Case Studies

UPMC

Written by HITRUST | Mar 3, 2024 3:28:27 PM

Overview

UPMC is partnering with an ever-increasing number of vendors — many of which are moving their applications and data services to the cloud. As a result, UPMC found that it was ineffective to individually assess the information security and compliance of each of its vendors. UPMC solved this problem by utilizing the HITRUST Framework (HITRUST CSF) and related assurance program. By requiring vendors to become HITRUST certified, UPMC can more effectively manage information risk, trust the security and compliance levels of third-party vendors, and know that all organizational and patient data will remain protected.

The challenge: Move to the cloud escalates the need for data security assurance

UPMC is a $19 billion world-renowned healthcare provider and insurer based in Pittsburgh. With a focus on inventing new models of accountable, cost-effective, patient-centered care, the organization employs 85,000 people — including 4,800 physicians — and operates 40 academic, community, and specialty hospitals, as well as 600 doctor offices and outpatient sites.

UPMC’s move to cloud-based services sharply escalated the need for a third-party security and compliance risk management program. “In the past, we could more easily secure information because it was only stored in our on-premises data center,” says John Houston, Vice President of Information Security at UPMC. “Today, that same data is not always in our possession, so we have to rely on cloud platform providers and third-party vendors to properly secure our most sensitive information.”

As processing patient information in the cloud became more prevalent, UPMC needed to set up a program to ensure that data no longer in its physical possession was still secured appropriately — according to both internal policies that UPMC established and the industry regulations and standards that the organization must follow, such as HIPAA.

“In addition to assessing current vendors and getting them to agree to be HITRUST certified for security and compliance, we needed to evaluate new vendors,” Houston says. “Our main focus initially was to make certification a requirement for entry into our vendor environment.”

For business partners, UPMC is making HITRUST certification for security and compliance part of the contract and a requirement for conducting business. In some cases, UPMC will penalize vendors if they do not become certified by a specified date.

“Over time, we plan to work with existing vendors for HITRUST certification as contracts come up for renewal and as we expand the services we utilize with each vendor,” says Houston.

The solution: HITRUST provides a flexible security control framework for assessing vendors

To take on the challenge of assessing third parties for their security and compliance maturity, UPMC turned to a long-time partner that the organization has trusted for many years.

“We have used the HITRUST Framework (HITRUST CSF) since 2009 as our own security framework, and currently, we are using an external assessor to perform a HITRUST assessment,” says Houston. “It helps us make sure all of our IT systems are secure and in compliance with all the major regulations and standards.”

The HITRUST Framework (HITRUST CSF) enables organizations of any size — from small supplier businesses to large organizations — to address the challenge of complying with the multitude of federal, state, and industry regulations, standards, and frameworks pertaining to information security. By incorporating a risk-based approach, HITRUST provides a comprehensive and flexible framework of security controls.

  • Harmonizes and cross-references globally recognized standards, regulations, and business requirements — including ISO, NIST, PCI, GDPR, HIPAA, and various state laws

  • Scales controls according to organizational type, size, and complexity

  • Provides prescriptive requirements to ensure clarity

  • Offers multiple implementation requirement levels as determined by specific risk thresholds

  • Allows for the application of compensating controls when necessary

  • Evolves according to user input as well as changing industry and regulatory conditions

In addition to UPMC using the HITRUST Framework (HITRUST CSF) to guide internal security and compliance assessments, independent external auditors who work with the organization also rely on the framework.

“That shows you how well-respected HITRUST is in our industry,” says Houston. “We’ve been committed to HITRUST for a long time and find great value in using the framework to make sure our IT systems protect the sensitive information of the organization and our patients.”

The results: Framework facilitates discussions on vendor security and compliance gaps

With the move of UPMC services to the cloud and the reliance on third parties that manage UPMC data in the cloud, the HITRUST Framework (HITRUST CSF) was the natural vehicle for UPMC to rely on in order to make sure business partners apply the appropriate controls to keep information secure.

“We decided to utilize the HITRUST Framework (HITRUST CSF) because HITRUST has historically focused on healthcare and rolls up all the relevant standards and regulations into a single framework that’s cohesive to work with,” Houston says. “We can look at one framework and be assured it covers all of the regulations and standards pertaining to our industry with which we have to comply.”

Utilizing the HITRUST Framework (HITRUST CSF) also comes in handy when an external organization asks about UPMC compliance with a particular regulation or standard. “An organization recently asked if we comply with NIST,” Houston says. “Because NIST is built into the HITRUST Framework (HITRUST CSF), we could say ‘yes’ right away and with confidence. We could even provide a certification score to prove our level of maturity around the NIST cybersecurity framework; that’s a feature that most other common frameworks do not provide.”

Houston also appreciates that the HITRUST Framework (HITRUST CSF) creates a common language around security and compliance that UPMC and its vendors can use to have conversations on any risks that need to be addressed. “Most of our vendors already know what the HITRUST Framework (HITRUST CSF) is,” says Houston. “It’s a widely accepted standard with a certification process, so when vendors show us their certification, we can understand exactly what it means.”

Houston compares the HITRUST Framework (HITRUST CSF) to a nationwide chain of retail stores or restaurants: “You know that the products or food and the services of a chain store will be the same no matter which place you go into,” he says. “With HITRUST certification, you can be certain that the report you get from one vendor will align with what you get from another vendor. That makes it easy to confirm their certification score and understand any gaps they might have.”

A one-stop-shop for vendor assessments

Because each vendor has gone through the same process to get certified, Houston can easily interpret what the gaps mean and the level of security and compliance maturity an organization has achieved.

“When comparing internal audits, such as SOC 2, it’s not nearly as easy as comparing one HITRUST assessment to another,” says Houston.

For those vendors who do not know what the HITRUST Framework (HITRUST CSF) is, Houston says that when he explains it, the framework immediately makes sense, and the vendors understand what UPMC is trying to achieve. The framework has become a one-stop-shop that UPMC can go to for all-around certification of its third-party business partners.

This streamlines the process, eliminates confusion, reduces supply chain risk, and ultimately increases the security posture of the entire healthcare ecosystem. This, in turn, increases the ability of all involved in delivering patient care to do just that: deliver patient care.