Skip to content

Security: KCoderVA/Telehealth-Scheduling-App

docs/SECURITY.md

Security Policy

Overview

The Telehealth Resources Project operates within the Department of Veterans Affairs healthcare environment and must comply with strict security standards including HIPAA, VA IT security policies, and Microsoft Government Cloud requirements.

Supported Versions

Version Security Support Status
1.0.x ✅ Fully Supported
0.x.x ❌ No Longer Supported

Security Standards & Compliance

Healthcare Compliance (HIPAA)

  • PHI Protection: No Protected Health Information (PHI) stored in source code
  • Access Logging: Complete audit trail for all patient data access
  • Encryption: All data encrypted in transit (TLS 1.2+) and at rest (AES-256)
  • Access Controls: Role-based permissions with principle of least privilege

VA Government Requirements

  • FedRAMP Compliance: Microsoft Government Cloud (GCC High) deployment
  • FISMA Standards: Federal Information Security Management Act compliance
  • ATO Requirements: Authority to Operate documentation maintained
  • STIG Compliance: Security Technical Implementation Guide adherence

Microsoft 365 Government Cloud

  • Data Residency: All data stored in US Government datacenters
  • Personnel Screening: Microsoft staff undergo government background checks
  • Compliance Certifications: FedRAMP High, DoD SRG Level 2, CJIS
  • Network Isolation: Dedicated government cloud infrastructure

Security Architecture

Authentication & Authorization

Hospital Active Directory → Azure AD Government → PowerApps
                                                    ↓
                               SharePoint Government Cloud
                                                    ↓
                               Power Automate Government

Multi-Factor Authentication

  • Required: All users must enable MFA for hospital accounts
  • Methods: Microsoft Authenticator app, hardware tokens, SMS (backup)
  • Conditional Access: Location-based and device-based access controls

Role-Based Access Control (RBAC)

Role PowerApps Access SharePoint Permissions Approval Rights
End User Create bookings, view own requests Read/Write own items None
Telehealth Staff Full booking access, team views Read/Write team items Approve team requests
Manager Full system access Full list access Approve all requests
IT Admin Full system management Site collection admin System configuration

Data Protection

Data Classification

  • Public: System documentation, help files
  • Internal: Room schedules, availability calendars
  • Confidential: User personal information, booking history
  • Restricted: Administrative settings, audit logs

Encryption Standards

  • In Transit: TLS 1.2+ for all web communications
  • At Rest: AES-256 encryption for all stored data
  • Database: SQL Server Transparent Data Encryption (TDE)
  • Backup: Encrypted backup storage with key rotation

Data Loss Prevention (DLP)

  • Email Protection: O365 DLP policies prevent PHI transmission
  • Document Scanning: Automatic detection of sensitive data patterns
  • Download Restrictions: Prevent bulk data export by unauthorized users
  • Copy/Paste Controls: Clipboard monitoring for sensitive information

Network Security

Network Segmentation

Internet → VA Firewall → DMZ → Internal Network → Application Servers
                                     ↓
                              SharePoint Online Gov
                                     ↓
                              PowerApps Government

Security Controls

  • Web Application Firewall: Azure WAF protection against OWASP Top 10
  • DDoS Protection: Azure DDoS Protection Standard
  • IP Restrictions: Hospital network IP allowlisting
  • Certificate Pinning: SSL certificate validation and monitoring

Application Security

Secure Development Lifecycle

  1. Threat Modeling: STRIDE analysis for each component
  2. Static Analysis: PowerApps solution checker automated scanning
  3. Dynamic Testing: Penetration testing for production deployment
  4. Code Review: Security-focused review of all PowerShell scripts
  5. Dependency Scanning: Regular updates to all platform components

Input Validation & Sanitization

  • PowerApps: Built-in data type validation and sanitization
  • SharePoint: Column-level validation rules and constraints
  • Power Automate: Input schema validation and error handling
  • Custom Scripts: PowerShell parameter validation and sanitization

Vulnerability Management

Reporting Security Issues

Internal Reporting (Hospital Staff)

  1. Immediate Response Required:

    • Contact: VA IT Security Team
    • Phone: [Hospital IT Emergency Line]
    • Email: [Secure Internal Email]
  2. Non-Critical Issues:

    • Create incident in hospital IT ticketing system
    • Include detailed description and steps to reproduce
    • Tag with "Security" priority level

External Security Researchers

If you discover a security vulnerability in our public-facing components:

  1. DO NOT create public GitHub issues for security vulnerabilities
  2. DO NOT test vulnerabilities against production systems
  3. DO send detailed reports to: [security-contact@hospital-domain]

Information to Include

  • Detailed description of the vulnerability
  • Steps to reproduce the issue
  • Potential impact assessment
  • Suggested remediation approach
  • Your contact information for follow-up

Response Timeline

Severity Level Initial Response Investigation Resolution Target
Critical 2 hours 24 hours 72 hours
High 4 hours 48 hours 1 week
Medium 24 hours 1 week 2 weeks
Low 48 hours 2 weeks Next release cycle

Security Testing

Automated Scanning

  • Daily: PowerApps solution checker for formula validation
  • Weekly: SharePoint permissions audit
  • Monthly: Dependency vulnerability scanning
  • Quarterly: Comprehensive security assessment

Manual Testing

  • Bi-Annual: Professional penetration testing
  • Annual: Full security architecture review
  • As-Needed: Incident-driven security analysis

Security Monitoring

Logging & Auditing

  • User Activities: All booking actions logged with timestamps
  • Administrative Changes: Complete audit trail for system modifications
  • Authentication Events: Login attempts, MFA usage, failures
  • Data Access: SharePoint access logs with user attribution

Monitoring Alerts

  • Failed Authentication: Multiple failed login attempts
  • Privilege Escalation: Unauthorized permission changes
  • Data Export: Bulk data download activities
  • System Changes: Modifications to critical system components

Log Retention

  • Security Logs: 7 years (VA requirement)
  • Audit Logs: 3 years (compliance requirement)
  • Performance Logs: 1 year (operational requirement)
  • Debug Logs: 90 days (development requirement)

Security Updates

Update Process

  1. Security Patches: Applied within 72 hours of release
  2. Platform Updates: Monthly maintenance windows
  3. Feature Updates: Quarterly with security review
  4. Emergency Updates: Immediate deployment for critical vulnerabilities

Change Management

  • Security Review: All changes reviewed by IT Security team
  • Testing: Security testing in non-production environment
  • Approval: Director-level approval for security-impacting changes
  • Documentation: Complete change documentation and rollback procedures

Incident Response

Security Incident Classification

  • Category 1: Active breach with data exfiltration
  • Category 2: Suspected unauthorized access
  • Category 3: Security control failure or bypass
  • Category 4: Policy violation or configuration error

Response Team

  • Incident Commander: IT Security Manager
  • Technical Lead: Senior Systems Administrator
  • Legal Counsel: Hospital Legal Department
  • Communications: Public Affairs Officer (if needed)

Response Procedures

  1. Detection & Analysis: Identify scope and impact
  2. Containment: Isolate affected systems
  3. Eradication: Remove threats and vulnerabilities
  4. Recovery: Restore normal operations
  5. Post-Incident: Lessons learned and process improvement

Security Training

Required Training

  • All Users: Annual HIPAA privacy training
  • IT Staff: VA IT security awareness (quarterly)
  • Developers: Secure coding practices (bi-annual)
  • Administrators: Advanced security management (annual)

Training Topics

  • Phishing recognition and reporting
  • Password and MFA best practices
  • Data handling and classification
  • Incident reporting procedures
  • Social engineering awareness

Contact Information

  • Hospital IT Security Team: [Internal Contact]
  • VA Cybersecurity: [VA IT Security Contact]
  • Microsoft Support: [Government Cloud Support]
  • Emergency Response: [24/7 IT Emergency Line]

This security policy is reviewed and updated quarterly to ensure compliance with evolving threats and regulations.

Last Updated: November 21, 2025

There aren’t any published security advisories