Top Banner
© 2010 Health Level Seven ® International. All Rights Reserved. HL7 and Health Level Seven are registered trademarks of Health Level Seven International. Reg. U.S. TM Office. Security - mHealth and FHIR: mobile health applications and other Internet uses Security in HL7 Standards HL7 Security Working Group John Moehrke
22

HL7 Security Working Group John Moehrke

Feb 11, 2016

Download

Documents

Rocco

Security - mHealth and FHIR: mobile health applications and other Internet uses Security in HL7 Standards. HL7 Security Working Group John Moehrke. Agenda. Basic mHealth security Communications security User Authentication Authorization Relationship to Privacy Consent - PowerPoint PPT Presentation
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: HL7 Security Working Group John Moehrke

© 2010 Health Level Seven ® International. All Rights Reserved. HL7 and Health Level Seven are registered trademarks of Health Level Seven International. Reg. U.S. TM Office.

Security - mHealth and FHIR:

mobile health applications and other Internet uses

Security in HL7 Standards

HL7 Security Working GroupJohn Moehrke

Page 2: HL7 Security Working Group John Moehrke

© 2010 Health Level Seven ® International. All Rights Reserved. HL7 and Health Level Seven are registered trademarks of Health Level Seven International. Reg. U.S. TM Office.

Agenda Basic mHealth security Communications security User Authentication Authorization Relationship to Privacy Consent Audit Logging and reporting

04/22/232

Page 3: HL7 Security Working Group John Moehrke

© 2010 Health Level Seven ® International. All Rights Reserved. HL7 and Health Level Seven are registered trademarks of Health Level Seven International. Reg. U.S. TM Office.

Overall view of mobile device security

Functional, Operational, Physical, Procedural, Network, User, etc..

NIST 800-53 - Security and Privacy Controls for Federal Information Systems and Organizations

NIST 800-124 - Guidelines on Cell Phone and PDA Security

04/22/233

Page 4: HL7 Security Working Group John Moehrke

© 2010 Health Level Seven ® International. All Rights Reserved. HL7 and Health Level Seven are registered trademarks of Health Level Seven International. Reg. U.S. TM Office.

NIST 800-53 Control FamiliesNIST 800-53 Control Families18 Families related to Security

Access Control Media ProtectionAwareness and Training Physical and Environmental ProtectionAudit and Accountability PlanningSecurity Assessment and Authorization Personnel SecurityConfiguration Management Risk AssessmentContingency Planning System and Services AcquisitionIdentification and Authentication System and Communications ProtectionIncident Response System and Information IntegrityMaintenance Program Management

8 Families related to PrivacyAuthority and Purpose Individual Participation and RedressAccountability, Audit, and Risk Management SecurityData Quality and Integrity TransparencyData Minimization and Retention Use Limitation

Page 5: HL7 Security Working Group John Moehrke

© 2010 Health Level Seven ® International. All Rights Reserved. HL7 and Health Level Seven are registered trademarks of Health Level Seven International. Reg. U.S. TM Office.

Risk – Scalable Security Risk Assessment is a general and

natural process Risk Assessment is applicable to many levels

of design and deployment Standards development – Security Cookbook Software design – Medical Device ISO 14971 Network design Deploying systems onto network – IEC 80001 Organizational – beyond network scope – ISO 27001 Nationwide Exchanges – IHE Affinity Deployment

04/22/235

Page 6: HL7 Security Working Group John Moehrke

© 2010 Health Level Seven ® International. All Rights Reserved. HL7 and Health Level Seven are registered trademarks of Health Level Seven International. Reg. U.S. TM Office.

Risk ScenarioIn this scenario:

•The vulnerability is the hole in the roof

•The threat is the rain cloud

• Rain could exploit the vulnerability

The risk is that the building and equipment in the building could be damaged as long as the vulnerability exists and there is a likely chance that rain will fall.

6 04/22/23

Page 7: HL7 Security Working Group John Moehrke

© 2010 Health Level Seven ® International. All Rights Reserved. HL7 and Health Level Seven are registered trademarks of Health Level Seven International. Reg. U.S. TM Office.

Risk Management (ISO13335)

04/22/237

Page 8: HL7 Security Working Group John Moehrke

© 2010 Health Level Seven ® International. All Rights Reserved. HL7 and Health Level Seven are registered trademarks of Health Level Seven International. Reg. U.S. TM Office.

Risks – Resource protection Wrong people get access Right people get denied proper access Right people see too much (consent) Unauthorized Create/Update/Delete allowed Right people get wrong data Perception that wrong people got access

04/22/238

Page 9: HL7 Security Working Group John Moehrke

© 2010 Health Level Seven ® International. All Rights Reserved. HL7 and Health Level Seven are registered trademarks of Health Level Seven International. Reg. U.S. TM Office.

NIST 800-53 Control FamiliesNIST 800-53 Control Families18 Families related to Security

Access Control Media ProtectionAwareness and Training Physical and Environmental ProtectionAudit and Accountability PlanningSecurity Assessment and Authorization Personnel SecurityConfiguration Management Risk AssessmentContingency Planning System and Services AcquisitionIdentification and Authentication System and Communications ProtectionIncident Response System and Information IntegrityMaintenance Program Management

8 Families related to PrivacyAuthority and Purpose Individual Participation and RedressAccountability, Audit, and Risk Management SecurityData Quality and Integrity TransparencyData Minimization and Retention Use Limitation

Page 10: HL7 Security Working Group John Moehrke

© 2010 Health Level Seven ® International. All Rights Reserved. HL7 and Health Level Seven are registered trademarks of Health Level Seven International. Reg. U.S. TM Office.

mHealth = Security layers

10

TCP/IP + DNS

IHE IUA (2013)

IHE MHD

HL7 FHIR

HL7/OMG hData

DICOM WADOContinua …RESTful

Resources

Secure RESTfulHTTP Transport

Internet

Page 11: HL7 Security Working Group John Moehrke

© 2010 Health Level Seven ® International. All Rights Reserved. HL7 and Health Level Seven are registered trademarks of Health Level Seven International. Reg. U.S. TM Office.

Basic HTTP security Using HTTPS – Server side TLS/SSL

No impact on resource content and encoding Authenticates server Encrypts and Integrity protects communication Does Not authenticate client

Use Client Authentication Hard to manage Does not authenticate user (see next slide)

04/22/2311

Page 12: HL7 Security Working Group John Moehrke

© 2010 Health Level Seven ® International. All Rights Reserved. HL7 and Health Level Seven are registered trademarks of Health Level Seven International. Reg. U.S. TM Office.

User Authentication Using HTTP Authentication

Basic – username/password Not scalable Form – username/password Not plugable tech Kerberos Doesn’t work well outside

organization SAML – SSO profile okay if enterprise focused oAuth best if internet focused

04/22/2312

Page 13: HL7 Security Working Group John Moehrke

© 2010 Health Level Seven ® International. All Rights Reserved. HL7 and Health Level Seven are registered trademarks of Health Level Seven International. Reg. U.S. TM Office.

Healthcare - Access Control Healthcare needs are more complex

But leverage concepts: RBAC, Policy, Tags, Enforce Privacy Consents

special consent rules, episodic, expired, revoked Data not simply classifiable into Role

Leverage clinical types but need Security Tags Policies point at data characteristics

Sensitive Health Topics, Care-Team Break-Glass – safety medical judgement Residual Rules Obligations

04/22/2313

Page 14: HL7 Security Working Group John Moehrke

© 2010 Health Level Seven ® International. All Rights Reserved. HL7 and Health Level Seven are registered trademarks of Health Level Seven International. Reg. U.S. TM Office.

HL7 PASS – Access control

04/22/2314

ServiceConsumer

Service Provider

Policy Decision

Point (PDP)

Security & Privacy Policy Rules

Policy Administration/Security Management

Access Control Decision Information (ADI)

ContexturalInformation

Subject ACI

Request for Service/Credentials

Policy Enforcement Point (PEP)

Acc

ess

Con

trol

Ser

vice

(A

CS)

Sec

urity

Man

agem

ent

Request for Service

Resource ACI

Con

sent

Man

agem

ent

Privacy Policies

Privacy Management

Access Control Information (ACI)

Serv

ice

Prov

ider

Interface

2

Interface

1Access Request

ADI

Interface

3

Interface

4

Page 15: HL7 Security Working Group John Moehrke

© 2010 Health Level Seven ® International. All Rights Reserved. HL7 and Health Level Seven are registered trademarks of Health Level Seven International. Reg. U.S. TM Office.

Access Control Engine

04/22/2315

User•Role•Authz•Facility

Patient•Consent•Care-team•Deligates

Resource •Sec Tags•Class•Dates

Policies

Context•Break-Glass•PurposeOfUse•Workflow

FHIR API

Page 16: HL7 Security Working Group John Moehrke

© 2010 Health Level Seven ® International. All Rights Reserved. HL7 and Health Level Seven are registered trademarks of Health Level Seven International. Reg. U.S. TM Office.

mHealth Access Control Deployment Models

04/22/2316

Page 17: HL7 Security Working Group John Moehrke

© 2010 Health Level Seven ® International. All Rights Reserved. HL7 and Health Level Seven are registered trademarks of Health Level Seven International. Reg. U.S. TM Office.

Internet User Authorization (IUA) Sub-Authorizations user would otherwise have Use-Case: Simple browser app, mobile application,

embedded device, and third party service Enables separation of concerns: User Identity, User

Authentication, User Delegation of their Rights… Authenticable claims: user identity, user authentication

mechanism, roles asserted, purpose of use asserted, policy pointers, ..

oAuth 2.0: JWT/SAML token - Can be proxied to SAML Authorization is from user perspective and may not be

same as resource perspective authorization

04/22/2317

Page 18: HL7 Security Working Group John Moehrke

© 2010 Health Level Seven ® International. All Rights Reserved. HL7 and Health Level Seven are registered trademarks of Health Level Seven International. Reg. U.S. TM Office.

Resource – Security Tags Developing story – stay tuned Leveraging existing work

Security/Privacy DAM DS4P – Metadata use IHE XD* metadata model Vocabulary (HL7, OASIS, ISO, etc)

Access Control engine – Uses FHIR API too FHIR resources have Provenance FHIR resources have Security Tags

04/22/2318

Page 19: HL7 Security Working Group John Moehrke

© 2010 Health Level Seven ® International. All Rights Reserved. HL7 and Health Level Seven are registered trademarks of Health Level Seven International. Reg. U.S. TM Office.

User Management Best Practice: Use federated identity

Leverage security layer, abstract healthcare specifics from user management Internet or Corporate – oAuth or SAML

FHIR Servers need to be careful which Identity Providers they trust, and for what reason

Might be added to FHIR – for those that really want it, it should be there in a consistently usable way

04/22/2319

Page 20: HL7 Security Working Group John Moehrke

© 2010 Health Level Seven ® International. All Rights Reserved. HL7 and Health Level Seven are registered trademarks of Health Level Seven International. Reg. U.S. TM Office.

The Role of the HL7 Security WG

HL7 Security Risk Assessment Process Provides training on the HL7 Risk

Assessment process Gives direct assistance to WGs during the

risk assessment process Liason to mHealth Liason to FHIR

20 04/22/23

Page 21: HL7 Security Working Group John Moehrke

© 2010 Health Level Seven ® International. All Rights Reserved. HL7 and Health Level Seven are registered trademarks of Health Level Seven International. Reg. U.S. TM Office.

Conclusion Building off of advancements in general Internet

Security Standards (HTTPS, oAuth, SAML, Dir) pluggable authentication

Building off of healthcare standards Layering Security in a way that is usable for many

Healthcare projects (Continua, DICOM, IHE, HL7) Embedding Security Tags into FHIR Resources FHIR – Security Audit Log Resource

04/22/2321

Page 22: HL7 Security Working Group John Moehrke

© 2010 Health Level Seven ® International. All Rights Reserved. HL7 and Health Level Seven are registered trademarks of Health Level Seven International. Reg. U.S. TM Office.

ResourcesHL7* Security http://wiki.hl7.org/index.php?title=Security* mHealth http://wiki.hl7.org/index.php?title=Mobile_Health* FHIR Wiki http://wiki.hl7.org/index.php?title=FHIRIHE * web http://www.ihe.net/* IHE Wiki http://wiki.ihe.net/DICOM http://medical.nema.org/standard.html

My blog http://healthcaresecprivacy.blogspot.com/

04/22/2322