ISO 27799:2016 Health Informatics — Information Security Management in Health
International standard providing implementation guidance for ISO 27002 controls in the health informatics context. 48 control areas addressing health-specific requirements including patient data confidentiality, clinical system availability, health information exchange security, consent management, audit trail requirements for clinical systems, mobile health device security, telemedicine security, medical device integration, health cloud security, and cross-border health data transfer. Applies to all organisations holding or processing health information regardless of size.
| Clause | Title | SP 800-53 Controls |
|---|---|---|
| 5.1 | Health organisation information security policy | |
| 5.2 | Review of health information security policies | |
| 5.3 | Health data classification policy | |
| 6.1 | Internal organisation for health information security | |
| 6.2 | Health information security roles and responsibilities | |
| 6.3 | Mobile devices and teleworking in clinical contexts | |
| 7.1 | Before employment in health settings | |
| 7.2 | During employment in health settings | |
| 7.3 | Termination and change of employment in health settings | |
| 8.1 | Health information asset inventory and ownership | |
| 8.2 | Classification of health data | |
| 8.3 | Acceptable use and return of health assets | |
| 9.1 | Business requirements for health data access control | |
| 9.2 | Break-glass and emergency access procedures | |
| 9.3 | User access management for clinical systems | |
| 9.4 | Clinical user responsibilities and shared workstations | |
| 9.5 | System and application access for EHR and clinical systems | |
| 10.1 | Cryptographic controls for PHI | |
| 10.2 | Key management for health data encryption | |
| 11.1 | Secure areas in clinical environments | |
| 11.2 | Equipment security for medical devices and mobile clinical devices | |
| 12.1 | Operational procedures for health IT systems | |
| 12.2 | Protection from malware in clinical systems | |
| 12.3 | Backup and clinical data continuity | |
| 12.4 | Clinical audit trails and logging | |
| 12.5 | Vulnerability management for clinical systems | |
| 13.1 | Network security for health information exchange | |
| 13.2 | Information transfer for health data sharing and referrals | |
| 14.1 | Security requirements for health IT procurement | |
| 14.2 | Security in EHR development and customisation | |
| 14.3 | Test data and use of clinical data in testing | |
| 15.1 | Health IT supplier management | |
| 15.2 | Medical device supply chain and cloud services for health data | |
| 16.1 | Health data breach response planning | |
| 16.2 | Clinical safety incidents and information security | |
| 16.3 | Reporting to health regulators and data subjects | |
| 17.1 | Clinical service continuity planning | |
| 17.2 | Information security continuity for patient care | |
| 17.3 | Redundancy for critical clinical systems | |
| 18.1 | Legal and regulatory requirements for health data | |
| 18.2 | Patient consent and health data sharing controls | |
| 18.3 | Health information security reviews and audits | |
| 18.4 | Technical compliance for health systems | |
| H.1 | Patient safety integration with information security | |
| H.2 | Health information exchange security | |
| H.3 | Medical device security management | |
| H.4 | Research data and biobank security | |
| H.5 | Telehealth and remote clinical services security |