National Cybersecurity Center of Excellence (NCCoE) Securing Telehealth Remote Patient Monitoring Ecosystem, 45465-45468 [2019-18666]

Download as PDF Federal Register / Vol. 84, No. 168 / Thursday, August 29, 2019 / Notices • Discussion on the draft of the Education Funding report • Open Comment • Next Steps • Adjourn Dated: August 23, 2019. David Mussatt, Supervisory Chief, Regional Programs Unit. [FR Doc. 2019–18639 Filed 8–28–19; 8:45 am] BILLING CODE P DEPARTMENT OF COMMERCE Foreign-Trade Zones Board [B–29–2019] Foreign-Trade Zone (FTZ) 18—San Jose, California; Authorization of Production Activity; Lam Research Corporation (Wafer Fabrication Equipment, Subassemblies and Related Parts); Fremont, Livermore and Newark, California On April 25, 2019, Lam Research Corporation submitted a notification of proposed production activity to the FTZ Board for its facilities within FTZ 18, in Fremont, Livermore and Newark, California. The notification was processed in accordance with the regulations of the FTZ Board (15 CFR part 400), including notice in the Federal Register inviting public comment (84 FR 21323–21325, May 14, 2019). On August 23, 2019, the applicant was notified of the FTZ Board’s decision that no further review of the activity is warranted at this time. The production activity described in the notification was authorized, subject to the FTZ Act and the FTZ Board’s regulations, including Section 400.14. Dated: August 23, 2019. Andrew McGilvray, Executive Secretary. [FR Doc. 2019–18604 Filed 8–28–19; 8:45 am] BILLING CODE 3510–DS–P DEPARTMENT OF COMMERCE National Institute of Standards and Technology khammond on DSKBBV9HB2PROD with NOTICES [Docket No.:190605485–9485–01] National Cybersecurity Center of Excellence (NCCoE) Securing Telehealth Remote Patient Monitoring Ecosystem National Institute of Standards and Technology, Department of Commerce. ACTION: Notice. AGENCY: VerDate Sep<11>2014 17:00 Aug 28, 2019 Jkt 247001 The National Institute of Standards and Technology (NIST) invites organizations to provide products and technical expertise to support and demonstrate security platforms for the Securing Telehealth Remote Patient Monitoring Ecosystem for the healthcare sector use case. This notice is the initial step for the NCCoE in collaborating with technology companies to address cybersecurity challenges identified under the healthcare sector program. Participation in the use case is open to all interested organizations. DATES: Collaborative activities will commence as soon as enough completed and signed letters of interest have been returned to address all the necessary components and capabilities, but no earlier than September 30, 2019. ADDRESSES: Letters of interest must be submitted to HIT_NCCOE@nist.gov or via hard copy to NIST, NCCoE, 9700 Great Seneca Highway, Rockville, Maryland 20850. Organizations whose letters of interest are accepted in accordance with the process set forth in the SUPPLEMENTARY INFORMATION section of this notice will be asked to sign a consortium Cooperative Research and Development Agreement (CRADA) with NIST. An NCCoE consortium CRADA template can be found at https:// www.nccoe.nist.gov/sites/default/files/ library/nccoe-consortium-cradaexample.pdf. FOR FURTHER INFORMATION CONTACT: Jennifer Cawthra via email at HIT_ NCCOE@nist.gov; by telephone, 240– 328–4584; or by mail to NIST, NCCoE, 9700 Great Seneca Highway, Rockville, Maryland 20850. Additional details about the healthcare sector program are available at https://www.nccoe.nist.gov/ healthcare. SUPPLEMENTARY INFORMATION: Interested parties must contact NIST to request a letter of interest template to be completed and submitted to NIST. Letters of interest will be accepted on a first-come, first-served basis. When the use case has been completed, NIST will post a notice on the NCCoE healthcare sector Securing Telehealth Remote Patient Monitoring Ecosystem project page at https://www.nccoe.nist.gov/ projects/use-cases/health-it/telehealth announcing the completion of the use case and informing the public that NIST will no longer accept letters of interest for this use case. Background: The NCCoE, part of NIST, is a public-private collaboration for accelerating the widespread adoption of integrated cybersecurity tools and technologies. The NCCoE brings together experts from industry, SUMMARY: PO 00000 Frm 00003 Fmt 4703 Sfmt 4703 45465 government, and academia under one roof to develop practical, interoperable cybersecurity approaches that address the real-world needs of complex information technology (IT) systems. By accelerating dissemination and use of these integrated tools and technologies for protecting IT assets, the NCCoE will enhance trust in U.S. IT communications, data, and storage systems; reduce risk for companies and individuals using IT systems; and encourage development of innovative, job-creating cybersecurity products and services. Process: NIST is soliciting responses from all sources of relevant security capabilities (see below) to enter into a CRADA to provide products and technical expertise to support and demonstrate security platforms for the Securing Telehealth Remote Patient Monitoring Ecosystem. The full use case can be viewed at https:// www.nccoe.nist.gov/projects/use-cases/ health-it/telehealth. Interested parties should contact NIST by using the information provided in the FOR FURTHER INFORMATION CONTACT section of this notice. NIST will then provide each interested party with a template for a letter of interest, which the party must complete, certify that it is accurate, and submit to NIST. NIST will contact interested parties if there are questions regarding the responsiveness of the letters of interest to the use case objective or requirements identified below. NIST will select participants who have submitted complete letters of interest on a firstcome, first-served basis within each category of product components or capabilities listed below up to the number of participants in each category necessary to carry out this use case. However, there may be continuing opportunity to participate even after initial activity commences. Selected participants will be required to enter a consortium CRADA with NIST (for reference, see ADDRESSES section above). NIST published a notice in the Federal Register on October 19, 2012 (77 FR 64314) inviting U.S. companies to enter into National Cybersecurity Excellence Partnerships (NCEPs) in furtherance of the NCCoE. For this demonstration project, NCEP partners will not be given priority for participation. Use Case Objective: The objective of this use case is to provide an architecture that can be referenced and guidance for securing a telehealth remote patient monitoring (RPM) ecosystem in healthcare delivery organizations (HDOs) and patient home environments, including an example solution that uses existing, E:\FR\FM\29AUN1.SGM 29AUN1 45466 Federal Register / Vol. 84, No. 168 / Thursday, August 29, 2019 / Notices commercially, and open-source available cybersecurity products. A detailed description of the Securing Telehealth Remote Patient Monitoring Ecosystem use case is available at https://www.nccoe.nist.gov/projects/ use-cases/health-it/telehealth. Requirements: Each responding organization’s letter of interest should identify which security platform component(s) or capability(ies) it is offering. Letters of interest should not include company proprietary information, and all components and capabilities must be commercially available. Components are listed in Section 3 of the Securing Telehealth Remote Patient Monitoring Ecosystem project description (for reference, please see the link in the Process section above) and include, but are not limited to, those listed in the subsections below: • • • Components for RPM Technologies khammond on DSKBBV9HB2PROD with NOTICES • telehealth platform—a solution that enables data and communication flow from the patient monitoring device to the home monitoring device to the care providers Æ internet-based communications D transmission of telemetry data D videoconference D audioconference D email D secure text messaging Æ routing/triage functionality—The telehealth platform enables patients to identify an appropriate, networked team of care providers. Æ software development kits (SDKs) and application programming interfaces (APIs) that enable telehealth applications to interface with patient monitoring devices Æ patient monitoring devices that send telemetry data via the home monitoring device D blood pressure D heart monitoring D body mass index (BMI)/weight scales D other telemetry devices as appropriate Æ home monitoring device (e.g., specialized mobile application, stand-alone device) that transmits telemetry data to the telehealth platform and provides video connectivity Components for Remote/Patient Home Environment • personal firewall—an application that controls network traffic to and from a computer, permitting or denying communications based on a security policy • wireless access point router—a device that performs the functions of a router VerDate Sep<11>2014 17:00 Aug 28, 2019 Jkt 247001 • • • and includes the functions of a wireless access point endpoint protection (anti-malware)—a type of software program designed to prevent, detect, and remove malicious software (malware) on IT systems and on individual computing devices mobile device—a multimodal, small form factor communications mechanism that has characteristics of computing devices such as wireless network capability, memory, data storage, and processing. The device may provide real-time audio, video, and text communications as well as support email, web browsing, and other internet-enabled methods to interact with locally and remotely stored information and systems. modem—a device that provides a demarcation point for broadband communications access (e.g., cable, digital line subscriber [DSL], wireless, long-term-evolution [LTE], 5G) and presents an Ethernet interface to allow internet access via the broadband infrastructure wireless router—a device that provides wireless connectivity to the home network and provides access to the internet via a connection to the cable modem telehealth application—an application residing on a managed or unmanaged mobile device or on a specialized stand-alone device and that facilitates transmission of telemetry data and video connectivity between the patient and HDO patient monitoring device—a peripheral device used by the patient to perform diagnostic tasks (e.g., measure blood pressure, glucose levels, and BMI/weight) and to send the telemetry data via Bluetooth or wireless connectivity to the telehealth application Components for HDO Environment • network access control—discovers and accurately identifies devices connected to wired networks, wireless networks, and virtual private networks (VPNs) and provides network access controls to ensure that only authorized individuals with authorized devices can access the systems and data that access policy permits • network firewall—a network security device that monitors and controls incoming and outgoing network traffic, based on defined security rules • intrusion detection system (IDS) (host/network)—a device or software application that monitors a network or systems for malicious activity or policy violations PO 00000 Frm 00004 Fmt 4703 Sfmt 4703 • intrusion prevention system (IPS)—a device that monitors network traffic and can take immediate action, such as shutting down a port, based on a set of rules established by the network administrator • VPN—a secure endpoint access solution that delivers secure remote access through virtual private networking • governance, risk, and compliance (GRC) tool—automated management for an organization’s overall governance, enterprise risk management, and compliance with regulations • network management tool—provides server, application-management, and monitoring services, as well as asset life-cycle management • endpoint protection and security— provides server hardening, protection, monitoring, and workload microsegmentation for private cloud and physical on-premises data-center environments, along with support for containers, and provides full-disk and removable media encryption • anti-ransomware—helps enterprises defend against ransomware attacks by exposing, detecting, and quarantining advanced and evasive ransomware • application security scanning/ testing—provides a means for custom application code testing (static/ dynamic) Each responding organization’s letter of interest should identify how its products address one or more of the following desired solution characteristics as outlined in Section 3 of the Securing Telehealth Remote Patient Monitoring Ecosystem project description (for reference, please see the link in the Process section above). The primary security functions and processes to be implemented for this project are listed below and are based on the NIST Cybersecurity Framework. IDENTIFY (ID)—These activities are foundational to developing an organizational understanding to manage risk. • Asset management—includes identification and management of assets on the network and management of the assets to be deployed to equipment. Implementation of this category may vary depending on the parties managing the equipment. However, this category remains relevant as a fundamental component in establishing appropriate cybersecurity practices. • Governance—Organizational cybersecurity policy is established and communicated. Governance practices are appropriate for HDOs and their solution partners, including technology E:\FR\FM\29AUN1.SGM 29AUN1 khammond on DSKBBV9HB2PROD with NOTICES Federal Register / Vol. 84, No. 168 / Thursday, August 29, 2019 / Notices providers and those vendors that develop, support, and operate telehealth platforms. • Risk assessment—includes the risk management strategy. Risk assessment is a fundamental component for HDOs and their solution partners. • Supply chain risk management— The nature of telehealth with RPM is that the system integrates components sourced from disparate vendors and may involve relationships established with multiple supplies, including providers of cloud service. PROTECT (PR)—These activities support the ability to develop and implement appropriate safeguards based on risk. • identity management, authentication, and access control—includes user account management and remote access Æ controlling (and auditing) user accounts Æ controlling (and auditing) access by external users Æ enforcing least privilege for all (internal and external) users Æ enforcing separation-of-duties policies D privileged access management (PAM) with an emphasis on separation of duties Æ enforcing least functionality • data security—includes data confidentiality, integrity, and availability Æ securing and monitoring storage of data—includes data encryption (for data at rest) D access control on data D data-at-rest controls should implement some form of data security manager that would allow for policy application to encrypt data, inclusive of access control policy Æ securing distribution of data— includes data encryption (for data in transit) and a data loss prevention mechanism Æ controls that promote data integrity Æ cryptographic modules validated as meeting NIST Federal Information Processing Standards (FIPS) 140–2 are preferred. • information protection processes and procedures—includes data backup and endpoint protection • maintenance—includes local and remote maintenance • protective technology—host-based intrusion prevention, solutions for malware (malicious code detection), audit logging, (automated) audit log review, and physical protection DETECT (DE)—These activities enable timely discovery of a cybersecurity event. VerDate Sep<11>2014 17:00 Aug 28, 2019 Jkt 247001 • security continuous monitoring— monitoring for unauthorized personnel, devices, software, and connections Æ vulnerability management— includes vulnerability scanning and remediation Æ patch management Æ system configuration security settings Æ user account usage (local and remote) and user behavioral analytics Æ security log analysis RESPOND (RS)—These activities support development and implementation of actions designed to contain the impact of a detected cybersecurity event. • Response planning—Response processes and procedures are executed and maintained to ensure a response to a detected cybersecurity incident. • Mitigation—Activities are performed to prevent expansion of a cybersecurity event, mitigate its effects, and resolve the incident. RECOVER (RC)—These activities support development and implementation of actions designed to contain the impact of a detected cybersecurity event. • Recovery planning—Recovery processes and procedures are executed and maintained to ensure restoration of systems or assets affected by cybersecurity incidents. • Communications—Restoration activities are coordinated with internal and external parties (e.g., coordinating centers, internet service providers, owners of attacking systems, victims, other computer security incident response teams, vendors). Responding organizations need to understand and, in their letters of interest, commit to provide: 1. Access for all participants’ project teams to component interfaces and the organization’s experts necessary to make functional connections among security platform components. 2. support for development and demonstration of the Securing Telehealth Remote Patient Monitoring Ecosystem for the healthcare sector use case in NCCoE facilities, which will be conducted in a manner consistent with the following standards and guidance: NIST Special Publication (SP) 800–53, NIST FIPS 140–2, NIST SP 800–41, NIST SP 800–52, NIST SP 800–57 Part 1, NIST SP 800–77, NIST SP 800–121, NIST SP 800–146, Food and Drug Administration (FDA) Radio Frequency Wireless Technology in Medical Devices, FDA Content of Premarket Submissions for Management of PO 00000 Frm 00005 Fmt 4703 Sfmt 4703 45467 Cybersecurity in Medical Devices, FDA Guidance for Industry: Cybersecurity for Networked Medical Devices Containing Off-the-Shelf (OTS) Software, FDA Postmarket Management of Cybersecurity in Medical Devices. Additional details about the Securing Telehealth Remote Patient Monitoring Ecosystem for the healthcare sector use case are available at https:// www.nccoe.nist.gov/projects/use-cases/ health-it/telehealth. NIST cannot guarantee that all of the products proposed by respondents will be used in the demonstration. Each prospective participant will be expected to work collaboratively with NIST staff and other project participants under the terms of the consortium CRADA in development of the Securing Telehealth Remote Patient Monitoring Ecosystem capability. Prospective participants’ contributions to the collaborative effort will include assistance in establishing the necessary interface functionality, connection and setup capabilities and procedures, demonstration harnesses, environmental and safety conditions for use, integrated platform user instructions, and demonstration plans and scripts necessary to demonstrate the desired capabilities. Each participant will train NIST personnel, as necessary, to operate his or her product in capability demonstrations to the healthcare community. Following successful demonstrations, NIST will publish a description of the security platform and its performance characteristics sufficient to permit other organizations to develop and deploy security platforms that meet the security objectives of the Securing Telehealth Remote Patient Monitoring Ecosystem for the healthcare sector use case. These descriptions will be public information. Under the terms of the consortium CRADA, NIST will support development of interfaces among participants’ products by providing IT infrastructure, laboratory facilities, office facilities, collaboration facilities, and staff support to component composition, security platform documentation, and demonstration activities. The dates of the demonstration of the Securing Telehealth Remote Patient Monitoring Ecosystem capability will be announced on the NCCoE website at least two weeks in advance at https:// nccoe.nist.gov/. The expected outcome of the demonstration is to improve telehealth RPM cybersecurity across an entire healthcare sector enterprise. Participating organizations will gain from the knowledge that their products are interoperable with other participants’ offerings. E:\FR\FM\29AUN1.SGM 29AUN1 45468 Federal Register / Vol. 84, No. 168 / Thursday, August 29, 2019 / Notices For additional information on the NCCoE’s governance, business processes, and operational structure, visit the NCCoE website at https:// nccoe.nist.gov/. Kevin A. Kimball, Chief of Staff. [FR Doc. 2019–18666 Filed 8–28–19; 8:45 am] BILLING CODE 3510–13–P DEPARTMENT OF COMMERCE National Oceanic and Atmospheric Administration RIN 0648–XV048 New England Fishery Management Council; Public Meeting National Marine Fisheries Service (NMFS), National Oceanic and Atmospheric Administration (NOAA), Commerce. ACTION: Notice; public meeting. AGENCY: The New England Fishery Management Council (Council) is scheduling a public meeting of its Monkfish Advisory to consider actions affecting New England fisheries in the exclusive economic zone (EEZ). Recommendations from this group will be brought to the full Council for formal consideration and action, if appropriate. DATES: This meeting will be held on Wednesday, September 18, 2019 at 8:30 a.m. ADDRESSES: The meeting will be held at the Comfort Inn, 85 American Legion Highway, Revere, MA 02151; telephone: (781) 485–3600. Council address: New England Fishery Management Council, 50 Water Street, Mill 2, Newburyport, MA 01950. FOR FURTHER INFORMATION CONTACT: Thomas A. Nies, Executive Director, New England Fishery Management Council; telephone: (978) 465–0492. SUPPLEMENTARY INFORMATION: khammond on DSKBBV9HB2PROD with NOTICES SUMMARY: Agenda The Advisory Panel will discuss the Plan Development Team analysis and draft Framework Adjustment 12 (FW 12) alternatives including recommendations for the Monkfish Allowable Biological Catch (ABC) for Northern and Southern Fishery Management areas, and associated effort controls. They will select preferred alternatives for FW 12. The panel also plans to review findings and recommendations from the Research Set-Aside (RSA) Program Review and identify which issues the Council should consider further. Also on the agenda is to discuss recommendations for the Council to VerDate Sep<11>2014 17:00 Aug 28, 2019 Jkt 247001 consider for 2020 priorities for the Monkfish FMP. The Council is scheduled to have an initial discussion of potential 2020 priorities at the September Council meeting. They will also receive an update on the Commercial Electronic Vessel Trip Reporting (eVTR) Omnibus Framework, which proposes to implement electronic VTRs for all vessels with commercial permits for species managed by the MidAtlantic and New England Fishery Management Councils. Other business may be discussed as necessary. Although non-emergency issues not contained on this agenda may come before this Council for discussion, those issues may not be the subject of formal action during this meeting. Council action will be restricted to those issues specifically listed in this notice and any issues arising after publication of this notice that require emergency action under section 305(c) of the MagnusonStevens Act, provided the public has been notified of the Council’s intent to take final action to address the emergency. Special Accommodations This meeting is physically accessible to people with disabilities. This meeting will be recorded. Consistent with 16 U.S.C. 1852, a copy of the recording is available upon request. Requests for sign language interpretation or other auxiliary aids should be directed to Thomas A. Nies, Executive Director, at (978) 465–0492, at least 5 days prior to the meeting date. Authority: 16 U.S.C. 1801 et seq. Dated: August 26, 2019. Tracey L. Thompson, Acting Deputy Director, Office of Sustainable Fisheries, National Marine Fisheries Service. [FR Doc. 2019–18662 Filed 8–28–19; 8:45 am] BILLING CODE 3510–22–P DEPARTMENT OF COMMERCE National Oceanic and Atmospheric Administration RIN 0648–XV046 Fisheries of the South Atlantic, Gulf of Mexico, and Caribbean; Southeast Data, Assessment, and Review (SEDAR); Public Meeting National Marine Fisheries Service (NMFS), National Oceanic and Atmospheric Administration (NOAA), Commerce. ACTION: Notice of a public meeting of the SEDAR Steering Committee. AGENCY: The SEDAR Steering Committee will meet to discuss the SUMMARY: PO 00000 Frm 00006 Fmt 4703 Sfmt 4703 SEDAR process and stock assessment schedule. See SUPPLEMENTARY INFORMATION. The SEDAR Steering Committee will meet Monday, September 30, 2019, from 10 a.m. until 12 noon, EST. ADDRESSES: Meeting address: The meeting will be held via webinar. The webinar is open to members of the public. See SUPPLEMENTARY INFORMATION. SEDAR address: South Atlantic Fishery Management Council, 4055 Faber Place Drive, Suite 201, N Charleston, SC 29405; www.sedarweb.org. DATES: Julie Neer, SEDAR Coordinator, 4055 Faber Place Drive, Suite 201, North Charleston, SC 29405; phone: (843) 571– 4366 or toll free: (866) SAFMC–10; fax: (843) 769–4520; email: Julie.Neer@ safmc.net. FOR FURTHER INFORMATION CONTACT: The SEDAR Steering Committee provides guidance and oversight of the SEDAR program and manages assessment scheduling. The items of discussion for this meeting are as follows: SEDAR Steering Committee, Monday, September 30, 2019, 10 a.m. EST–12 p.m. EST The SEDAR Steering Committee will receive a SEDAR projects update and review the SEDAR projects schedule. The Committee will discuss these items, provide guidance to staff, and take action as necessary. This meeting will be held via webinar. The webinar is open to members of the public. Those interested in participating should contact Julie Neer (see FOR FURTHER INFORMATION CONTACT) to request an invitation providing webinar access information. Please request webinar invitations at least 24 hours in advance. Although non-emergency issues not contained in this agenda may come before this group for discussion, those issues may not be the subject of formal action during this meeting. Action will be restricted to those issues specifically identified in this notice and any issues arising after publication of this notice that require emergency action under section 305(c) of the Magnuson-Stevens Fishery Conservation and Management Act, provided the public has been notified of the intent to take final action to address the emergency. SUPPLEMENTARY INFORMATION: Special Accommodations This meeting is accessible to people with disabilities. Requests for auxiliary aids should be directed to the SAFMC E:\FR\FM\29AUN1.SGM 29AUN1

Agencies

[Federal Register Volume 84, Number 168 (Thursday, August 29, 2019)]
[Notices]
[Pages 45465-45468]
From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
[FR Doc No: 2019-18666]


-----------------------------------------------------------------------

DEPARTMENT OF COMMERCE

National Institute of Standards and Technology

[Docket No.:190605485-9485-01]


National Cybersecurity Center of Excellence (NCCoE) Securing 
Telehealth Remote Patient Monitoring Ecosystem

AGENCY: National Institute of Standards and Technology, Department of 
Commerce.

ACTION: Notice.

-----------------------------------------------------------------------

SUMMARY: The National Institute of Standards and Technology (NIST) 
invites organizations to provide products and technical expertise to 
support and demonstrate security platforms for the Securing Telehealth 
Remote Patient Monitoring Ecosystem for the healthcare sector use case. 
This notice is the initial step for the NCCoE in collaborating with 
technology companies to address cybersecurity challenges identified 
under the healthcare sector program. Participation in the use case is 
open to all interested organizations.

DATES: Collaborative activities will commence as soon as enough 
completed and signed letters of interest have been returned to address 
all the necessary components and capabilities, but no earlier than 
September 30, 2019.

ADDRESSES: Letters of interest must be submitted to [email protected] 
or via hard copy to NIST, NCCoE, 9700 Great Seneca Highway, Rockville, 
Maryland 20850. Organizations whose letters of interest are accepted in 
accordance with the process set forth in the SUPPLEMENTARY INFORMATION 
section of this notice will be asked to sign a consortium Cooperative 
Research and Development Agreement (CRADA) with NIST. An NCCoE 
consortium CRADA template can be found at https://www.nccoe.nist.gov/sites/default/files/library/nccoe-consortium-crada-example.pdf.

FOR FURTHER INFORMATION CONTACT: Jennifer Cawthra via email at 
[email protected]; by telephone, 240-328-4584; or by mail to NIST, 
NCCoE, 9700 Great Seneca Highway, Rockville, Maryland 20850. Additional 
details about the healthcare sector program are available at https://www.nccoe.nist.gov/healthcare.

SUPPLEMENTARY INFORMATION: Interested parties must contact NIST to 
request a letter of interest template to be completed and submitted to 
NIST. Letters of interest will be accepted on a first-come, first-
served basis. When the use case has been completed, NIST will post a 
notice on the NCCoE healthcare sector Securing Telehealth Remote 
Patient Monitoring Ecosystem project page at https://www.nccoe.nist.gov/projects/use-cases/health-it/telehealth announcing 
the completion of the use case and informing the public that NIST will 
no longer accept letters of interest for this use case.
    Background: The NCCoE, part of NIST, is a public-private 
collaboration for accelerating the widespread adoption of integrated 
cybersecurity tools and technologies. The NCCoE brings together experts 
from industry, government, and academia under one roof to develop 
practical, interoperable cybersecurity approaches that address the 
real-world needs of complex information technology (IT) systems. By 
accelerating dissemination and use of these integrated tools and 
technologies for protecting IT assets, the NCCoE will enhance trust in 
U.S. IT communications, data, and storage systems; reduce risk for 
companies and individuals using IT systems; and encourage development 
of innovative, job-creating cybersecurity products and services.
    Process: NIST is soliciting responses from all sources of relevant 
security capabilities (see below) to enter into a CRADA to provide 
products and technical expertise to support and demonstrate security 
platforms for the Securing Telehealth Remote Patient Monitoring 
Ecosystem. The full use case can be viewed at https://www.nccoe.nist.gov/projects/use-cases/health-it/telehealth.
    Interested parties should contact NIST by using the information 
provided in the FOR FURTHER INFORMATION CONTACT section of this notice. 
NIST will then provide each interested party with a template for a 
letter of interest, which the party must complete, certify that it is 
accurate, and submit to NIST. NIST will contact interested parties if 
there are questions regarding the responsiveness of the letters of 
interest to the use case objective or requirements identified below. 
NIST will select participants who have submitted complete letters of 
interest on a first-come, first-served basis within each category of 
product components or capabilities listed below up to the number of 
participants in each category necessary to carry out this use case. 
However, there may be continuing opportunity to participate even after 
initial activity commences. Selected participants will be required to 
enter a consortium CRADA with NIST (for reference, see ADDRESSES 
section above). NIST published a notice in the Federal Register on 
October 19, 2012 (77 FR 64314) inviting U.S. companies to enter into 
National Cybersecurity Excellence Partnerships (NCEPs) in furtherance 
of the NCCoE. For this demonstration project, NCEP partners will not be 
given priority for participation.
    Use Case Objective: The objective of this use case is to provide an 
architecture that can be referenced and guidance for securing a 
telehealth remote patient monitoring (RPM) ecosystem in healthcare 
delivery organizations (HDOs) and patient home environments, including 
an example solution that uses existing,

[[Page 45466]]

commercially, and open-source available cybersecurity products.
    A detailed description of the Securing Telehealth Remote Patient 
Monitoring Ecosystem use case is available at https://www.nccoe.nist.gov/projects/use-cases/health-it/telehealth.
    Requirements: Each responding organization's letter of interest 
should identify which security platform component(s) or capability(ies) 
it is offering. Letters of interest should not include company 
proprietary information, and all components and capabilities must be 
commercially available. Components are listed in Section 3 of the 
Securing Telehealth Remote Patient Monitoring Ecosystem project 
description (for reference, please see the link in the Process section 
above) and include, but are not limited to, those listed in the 
subsections below:

Components for RPM Technologies

 telehealth platform--a solution that enables data and 
communication flow from the patient monitoring device to the home 
monitoring device to the care providers
    [cir] internet-based communications
    [ssquf] transmission of telemetry data
    [ssquf] videoconference
    [ssquf] audioconference
    [ssquf] email
    [ssquf] secure text messaging
    [cir] routing/triage functionality--The telehealth platform enables 
patients to identify an appropriate, networked team of care providers.
    [cir] software development kits (SDKs) and application programming 
interfaces (APIs) that enable telehealth applications to interface with 
patient monitoring devices
    [cir] patient monitoring devices that send telemetry data via the 
home monitoring device
    [ssquf] blood pressure
    [ssquf] heart monitoring
    [ssquf] body mass index (BMI)/weight scales
    [ssquf] other telemetry devices as appropriate
    [cir] home monitoring device (e.g., specialized mobile application, 
stand-alone device) that transmits telemetry data to the telehealth 
platform and provides video connectivity

Components for Remote/Patient Home Environment

 personal firewall--an application that controls network 
traffic to and from a computer, permitting or denying communications 
based on a security policy
 wireless access point router--a device that performs the 
functions of a router and includes the functions of a wireless access 
point
 endpoint protection (anti-malware)--a type of software program 
designed to prevent, detect, and remove malicious software (malware) on 
IT systems and on individual computing devices
 mobile device--a multimodal, small form factor communications 
mechanism that has characteristics of computing devices such as 
wireless network capability, memory, data storage, and processing. The 
device may provide real-time audio, video, and text communications as 
well as support email, web browsing, and other internet-enabled methods 
to interact with locally and remotely stored information and systems.
 modem--a device that provides a demarcation point for 
broadband communications access (e.g., cable, digital line subscriber 
[DSL], wireless, long-term-evolution [LTE], 5G) and presents an 
Ethernet interface to allow internet access via the broadband 
infrastructure
 wireless router--a device that provides wireless connectivity 
to the home network and provides access to the internet via a 
connection to the cable modem
 telehealth application--an application residing on a managed 
or unmanaged mobile device or on a specialized stand-alone device and 
that facilitates transmission of telemetry data and video connectivity 
between the patient and HDO
 patient monitoring device--a peripheral device used by the 
patient to perform diagnostic tasks (e.g., measure blood pressure, 
glucose levels, and BMI/weight) and to send the telemetry data via 
Bluetooth or wireless connectivity to the telehealth application

Components for HDO Environment

 network access control--discovers and accurately identifies 
devices connected to wired networks, wireless networks, and virtual 
private networks (VPNs) and provides network access controls to ensure 
that only authorized individuals with authorized devices can access the 
systems and data that access policy permits
 network firewall--a network security device that monitors and 
controls incoming and outgoing network traffic, based on defined 
security rules
 intrusion detection system (IDS) (host/network)--a device or 
software application that monitors a network or systems for malicious 
activity or policy violations
 intrusion prevention system (IPS)--a device that monitors 
network traffic and can take immediate action, such as shutting down a 
port, based on a set of rules established by the network administrator
 VPN--a secure endpoint access solution that delivers secure 
remote access through virtual private networking
 governance, risk, and compliance (GRC) tool--automated 
management for an organization's overall governance, enterprise risk 
management, and compliance with regulations
 network management tool--provides server, application-
management, and monitoring services, as well as asset life-cycle 
management
 endpoint protection and security--provides server hardening, 
protection, monitoring, and workload micro-segmentation for private 
cloud and physical on-premises data-center environments, along with 
support for containers, and provides full-disk and removable media 
encryption
 anti-ransomware--helps enterprises defend against ransomware 
attacks by exposing, detecting, and quarantining advanced and evasive 
ransomware
 application security scanning/testing--provides a means for 
custom application code testing (static/dynamic)

    Each responding organization's letter of interest should identify 
how its products address one or more of the following desired solution 
characteristics as outlined in Section 3 of the Securing Telehealth 
Remote Patient Monitoring Ecosystem project description (for reference, 
please see the link in the Process section above).
    The primary security functions and processes to be implemented for 
this project are listed below and are based on the NIST Cybersecurity 
Framework.
    IDENTIFY (ID)--These activities are foundational to developing an 
organizational understanding to manage risk.
     Asset management--includes identification and management 
of assets on the network and management of the assets to be deployed to 
equipment. Implementation of this category may vary depending on the 
parties managing the equipment. However, this category remains relevant 
as a fundamental component in establishing appropriate cybersecurity 
practices.
     Governance--Organizational cybersecurity policy is 
established and communicated. Governance practices are appropriate for 
HDOs and their solution partners, including technology

[[Page 45467]]

providers and those vendors that develop, support, and operate 
telehealth platforms.
     Risk assessment--includes the risk management strategy. 
Risk assessment is a fundamental component for HDOs and their solution 
partners.
     Supply chain risk management--The nature of telehealth 
with RPM is that the system integrates components sourced from 
disparate vendors and may involve relationships established with 
multiple supplies, including providers of cloud service.
    PROTECT (PR)--These activities support the ability to develop and 
implement appropriate safeguards based on risk.

 identity management, authentication, and access control--
includes user account management and remote access
    [cir] controlling (and auditing) user accounts
    [cir] controlling (and auditing) access by external users
    [cir] enforcing least privilege for all (internal and external) 
users
    [cir] enforcing separation-of-duties policies
    [ssquf] privileged access management (PAM) with an emphasis on 
separation of duties
    [cir] enforcing least functionality
 data security--includes data confidentiality, integrity, and 
availability
    [cir] securing and monitoring storage of data--includes data 
encryption (for data at rest)
    [ssquf] access control on data
    [ssquf] data-at-rest controls should implement some form of data 
security manager that would allow for policy application to encrypt 
data, inclusive of access control policy
    [cir] securing distribution of data--includes data encryption (for 
data in transit) and a data loss prevention mechanism
    [cir] controls that promote data integrity
    [cir] cryptographic modules validated as meeting NIST Federal 
Information Processing Standards (FIPS) 140-2 are preferred.
 information protection processes and procedures--includes data 
backup and endpoint protection
 maintenance--includes local and remote maintenance
 protective technology--host-based intrusion prevention, 
solutions for malware (malicious code detection), audit logging, 
(automated) audit log review, and physical protection

    DETECT (DE)--These activities enable timely discovery of a 
cybersecurity event.

 security continuous monitoring--monitoring for unauthorized 
personnel, devices, software, and connections
    [cir] vulnerability management--includes vulnerability scanning and 
remediation
    [cir] patch management
    [cir] system configuration security settings
    [cir] user account usage (local and remote) and user behavioral 
analytics
    [cir] security log analysis

    RESPOND (RS)--These activities support development and 
implementation of actions designed to contain the impact of a detected 
cybersecurity event.
     Response planning--Response processes and procedures are 
executed and maintained to ensure a response to a detected 
cybersecurity incident.
     Mitigation--Activities are performed to prevent expansion 
of a cybersecurity event, mitigate its effects, and resolve the 
incident.
    RECOVER (RC)--These activities support development and 
implementation of actions designed to contain the impact of a detected 
cybersecurity event.
     Recovery planning--Recovery processes and procedures are 
executed and maintained to ensure restoration of systems or assets 
affected by cybersecurity incidents.
     Communications--Restoration activities are coordinated 
with internal and external parties (e.g., coordinating centers, 
internet service providers, owners of attacking systems, victims, other 
computer security incident response teams, vendors).
    Responding organizations need to understand and, in their letters 
of interest, commit to provide:
    1. Access for all participants' project teams to component 
interfaces and the organization's experts necessary to make functional 
connections among security platform components.
    2. support for development and demonstration of the Securing 
Telehealth Remote Patient Monitoring Ecosystem for the healthcare 
sector use case in NCCoE facilities, which will be conducted in a 
manner consistent with the following standards and guidance: NIST 
Special Publication (SP) 800-53, NIST FIPS 140-2, NIST SP 800-41, NIST 
SP 800-52, NIST SP 800-57 Part 1, NIST SP 800-77, NIST SP 800-121, NIST 
SP 800-146, Food and Drug Administration (FDA) Radio Frequency Wireless 
Technology in Medical Devices, FDA Content of Premarket Submissions for 
Management of Cybersecurity in Medical Devices, FDA Guidance for 
Industry: Cybersecurity for Networked Medical Devices Containing Off-
the-Shelf (OTS) Software, FDA Postmarket Management of Cybersecurity in 
Medical Devices.
    Additional details about the Securing Telehealth Remote Patient 
Monitoring Ecosystem for the healthcare sector use case are available 
at https://www.nccoe.nist.gov/projects/use-cases/health-it/telehealth.
    NIST cannot guarantee that all of the products proposed by 
respondents will be used in the demonstration. Each prospective 
participant will be expected to work collaboratively with NIST staff 
and other project participants under the terms of the consortium CRADA 
in development of the Securing Telehealth Remote Patient Monitoring 
Ecosystem capability. Prospective participants' contributions to the 
collaborative effort will include assistance in establishing the 
necessary interface functionality, connection and setup capabilities 
and procedures, demonstration harnesses, environmental and safety 
conditions for use, integrated platform user instructions, and 
demonstration plans and scripts necessary to demonstrate the desired 
capabilities. Each participant will train NIST personnel, as necessary, 
to operate his or her product in capability demonstrations to the 
healthcare community. Following successful demonstrations, NIST will 
publish a description of the security platform and its performance 
characteristics sufficient to permit other organizations to develop and 
deploy security platforms that meet the security objectives of the 
Securing Telehealth Remote Patient Monitoring Ecosystem for the 
healthcare sector use case. These descriptions will be public 
information.
    Under the terms of the consortium CRADA, NIST will support 
development of interfaces among participants' products by providing IT 
infrastructure, laboratory facilities, office facilities, collaboration 
facilities, and staff support to component composition, security 
platform documentation, and demonstration activities.
    The dates of the demonstration of the Securing Telehealth Remote 
Patient Monitoring Ecosystem capability will be announced on the NCCoE 
website at least two weeks in advance at https://nccoe.nist.gov/. The 
expected outcome of the demonstration is to improve telehealth RPM 
cybersecurity across an entire healthcare sector enterprise. 
Participating organizations will gain from the knowledge that their 
products are interoperable with other participants' offerings.

[[Page 45468]]

    For additional information on the NCCoE's governance, business 
processes, and operational structure, visit the NCCoE website at 
https://nccoe.nist.gov/.

Kevin A. Kimball,
Chief of Staff.
[FR Doc. 2019-18666 Filed 8-28-19; 8:45 am]
BILLING CODE 3510-13-P


This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.