This is a summary provided by HHS (health and human services). There is more detail at http://www.hhs.gov/ocr/privacy/hipaa/understanding/summary/index.html
The Privacy Rule protects all individually identifiable health information held or transmitted by a covered entity or its business associate, in any form or media, whether electronic, paper, or oral. The Privacy Rule calls this information protected health information (PHI). Individually identifiable health information is information, including demographic data, that:
- relates to the individual’s past, present or future physical or mental health or condition;
- relates to the provision of health care to the individual;
- relates to the past, present, or future payment for the provision of health care to the individual;
- identifies the individual or for which there is a reasonable basis to believe it can be used to identify the individual.
There are no restrictions on the use or disclosure of de-identified health information. De-identified
health information does not provide a reasonable basis to identify an individual.
There are two ways to de-identify information: (1) a formal determination by a qualified
statistician; or (2) the removal of specified identifiers of the individual and of
the individual’s relatives, household members, and employers is required, and is adequate
only if the covered entity has no actual knowledge that the remaining information
could be used to identify the individual.
There are 169 Privacy, Security, and Breach rules that covered entities (CEs) and business associates (BAs) are evaluated against. As HIPAA is a risk-based (versus standards-based) assessment, there is not a simple list of criteria. NIST provides the HHS preferred criteria for security evaluation.
Any CE (us) and its BAs (vendors agreeing to handle a CE’s PHI) are evaluated against:
We have two main areas in this environment: 1) The High Performance Computing (HPC) analytical environment for computations, applications, etc. 2) The Virtual Machine (VM) environment for various development, application, database, and research services.
HPC Analytic Environment
This space is for computationally intensive needs such as data mining, machine learning, natural language processing, statistics, and other operations across large datasets. This requires large (and secure) storage, high network-bandwidth capacity, and high performance compute clusters. For access to the environment, we chose a double authentication mechanism. The first level of authentication uses the campus authentication and a second factor authentication. The second authentication level requires users to be listed in the CHPC Network Information Service (NIS) directory server (the windows machines pull in this NIS group info for windows group membership) in order to interact with the PE.
Access to the compute clusters is provided via front-end login servers. The login servers are restricted by router Access Control Lists to Remote Desktop Protocol for Windows hosts and Secure Shell for the Linux hosts. Public key, host, or RHOSTS-based authentications are not allowed. The network access control lists and login servers also employ firewall services to allow limited IP addresses.
All interactions between the login servers and the cluster file server, batch controller, and computing nodes take place on an isolated back-end, high-speed Infiniband network. All Linux hosts in the cluster are automatically updated on a monthly basis using the a Network update service, while the Windows hosts are updated using Microsoft update and use anti-virus software.
Virtual Machine Implementation
The VM environment is for scientists who need lightweight computing services that do not justify the expense or capabilities of a dedicated server. The VM Cluster consists of four servers (two VMware ESXs, one Windows, one Red Hat Linux) and a disk tray. One Windows server runs VMware vCenter Server that coordinates the load-balancing and failover functions of the two ESX servers. This server does not process any protected data. One Red Hat Linux server acts as an administrative access point and it also does not process any protected data. The two VMware servers host the actual guest VMs. These servers do process protected data but do not store it internally (i.e., all transactions are RAM-based). The disk tray provides shared storage to the two VMware servers. These disks store the actual VMs, and thus all sensitive data are in those VMs. We require all VMs to encrypt their disk. The VMs and applications are regularly scanned by the University ISO.
For CHPC’s HPC protected environment, e.g, home and group/project services, see:
- HPC Cluster (redwood)
- Windows Statistics system (narwhal)
- VM (Virtual Machine) Farm (prismatic)
- PE Storage (mammoth)
- Archive Storage (elm)
For CHPC’s virtual machine protected environment, see: Protected VM Farm
How do I transfer files to/from swasey?
To transfer files to/from swasey, use WinSCP. (PLEASE remember to adhere to IRB protocol and HIPAA rules for storing protected health information) https://wiki.chpc.utah.edu/display/DOCS/How+to+use+SSH+to+transfer+files+around
Backups are restricted to one specific backup server and traffic is automatically encrypted on the Client side before traversing the network (BLOWFISH encryption). Backup media is stored in a locked cabinet in an access controlled/monitored data center. There is a two week data retention policy (unless otherwise arranged).
If PHI can be reasonable protected in a cluster environment, is it possibile to be HIPAA compliant in a shared environment?
In our setup we have the HIPAA HPC cluster environment isolated from our general HPC cluster with different IP space and access security controls. It is still a "shared environment" in the sense that users who have access to this space have a business need and have completed certain requirements. We save cost of hardware and administrative overhead by utilizing some existing/general infrastructure. We isolate the different groups/projects via unix ACLs and other controls.
The physical hardware resides in a data center with 24 hour surveillance. Access is controlled via data center stewards, human issued key cards, and fingerprint biometric access.
If interactive nodes are segmented and configured in a typical HIPAA compliant fashion and the nodes are only capable of submitting jobs to the cluster (which is otherwise inaccessible), the jobs and relevant data are cleaned from the cluster once a job is complete, etc. Would that generally be compliant?
If we understand the scenario here (being that the interactive nodes are shared with HIPAA and non HIPAA compliant workflows), it would be difficult to justify to an auditor that it's a HIPAA compliant workspace. Maybe if the user had an interactive/login node specifically only for HIPAA use (for example, limited access by security groups and/or DUO/host list) and the user made a special queue that only those users could use, we could see how one could be HIPAA compliant, providing all authentication and data transmission (and at rest) are encrypted.
Once you have an account provisioned in the PE, you may access this documentation (requires authentication to the CHPC wiki): https://wiki.chpc.utah.edu/display/DOCS/How+the+environment+is+secured+and+how+access+is+allowed
This is tough to condense down & summarize - we've snipped out some relevant sections from other documentation:
When building the protected environment we wanted to isolate it as much as possible,
utilizing some pieces of the core infrastructure to minimize costs. The network IP space we used for the protected
environments (i.e., the HPC and the VM environments) were assigned to separate logical subnets and vLANs from
both our existing services and from each other. We further segregated the individual Virtual Machines (VMs) to
project-specific groups. With this approach we were able to utilize most of our existing core services, like DUO,
DNS, NTP, and Kerberos.
Physical infrastructure: The physical hardware resides in a data center with controlled room access. These hosts are
racked in a locked cabinet and hosts have locked server bezels. Physical access to the data center is reviewed
biannually and documented on an access-controlled departmental log. Backups are restricted to one specific
backup server on one particular port. Backup data traffic is automatically encrypted (BLOWFISH encryption) at the
client side before traversing the network. Backup media are stored in locked cabinets in the access-restricted data
center. All employees and users who interact with the cluster have been through the University of Utah’s HIPAA
training, and many have completed the well-known CITI human subjects research training.
HPC analytic environment: The HPC environment was architected to require two authentication mechanisms.
The first level of authentication requires use of the University of Utah campus Central campus directory service in conjuction with Two factor security. The second authentication level requires users to be listed in the CHPC NIS directory server in order to interact with the
cluster. The access to both the Central campus directory service and the NIS server are set up only by explicit approval.
Access to the computational cluster servers is provided via front-end “login servers.”
The login servers are restricted (limited to certain IP addresses) by router Access
Control Lists (ACL) to Remote Desktop Protocol (RDP uses TCP port 3389) for the Windows
hosts and Secure Shell (SSH v2 uses TCP port 22) for the Linux hosts. Public key,
host, or RHOSTS-based authentication are not allowed. The login servers also employ
firewall services to limit access to a specific set of IP ranges. All interactions
between the front-end hosts and the cluster file server, batch controller, and computing
nodes take place on an isolated back-end, high-speed Infiniband network. All Linux
hosts in the cluster are automatically
updated on at least a monthly basis utilizing the Redhat Network update service, while the Windows hosts are
updated using Microsoft update and use anti-virus software that is also regularly updated. We have to provision a
dedicated fileserver for the HPC home directories in the protected environment, but we utilize the existing UNIX
application file systems in read-only mode to deliver executable programs. Login sessions are automatically logged out after
15 minutes of inactivity.
Administrative procedures: In order for a user to access the HIPAA environment at CHPC they must meet all the
• Have an active account in the University of Utah's directory service system, using the
University of Utah’s mechanisms. This extends to any external collaborators as well.
• Have an active CHPC departmental account, where sponsorship and approval of a Principal
Investigator (PI) is required.
• Have an active CHPC account created in the HIPAA environments isolated NIS (network
information system) and be a member of the ‘NIS group’ that is listed in the PAM security
access.conf file. This requires verification and completion of the on-line HIPAA privacy and
• Have a two factor security account.
Permission to use a given dataset is governed by the approval of the University's Institutional Review Board (IRB).
Researchers must submit a proposal to the IRB listing the data to be used and the people who will have access to it.
If the IRB approves the use of the data in question, the researcher is given an IRB number. In order to store the data
in CHPC's HIPAA environment, the researcher must provide CHPC with this number and a list of the users who will
be permitted to see the data. The list is independently verified with the IRB. Thereafter, the data may be transferred
to CHPC and only the IRB-approved users will be able to work with it.
Logical access is monitored by SYSLOG and process accounting (PSACCT). Logs are kept
both locally and on a
remote SYSLOG server and routinely reviewed. Retention of logs on the SYSLOG server is currently kept
indefinitely. Logwatch reports are emailed daily to designated administrator accounts. These daily logwatch reports
show the last 24 hours of what accounts logged in (or failed to log in) and from what IP. Firewall configuration
prevents ‘brute force’ login attempts. If an account login is unsuccessful more than three times, it will lock/prevent the
account from authenticating for three minutes. Access to view or manipulate other users' or groups' data is enforced by
using UNIX file and directory permission(s). Two factor logs are available from the University of Utah’s IT (UIT)
Department. These logs show access and failures by date and time.
Account validation is periodically reviewed. User access to IRB data is periodically
biannually). IRB projects are the authoritative source for who has access to HIPAA data. If a person is not listed on
an approved IRB project, then he or she is not allowed in the UNIX group for access to that project's data. Our IRB
reviews studies on annual basis.
We have been able to reuse a substantial part of the CHPC HPC infrastructure to develop a new protected
environment, increasing user productivity and compliance at the same time. For these researchers, in
addition to access to high performance computing power, other tangible benefits for researchers include CHPC
handling systems management issues, such as rapid response to electrical power issues, provision of reliable cooling
and heating; DUO support for a work-anywhere computing experience; and ensuring a hardened, secure environment
compared to office computers or departmental servers. For the institution, this resource allows much better
compliance and reduces the vulnerabilities of exposure of PHI data.
The Research Electronic Data Capture (REDCap) data management application is used to create web accessible forms, a secure database with continuous auditing, and a flexible reporting system. REDCap is hosted on a secure, 21 CFR Part11 compliant server farm within the CHPC area in the University of Utah Data Center. Data is backed up every hour with the hourly backups being incorporated into the regular backup-recovery data process (nightly, weekly, monthly), which includes off-site storage. Routine data recovery and disaster recovery plans are in place for all research data. More info can be found at https://redcap01.brisc.utah.edu/ccts/redcap/index.php?action=training
Yes. It's called mysql.apexarch.bridges. You will need to have access to either the HIPAA-secure Windows client swasey or the Linux interactive node poet, as this server is not publicly accessible. The server is running Mysql5.5 on RHEL6. For access, send a request to email@example.com. Include the name you would like for the database and we will provision it, creating a mysql user for you if necessary.
When you are provisioned with access to the PE, you will be provided instructions of how to access.
Here's a link of how to get to home and group/project directories...
Here is a link (if you have access to the PE) for host access methods...
As always If you need assistance, please let us know.
Is it possible to map/mount the general CHPC fileservers (e.g., drycreek) on swasey
or other hosts in the CHPC Protected Environment (PE) or vice versa ?
It is not possible to mount the General Home directory space (e.g., drycreek) from swasey (or any machine located in the CHPC protected environment). This is, by design, to isolate protected data that may be stored in the CHPC PE.
One can use fastx or remote desktop to access a host in the CHPC PE and then use a web browser (or box sync).
NOTE: box.com is currently the only UofU cloud storage service that is acceptable to store PHI data, please see "NOTE" at the following CHPC web page for more info... https://www.chpc.utah.edu/resources/ProtectedEnvironment.php
NO! Never put Protected Heath Information (PHI), passwords/passphrases, or any sensitive information in the CHPC helpdesk ServiceNow issue tracking system!
See: (H) Medical record numbers;
As the MRN can be used to reidentify, it is considered protected. If you're moving data that contains an MRN, you need to consider it as PHI and encrypt/secure appropriately.
“Also note, health information by itself without the 18 identifiers is not considered to be PHI. For example, a dataset of vital signs by themselves do not constitute protected health information. However, if the vital signs dataset includes medical record numbers, then the entire dataset must be protected since it contains an identifier.”
I have a DUO account and have a new phone, what do I need to do to get it registered or re-registered
Your DUO devices can be managed via the folowing link: https://ese.idm.utah.edu/duo-management/secure/user/enrollment#d
The link will prompt you to sign in to your CIS account. If DUO is no longer aligned to push you a notification, login using the "Enter a passcode" option and then select "Text me new codes". After logging in, you will be brought to the Terms and Conditions page.
After clicking 'Agree' to the Terms and Conditions, the site will automatically direct you to "Register a New DUO Device." If instead you wish to manage your devices that are already registered with DUO, click 'Cancel.' You will now be able to see a list of deviced registered with your DUO account.
See https://www.chpc.utah.edu/documentation/software/duo.php for further instructions on registering or re-activating your device(s) and for frequently asked questions regarding DUO security. Note: We recommend registering with multiple devices. ALSO, please note that if you have a major software update to your device (e.g., android 5.x to 6.x) you may need to go to reactivate your device using the above instructions.
CHPC is setup to host use cases for HIPAA regulated and NIH dbgap data sets. Here is the dbgap guidelines from NIH http://www.ncbi.nlm.nih.gov/projects/gap/pdf/dbgap_2b_security_procedures.pdf
What are the screen timeout values and account lockout values for the login hosts for this environment?
To prevents ‘brute force’ login attempts. If a unix account login is unsuccessful more than six (6) times, it will lock/prevent the account from authenticating (to that same host) for ten (10) minutes. There is a 30 minute inactivity screen logout timeout for sessions to PE access hosts (e.g., redwood/apex/poet2/Farnsworth/swasey etc), if you leave an idle session for this time period it will logout your session. TIP: There are a few ways to access these systems so that the 30 minute inactivity timeout value doesn't disrupt your work too much.. 1) make use of screen for your logins to unix ssh sessions, this way when your idle session reaches the timeout value and terminates your session you can log back in and resume your screen session. See the following for more information about screen: https://www.chpc.utah.edu/documentation/software/screen.php 2) Access this environment via RDP'ing to the CHPC PE windows login/gateway hosts (currently swasey & drawbridge at the time of this writing), the ssh session you create from swasey are still subject to 30 logoff but other work/windows on swasey can be resume by re-authenticating your RDP session to the login/gateway host. 3) Use FastX for unix host acess, https://www.chpc.utah.edu/documentation/software/fastx2.php.
device registration/management https://ese.idm.utah.edu/duo-management/index.htm#d
If you want/need a Duo keyfob, they are about $20-$25 at the campus bookstore. You can then register them to your unid at https://ese.idm.utah.edu/duo-management/index.htm (the page is also linked from CIS). CHPC recommend using the smartphone app instead. It's easier to use than the keyfob and it's free.
NOTE: If you don't have access to your DUO device, the helpdesk (801-581-4000) can generate temporary bypass codes