Oklahoma Reasonable Safeguards

Safeguard Families

  • Governance, Risk and Compliance (View)
  • Asset and Data Management (View)
  • Identity and Access Management (View)
  • Incident Response and Breach Management (View)
  • Business Continuity and Disaster Recovery (View)
  • Third-Party and Supply Chain Risk Management (View)

Acronyms

  • SB 626 : Security Breach Notification Act (View)
  • NIST : NIST Cybersecurity Framework (CSF) 2.0 (View)
  • HIPAA : HIPAA Security Rule (View)
  • OIDSA : Oklahoma Insurance Data Security Act (View)
  • OBCA : Oklahoma Business Corporations Act (View)

Relevant Links

Background

Provided below are security and privacy controls that align to the requirements of Oklahoma Reasonable Safeguards. Sample implementation guidance for one of the controls. You may review each of these collectively. Review information on how these controls are audited under the Audit Safeguards section of this website.

It is important to understand the implementation guidance and audit guidance for each control as this will determine your compliance to the requirement.

Safeguards

Governance, Risk and Compliance (GRC)

Return to Top

GRC.1 Information Security Governance

Cybersecurity responsibilities are clearly assigned within the organization, providing accountability and oversight. A defined governance structure is in place for during incidents with authority for security decision-making.

           Related Compliance / Regulatory Requirement:

          • SB 626: Sec. 3(a)(1)
          • NIST: ID.GV-1, ID.GV-2
          • HIPAA: §164.308(a)(1)(ii)(A)
          • OIDSA: §6103(a)(1)
          • OBCA: §108

GRC.2 Security Oversight

A designated official is responsible for cybersecurity and information security. This official oversees the information security program to ensure that strategic priorities, resources, and risk decisions are properly managed. 

          Related Compliance / Regulatory Requirement:

          • SB 626: Sec. 3(a)(2)
          • NIST: ID.GV-3
          • HIPAA: §164.308(a)(1)(ii)(B)
          • OIDSA: §6103(a)(2)
          • OBCA: §108(a)

GRC.3 Policy Framework

Cybersecurity and information security policies are approved, reviewed and maintained at least annually. Policies guide personnel on acceptable use, data protection, and incident response. Updates more frequently than annually take place to remain aligned with evolving threats, technologies, and legal requirements.

          Related Compliance / Regulatory Requirement:

          • SB 626: Sec. 3(b)
          • NIST: ID.GV-4
          • HIPAA: §164.316(a)
          • OIDSA: §6103(b)
          • OBCA: §108(b)

GRC.4 Information Security Committee

A security committee is identified by the organization. The security committee meetings periodically. Meetings facilitate discussion of current risks, incidents, and compliance issues. Documented minutes are kept to evidence of oversight and support organizational accountability.

          Related Compliance / Regulatory Requirement:

          • SB 626: Sec. 3(c)
          • NIST: ID.GV-5
          • HIPAA: §164.308(a)(1)(ii)(C)
          • OIDSA: §6103(c)
          • OBCA: §108(c)

GRC.5 Metrics & Reporting

Key performance indicators (KPIs) for security posture are in place. KPIs track performance of security controls and identify trends in risk exposure. Reporting of such KPIs is in place to provide informative decision-making and resource allocation.

          Related Compliance / Regulatory Requirement:

          • SB 626: Sec. 3(d)
          • NIST: ID.GV-4
          • HIPAA: §164.308(a)(8)
          • OIDSA: §6103(d)
          • OBCA: §108(d)

GRC.6 Continuous Improvement

Security programs incorporate feedback from incidents, audits, and assessments. Continuous improvement takes place for ensuring resilience and adaptation to emerging threats and regulatory changes.

          Related Compliance / Regulatory Requirement:

          • SB 626: Sec. 3(e)
          • NIST: ID.GV-5
          • HIPAA: §164.308(a)(8)(ii)(B)
          • OIDSA: §6103(e)
          • OBCA: §108(e)

GRC.7 Risk Assessment & Treatment

Security risks are identified, evaluated, and treated risks across the organization. Risk management is in practiced for ensuring resources are focused on highest-impact threats.

          Related Compliance / Regulatory Requirement:

          • SB 626: Sec. 3(a) – Sec. 3(f)
          • NIST: ID.RA-1 – ID.RA-6
          • HIPAA: §164.308(a)(1)(ii)(A) – §164.308(a)(1)(ii)(C)
          • OIDSA: §6103(a) – §6103(e)
          • OBCA: §108(a)

GRC.8 Compliance Management

The organization monitors and manages compliance obligations. Assurance of regulatory adherence and reduces legal exposure is performed.

          Related Compliance / Regulatory Requirement:

          • SB 626: Sec. 3(f)
          • NIST: ID.GV-2
          • HIPAA: §164.308(a)(8)
          • OIDSA: §6103(f)
          • OBCA: §108(a)

Asset and Data Management (ADM)

Return to Top

ADM.1 Asset Inventory

The organization maintains a complete inventory of information assets.

          Related Compliance / Regulatory Requirement:

          • SB 626: Sec. 5(a)
          • NIST: ID.AM-1
          • HIPAA: §164.310(d)(2)(i)
          • OIDSA: §6106(a)
          • OBCA: §108(a)

ADM.2 Data Classification & Handling

The organization classifies and handles data according to sensitivity. 

          Related Compliance / Regulatory Requirement:

          • SB 626: Sec. 5(b)
          • NIST: ID.AM-2
          • HIPAA: §164.312(a)(2)(iii)
          • OIDSA: §6106(b)
          • OBCA: §108(a)

ADM.3 Encryption Requirements

Information containing sensitive information is encrypted at rest and in transit. 

          Related Compliance / Regulatory Requirement:

          • SB 626: Sec. 5(c)
          • NIST: PR.DS-1
          • HIPAA: §164.312(e)(2)(ii)
          • OIDSA: §6106(c)
          • OBCA: §108(a)

ADM.4 Data Minimization

Information collected is limited and retained only for the period necessary to conduct business operations.

          Related Compliance / Regulatory Requirement:

          • SB 626: Sec. 5(d)
          • NIST: PR.DS-2
          • HIPAA: §164.308(a)(4)(ii)(D)
          • OIDSA: §6106(e)
          • OBCA: §108(a)

ADM.5 Secure Data Destruction

Methods are in place for the destruction and verification of removal of  verified destruction methods for obsolete data. Data that is destructed does not have the capability to be retrieved.

          Related Compliance / Regulatory Requirement:

          • SB 626: Sec. 5(e)
          • NIST: PR.DS-3
          • HIPAA: §164.310(d)(2)(ii)
          • OIDSA: §6106(e)
          • OBCA: §108(a)

Identity and Access Management (IAM)

Return to Top

IAM.1 Access Control

Access to data and systems is limited based on need-to-know and minimum access necessary to perform a job role.

          Related Compliance / Regulatory Requirement:

          • SB 626: Sec. 6(a)
          • NIST: PR.AC-1
          • HIPAA: §164.312(a)(1)
          • OIDSA: §6107(a)
          • OBCA: §108(a)

IAM.2 Multi-Factor Authentication

Multi-factor authentication is in place for all non-public systems and applications that have capability from being accessed externally from the organization.  

          Related Compliance / Regulatory Requirement:

          • SB 626: Sec. 6(b)
          • NIST: PR.AC-2
          • HIPAA: §164.312(d)
          • OIDSA: §6107(b)
          • OBCA: §108(a)

IAM.3 Access Reviews & De-Provisioning

Access reviews are performed on a schedule based on risk. Obsolete accounts accounts are removed upon identification. User accounts are disabled upon termination. 

          Related Compliance / Regulatory Requirement:

          • SB 626: Sec. 6(c)
          • NIST: PR.AC-3
          • HIPAA: §164.308(a)(4)(ii)(C)
          • OIDSA: §6107(c)
          • OBCA: §108(a)

Incident Response and Breach Management (IR)

Return to Top

IR.1 Incident Response Program

Roles, responsibilities, and procedures are defined for incidents. Within the procedures, timely detection, containment, and recovery is documented.

          Related Compliance / Regulatory Requirement:

          • SB 626: Sec. 8(a)
          • NIST: RS.RP-1
          • HIPAA: §164.308(a)(6)
          • OIDSA: §6109(a)
          • OBCA: §108(a)

IR.2 Breach Assessment & Notification

Evaluate security breaches and notify, both internal and external to the organization, stakeholders promptly. Regulatory compliance and protection of affected individuals is required within all breach-related and post-breach activities.

          Related Compliance / Regulatory Requirement:

          • SB 626: Sec. 8(b)
          • NIST: RS.CO-2
          • HIPAA: §164.404 – §164.414
          • OIDSA: §6109(b)
          • OBCA: §108(a)

Business Continuity and Disaster Recovery (BCDR)

Return to Top

BCDR.1 Backup & Recovery

Backups are in place on a regular basis, based on identified and documented risk.  The restoring of backups is tested and validated on a periodic basis. 

          Related Compliance / Regulatory Requirement:

          • SB 626: Sec. 9(a)
          • NIST: PR.IP-4
          • HIPAA: §164.308(a)(7)(ii)(A)
          • OIDSA: §6110(a)
          • OBCA: §108(a)

BCDR.2 Continuity Planning

Continuity plans are developed and tested for critical operations.

          Related Compliance / Regulatory Requirement:

          • SB 626: Sec. 9(b)
          • NIST: PR.IP-5
          • HIPAA: §164.308(a)(7)(ii)(B)
          • OIDSA: §6110(b)
          • OBCA: §108(a)

Third-Party & Supply Chain Risk Management (TSRM)

Return to Top

TSRM.1 Third Party and Supply Chain Governance

Policies, contract terms, and oversight for third parties is in place. Vendors uphold security standards equivalent to the internal controls of the organization.

          Related Compliance / Regulatory Requirement:

          • SB 626: Sec. 10(a)
          • NIST: ID.SC-1
          • HIPAA: §164.308(b)(1)
          • OIDSA: §6111(a)
          • OBCA: §108(a)

TSRM.2 Third Party and Supply Chain Assessment

Third parties are evaluated for third-party risks, with the intent of preventing supply chain compromise and supporting regulatory compliance.

          Related Compliance / Regulatory Requirement:

          • SB 626: Sec. 10(b)
          • NIST: ID.SC-2
          • HIPAA: §164.308(b)(2)
          • OIDSA: §6111(b)
          • OBCA: §108(a)

TSRM.3 Third Party and Supply Chain Monitoring

Third parties are monitored for third-party risks.  Third-parties are monitored for security breaches and public announcements of regulatory non-compliance.

          Related Compliance / Regulatory Requirement:

          • SB 626: Sec. 10(b)
          • NIST: ID.SC-2
          • HIPAA: §164.308(b)(2)
          • OIDSA: §6111(b)
          • OBCA: §108(a)