Site icon Check Point Blog

How To Become HIPAA Compliant in Amazon Web Services

HIPAA compliance is a cornerstone for protecting sensitive patient data in hospital information systems. From a compliance management perspective, HIPAA can be a tedious framework to work with. Turning the requirements into hard rules isn’t always easy and we have a number of customers who are dealing with this challenge on an ongoing basis.

In Dome9’s Compliance Engine, we already have a number of pre-built rulesets (bundles) for security frameworks like PCI DSS and the CIS Benchmark for AWS. We’re always working to improve these rules and add on new compliance bundles for the most common needs of our customers, which is what led us to HIPAA.

One of the challenges with pre-built content, is that every environment is different. Because everyone does things differently, you might need to customize the rules to make sure that they are perfectly tailored to your specific infrastructure. Traditionally you would need to write JavaScript or Ruby code to make these changes, but with Dome9 there’s an easier way. The Dome9 Governance Specification Language (GSL) allows you to easily modify and create your own rules without any scripting. Instead, you can simply click through the Rules Engine to build the rules without any coding knowledge.

Below is a breakdown of our new HIPAA bundle, as well as a number of guidelines and sample rules that you can take and use as a framework for your HIPAA compliance.

The main sections that we’re testing within the bundle is 164.312. Within the bundle you can drill down on each section we’re testing on to see how our rules are aligned with the requirement.

In addition to showing the associated section, there is content around how to remediate the issues in the unfortunate event that you fail one of the compliance checks.

Beyond the pre built rules that we built out for HIPAA, these are some some sample rules that you can use to customize the bundle to your environment:

Examples from the best practices:

Rules engine example: Instance should have tags with [ key=’has_PHI’ and value in(‘true’, ‘false’) ]

Rules engine example: Instance should have image=’ami-f173cc91′ or image=’ami-a58d0dc5′

After you pass the Rules Engine check, there is still more work to be done. There are other general guidelines and considerations that you should make sure you understand before putting PHI up in AWS:

As requirements are added, and the best practices for running HIPAA compliant workloads on AWS evolve, we will continue to add content to the HIPAA bundle (and the others!). We want to always make sure that we can give you the best coverage possible for keeping your infrastructure secure.

Exit mobile version