHRi or hosting components of the EHRi must have the implementation of their information security policy either: a) Reviewed independently; or b) Attested to in a written declaration by the organization’s Chief Executive Officer or Board of Directors.