© 2010 health level seven ® international. all rights reserved. hl7 and health level seven are...

22
© 2010 Health Level Seven ® International. All Rights Reserved. HL7 and Health Level Seven are registered trademarks of Health Level Seven International. Reg. U.S. TM Office. Security - mHealth and FHIR: mobile health applications and other Internet uses Security in HL7 Standards HL7 Security Working Group John Moehrke

Upload: jeremiah-donahue

Post on 27-Mar-2015

213 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: © 2010 Health Level Seven ® International. All Rights Reserved. HL7 and Health Level Seven are registered trademarks of Health Level Seven International

© 2010 Health Level Seven ® International. All Rights Reserved. HL7 and Health Level Seven are registered trademarks of Health Level Seven International. Reg. U.S. TM Office.

Security - mHealth and FHIR:

mobile health applications and other Internet uses

Security in HL7 Standards

HL7 Security Working Group

John Moehrke

Page 2: © 2010 Health Level Seven ® International. All Rights Reserved. HL7 and Health Level Seven are registered trademarks of Health Level Seven International

© 2010 Health Level Seven ® International. All Rights Reserved. HL7 and Health Level Seven are registered trademarks of Health Level Seven International. Reg. U.S. TM Office.

Agenda

Basic mHealth security Communications security User Authentication Authorization Relationship to Privacy Consent Audit Logging and reporting

04/10/232

Page 3: © 2010 Health Level Seven ® International. All Rights Reserved. HL7 and Health Level Seven are registered trademarks of Health Level Seven International

© 2010 Health Level Seven ® International. All Rights Reserved. HL7 and Health Level Seven are registered trademarks of Health Level Seven International. Reg. U.S. TM Office.

Overall view of mobile device security

Functional, Operational, Physical, Procedural, Network, User, etc..

NIST 800-53 - Security and Privacy Controls for Federal Information Systems and Organizations

NIST 800-124 - Guidelines on Cell Phone and PDA Security

04/10/233

Page 4: © 2010 Health Level Seven ® International. All Rights Reserved. HL7 and Health Level Seven are registered trademarks of Health Level Seven International

© 2010 Health Level Seven ® International. All Rights Reserved. HL7 and Health Level Seven are registered trademarks of Health Level Seven International. Reg. U.S. TM Office.

NIST 800-53 Control FamiliesNIST 800-53 Control Families18 Families related to Security

Access Control Media ProtectionAwareness and Training Physical and Environmental ProtectionAudit and Accountability PlanningSecurity Assessment and Authorization Personnel SecurityConfiguration Management Risk AssessmentContingency Planning System and Services AcquisitionIdentification and Authentication System and Communications ProtectionIncident Response System and Information IntegrityMaintenance Program Management

8 Families related to PrivacyAuthority and Purpose Individual Participation and RedressAccountability, Audit, and Risk Management SecurityData Quality and Integrity TransparencyData Minimization and Retention Use Limitation

Page 5: © 2010 Health Level Seven ® International. All Rights Reserved. HL7 and Health Level Seven are registered trademarks of Health Level Seven International

© 2010 Health Level Seven ® International. All Rights Reserved. HL7 and Health Level Seven are registered trademarks of Health Level Seven International. Reg. U.S. TM Office.

Risk – Scalable Security

Risk Assessment is a general and natural process

Risk Assessment is applicable to many levels of design and deployment Standards development – Security Cookbook Software design – Medical Device ISO 14971 Network design Deploying systems onto network – IEC 80001 Organizational – beyond network scope – ISO 27001 Nationwide Exchanges – IHE Affinity Deployment

04/10/235

Page 6: © 2010 Health Level Seven ® International. All Rights Reserved. HL7 and Health Level Seven are registered trademarks of Health Level Seven International

© 2010 Health Level Seven ® International. All Rights Reserved. HL7 and Health Level Seven are registered trademarks of Health Level Seven International. Reg. U.S. TM Office.

Risk Scenario

In this scenario:

•The vulnerability is the hole in the roof

•The threat is the rain cloud

• Rain could exploit the vulnerability

The risk is that the building and equipment in the building could be damaged as long as the vulnerability exists and there is a likely chance that rain will fall.

604/10/23

Page 7: © 2010 Health Level Seven ® International. All Rights Reserved. HL7 and Health Level Seven are registered trademarks of Health Level Seven International

© 2010 Health Level Seven ® International. All Rights Reserved. HL7 and Health Level Seven are registered trademarks of Health Level Seven International. Reg. U.S. TM Office.

Risk Management (ISO13335)

04/10/237

Page 8: © 2010 Health Level Seven ® International. All Rights Reserved. HL7 and Health Level Seven are registered trademarks of Health Level Seven International

© 2010 Health Level Seven ® International. All Rights Reserved. HL7 and Health Level Seven are registered trademarks of Health Level Seven International. Reg. U.S. TM Office.

Risks – Resource protection

Wrong people get access Right people get denied proper access Right people see too much (consent) Unauthorized Create/Update/Delete allowed Right people get wrong data Perception that wrong people got access

04/10/238

Page 9: © 2010 Health Level Seven ® International. All Rights Reserved. HL7 and Health Level Seven are registered trademarks of Health Level Seven International

© 2010 Health Level Seven ® International. All Rights Reserved. HL7 and Health Level Seven are registered trademarks of Health Level Seven International. Reg. U.S. TM Office.

NIST 800-53 Control FamiliesNIST 800-53 Control Families18 Families related to Security

Access Control Media ProtectionAwareness and Training Physical and Environmental ProtectionAudit and Accountability PlanningSecurity Assessment and Authorization Personnel SecurityConfiguration Management Risk AssessmentContingency Planning System and Services AcquisitionIdentification and Authentication System and Communications ProtectionIncident Response System and Information IntegrityMaintenance Program Management

8 Families related to PrivacyAuthority and Purpose Individual Participation and RedressAccountability, Audit, and Risk Management SecurityData Quality and Integrity TransparencyData Minimization and Retention Use Limitation

Page 10: © 2010 Health Level Seven ® International. All Rights Reserved. HL7 and Health Level Seven are registered trademarks of Health Level Seven International

© 2010 Health Level Seven ® International. All Rights Reserved. HL7 and Health Level Seven are registered trademarks of Health Level Seven International. Reg. U.S. TM Office.

mHealth = Security layers

10

TCP/IP + DNS

IHE IUA (2013)

IHE MHD

HL7 FHIR

HL7/OMG hData

DICOM WADOContinua

…RESTfulResources

Secure RESTfulHTTP Transport

Internet

Page 11: © 2010 Health Level Seven ® International. All Rights Reserved. HL7 and Health Level Seven are registered trademarks of Health Level Seven International

© 2010 Health Level Seven ® International. All Rights Reserved. HL7 and Health Level Seven are registered trademarks of Health Level Seven International. Reg. U.S. TM Office.

Basic HTTP security

Using HTTPS – Server side TLS/SSL No impact on resource content and encoding Authenticates server Encrypts and Integrity protects communication Does Not authenticate client

Use Client Authentication Hard to manage Does not authenticate user (see next slide)

04/10/2311

Page 12: © 2010 Health Level Seven ® International. All Rights Reserved. HL7 and Health Level Seven are registered trademarks of Health Level Seven International

© 2010 Health Level Seven ® International. All Rights Reserved. HL7 and Health Level Seven are registered trademarks of Health Level Seven International. Reg. U.S. TM Office.

User Authentication

Using HTTP Authentication Basic – username/password Not scalable Form – username/password Not plugable tech Kerberos Doesn’t work well outside

organization SAML – SSO profile okay if enterprise focused oAuth best if internet focused

04/10/2312

Page 13: © 2010 Health Level Seven ® International. All Rights Reserved. HL7 and Health Level Seven are registered trademarks of Health Level Seven International

© 2010 Health Level Seven ® International. All Rights Reserved. HL7 and Health Level Seven are registered trademarks of Health Level Seven International. Reg. U.S. TM Office.

Healthcare - Access Control Healthcare needs are more complex

But leverage concepts: RBAC, Policy, Tags,

Enforce Privacy Consents special consent rules, episodic, expired, revoked

Data not simply classifiable into Role Leverage clinical types but need Security Tags

Policies point at data characteristics Sensitive Health Topics, Care-Team

Break-Glass – safety medical judgement Residual Rules Obligations

04/10/2313

Page 14: © 2010 Health Level Seven ® International. All Rights Reserved. HL7 and Health Level Seven are registered trademarks of Health Level Seven International

© 2010 Health Level Seven ® International. All Rights Reserved. HL7 and Health Level Seven are registered trademarks of Health Level Seven International. Reg. U.S. TM Office.

HL7 PASS – Access control

04/10/2314

ServiceConsumer

Service Provider

Policy Decision

Point (PDP)

Security & Privacy Policy Rules

Policy Administration/Security Management

Access Control Decision Information (ADI)

ContexturalInformation

Subject ACI

Request for Service/Credentials

Policy Enforcement Point (PEP)

Ac

ce

ss

Co

ntr

ol

Se

rvic

e

(AC

S)

Se

cu

rity

Ma

na

ge

me

nt

Request for Service

Resource ACI

Co

ns

en

t M

an

ag

em

en

t

Privacy Policies

Privacy Management

Access Control Information (ACI)

Ser

vice

Pro

vid

er

Interface

2

Interface

1Access Request

ADI

Interface

3

Interface

4

Page 15: © 2010 Health Level Seven ® International. All Rights Reserved. HL7 and Health Level Seven are registered trademarks of Health Level Seven International

© 2010 Health Level Seven ® International. All Rights Reserved. HL7 and Health Level Seven are registered trademarks of Health Level Seven International. Reg. U.S. TM Office.

Access Control Engine

04/10/2315

User•Role•Authz•Facility

Patient•Consent•Care-team•Deligates

Resource •Sec Tags•Class•Dates

Policies

Context•Break-Glass•PurposeOfUse•Workflow

FHIR API

Page 16: © 2010 Health Level Seven ® International. All Rights Reserved. HL7 and Health Level Seven are registered trademarks of Health Level Seven International

© 2010 Health Level Seven ® International. All Rights Reserved. HL7 and Health Level Seven are registered trademarks of Health Level Seven International. Reg. U.S. TM Office.

mHealth Access Control Deployment Models

04/10/2316

Page 17: © 2010 Health Level Seven ® International. All Rights Reserved. HL7 and Health Level Seven are registered trademarks of Health Level Seven International

© 2010 Health Level Seven ® International. All Rights Reserved. HL7 and Health Level Seven are registered trademarks of Health Level Seven International. Reg. U.S. TM Office.

Internet User Authorization (IUA)

Sub-Authorizations user would otherwise have Use-Case: Simple browser app, mobile application,

embedded device, and third party service Enables separation of concerns: User Identity, User

Authentication, User Delegation of their Rights… Authenticable claims: user identity, user authentication

mechanism, roles asserted, purpose of use asserted, policy pointers, ..

oAuth 2.0: JWT/SAML token - Can be proxied to SAML Authorization is from user perspective and may not be

same as resource perspective authorization

04/10/2317

Page 18: © 2010 Health Level Seven ® International. All Rights Reserved. HL7 and Health Level Seven are registered trademarks of Health Level Seven International

© 2010 Health Level Seven ® International. All Rights Reserved. HL7 and Health Level Seven are registered trademarks of Health Level Seven International. Reg. U.S. TM Office.

Resource – Security Tags

Developing story – stay tuned Leveraging existing work

Security/Privacy DAM DS4P – Metadata use IHE XD* metadata model Vocabulary (HL7, OASIS, ISO, etc)

Access Control engine – Uses FHIR API too FHIR resources have Provenance FHIR resources have Security Tags

04/10/2318

Page 19: © 2010 Health Level Seven ® International. All Rights Reserved. HL7 and Health Level Seven are registered trademarks of Health Level Seven International

© 2010 Health Level Seven ® International. All Rights Reserved. HL7 and Health Level Seven are registered trademarks of Health Level Seven International. Reg. U.S. TM Office.

User Management

Best Practice: Use federated identity Leverage security layer, abstract healthcare specifics from user management Internet or Corporate – oAuth or SAML

FHIR Servers need to be careful which Identity Providers they trust, and for what reason

Might be added to FHIR – for those that really want it, it should be there in a consistently usable way

04/10/2319

Page 20: © 2010 Health Level Seven ® International. All Rights Reserved. HL7 and Health Level Seven are registered trademarks of Health Level Seven International

© 2010 Health Level Seven ® International. All Rights Reserved. HL7 and Health Level Seven are registered trademarks of Health Level Seven International. Reg. U.S. TM Office.

The Role of the HL7 Security WG

HL7 Security Risk Assessment Process Provides training on the HL7 Risk

Assessment process Gives direct assistance to WGs during the

risk assessment process Liason to mHealth Liason to FHIR

2004/10/23

Page 21: © 2010 Health Level Seven ® International. All Rights Reserved. HL7 and Health Level Seven are registered trademarks of Health Level Seven International

© 2010 Health Level Seven ® International. All Rights Reserved. HL7 and Health Level Seven are registered trademarks of Health Level Seven International. Reg. U.S. TM Office.

Conclusion

Building off of advancements in general Internet Security Standards (HTTPS, oAuth, SAML, Dir) pluggable authentication

Building off of healthcare standards Layering Security in a way that is usable for many

Healthcare projects (Continua, DICOM, IHE, HL7) Embedding Security Tags into FHIR Resources FHIR – Security Audit Log Resource

04/10/2321

Page 22: © 2010 Health Level Seven ® International. All Rights Reserved. HL7 and Health Level Seven are registered trademarks of Health Level Seven International

© 2010 Health Level Seven ® International. All Rights Reserved. HL7 and Health Level Seven are registered trademarks of Health Level Seven International. Reg. U.S. TM Office.

Resources

HL7

* Security http://wiki.hl7.org/index.php?title=Security

* mHealth http://wiki.hl7.org/index.php?title=Mobile_Health

* FHIR Wiki http://wiki.hl7.org/index.php?title=FHIR

IHE

* web http://www.ihe.net/

* IHE Wiki http://wiki.ihe.net/

DICOM http://medical.nema.org/standard.html

My blog http://healthcaresecprivacy.blogspot.com/

04/10/2322