Final Project
Final Project
Micah Geertson
CSOL 510
04/26/2019
Final Project:
Cryptographic Techniques
Final Project: Cryptographic Techniques 2
Table of Contents
Executive Summary .................................................................................................................................... 3
Relevant Laws, Regulations and Standards ............................................................................................. 4
What Security Standards & Policies Are Being Enforced ...................................................................... 4
Data-at-Rest & Data-in-Flight Encryption (CONFIDENTIALITY) ..................................................... 5
Data-at-Rest & Data-in-Flight Encryption (INTEGRITY) .................................................................... 6
Network Security Configuration Standards ............................................................................................. 7
Secure Key Distribution – Cryptography (CONFIDENTIALITY) ....................................................... 8
Network Authentication (CONFIDENTIALITY/INTEGRITY/AVAILABILITY) ............................. 9
Public Key Infrastructure – Certificates (Integrity) .............................................................................. 10
Threat Environment ................................................................................................................................. 11
Conclusion ................................................................................................................................................. 11
References ............................................................................................................................................. 12-13
Table of Figures
Figure 1 – ACME INC Network Diagram .............................................................................................. 11
Final Project: Cryptographic Techniques 3
Executive Summary
The purpose of this document is to describe, in depth, the cryptographic security
measures that ACME Inc. should deploy in order to adhere to the standards and Federal laws
imposed by the Health Insurance Portability and Accountability Act (HIPAA). In addition to
being held accountable for the security of all electronic healthcare documents, the following
security attributes should be maintained at all times:
This document will outline several cryptographic security features that should be implemented as
soon as possible to not only adhere to HIPAA but also ensure that the impact is minimal should
an attack against ACME Inc. occur. Each cryptographic system has been selected based on
standards released by several security organizations such as the National Institute of Standards
and Technology (NIST), Center for Internet Security (CIS), and the Federal Information
Processing Standards (FIPS). With this being said, the proposed systems include the use of
cryptography to encrypt data using the Advanced Encryption Standard (AES) protocol, Public
Key Infrastructure to utilize digital certificates to allow verification of all parties in
communication, network security measures to ensure the prevention of outside attackers from
accessing the corporate network, and Kerberos authentication and authorization measures to
ensure that those attempting to access data are actual users on the network and are also allowed
to access the data. As the biggest threat to ACME Inc. and its data come from internal users,
either intentionally malicious or incidental, it is vital that we deploy these systems to preserve
our records and have adequate backup and recovery efforts for data.
Final Project: Cryptographic Techniques 4
While these are the requirements of HIPAA, the law does not outline how to accomplish this
security triad. For this, we defer to several security frameworks and standards released by
organizations such as the National Institute of Standards and Technology (NIST), Center for
Internet Security (CIS), and the Federal Information Processing Standards (FIPS). A brief
overview of these documents reveals the minimum-security standards for several security system
implementations. Some of these standards include account password policies, network security
configurations and minimum bits required for use in cryptographic functions.
Threat Environment
Based on the level of layered security implemented within the ACME INC corporate
network, it is speculated that any significantly impactful threat will come from within the
company, whether be an intentional malicious attack conducted by a disgruntled employee or
accidentally by an unsuspecting user. Based on this assumption, several security measures have
been taken to provide continued preservation of data as seen in the following figure:
Conclusion
Ultimately, the Health Insurance Portability and Accountability Act (HIPAA) is United
States Federal law and must be adhered to accordingly. The biggest threats to the company have
been evaluated to be insider threats followed by external threats. By strategically deploying
cryptographic systems to ensure confidentiality, integrity, and availability of electronic health
records using NIST, FIPS, CIS or anyone of the other publicly recognized security configuration
standards available, ACME INC. can be reasonably assured that health claims information is
secure.
Final Project: Cryptographic Techniques 12
References
Barker, E. (2016, August). NIST Special Publication 800-175B Guideline for Using Cryptographic Standards in the Federal Government:
Barker, E. (2016, January). NIST Special Publication 800-57 Part 1 Revision 4. Retrieved March 17, 2019, from
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-57pt1r4.pdf
Barker, E. (2016, January). NIST Special Publication 800-57 Part 1 Revision 4 - Recommendation for Key Management. Retrieved April 07,
2019, from https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-57pt1r4.pdf
Barker, E., & Barker, W. C. (2018, June). Draft NIST Special Publication 800-71 - Recommendation for Key Establishment Using Symmetric
Block Ciphers. Retrieved April 07, 2019, from https://csrc.nist.gov/CSRC/media/Publications/sp/800-71/draft/documents/sp800-71-draft.pdf
Barker, E., Smid, M., & Branstad, D. (2015, October). NIST Special Publication 800-152 - A Profile for U.S. Federal Cryptographic Key
Management Systems. Retrieved April 07, 2019, from https://nvlpubs.nist.gov/nistpubs/specialpublications/nist.sp.800-152.pdf
CIS. (2019, March 07). CIS Microsoft Windows 10 Enterprise Release 1803 Benchmark 1.5.0 Checklist Details. Retrieved March 30, 2019, from
https://nvd.nist.gov/ncp/checklist/899
CISCO. (2016, February 15). User Security Configuration Guide - Configuring Kerberos [Cisco Cloud Services Router 1000V Series]. Retrieved
April 12, 2019, from https://www.cisco.com/c/en/us/td/docs/ios-xml/ios/sec_usr_cfg/configuration/xe-16/sec-usr-cfg-xe-16-book/sec-cfg-
kerberos.html
Dang, Q. (2016, August). NIST Special Publication 800-107 Revision 1 Recommendation for Applications Using Approved Hash Algorithms.
Retrieved March 22, 2019, from https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-107r1.pdf
DISA. (2017, April 28). Windows 10 STIG Version 1, Release 16 Checklist Details. Retrieved March 30, 2019, from
https://nvd.nist.gov/ncp/checklist/629
FIPS. (2004, February). FIPS PUB 198-1 The Keyed-Hash Message Authentication Code (HMAC). Retrieved March 22, 2019, from
https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.198-1.pdf
FIPS. (2004, February). FIPS PUB 199 Standards for Security Categorization of Federal Information and Information Systems. Retrieved March
17, 2019, from https://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.199.pdf
Frankel, S. (2005, December). NIST Special Publication 800-77 Guide to IPsec VPNs. Retrieved March 17, 2019, from
https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-77.pdf
Grace, T. (2003, October). NIST Special Publication 800-36 - Guide to Selecting Information Technology Security Products. Retrieved March
30, 2019, from https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-36.pdf
HHS Office of the Secretary,Office for Civil Rights, & Ocr. (2016, February 23). NIST-Security-HIPAA-Crosswalk. Retrieved March 17, 2019,
from https://www.hhs.gov/hipaa/for-professionals/security/nist-security-hipaa-crosswalk/index.html
HHS Office of the Secretary,Office for Civil Rights, & Ocr. (2016, February). HIPAA Security Rule Crosswalk to NIST Cybersecurity
Framework. Retrieved from https://www.hhs.gov/sites/default/files/nist-csf-to-hipaa-security-rule-crosswalk-02-22-2016-final.pdf
HHS Office of the Secretary,Office for Civil Rights, & Ocr. (2016, February 23). NIST-Security-HIPAA-Crosswalk. Retrieved March 22, 2019,
from https://www.hhs.gov/hipaa/for-professionals/security/nist-security-hipaa-crosswalk/index.html
HHS Office of the Secretary,Office for Civil Rights, & Ocr. (2016, February). HIPAA Security Rule Crosswalk to NIST Cybersecurity
Framework. Retrieved from https://www.hhs.gov/sites/default/files/nist-csf-to-hipaa-security-rule-crosswalk-02-22-2016-final.pdf
HHS Office of the Secretary,Office for Civil Rights, & Ocr. (2018, October 31). Security Rule Guidance Material. Retrieved March 17, 2019,
from https://www.hhs.gov/hipaa/for-professionals/security/guidance/index.html
Kuhn, R. (2001, February 26). NIST Special Publication 800-32 - Introduction to Public Key Technology and the Federal PKI Infrastructure.
Retrieved April 20, 2019, from https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-32.pdf
McKay, K., & Cooper, D. (2018, October). NIST Special Publication 800-52 2 Revision 2 Guidelines for the Selection, 3 Configuration, and Use
of Transport 4 Layer Security (TLS) Implementations. Retrieved March 17, 2019, from https://csrc.nist.gov/CSRC/media/Publications/sp/800-
52/rev-2/draft/documents/sp800-52r2-draft2.pdf
NIST. (2008, October). An Introductory Resource Guide for Implementing the Health Insurance Portability and Accountability Act (HIPAA)
Security Rule. Retrieved March 17, 2019, from
https://www.hhs.gov/sites/default/files/ocr/privacy/hipaa/administrative/securityrule/nist80066.pdf?language=es
Final Project: Cryptographic Techniques 13
NIST. (2017, April 28). Network Infrastructure Router L3 Switch Version 8, Release 29 Checklist Details. Retrieved March 17, 2019, from
https://nvd.nist.gov/ncp/checklist/382
NIST. (2017, February 15). National Checklist Program. Retrieved March 30, 2019, from https://csrc.nist.gov/Projects/National-Checklist-
Program
Oracle. (2012, March 01). Increasing Security on Kerberos Servers. Retrieved April 12, 2019, from
https://docs.oracle.com/cd/E23824_01/html/821-1456/setup-280.html
Scarfone, K. (2008, July). NIST Special Publication 800-123 - Guide to General Server Security. Retrieved March 30, 2019, from
https://nvlpubs.nist.gov/nistpubs/legacy/sp/nistspecialpublication800-123.pdf
Scarfone, K., & Hoffman, P. (2009, September). NIST Special Publication 800-41 Revision 1 Guidelines on Firewalls and Firewall Policy.
Retrieved March 17, 2019, from https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-41r1.pdf
Souppaya, M. (2012, February). NIST Special Publication 800-153 - Guidelines for Securing Wireless Local Area Networks (WLANs).
Retrieved March 30, 2019, from https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-153.pdf
Souppaya, M., & Scarfone, K. (2012, February). NIST Special Publication 800-153 Guidelines for Securing Wireless Local Area Networks
(WLANs). Retrieved March 17, 2019, from https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-153.pdf