How Good Is a Security Policy against Real Breaches? A HIPAA Case Study
Title | How Good Is a Security Policy against Real Breaches? A HIPAA Case Study |
Publication Type | Conference Paper |
Year of Publication | 2017 |
Authors | Kafali, Ö, Jones, J., Petruso, M., Williams, L., Singh, M. P. |
Conference Name | 2017 IEEE/ACM 39th International Conference on Software Engineering (ICSE) |
ISBN Number | 978-1-5386-3868-2 |
Keywords | accidental misuses, breach ontology, Cognition, HHS, HIPAA, inference mechanisms, malicious misuses, Measurement, Medical services, norm violation, Ontologies, pubcrawl, security, Security and privacy breaches, security breaches, security of data, security policies, semantic reasoning, semantic similarity, semantic similarity metric, Semantics, SEMAVER, social norms, Software development, software engineering, Taxonomy, US Department of Health and Human Services, US Health Insurance Portability and Accountability Act |
Abstract | Policy design is an important part of software development. As security breaches increase in variety, designing a security policy that addresses all potential breaches becomes a nontrivial task. A complete security policy would specify rules to prevent breaches. Systematically determining which, if any, policy clause has been violated by a reported breach is a means for identifying gaps in a policy. Our research goal is to help analysts measure the gaps between security policies and reported breaches by developing a systematic process based on semantic reasoning. We propose SEMAVER, a framework for determining coverage of breaches by policies via comparison of individual policy clauses and breach descriptions. We represent a security policy as a set of norms. Norms (commitments, authorizations, and prohibitions) describe expected behaviors of users, and formalize who is accountable to whom and for what. A breach corresponds to a norm violation. We develop a semantic similarity metric for pairwise comparison between the norm that represents a policy clause and the norm that has been violated by a reported breach. We use the US Health Insurance Portability and Accountability Act (HIPAA) as a case study. Our investigation of a subset of the breaches reported by the US Department of Health and Human Services (HHS) reveals the gaps between HIPAA and reported breaches, leading to a coverage of 65%. Additionally, our classification of the 1,577 HHS breaches shows that 44% of the breaches are accidental misuses and 56% are malicious misuses. We find that HIPAA's gaps regarding accidental misuses are significantly larger than its gaps regarding malicious misuses. |
URL | https://ieeexplore.ieee.org/document/7985691/ |
DOI | 10.1109/ICSE.2017.55 |
Citation Key | kafali_how_2017 |
- security breaches
- US Health Insurance Portability and Accountability Act
- US Department of Health and Human Services
- taxonomy
- software engineering
- software development
- social norms
- SEMAVER
- Semantics
- semantic similarity metric
- semantic similarity
- semantic reasoning
- security policies
- security of data
- accidental misuses
- Security and privacy breaches
- security
- pubcrawl
- Ontologies
- norm violation
- Medical services
- Measurement
- malicious misuses
- inference mechanisms
- HIPAA
- HHS
- cognition
- breach ontology