(HIX) August – September 2013 Security Control Assessment (SCA) Report

(HIX) August – September 2013 Security Control Assessment (SCA) Report

'(3$570(172)+($/7+ +80$16(59,&(6 &HQWHUVIRU0HGLFDUH 0HGLFDLG6HUYLFHV 6HFXULW\%RXOHYDUG0DLO6WRS1 %DOWLPRUH0' 00£ fOlt M O lE \1£1> 10 RV1 OFFICEOF I FOAAtATIO ERVICES CENTERS FOR MEDICARE & MEDICAID SERVICES Office of Information Services 7500 Security Boulevard Baltimore, MD 21244-1850 Health Insurance eXchange (HIX) August – September 2013 Security Control Assessment (SCA) Report Final Report October 11, 2013 CMS SENSITIVE INFORMATION—REQUIRES SPECIAL HANDLING epic.org EPIC-14-02-03-CMS-FOIA-20200917-Production-Security-Control-Assessment-Report 000001 CMS000095 CMS SENSITIVE INFORMATION—REQUIRES SPECIAL HANDLING +HDOWK,QVXUDQFHH;FKDQJH +,; $XJXVW±6HSWHPEHU)LQDO5HSRUW 2FWREHU Table of Contents 1 Executive Summary .............................................................................................................. 1 1.1 HIX Background .......................................................................................................... 1 1.1.1 Plan Management (PM)..................................................................................... 2 1.1.2 Eligibility & Enrollment (E&E) ........................................................................ 3 1.1.3 Financial Management (FM) ............................................................................. 6 1.2 Assessment Scope ........................................................................................................ 7 1.2.1 Joint Assessments ............................................................................................. 8 1.3 Known functionality not tested ..................................................................................... 9 1.4 Summary of Assessment ............................................................................................. 10 1.5 Summary of Findings ................................................................................................. 11 1.6 SUMMARY OF RECOMMENDATIONS ................................................................. 13 2 Introduction ........................................................................................................................... 1 2.1.1 Plan Management (PM)..................................................................................... 1 2.1.2 Eligibility & Enrollment (E&E) ........................................................................ 2 2.1.3 Financial Management (FM) ............................................................................. 6 2.2 Assessment Methodology ............................................................................................. 7 2.2.1 Joint Assessments ............................................................................................. 7 2.3 Assessment Summary ................................................................................................... 8 3 Detailed Findings .................................................................................................................. 9 3.1 Methodology for Application-Only Security Control Assessment ................................. 9 3.1.1 Application-Only Vulnerability Assessment .................................................... 10 3.1.2 Tests and Analyses .......................................................................................... 10 3.1.3 Tools ............................................................................................................... 10 3.2 Methodology for Security Test Reporting ................................................................... 11 3.2.1 Risk Level Assessment.................................................................................... 11 3.2.2 Ease-of-Fix Assessment .................................................................................. 12 3.2.3 Estimated Work Effort Assessment ................................................................. 13 3.2.4 CMS FISMA Controls Tracking System Names .............................................. 13 3.3 Business Risks ............................................................................................................ 13 3.3.1. BUSINESS RISK............................................................................................RISK............................................................ 15 (b)(5)(b)(5)b)(5(b)(5) ................................ 15 3.3.2. BUSINESS RISK............................................................................................ 17 (b)(5) (b)(5)(b)(5)b)(5 ........................... 17 3.3.3. BUSINESS RISK............................................................................................ 19 (b)(5)(b)(5)b)(5(b)(5) ......................... 19 3.3.4. BUSINESS RISK............................................................................................ 21 (b)(5)(b)(5)b)(5(b)(5) ...................................................................................... 21 &HQWHUVIRU0HGLFDUH 0HGLFDLG6HUYLFHV 3DJHL CMS SENSITIVE INFORMATION—REQUIRES SPECIAL HANDLING epic.org EPIC-14-02-03-CMS-FOIA-20200917-Production-Security-Control-Assessment-Report 000002 CMS000096 CMS SENSITIVE INFORMATION—REQUIRES SPECIAL HANDLING +HDOWK,QVXUDQFHH;FKDQJH +,; $XJXVW±6HSWHPEHU)LQDO5HSRUW 2FWREHU 3.3.5. BUSINESS RISK............................................................................................ 23 (b)(5)(b)(5)b)(5(b)(5) .................................... 23 3.3.6. BUSINESS RISK............................................................................................ 25 (b)(5)(b)(5)b)(5(b)(5) ...................................................................... 25 3.3.7. BUSINESS RISK............................................................................................ 27 (b)(5) (b)(5)(b)(5)b)(5 ...................................................................... 27 3.3.8. BUSINESS RISK............................................................................................ 29 (b)(5)(b)(5)b)(5(b)(5) .................................................................. 29 3.3.9. BUSINESS RISK............................................................................................ 31 (b)(5)(b)(5)b)(5(b)(5) ......................................................................... 31 3.3.10.BUSINESS RISK............................................................................................ 33 (b)(5)(b)(5)b)(5(b)(5) ................................................................. 33 3.3.11.BUSINESS RISK............................................................................................ 35 (b)(5)(b)(5)b)(5(b)(5) .................................................................................. 35 3.3.12.BUSINESS RISK............................................................................................ 37 (b)(5)(b)(5)b)(5(b)(5) ....................................... 37 3.3.13.BUSINESS RISK............................................................................................ 39 (b)(5)(b)(5)b)(5(b)(5) ......................................................... 39 3.3.14.BUSINESS RISK............................................................................................ 41 (b)(5)(b)(5)b)(5(b)(5) .......................................... 41 3.3.15.BUSINESS RISK............................................................................................ 43 (b)(5)(b)(5)b)(5(b)(5) ............................................... 43 3.3.16.BUSINESS RISK............................................................................................ 45 (b)(5)(b)(5)b)(5(b)(5) ............................................................................ 45 3.3.17.BUSINESS RISK............................................................................................ 47 (b)(5)(b)(5)b)(5(b)(5) .................................................................. 47 3.3.18..BUSINESSUS RISK............................................................................................RISK................. 49 (b)(5)(b)(5)b)(5 (5) ........................................................................... 49 3.3.19.BUSINESS RISK............................................................................................ 51 (b)(5) (b)(5)(b)(5)b)(5 ............................................................................... 51 3.3.20.BUSINESS RISK............................................................................................ 53 (b)(5)(b)(5)b)(5(b)(5) ................................................................................... 53 3.3.21.BUSINESS RISK............................................................................................ 55 (b)(5)(b)(5)b)(5(b)(5) ................................................................... 55 3.3.22.BUSINESS RISK............................................................................................ 57 (b)(6)(b)(6)b)(6(b)(6) ............................. 57 3.4 Informational Risks .................................................................................................... 59 3.4.1 Business Risk .................................................................................................. 60 (b)(5)(b)(5)b)(5(b)(5) ....................................................................... 60 3.4.2 Businessus ess Risk s .......................................................................................................................................... 62 (b)(5)(b)(5)b)(5(b)(5) .......................................................... 62 3.4.3 Business

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    293 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us