Assignment 3: Conceptual Security Architecture Development Process - Enterprise & Application Architectures
Assignment 3: Conceptual Security Architecture Development Process - Enterprise & Application Architectures
Assignment 3: Conceptual Security Architecture Development Process - Enterprise & Application Architectures
Application Architectures
Table of Contents
Introduction.................................................................................................................................................2
Enterprise Architectures..............................................................................................................................2
Existing Capability..................................................................................................................................2
Risk Management....................................................................................................................................3
Strategic Planning....................................................................................................................................4
Scope.......................................................................................................................................................5
Formal Strategic Plan..............................................................................................................................6
Requirements Specifications...................................................................................................................7
System Boundaries..................................................................................................................................8
System Constraints..................................................................................................................................8
Security...................................................................................................................................................9
Application Architectures..........................................................................................................................10
Existing Capability................................................................................................................................10
Risk Management..................................................................................................................................11
Strategic Planning..................................................................................................................................11
Scope.....................................................................................................................................................12
Formal Strategic Plan............................................................................................................................12
Requirements Specifications.................................................................................................................13
System Boundaries................................................................................................................................13
System Constraints................................................................................................................................14
Security.................................................................................................................................................14
Development and Release Process.........................................................................................................15
References.................................................................................................................................................16
2
Introduction
G5 Healthcare (G5HC) provides health and medical care services to patients within the
United States. As G5HC continues to expand and increase its services nationwide, our goal is to
maintain high-quality medical care for our patients while staying abreast with technology
capabilities that can efficiently increase collaboration between medical professionals. To meet
this challenge, the decision is to adopt the use of cloud technology which will allow G5HC to
migrate its current data into a virtualized database which will also allow for continued growth
and expansion of network services. Using the cloud service of Infrastructure as a Service (IaaS),
we can leverage a virtual infrastructure that reduces our physical footprint of on-premises data
Enterprise Architectures
Existing Capability
As G5HC is a healthcare organization that has operated its network using traditional on-
premises data centers, this current project is working to transition to a new cloud-based network.
The intent is to minimize our hardware footprint, by migrating our current databases from a
physical data center to a cloud environment to allow for scalability and for healthcare providers
across the organization to access health record databases for patient care. This means that new
concepts with cloud technology will be introduced because this will be G5HC’s first attempt at
The current existing capability of G5HC’s technical environment consists of Local Area
Networks (LAN) at each facility where healthcare providers can share patient health information
and collaborate with other healthcare providers within the LAN. This means that each facility
stores electronic patient healthcare information locally using servers within each facility. This
3
requires each facility to use servers and other additional hardware to support their operations
using the on-premises LAN. While this system allows for healthcare providers to collaborate
within the same LAN, this does not allow for immediate collaboration for healthcare providers
that operate across different facilities in different geographic locations. This requires an
additional step, where healthcare providers must use additional methods to send and receive
patient electronic health information that is compliant with the Health Insurance Portability and
Risk Management
some level of low- risk is part of developing a system architecture. This includes ensuring that
the confidentiality, integrity, and availability of all electronic patient health information is
protected. We have incorporated the National Institute for Standards and Technology (NIST)
Risk Management Framework (RMF) as part of G5HC’s risk management practices. The NIST
RMF is an appropriate framework to use for our industry because it is designed to help
organizations across different sectors with managing security and privacy risk (NIST, 2020).
With the healthcare industry already heavily regulated by laws such as HIPAA and Health
Information Technology for Economic and Clinical Health (HITECH), we must ensure that we
are using a security and privacy-focused RMF that is a continuous cycle designed to reduce all
known risks to acceptable levels. The NIST RMF can also be beneficial to G5HC because the
continuous cycle allows for our organization to continuously reassess our risks and adjust our
While risk is an element that will always be present for any organization, across every
industry, some controls are currently implemented to reduce risk. Following the NIST RMF,
there are seven steps in the process which are: Prepare, Categorize, Select, Implement, Assess,
Authorize, and Monitor (NIST, 2022). Following these steps in the NIST RMF, G5HC has
identified various risks and included various security and privacy controls to reduce risk to our
enterprise security architecture. This includes the implementation of Access Controls, Physical
Protection, Identification and Authentication, Personnel Security, Risk Assessment, and more as
listed in the NIST 800-53 publication (NIST, 2020). At each facility, we have identified risks
relevant to our enterprise architecture, and have implemented controls to reduce the risk, as
mentioned in the previous sentence. This includes controlling access to the server rooms, using
locks, and requiring key card access only to authorized personnel. G5HC also currently requires
that security guards monitor all entrances and conduct regular patrols throughout the facility.
While there are additional controls that are implemented to reduce the risk of physical damage
and other threats to our enterprise architecture, the previous controls discussed are examples, and
we will continue to regularly assess our enterprise architecture using the NIST RMF in our risk
management practices.
Strategic Planning
When considering strategic planning, there are some business and technology planning
architecture, we must consider the goals that G5HC wants to achieve from this transition. As
cloud technology allows for G5HC to implement a system that allows for scalability and
increased availability, this can allow healthcare providers to collaborate across G5HC facilities
and improve the overall healthcare services for patients. The scalability benefits from the cloud
5
system will allow G5HC to continue its future expansion plans and continue to provide
healthcare services to patients in the event of unexpected increased demand for medical attention
such as a future pandemic, or massive casualty incidents such as a natural disaster or other
incidents.
In terms of business planning, G5HC’s current expansion plans to open new facilities
across the country will continue simultaneously as we continue with the technology plan of
migration to a cloud computing system. This will require G5HC to plan for potential deadlines
and dates for these expansion plans so that proper coordination can occur between the opening of
new facilities and the implementation of the cloud IaaS platform. As part of G5HC’s plan to
reduce the need for a physical footprint of hardware on-premises, we will need to take into
consideration that new facilities will be required to be configured to operate with our new IaaS
platform. This means that these facilities will not be hosting onsite data centers on their LAN and
will not be receiving the required hardware to host on-premises servers. This presents technical
constraints on the future operation of the new facility and changes the system boundaries of our
network as this requires that the information technology team plans for the proper security
controls that are required for cloud environments that comply with HIPAA and HITECH.
Scope
The scope of this system is to develop an electronic health record (EHR) database
accessible to medical professionals (i.e.: Doctors) at all G5HC facilities nationwide to enhance
healthcare services. Utilizing the cloud environment for the database allows developers the
opportunity for cost savings related to hardware and maintenance, scalability, redundancy, risk
management, and continuous monitoring. An EHR system is built to go beyond standard clinical
6
data collected in a provider’s office and can be inclusive of a broader view of a patient’s care.
immunization dates, allergies, radiology images, and laboratory and test results
Allow access to evidence-based tools that providers can use to make decisions
EHRs are built to share information with other healthcare providers and organizations so
they contain information from all clinicians involved in a patient’s care (HealthIT, 2019). An
appealing feature is that data can be shared by authorized providers in a digital format capable of
being shared with other facilities and eventually providers outside of the G5HC network. Using
virtual databases in the cloud provides G5HC with a system that can provide data anywhere at
any time.
professionals via a secured and encrypted web interface and compatible with an IaaS platform.
Focus areas will be ensuring that the applications and policies applicable to the system design
align with Confidentiality, Integrity, and Availability of the resources and data. The objective is
to minimize the requirement of physical network components that consume resources; physical
and logical while enhancing a network secure boundary that protects information and user
access. Projects of the design process will be captured from stakeholder inputs who have an
interest in their system requirements and the EHR platform. As the system development
progresses, event milestones will be identified and captured as part of an overall schedule with
7
critical events set as key deadlines. Risks and issues will be recorded in parallel as part of the
Key performance indicators (KPIs) will help assess changes and identify factors that will
set a pattern or trend. KPIs will include the growth of users and data, geographic locations with
the highest volume of activity, the volume of network attacks to compromise data, system
performance, and downtime. Other indicators can identify what the average costs to support the
system will be or the resources required to manage the network. Working with the cloud vendor
on resources and cost analysis will help with estimates of financial requirements and
Requirements Specifications
To efficiently capture and share patient data, healthcare professionals need certified EHR
technology (CEHRT) that stores data in a structured format. Structured data allows healthcare
providers to easily retrieve and transfer patient information and use the EHR in ways that can aid
patient care (CMS, 2022). The EHR core features will provide a baseline for further functionality
and design improvements. Utilizing the cloud will help streamline scalability for additional
services and features as needed. The functions of the EHR system will perform storing health
information and data, decision support that aids clinical decision-making, electronic/digital
communication between medical professionals, and clinical and health reporting data concerning
population health.
Requirements of the EHR architecture will align with policies and compliance with
Federal and State mandates such as HIPAA. Safeguarding data will be a primary decision factor
vulnerability that could compromise the system or data, then executive leadership will need to
8
assess the risk acceptance or identify an alternate solution that maintains the integrity of the
System Boundaries
A primary security concern is ensuring the boundary protects data privacy while stored in
the database or transmission to and from external sources in G5HC facilities. Using IaaS in the
cloud helps establish a boundary and will enable applications to challenge user access through
authentication factors before the user is granted access to information. Within the boundaries, the
implementation to secure applications will be protected by router access control lists, proxy and
guard patrol checks and locking mechanisms of spaces where sensitive information is accessible.
Physical and network security management will be the responsibility of all G5HC employees via
training to include federal and state guidance and compliance regulations. Surveillance
equipment and alarm systems will add a layer of measures to protect facilities and critical
network components. The information security officer will work with the security team to
System Constraints
Employing a database in the cloud under IaaS comes with some limitations and
constraints for external network administrators and users. While security will be a joint effort
between both G5HC administrators and the cloud broker, agreements, memorandums, and trust
will need to be established as the servers and networking will be managed by the broker. The
9
data stored on the broker's equipment will use encryption and authentication requirements to
Although redundancy and continuous online services are benefits of the cloud, G5HC has
no control over outages or disruptions of facilities and equipment managed by the broker. Both
G5HC and the broker will develop restoration or response processes such as an Incident
Response Plan, Disaster Recovery Plan, and Continuous Monitoring Plan. Plans such as these
will help in recovery or situations where constraints may limit actions from either party in
continuous operations.
Security
Physical security will include roving guards to identify suspicious activity near facilities.
Close Circuit Television (CCTV) will provide visual coverage to assist guards and monitoring
spaces. Locking mechanisms such as biometrics or cipher locks will be installed in spaces where
controlled authorization is required. Employees will be provided with badges to identify their
association with G5HC. Visitor control access will be implemented through logs and badges
Network security will require users to sign agreement forms and complete cyber
awareness training before accessing the network. Each user will be given a credential token as
part of two-factor authentication. Hardware such as routers, servers, and switches for local
networks will reside in controlled spaces with access granted only to authorized personnel.
Alarms will be enabled and alert security and IT of any breach of the controlled space or a
casualty such as flooding, fire, loss of cooling equipment (air conditioning), etc.
10
Application Architectures
Existing Capability
based computers that allow users to access a server that stores patient electronic health
information on the LAN at each facility. This server does not allow access to all users, as there
are identity and authentication controls configured to control user access. The LAN is isolated
within the facility and does not have an external connection to the public internet. However, the
software used to access the data on this server is uniquely configured to access the LAN server
where the electronic patient health information is stored. As mentioned in the Enterprise
Architecture Existing Capabilities section, this current architecture limits a healthcare provider’s
ability to collaborate with other providers across the organization and inhibits our ability to
provide patients with immediate healthcare services. The network perimeter of each facility is
also configured with a Demilitarized Zone (DMZ) to provide a layer of security between the
world wide web and the private LAN from untrusted traffic (Fortinet, n.d.).
As G5HC continues planning to migrate to a cloud IaaS platform, this will eliminate the
need to conduct daily operations using the current LAN architecture to access electronic patient
health information at each facility. This new application architecture will function with a user
interface that implements identity and access controls that allows users to access electronic
patient health information on the cloud. This means that this new software application design
will be compatible with a virtual IaaS platform and is also compliant with HIPAA and HITECH
requirements.
11
Risk Management
As previously mentioned, the NIST RMF is incorporated into our risk management
practices. This will also be used to assess and mitigate risk in our Application Architecture. As
new risks. With a new software application design that is compatible with cloud IaaS platforms,
we will face the risk of exposing a surface area to the world wide web, as this new application
design will be web-based resulting in an internet-facing web application (Moyle & Kelley,
2020). This will require that we follow our RMF to regularly assess the risks of our application
architecture and take measures to mitigate and reduce risk to acceptable levels. This will include
implementing additional controls that address the risk specific to our Application Architecture
Information Integrity, and more as listed in the NIST 800-53 Publication (NIST, 2020).
Strategic Planning
plans such as future facility expansion planning will be occurring in parallel to the current design
work for the cloud IaaS platform. This requires that proper coordination and deliverable dates be
set as Business planning and Technology planning occur in parallel to each other. While the
virtual infrastructure is built and configured, the new web application design will also have to be
completed so that users can access the cloud database where electronic patient health information
will be stored. This means that the application design should be complete and at full operational
capability before newer facilities are opened so that these new facilities can be properly outfitted
and configured to operate with the new cloud IaaS platform. This requires that the application
12
interface be completed, tested, and evaluated to ensure that it is compliant with HIPAA and
HITECH requirements. In addition to the user interface application, all virtual configurations,
security controls, and logical configurations should be completed and evaluated to ensure that
they are compliant with HIPAA and HITECH requirements. As also previously mentioned, as
the IaaS architecture platform is selected for this current design, the user application and virtual
configurations must also be capable of handling the scalable capability of the virtual
infrastructure. For example, in the event of increased network traffic, the database should be
Scope
facilities to access and share EHRs with other medical providers. To adapt to the changing
healthcare landscape in modern healthcare, we will utilize IaaS technology that improves
collaboration among healthcare professionals for patient care. G5HC will collaborate with third-
party vendors to design a web-based application for medical professionals to use that has an
intuitive front-end, and a cloud-based back-end to manage and store health information. This
application architecture will be accessible to authorized medical personnel, comply with health
Previously established G5HC facilities utilized traditional, on-site data centers. We had
control over the physical hardware and had greater influence over the security measures being
that some of the control we had previously with our on-site centers may now fall under the
13
service provider’s domain. And to ensure that security is being upheld at all stages, there needs
We will work with vendors to establish our requirements for the front-end and back-end
applications. Determining what we require from user, technical, and security standpoints will
help us narrow down ideal, third-party solutions to implement in our new facilities. The
interoperability between the front-end and back-end solutions will then need to be refined, and
we will need to establish a sustainment process with the vendors, with a focus on releasing
software updates and the usage of scalability to address changes in application demand. Once the
plan for establishing the application is solidified with the vendors, we will coordinate with senior
Requirements Specifications
From a user perspective, the application needs to be easy to use and maintain. The user
interface should display the data in a way that is immediate and comprehensible to medical
professionals. When software updates or patches are published, there needs to be little to no
From a technical and security perspective, the application needs to be resilient against
common attack methods and compliant with HIPAA privacy and security rules. There needs to
be a variety of controls and tools that minimize the attack surface of the application. The
application should also have a feature that allows audit reports to ensure adherence to policies
throughout.
System Boundaries
Since there will be close collaboration between G5HC and IaaS providers, there will be
separate organizational boundaries, which in turn, can lead to “separate application security
14
architectural scope between the two groups” (Moyle & Kelley, 2020, p. 113). With this cloud-
based landscape, IaaS providers have a greater hand in the creation and maintenance of the front
and back end of the application, with G5HC tailoring how the application will operate and
integrate into the facilities. Since no single entity has complete control over the application
architecture, G5HC, and the IaaS providers must align their security scope.
System Constraints
Due to IaaS's nature, the service providers will control when software and security
updates are released for the application. To mitigate concerns over this constraint, G5HC will
need to work with the service providers to establish clear expectations when it comes to software
and security maintenance, like what updates are being pushed, why they are being pushed, how
frequently will the application be updated, and when the updates will be released to minimize the
impact to operations.
Security
In terms of security, the application will utilize encrypted channels to securely transmit
data over the Internet and communication correspondence between medical professionals. For
medical professionals accessing protected health information (PHI) data through the front-end
website, access control measures will be enforced to ensure the integrity of data, and limit data
spillage, and unauthorized usage. This could look like requiring two-factor authentication before
requesting data on the database or restricting the medical professionals’ permissions to only
access the PHI of certain patients. Timestamped, monitor logs will also be implemented to
provide a record of who accessed what and when in case of a security breach. For security that
falls under the IaaS providers’ domain, routine compliance checks will occur to ensure that the
15
protocols and tools being implemented on their end meet the requirements and standards of
G5HC.
The development and release process we want to adopt aligns with the DevOps model.
organization” to improve software development and delivery (Sienkiewicz, 2019). From the
integrated and performed during the development, testing, and delivery of the software (Daniels,
2021).
The healthcare industry has been slow to implement DevOps into its architecture, but
many benefits directly impact the accessibility and usability of health information. DevOps can
be used as a tool to help manage copious amounts of data so medical professionals can “handle
data such as lab reports, pharmacies, medical device reports, EHRs, wearables, and insurance
claims, and leverage them for final analysis” (Daniels, 2021). When medical professionals
improve information availability, it allows them to make informed decisions efficiently, which
References
CMS. (2022, March 25). Certified EHR Technology. Retrieved May 26, 2022, from
https://www.cms.gov/Regulations-and-Guidance/Legislation/EHRIncentivePrograms/
Certification
Daniels, A. (2021, December 3). A Guide for Implementing DevOps in the Healthcare Industry.
healthcare-industry/
Fortinet. (n.d.). What is a DMZ and why would you use it? Fortinet. Retrieved May 30, 2022,
from https://www.fortinet.com/resources/cyberglossary/what-is-dmz
HealthIT. (2019, September 10). What is an Electronic Health Record (EHR)? Retrieved May
ehr#:~:text=An%20electronic%20health%20record%20(EHR)%20is%20a%20digital
%20version%20of,and%20securely%20to%20authorized%20users
Moyle, E., & Kelley, D. (2020). Practical Cybersecurity Architecture. Birmingham, England:
National Institute for Standards and Technology (NIST). (2020, September). NIST Special
Publication 800-53: Security and Privacy Controls for Information Systems and
https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r5.pdf
National Institute for Standards and Technology (NIST). (2022, May). About the RMF - NIST
https://csrc.nist.gov/Projects/risk-management/about-rmf
17
Sienkiewicz, G. (2019, July 16). How to Implement DevOps in Healthcare. Retrieved May 29,