Top Banner
What IHE Delivers IHE IT Infrastructure Planning Committee John Moehrke – GE Healthcare Security and Privacy Overview Part 1 of 2 – Basic Security
39

What IHE Delivers IHE IT Infrastructure Planning Committee John Moehrke – GE Healthcare Security and Privacy Overview Part 1 of 2 – Basic Security September.

Dec 28, 2015

Download

Documents

Abigail King
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: What IHE Delivers IHE IT Infrastructure Planning Committee John Moehrke – GE Healthcare Security and Privacy Overview Part 1 of 2 – Basic Security September.

What IHE Delivers

IHE IT Infrastructure Planning Committee

John Moehrke – GE Healthcare

Security and Privacy Overview

Part 1 of 2 – Basic Security

Page 2: What IHE Delivers IHE IT Infrastructure Planning Committee John Moehrke – GE Healthcare Security and Privacy Overview Part 1 of 2 – Basic Security September.

Overall Security and Privacy controls

Consistent Time (CT)

Audit Trails and Node Authentication (ATNA)

Enterprise User Authentication (EUA)

Cross-Enterprise User Assertion (XUA)

Document Digital Signature (DSG)

Basic Patient Privacy Consents (BPPC)

Access Control

Gaps

Conclusion

Agenda

April 19, 2023 2

Par

t 1P

art 1

Par

t 2P

art 2

Page 3: What IHE Delivers IHE IT Infrastructure Planning Committee John Moehrke – GE Healthcare Security and Privacy Overview Part 1 of 2 – Basic Security September.

Layers of Policies

International

Country-Specific

Horizontal Industry

Enterprise

OECD Guidelines on Transborder Flows

Examples

Pro

file

s e

nab

les

/ en

forc

es

US-HIPAA; EU-EC95/46; JP-Act 57 - 2003

Medical Professional Societies

Backup and Recovery

April 19, 2023 3

Page 4: What IHE Delivers IHE IT Infrastructure Planning Committee John Moehrke – GE Healthcare Security and Privacy Overview Part 1 of 2 – Basic Security September.

Risk Scenario

In this scenario:In this scenario:

•The vulnerability is the The vulnerability is the hole in the roofhole in the roof

•The threat is the rain The threat is the rain cloud cloud

• Rain could exploit theRain could exploit the vulnerability vulnerability

The risk is that the building and equipment in the building The risk is that the building and equipment in the building could be damaged as long as the vulnerability exists and could be damaged as long as the vulnerability exists and there is a likely chance that rain will fall. there is a likely chance that rain will fall.

April 19, 2023 4

Page 5: What IHE Delivers IHE IT Infrastructure Planning Committee John Moehrke – GE Healthcare Security and Privacy Overview Part 1 of 2 – Basic Security September.

Security Mis-Use-CasesPrevent Indiscriminate attacks (worms, DOS)

Normal Patient that accepts XDS participation

Patient asks for Accounting of Disclosures

Protect against malicious neighbor doctor

Patient that retracts consent to publish

Provider Privacy

Malicious Data Mining

Access to Emergency data set

VIP (movie star, sports figure)

Domestic violence victim

Daughter with sensitive tests hidden from Parent

Sensitive topics: mental health, sexual health

Legal Guardian (cooperative)

Care-Giver (assists w/ care)April 19, 2023 5

Page 6: What IHE Delivers IHE IT Infrastructure Planning Committee John Moehrke – GE Healthcare Security and Privacy Overview Part 1 of 2 – Basic Security September.

Accountability ModelsAccess Control model – Prevention

Strong controls on User Identification and Authentication

Strict Role-Based-Access-Control No one is given any more access rights than they minimally need

Typical in a Bank

Audit Control model – Reaction

Strong control on User Identification and Authentication

Relaxed Role-Based-Access-Control Emphasis on Training and Awareness of oversight Told what you are normally allowed to do Empowered to do what is right when necessary

Audit Logs are inspected regularly

Abuse is detected and acted upon

Healthcare: Typically mixture w/ emphasis on Patient Safety

April 19, 2023 6

Page 7: What IHE Delivers IHE IT Infrastructure Planning Committee John Moehrke – GE Healthcare Security and Privacy Overview Part 1 of 2 – Basic Security September.

Security & Privacy Controls

IHE Profile

Profile Issued

Audit Log

Identification and A

uthentication

Data A

ccess Control

Secrecy

Data Integrity

Non-R

epudiation

Patient P

rivacy

Audit Trails and Node Authentication 2004 √ √ √ √ √ √ √

Consistent Time 2003 √ ∙ √

Enterprise User Authentication 2003 √ ∙ ∙ ∙

Cross-Enterprise User Assertion 2006 √ ∙ ∙ ∙

Basic Patient Privacy Consents 2006 ∙ √

Personnel White Pages 2004 √ √ ∙

Healthcare Provider Directory 2010 √ ∙ ∙

Document Digital Signature 2005 √ √ √

Document Encryption (in development) 2011 √ √ ∙

Profiles mapped to Security & Privacy Controls

April 19, 2023 7

Page 8: What IHE Delivers IHE IT Infrastructure Planning Committee John Moehrke – GE Healthcare Security and Privacy Overview Part 1 of 2 – Basic Security September.

CTCT

Consistent Time

April 19, 2023 8

Page 9: What IHE Delivers IHE IT Infrastructure Planning Committee John Moehrke – GE Healthcare Security and Privacy Overview Part 1 of 2 – Basic Security September.

Introduction and Standards

Meet a basic security requirement

System clocks and time stamps of the many computers in a network must be synchronized.

Lack of consistent time creates a “security hole” for attackers. Synchronization ±1 second is generally sufficient.

Achieve cost savings/containment

Use the Network Time Protocol (NTP) standard defined in RFC 1305.

Leverage existing Internet NTP services, a set-up option for mainstream operating systems.

April 19, 2023 9

Page 10: What IHE Delivers IHE IT Infrastructure Planning Committee John Moehrke – GE Healthcare Security and Privacy Overview Part 1 of 2 – Basic Security September.

Transaction Diagram

Maintain Time [ITI-1]Maintain Time [ITI-1]↑↑

Time ServerTime Server

Time Time ClientClient

April 19, 2023 10

Page 11: What IHE Delivers IHE IT Infrastructure Planning Committee John Moehrke – GE Healthcare Security and Privacy Overview Part 1 of 2 – Basic Security September.

ATNAATNA

Audit Trail and Node Authentication

April 19, 2023 11

Page 12: What IHE Delivers IHE IT Infrastructure Planning Committee John Moehrke – GE Healthcare Security and Privacy Overview Part 1 of 2 – Basic Security September.

ATNA Profile

Secure Node or Secure Application

Access Controls Functional – can be shown to enforce policies

Audit Controls SYSLOG + IHE/DICOM/RFC3881 Audit Message Auditable Events

Network Controls Mutually Authenticated TLS Or S/MIME or WS-Security or physical isolation

April 19, 2023 12

Page 13: What IHE Delivers IHE IT Infrastructure Planning Committee John Moehrke – GE Healthcare Security and Privacy Overview Part 1 of 2 – Basic Security September.

ATNA: Actors / Transactions

ITI-20: Record Audit Event

ITI-1: Maintain Time

Secure Node grouped with

PHI Application

Time Server Secure Node grouped with

Any IHE Actor

Audit Repository

Secure Node grouped with

Any IHE Actor

ITI-20: Record Audit Event

ITI-20: Record Audit Event

ITI-19: Node Authentication

ITI-1: Maintain Time

April 19, 2023 13

Page 14: What IHE Delivers IHE IT Infrastructure Planning Committee John Moehrke – GE Healthcare Security and Privacy Overview Part 1 of 2 – Basic Security September.

ATNA: Authenticate Node Transaction

Mutually Authenticate all network communications of Sensitive Information

Encrypt and Integrity Protect

Standards X.509 Digital Certificate RSA Authentication AES Encryption SHA Integrity Transport Layer Security (TLS) RFC 2246 Web-Services Security S/MIME

April 19, 2023 14

Page 15: What IHE Delivers IHE IT Infrastructure Planning Committee John Moehrke – GE Healthcare Security and Privacy Overview Part 1 of 2 – Basic Security September.

Community Community ClinicClinic

Lab Lab Info. Info. SystemSystem

PACSPACS

Teaching Teaching HospitalHospital

PACSPACS

ED ED ApplicationApplication

EHR SystemEHR System

Physician OfficePhysician Office

EHR SystemEHR System

ATNA Authenticate Node

XDS XDS Document Document RegistryRegistry

Provide & Register DocsProvide & Register Docs

XDS XDS Document Document RepositorRepositoryy

XDSXDSDocumenDocumen

t t RepositoReposito

ryry

Secured NodeSecured Node

Secured NodeSecured NodeSecured NodeSecured Node

Secured NodeSecured Node

Dual Authenticated LinksDual Authenticated Links

April 19, 2023 15

Page 16: What IHE Delivers IHE IT Infrastructure Planning Committee John Moehrke – GE Healthcare Security and Privacy Overview Part 1 of 2 – Basic Security September.

Audit Log - AccountabilityMitigation against unauthorized use Investigate Audit log for patterns and behavior outside

policy. Enforce policy Secure Node requires appropriate Access Controls to

enforce at the enterprise by XDS Source and Consumers

Investigation of patient complaints Investigate Audit log for specific evidence ATNA Audit Repositories can filter and auto-forward

Support an Accounting of Disclosures ATNA Report is informed by XDS-Export + XDS-Import

April 19, 2023 16

Page 17: What IHE Delivers IHE IT Infrastructure Planning Committee John Moehrke – GE Healthcare Security and Privacy Overview Part 1 of 2 – Basic Security September.

17

HIE boundaryHIE boundary

Community Community ClinicClinic

Lab Lab Info. Info. SystemSystem

PACSPACS

Teaching Teaching HospitalHospital

PACSPACS

ED ED ApplicationApplication

EHR SystemEHR System

Physician OfficePhysician Office

EHR SystemEHR System PMSPMS

Retrieve DocumentRetrieve Document

Register DocumentRegister DocumentQuery DocumentQuery Document

XDS XDS Document Document RegistryRegistry

ATNA Audit ATNA Audit record repositoryrecord repository CT Time serverCT Time server

MaintainMaintainTimeTime

MaintainMaintainTimeTime

Maintain TimeMaintain TimeProvide & Register DocsProvide & Register Docs

XDS XDS Document Document RepositorRepositoryy

XDSXDSDocumenDocumen

t t RepositoReposito

ryry

CentralizedCentralized AccountabilityAccountability

April 19, 2023

Page 18: What IHE Delivers IHE IT Infrastructure Planning Committee John Moehrke – GE Healthcare Security and Privacy Overview Part 1 of 2 – Basic Security September.

18

HIE boundaryHIE boundary

Community Community ClinicClinic

Lab Lab Info. Info. SystemSystem

PACSPACS

Teaching Teaching HospitalHospital

PACSPACS

ED ED ApplicationApplication

EHR SystemEHR System

Physician OfficePhysician Office

EHR SystemEHR System

Distributed Accountability

PMSPMS

Retrieve DocumentRetrieve Document

Register DocumentRegister DocumentQuery DocumentQuery Document

XDS XDS Document Document RegistryRegistry

ATNA Audit ATNA Audit record repositoryrecord repository CT Time serverCT Time server

MaintainMaintainTimeTime

MaintainMaintainTimeTime

Maintain TimeMaintain TimeProvide & Register DocsProvide & Register Docs

XDS XDS Document Document RepositorRepositoryy

XDSXDSDocumenDocumen

t t RepositoReposito

ryry

ATNA Audit ATNA Audit record repositoryrecord repository

State run HIEState run HIE

ATNA Audit ATNA Audit record repositoryrecord repository

April 19, 2023

Page 19: What IHE Delivers IHE IT Infrastructure Planning Committee John Moehrke – GE Healthcare Security and Privacy Overview Part 1 of 2 – Basic Security September.

Sjfldjlsdj aSjfldjlsdj aKdjldsjKdjldsjLsjldjlLsjldjljfjfjlslkjlnjfjfjlslkjlnLslasdjj;ask;slsLslasdjj;ask;slsSflksdjfl;safSflksdjfl;safSalasaskaSalasaskaFaslskf;sfFaslskf;sfSlsjlsdjlsdjfSlsjlsdjlsdjfLsjflsdjldsjfsLsjflsdjldsjfsSlkfjsdlfjldsfSlkfjsdlfjldsflsjfldsjfldsfjlsjfldsjfldsfj

Sjfldjlsdj aSjfldjlsdj aLslasdjj;ask;slsLslasdjj;ask;slsFaslskf;sfFaslskf;sflsjfldsjfldsfjlsjfldsjfldsfj

Clinic AClinic A

HIE InfrastructureHIE InfrastructureAuditAudit

AuditAudit

EMREMR

Example: Audit Log Cascade

1) Many audit 1) Many audit events, both internal events, both internal and externaland external

2) Local Audit Repository 2) Local Audit Repository Service filters out events Service filters out events correlating to HIE correlating to HIE interactionsinteractions

3) HIE Audit Record 3) HIE Audit Record combines with others combines with others for total HIE viewfor total HIE view

April 19, 2023 19

Page 20: What IHE Delivers IHE IT Infrastructure Planning Committee John Moehrke – GE Healthcare Security and Privacy Overview Part 1 of 2 – Basic Security September.

ATNA: References

Status: Final Text

IHE ITI Technical Framework Vol. 1 - Section 9 Vol. 2a - Sections 3.19, 3.20

“Security Considerations” section found in other Profiles may specialize how ATNA is applied

The Audit Event Message typically specialized in Vol 2 at the Transaction level PIX QueryTransaction : See section Vol 2a:3.9.5.1 XDS Register Document Set-b: See section Vol 2b:3.42.7.1

April 19, 2023 20

Page 21: What IHE Delivers IHE IT Infrastructure Planning Committee John Moehrke – GE Healthcare Security and Privacy Overview Part 1 of 2 – Basic Security September.

EUA

Enterprise User Authentication

April 19, 2023 21

Page 22: What IHE Delivers IHE IT Infrastructure Planning Committee John Moehrke – GE Healthcare Security and Privacy Overview Part 1 of 2 – Basic Security September.

Support a single enterprise governed by a single set of security policies and having a common network domain.

Establish one name per user to be used for all IT applications and devices.

Facilitate centralized user authentication management.

Provide users with single sign-on.

EUA Introduction

April 19, 2023 22

Page 23: What IHE Delivers IHE IT Infrastructure Planning Committee John Moehrke – GE Healthcare Security and Privacy Overview Part 1 of 2 – Basic Security September.

Meet a basic security requirement User authentication is necessary for most applications and

data access operations.

Achieve cost savings/containment Centralize user authentication management Simplify multi-vendor implementations

Provide workflow improvement for users Increase user acceptance through simplicity Decrease user task-switching time.

More effective security protection Consistency and simplicity yields greater assurance.

Value Proposition

April 19, 2023 23

Page 24: What IHE Delivers IHE IT Infrastructure Planning Committee John Moehrke – GE Healthcare Security and Privacy Overview Part 1 of 2 – Basic Security September.

Limited network overhead

Kerberos is network-efficient, developed at a time when high-speed networks were rare.

Kerberos work with any user authentication technology

Tokens, biometric technologies, smart cards, … Specific implementations require some proprietary

components, e.g., biometric devices. Once user authentication is complete, network transactions

are the same for all technologies.

Key Attributes

April 19, 2023 24

Page 25: What IHE Delivers IHE IT Infrastructure Planning Committee John Moehrke – GE Healthcare Security and Privacy Overview Part 1 of 2 – Basic Security September.

EUA Transaction Diagram

April 19, 2023 25

Page 26: What IHE Delivers IHE IT Infrastructure Planning Committee John Moehrke – GE Healthcare Security and Privacy Overview Part 1 of 2 – Basic Security September.

Status: Final Text

IHE ITI Technical Framework Vol 1: Section 4 Vol 2a: Section 3.2, 3.3, 3.4

Standards Used Kerberos v5 (RFC 1510)

• Stable since 1993, • Widely implemented on current operating system platforms• Successfully withstood attacks in its 10-year history• Fully interoperable among all platforms

Minimal Application Changes Eliminate application-specific, non-interoperable authentication Replace less secure proprietary security techniques

EUA: References

April 19, 2023 26

Page 27: What IHE Delivers IHE IT Infrastructure Planning Committee John Moehrke – GE Healthcare Security and Privacy Overview Part 1 of 2 – Basic Security September.

XUA

Cross-Enterprise User Assertion

April 19, 2023 27

Page 28: What IHE Delivers IHE IT Infrastructure Planning Committee John Moehrke – GE Healthcare Security and Privacy Overview Part 1 of 2 – Basic Security September.

XUA Problem Statement: The industry needs a standards-based method to provide the initiating user’s identity in cross-enterprise transactions in a way that the responder can make access decisions and proper audit entries.

What Problem is Being Solved?

April 19, 2023 28

Page 29: What IHE Delivers IHE IT Infrastructure Planning Committee John Moehrke – GE Healthcare Security and Privacy Overview Part 1 of 2 – Basic Security September.

Extend User Identity across organizations Users include Providers, Patients, Clerical, etc Must supports cross-enterprise transactions (e.g XDS, XCA), can be

used inside enterprise Distributed or Centralized Identity management (Directories)

Provide information necessary so that receiving actors can make Access Control decisions Authentication mechanism used Attributes about the user (roles) Does not include Access Control mechanism

Provide information necessary so that receiving actors can produce detailed and accurate Security Audit Trail

Value Proposition

April 19, 2023 29

Page 30: What IHE Delivers IHE IT Infrastructure Planning Committee John Moehrke – GE Healthcare Security and Privacy Overview Part 1 of 2 – Basic Security September.

Initial scope to XDS.b Stored Query and Retrieve Relies on Web-Services Easily extended to any Web-Services transactions Leverage WS-I Basic Security Profile 1.1

Use SAML 2.0 Identity Assertions Does not constrain ‘how’ the Assertion was obtained Supporting Kantara Initiative (formerly Liberty Alliance) May be obtained using WS-Trust or SAML

Define grouping behavior with EUA and ATNA

Technical Solution

April 19, 2023 30

Page 31: What IHE Delivers IHE IT Infrastructure Planning Committee John Moehrke – GE Healthcare Security and Privacy Overview Part 1 of 2 – Basic Security September.

User Role To support Role Based Access Control

Consent / Authorization To support use-cases where the requesting party

has explicit consent

Purpose Of Use Carry an indicator of what the reason for the

transaction is and what will be done with the result

XUA: Attribute Extension supplement

April 19, 2023 31

Page 32: What IHE Delivers IHE IT Infrastructure Planning Committee John Moehrke – GE Healthcare Security and Privacy Overview Part 1 of 2 – Basic Security September.

XUA encoded in Web-ServicesHTTP

SOAP Envelope

SOAP Header

SecurityTokenReference

Security

Assertion

AttributeStatement

SOAP Body

AuthenticationStatement

AuthorizationDecisionStatement

HTTP SOAP Envelope

SOAP Header

Security

Assertion

AttributeStatement

SOAP Body

AuthenticationStatement

AuthorizationDecisionStatement

Security Signature

Security Token Reference

Assertion Signature

HTTP SOAP Envelope

SOAP Header

SecurityTokenReference

Security

Assertion

AttributeStatement

SOAP Body

AuthenticationStatement

AuthorizationDecisionStatement

TLS - HTTP SOAP Envelope

SOAP Header

WS-Security

SAML 2.0 Assertion

AttributeStatement

Original TransactionSOAP Body

AuthenticationStatement

AuthorizationDecisionStatement

April 19, 2023 32

Who is Authority?How/Why to Trust?Constraints (time)?

What Roles apply?What is the Purpose?

What Consent applies?

Who is User?How they were authenticated?

Original TransactionSOAP Header

Page 33: What IHE Delivers IHE IT Infrastructure Planning Committee John Moehrke – GE Healthcare Security and Privacy Overview Part 1 of 2 – Basic Security September.

Factor TokenFactor Token

Very Very HighHigh

HighHigh

MediumMedium

LowLow

RemoteRemoteClinicalClinical Entry Entry

VerificationVerificationOf DataOf DataTranscription Transcription

Access toAccess toLocal Local EHR/EMR EHR/EMR

Access toAccess toSummary ofSummary ofClinical researchClinical research

PIN/User IDPIN/User ID

Knowledge-Knowledge-

KerberosKerberos

BasedBased

PKI/ Digital SignaturePKI/ Digital Signature

Multi-Multi-

Incre

ase

d $

Cost

Incre

ase

d $

Cost

Increased Need for Identity AssuranceIncreased Need for Identity Assurance

Level of Identity Assurance

Username - PasswordUsername - Password

April 19, 2023 33

Page 34: What IHE Delivers IHE IT Infrastructure Planning Committee John Moehrke – GE Healthcare Security and Privacy Overview Part 1 of 2 – Basic Security September.

XUA Actors

April 19, 2023 34

Page 35: What IHE Delivers IHE IT Infrastructure Planning Committee John Moehrke – GE Healthcare Security and Privacy Overview Part 1 of 2 – Basic Security September.

Key:Key:

Original TransactionOriginal Transaction

TLS ProtectionsTLS Protections

EHREHR

PatientPatientDataData

XDS Consumer XDS Consumer XDS RegistryXDS Registry

user auth user auth providerprovider

UserUserAuthAuth

(ATNA Secure Node)(ATNA Secure Node)

(ATNA Secure Node)(ATNA Secure Node)

AuditAuditLogLog

X-Service X-Service UserUser

X-Identity X-Identity ProviderProvider XUA = XUA =

Web-Services SecurityWeb-Services Security + SAML Assertions+ SAML Assertions

XUA AssertionXUA Assertion

AuditAudit

Implementation Example

April 19, 2023 35

Page 36: What IHE Delivers IHE IT Infrastructure Planning Committee John Moehrke – GE Healthcare Security and Privacy Overview Part 1 of 2 – Basic Security September.

Status: Final Text

IHE ITI Technical Framework Vol 1: Section 13 Vol 2b: Section 3.40

Standards Used SAML 2.0 Identity Assertions Web-Services Security header WS-I Basic Security Profile

XUA: References

April 19, 2023 36

Page 37: What IHE Delivers IHE IT Infrastructure Planning Committee John Moehrke – GE Healthcare Security and Privacy Overview Part 1 of 2 – Basic Security September.

Security & Privacy Controls

IHE Profile

Profile Issued

Audit Log

Identification and A

uthentication

Data A

ccess Control

Secrecy

Data Integrity

Non-R

epudiation

Patient P

rivacy

Audit Trails and Node Authentication 2004 √ √ √ √ √ √ √

Consistent Time 2003 √ ∙ √

Enterprise User Authentication 2003 √ ∙ ∙ ∙

Cross-Enterprise User Assertion 2006 √ ∙ ∙ ∙

Basic Patient Privacy Consents 2006 ∙ √

Personnel White Pages 2004 √ √ ∙

Healthcare Provider Directory 2010 √ ∙ ∙

Document Digital Signature 2005 √ √ √

Document Encryption (in development) 2011 √ √ ∙

Profiles mapped to Security & Privacy Controls

April 19, 2023 37

Page 38: What IHE Delivers IHE IT Infrastructure Planning Committee John Moehrke – GE Healthcare Security and Privacy Overview Part 1 of 2 – Basic Security September.

38

More InformationIHE Web site: IHE Web site: www.ihe.net

IHE official materialIHE official materialTechnical Framework documentsTechnical Framework documents

IHE Wiki site: wiki.ihe.netIHE Wiki site: wiki.ihe.net IHE committee pagesIHE committee pages Implementation NotesImplementation Notes Ongoing committee workOngoing committee work

IHE ITI technical committee mailing listIHE ITI technical committee mailing list Instructions on the bottom of :Instructions on the bottom of :http://www.ihe.net/IT_Infra/committees

April 19, 2023

Page 39: What IHE Delivers IHE IT Infrastructure Planning Committee John Moehrke – GE Healthcare Security and Privacy Overview Part 1 of 2 – Basic Security September.

39April 19, 2023