After completing an Information Asset Inventory, the second step in a Risk Analysis is to determine the risks and exposures associated each information asset. Here’s today’s big tip – Learn how to determine risk! …here’s how…
Risk Determination Phase
This second step continues on with multiple steps for each Information Asset identified in Step 1: (the Asset Inventory Phase) still using a “Risk Determination and Remediation” worksheet.
In plain English, determining risk is identifying what bad things might happen to information assets (e.g., lost or stolen mobile devices, hacking, natural disaster, etc) and assessing the likelihood of those bad things AND the impact were those bad things to happen. Risk is often described as a function of Likelihood and Impact. Likelihood is often described as a function of threats, vulnerabilities and current controls in place.
The steps are:
2.1. Identify threats in the environment
2.2. Identify vulnerabilities that threats could exploit
2.3. Describe the risks based on threat/vulnerability pairings
2.4. Identify existing controls
2.5. Determine the likelihood that a threat could exploit a vulnerability (e.g., unlikely to almost certain)
2.6. Analyze the impact if the threat were to successfully exploit the vulnerability(s) (e.g., insgnificant to disasterous)
2.7 Determine and summarize the risk level
Read: HIPAA Security Risk Analysis Background and Requirements – A White Paper for Healthcare Professionals for more on completing a HIPAA Security Risk Analysis. This document provides background about and specific requirements regarding a HIPAA Risk Analysis. It describes our Security Risk Analysis and Management Methodology and the rationale behind our approach.
As required by The HITECH Act, the Office for Civil Rights has issued final “Guidance on Risk Analysis Requirements under the HIPAA Security Rule”. (July 2010). We advise all Covered Entities and Business Associates to review the Final Guidance and become familiar with the applicable standards and implementation specifications.
Check out the Clearwater HIPAA Security Risk Analysis ToolKit™ to jump-start your program.
More HIPAA HITECH Resources:
The complete HIPAA Privacy, Security and Breach regulations are here.
Latest posts by Bob Chaput (see all)
- Making the case for comprehensive cyber-risk strategies: 10 startling facts that will spur C-suite action - August 8, 2016
- Building Capability and Capacity to Take on Healthcare’s Evolving Security Threats - August 5, 2016
- HIPAA Risk Analysis Tip – The Biggest Risk Management Surprises in the 2016 OCR Audit Protocol - April 11, 2016