AWS Public Sector Blog
Complying with updated NIH Genomic Data Sharing policies on AWS
Background
The rapid growth of genomic and biomedical research has led to an exponential increase in the amount of genomic data being generated. Given the sensitive nature of human genetic data and the need for increased collaboration, there is a requirement for this data to be shared by controlled access mechanisms to safeguard participant privacy and prevent unauthorized access or misuse.
To address these critical data security and privacy concerns, the National Institutes of Health (NIH) has long maintained guidelines governing the responsible management of controlled access human genomic and phenotypic data maintained in NIH-designated data repositories. Recently, the NIH updated these guidelines to align with the NIST SP 800-171 security standard, which defines a comprehensive framework for securing Controlled Unclassified Information (CUI).
Key points of the updated guidelines:
- Outlines NIH’s expectations for managing and protecting controlled access data
- Applies to data transferred to and maintained by organizations in their own IT environments or using public cloud service providers
- Takes effect on January 25, 2025
- Places additional responsibilities on researchers and institutions, to implement robust security measures
Amazon Web Services (AWS) has a proven history of building and maintaining a culture of security, defined by AWS Compliance Programs. These programs provide robust controls to maintain the security and compliance of the AWS Cloud. For users of NIH controlled-access data, this should instill confidence that they can begin or continue their research on AWS while maintaining the confidentiality, integrity, and availability of data entrusted to them by the NIH.
In this blog post, we will explore the specifics of the updated NIH guidance and outline how AWS can help customers build a compliant environment to meet these requirements.
Summary of key requirements in the new NIH policy
In the NIH Notice – NOT-OD-24-157, issued by the Office of The Director, detailed updates for two practices under the NIH Genomic Data Sharing (GDS) Policy:
- Modernizing security standards provided in the “NIH Security Best Practices for Controlled-Access Data Subject to the NIH Genomic Data Sharing (GDS) Policy”
- Establishing minimum expectations for access to controlled-access data by developers
The Scope and Applicability section of the NOT-OD-24-157 provides specific details for approved users of controlled-access human genomic data from NIH controlled-access data repositories. We will discuss how these users and their institutions can leverage AWS to address the requirements of NIST 800-171 “Protecting Controlled Unclassified Information (CUI) in Nonfederal Systems and Organizations.”
Note: Non-U.S. users of controlled access data that are unable to align to the NIST SP 800-171 are permitted to use the ISO/IEC 27001/27002 instead.
NIST Special Publication 800-171 Revision 2 contains 110 security controls organized into 14 families or categories. These requirements provide a comprehensive approach to protecting CUI in nonfederal systems and organizations. Each high-level requirement is further broken down into more specific controls and practices detailed in the NIST SP 800-171 document.
Best practices for compliance on AWS
As we discuss leveraging AWS services and features to meet NIST 800-171 requirements, it is critical to understand the AWS Shared Responsibility Model. Under this model, AWS is responsible for “Security of the Cloud,” including hardware, software, networking, and physical facilities that run AWS Cloud services. Customers are responsible for “Security in the Cloud,” determined by the AWS Cloud services they select and how they configure them to meet their applicable requirements. This shared responsibility model extends to IT controls, which are categorized into three types:
- Inherited Controls: Fully inherited from AWS, including physical and environmental controls.
- Shared Controls: Apply to both infrastructure and customer layers, but in separate contexts. AWS provides infrastructure requirements, while customers implement controls within their use of AWS services. Examples include patch management and configuration management awareness and training.
- Customer Specific: Solely the customer’s responsibility, based on the application deployed within AWS services. An example is a system and communications protection.
To support compliance needs, AWS customers and partners can use the Landing Zone Accelerator (LZA) on AWS. The LZA solution deploys a cloud foundation architected to align with AWS best practices and multiple global compliance frameworks. This solution helps customers with highly-regulated workloads and complex compliance requirements better manage and govern their multi-account environment.
An example of a NIST SP 800 171 third-party audited deployment is described in this blog, and the whitepaper can be downloaded from AWS Artifact. While the verified architecture is on GovCloud, the same controls can be implemented in other AWS regions.
The AWS Secure Research Environment solution
To address the forthcoming NIH mandate, AWS is developing the Secure Research Environment (SRE), a comprehensive solution that leverages Landing Zone Accelerator on AWS and Organizational Units (OUs) to comply with NIST 800-171 controls.
Key features of the AWS SRE:
- Designed to help research institutions meet new requirements efficiently and effectively
- Built to address security controls outlined in NIST SP 800-171 Revision 2
- Leverages the AWS Shared Responsibility Model
- Uses customizable Organizational Units (OUs) to address various compliance requirements
- Includes Landing Zone Accelerator on AWS for secure, resilient, scalable, and fully automated cloud foundation
- Implements robust security measures including encryption, access controls, continuous monitoring, and audit logging
- Leverages a superset of config rules aligning with recommendations in the NIST 800-171 conformance pack
Using AWS Audit manager for evidence collection
AWS Audit Manager provides a prebuilt standard framework supporting “NIST 800-171 Revision 2: Protecting Controlled Unclassified Information in Nonfederal Systems and Organizations.” This framework includes:
- A prebuilt collection of controls with descriptions and testing procedures
- Controls grouped into sets according to NIST requirements
- Customization options to support internal audits with specific requirements.
Using the framework, you can create an Audit Manager assessment and start collecting relevant evidence for your audit.
Note: The controls in this AWS Audit Manager framework cannot guarantee passing a NIST audit. AWS Audit Manager doesn’t automatically check procedural controls that require manual evidence collection.
Call to action
If you work with NIH controlled access data as a researcher or support researchers as an IT professional, now is the time to verify that your research environment satisfies the NIH Security Best Practices for Users of Controlled-Access Data.
Options for compliance:
- Implement the SRE solution or put the necessary controls in place using in-house resources in consultation with your AWS team.
- Work with the AWS Professional Services or an SI partner from the AWS Partner Network to implement the SRE solution.
- Utilize out-of-the-box solutions from AWS genomics ISVs like DNANexus and Velsera.
Contact your AWS representative today to schedule a consultation and begin your journey towards a fully compliant research environment.
Additional Resources
- AWS Audit Manager User Guide: NIST SP 800-171
- AWS Config: Operational Best Practices for NIST 800-171
- Customer Compliance Guides now available on AWS Artifact
- Need NIST Compliance in the AWS Cloud? AWS Compliance Has You Covered
- NIH Security Best Practices for Controlled-Access Data Repositories
- Amazon Cybersecurity Initiatives