Final Audit · PDF fileUNITED STATES OFFICE OF PERSONNEL MANAGEMENT Washington. DC 20415 ....

25
U.S. OFFICE OF PERSONNEL MANAGEMENT OFFICE OF THE INSPECTOR GENERAL OFFICE OF AUDITS Final Audit Report S ubj ect: AUDIT OF INFORMATION SYSTEMS GENERAL AND APPLICATION CONTROLS AT PREMERA BLUE CROSS Report No. l A-10-70-14-007 Date: November 28, 2014 --CAUTION-- This audit rtport has betn distributed to Ftdtral officials who ire responslblt for the 1dmloistr1tion of the audited prognm. ThU audit report may contain proprlc11 ry data which iJ protected by Fedenl law (18 U.S.C. 1905). Tbectf orc, while this audlt report is available under the Frttdom of Inf ormation Act and made available to the public on the OlG wcbpagc, caution needs to be tJerciaed before releasing the report to the general public u It may contain proprietary information that was redacted from the publicly distribuled copy.

Transcript of Final Audit · PDF fileUNITED STATES OFFICE OF PERSONNEL MANAGEMENT Washington. DC 20415 ....

  • U.S. OFFICE OF PERSONNEL MANAGEMENT

    OFFICE OF THE INSPECTOR GENERAL OFFICE OF AUDITS

    Final Audit Report

    Subject:

    AUDIT OF INFORMATION SYSTEMS

    GENERAL AND APPLICATION CONTROLS AT

    PREMERA BLUE CROSS

    Report No. l A-10-70-14-007

    Date: November 28, 2014

    --CAUTION-This audit rtport has betn distributed to Ftdtral officials who ire responslblt for the 1dmloistr1tion of the audited prognm. ThU audit report may contain proprlc11ry data which iJ protected by Fedenl law (18 U.S.C. 1905). Tbectforc, while this audlt report is available under the Frttdom of Information Act and made available to the public on the OlG wcbpagc, caution needs to be tJerciaed before releasing the report to the general public u It may contain proprietary information that was redacted from the publicly distribuled copy.

  • UNITED STATES OFFICE OF PERSONNEL MANAGEMENT

    Washington. DC 20415

    Office of the Inspector General

    Audit Report

    FEDERAL EMPLOYEES HEALTH BENEFITS PROGRAM

    CONTRACT 1039

    PREMERA BLUE CROSS

    PLAN CODES 10/11

    MOUNTLAKE TERRACE, WASHINGTON

    Report No. lA-10-70-14-007

    Novembe r 28 , 2014Date:

    Michael R. Esser Assistant Inspector General

    for Audits

    --CAUTION-

    Tbis 1udlt report bu been distributed to Feclen.I officWJ wbo ire responsible ror the administration of the audited program. This audit report may contain proprietary data wblcb ii protected by Federal law (18 U.S.C. 1905). Tbertlorc, wbllc tbls 1ucllt report ii available under tbe Freedom ofl oform1tion Ad ud made available to the public oo the OIG webpagc, caution needs to be cxcrcl1cd before relcaslog the report to the ceoeral public aa It may contain proprietary information tb1t was reucted from tbc publicly distributed copy.

    www.opm.cov www.usajoba.gov

    http:www.usajoba.govwww.opm.cov

  • UNITED STATES OFFICE OF PERSONNEL MANAGEMENT

    Washington, DC 20415

    Office of the ln~pectorGeneral

    Executive Summary

    FEDERAL EMPLOYEES HEALTH BENEFITS PROGRAM

    CONTRACT 1039

    PREMERA BLUE CROSS

    PLAN CODES 10/11

    MOUNTLAKE TERRACE, WASHINGTON

    Report No. lA-10-70-14-007

    Date: November 28 , 2014

    Tills final report discusses the results ofour audit ofgeneral and application controls over the information systems at Premera Blue Cross (Premera or Plan).

    Our audit focused on the claims processing applications used to adjudicate Federal Employees Health Benefits Program (FEHBP) claims for Premera, as well as the various processes and information technology systems used to support these applications. We documented the controls in place and opportunities for improvement in each of the areas below.

    Security Management

    Nothing came to our attention to indicate that Premera does not have an adequate security management program.

    Access Controls

    Premera has implemented controls to grant or prevent physical access to its data center, as well as logical controls to protect sensitive information. However, Premera's data center did not contain controls we typically observe at similar facilities, such as multi-factor authentication and piggybacking prevention. Since the issuance of the draft report Premera has installed multi-

    i

    www.usajobs.cov wwl!t.opm.gov

    http:wwl!t.opm.govwww.usajobs.cov

  • factor authentication, but has yet to implement piggybacking prevention. We also noted a weakness related to the password history configuration settings.

    Network Security

    Premera has implemented a thorough incident response and network security program. However, we noted several areas of concern related to Premera' s network security controls:

    A patch management policy is in place, but current scans show that patches are not being implemented in a timely manner;

    A methodology is not in place to ensure that unsupported or out-of-date software is not utiJized;

    Insecure server configurations were identified in a vulnerability scan.

    Configuration Management

    Premera has developed formal policies and procedures that provide guidance to ensure that system software is appropriately configured, updated, and changes are controlled. However, Premera has not documented formal baseline configurations that detail the approved settings for its server operating systems, and therefore cannot effectively audit its security configuration settings.

    Contingency Planning

    We reviewed Premera' s business continuity and disaster recovery plans and concluded that they contained the key elements suggested by relevant guidance and publications. However, Premera does not perform a complete disaster recovery test for all information systems.

    Claims Adjudication

    Premera has implemented many controls in its claims adjudication process to ensure that FEHBP claims are processed accurately. However, we noted several weaknesses in Premera's claims application controls.

    Health Insurance Portability and Accountability Act CHIPAA)

    Nothing came to our attention that caused us to believe that Premera is not in compliance with the HIPAA security, privacy, and national provider identifier regulations.

    11

  • Contents

    Page

    Executive Summary ...................................................................................................................... .. . i

    I. Introduction .......................................... .................... ................................................................. l

    Background ........................ ............ .... .......... ... ............... ......... ... ...... ....................... ............... ... l

    Objectives ................................................................................................................................. l

    Scope ......................................................................................................................................... l

    Methodology .......................................................................... ................................................... 2

    Compliance with Laws and Regulations ................................................................................... 3

    II. Audit Findings and Recommendations ..................................................................................... 4

    A. Security Management .......................................................................................................... 4

    B. Access Controls ..................................... .. ....... ........................ ... .. ......... ............. ......... ..... ..... 4

    C. Network Security ................... ........ .................... .. ........................ .. ....................................... 6

    D. Configuration Management ................................................................................................. 8

    E. Contingency Planning ................... ... .................................................................................... 9

    F. Claims Adjudication ........................................................................................................... 11

    G. Health Insurance Portability and Accountability Act ........................................................ 14

    Appendix: Premera Blue Cross's June 30, 2014 response to the draft audit report

    issued April 17, 2014

    III.Major Contributors to This Report ...... ..... .... ................................ ... ................ .. ...................... 15

  • I. Introduction

    This final report details the findings, conclusions, and recommendations resulting from the audit ofgeneral and application controls over the information systems responsible for processing Federal Employees Health Benefits Program (FEHBP) claims by Premera Blue Cross (Premera or Plan).

    The audit was conducted pursuant to FEHBP contract CS 1039; 5 U.S.C. Chapter 89; and 5 Cod.e ofFederal Regulations (CFR) Chapter I, Part 890. The audit was performed by the U.S. Office of Personnel Management's (OPM) Office of the Inspector General (OIG), as established by the Inspector General Act of 1978, as amended.

    Background

    The FEHBP was established by the Federal Employees Health Benefits Act (the Act), enacted on September 28, 1959. The FEHBP was created to provide health insurance benefits for federal employees, annuitants, and qualified dependents. The provisions ofthe Act are implemented by OPM through regulations codified in Title 5, Chapter 1, Part 890 of the CFR. Health insurance coverage is made available through contracts with various carriers that provide service benefits, indemnity benefits, or comprehensive medical services.

    All Premera personnel that worked with the aud itors were helpful and open to ideas and suggestions. They viewed the audit as an opportunity to examine practices and to make changes or improvements as necessary. Their positive attitude and helpfulness throughout the audit was greatly appreciated.

    This was our first audit of the security controls at Premera. We discussed the results of our audit with Prem era representatives at an exit conference.

    Objectives

    The objectives of this audit were to evaluate controls over the confidentiality, integrity, and availability of FEHBP data processed and maintained in Premera's information technology (11) environment. We accomplished these objectives by reviewing the following areas:

    Security management; Access controls; Configuration management; Segregation of duties; Contingency planning; Application controls specific to Premera's claims processi