NIST SPECIAL PUBLICATION 1800-30B


Securing Telehealth Remote Patient Monitoring Ecosystem


Volume B:

Approach, Architecture, and Security Characteristics



Jennifer Cawthra*

Nakia Grayson

Ronald Pulivarti

National Cybersecurity Center of Excellence

National Institute of Standards and Technology


Bronwyn Hodges

Jason Kuruvilla*

Kevin Littlefield

Julie Snyder

Sue Wang

Ryan Williams*

Kangmin Zheng

The MITRE Corporation

McLean, Virginia


*Former employee; all work for this publication done while at employer.



February 2022


FINAL


This publication is available free of charge from https://doi.org/10.6028/NIST.SP.1800-30


The second draft of this publication is available free of charge from https://www.nccoe.nist.gov/sites/default/files/legacy-files/rpm-nist-sp1800-30-2nd-draft.pdf


nccoenistlogos




DISCLAIMER

Certain commercial entities, equipment, products, or materials may be identified by name or company logo or other insignia in order to acknowledge their participation in this collaboration or to describe an experimental procedure or concept adequately. Such identification is not intended to imply special status or relationship with NIST or recommendation or endorsement by NIST or NCCoE; neither is it intended to imply that the entities, equipment, products, or materials are necessarily the best available for the purpose.

National Institute of Standards and Technology Special Publication 1800-30B, Natl. Inst. Stand. Technol. Spec. Publ. 1800-30B, 202 pages, (February 2022), CODEN: NSPUE2

FEEDBACK

As a private-public partnership, we are always seeking feedback on our practice guides. We are particularly interested in seeing how businesses apply NCCoE reference designs in the real world. If you have implemented the reference design, or have questions about applying it in your environment, please email us at hit_nccoe@nist.gov.

All comments are subject to release under the Freedom of Information Act.

National Cybersecurity Center of Excellence
National Institute of Standards and Technology
100 Bureau Drive
Mailstop 2002
Gaithersburg, MD 20899

NATIONAL CYBERSECURITY CENTER OF EXCELLENCE

The National Cybersecurity Center of Excellence (NCCoE), a part of the National Institute of Standards and Technology (NIST), is a collaborative hub where industry organizations, government agencies, and academic institutions work together to address businesses’ most pressing cybersecurity issues. This public-private partnership enables the creation of practical cybersecurity solutions for specific industries, as well as for broad, cross-sector technology challenges. Through consortia under Cooperative Research and Development Agreements (CRADAs), including technology partners—from Fortune 50 market leaders to smaller companies specializing in information technology security—the NCCoE applies standards and best practices to develop modular, adaptable example cybersecurity solutions using commercially available technology. The NCCoE documents these example solutions in the NIST Special Publication 1800 series, which maps capabilities to the NIST Cybersecurity Framework and details the steps needed for another entity to re-create the example solution. The NCCoE was established in 2012 by NIST in partnership with the State of Maryland and Montgomery County, Maryland.

To learn more about the NCCoE, visit https://www.nccoe.nist.gov/. To learn more about NIST, visit

NIST CYBERSECURITY PRACTICE GUIDES

NIST Cybersecurity Practice Guides (Special Publication 1800 series) target specific cybersecurity challenges in the public and private sectors. They are practical, user-friendly guides that facilitate the adoption of standards-based approaches to cybersecurity. They show members of the information security community how to implement example solutions that help them align with relevant standards and best practices and provide users with the lists of materials, configuration files, and other information they need to implement a similar approach.

The documents in this series describe example implementations of cybersecurity practices that businesses and other organizations may voluntarily adopt. These documents do not describe regulations or mandatory practices nor do they carry statutory authority.

ABSTRACT

Increasingly, healthcare delivery organizations (HDOs) are relying on telehealth and remote patient monitoring (RPM) capabilities to treat patients at home. RPM is convenient and cost-effective, and its adoption rate has increased. However, without adequate privacy and cybersecurity measures, unauthorized individuals may expose sensitive data or disrupt patient monitoring services.

RPM solutions engage multiple actors as participants in patients’ clinical care. These actors include HDOs, telehealth platform providers, and the patients themselves. Each participant uses, manages, and maintains different technology components within an interconnected ecosystem, and each is responsible for safeguarding their piece against unique threats and risks associated with RPM technologies.

This practice guide assumes that the HDO engages with a telehealth platform provider that is a separate entity from the HDO and patient. The telehealth platform provider manages a distinct infrastructure, applications, and set of services. The telehealth platform provider coordinates with the HDO to provision, configure, and deploy the RPM components to the patient home and assures secure communication between the patient and clinician.

The NCCoE analyzed RPM ecosystem risk factors by applying methods described in the NIST Risk Management Framework. The NCCoE also leveraged the NIST Cybersecurity Framework, NIST Privacy Framework, and other relevant standards to identify measures to safeguard the ecosystem. In collaboration with healthcare, technology, and telehealth partners, the NCCoE built an RPM ecosystem in a laboratory environment to explore methods to improve the cybersecurity of an RPM.

Technology solutions alone may not be sufficient to maintain privacy and security controls on external environments. This practice guide notes the application of people, process, and technology as necessary to implement a holistic risk mitigation strategy.

This practice guide’s benefits include helping organizations assure the confidentiality, integrity, and availability of an RPM solution, enhancing patient privacy and limiting HDO risk when implementing an RPM solution.

KEYWORDS

access control; authentication; authorization; behavioral analytics; cloud storage; data privacy; data security; encryption; HDO; healthcare; healthcare delivery organization; remote patient monitoring; RPM; telehealth; zero trust

ACKNOWLEDGMENTS

We are grateful to the following individuals for their generous contributions of expertise and time.

Name

Organization

Alex Mohseni

Accuhealth

Stephen Samson

Accuhealth

Brian Butler

Cisco

Matthew Hyatt

Cisco

Kevin McFadden

Cisco

Peter Romness

Cisco

Brad Hoehn

Huntington Ingalls Industries-Mission Driven Innovative Solutions (HII-MDIS)

David Lemire

Huntington Ingalls Industries-Mission Driven Innovative Solutions (HII-MDIS)

Steven Dean

Inova Health System

Zach Furness

Inova Health System

James Carder

LogRhythm

Brian Coulson

LogRhythm

Steven Forsyth

LogRhythm

Jake Haldeman

LogRhythm

Andrew Hollister

LogRhythm

Zack Hollister

LogRhythm

Dan Kaiser

LogRhythm

Sally Vincent

LogRhythm

Vidya Murthy

MedCrypt

Axel Wirth

MedCrypt

Stephanie Domas

MedSec

Garrett Sipple

MedSec

Nancy Correll

The MITRE Corporation

Spike Dog

The MITRE Corporation

Robin Drake

The MITRE Corporation

Sallie Edwards

The MITRE Corporation

Donald Faatz

The MITRE Corporation

Nedu Irrechukwu

The MITRE Corporation

Karri Meldorf

The MITRE Corporation

Stuart Shapiro

The MITRE Corporation

Barbara Cuthill

NIST

Jeffrey Marron

NIST

Paul Watrobski

NIST

John Dwyier

Onclave Networks, Inc. (Onclave)

Chris Grodzickyj

Onclave

Marianne Meins

Onclave

Dennis Perry

Onclave

Christina Phillips

Onclave

Robert Schwendinger

Onclave

James Taylor

Onclave

Chris Jensen

Tenable

Joshua Moll

Tenable

Jeremiah Stallcup

Tenable

Rebecca Herold

The Privacy Professor Consultancy

Julio C. Cespedes

The University of Mississippi Medical Center

Saurabh Chandra

The University of Mississippi Medical Center

Donald Clark

The University of Mississippi Medical Center

Alan Jones

The University of Mississippi Medical Center

Kristy Simms

The University of Mississippi Medical Center

Richard Summers

The University of Mississippi Medical Center

Steve Waite

The University of Mississippi Medical Center

Dele Atunrase

Vivify Health

Aaron Gatz

Vivify Health

Michael Hawkins

Vivify Health

Robin Hill

Vivify Health

Dennis Leonard

Vivify Health

David Norman

Vivify Health

Bill Paschall

Vivify Health

Eric Rock

Vivify Health

Alan Stryker

Vivify Health

Dave Sutherland

Vivify Health

Michael Tayler

Vivify Health

The Technology Partners/Collaborators who participated in this build submitted their capabilities in response to a notice in the Federal Register. Respondents with relevant capabilities or product components were invited to sign a Cooperative Research and Development Agreement (CRADA) with NIST, allowing them to participate in a consortium to build this example solution. We worked with:

Technology Partner/Collaborator

Build Involvement

Accuhealth

Accuhealth Evelyn

Cisco

Cisco Firepower Version 6.3.0

Cisco Umbrella

Cisco Stealthwatch Version 7.0.0

Inova Health System

subject matter expertise

LogRhythm

LogRhythm XDR Version 7.4.9

LogRhythm NetworkXDR Version 4.0.2

MedCrypt

subject matter expertise

MedSec

subject matter expertise

Onclave

Onclave Zero Trust Platform Version 1.1.0

Tenable

Tenable.sc Vulnerability Management Version 5.13.0 with Nessus

The University of Mississippi Medical Center

subject matter expertise

Vivify Health

Vivify Pathways Home

Vivify Pathways Care Team Portal

DOCUMENT CONVENTIONS

The terms “shall” and “shall not” indicate requirements to be followed strictly to conform to the publication and from which no deviation is permitted. The terms “should” and “should not” indicate that among several possibilities, one is recommended as particularly suitable without mentioning or excluding others, or that a certain course of action is preferred but not necessarily required, or that (in the negative form) a certain possibility or course of action is discouraged but not prohibited. The terms “may” and “need not” indicate a course of action permissible within the limits of the publication. The terms “can” and “cannot” indicate a possibility and capability, whether material, physical, or causal.

PATENT DISCLOSURE NOTICE

NOTICE: The Information Technology Laboratory (ITL) has requested that holders of patent claims whose use may be required for compliance with the guidance or requirements of this publication disclose such patent claims to ITL. However, holders of patents are not obligated to respond to ITL calls for patents and ITL has not undertaken a patent search in order to identify which, if any, patents may apply to this publication.

As of the date of publication and following call(s) for the identification of patent claims whose use may be required for compliance with the guidance or requirements of this publication, no such patent claims have been identified to ITL.

No representation is made or implied by ITL that licenses are not required to avoid patent infringement in the use of this publication.

List of Figures

Figure 4‑1 RPM Architecture

Figure 4‑2 Architecture Layers

Figure 4‑3 RPM Communications Paths

Figure 4‑4 RPM Dataflow Option 1

Figure 4‑5 RPM Dataflow Option 2

Figure 4‑6 Network Segmentation and VLAN Within the RPM Lab

Figure 4‑7 Final Architecture

Figure C-1 Risk Management Framework

Figure D-1 Privacy View of RPM Solution Dataflow

Figure F-1 Enclave Gateway Model

List of Tables

Table 3‑1 Threat Taxonomy

Table 3‑2 Problematic Data Action Taxonomy

Table 3‑3 Cybersecurity Risk Taxonomy

Table 3‑4 Privacy Risk Taxonomy

Table 3‑5 Security Characteristics and Controls Mapping–NIST Cybersecurity Framework

Table 3‑6 Privacy Characteristics and Controls Mapping–NIST Privacy Framework

Table 3‑7 Products and Technologies

Table 6‑1 Functional Evaluation Requirements

Table C-1 Information Types and Categorizations

Table C-2 Assessment Scale: Likelihood of Threat Event Initiation

Table C-3 Threats Applied to the Patient Home

Table C-4 Threats Applied to the Telehealth Platform Provider

Table C-5 Threats Applied to the HDO

Table C-6 Taxonomy of Threat Sources

Table C-7 RPM Functions and Processes

Table C-8 Vulnerability Taxonomy

Table C-9 Components in the Patient Home Environment

Table C-10 Biometric Device Subcomponent Breakdown

Table C-11 Interface Device Subcomponent Breakdown

Table C-12 Laptop Subcomponent Breakdown

Table C-13 Desktop Subcomponent Breakdown

Table C-14 Threat Event to Adverse Action Mapping

Table E-1 Mapping of Device Cybersecurity Capabilities and Nontechnical Supporting Capabilities to NIST Cybersecurity Framework Subcategories of the RPM Project

Table E-2 Device Cybersecurity Capabilities and Nontechnical Supporting Capabilities that Map to Each of the Functional Test Cases

1 Summary

This practice guide demonstrates how healthcare delivery organizations (HDOs) can implement cybersecurity and privacy controls to enhance the resiliency of telehealth services. In collaboration with industry partners, the National Cybersecurity Center of Excellence (NCCoE) at the National Institute of Standards and Technology (NIST) built a laboratory environment to simulate the telehealth ecosystem and enable remote patient monitoring (RPM) services for patients.

RPM is convenient, cost-effective, and growing, but it comes with security and privacy risks. Patient monitoring systems are often found in controlled healthcare facility environments. RPM is different in that monitoring equipment is deployed in the patient’s home, which may not offer the same level of cybersecurity or physical security control to prevent misuse or compromise. Without privacy or cybersecurity controls in place within the RPM ecosystem, patient data and the ability to communicate with the care providers may be compromised.

This practice guide explores a situation in which a care provider prescribes deploying an RPM device to the patient home. The RPM device captures biometric data on regular intervals, conveys the data to the clinical care team, and allows patient-clinician communication without the patient making an in-person visit to the HDO. RPM enables care based on the patient’s needs, regardless of geographic constraints.

Capturing biometric data at regular intervals allows clinicians to have broader insight into a patient’s condition. With larger data sets, clinicians can monitor the patient’s condition and make diagnosis and treatment decisions with more robust information. RPM solutions allow audio and video communication in addition to utilizing biometric data, and they support the patient-clinician relationship.

Implementing an RPM ecosystem involves multiple parties and environments. In developing the reference architecture for this practice guide, the NCCoE considered components that would be deployed in three distinct domains that encompass the RPM ecosystem: the patient home environment, the telehealth platform provider, and the HDO. The project team engaged with a telehealth platform provider that leveraged cloud services and facilitated audio- and videoconferencing between the patient home and the HDO. The telehealth platform provider provisioned and managed biometric devices that were deployed in the patient home, and routed data and communication between the patient home and the HDO.

The NCCoE built a laboratory environment to simulate the telehealth ecosystem, performed a risk assessment, and developed an example implementation that demonstrates how HDOs can use standards-based, commercially available cybersecurity technologies and collaborate with telehealth platform providers to assure privacy and security biometric devices that are deployed to the patient home.

For ease of use, the following paragraphs provide a short description of each section of this volume.

Section 1, Summary, presents: the challenge addressed by the NCCoE project with an in-depth look at our approach, the architecture, and the security characteristics we used; the solution demonstrated to address the challenge; benefits of the solution; and the collaborators who participated in building, demonstrating, and documenting the solution.

Section 2, How to Use This Guide, explains how business decision makers, program managers, information technology (IT) professionals (e.g., systems administrators), and biometric engineers might use each volume of the guide.

Section 3, Approach, offers a detailed treatment of the scope of the project, the risk assessment that informed platform development, and the technologies and components that industry collaborators gave us to enable platform development.

Section 4, Architecture, specifies the components within the RPM ecosystem from business, security, and infrastructure perspectives and details how data and processes flow throughout the ecosystem. This section also describes the security capabilities and controls referenced in the NIST Cybersecurity Framework through tools provided by the project collaborators.

Section 5, Security and Privacy Characteristic Analysis, provides details about the tools and techniques used to perform risk assessments pertaining to RPM.

Section 6, Functional Evaluation, summarizes the test sequences employed to demonstrate security platform services, the NIST Cybersecurity Framework Functions to which each test sequence is relevant, and the NIST Special Publication (SP) 800-53 Revision 5 controls demonstrated in the example implementation.

Section 7, Future Build Considerations, is a brief treatment of other applications that NIST might explore in the future to further protect a telehealth environment.

The appendices provide acronym translations, references, a deeper dive into the threats and risks associated with RPM, the review of the NIST Privacy Risk Assessment Methodology (PRAM), and a list of additional informative security references cited in the framework.

1.1 Challenge

Telehealth RPM solutions deploy components across multiple infrastructure domains that are maintained uniquely. When HDOs deploy RPM solutions, those solutions implement architectures that distribute components across the HDO, telehealth platform providers, and patient homes. Each of these respective environments is managed by different groups of people, often with different sets of resources and technical capabilities. Risks are distributed across the solution architecture, and the methods by which one may mitigate those risks vary in complexity. While HDOs do not have the ability to manage and deploy privacy and cybersecurity controls unilaterally, they retain the responsibility to ensure that appropriate controls and risk mitigation are applied.

This practice guide can help your organization:

  • Identify risks associated with the solution architecture

  • Apply the NIST Privacy Framework to broaden understanding of risk

  • Assure that HDOs partner with appropriate telehealth platform providers to extend privacy and cybersecurity control deployment, management, and efficacy

  • Consider future technologies that augment data communications safeguards

1.2 Solution

Technology solutions alone may not be sufficient to maintain privacy and security controls on external environments. This practice guide notes the involvement of people, process, and technology as necessary to implement a holistic risk mitigation strategy. When developing this practice guide, the NCCoE team applied risk assessment approaches to determine where risks may occur and used assessment processes to identify applicable controls.

The NCCoE collaborated with healthcare, technology, and telehealth partners to build a distributed RPM solution. The RPM solution implemented controls that safeguard the HDO environment and documented approaches that the telehealth platform provider addresses. Telehealth platform providers assure that RPM components are isolated within the patient home environment. The telehealth platform provider assures end-to-end data security between the patient and the HDO.

2 How to Use This Guide

This NIST Cybersecurity Practice Guide demonstrates a standards-based reference design and provides users with the information they need to replicate an RPM environment. This reference design is modular and can be deployed in whole or in part.

This guide contains three volumes:

  • NIST SP 1800-30A: Executive Summary

  • NIST SP 1800-30B: Approach, Architecture, and Security Characteristics–what we built and why (you are here)

  • NIST SP 1800-30C: How-To Guides–instructions for building the example solution

Depending on your role in your organization, you might use this guide in different ways:

Business decision makers, including chief security and technology officers, will be interested in the Executive Summary, NIST SP 1800-30A, which describes the following topics:

  • challenges that enterprises face in securing the RPM ecosystem

  • example solution built at the NCCoE

  • benefits of adopting the example solution

Technology or security program managers who are concerned with how to identify, understand, assess, and mitigate risk will be interested in this part of the guide, NIST SP 1800-30B, which describes what we did and why. The following sections will be of particular interest:

  • Section 3.4, Risk Assessment, provides a description of the risk analysis we performed

  • Section 3.5, Security Control Map, maps the security characteristics of this example solution to cybersecurity standards and best practices

You might share the Executive Summary, NIST SP 1800-30A, with your leadership team members to help them understand the importance of adopting standards-based commercially available technologies that can help secure the RPM ecosystem.

IT professionals who want to implement an approach like this will find the whole practice guide useful. You can use the how-to portion of the guide, NIST SP 1800-30C:, to replicate all or parts of the build created in our lab. The how-to portion of the guide provides specific product installation, configuration, and integration instructions for implementing the example solution. We do not re-create the product manufacturers’ documentation, which is generally widely available. Rather, we show how we incorporated the products together in our environment to create an example solution.

This guide assumes that IT professionals have experience implementing security products within the enterprise. While we have used a suite of commercial products to address this challenge, this guide does not endorse these particular products. Your organization can adopt this solution or one that adheres to these guidelines in whole, or you can use this guide as a starting point for tailoring and implementing parts of the NCCoE’s risk assessment and deployment of a defense-in-depth strategy in a distributed RPM solution. Your organization’s security experts should identify the products that will best integrate with your existing tools and IT system infrastructure. We hope that you will seek products that are congruent with applicable standards and best practices. Section 3.6, Technologies, lists the products we used and maps them to the cybersecurity controls provided by this reference solution.

A NIST Cybersecurity Practice Guide does not describe “the” solution but a possible solution. Comments, suggestions, and success stories will improve subsequent versions of this guide. Please contribute your thoughts to hit_nccoe@nist.gov.

Acronyms used in figures are in the List of Acronyms appendix.

2.1 Typographic Conventions

The following table presents typographic conventions used in this volume.

Typeface/ Symbol

Meaning

Example

Italics

file names and path names;

references to documents that are not hyperlinks; new terms; and placeholders

For language use and style guidance, see the NCCoE Style Guide.

Bold

names of menus, options, command buttons, and fields

Choose File > Edit.

Monospace

command-line input, onscreen computer output, sample code examples, and status codes

mkdir

Monospace (block)

multi-line input, on-screen computer output, sample code examples, status codes

% mkdir -v nccoe_projects
mkdir: created directory 'nccoe_projects'

blue text

link to other parts of the document, a web URL, or an email address

All publications from NIST’s NCCoE are available at https://www.nccoe.nist.gov.

3 Approach

RPM is a telehealth use case wherein healthcare providers can use internet-based technologies to track biometric data from the patient’s home. Patients may have chronic or recurring health conditions that require regular clinical monitoring; however, in-person visitation may be impractical or undesirable. Technology enables capturing biometric and patient-generated data, having those data relayed to systems that clinicians may use to evaluate a patient, and bidirectional communication of the data between the patient and clinician. RPM may be an appropriate means for performing healthcare in pandemic scenarios or to address patients who may live in parts of the country where healthcare settings or practitioners are scarce.

The NCCoE collaborated with a healthcare Community of Interest (COI) that included technology and cybersecurity vendors, healthcare cybersecurity subject matter experts, and healthcare systems to identify RPM use cases, data workflows, ecosystem actor, and general deployment architecture. Further, with the assistance of the COI and external cybersecurity subject matter experts, a risk assessment was performed and reviewed, thereby confirming the measures and outcomes that were determined from the risk assessment activity.

Additionally, this project reviewed NIST SP 800-171 Rev. 2, Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations [B1], as well as NIST SP 800-181 Rev. 1, Workforce Framework for Cybersecurity (NICE Framework) [B2], for further guidance. These documents serve as background for this project, with primary emphasis on the NIST Cybersecurity Framework [B3], the NIST Risk Management Framework [B4], and the NIST Privacy Framework [B5].

3.1 Audience

This guide is intended for professionals implementing an RPM ecosystem for HDOs that use third-party telehealth platform providers. This guide examines scenarios where HDOs partner with a third-party telehealth platform provider where that telehealth platform provider manages devices that are used by the patient in their home setting. The telehealth platform provider implements technology that collects and makes biometric data available to clinicians, thus allowing the HDO to focus on patient care delivery. Approaches and controls focus on securing end-to-end communications and safeguarding assets and data that reside at HDO facilities; and they also discuss measures that HDOs and telehealth platform providers should implement in the patient home.

3.2 Scope

This RPM practice guide focuses on scenarios where patients with chronic or recurring conditions have biometric devices in their home that enable clinicians to regularly receive biometric data. The scope of this practice guide is limited to remote patient monitoring and does not include remote care. Patients and clinicians may use audio- and videoconferencing. The solution includes a third-party telehealth platform provider that provisions and manages biometric devices and provides means of communication.

3.3 Assumptions

This practice guide makes the following assumptions:

  • RPM architecture includes deploying components to three distinct domains: the patient home, the telehealth platform provider, and the HDO.

  • HDOs are regulated entities and must comply with federal, state, and local laws and regulations. In complying with laws and regulations, HDOs have implemented adequate privacy and security programs that include activities to address risk to both the organization and individuals when deploying an RPM architecture. Controls that have been implemented in accordance with laws and regulations provide an enterprise scope that this document refers to as pervasive controls.

  • The telehealth platform provider maintains an adequate privacy and security control environment.

  • The telehealth platform provider manages the configuration of patient home-deployed equipment.

  • The patient home may have different communications options such as cellular data connectivity or broadband internet.

  • RPM solutions emphasize collaboration. An RPM program’s efficacy depends on the patient, the telehealth platform provider, and the HDO to participate in the program and apply adequate privacy and security practices. The HDO does not define the control environments for the telehealth platform provider or the patient home. Each participant needs sufficient awareness and exercises appropriate control over components that operate in their domain.

  • Patient engagement activities provide the patient a clear understanding of privacy practices and expectations that address the specifics of the RPM architecture.

For this practice guide, telehealth platform providers deployed biometric devices with cellular data capabilities. Additionally, this practice guide implemented a solution for biometric devices that used patient home Wi-Fi communications.

3.4 Risk Assessment

NIST SP 800-30 Revision 1, Guide for Conducting Risk Assessments, states that risk is “a measure of the extent to which an entity is threatened by a potential circumstance or event, and typically a function of: (i) the adverse impacts that would arise if the circumstance or event occurs; and (ii) the likelihood of occurrence”. The guide further defines risk assessment as “the process of identifying, estimating, and prioritizing risks to organizational operations (including mission, functions, image, reputation), organizational assets, individuals, other organizations, and the Nation, resulting from the operation of an information system. Part of risk management incorporates threat and vulnerability analyses, and considers mitigations provided by security controls planned or in place”.

The NCCoE recommends that any discussion of risk management, particularly at the enterprise level, begins with a comprehensive review of NIST SP 800-37 Revision 2, Risk Management Framework for Information Systems and Organizations.

The Risk Management Framework (RMF) guidance, as a whole, proved to be invaluable in giving us a baseline to assess risks, from which we developed the project, the security characteristics of the build, and this guide.

In this practice guide, the NCCoE implements multiple approaches in assessing risk. An RPM environment is composed of multiple domains, with different constituents managing each domain. When analyzing risk, this practice guide contextualizes that risk and selects mitigating controls by disrupting threats. A description of how this practice guide addresses these concepts is in Appendix C, Threats and Risks. The risk assessments included in Appendix C represent how the practice guide examines risks. Organizations may find that the threats, vulnerabilities, and risks that they observe may differ from this practice guide’s assessment. The risk assessments in this practice guide serve as examples that may catalyze how organizations perform their own risk assessments.

3.4.1 Threats

NIST SP 800-30 Revision 1 defines a threat as “[a]ny circumstance or event with the potential to adversely impact organizational operations and assets, individuals, other organizations, or the Nation through an information system via unauthorized access, destruction, disclosure, or modification of information, and/or denial of service”. Threats are actions that may compromise a system’s confidentiality, integrity, or availability [B6]. Table 3‑1 describes threats that have been evaluated for this project. Threats evolve, and an organization needs to perform its own analysis when evaluating threats and risks that the organization faces.

Table 3‑1 below is a sample threat taxonomy as it applies across the entire RPM ecosystem. The threat taxonomy uses: a confidentiality (C), integrity (I), and availability (A) categorization; the threat event considered; and a description of the threat event. While the threat taxonomy provides a landscape view of threats, organizations may want to perform threat modeling to determine contextual application of threats. Appendix C, Threats and Risks, describes concepts on how to examine contextualized threats.

Table 3‑1 Threat Taxonomy

C, I, A

Threat Event

Description

C

phishing

Phishing attacks are a form of social engineering, where the attacker presents themselves as a trusted party to gain the confidence of the victim.

I, A

malicious software

Malicious software (malware) is unauthorized code that may be introduced to a system. It performs unintended actions that may disrupt normal system function. Malware may masquerade as desirable apps or applications.

I, A

command and control

Command and control attacks may begin with deployment of malware. Malware may allow a system to be operated remotely by unauthorized entities. Should a system fall victim to a command-and-control attack, that system may then be used as a pivot point to attack other components, either within the organization’s infrastructure or as a point where attacks may be launched against other organizations.

A

ransomware

Ransomware is a form of malware that disrupts access to system resources. A typical form of ransomware involves the malware employing encryption that disables a legitimate system user from accessing files. Ransomware attacks generally involve a demand for payment to restore files. Payment does not ensure that the attacker will decrypt files, however.

C

credential escalation

Credential escalation attacks seek to take user account capabilities and extend those to a privileged level of capability.

I, A

operating system or application disruption

The operating system or application may be adversely affected by malicious actors who successfully implement malware on the target device. Data may be altered or the device or application may not function properly.

C

data exfiltration

Malicious actors may be able to retrieve sensitive information from vulnerable devices. Malware may be used for this purpose.

A

denial of service attack

Flooding network connections with high-volume traffic to disrupt communication in patient home, between home and telehealth platform, or between telehealth platform provider and HDO. This type of attack could also be used to damage a device, e.g., through accelerated battery depletion.

I

transmitted data manipulation

Unauthorized individuals may intercept and alter data transmissions.

3.4.2 Vulnerabilities

This practice guide uses a customized application for identifying vulnerabilities, which aggregates vulnerabilities identified in NIST SP 800-30 Revision 1. As noted in this special publication, a vulnerability is a deficiency or weakness that a threat source may exploit, resulting in a threat event. The document further describes how vulnerabilities may exist in a broader context, i.e., that they may be found in organizational governance structures, external relationships, and mission/business processes. The table in Section C-6 of Appendix C, Threats and Risks, enumerates those vulnerabilities by using a holistic approach and represents those vulnerabilities that this project identified and for which it offers guidance.

3.4.3 Problematic Data Actions for Privacy

This build considered operational activities of the example solution that interact with patient data during RPM processes (“data actions”) and identified those that potentially cause problems to individuals.

The NIST Privacy Framework defines a problematic data action as “a data action that could cause an adverse effect for individuals” [B5]. Problematic data actions can result in privacy risk to individuals and prevent an organization from developing a solution that meets the privacy engineering objectives of:

  • predictability: enabling reliable assumptions by individuals, owners, and operators about data and their processing by a system, product, or service

  • manageability: providing the capability for granular administration of data, including alteration, deletion, and selective disclosure

  • disassociability: enabling the processing of data or events without association to individuals or devices beyond the operational requirements of the system

Table 3‑2 below demonstrates the problematic data action taxonomy identified for the entire RPM ecosystem. This Problematic Data Action Taxonomy uses: a predictability (P), manageability (M), and disassociability (D) designation; the problematic data action considered; and the description of the problematic data action. While the Problematic Data Action Taxonomy provides a landscape view of problematic data action, an organization may want to perform a risk assessment to determine contextual application of the problematic data action. The discussion about problematic data actions and risks in Appendix D introduces the PRAM [B7] and provides a more detailed analysis.

Table 3‑2 Problematic Data Action Taxonomy

P, M, D

Problematic Data Action

Description

P, M

distortion

Inaccurate or misleadingly incomplete data are used or disseminated. Distortion can present users in an inaccurate, unflattering, or disparaging manner, opening the door for stigmatization, discrimination, or loss of liberty.

M

insecurity

Lapses in data security can result in various problems, including loss of trust, exposure to economic loss and other identity theft-related harms, and dignity losses.

D, M

re-identification

De-identified data, or data otherwise disassociated from specific individuals, become identifiable or associated with specific individuals again. It can lead to problems such as discrimination, loss of trust, and dignity losses.

P, M

unanticipated revelation

Data reveal or expose an individual or facets of an individual in unexpected ways. Unanticipated revelation can arise from aggregation and analysis of large and/or diverse data sets. Unanticipated revelation can give rise to dignity losses, discrimination, and loss of trust and autonomy.

The project team used the NIST PRAM [B7] and accompanying Catalog of Problematic Data Actions and Problems [B8] to conduct this analysis. Table 3‑2, Problematic Data Action Taxonomy, provides the results of this analysis. See Appendix D for additional considerations regarding examples of problematic data actions for RPM solutions.

3.4.4 Risk

As noted in Section 3.4, NIST SP 800-30 Revision 1, Guide for Conducting Risk Assessments, defines risk as “a measure of the extent to which an entity is threatened by potential circumstance or event, and is typically a function of: (i) the adverse impacts that would arise if the circumstance or event occurs; and (ii) the likelihood of occurrence” [B9].

Risk is the adverse impact; that is, risk is the result when a threat (attack) successfully leverages one or more vulnerabilities. As organizations consider risk, they should note that risk is not discrete; that is, one may realize multiple risks based on a successful attack. Notwithstanding, we consider those risks identified below. In reviewing these risks, please note that we consider unique scenarios that presume certain attack types for the two risks categorized as availability risks, those being ransomware and pivot point attacks.

Table 3‑3, Cybersecurity Risk Taxonomy, describes high-level cybersecurity risks that affect the RPM environment. The risk taxonomy table captures key risks, assigning where the risk may impact the organization across a confidentiality, integrity, and availability (CIA) [B6] dimension.

Table 3‑3 Cybersecurity Risk Taxonomy

C,I,A

Risk

Description

Risk Level

C

fraudulent use of health-related information

Health-related information may be used for several different fraudulent means, such as identity theft, insurance fraud, or extortion.

medium

I

patient diagnoses disrupted based on timeliness interruption, leading to patient safety concerns

Unavailability or significant delay in delivering biometric data may negate the benefits of remote patient monitoring. Clinicians may not be able to provide appropriate care should biometric data transmission be disrupted.

medium

I

incorrect patient diagnosis due to change of data

A critical patient event is missed due to changes in the data stream between device and HDO.

high

A

process disruption due to ransomware

Ransomware may prevent normal device operations. Data may be irretrievable and, therefore, may prevent clinical care.

high

I, A

systemic disruption due to component compromise

Disruptions to the system that affect its availability or integrity may compromise the benefits derived from remote patient monitoring.

high

I

clinician misdiagnosis

If data are altered inappropriately, clinicians may make inaccurate diagnoses, resulting in patient safety issues.

high

Table 3‑4, Privacy Risk Taxonomy, describes high-level privacy risks that affect the RPM environment. Table 3‑4 captures key risks, assigning where the risk may impact individuals, in the areas of predictability, manageability, and disassociability [B5]. Privacy risk levels to individuals depend on the context of specific RPM solution deployment and are not included. These risks are discussed further in Appendix D.

Table 3‑4 Privacy Risk Taxonomy

P, M, D

Risk

Description

M

Storage and movement of data create multiple points of potential exposure after data are collected from the patient.

Insecurity: Storage and movement of data create multiple points of potential exposure after they are collected from the patient.

RPM context: Biometric data and patient health information flow through various entities in the RPM solution, each of which plays a role in protecting the information.

P, M

Biometric device types can indicate patient health problems that individuals would prefer not to disclose beyond their healthcare provider.

Unanticipated revelation: Biometric device types can indicate patient health problems that individuals would prefer not to disclose beyond their healthcare provider.

RPM context: Using one or more biometric devices can indicate—to others beyond the patient’s healthcare provider—potential health problems for which a patient is being monitored.

P, M

Incorrect data capture of readings by devices may impact quality of patient care.

Distortion: Device misuse may cause a failure to monitor patients in accordance with their healthcare plan.

RPM context: Incorrect or unintended use of biometric devices may introduce data quality issues into the RPM environment, resulting in inaccurate or incomplete data being used to make decisions regarding patient care.

D, M

Aggregated data may expose patient information.

Re-identification: Associating biometric data with patient identifiers can expose health conditions.

RPM context: Associating biometric data in a way that exposes information about the patient could cause issues such as embarrassment and discrimination. Disassociated processing is intentionally used during some dataflows within the RPM solution to mitigate the risk of exposing identifiable patient information to vendors, administrators, and other practitioners who are outside the patient’s care team.

P, M

Exposure of patient information through multiple providers of system components increases the likelihood of exposure of patient data to unintended recipients.

Unanticipated Revelation: Data processing is handled by multiple parties within the background of the ecosystem and is transparent to the patient.

RPM context: Patient health information may be revealed in ways or to parties that the individual may not expect. Additionally, using one or more biometric devices can indicate potential health problems—to others beyond the patient’s healthcare provider—for which a patient is being monitored.

3.4.5 Mitigating Risk

As noted above, risk is the adverse outcome when a threat successfully leverages a vulnerability. Mitigating risk may take many different forms. This practice guide addresses risk by performing a threat modeling exercise and by mitigating threats. The previous sections discussed threat from a holistic perspective. That is, the noted threats enumerate a broad survey of attack types that may adversely affect the RPM ecosystem. RPM decomposes to the following three distinct domains: patient home, telehealth platform provider, and HDO. As organizations consider measures to disrupt threats and adverse actions made against the ecosystem, an opportunity exists where organizations examine threats to identify controls that mitigate adverse actions identified by threat modeling.

3.5 Security Control Map

As this practice guide considered RPM ecosystem risks, the team performed a mapping to the NIST Cybersecurity Framework [B3]. This mapping established an initial set of appropriate control Functions, Categories, and Subcategories. The mapping demonstrated how selected Cybersecurity Framework Subcategories map to controls in NIST SP 800-53 Revision 5 [B10] as well as to the Workforce Framework for Cybersecurity (NICE Framework), NIST SP 800-181 [B2]. The table also lists sector-specific standards and best practices (e.g., the International Electrotechnical Commission [IEC] Technical Reports [TR], International Organization for Standardization [ISO]) as well as from the Health Insurance Portability and Accountability Act (HIPAA) [B11], [B12], [B13]). The security control map, shown in Table 3‑5, identifies a set of controls, including those specifically implemented in the lab build, as well as the pervasive set of controls as described in Section 5.2, Pervasive Controls, that HDOs should deploy. Practitioners should refer to Appendix C of NIST SP 1800-24, Securing Picture Archiving and Communication System (PACS) for further description of pervasive controls [B14].

Table 3‑5 Security Characteristics and Controls Mapping–NIST Cybersecurity Framework

NIST Cybersecurity Framework v1.1

NIST NICE Framework (NIST SP 800-181)

NIST Sector-Specific Standards and Best Practices

Function

Category

Subcategory

NIST SP 800-53 Revision 5

IEC TR 80001-2-2

HIPAA Security Rule

ISO/IEC 27001

IDENTIFY (ID)

Asset Management (ID.AM)

ID.AM-1: Physical devices and systems within the organization are inventoried

CM-8
PM-5

N/A

45 C.F.R. §§
164.308(a)(1)(ii)(A)
164.308(a)(4)(ii)(A)
164.308(a)(7)(ii)(E)
164.308(b)
164.310(d)
164.310(d)(2)(iii)
A.8.1.1
A.8.1.2

ID.AM-2: Software platforms and applications within the organization are inventoried.

CM-8
45 C.F.R. §§
164.308(a)(1)(ii)(A)
164.308(a)(7)(ii)(E)
A.8.1.1
A.8.1.2
A.12.5.1

ID.AM-4: External information systems are catalogued

AC-20
PM-5
SA-9
45 C.F.R. §§
164.308(a)(4)(ii)(A)
164.308(b)
164.314(a)(1)
164.314(a)(2)(i)(B)
164.314(a)(2)(ii)
164.316(b)(2)
A.11.2.6

ID.AM-5: Resources (e.g., hardware, devices, data, time, personnel, and software) are prioritized based on their classification, criticality, and business value

CP-2
RA-2
RA-9
SA-20
SC-6
CO-OPL-001

SGUD

45 C.F.R. §§
164.308(a)(7)(ii)(E)
A.8.2.1

Risk Assessment (ID.RA)

ID.RA-1: Asset vulnerabilities are identified and documented

CA-2
CA-5
CA-7
CA-8
PM-4
PM-15
RA-3
RA-5
SA-5
SA-11
SI-2
SA-4
SI-5
AN-ASA-001
AN-ASA-002
AN-TWA-001
CO-CLO-002
CO-OPS-001
SP-ARC-001

MLDP RDMP SGUD

45 C.F.R. §§
164.308(a)(1)(i)
164.308(a)(1)(ii)(A)
164.308(a)(1)(ii)(B)
164.308(a)(7)(ii)(E)
164.308(a)(8)
164.310(a)(1)
A.12.6.1
A.18.2.3

ID.RA-4: Potential business impacts and likelihoods are identified

CP-2
PM-9
PM-11
RA-2
RA-3
RA-9
AN-ASA-001
AN-ASA-002
AN-EXP-001
AN-LNG-001
AN-TGT-001
AN-TGT-002
AN-TWA-001
CO-CLO-001
CO-CLO-002
CO-OPL-001
CO-OPL-002

DTBK SGUD

45 C.F.R. §§
164.308(a)(1)(i)
164.308(a)(1)(ii)(A)
164.308(a)(1)(ii)(B)
164.308(a)(6)
164.308(a)(7)(ii)(E)
164.308(a)(8)
A.16.1.6
Clause
6.1.2

ID.RA-5: Threats, vulnerabilities, likelihoods, and impacts are used to determine risk

CA-2
CA-7
PM-16
PM-28
RA-2
RA-3
SP-SYS-001

SGUD

45 C.F.R. §§
164.308(a)(1)(ii)(A)
164.308(a)(1)(ii)(B)
164.308(a)(1)(ii)(D)
164.308(a)(7)(ii)(D)
164.308(a)(7)(ii)(E)
164.316(a)

A.12.6.1

ID.RA-6: Risk responses are identified and prioritized

CA-5
PM-4
PM-9
PM-28
RA-7
SP-SYS-001

DTBK SGUD

45 C.F.R. §§
164.308(a)(1)(ii)(B)
164.314(a)(2)(i)(C)
164.314(b)(2)(iv)
Clause
6.1.3

PROTECT (PR)

Identity Management, Authentication and Access Control (PR.AC)

PR.AC-1: Identities and credentials are issued, managed, verified, revoked, and audited for authorized devices, users and processes

IA-1
IA-2
IA-3
IA-4
IA-5
IA-7
IA-8
IA-9
IA-10
IA-11
IA-12
OM-ADM-001

ALOF AUTH EMRG NAUT PAUT

45 C.F.R. §§
164.308(a)(3)(ii)(B)
164.308(a)(3)(ii)(C)
164.308(a)(4)(i)
164.308(a)(4)(ii)(B)
164.308(a)(4)(ii)(C)
164.312(a)(2)(i)
A.9.2.1
A.9.2.2
A.9.2.3
A.9.2.4
A.9.2.6
A.9.3.1
A.9.4.2
A.9.4.3

PR.AC-2: Physical access to assets is managed and protected

PE-1
PE-2
PE-3
PE-4
PE-5
PE-6
PE-8
PE-9
OM-ADM-001

PLOK TXCF TXIG

45 C.F.R. §§
164.308(a)(1)(ii)(B)
164.308(a)(7)(i)
164.308(a)(7)(ii)(A)
164.310(a)(1)
164.310(a)(2)(i)
164.310(a)(2)(ii)
A.11.1.1
A.11.1.2
A.11.1.3
A.11.1.4
A.11.1.5
A.11.1.6
A.11.2.1
A.11.2.3
A.11.2.5
A.11.2.6
A.11.2.7
A.11.2.8

PR.AC: Remote access is managed

AC-1
AC-17
AC-19
AC-20
SC-15
OM-ADM-001

ALOF AUTH CSUP EMRG NAUT PAUT

45 C.F.R. §§
164.308(a)(4)(i)
164.308(b)(1)
164.308(b)(3)
164.310(b)
164.312(e)(1)
164.312(e)(2)(ii)
A.6.2.1
A.6.2.2
A.11.2.6
A.13.1.1
A.13.2.1

PR.AC-4: Access permissions and authorizations are managed, incorporating the principles of least privilege and separation of duties

AC-1
AC-2
AC-3
AC-5
AC-6
AC-14
AC-16
AC-24
OM-ADM-001
OM-KMG-001
PR-INF-001

ALOF AUTH CNFS EMRG NAUT PAUT

45 C.F.R. §§
164.308(a)(3)
164.308(a)(4)
164.310(a)(2)(iii)
164.310(b)
164.312(a)(1)
164.312(a)(2)(i)
A.6.1.2
A.9.1.2
A.9.2.3
A.9.4.1
A.9.4.4
A.9.4.5

PR.AC-5: Network integrity is protected (e.g., network segregation, network segmentation)

AC-4
AC-10
SC-7
SC-10
SC-20

MLDP NAUT

45 C.F.R. §§
164.308(a)(4)(ii)(B)
164.310(a)(1)
164.310(b)
164.312(a)(1)
164.312(b)
164.312(c)
A.13.1.1
A.13.1.3
A.13.2.1
A.14.1.2
A.14.1.3

PR.AC-6: Identities are proofed and bound to credentials and asserted in interactions

AC-16
IA-1
IA-2
IA-4
IA-5
IA-8
IA-12
PE-2
PS-3
SP-RSK-002
OV-PMA-003

AUTH CNFS EMRG NAUT PLOK SGUD

N/A

A.7.1.1
A.9.1.2

PR.AC-7: Users, devices and other assets are authenticated (e.g., single-factor, multi-factor) commensurate with the risk of the interaction (e.g., individuals’ security and privacy risks and other organizational risks)

AC-14
IA-1
IA-2
IA-3
IA-5
IA-8
IA-9
IA-10
IA-11

ALOF AUTH NAUT PAUT

A.9.2.1
A.9.2.4
A.9.3.1
A.9.4.2
A.9.4.3
A.18.1.4

Data Security (PR.DS)

PR.DS-1: data-at-rest is protected

MP-2
MP-3
MP-4
MP-5
MP-6
MP-7
MP-8
SC-28

IGAU MLDP NAUT SAHD STCF TXCF

45 C.F.R. §§
164.308(a)(1)(ii)(D)
164.308(b)(1)
164.310(d)
164.312(a)(1)
164.312(a)(2)(iii)
164.312(a)(2)(iv)
A.8.2.3

PR.DS-2: Data-in-transit is protected

SC-8
SC-11
OM-DTA-002
PR-CDA-001

IGAU NAUT STCF TXCF TXIG

45 C.F.R. §§
164.308(b)(1)
164.308(b)(2)
164.312(e)(1)
164.312(e)(2)(i)
164.312(e)(2)(ii)
164.314(b)(2)(i)
A.8.2.3
A.13.1.1
A.13.2.1
A.13.2.3
A.14.1.2
A.14.1.3

PR.DS-3: Assets are formally managed throughout removal, transfers, and disposition

CM-8
MP-6
PE-16
PE-20

N/A

45 C.F.R. §§
164.308(a)(1)(ii)(A)
164.310(a)(2)(ii)
164.310(a)(2)(iii)
164.310(a)(2)(iv)
164.310(d)(1)
164.310(d)(2)
A.8.2.3
A.8.3.1
A.8.3.2
A.8.3.3
A.11.2.5
A.11.2.7

PR.DS-4: Adequate capacity to ensure availability is maintained

AU-4
CP-2
PE-11
SC-5

AUDT DTBK

45 C.F.R. §§
164.308(a)(1)(ii)(A)
164.308(a)(1)(ii)(B)
164.308(a)(7)
164.310(a)(2)(i)
164.310(d)(2)(iv)
164.312(a)(2)(ii)
A.12.1.3
A.17.2.1

PR-DS.5: Protections against data leaks are implemented

AC-4
AC-5
AC-6
AU-13
PE-19
PS-6
SC-7
SI-4
SP-SYS-001

AUTH IGAU MLDP PLOK STCF TXCF TXIG

45 C.F.R. §§
164.308(a)(1)(ii)(D)
164.308(a)(3)
164.308(a)(4)
164.310(b)
164.310(c)
164.312(a)
A.6.1.2
A.7.1.1
A.7.1.2
A.7.3.1
A.8.2.2
A.8.2.3
A.9.1.1
A.9.1.2
A.9.2.3
A.9.4.1
A.9.4.4
A.9.4.5
A.10.1.1
A.11.1.4
A.11.1.5
A.11.2.1
A.13.1.1
A.13.1.3
A.13.2.1
A.13.2.3
A.13.2.4
A.14.1.2
A.14.1.3

PR.DS-6: Integrity checking mechanisms are used to verify software, firmware, and information integrity

SI-7
SI-10

IGUA MLDP

45 C.F.R. §§
164.308(a)(1)(ii)(D)
164.312(b)
164.312(c)(1)
164.312(c)(2)
164.312(e)(2)(i)
A.12.2.1
A.12.5.1
A.14.1.2
A.14.1.3
A.14.2.4

Information Protection (PR.IP)

PR.IP-4: Backups of information are conducted, maintained, and tested

CP-4
CP-6
CP-9

DTBK PLOK

164.308(a)(7)(ii)(A)
164.308(a)(7)(ii)(B)
164.308(a)(7)(ii)(D)
164.310(a)(2)(i)
164.310(d)(2)(iv)
A.12.3.1
A.1.1.2
A.17.1.3
A.18.1.3

PR.IP-6: Data is destroyed according to policy

MP-6
SR-12

DIDT

45 C.F.R. §§
164.310(d)(2)(i)
164.310(d)(2)(ii)
A.8.2.3
A.8.3.1
A.8.3.2
A.11.2.7

PR.IP-9: Response plans (Incident Response and Business Continuity) and recovery plans (Incident Recovery and Disaster Recovery) are in place and managed

CP-1
CP-2
CP-7
CP-10
IR-1
IR-7
IR-8
IR-9

DTBK SGUD

45 C.F.R. §§
164.308(a)(6)
164.308(a)(6)(i)
164.308(a)(7)
164.310(a)(2)(i)
164.312(a)(2)(ii)
A.16.1.1
A.17.1.1
A.17.1.2
A.17.1.3

PR.IP-10: Response and recovery plans are tested

CP-4
IR-3
PM-14
OM-NET-001

DTBK SGUD

45 C.F.R. §§
164.308(a)(7)(ii)(D)
A.17.1.3

PR.IP-12: A Vulnerability management plan is developed and implemented

RA-1
RA-3
RA-5
SI-2
OV-PMA-001

MLDP

45 C.F.R. §§
164.308(a)(1)(i)
164.308(a)(1)(ii)(A)
164.308(a)(1)(ii)(A)
A.12.6.1
A.14.2.3
A.16.1.3
A.18.2.2
A.18.2.3

Maintenance (PR.MA)

PR.MA-1: Maintenance and and repair of organizational assets are performed and logged, with approved and controlled tools

MA-1
MA-2
MA-3
MA-5
MA-6
OM-ADM-001
PR-INF-001

CSUP RDMP

45 C.F.R. §§
164.308(a)(3)(ii)(A)
164.310(a)(2)(iv)
A.11.1.2
A.11.2.4
A.11.2.5
A.11.2.6

PR.MA-2: Remote maintenance of organizational assets is approved, logged, and performed in a manner that prevents unauthorized access

MA-4

CSUP

45 C.F.R. §§
164.308(a)(1)(ii)(D)
164.308(a)(3)(ii)(A)
164.310(d)(1)
164.310(d)(2)(ii)
164.310(d)(2)(iii)
164.312(a)
164.312(a)(2)(ii)
164.312(a)(2)(iv)
164.312(b)
164.312(d)
164.312(e)
A.11.2.4
A.15.1.1
A.15.2.1

Protective Technology (PR.PT)

PR.PT-1: Audit/log records are determined, implemented, and reviewed in accordance with policy

AU-1
AU-2
AU-3
AU-6
AU-7
AU-12
AU-13
AU-14
AU-16
OV-PMA-001
OV-PMA-002
OV-PMA-003
OV-PMA-004
OV-PMA-005
OV-SPP-001
OV-SPP-002
45 C.F.R. §§
164.308(a)(1)(i)
164.308(a)(1)(ii)(D)
164.308(a)(5)(ii)(B)
164.308(a)(5)(ii)(C)
164.308(a)(2)
164.308(a)(3)(ii)(A)
A.12.4.1
A.12.4.2
A.12.4.3
A.12.4.4
A.12.7.1

PR.PT-3: The principle of least functionality is incorporated by configuring systems to provide only essential capabilities

AC-3
CM-7

AUTH CNFS SAHD

45 C.F.R. §§
164.308(a)(3)
164.308(a)(4)
164.310(a)(2)(iii)
164.310(b)
164.310(c)
164.312(a)(1)
A.9.1.2

PR.PT-4: Communications and control networks are protected

AC-12
AC-17
AC-18
CP-8
SC-5
SC-7
SC-10
SC-20
SC-21
SC-22
SC-23
SC-31
SC-37
SC-38
SC-47

AUTH MLDP PAUT SAHD

45 C.F.R. §§
164.308(a)(1)(ii)(D)
164.312(a)(1)
164.312(b)
164.312(e)
A.13.1.1
A.13.2.1
A.14.1.3

DETECT (DE)

Anomalies and Events (DE.AE)

DE.AE-1: A baseline of network operations and expected data flows for users and systems is established and managed

AC-4
CA-3
CM-2
SC-16
SI-4
OV-EXL-001
OV-MGT-001

CNFS CSUP MLDP

45 C.F.R. §§
164.308(a)(1)(ii)(D)
164.312(b)
A.12.1.1
A.12.1.2
A.13.1.1
A.13.1.2

DE.AE-2: Detected events are analyzed to understand attack targets and methods

AU-6
CA-7
RA-5
IR-4
SI-4
AN-LNG-001
CO-CLO-002
IN-FOR-001
OM-DTA-002
OM-STS-001
PR-CDA-001
45 C.F.R. §§
164.308(a)(1)(i)
164.308(a)(1)(ii)(D)
164.308(a)(5)(ii)(B)
164.308(a)(5)(ii)(C)
164.308(6)(i)
164.308(a)(6)(i)
A.12.4.1
A.16.1.1
A.16.1.4

Security Continuous Monistoring (DE.CM)

DE.CM-1: The network is monitored to detect potential cybersecurity events

AU-12
CA-7
CM-3
SC-5
SC-7
SI-4
AN-ASA-001
AN-ASA-002
AN-EXP-001
AN-TWA-001
CO-CLO-001
OM-DTA-001
OM-KMG-001
OM-NET-001
OV-EXL-001
OV-LGA-002
OV-MGT-001

AUDT CNFS CSUP MLDP NAUT

45 C.F.R. §§
164.308(a)(1)(i)
164.308(a)(1)(ii)(D)
164.308(a)(5)(ii)(B)
164.308(a)(5)(ii)(C)
164.308(a)(2)
164.308(a)(3)(ii)(A)

N/A

DE.CM-2: The physical environment is monitored to detect potential cybersecurity events

CA-7
PE-6
PE-20
AN-ASA-001
AN-ASA-002
AN-TWA-001

MLDP

45 C.F.R. §§
164.310(a)(2)(ii)
164.310(a)(2)(iii)
A.11.1.1
A.11.1.2

DE.CM-4: Malicious code is detected

SC-44
SI-3
SI-4
SI-8

IGAU MLDP

45 C.F.R. §§
164.308(a)(1)(ii)(D)
164.308(a)(5)(ii)(B)
A.12.2.1

DE.CM-5: Unauthorized mobile code is detected

SC-18
SC-44
SI-4

MLDP SGUD

45 C.F.R. §§
164.308(a)(1)(ii)(D)
164.308(a)(5)(ii)(B)
A.12.5.1
A.12.6.2

DE.CM-7: Monitoring for unauthorized personnel, connections, devices, and software is performed

AU-12
CA-7
CM-3
CM-8
PE-6
PE-20
SI-4

AUDT PAUT PLOK

45 C.F.R. §§
164.308(a)(1)(ii)(D)
164.308(a)(5)(ii)(B)
164.308(a)(5)(ii)(C)
164.310(a)(1)
164.310(a)(2)(ii)
164.310(a)(2)(iii)
A.12.4.1
A.14.2.7
A.15.2.1

DE.CM-8: Vulnerability scans are performed

RA-5
AN-EXP-001
IN-FOR-002
SP-DEV-002

MLDP PLOK

45 C.F.R. §§
164.308(a)(1)(i)
164.308(a)(8)
A.12.6.1

RESPOND (RS)

Response Planning (RS.RP)

RS.RP-1: Response plan is executed during or after an event

CP-2
CP-10
IR-4
IR-8

DTBK MLDP SGUD

45 C.F.R. §§
164.308(a)(6)(ii)
164.308(a)(7)(i)
164.308(a)(7)(ii)(A)
164.308(a)(7)(ii)(B)
164.308(a)(7)(ii)(C)
164.310(a)(2)(i)
164.312(a)(2)(ii)
A.16.1.5

Improvements (RS.IM)

RS.IM-1: Response plans incorporate lessons learned

CP-2
IR-4
IR-8

DTBK

45 C.F.R. §§
164.308(a)(7)(ii)(D)
164.308(a)(8)
164.316(b)(2)(iii)
A.16.1.6
Clause 10

RS.IM-2: Response strategies are updated

CP-2
IR-4
IR-8

DTBK

45 C.F.R. §§
164.308(a)(7)(ii)(D)
164.308(a)(8)
A.16.1.6
Clause 10

RECOVER (RC)

Recovery Planning (RC.RP)

RC.RP-1: Recovery plan is executed during or after a cybersecurity incident

CP-10
IR-4
IR-8
OM-ADM-001

DTBK MLDP SGUD

45 C.F.R. §§
164.308(a)(7)
164.308(a)(7)(i)
164.308(a)(7)(ii)
164.308(a)(7)(ii)(C)
164.310(a)(2)(i)
164.312(a)(2)(ii)
A.16.1.5

Table 3‑6 identifies the NIST Privacy Framework v1.0 Functions, Categories, and Subcategories implemented in the lab build that the solution supports and demonstrates how they map to controls in the final published version of NIST SP 800-53, Revision 5 [B5], [B10]. Practitioners should refer to the Privacy Framework Resource Repository for the comprehensive mapping of the Privacy Framework and Cybersecurity Framework to NIST SP 800-53, Revision 5. HDOs should evaluate controls that align with their identified risks [B15] .

Table 3‑6 Privacy Characteristics and Controls Mapping–NIST Privacy Framework

NIST Privacy Framework v1.0

Function

Category

Subcategory

NIST SP 800-53 Revision 5

Identify-P

Inventory and Mapping
(ID.IM-P)

ID.IM-P1: Systems/products/services that process data are inventoried.

CM-8, CM-12,
CM-13, PM-5

ID.IM-P2: Owners or operators (e.g., the organization or third parties such as service providers, partners, customers, and developers) and their roles with respect to the systems/products/services and components (e.g., internal or external) that process data are inventoried.

CM-8(4), CM-13

ID.IM-P7: The data processing environment is identified (e.g., geographic location, internal, cloud, third parties).

CM-8, CM-12,
CM-13

Risk Assessment (ID.RA-P)

ID.RA-P3: Potential problematic data actions and associated problems are identified.

CM-13, RA-3,
RA-8

ID.RA-P4: Problematic data actions, likelihoods, and impacts are used to determine and prioritize risk.

PM-28, RA-2,
RA-3, RA-8

ID.RA-P5: Risk responses are identified, prioritized, and implemented.

CA-5, PM-4,
PM-9, PM-28,
RA-7, RA-8

Control-P

Data Processing Management (CT.DM-P)

CT.DM-P5: Data are destroyed according to policy.

MP-6, SI-12(3),
SR-12

CT.DM-P8: Audit/log records are determined, documented, implemented, and reviewed in accordance with policy and incorporating the principle of data minimization.

AU-1, AU-2, AU-3,
AU-6, AU-7,
AU-12, AU-13,
AU-14, AU-16

Protect-P

Data Protection Policies, Processes, and Procedures

PR.PO-P3: Backups of information are conducted, maintained, and tested.

CP-4, CP-6, CP-9

PR.PO-P7: Response plans (Incident Response and Business Continuity) and recovery plans (Incident Recovery and Disaster Recovery) are established, in place, and managed.

CP-1, CP-2, CP-7,
CP-10, IR-1,
IR-7, IR-8, IR-9

PR.PO-P8: Response and recovery plans are tested.

CP-4, IR-3, PM-14

PR.PO-P10: A vulnerability management plan is developed and implemented.

RA-1, RA-3, RA-5,
SI-2

Identity Management, Authentication, and Access Control

PR.AC-P1: Identities and credentials are issued, managed, verified, revoked, and audited for authorized individuals, processes, and devices.

IA-1, IA-2, IA-3,
IA-4, IA-5, IA-7,
IA-8, IA-9,
IA-10, IA-11,
IA-12

PR.AC-P2: Physical access to data and devices is managed.

PE-1, PE-2, PE-3,
PE-4, PE-5, PE-6,
PE-8, PE-9

PR.AC-P3: Remote access is managed.

AC-1, AC-17,
AC-19, AC-20,
SC-15

PR.AC-P4: Access permissions and authorizations are managed, incorporating the principles of least privilege and separation of duties.

AC-1, AC-2, AC-3,
AC-5, AC-6,
AC-14, AC-16,
AC-24

PR.AC-P5: Network integrity is protected (e.g., network segregation, network segmentation).

AC-4, AC-10,
SC-7, SC-10,
SC-20

PR.AC-P6: Individuals and devices are proofed and bound to credentials, and authenticated commensurate with the risk of the transaction (e.g., individuals’ security and privacy risks and other organizational risks).

AC-14, AC-16,
IA-1, IA-2, IA-3,
IA-4, IA-5, IA-8,
IA-9, IA-10,
IA-11, IA-12,
PE-2, PS-3

Data Security (PR.DS-P)

PR.DS-P1: Data-at-rest are protected.

MP-2, MP-3, MP-4,
MP-5, MP-6, MP-7,
MP-8, SC-28

PR.DS-P2: Data-in-transit are protected.

SC-8, SC-11

PR.DS-P3: Systems/products/services and associated data are formally managed throughout removal, transfers, and disposition.

CM-8, MP-6,
PE-16, PE-20

PR.DS-P4: Adequate capacity to ensure availability is maintained.

AU-4, CP-2,
PE-11, SC-5

PR.DS-P5: Protections against data leaks are implemented.

AC-4, AC-5, AC-6,
AU-13, PE-19,
PS-6, SC-7, SI-4

PR.DS-P6: Integrity checking mechanisms are used to verify software, firmware, and information integrity.

SC-16, SI-7,
SI-10

Maintenance (PR.MA-P)

PR.MA-P1: Maintenance and repair of organizational assets are performed and logged, with approved and controlled tools.

MA-1, MA-2, MA-3,
MA-5, MA-6

PR.MA-P2: Remote maintenance of organizational assets is approved, logged, and performed in a manner that prevents unauthorized access.

MA-4

Protective Technology (PR.PT-P)

PR.PT-P2: The principle of least functionality is incorporated by configuring systems to provide only essential capabilities.

AC-3, CM-7

PR.PT-P3: Communications and control networks are protected.

AC-12, AC-17,
AC-18, CP-8,
SC-5, SC-7,
SC-10, SC-11,
SC-20, SC-21,
SC-22, SC-23,
SC-31, SC-37,
SC-38, SC-47

3.6 Technologies

Table 3‑7 lists all of the technologies used in this project and provides a mapping among the generic application terms, the specific product used, and the security control(s) that the product provides. Refer to Table 3‑5 for an explanation of the NIST Cybersecurity Framework Subcategory codes and Table 3‑6 for an explanation of the NIST Privacy Framework Subcategory codes.

While this practice guide notes that the RPM solution is deployed across three domains, HDOs must recognize that the responsibility for risk management remains with the HDO. Risk mitigation may be achieved through tools or practices, where privacy and security measures are applied as appropriate in each of the domains. HDOs may find that deploying privacy and security tools to the patient home involves challenges, and that, therefore an HDO may collaborate with the telehealth platform provider to provide adequate education and awareness training to patients. Training may address appropriate use of the equipment that is sent to the patient home, awareness that patient data are involved, and that the patient needs to assure that data are shared only with authorized individuals.

For this practice guide, the telehealth platform provider is a third-party entity distinct from the patient and the HDO. Telehealth platform providers should implement an adequate control environment that enables the telehealth platform provider to collaborate with HDOs in delivering RPM solutions. The scope of this practice guide does not discuss all controls that a telehealth platform provider should deploy. Rather, this practice guide focuses on controls that are deployed in the HDO. The telehealth platform provider is a separate entity and should ensure that adequate controls are implemented in its environment. Further, telehealth platform providers must ensure that equipment deployed to the patient home includes appropriate safeguards.

Table 3‑7 Products and Technologies

Component/ Capability

Product

Function

NIST Cybersecurity Framework and Privacy Framework Subcategories

Domain

telehealth platform provider

Accuhealth Evelyn

Vivify Pathways Home

Vivify Pathways Care Team Portal

  • Provides role-based user access control.

  • Performs asset management for the provisioned devices.

  • Transmits health information to the platform.

  • Connects patients and physicians.

ID.AM-1
ID.AM-2
ID.AM-4
ID.AM-5
PR.AC-1
PR.AC-4
PR.AC-5
PR.AC-6
PR.AC-7
PR.DS-1
PR.DS-2
PR.DS-3
PR.DS-4
PR.DS-6
PR.PT-1
PR.PT-3
PR.PT-4

ID.IM-P1
ID.IM-P2
ID.IM-P7
PR.AC-P1
PR.AC-P4
PR.AC-P5
PR.AC-P6
PR.DS-P1
PR.DS-P2
PR.DS-P3
PR.PT-P2
PR.PT-P3

patient home

telehealth platform provider

risk assessment controls

Tenable.sc Vulnerability Management Version 5.13.0 with Nessus

  • Provides on-premises centralized vulnerability management with multiple scanners.

  • Provides vulnerability prioritization.

  • Provides risk scores.

ID.RA-5
ID.RA-P4

HDO

identity management, authentication, and access control

Active Directory (AD)

  • Authenticates and authorizes users and computers in the domain.

  • Authenticates and authorizes to multiple applications within the environment.

PR.AC-1
PR.AC-4

PR.AC-P1
PR.AC-P4

HDO

Cisco Firepower Version 6.3.0

  • Provides a Firepower management console (FMC) used for Firepower Threat Defense (FTD).

  • Provides centralized control over network and communication.

  • Provides network visibility.

  • Provides intrusion prevention.

  • Provides network segmentation.

  • Provides policy-based network protection.

PR.AC-5
PR.PT-4
DE.AE-2
DE.CM-1
DE.CM-4
DE.CM-5

PR.AC-P5
PR.PT-P3

HDO

Cisco Umbrella

  • Provides domain name system (DNS) and internet protocol (IP) layer security.

  • Provides content/ application filtering.

  • Provides advanced malware protection (AMP).

DE.CM-4
DE.CM-5

HDO

Cisco Stealthwatch Version 7.0.0

  • Provides insight into who and what is on the network.

  • Provides network analysis through machine learning and global threat intelligence.

  • Provides malware detection for encrypted traffic.

PR.DS-5
PR.PT-4
DE.AE-1
DE.CM-1
DE.CM-4
DE.CM-5

PR.DS-P5
PR.PT-P3

HDO

Onclave Zero Trust Platform Version 1.1.0

  • Leverages blockchain technology to manage valid endpoints.

PR.AC-1
PR.AC-3
PR.AC-4
PR.PT-4

PR.AC-P1
PR.AC-P3
PR.AC-P4
PR.PT-P3

telehealth platform provider

data security

Accuhealth

Vivify Health

  • Ensures that data-in-transit are protected.

  • Ensures that data-at-rest are protected.

PR.DS-1
PR.DS-2
PR.DS-3

PR.DS-P1
PR.DS-P2
PR.DS-P3

patient home

telehealth platform provider

HDO

Onclave Secure IoT Bridge Version 1.1.0

  • Provides trusted and secure communication between Onclave gateways.

  • Establishes encrypted layer 2 secure tunnels between Onclave bridges and gateways.

PR.DS-2

PR.DS-P2

telehealth platform provider

Onclave Secure IoT Gateway Version 1.1.0

  • Forms the basis of a cryptographically secure enclave.

  • Establishes encrypted layer 2 secure tunnels between trusted gateways.

PR.AC-5
PR.DS-5

PR.AC-P5
PR.DS-P5

patient home


telehealth platform provider

anomalies and events and security continuous monitoring

LogRhythmXDR Version 7.4.9

LogRhythm NetworkXDR Version 4.0.2

  • Aggregates log files.

  • Performs behavioral analytics.

  • Monitors for unauthorized personnel, connections, devices, and software.

  • Provides dashboards with the analytic results.

ID.RA-5
PR.PT-1
DE.AE-1
DE.AE-2
DE.CM-7

ID.RA-P4
CT.DM-P8

HDO

4 Architecture

This practice guide implements a representative RPM solution as a distributed architecture. The solution deployed components across three domains that consist of the patient home, the telehealth platform provider, and the HDO. The patient home is the environment in which the patient lives and uses RPM components that include biometric monitoring devices, devices that the patient uses to communicate with their care team, and devices that the patient operates for personal use. This practice guide incorporates cloud-hosted telehealth platform providers within the architecture. The telehealth platform provider maintains components that include virtual or physical components with servers to manage, maintain, and receive data communications from either the patient home or the HDO. The HDO maintains its own environment and includes components such as workstations and clinical systems to receive and interpret patient data and record patient interactions in an electronic health record (EHR) system.

Figure 4‑1 illustrates a high-level RPM distributed architecture. The depicted architecture notes two primary paths by which network communications traverse. Path 1 shows biometric devices communicating with the telehealth platform provider whereas Path 2 shows the use of a mobile app. The mobile app operates on an interface device (i.e., a provisioned tablet). For Path 2, patients use the tablet to collect data from the biometric devices. Path 2 does not involve data transfer between the biometric device to the telehealth platform provider directly. Rather, patients collect biometric data with the tablet. Patients use the tablet for communications with data exchanges between the patient home and the telehealth platform provider.

Figure 4‑1 RPM Architecture

../_images/image2.png

4.1 Layering the Architecture

The NCCoE healthcare lab stratified the distributed architecture with three layers: business, security, and infrastructure. The business layer focuses on functional capabilities that include biometric readings and patient interactions. The security layer conceptually describes how the NCCoE lab implements security capabilities. The NCCoE also implements an infrastructure layer that represents the network and communications environment.

The layers intersect each of the three domains. The patient home domain implements the business layer by using the biometric devices and interface device(s) that capture and relay biometric data from the patient and allow the patient to communicate with the clinical care team, respectively. The patient home may include a security layer component that segregates network traffic between the RPM components and personally-owned devices when the RPM devices use the same network infrastructure (e.g., over Wi-Fi) as the personally-owned devices. When devices operate and communicate over Wi-Fi, the infrastructure layer would consist of Wi-Fi access points, routers, and switches that the patient operates.

The telehealth platform provider domain also implements three layers. The business layer consists of services that facilitate handling patient data and web- or audioconferencing capabilities. The security layer consists of components used to secure the environment, such as authentication mechanisms, certificate management systems, and security logging capabilities. The infrastructure layer consists of network and server components that may be implemented as cloud services. Practitioners should note that this practice guide does not go into significant detail regarding security or infrastructure layer configurations for telehealth platform providers. As noted in this practice guide’s list of assumptions, it is assumed that telehealth platform providers have adequate privacy and security controls. These controls would align with the layer concept. HDOs should evaluate telehealth platform providers to determine control adequacy.

The HDO domain implements the business layer with applications and clinical systems used to support the RPM program. The security layer represents security capability deployment, which includes authentication mechanisms, network monitoring capabilities, and vulnerability scanning for example. The HDO implements the infrastructure layer with fundamental IT services such as Active Directory (AD), DNS, and networking devices.

Figure 4‑2 depicts a high-level view of the three layers intersecting each domain of these components and how we approached implementing them in the lab environment.

Figure 4‑2 Architecture Layers

../_images/image3.png

4.2 High-Level Architecture Communications Pathways

This practice guide describes an architecture that considers six different communications paths among the patient home, telehealth platform provider, and HDO. Figure 4‑3, RPM Communications Paths, shows the different paths labeled A through F. The different communications paths represent the varying modes by which the patient shares data with the clinician. Each path leads to the telehealth platform provider who receives the data and presents the data in an HDO-facing application. The clinician accesses data presented within an HDO-facing application via an app or application.

4.2.1 Cellular Data Pathways

The following communications pathways describe how patients use devices that are preconfigured with cellular data services. Telehealth platform providers may provision devices with cellular data capability to support ease of use and connectivity assurance and to ensure that the device may not be reachable by an untrusted internet connection (e.g., an arbitrary Wi-Fi hot spot).

Path A assumes that the biometric device has cellular communications. The telehealth platform provider deploys the biometric device with a preconfigured subscriber identity module, commonly referred to as a subscriber identity module (SIM) card. Option A does not include an RPM interface, such as a mobile device that may be a laptop, cellular phone, or tablet. The biometric device sends data over cellular data networks, which then route the data to the telehealth platform provider. The telehealth platform provider receives the data and displays it for clinicians to view through a portal or dashboard application. The clinician accesses the data through a clinician-facing app or application.

Path B assumes that the telehealth platform provider has deployed a biometric device and an RPM interface to the patient home. The RPM interface may be a mobile device such as a cellular phone or tablet. For this path, the biometric device forwards data to the RPM interface via Bluetooth. The RPM interface would include a SIM card that enables cellular data communication to the telehealth platform provider. The RPM interface would be deployed with an app to be used by the patient. The app would include an interface that allows the patient to forward the data to the telehealth platform provider.

4.2.2 Broadband Pathways

Telehealth platform providers may provide devices that leverage broadband internet connectivity provisioned at the patient home. Devices may use Wi-Fi or other communications protocols. Devices may transmit data that traverse a patient-provided internet router. The following pathways describe how data may flow when internet broadband is available.

Path C assumes that the telehealth platform provider has deployed a biometric device and an RPM interface to the patient home. The dataflow within the patient home domain is the same as Path B. However, rather than cellular communication, the RPM interface communicates with the telehealth platform provider via a broadband connection provided by the patient.

Path D has the same dataflow as Path C; however, external network transmissions traverse an add-on security device such as a Layer 2 over Layer 3 gateway.

Path E is like Path A; however, rather than cellular data, the path leverages a patient home broadband connection traversing an add-on security device such as a Layer 2 over Layer 3 gateway.

Path F is like Paths A and E. Path F leverages a patient home broadband connection; however, no other gateway is used. Data are sent directly to the telehealth platform provider over the public internet.

Figure 4‑3 RPM Communications Paths

../_images/volb-image4.png

4.3 Data and Process Flows

To gain a high-level understanding of how RPM programs operate, this practice guide evaluates two use cases: diabetes and cardiac and pulmonary rehabilitation.

The World Health Organization defines diabetes as “a chronic, metabolic disease characterized by elevated levels of blood glucose (or blood sugar), which leads over time to serious damage to the heart, blood vessels, eyes, kidneys, and nerves” [B16]. A diabetes RPM program could be beneficial in identifying when a patient’s blood glucose levels are higher/lower than normal. Ensuring that a patient’s blood glucose levels remain in a normal range helps prevent long-term complications that diabetes could cause [B17]. Patients may receive biometric devices such as glucometers, blood pressure monitors, weight scales, and activity trackers. These biometric devices may be enabled with Bluetooth, Wi-Fi, or cellular data communications capabilities that allow patients to share biometric data with physicians. Physicians may continuously monitor patients’ biometric data to identify and prevent a potential problem from occurring.

HDOs may enroll patients with chronic heart or lung conditions such as chronic obstructive pulmonary disease or coronary heart disease into cardiac and pulmonary RPM rehabilitation programs. These programs help patients return to a normal life and reduce other risk factors such as high blood pressure, high blood cholesterol, and stress [B18], [B19].

Telehealth platform providers implement solutions by using biometric devices, services, and applications. While telehealth platform providers may develop and maintain services and applications, they collaborate with manufacturers to procure and manage biometric devices. Conceptually, the device manufacturer operates as an extension of the telehealth platform provider when delivering RPM solutions to patients.

As noted in Section 4.2, High-Level Architecture Communications Pathways, practitioners may implement RPM ecosystems where data communications involve different communications protocols or paths.

This practice guide examines two distinct dataflows. The first dataflow begins when the patient transmits data from the biometric device. The biometric device sends data to the device manufacturer. The telehealth platform provider retrieves the data and presents the data through an HDO-facing application. The clinician views the data from an app or application that interfaces with the patient data residing in the telehealth platform provider HDO-facing application.

The second dataflow begins when the patient transmits the data from the biometric device. A field gateway device, such as a mobile device that may be a tablet, mobile phone, or laptop, pulls the data from the biometric device. The patient uses the field gateway device to transport the data to the telehealth platform provider. The telehealth platform provider receives the data and presents it through an HDO-facing application. The clinician views the data from an app or application that interfaces with the patient data residing in the telehealth platform provider HDO-facing application.

Figure 4‑4 depicts the first dataflow sequence. This dataflow sequence demonstrates an RPM implementation that uses device vendor platforms to transmit data from a patient’s home to the telehealth platform provider. A patient begins the process by interfacing with the biometric device provided by the third-party platform, which in turn gathers the required medical readings. Once the device gathers the desired readings, the device transmits and stores the data to the device vendor’s local storage server. The third-party platform connects to the vendor’s storage server and pulls that data into its own local storage server. The platform then evaluates the received data and creates correlations among the retrieved data, the associated patient, and the primary care provider. If the platform identifies any areas of concern (such as high blood glucose readings for a diabetes use case) while evaluating the data, the platform sends an alert to the patient’s primary care provider for immediate action. Otherwise, the primary care provider will connect to the third-party platform’s web server to view the patient’s data on a dashboard. The physician/clinician will evaluate the data, modify the patient’s care plan, update the patient’s EHR, and contact the patient via video or audio call to update them on their new care plan.

Figure 4‑4 RPM Dataflow Option 1

../_images/volb-image5.png

Figure 4‑5 depicts the second dataflow sequence. In this dataflow sequence, a patient begins the process by interfacing with the biometric device provided by the telehealth platform provider, which in turn collects the required medical readings. Once the data are collected, the device transmits the data to the mobile device. The patient interacts with the mobile device to answer survey questions associated with their program, providing a clinician more insight on the patient’s health. The patient uses the mobile device to collect data from all biometric devices associated with their RPM regimen. The patient then uses the mobile device to transmit the biometric device data and survey results. The mobile device pushes the grouped data to the telehealth platform provider. The telehealth platform provider presents the data to the primary care provider. The clinician connects to the telehealth platform provider’s web server to view the patient’s data on a dashboard. The clinician evaluates the data and may update the patient’s care plan. Then, the clinician may update the patient’s EHR and contact the patient via a mobile device to update them on their new care plan.

Figure 4‑5 RPM Dataflow Option 2

../_images/image6.jpg

4.4 Security Capabilities

The project team implemented a lab environment that represented the three domains described in Section 4, Architecture. When building the HDO environment, the team built upon the zoned network architecture described in NIST SP 1800-8, Securing Wireless Infusion Pumps in Healthcare Delivery Organizations [B20]. The team used the network zoning approach as a baseline for the RPM ecosystem infrastructure. On top of the baseline, the team selected relevant security capabilities for appropriate domains. The selected security capabilities are:

  • telehealth platform provider

  • risk assessment controls

  • identity management, authentication, and access control

  • data security

  • anomalies and events and security continuous monitoring

HDOs bear risk when implementing RPM practices. The RPM environment is distributed across three domains and requires participation of the patient, the telehealth platform provider, and the HDO to assure that risks are adequately mitigated. This practice guide’s architecture describes deploying components in three domains, with threats and risks that may affect each domain distinctly. As organizations implement RPM solutions, they must include parties involved in managing the individual domains in recognizing and safeguarding against privacy and cybersecurity events that may occur within the respective domains.

Practitioners will note that the security capability descriptions focus primarily on the HDO domain. Capabilities are deployed to other domains to the extent that the HDO may have influence. HDOs may not authoritatively determine the control environment implemented by the telehealth platform provider. HDOs may obtain assurance that similar controls are implemented by the telehealth platform provider before establishing the relationship with the provider. HDOs should establish questionnaires or audit approaches that they may use in evaluating third parties such as telehealth platform providers. HDOs and telehealth platform providers are subject to regulatory requirements to ensure patient privacy and cybersecurity.

Telehealth platform providers are third parties that may implement security capabilities that do not necessarily use the tools standard to the HDO. Telehealth platform providers may provide services for many HDOs, and implementing the same tools for all HDOs may not be feasible from a technical perspective. Telehealth platform providers apply risk management approaches that are appropriate for their business model. While telehealth platform providers may manage risk by using different tools and techniques from the HDO, these providers should address the risk concerns for the HDO. Telehealth platform providers should apply similar measures, e.g., the NIST Cybersecurity Framework [B3] and Risk Management Framework [B4], that describe risk and control approaches. When evaluating telehealth platform providers, HDOs should review the privacy and security control policies and other documentation to ensure that the mitigation approaches that the telehealth platform provider implements are consistent with the HDO’s requirements.

HDOs and telehealth platform providers may find difficulties when implementing security capabilities on the patient home domain. Patients may find complex controls or practices onerous, and, therefore, they may be less likely to participate in the RPM program. Telehealth platform providers may implement security capabilities for end-point devices, such as biometric sensors or mobile devices, that are part of the RPM program. HDOs, in collaboration with telehealth platform providers, may offer education and awareness material to discuss appropriate use of RPM-deployed equipment with the patient.

4.4.1 Telehealth Platform Provider

Telehealth platform providers are discussed in this practice guide as a security capability. HDOs implementing RPM programs will depend on telehealth platform providers to enable communications between patients and clinicians. Also, for this practice guide, telehealth platform providers configure, manage, and maintain biometric devices and potentially other technology provided to the patient. HDOs engaging with telehealth platform providers to enable their RPM programs are responsible for ensuring that they apply due diligence and understand the privacy and security capabilities that the telehealth platform provider maintains. HDOs and partners with whom HDOs engage may be responsible for adhering to regulatory compliance and should ensure that HDOs have implemented measures that address compliance concerns as a baseline. Telehealth platform providers represent a third-party partner, and HDOs should evaluate their partners accordingly.

In addition to safeguarding systems that aggregate patient information, telehealth platform providers are responsible for assuring that the biometric devices that are deployed to the patient home include adequate controls that mitigate privacy and security risk. Biometric devices have characteristics that are similar to Internet of Things (IoT) architecture. Telehealth platform providers should consider clinical efficacy of the devices as well as assure that devices do not pose privacy or cybersecurity harm to the patient home or the broader RPM ecosystem. Appendix E, Benefits of Device Cybersecurity Requirements, discusses challenges that may be found in biometric devices that may be regarded as IoT. Appendix Eʼs roots are founded in a new set of guidance focused on IoT security. NIST is developing several documents that discuss how IoT device manufacturers may incorporate privacy and security measures in products. Telehealth platform providers may review IoT Device Cybersecurity Guidance for the Federal Government: Establishing IoT Device Cybersecurity Requirements (NIST SP 800-213) [B21]. While NIST SP 800-213 focuses on the federal government’s IoT deployment efforts, concepts found in the document may inform telehealth platform providers as they evolve their biometric device acquisition processes.

The NIST Cybersecurity Framework includes risk assessment under the Identify Function. This practice guide implements tools for vulnerability management.

The practice guide uses Tenable.sc with Nessus to perform vulnerability scanning and provide dashboard reports. Vulnerability scanning operates by applying signatures of known vulnerabilities. Components that operate within the HDO domain are subject to regular vulnerability scanning. As vulnerabilities are identified, patching or other mitigating approaches may be applied. Patches or updates to operating systems, apps, or applications may be applied as available.

4.4.2 Identity Management, Authentication, and Access Control

Identity management involves activities that discuss identity proofing and establishing credentials. Authentication for this practice guide provides the mechanisms that assure that authorized entities access the system after telehealth platform providers and HDOs establish respective credentials. Practitioners should refer to NIST SP 1800-24 (reference Section 5.3.3), Securing Picture Archiving and Communication System (PACS) [B14], which provides more in-depth discussion on identity management and access control. While that practice guide uses different tools and addresses a clinical practice different from RPM, concepts regarding identity management and authentication are relevant for this practice guide.

This practice guide builds upon a network zoning concept that was discussed in NIST SP 1800-8, Securing Wireless Infusion Pumps in Healthcare Delivery Organizations [B20]. Figure 4‑6 depicts the lab environment built for this practice guide. The diagram splits the infrastructure between the NCCoE and the RPM lab, with the latter representing the configured simulated environments for this practice guide. Focusing on the HDO cloud depiction, this practice guide simulates the HDO environment that is made up of enterprise services, health information system (HIS) services, remote services, databases, clinical workstations, and security services virtual local area networks (VLANs).

Figure 4‑6 Network Segmentation and VLAN Within the RPM Lab

../_images/volb-image7.png

The practice guide extends the network zoning concept between the patient home and the telehealth platform provider. Biometric devices in the patient home using a Wi-Fi communications pathway that traverses a patient-provided broadband connection are secured using a layer 2 over layer 3 solution. In a simulated cloud environment, engineers deployed the layer 2 over layer 3 solution between zones that represent the patient home and a telehealth platform provider. The layer 2 over layer 3 solution segmented the biometric devices from the patient home network into a secured enclave. The enclave assures that network traffic from the patient home is not introduced or have visibility to the biometric devices. The layer 2 over layer 3 solution secures the data-in-transit communications between the patient home and telehealth platform provider domains respectively and adopts an approach that is consistent with concepts described in NIST SP 800-207, Zero Trust Architecture [B22].

4.4.3 Data Security

This practice guide examines challenges associated with data loss and data alteration. Communications initiate from the patient home, traversing a public communications channel, and are made accessible to clinicians via internet connectivity. This practice guide addresses the need to provide end-to-end data protection as a vital requirement to ensure RPM viability.

Network sessions are encrypted. Telehealth platform providers implement data security as they manage biometric devices and the dataflow between the patient home and solutions hosted by the telehealth platform provider. Stored data are protected through encryption. The project team examined dataflows and applied a privacy risk assessment that analyzed communications between the implemented components and identified how data-in-transit security controls are implemented.

4.4.4 Anomalies and Events and Security Continuous Monitoring

Managing anomalies and events and performing security continuous monitoring provides a proactive, real-time measure to determine that threats and vulnerabilities are appropriately recognized and mitigated within HDO environments. This practice guide implements several controls that address managing anomalies and events and performing security continuous monitoring. Security engineers require tools and processes to manage anomalies and events that include applying cyber threat intelligence (CTI), collecting and managing log information, and applying behavioral analytics. NIST describes CTI in NIST SP 800-150, Guide to Cyber Threat Information Sharing [B23]. NIST provides additional detail regarding security continuous monitoring in NIST SP 800-137 [B24].

4.5 Final Architecture

The project team built a reference architecture to include two communications pathways for biometric devices. In the first case, biometric devices in the patient home communicated to the telehealth platform provider over cellular data communications. The team built an architecture that addressed communications pathways A and B that were described in Section 4.2, High-Level Architecture Communications Pathways. In the second case, biometric devices communicated to a mobile device, and the mobile device leveraged the patient home Wi-Fi infrastructure. Mobile device communications to the telehealth platform provider are secured by a layer 2 over layer 3 solution through Onclave’s Secure IoT platform. Layer 2 over Layer 3 concepts are further described in Appendix F. This scenario aligns with pathway D described in Section 4.2.

Figure 4‑7 depicts the final architecture of the lab environment. The two telehealth platform providers, Accuhealth and Vivify, provided cloud-hosted solutions, with biometric devices deployed in respective home environments, described as Home One and Home Two. Biometric devices were provisioned and managed by the telehealth platform providers, with data communications over cellular data. A Home Three environment was provisioned to deploy biometric devices that would communicate over Wi-Fi. The architecture includes a telehealth platform provider hosted in a simulated cloud environment. Engineers implemented a layer 2 over layer 3 solution between Home 3 and the simulated cloud environment.

The architecture also includes an HDO environment with six network zones: Remote Services, Clinical Workstations, Enterprise Services, Databases, HIS Services, and Security Services.

Figure 4‑7 Final Architecture

../_images/volb-image8.png

5 Security and Privacy Characteristic Analysis

The purpose of the security and privacy characteristic analysis is to understand the extent to which the project meets its objective of demonstrating the privacy and security capabilities described in the reference architecture in Section 4. In addition, it seeks to understand the security and privacy benefits and drawbacks of the example solution.

5.1 Assumptions and Limitations

The security characteristic analysis has the following limitations:

  • It is neither a comprehensive test of all security components nor a red-team exercise.

  • It cannot identify all weaknesses.

  • It does not include the lab infrastructure. It is assumed that devices are hardened. Testing these devices would reveal only weaknesses in implementation that would not be relevant to those adopting this reference architecture.

  • HDOs and telehealth platform providers implement an array of risk mitigation approaches that extend beyond what is discussed in this document. The broader array of controls consists of organizational structures, policies and procedures, and tools to support enterprise privacy and cybersecurity programs that this practice guide refers to as a set of pervasive controls.

  • HDOs and telehealth platform providers evaluate privacy risks throughout the RPM solution ecosystem and coordinate risk management roles and expectations with organizations that are part of the RPM solution.

5.2 Pervasive Controls

NIST SP 1800-24, Securing Picture Archiving and Communication System (PACS) [B14], described the use of controls that were termed “pervasive”. Subsequent practice guides such as this RPM practice guide discuss implementing controls that narrowly apply to the practice guide’s lab construction. Notwithstanding, HDOs and telehealth platform providers are enterprise organizations that may face a broader set of risks, including regulatory requirements, that extend beyond the narrow topic. The pervasive control concept assumes that HDOs and telehealth platform providers have implemented a comprehensive control set to address their risk and regulatory obligation.

For example, onboarding workforce members may involve identity proofing and creating and managing accounts and credentials. Organizations need to perform these activities to appropriately implement an enterprise risk management program. The requirement is not specific to RPM programs. These functions should be established prior to implementing an RPM program. Other controls, such as performing asset management, having incident response teams, and establishing incident response programs, should also be pervasive across the enterprise.

Another example is asset management. Asset management is a critical control that should be implemented by telehealth platform providers. Telehealth platform providers should maintain accurate inventories and manage configuration settings, patching, updates, and the overall life cycle for devices that are deployed to the patient home. While this is a requirement, the project team partnered with multiple telehealth platform providers. The team did not deploy security or privacy capabilities to the telehealth platform providers. Rather, it relied upon telehealth platform providers to implement an adequate and appropriate set of pervasive controls for their environment and for the services that they provide.

The NIST Cybersecurity Framework [B3] describes cybersecurity activities and outcomes that organizations should achieve for establishing or improving enterprise security programs. These activities and outcomes are articulated in the Subcategories of the Cybersecurity Framework Core. The Cybersecurity Framework provides the basis for pervasive controls, whereas this practice guide highlights implementation of selected controls. Readers should not regard the selected controls as the only controls that an HDO must implement. The selected controls that are described in this practice guide are a small subset of controls that HDOs and telehealth platform providers should implement. This practice guide’s descriptions of controls indicate how the selected controls were implemented in the lab environment.

5.3 Telehealth Platform Providers

Telehealth platform providers address several controls for the RPM solution. Telehealth platform providers configure, maintain, and manage devices that are deployed to the patient home domain. Telehealth platform providers provision devices to patients who have been enrolled in an RPM program by their HDO. Telehealth platform providers perform asset management for the provisioned devices and, thus, address ID.AM-1, ID.AM-2, ID.AM-4, ID.AM-5, ID.IM-P1, ID.IM-P2, and ID.IM-P7. Telehealth platform providers are responsible for addressing ID.RA-1.

Telehealth platform providers authenticate sessions based on the device identifier. When patients send or transfer data from biometric devices, data are routed to the telehealth platform provider. The telehealth platform provider receives the data and makes it available to clinicians and system users via a portal. Portals use unique identifiers for credentials (e.g., username/password) and role-based access control and ensure that connections to the portal are protected by using Transport Layer Security (TLS) 1.2.

For this practice guide, telehealth platform providers provisioned two classes of biometric devices: those that used cellular data communications and those that used the patient home-provided Wi-Fi network. In the first category, devices were explicitly not permitted to access Wi-Fi networks. Removing Wi-Fi capability separated RPM communication from network traffic that may have been present in the patient home domain. In the second case that deployed biometric devices that included Wi-Fi capability, those devices leveraged the patient home Wi-Fi environment and used a layer 2 over layer 3 solution to secure connectivity between the RPM devices and the telehealth platform provider.

For biometric devices that focused on cellular data communications, the project team used devices that were equipped to communicate over 4G Long-Term Evolution (LTE), which uses asymmetric encryption between the device and the cellular tower [B25]. Further investigation in data-in-transit protection was not determined in this practice guide.

The second case included biometric devices leveraged in the patient home Wi-Fi environment. Network sessions were secured using another product that provided in-transit protection using a layer 2 over layer 3 solution. The project team deployed dedicated gateway devices used to implement a network infrastructure that was consistent with NIST SP 800-207, Zero Trust Architecture [B22].

The telehealth platform provider addressed PR.AC-1, PR.AC-4, PR.DS-1, PR.DS-2, PR.DS-4, PR.DS-6, PR.PT-1, PR.PT-3, PR.PT-4, PR.AC-P1, PR.AC-P4, PR.DS-P1, PR.DS-P2, PR.DS-P4, PR.DS-P6, CT.DM-P8, PR.PT-P2, and PR.PT-P3.

The project team implemented telehealth platform provider services with Accuhealth and Vivify Health.

5.4 Risk Assessment (ID.RA and ID.RA-P)

This practice guide implemented tools that address elements of ID.RA-5 (threats, vulnerabilities, likelihoods, and impacts are used to determine risk) and ID.RA-P4. The project team implemented Tenable.sc to address vulnerability management. Tenable includes vulnerability scanning and dashboards that display identified vulnerabilities with scoring and other metrics that enable security engineers to prioritize.

Telehealth platform providers have separate infrastructures and organizational structures that require similar approaches. Telehealth platform providers may host their services with various implementations and may deploy similar solutions for their environments.

5.5 Identity Management, Authentication, and Access Control (PR.AC and PR.AC-P) Protective Technology
(PR.PT-P)

The engineers regarded many of the identity management Subcategories as part of a set of pervasive controls that have been discussed in NIST SP 1800-24, Securing Picture Archiving and Communication System (PACS) [B14]. HDOs and telehealth platform providers should apply similar solutions to address managing human, device, and system identities. Sample solutions are provided in NIST SP 1800-24.

Extending the network zoning concepts that were described in NIST SP 1800-8, Securing Wireless Infusion Pumps in Healthcare Delivery Organizations [B20], the project team implemented VLANs with firewall feature sets by using Cisco Firepower Threat Defense (FTD). This practice guide addresses PR.AC-5 by implementing VLANs that represent network zones found within an HDO. Telehealth platform providers may implement similar measures within their infrastructures.

The NIST Cybersecurity Framework implements identity management, authentication, and access control under the Protect Function by using the PR.AC Category. Within the HDO, the engineers implemented PR.AC-5 by using Cisco FTD to establish network zones as a set of VLANs. The network zones assure that components from each zone do not have implicit trust, and, thus, compromises on end points found in one zone are limited in their ability to affect devices that operate in other zones.

The Onclave Secure IoT platform creates unique enclaves within the patient home and the telehealth platform provider with their own root of trust for implicit trust.

The engineers implemented three primary Cisco tools for the HDO environment: Cisco Firepower, Cisco Umbrella, and Cisco Stealthwatch. As noted, the project team used Firepower to create and manage VLANs within the environment. Cisco Firepower includes a central management dashboard that allowed security engineers to configure and manage other features within the Cisco suite of tools. Firepower also includes intrusion detection capability and visibility into network traffic and network analytics that enabled engineers to detect and analyze events, monitor the network, and detect malicious code and, thus, addressed DE.AE-2, DE.CM-1, and DE.CM-4. Cisco Firepower addressed PR.AC-5, PR.PT-4, PR.AC-P5, and PR.PT-P3. The engineers implemented Cisco Umbrella for DNS and IP layer security and provided content and application filtering. Cisco Umbrella addressed DE.CM-4. The team also used Cisco Stealthwatch that implemented behavioral analytics capabilities and provided malware detection. Cisco Stealthwatch addressed PR.DS-5, PR.PT-4, DE.AE-1, DE.CM-1, PR.DS-P5, and PR.PT-P3.

Within the HDO domain, engineers implemented an AD to establish user accounts. AD credentials provided engineers with authentication for several components deployed in the lab. The lab’s AD implementation addresses PR.AC-1, PR.AC-4, PR.AC-P1, and PR.AC-P4.

The telehealth platform provider assures that PR.AC-5, PR.AC-6, PR.AC-7, PR.AC-P5, and PR.AC-P6 are met by managing components that are deployed to the patient home. Components that are deployed by the telehealth platform provider are fully managed devices that have been preconfigured and distributed by Accuhealth. The RPM components that Accuhealth provided for the patient home use a cellular communication pathway where unauthorized individuals may not remove or alter SIM cards. The cellular data communication pathway assures that the RPM components are segregated from untrusted devices that may operate in the patient home and, thus, implements PR.AC-5 and PR.AC-P5.

This practice guide also simulated a use case where a telehealth platform provider provides RPM components that use patient-provided broadband. The simulated test case implements Vivify components; however, it does not reflect how Vivify hosts its services. Biometric devices communicate with an interface device (e.g., the tablet). The simulated environment includes centralized configuration management for interface devices such as the tablet. Management prevents end users from modifying tablet configuration settings or installing unauthorized software. In this use case, biometric devices leverage the patient home Wi-Fi. Engineers secured the devices by leveraging a layer 2 over layer 3 solution to create a secure enclave. The solution segments the biometric devices from the patient home network, with only the biometric devices enabled to communicate over the secure enclave. The secure enclave solution included gateways implemented at the patient home and the simulated telehealth provider. The secure enclave solution supports PR.AC-1, PR.AC-3, PR.AC-4, PR.AC-5, and PR.PT-4.

RPM-enrolled patients are predetermined by the HDO, and the telehealth platform provider provisions RPM components to an established, known set of patients. HDOs enrolling patients in the RPM program partially addresses PR.AC-1 and PR.AC-P1. Clinicians identifying patients may be regarded as performing an identity-proofing activity, whereas telehealth platform providers may complete PR.AC-1 and PR.AC-P1 activities by creating accounts or records that relate to the patient and the RPM equipment that the patient receives.

Patient-provided (e.g., “bring your own device”) biometric devices were excluded in this practice guide’s architecture. The telehealth platform provider manages patient home-deployed components and, thus, assures that PR.AC-6 and PR.AC-P6 are addressed.

For this practice guide, the telehealth platform provider manages components that it procured and configured. The telehealth platform provider configures the devices to include authenticators that enforce component authentication. For this practice guide, only biometric devices that are managed by telehealth platform providers are provisioned authenticators. This implements PR.AC-7 and PR.AC-P6. Patient homes may include other devices, such as personally-owned devices, that are not a part of the RPM ecosystem. Devices that are not managed by telehealth platform providers do not have authentication credentials for the RPM solution. One should note that this practice guide simulated a telehealth platform provider when exploring biometric devices that communicate over broadband.

5.6 Data Security (PR.DS and PR.DS-P)

This practice guide implemented PR.DS-2 and PR.DS-P2 to ensure that data-in-transit are protected. HDOs connecting to cloud-hosted consoles used TLS 1.2 [B26]. The telehealth platform provider assured implementation of PR.DS-3 and PR.DS-P3 for RPM biometric devices deployed to the patient home.

For biometric devices that communicate over broadband, the project team secured network sessions using a layer 2 over layer 3 solution that is established using the Onclave Secure IoT platform. The solution segmented biometric devices and their communication from the patient home network. Network sessions between the patient home and the simulated telehealth platform provider used TLS 1.2. The Onclave Secure IoT platform used a key management mechanism that is consistent with guidance from NIST SP 800-57 Part 1, Revision 5, Recommendation for Key Management: Part 1–General [B27]. The Onclave IoT Platform solution secured sessions using a private blockchain. Data-in-transit used Advanced Encryption Standard (AES)-256 encryption [B28]. This addresses PR-DS-2 and PR-DS.5 for communications between the patient home and the simulated telehealth platform provider.

Accuhealth and Vivify Health use AES-256 encryption [B28] for data-at-rest and address PR.DS-1 and PR.DS-P1.

5.7 Anomalies and Events, Security Continuous Monitoring (DE.AE, DE.CM), and Data Processing Management
(CT.DM-P)

The project team implemented LogRhythmXDR as a security incident and event management (SIEM) tool. End-point devices that include servers and network infrastructure components generate log data that were aggregated in the SIEM tool for analysis. LogRhythm included two components: LogRhythmXDR and LogRhythm NetworkXDR. SIEM capabilities provide security engineers a baseline of network operations and allow security engineers to determine expected dataflows for users and systems. Engineers can detect events and analyze potential threats. LogRhythmXDR, therefore, is a SIEM that addresses NIST Cybersecurity Framework Subcategories ID.RA-5, PR.PT-1, DE.AE-1, DE.AE-2, ID.RA-P4, and CT.DM-P8. LogRhythm NetworkXDR provides capabilities that assure that the network is monitored for potential cybersecurity threats. It also provides assurance that unauthorized mobile code is detected and, thus, addresses DE.CM-7. This practice guide assures implementation of a network monitoring capability based on regular log collection and applies the SIEM analytics and automated response capabilities. The project team implemented Cisco Firepower, Cisco Stealthwatch, and Cisco Umbrella, which detects malicious code, detects unauthorized mobile code and provides continuous network monitoring and analytics. Therefore, the Cisco suite addresses DE.CM-4 and DE.CM-5.

6 Functional Evaluation

This practice guide uses the NIST Cybersecurity Framework. The Cybersecurity Framework includes Category and Subcategory concepts that allowed the project team to develop a reference architecture. The reference architecture reflects use cases and dataflows analyzed by the NCCoE. This practice guide aligns privacy and cybersecurity tools to Cybersecurity Framework Subcategories. The reference architecture depicts where tools were deployed.

6.1 RPM Functional Test Plan

One aspect of our security evaluation involved assessing how well the reference design addresses the security characteristics that it was intended to support. The Cybersecurity Framework Categories and Subcategories were used to provide structure to the security assessment by consulting the specific sections of each standard that are cited in reference to a Subcategory. The cited sections provide validation points that the example solution would be expected to exhibit. Using the Cybersecurity Framework Subcategories as a basis for organizing our analysis allowed us to systematically consider how well the reference design supports the intended security characteristics.

6.1.1 RPM Functional Evaluation

Table 6‑1 identifies the RPM functional evaluation addressed in the test plan and associated test cases. The evaluations are align ed with the basic architecture design and capability requirements from Section 4, Architecture.

Table 6‑1 Functional Evaluation Requirements

Cybersecurity Framework Category

Relevant Cybersecurity Framework Subcategories

Identifier

Requirement

Domain

Test Case

asset management

ID.AM-1

ID.AM-5

CR-1

device management

home

telehealth platform provider

RPM-1

risk assessment

ID.RA-1

ID.RA-4

ID.RA-5

ID.RA-6

CR-2

end-point vulnerability scanning

HDO

RPM-2

identity management, authentication, and access control

PR.AC-1

PR.AC-2

PR.AC-3

PR.AC-4

PR.AC-5

PR.AC-6

CR-3

role-based access

telehealth platform provider

RPM-3

CR-4

domain user authentication

HDO

RPM-4

CR-5

domain user authorization

HDO

RPM-4

CR-6

network segmentation

HDO

RPM-5

CR-7

access control policy

HDO

RPM-5

security continuous monitoring

DE.CM-1

DE.CM-2

DE.CM-4

DE.CM-7

DE.CM-8

CR-8

malware protection

HDO

RPM-6

CR-9

anomaly detection

HDO

RPM-7

CR-10

LogRhythm

HDO

RPM-8

CR-11

LogRhythm

HDO

RPM-9

data security

PR.DS-2

CR-12

data-in-transit is protected.

home

telehealth platform provider

RPM-10

N/A

N/A

CR-13

business workflow

home

telehealth platform provider

HDO

RPM-11

6.1.2 Test Case: RPM-1

Cybersecurity Framework Category

Asset Management

Testable Requirement(s)

(CR-1) device management

Description

Demonstrate the ability to verify that provisioned devices are associated with the intended patient who has enrolled in an RPM program.

Preconditions

  • A doctor-level Accuhealth account has been provisioned.

  • Accuhealth RPM devices have been provisioned and delivered, including the following (obfuscated serial number):

    • blood pressure monitor (1234567)

    • blood glucose monitoring system (22334455)

    • digital scale (987654)

  • Accuhealth has enrolled sample patients and associated them with the RPM devices listed above, including:

    • Regina Houston (1234567)

    • Regina Houston (987654)

    • Janelle Kouma (22334455)

Procedure

Verify the patient/device association in the Accuhealth system.

  1. Log in to the Accuhealth platform with the doctor-level user account.

  2. Click Patient Details.

  3. Under Select Patient, select Regina Houston.

  4. Under Choose a view, select Profile.

  5. Review the patient info for Regina Houston.

  6. Navigate to Device Information.

  7. Check if the Device ID field captures the device serial numbers, 1234567 and 987654, that are associated with Regina Houston.

  8. Under Select Patient, select Janelle Kouma.

  9. Review the patient information for Janelle Kouma.

  10. Navigate to Device Information.

  11. Check if the Device ID field captures the device serial number, 22334455, associated with Janelle Kouma.


Verify that data from the RPM devices are being sent to Accuhealth and associated with the correct patient.

  1. For the following devices, turn on each device and follow the provided instructions to take a measurement:

    1. blood pressure monitor

    2. blood glucose monitoring system

    3. digital scale

  2. Record the time and measurement readings as notes.

  3. Log in to the Accuhealth platform with the doctor-level user account.

  4. Click Patient Details.

  5. Under Select Patient, select Regina Houston.

  6. Under Choose a view, select Vitals.

  7. Check if the blood pressure and weight measurements are present.

  8. Under Select Patient, select Janelle Kouma.

  9. Under Choose a view, select Vitals.

  10. Check if the glucose measurement is present.

Expected Results

  • Accuhealth can provision the RPM devices and associate them to the intended patient enrolled in an RPM.

  • Accuhealth can capture the biometric measurements for the correct patient with the assigned RPM devices.

Actual Results

Accuhealth provisioned an instance of its telehealth platform along with doctor-level accounts and sample patients associated with these accounts. We also received three RPM devices from Accuhealth: blood pressure monitor, blood glucose monitor, and digital scale. Accuhealth associated these RPM devices with the sample patients, which we verified by checking the Device ID information for each patient. Once the devices were received, we configured them and recorded sample measurements from each one. With the measurements taken, we logged in to the Accuhealth platform with the doctor-level account and viewed the Vitals information for each patient. As expected, the blood pressure and weight measurements were associated with Regina Houston’s patient record, and the blood glucose measurement was associated with Janelle Kouma’s patient record.

6.1.3 Test Case: RPM-2

Cybersecurity Framework Category

Risk Assessment

Testable Requirement(s)

(CR-2) end-point vulnerability scanning

Description

Demonstrate the ability to perform vulnerability scans on assets and view results in a dashboard format with risk-scoring evaluations.

Preconditions

  • Tenable.sc has been configured with the following:

    • organization

    • repository

    • security manager user account

    • scan zones for each VLAN

    • host discovery scan policy

    • basic network scan policy

    • active scans associated with each scan policy

  • A Nessus scanner has been deployed to the Security Services VLAN and is being managed by Tenable.sc.

  • The Nessus scanner has access to each scan zone.

Procedure

Perform scans and view the results.

  1. Log in to Tenable.sc with the security manager user account.

  2. Navigate to Scans > Active Scans.

  3. Under HDO Asset Scan, click the run button ().

  4. Wait for the HDO Asset Scan to finish.

  5. Under HDO Network Scan, click the run button ().

  6. Wait for the HDO Network Scan to finish.

  7. Click Dashboard in the menu ribbon.

  8. Check if the risk assessment results are displayed.

Expected Results

  • Tenable.sc and Nessus scan the HDO VLANs, identify vulnerabilities, and assign risk scores to discovered threats.

  • Tenable.sc displays risk assessment scan results in the dashboard.

Actual Results

Using Tenable.sc, we ran a host discovery scan followed by a basic network scan. Once both scans were finished, we returned to the Tenable.sc dashboard and were able to view the results. The Nessus scanner was able to identify end points in the scan zones (VLANs) as well as potential vulnerabilities with associated risk scores.

6.1.4 Test Case: RPM-3

Cybersecurity Framework Category

Identity Management, Authentication, and Access Control

Testable Requirement(s)

(CR-3) role-based access

Description

Demonstrate the ability to limit and disable access to data by implementing role-based access control on the Vivify platform.

Preconditions

  • Vivify has provisioned a telehealth platform environment.

  • Vivify has provisioned an administrative user account.

  • Three test patients have been created in the Vivify platform:

    • Test Patient 1

    • Test Patient 2

    • Test Patient 3

Procedure

Create a Clinical Level 1 user account, and test account privileges.

  1. Log in to the Vivify platform by using the provisioned admin account.

  2. Click Care Team in the menu bar.

  3. Create a New User assigned to the Clinical Level 1 user group.

  4. Access the Test Patient and add the new user into the Care Team for this patient.

  5. Log out of the environment.

  6. Log in to the environment with the user created in step 3.

  7. Check if the account has read-only access to patient records associated with that clinician level.


Create a Clinical Level 2 user account, and test account privileges.

  1. Log in to the Vivify platform by using the provisioned admin account.

  2. Click Care Team in the menu bar.

  3. Create a New User assigned to the Clinical Level 2 and Clinical Level 1 user groups.

  4. Access the Test Patient 2 and add the new user into the Care Team for this patient.

  5. Log out of the environment.

  6. Log in to the environment with the user created in step 10.

  7. Check if the account has read and write access to patient records associated with that clinician level.


Create a Clinical Level 3 user account, and test account privileges.

  1. Log in to the Vivify platform by using the provisioned admin account.

  2. Click Care Team in the menu bar.

  3. Create a New User assigned to the Clinical Level 3, Clinical Level 2, and Clinical Level 1 user groups.

  4. Log out of the environment.

  5. Log in to the environment with the user created in step 17.

  6. Check if the account has read and write privileges for all patient records.

Expected Results

  • A user account in the Clinical Level 1 group should be able to read only patient records assigned to that clinician.

  • A user account in the Clinical Level 2 should be able to read and write only to patient records assigned to that clinician.

  • A user account in the Clinical Level 3 should be able to read and write to all patient records.

Actual Results

We started by logging in to the provisioned Vivify portal with our admin credentials and creating three new Care Team users, each with their own access levels. The first user was granted Clinical Level 1 and was added as Care Team of the test patient; the second was granted Clinical Levels 1 and 2 and was added as Care Team of the test patient; and the third was granted Clinical Levels 1 through 3. Then we logged in as each new user and tested their privileges. The first user was able to only view patient records that were assigned to her. The second user was able to view and modify patient records that associated only with those assigned to her. The third user was able to view and modify all patient records.

6.1.5 Test Case: RPM-4

Cybersecurity Framework Category

Identity Management, Authentication, and Access Control

Testable Requirement(s)

(CR-4) domain user authentication

(CR-5) domain user authorization

Description

Demonstrate the ability to create new domain users and enforce restrictions on nonadmin users.

Preconditions

  • A Windows Server is deployed to the Enterprise Services VLAN.

  • The Windows Server has been configured as an Active Directory Domain Controller for the hdo.trpm domain.

  • A Windows workstation is deployed to the Enterprise Services VLAN and has been added to the hdo.trpm domain.

  • A Windows workstation is deployed to the Clinical Workstations VLAN and has been added to the hdo.trpm domain.

  • A Cisco Firepower access control policy rule has been created, allowing network traffic from the Clinical Workstations VLAN to the Enterprise Services VLAN.

  • The Cisco FTD appliance has been configured to provide Dynamic Host Configuration Protocol (DHCP) services for the Enterprise Services and Clinical Workstations VLANs.

Procedure

Create a nonadmin domain user.

  1. Power on the Windows Server and log in.

  2. Open the Server Manager application.

  3. Navigate to Tools > Active Directory Users and Computers.

  4. Navigate to hdo.trpm > Users.

  5. Click Create a new user in the current container.

  6. Fill out the user’s information:

    1. First Name: User

    2. Last Name: Test

    3. User logon name: usertest

  7. Click Next >.

  8. Create a password for the user.

  9. Uncheck User must change the password at next logon.

  10. Click Next >.

  11. Click Finish.

  12. Right-click the user’s profile and select Properties.

  13. Click Member Of.

  14. Ensure that the user is a member of only Domain Users.


Create an admin domain user.

  1. Navigate to hdo.trpm > Users.

  2. Click Create a new user in the current container.

  3. Fill out the user’s information:

    1. First Name: Admin

    2. Last Name: Test

    3. User logon name: admintest

  4. Click Next >.

  5. Create a password for the user.

  6. Uncheck User must change the password at next logon.

  7. Click Next >.

  8. Click Finish.

  9. Right-click the user’s profile and select Properties.

  10. Click Member Of.

  11. Click Add….

  12. Type Domain and click Check Names.

  13. Select Domain Admins.

  14. Click OK.

  15. Click OK.


Create network share folder.

  1. Power on the Windows workstation in the Enterprise Services VLAN and log in with an administrator account.

  2. Right-click the Windows Start Button.

  3. Click Windows PowerShell (Admin).

  4. Run the command ipconfig

  5. Note the IP address (192.168.40.107).

  6. Open the File Explorer application.

  7. Navigate to This PC > Local Disc (C:).

  8. Under Home, click New Folder.

  9. Name the folder Share.

  10. Right-click the new folder and select Properties.

  11. Under Sharing, click Share….

  12. Click the drop-down and select Find people….

  13. Type Domain and click Check Names.

  14. Select Domain Admins.

  15. Click OK.

  16. Click OK.

  17. Click Share.

  18. Click Done.

  19. Create a new text document inside the Share folder and name it AccessTest.


Test ability to access network share folder with nonadmin user.

  1. Power on the Windows workstation in the Enterprise Services VLAN.

  2. Log in with the nonadmin account, usertest, that was created in the previous steps.

  3. Right-click the Windows Start Button.

  4. Click Run.

  5. Under Open, type \\192.168.40.107\Share.

  6. Click OK.

  7. Check if a network error is displayed, stating that the user does not have permission to access the network share folder.


Test ability to access network share folder with admin user.

  1. Log out of the nonadmin account.

  2. Log in with the admin account, admintest, that was created in the previous steps.

  3. Right-click the Windows Start Button.

  4. Click Run.

  5. Under Open, type \\192.168.40.107\Share.

  6. Click OK.

  7. Check if the network share folder is opened and the AccessTest text document is visible.

Expected Results

  • After the nonadmin and admin domain users have been created, they will be able to use their credentials to log in to computers within the domain.

  • Only the admin domain user will be able to access the network share folder.

Actual Results

Once the user accounts were created and the network share folder was created and configured, we began by logging in to a domain computer with the nonadmin domain user. The user was able to successfully log in. Next, we tested the user’s ability to access the network share folder. The nonadmin domain user was not able to access the network share folder, receiving a network error stating that the user did not have the proper permissions. Finally, we were able to successfully log in to a domain computer with the admin domain user’s account. With this user, we were also able to successfully access the network share folder and view the files within.

6.1.6 Test Case: RPM-5

Cybersecurity Framework Category

Identity Management, Authentication, and Access Control

Testable Requirement(s)

(CR-6) network segmentation

(CR-7) access control policy

Description

Demonstrate the use of network segmentation and an access control policy to allow permitted traffic to selected network devices.

Preconditions

  • The Cisco FTD appliance’s interfaces are configured.

  • A Windows Server is deployed to the Clinical Workstations VLAN.

  • The Windows Server has been configured with a basic Internet Information Services (IIS) web service.

  • A Windows workstation is deployed to the Clinical Workstations VLAN.

  • A Windows workstation is deployed to the Enterprise Services VLAN.

  • A Cisco Firepower access control policy has been configured, with a default action of Block All Traffic, and applied to the Cisco FTD appliance.

  • The Cisco FTD appliance has been configured to provide DHCP services for the HIS Services and Clinical Workstations VLANs.

Procedure

Test connectivity between devices in the same subnet.

  1. Power on the Windows workstation and log in.

  2. Power on the Windows Server and log in.

  3. On the Windows workstation, right-click the Windows Start Button.

  4. Click Windows PowerShell (Admin).

  5. Run the command ipconfig

  6. Note the IP address (192.168.44.101).

  7. On the Windows Server, right-click the Windows Start Button.

  8. Click Windows PowerShell (Admin).

  9. Run the command ipconfig

  10. Ensure that the IP address (192.168.44.102) is in the same subnet as the Windows workstation.

  11. On the Windows workstation, open an internet browser.

  12. In the address bar, type in the address of the Windows Server, http://192.168.44.102.

  13. Check if the default IIS landing page is displayed.


Test connectivity between devices in separate subnets with no access control policy rules set.

  1. Power off the Windows Server.

  2. Move it to the HIS Services VLAN.

  3. Power on the Windows Server and log in.

  4. On the Windows workstation, right-click the Windows Start Button.

  5. Click Windows PowerShell (Admin).

  6. Run the command ipconfig

  7. Note the IP address (192.168.41.100).

  8. On the Windows workstation, open an internet browser.

  9. In the address bar, type in the address of the Windows Server, http://192.168.41.100.

  10. Check if the connection times out and the IIS web service cannot be reached.


Test connectivity between devices in separate subnets with an access control policy rule set to allow.

  1. Power on the Windows workstation in the Enterprise Services VLAN and log in.

  2. Open an internet browser.

  3. In the address bar, type in the address of the Cisco FMC, https://192.168.40 .100.

  4. Log in to the Cisco FMC with your admin credentials.

  5. Navigate to Policies > Access Control > Access Control.

  6. Select the default access control policy.

  7. Click Add Rule.

  8. Give the rule a name.

  9. Set the rule’s action to Allow.

  10. Under Networks > Source Networks, type the IP address of the Windows workstation in the Clinical Workstations VLAN (192.168.44.101).

  11. Click Add.

  12. Under Networks > Destination Networks, type the IP address of the Windows Server in the HIS Services VLAN (192.168.41.100).

  13. Click Add.

  14. Under Ports > Available Ports, select HTTP and click Add to Destination.

  15. Click Add to create the rule.

  16. Click Save and Deploy the configuration to the Cisco FTD.

  17. On the Windows workstation in the Clinical Workstations VLAN, open an internet browser.

  18. In the address bar, type in the address of the Windows Server in the HIS Services VLAN, http://192.168.41.100.

  19. Check if the default IIS landing page is displayed.

Expected Results

  • Devices in separate subnets are not able to communicate with each other until an access control policy rule has been created to allow that communication.

Actual Results

When the workstation and server were both placed inside the Clinical Workstations VLAN, the workstation was able to access the server’s web service, successfully displaying the server’s default IIS web page. After the server was moved to the HIS Services VLAN, the workstation was no longer able to reach the server’s web service. Instead of displaying the default IIS web page, the workstation’s internet browser returned an error code and stated that the web service could not be reached. A new access control policy rule was created and applied to the Cisco FTD, allowing hypertext transfer protocol (HTTP) traffic from the workstation to the server. Once the rule was created, the workstation was able to access the server’s web service and display the default IIS web page.

6.1.7 Test Case: RPM-6

Cybersecurity Framework Category

Security Continuous Monitoring

Testable Requirement(s)

(CR-8) malware protection

Description

Demonstrate the ability to protect the network and end points from malicious services by blocking the service before a connection is made.

Preconditions

  • Two Cisco Umbrella Forwarder appliances have been deployed to the Enterprise Services VLAN.

  • The domain’s DHCP service has been configured to provide the Cisco Umbrella Forwarder appliances as the primary and secondary DNS providers.

  • A Cisco Umbrella policy has been created, with no malware blocking, and has been applied to the Cisco Umbrella Forwarder appliances.

  • A Windows workstation is deployed to the Clinical Workstations VLAN.

Procedure

Test connectivity to outside malicious service with no Umbrella policy.

  1. Power on the Windows workstation and log in.

  2. Right-click the Windows Start Button.

  3. Click Windows PowerShell (Admin).

  4. Run the command ipconfig/all

  5. Under DNS Servers, ensure that the IP addresses listed correspond to the deployed Cisco Umbrella Forwarder appliances, 192.168.40.30 and 192.168.40.31.

  6. Open an internet browser.

  7. In the address bar, type in the address of Cisco’s malware test page, examplemalwaredomain.com.

  8. Check if the site loads and no block message is displayed.


Test connectivity to outside malicious service with Umbrella policy.

  1. Open an internet browser.

  2. In the address bar, type in the address of the Cisco Umbrella dashboard, dashboard.umbrella.com.

  3. Log in to the Cisco Umbrella dashboard with your admin credentials.

  4. Navigate to Policies > Management > All Policies.

  5. Open the policy applied to the Cisco Umbrella Forwarder appliances.

  6. Under Security Setting Applied, click Edit.

  7. Under Categories to Block, click Edit.

  8. Click the checkbox next to Malware.

  9. Click Save.

  10. Click Proceed to confirm the changes.

  11. Click Set & Return to save the default settings.

  12. Click Save to update the policy applied to the Cisco Umbrella Forwarder appliances.

  13. On the Windows workstation in the Clinical Workstations VLAN, open an internet browser.

  14. In the address bar, type in the address of Cisco’s malware test page, examplemalwaredomain.com.

  15. Check if the site does not load and a Cisco Umbrella block message is displayed.

Expected Results

  • When the Cisco Umbrella policy is active, devices within the HDO environment will not be able to access potentially malicious web services outside the HDO.

Actual Results

To start, the Cisco Umbrella policy applied to the Forwarder appliances was not configured to block external sites that have been flagged for potential malware. Using a workstation in the Clinical Workstations VLAN, we navigated to a test malware site hosted by Cisco (examplemalwaredomain.com) to verify Cisco Umbrella’s effectiveness. Without the malware policy in place, the workstation was able to successfully reach the test malware site. After this, the Cisco Umbrella policy was configured to block external sites that have been flagged for potential malware. With the policy in place, the workstation was used again to connect to the test malware site, this time receiving a Cisco Umbrella block page notifying us that access to the site was not permitted.

6.1.8 Test Case: RPM-7

Cybersecurity Framework Category

Security Continuous Monitoring

Testable Requirement(s)

(CR-9) malicious activity detection

Description

Demonstrate the ability to detect anomalous network traffic and create an alert for further investigation.

Preconditions

  • Cisco Stealthwatch has been configured and licensed.

  • A Cisco Stealthwatch Flow Collector has been deployed to the Security Services VLAN and is being managed by the Cisco Stealthwatch Management Console (SMC).

  • The Cisco FTD has been configured to send NetFlow traffic to the Cisco Stealthwatch Flow Collector for analysis.

  • A Windows workstation is deployed to the Security Services VLAN.

  • An Ubuntu workstation, with the Nmap tool installed, has been deployed to the HIS Services VLAN.

Procedure

Configure Cisco Stealthwatch policy rule.

  1. Power on the Ubuntu workstation and log in.

  2. Run the command ifconfig

  3. Note the IP address (192.168.41.10).

  4. Power on the Windows workstation and log in.

  5. Open an internet browser.

  6. In the address bar, type in the address of the Cisco SMC, https://192.168.45.30.

  7. Log in to the Cisco SMC with your admin credentials.

  8. Navigate to Configure > Policy Management.

  9. Click Create New Policy and select Single Host Policy.

  10. Under IP Address, type the IP address of the Ubuntu workstation, 192.168.41.10.

  11. Click Select Events.

  12. Select Recon.

  13. Click Apply.

  14. Under When Host is Source, select On + Alarm.

  15. Click Save.


Test ability for Cisco Stealthwatch to detect a network discovery scan and create an alert.

  1. On the Ubuntu workstation, run the command nmap 192.168.40.0/24 to perform a host scan of the Enterprise Services VLAN.

  2. On the Windows workstation, bring up the Cisco Stealthwatch session and navigate to Dashboards > Network Security.

  3. Check if the scan from the Ubuntu workstation has triggered one or more alarms.

Expected Results

  • The network scans from the Ubuntu workstation will trigger some form of alert from Cisco Stealthwatch.

Actual Results

Once the Cisco Stealthwatch policy rule had been created, it took roughly a minute after the Nmap scan had run to begin displaying alerts on the Cisco Stealthwatch dashboard. The Ubuntu workstation from which the scans originated, 192.168.41.10, was listed on the dashboard under Top Alarming Hosts and was also listed in the Recon category under Today’s Alarms. On top of triggering the Recon rule that we had created, the scans also triggered a New Flows Initiated alarm for exceeding a threshold number of new flows within a set period.

6.1.9 Test Case: RPM-8

Cybersecurity Framework Category

Security Continuous Monitoring

Testable Requirement(s)

(CR-10) end-point monitoring and protection

Description

Demonstrate the ability to detect unusual authentication behaviors and file integrity changes on protected end points.

Preconditions

  • LogRhythmXDR has been configured and licensed.

  • A Windows Server is deployed to the Clinical Workstations VLAN.

  • The Windows Server has a LogRhythm System Monitor Agent installed.

Procedure

Enable user activity monitor services on the Clinical Workstation.

  1. Power on the LogRhythmXDR host and log in.

  2. Start the Management Console application.

  3. Click Deployment Manager.

  4. Click System Monitors.

  5. Double-click the Windows Server.

  6. Click Endpoint Monitoring.

  7. Click User Activity Monitor.

  8. Click the checkbox next to Monitor Logon Activity.

  9. Click the checkbox next to Monitor Network Session Activity.

  10. Click the checkbox next to Monitor Process Activity.

  11. Click OK.


Create a file integrity monitor policy for the Clinical Workstation.

  1. Power on the Windows Server and log in with an administrator account.

  2. Open the File Explorer application.

  3. Navigate to This PC > Local Disc (C:).

  4. Create a new folder and name it testdirectory.

  5. Create a new text document inside the testdirectory folder and name it testfile.

  6. On the LogRhythmXDR workstation, open the Management Console application.

  7. Click Deployment Manager.

  8. Under Tools, select Administration.

  9. Click File Integrity Monitor Policy Manager.

  10. In the dialog box, right-click and select New.

  11. Name the policy NCCoE Testdirectory.

  12. Provide a Description.

  13. Under Monitoring Configuration, right-click and select New.

  14. Name the policy testdirectory configuration.

  15. Under Monitoring Flags, select Modify and Permission.

  16. Under Monitored Items, right-click and select New.

  17. Under Type, select Directory.

  18. Under Path, type C:\testdirectory.

  19. Click Apply.

  20. Click OK.

  21. Click System Monitors.

  22. Double-click the Windows Server.

  23. Click Endpoint Monitoring.

  24. Click File Integrity Monitor.

  25. Click the checkbox next to Enable File Integrity Monitor.

  26. Select Realtime mode.

  27. Click the checkbox next to Enable Realtime Mode Anomaly Detection.

  28. Under Policy, select NCCoE Testdirectory.

  29. Click Apply.

  30. Click OK.


Create an artificial intelligence (AI) engine rule.

  1. Click Deployment Manager.

  2. Click AI Engine.

  3. Click Create a New Rule.

  4. Under Rule Block Types, select and drag a rule block to the Rule Block Designer.

  5. Under each tab, fill out the necessary information.

  6. Click Next.

  7. Click OK.

  8. Create a rule for Authentication Failure Monitoring.

    1. AI Engine Rule Name: NCCoE Authentication failure threshold

    2. Data Source: Data Processor Logs

    3. Primary Criteria -> Classification: Authentication Failure

    4. Log Sources: All Log Sources

    5. Group By: Host (Impacted), User (Origin)

  9. Create a rule for File Integrity Monitoring.

    1. AI Engine Rule Name: NCCoE Use Case File Activity

    2. Data Source: Data Processor Logs

    3. Primary Criteria -> Common Event: File Monitoring Event–Add, File Monitoring Event–Modify

    4. Log Sources: All Log Sources

    5. Group By: User (Origin), Object

  10. For both new rules, click the checkbox for Action.

  11. Under Actions, select Enable.


Test user activity monitoring.

  1. Power on the Windows Server.

  2. Attempt to log in with a username and invalid password at least five times.


View user authentication failure alerts.

  1. On the LogRhythmXDR host, open an internet browser.

  2. In the address bar, type in the address of the LogRhythm Web Console, https://logrhythm-host:8443, and log in.

  3. Click the Alarms tab.

  4. Check for alerts coinciding with the user authentication failures.


Test file integrity monitoring.

  1. On the Windows Server, log in with an administrator account.

  2. Open the File Explorer application.

  3. Navigate to This PC > Local Disc (C:) > testdirectory.

  4. Open the testfile text document.

  5. Modify the content of the testfile text document.

  6. Under File, select Save.


View file integrity monitoring alerts.

  1. On the LogRhythmXDR workstation, open an internet browser.

  2. In the address bar, type in the address of the LogRhythm Web Console, https://logrhythm-host:8443, and log in.

  3. Click the Alarms tab.

  4. Check for alerts coinciding with the file modification.

Expected Results

  • The unusual authentication behavior will trigger an alarm event that is viewable in the LogRhythm Web Console.

  • The unauthorized file modification will trigger an alarm event that is viewable in the LogRhythm Web Console, and log files will identify the user who has performed the file modification.

Actual Results

Once LogRhythmXDR was configured to provide user activity monitoring and file integrity monitoring, we began by testing the user activity monitoring. For this test, we powered on the Windows Server in the Clinical Workstations VLAN that had been configured with a LogRhythm System Monitor Agent. We made five consecutive login attempts using an invalid password, which was then detected by LogRhythm, and an alert was created that was visible on the LogRhythm Web Console.

Next, we tested the file integrity monitoring. For this test, we logged in to the Windows Server in the Clinical Workstations VLAN and made some modifications to the testfile text document in the C:testdirectory folder. Once the changes had been saved, an alarm was triggered and visible in the LogRhythm Web Console. From the alert, we could also drill down to the event and determine what user had made the modification.

6.1.10 Test Case: RPM-9

Cybersecurity Framework Category

Security Continuous Monitoring

Testable Requirement(s)

(CR-11) end-point network access monitoring

Associated Test Case(s)

  • RPM-8

Description

This test case demonstrates the ability to create alarms for unauthorized network traffic.

Preconditions

  • LogRhythm NetworkXDR has been configured and licensed.

  • A Windows Server is deployed to the Clinical Workstations VLAN.

  • The Windows Server has a LogRhythm System Monitor Agent installed.

Procedure

Enable user network connection monitor on the Clinical Workstation.

  1. Power on the LogRhythmXDR host and log in.

  2. Start the Management Console application.

  3. Click Deployment Manager.

  4. Click System Monitors.

  5. Double-click the Windows Server.

  6. Click Endpoint Monitoring.

  7. Click User Activity Monitor.

  8. Click the checkbox next to Monitor Logon Activity.

  9. Click the checkbox next to Monitor Network Session Activity.

  10. Click the checkbox next to Monitor Process Activity.

  11. Click OK.

  12. Click Network Connection Monitor.

  13. Click the checkbox next to Enable Network Connection Monitor.

  14. Click the checkbox next to Monitor Inbound TCP Connections.

  15. Click the checkbox next to Monitor Outbound TCP Connections.

  16. Click the checkbox next to Monitor Listening TCP/UDP Sockets.

  17. Click the checkbox next to Include User Activity Monitor Data (Required UAM).

  18. Click OK.


Create an AI engine rule.

  1. Click Deployment Manager.

  2. Click AI Engine.

  3. Click Create a New Rule.

  4. Under Rule Block Types, select and drag a rule block to the Rule Block Designer.

  5. Under each tab, fill out the necessary information.

  6. Click Next.

  7. Click OK.

  8. Create a rule for Monitoring HTTP Traffic.

    1. AI Engine Rule Name: NCCoE HTTP traffic from clinical workstation

    2. Data Source: Data Processor Logs

    3. Primary Criteria -> Application: HTTP, Know Host (origin)–Windows Server

    4. Log Sources: All Log Sources

    5. Group By: Host (Origin), Application

  9. For the new rule, click the checkbox for Action.

  10. Under Actions, select Enable.


Test user network connectivity monitoring.

  1. Power on the Windows Server and log in.

  2. Open an internet browser.

  3. In the address bar, type the address of a web service by using the http protocol, as in http://www.msn.com/.


View user network connectivity monitoring alerts.

  1. On the LogRhythmXDR host, open an internet browser.

  2. In the address bar, type in the address of the LogRhythm Web Console, https://logrhythm-host:8443, and log in.

  3. Click the Alarms tab.

  4. Check for alerts coinciding with use of the http protocol.

Expected Results

  • Connecting to a web service using the http protocol will trigger an alarm event that is viewable in the LogRhythm Web Console.

Actual Results

Once LogRhythmXDR and NetworkXDR were configured to provide user network connection monitoring, we powered on the Windows Server in the Clinical Workstations VLAN that had been configured with a LogRhythm System Monitor Agent. After logging in, we opened a web browser and connected to http://www.msn.com/. LogRhythm detected use of the http protocol and created an alert that was visible on the LogRhythm Web Console.

6.1.11 Test Case: RPM-10

Cybersecurity Framework Category

Data Security

Testable Requirement(s)

(CR-12) data-in-transit is protected

Description

Demonstrate the ability to protect data-in-transit between the patient home and the telehealth platform.

Preconditions

  • An Onclave environment has been deployed, including the Onclave Telehealth Gateway and Wireless Onclave Home Gateway.

  • A Vivify Pathways Care Team Portal is deployed behind the Onclave Telehealth Gateway, on the Telehealth Onclave VLAN.

  • Wireshark has been installed and configured on the Vivify Pathways Care Team Portal.

  • A mobile device has been provided by Vivify and configured to communicate with the Vivify Pathways Care Team Portal.

  • The mobile device is deployed behind the Wireless Onclave Home Gateway.

Procedure

Verify that the Vivify Pathways Care Team Portal is operational.

  1. Power on the Vivify Pathways Care Team Portal.

  2. Open an internet browser.

  3. In the address bar, type https://localhost.

  4. Ensure that the Vivify Pathways Care Team Portal landing page is displayed.


Test connectivity between the mobile device and Vivify Portal when connected to the Onclave Wireless Home Gateway.

  1. On the Vivify Portal system, click on the Windows Start Button.

  2. Type Wireshark and open the Wireshark application.

  3. Start a packet capture on the Ethernet0 network interface.

  4. Using the mobile device, begin a new patient reading.

  5. Follow the instructions until the patient reading is complete.

  6. On the Vivify Portal system, stop the Wireshark packet capture.

  7. Check if there are packets received from the mobile device’s IP address, 192.168.50.104.

  8. Check if the packets are obfuscated.

  9. Open an internet browser.

  10. In the address bar, type https://localhost.

  11. Log in to the telehealth platform with your admin credentials.

  12. Click on the patient for whom the readings were taken.

  13. Check if the patient’s readings were successfully transmitted from the mobile device to the Vivify Portal.


Test connectivity between the mobile device and Vivify Portal when not connected to the Wireless Onclave Home Gateway.

  1. On the mobile device, change the device’s Wi-Fi to VLAN 1332.

  2. On the Vivify Portal system, start a new packet capture on the network interface using Wireshark.

  3. Using the mobile device, begin a new patient reading.

  4. Follow the instructions until the patient reading is complete.

  5. On the Vivify Portal, stop the Wireshark packet capture.

  6. Check that there are no packets received from the mobile device’s IP address, 192.168.50.104.

  7. Open an internet browser.

  8. In the address bar, type https://localhost.

  9. Log in to the telehealth platform with your admin credentials.

  10. Click on the patient for whom the readings were taken.

  11. Check if the patient’s readings were not successfully transmitted from the mobile device to the Vivify Portal.

Expected Results

  • The mobile device can communicate with the Vivify Portal only when the mobile device is connected to the Wireless Onclave Home Gateway.

  • Data transmitted from and to the mobile device are encrypted.

Actual Results

The mobile device successfully transmitted data to the Vivify Portal when connected to the Wireless Onclave Home Gateway. The Wireshark packet analysis tool was used to capture network traffic. Captured traffic was observed to be encrypted. When the mobile device was not connected to the Wireless Onclave Home Gateway, data were not transmitted to the Vivify Portal.

6.1.12 Test Case: RPM-11

Cybersecurity Framework Category

N/A

Testable Requirement(s)

(CR-13) business workflow

Description

Demonstrate that the telehealth platform provider can receive a patient’s biomedical data from the patient home and present this data to the HDO.

Preconditions

  • Implement an RPM architecture and verify that network connections among the Patient Home, Telehealth Platform Provider, and HDO are functioning.

  • Place RPM peripherals in the Patient Home environment.

  • Connect the provided RPM interface to the Patient Home network.

  • Create accounts for the HDO’s clinicians on the Telehealth Platform Provider’s platform.

  • Ensure clinicians are associated with their patients on the third-party platform.

Procedure

Accuhealth–gather biomedical readings from devices with a cellular connection.

  1. Interface with the weight scale provided by Accuhealth and record the measurement.

  2. Interface with the blood glucose monitor provided by Accuhealth and record the measurement.

  3. Interface with the blood pressure monitor provided by Accuhealth and record the measurement.


Accuhealth–view and verify that patient data were stored in the telehealth platform from the HDO network.

  1. Log in to Accuhealth’s platform by using the credentials that it provided from a workstation connected to the HDO network.

  2. Navigate to the patient account associated with the provided peripheral devices.

  3. Verify that the biomedical readings taken in steps 1-3 are listed.


Vivify—gather biomedical readings from devices with a broadband connection.

  1. Interface with the RPM tablet provided by Vivify and answer the presented survey questions.

  2. Interface with the blood pressure monitor provided by Vivify and verify that the tablet has the correct reading.

  3. Interface with the oximeter provided by Vivify and verify that the tablet has the correct reading.

  4. Interface with the weight scale provided by Vivify and verify that the tablet has the correct reading.

  5. Interface with the blood glucose monitoring system provided by Vivify and verify that the tablet has the correct reading.


Vivify–view and verify that patient data were stored in the telehealth platform from the HDO network.

  1. Log in to Vivify’s platform by using the credentials that it provided from a workstation connected to the HDO network.

  2. Navigate to the patient account associated with the provided peripheral devices.

  3. Verify that the biomedical readings and survey answers provided in steps 1-5 are listed.

Expected Results

  • The biomedical readings gathered from the provided RPM devices should be transmitted to a patient account on the appropriate telehealth platform provider platforms.

  • Clinicians should be able to access these readings from the HDO network by logging in to the platforms and using the credentials provided to them by the third-party platform.

Actual Results

Biomedical readings were transmitted from the patient’s home to the telehealth platform provider. Clinicians were also able to access and view the patient’s biomedical readings from the HDO network by logging in to the third party’s platform and using their provided credentials.

7 Future Build Considerations

This practice guide implemented biometric devices that used cellular data communications. This guide also addressed biometric devices using broadband communications. The practice guide implemented Onclave Networks as a proof-of-concept solution that provides layer 2 over layer 3 protection in a zero trust architecture model. This practice guide simulated a telehealth platform provider and deployed the Onclave solution to demonstrate how data communications between the patient home and telehealth platform provider may be secured. The solution assures that biometric devices are segmented from other devices that may appear in a patient home network.

A future build may also implement an EHR system that would receive automated data from the telehealth platform provider. Patient-initiated messages from RPM components deployed to the patient home were contained within the RPM systems hosted within an application to which HDOs connected for review and analysis. The future build may include direct messaging from the RPM systems to the EHR.