OASIS -- http://www.oasis-open.org
The most technically detailed work is happening in a sub-workgroup in OASIS – XSPA. This group has profiles, and works with the SAML and XACML committees to examine the gaps they identify. Please see the XSPA home page on OASIS to understand more.
- OASIS Cross-Enterprise Security and Privacy (XSPA)
- OASIS Cross-Enterprise Security and Privacy Authorization (XSPA): WS-Trust Healthcare Profile.
- Cross-Enterprise Security and Privacy Authorization (XSPA) Profile of XACML v2.0 for Healthcare.
- Cross-Enterprise Security and Privacy Authorization (XSPA) Profile of Security Assertion Markup Language (SAML) for Healthcare.
- OASIS Privacy Management Reference Model (PMRM) TC
- Providing a guideline for developing operational solutions to privacy issues
- Just starting to form, so they are looking to healthcare as an area needing help
- Security TC http://www.hl7.org/Special/committees/secure/index.cfm
- Security Domain Analysis Model – With security use-cases
- http://wiki.hl7.org/index.php?title=Security_Use_Cases
- Emergency Access use-cases
- Permissions Catalog – a vocabulary of permissions necessary for RBAC
- Ontology project – Advancement from current Domain Analysis Model and Permissions Catalog
- Etc – see the committee web site
- CBCC TC http://www.hl7.org/Special/committees/homehealth/index.cfm
- Privacy Consent Directive CDA Implementation Guide.
- a structured document specification to exchange signed Privacy Consent Directives.
- confidentialityCode – a common attribute across many healthcare standards used to carry the data sensitivity and confidentiality classification. The vocabulary and understanding of this metadata label is evolving
- SOA - PASS http://hssp-security.wikispaces.com/
- Access Control - http://hssp-security.wikispaces.com/PASS_Access_Control
- Audit Logging - http://hssp-security.wikispaces.com/PASS_Audit
- Architecture Framework - http://hssp-security.wikispaces.com/PASS+Architecture+Framework
- ATNA - This is a comprehensive yet thin profile that indicates that Access Control, Audit Control, and Network Controls are important
- PWP - This is a very thin profile that simply says that for user directory, use LDAP
- EUA - Very thin profile that simply says to use Kerberos protocol for safely authenticating users inside of an enterprise
- XUA - Very thin profile that simply says to use SAML Identity Assertions for authenticating users on Cross-Enterprise transactions, updated with some options
- DSG - A profile of XML-Digital Signatures to provide long-term signature across a 'document'
- BPPC - A profile of a document that represents a patient agreeing to a privacy policy (e.g. Consent)
- ENC - new profile being worked on this year - Encryption of documents and removable media
- confidentialityCode - this is NOT a profile, but is a security/privacy concept built into almost all of the healthcare standards.
- De-Identification handbook - this is NOT a profile, but is a document being written this year.
- Cookbook: Preparing the IHE Profile Security Section - handbook used when IHE produces profiles to assure that the profile has examined security/privacy
- HIE Security and Privacy through IHE – white paper explaining how to use the IHE security / privacy profiles to build a health information exchange
- Access Control - White paper examining access controls in healthcare, specifically in a cross-enterprise federated use-cases.
- ISO/TS 13606-4:2009 Health informatics -- Electronic health record communication -- Part 4: Security
- ISO 17090-1:2008 Health informatics -- Public key infrastructure
- ISO/TS 21091:2005 Health informatics -- Directory services for security, communications and identification of professionals and patients
- ISO/TS 21298:2008 Health informatics -- Functional and structural roles
- ISO/TS 21547:2010 Health informatics -- Security requirements for archiving of electronic health records – Principles
- ISO/TS 22600-1:2006 Health informatics -- Privilege management and access control -- Part 1: Overview and policy management
- ISO 22857:2004 Health informatics -- Guidelines on data protection to facilitate trans-border flows of personal health information
- ISO/TS 25237:2008 Health informatics – Pseudonymization
- ISO 27799:2008 Health informatics -- Information security management in health using ISO/IEC 27002
- IEC 80001-1:2010 Application of risk management for IT-networks incorporating medical devices -- Part 1: Roles, responsibilities and activities
- Etc…
New development in this group has stopped, but some of the documents are still useful as references.
- E1762-95(2009) Standard Guide for Electronic Authentication of Health Care Information
- E1869-04(2010) Standard Guide for Confidentiality, Privacy, Access, and Data Security Principles for Health Information Including Electronic Health Records
- E1985-98(2005) Standard Guide for User Authentication and Authorization
- E1986-09 Standard Guide for Information Access Privileges to Health Information
- E2147-01(2009) Standard Specification for Audit and Disclosure Logs for Use in Health Information Systems
- E2595-07 Standard Guide for Privilege Management Infrastructure
Government Initiatives
One of the potential areas where there might be more mature modeling done is in specific countries such as Canada or regions like EU. I know people involved in Canada and EU, but the work is not yet fully public. This is expected to be made public soon.
- Europe -- epSOS -- http://www.epsos.eu/
- Canada -- http://www.infoway-inforoute.ca/
- USA
- Historic – http://www.hitsp.org – Work stopped in 2010
- Capability 143 - Manage Consumer Preference and Consents
- SC108 Access Control Service Collaboration
- TP20 HITSP Access Control Transaction Package
- TP30 HITSP Manage Consent Directives Transaction Package
- Uses IHE BPPC and HL7 Consent
- SC109 Security Audit Service Collaboration
- Uses IHE ATNA
- TN900 HITSP Security and Privacy Technical Note
- Etc…
- Current - http://jira.siframework.org/
- Direct Project – low technology solution to get healthcare providers started sharing healthcare documents
- http://directproject.org/
- Nothing more than an endorsement of S/MIME with a recommendation to use IHE XDM content packaging
- All Access Controls are considered 'pre-conditions'
- NwHIN Exchange – Comprehensive Health Information Exchange to cover whole USA
- http://healthit.hhs.gov/portal/server.pt/community/healthit_hhs_gov__nhin_exchange/1407
- This uses the HITSP work specific to a cross-community exchange
- Many resources at http://healthit.hhs.gov/portal/server.pt/community/healthit_hhs_gov__nhin_resources/1194
- DURSA 2009 Version for Production Pilots
- Policy for Participation Changes Suspension and Termination
- NHIN Data Use and Reciprocal Support Agreement Amendment Process
- Breach Notification
- Access Consent Policies Production Specification
- Authorization Framework Production Specification
- Consumer Preferences
- Etc...
- New S&I Framework development
- This is the focus of the primarily web site. No security or privacy yet.
- Meaningful Use
- NOTHING useful here - total absence of Access Controls
- NIST - I know I should put this under USA government initiatives, but these come out of the core of NIST
- NIST IR 7497 Security Architecture Design Process for Health Information Exchanges (HIEs) nistir-7497.pdf
- The Exchange Of Health Information: Designing A Security Architecture To Provide Information Security And Privacy november2010-bulletin.pdf
Conclusion:
So, that is quite a bit... I still think that the IHE White paper on Access Controls is the best overall introduction to the details of Federated Access Controls. I think then the NHIN-Exchange has the most mature implementation of this using the IHE BPPC, IHE XUA and OASIS XSPA. This is good work, good-enough to get started on. There are known gaps in the area of perfection and a need to mature the space. I suspect that this will take many more years.
Of course my blog is full of discussion of all of these things. I often find myself using the search bar to find these discussions. It feels good when I find I can reuse an old blog post, which is exactly the reason I started this blog.
Glen,
ReplyDeleteThanks for the softball pitch... There is no formal coordination of any of these. There is about a handful of individuals that cross-participate in these workgroups. I think I am actually alone in participating in all of them.
There is not much from NEMA on Access Controls (see http://healthcaresecprivacy.blogspot.com/2011/02/medical-device-security-and-privacy.html)
I am not aware of anything from HIMSS Security Steering Committee... I am a HIMSS member, but am unaware of that committee.
I really don't see too much of a need today for 'interoperable' or 'standards based' access control. Yes we need standards based interoperable user-identity, user-authentication, user-context-assertions, and consent-management; which we have. But the actual access control engine could be anything as long as it actually enforces the policies.
What do you think of the Common Event Expression (CEE™) initative ?
ReplyDeletehttp://cee.mitre.org/about.html
Lmoisan,
ReplyDeleteI am monitoring the CEE initiative. I had high hopes when it kicked off, but am not so excited about it now. I have sent them the IHE ATNA work multiple times, but they keep ignoring it. I never figured they would adopt it, but I think they could learn something by pulling it apart.
Right now they are doing the typical thing for a committee made up of highly funded contractors. They are not focused, nor do they have a goal.