SAN DIEGO SUPERCOMPUTER CENTER Emerging HIPAA and Protected Data Requirements for Research Computing at SDSC Ron Hawkins Director of Industry Relations.

Slides:



Advertisements
Similar presentations
Creating HIPAA-Compliant Medical Data Applications with Amazon Web Services Presented by, Tulika Srivastava Purdue University.
Advertisements

Distributed Data Processing
Joint CASC/CCI Workshop Report Strategic and Tactical Recommendations EDUCAUSE Campus Cyberinfrastructure Working Group Coalition for Academic Scientific.
Security, Privacy and the Cloud Connecticut Community Providers’ Association June 20, 2014 Steven R Bulmer, VP of Professional Services.
Deploying GMP Applications Scott Fry, Director of Professional Services.
Take your CMS to the cloud to lighten the load Brett Pollak Campus Web Office UC San Diego.
Background Chronopolis Goals Data Grid supporting a Long-term Preservation Service Data Migration Data Migration to next generation technologies Trust.
1 Cyberinfrastructure Framework for 21st Century Science & Engineering (CIF21) NSF-wide Cyberinfrastructure Vision People, Sustainability, Innovation,
Tom Yarmas CTO – Cloud Technologies U.S. Public Sector Cloud Computing: How to do it right!
Security in the Cloud: Can You Trust What You Can’t Touch? Rob Johnson Security Architect, Cloud Engineering Unisys Corp.
Cisco and NetApp Confidential. Distributed under non-disclosure only. Name Date FlexPod Entry-level Solution FlexPod Value, Sized Right for Smaller Workloads.
Security Controls – What Works
Public cloud definition Public cloud is a cloud in which Cloud infrastructure is available to the general public. Public cloud define cloud computing.
Presented by Sujit Tilak. Evolution of Client/Server Architecture Clients & Server on different computer systems Local Area Network for Server and Client.
Does "The Cloud" Fit Into Your Organization? Tom Horan Meridian IT Inc. VP, Strategic Markets (847)
Cloud computing Tahani aljehani.
Plan Introduction What is Cloud Computing?
Cloud Computing How secure is it? Author: Marziyeh Arabnejad Revised/Edited: James Childress April 2014 Tandy School of Computer Science.
September 8th What, Why, When...and the Future Sierra w/o Wires.. and Sierra Data Center 2.
Introduction to Cloud Computing
Cloud Computing Cloud Computing Class-1. Introduction to Cloud Computing In cloud computing, the word cloud (also phrased as "the cloud") is used as a.
Module 10: Designing an AD RMS Infrastructure in Windows Server 2008.
Cloud computing is the use of computing resources (hardware and software) that are delivered as a service over the Internet. Cloud is the metaphor for.
OOI CI R2 Life Cycle Objectives Review Aug 30 - Sep Ocean Observatories Initiative OOI CI Release 2 Life Cycle Objectives Review CyberPoPs & Network.
CLOUD COMPUTING  IT is a service provider which provides information.  IT allows the employees to work remotely  IT is a on demand network access.
Security Baseline. Definition A preliminary assessment of a newly implemented system Serves as a starting point to measure changes in configurations and.
IT Infrastructure Chap 1: Definition
Implementing Network Access Protection
DISCOVER IT PEACE OF MIND Staying HIPAA-Compliant Revised: April 13, 2015.
University of Washington Windows and Unix Servers IEEAF – RENU Network Design Workshop Seattle - 30 Nov 2007 Lori Stevens, Director, Distributed Systems.
The analyses upon which this publication is based were performed under Contract Number HHSM C sponsored by the Center for Medicare and Medicaid.
UnitedLayer Managed Private Cloud Saad Saleem Director of Customer Engineering.
Plan  Introduction  What is Cloud Computing?  Why is it called ‘’Cloud Computing’’?  Characteristics of Cloud Computing  Advantages of Cloud Computing.
Looking Ahead: A New PSU Research Cloud Architecture Chuck Gilbert - Systems Architect and Systems Team Lead Research CI Coordinating Committee Meeting.
Introducing Microsoft Azure Government Steve Read Barbara Brucker.
Cloud Computing Security Keep Your Head and Other Data Secure in the Cloud Lynne Pizzini, CISSP, CISM, CIPP Information Systems Security Officer Information.
IST Storage & Backup Group 2011 Jack Shnell Supervisor Joe Silva Senior Storage Administrator Dennis Leong.
©2015 EarthLink. All rights reserved. Private Cloud Hosting Create Your Own Private IT Environment.
UC San Diego Research CyberInfrastructure Strategy Charlotte Klock CSG Meeting June 15-17, 2011.
Interoperability and Image Analysis KC Stegbauer.
NA-MIC National Alliance for Medical Image Computing UCSD: Engineering Core 2 Portal and Grid Infrastructure.
Cyberinfrastructure What is it? Russ Hobby Internet2 Joint Techs, 18 July 2007.
Private Cloud Hosting. IT Business Challenges I need to extend my on-premises virtualized environment to utilize the Cloud and manage the entire environment.
Tom Furlani, Center for Computational Research University at Buffalo, October 15, 2015 Coexisting with Protected Health Information at CCR.
Cyberinfrastructure Overview Russ Hobby, Internet2 ECSU CI Days 4 January 2008.
Cyberinfrastructure: Many Things to Many People Russ Hobby Program Manager Internet2.
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 6 - Essentials of Design an the Design Activities.
1 TCS Confidential. 2 Objective : In this session we will be able to learn:  What is Cloud Computing?  Characteristics  Cloud Flavors  Cloud Deployment.
CLOUD COMPUTING WHAT IS CLOUD COMPUTING?  Cloud Computing, also known as ‘on-demand computing’, is a kind of Internet-based computing,
SQL Server 2012 Session: 1 Session: 4 SQL Azure Data Management Using Microsoft SQL Server.
Deploying Highly Available SAP in the Cloud
Page 1 Cloud Computing JYOTI GARG CSE 3 RD YEAR UIET KUK.
Managed IT Services JND Consulting Group LLC
© Akaza Research, LLC : 1 :: 10 Professional open source for clinical research.
Introduction To Cloud Computing By Diptee Chikmurge And Minakshi Vharkate Asst.Professor MIT AOE Alandi(D),Pune.
 December 2010 US Chief Information Officer Vivek Kundra released the Federal Cloud Computing Strategy. This became to be what is known as “Cloud First”
Clouding with Microsoft Azure
Chapter 6: Securing the Cloud
Business System Development
Avenues International Inc.
Organizations Are Embracing New Opportunities
Big Data Enterprise Patterns
Tools and Services Workshop
VIRTUALIZATION & CLOUD COMPUTING
Joslynn Lee – Data Science Educator
Implementing Network Access Protection
Welcome! Thank you for joining us. We’ll get started in a few minutes.
Increase and Improve your PC management with Windows Intune
Windows Azure Hybrid Architectures and Patterns
IT Management Services Infrastructure Services
Presentation transcript:

SAN DIEGO SUPERCOMPUTER CENTER Emerging HIPAA and Protected Data Requirements for Research Computing at SDSC Ron Hawkins Director of Industry Relations / TSCC Program Manager April 23, 2014

SAN DIEGO SUPERCOMPUTER CENTER Objectives (for participation) Understand requirements for protected data processing on HPC systems Develop a roadmap for implementation at UCSD Focus on “services” not “projects” Understand how technology be used to implement protected data environments Contribute to understanding/solutions/best practices across the community

SAN DIEGO SUPERCOMPUTER CENTER What we are being asked for… dbGaP Database of Genotypes and Phenotypes Human genomic studies data administered by NIH Must apply and must comply with dbGaP Code of Conduct and “Security Best Practices” document Bottom line: Don’t put the data on the Internet HIPAA If you have to ask…

SAN DIEGO SUPERCOMPUTER CENTER SDSC Roles/Functions/Services Operate national HPC systems under XSEDE program (Trestles, Gordon, Comet) Operate a hybrid “hotel/condo” computing cluster (TSCC) for UC researchers Operate a co-location facility for UC campuses Operate several storage chargeback facilities (“Project”, “Cloud”, Commvault) Conduct sponsored research and operate various individual projects Work with biotech industry & external research institutes

SAN DIEGO SUPERCOMPUTER CENTER Campus Overview SDSC Moores Cancer Center UCSD School of Medicine Salk Institute Scripps Translational Science Institute J. Craig Venter Institute 40GbE to CENIC (100GbE late 2014) 10GbE Campus Network

SAN DIEGO SUPERCOMPUTER CENTER SDSC Data Center CGHub (Cage) COMET (late 2014) STORAGE (Multiple Systems) CO-LO CAGED CO-LO TRESTLES TSCC GORDON 10GbE Network Fabric MSKCC ANNAI 12,000 SQ. FT.5,000 SQ. FT.

SAN DIEGO SUPERCOMPUTER CENTER TSCC & Project Storage Use Case SDSC DATA CENTER TSCC NFS CAMPUS LAB NFS “PROJECT” STORAGE LAB USERS OTHER SHARES (ON/OFF CAMPUS) LAB SERVER

SAN DIEGO SUPERCOMPUTER CENTER HIPAA PROJECTS/EXPERIENCE

Medicaid Integrity Group Data Engine The Center for Program Integrity’s Medicaid CI Platform FISMA-Certified, HIPAA-Compliant CMS System of Record Built in 2008/2009, Operations & Maintenance years of Medicaid claims and reference data (~100 TB) 26 families of Security Controls, over 200 controls, sub-controls Implements NIST SP and CMS ARS requirements Data Warehouse, Analysis, BI, and Case Management Tools 350+ Users (CPI, CMS Contractors, CMCS, OIG, DOJ, and Others) 100+ Concurrent Users, 500+ Algorithms, Daily Queries Connections to CMS Networks and Data Transfer Capabilities 9

Sherlock Cloud Infrastructure as a service (IaaS), includes compliance of the entire software architecture and management processes. Meets federal “Cloud First” requirements and flexibility goals Maintains the security and oversight aspects of a traditional managed services model Common standards, reliability, and compliance methods provide economies of scale and a shared management knowledge base. FISMA-certified, HIPAA compliant, and more open (Agile) environments separate projects and enforce appropriate compliance Undertaking FedRAMP Cloud Service Provider (CSP) certification, becoming a requirement in many government contracts and grants 10

Sherlock Cloud Suite of component cloud services: – Storage: File, Block, Database – Compute: Full virtualization; Support for Windows, Linux, and AIX – Shared Services: Backups, Authentication, Configuration Mgt., Ticketing, Logging, High-Speed File Transfer, Remote Access, DNS, etc. – Security: Project-customized firewalling, IDS, and monitoring – Networking: Non-blocking 10Gb networking end to end – Disaster recovery: Multi-site backup and failover capabilities Used by CMS, NIH, CalIT2, UCSF, UCOP and UCSD We Evaluate potential clients and only accept partners with a commitment to securely operating their environments. 11

SAN DIEGO SUPERCOMPUTER CENTER Protected Data on HPC Researchers value the HPC and storage services provided by SDSC Startup costs of dbGaP- or HIPAA-compliant “silos” are too much for most projects There are some workarounds but have limits: De-identified data Obtain consent and IRB approval for research use of human subject data (but not PII) “Projects” lack economies of scale, on-demand service, and elasticity

SAN DIEGO SUPERCOMPUTER CENTER What we are doing at present… Continuing to work with researchers on a project basis Continuing to evaluate and understand use cases Examining feasibility of one or more pilot projects in FY 2014 (7/1/14-6/30/15) – under auspices of UCSD’s “Research Cyberinfrastructure” program

SAN DIEGO SUPERCOMPUTER CENTER How do we? Understand requirements and best practices for protected data processing in HPC? Develop a roadmap for implementation on our campus? Develop “services” not “projects”? Deploy technology to implement protected data environments on shared infrastructure? Contribute to understanding/solutions/best practices across the community?

SAN DIEGO SUPERCOMPUTER CENTER THANK YOU!