Healthcare data security and access governance

Access Governance and Healthcare
Healthcare and Access Governance

Strengthening Healthcare Data Security: How Access Governance could have prevented recent HCA data breach

Data security is an increasingly critical concern in the healthcare industry, as recent news stories highlight the industry's vulnerabilities. The latest incident involved HCA, a Nashville-based health system, which faces a possible class action lawsuit due to its failure to employ "reasonable security procedures and practices." The breach affected millions of patients, emphasizing the need for strong access governance measures to safeguard sensitive information effectively. 

In the HCA case, hackers targeted valuable patient data, exploiting the absence of key security measures like data encryption and timely data deletion. While clinical data and sensitive information such as payment details were not compromised, evidence of medical care received by patients was exposed, leading to potential HIPAA guideline violations. This incident affected around 11 million patients who received care at HCA hospitals or physicians' offices across 20 states, with a staggering 27 million rows of data at risk.

The HCA lawsuit comes after another health system, Baltimore-based Johns Hopkins, was hit with a class action lawsuit following a ransomware attack. The class action suit alleged the system failed to implement safeguards to secure the health and identifiable data of those affected by the breach.

Data breaches in the healthcare industry have raised serious questions about the effectiveness of their data protection practices. And according to the latest annual report from IBM, the cost of a data breach has reached an all-time high, with organizations now spending $4.5 million to address breaches. This figure reflects a significant 15% increase over the past three years.

However, policy-based access governance could have been pivotal in preventing such a breach and safeguarding patient data effectively. In this regard, several key aspects of policy-based access governance stand out, each contributing to a more secure environment and mitigating potential risks. 

Let's delve into how policy-based access governance could have made a significant difference for HCA in preventing this unfortunate incident. Policy-based access governance could have helped in the following ways:


Policy-Based Access Control: Policy-based access governance enforces the principle of least privilege, ensuring that users have access only to the data they need for their specific job responsibilities. By implementing policy-based access controls, HCA could have limited data access to authorized personnel, reducing the risk of hackers entering sensitive information.


Data Encryption Policies: Access governance mandates the use of data encryption to protect sensitive data from unauthorized access. If HCA had proper data encryption policies, the stolen patient data would have been incomprehensible to hackers, significantly reducing the potential damage caused by the breach.


Data Retention Policy: Access governance includes defining data retention policies and ensuring that data is deleted when no longer necessary. By adhering to such policies, HCA could have minimized the volume of data at risk, making it more challenging for hackers to find valuable information.


Regular Auditing and Monitoring: Policy-based access governance requires regular data access auditing and monitoring. If HCA had continuously monitored access to patient data, any suspicious or unauthorized access attempts could have been detected early on, allowing them to take immediate action to prevent a large-scale breach.


The recent breach at HCA underscores the pressing need for enhanced data security measures in the healthcare sector. Policy-based access governance offers a comprehensive approach to safeguarding patient data, preventing unauthorized access, and mitigating potential breaches. Healthcare organizations like HCA can significantly reduce their risk of data breaches and protect patient confidentiality and trust by implementing role-based access controls, data encryption, regular audits, and data deletion policies. As the healthcare industry faces mounting cybersecurity threats, access governance emerges as a critical solution to fortify data security and uphold patient privacy.

Recommended Resources

Policy-based IGA

The Policy-based Identity Governance Guidebook

Many organizations grapple with IGA processes, like creating and managing roles, assigning and reviewing access entitlements, and handling access requests. The primary cause is that organizations follow the wrong approach to IGA, particularly around creating and managing roles.

Detect, remediate data breaches

Detect, remediate and prevent data breaches

Protecting data stored in Oracle requires data rules logic that can detect violations of data elements identified as sensitive and governed by company policies or regulatory principals. 

Sod Audit Tools

Access Governance 

Learn about our Access Governance solution that can automatically detect, mitigate, remediate and prevent access risk.