According to the IHE ITI Technical Framework, Volume 2a, section 3.20 (Record Audit Event), table 3.20.6-1, the "Query Information" event note says
Notes: The general guidance is to log the query event withThis philosophy is why the PIX, PDQ, and XDS 'query' transactions, such as XDS "Registry Stored Query", security considerations only shows the query (parameters, and outcome indicator) being captured and not the query results. IHE did not duplicate this note in all the places where it shows query like transactions being profiled. A familiarization with section 3.20 is essential, and table 3.20.6-1 is critical as it contains a listing of the other security relevant events that are expected to capture if your "Secure".. "node/application" controls them.
the query parameters and not the result of the query. The
result of a query may be very large and is likely to be of
limited value vs. the overhead. The query parameters can be
used effectively to detect bad behavior and the expectation is
that given the query parameters the result could be
regenerated if necessary.
It is important to note that the "Query Information" audit event does include the "EventOutcomeIndicator", which will show that the query succeeded or failed. It is not an indicator of how many results were returned, so a successful query that returned zero results looks just like a successful query that returned 1 billion results. This means that the ATNA audit event can't be recorded until the results are known, or at least if the query is going to be successful or failure. Note that it is expected that an Access Control decision to deny a Query (resulting in zero results returned) would also be an auditable event, and thus an Access Control denied event would be recorded that would explain why.
The second sentence in the note is the 'reason' why we want only the Query to be recorded and not the results. The results would seem to be very useful, especially to a Privacy officer. But the results would likely be high-quality PHI; and we want to keep as much PHI out of the ATNA audit log as possible. This is why ATNA asks for identifiers and discourages descriptions. This is simply good design, to limit unnecessary risk. This greater phlosophy
The information that is not recorded can be discovered through other means. The ATNA Audit Record Repository is an abstract actor, it is fully expected that a valuable system/product would take many actors and functionality together. That is a good Audit Service would include an ATNA Audit Record Repository, but would also include a PIX Consumer, PDQ Consumer, PWP Consumer, XDS Consumer, and any other actors/functionality necessary to de-reference identifiers. This act of de-referencing the identifiers would be, Security Relevant and thus auditable. In this way there is built-in watching of the watchers.
Specifically in the case of XDS queries, that the Audit Service can tell simply by the Query parameters that are encoded into the ATNA Audit Message record of the XDS Query; which queries were against a specific patient. This is because all XDS queries are patient specific, and include the patient ID in the query parameters. Yes there are a few exceptions that are recognizable and handled independently.
If the security office or privacy office wants to know what the results of the query were, they can re-execute the query. With specialized (not IHE profiled) tools the query can even be with the same security context. Simplistically one would say that the state of the database has changed since the original query, this might be true; but good database design would also have a change-tracking-log that would tell you what has changed since the date/time stamp of the original query.
Note that this philosophy is consistent with the other transactions, it just needs to be spelled out somewhere for Queries. For example, on XDS Retrieve Document Set transaction, we don't tell you not to duplicate the bytes of the document retrieved into the ATNA audit message. This seems logical that one doesn't copy the retrieved document into the audit log. It just doesn't feel as logical when the transaction is a query.
All of this is 'systems design', and not necessary to include in the 'Interoperability Profiles'. This is because this systems design knowledge doesn't change the interoperability characteristics. IHE also doesn't include this systems design knowledge because there are likely many ways to design a system. IHE technical committees do consider systems design during profile writing, specifically we make sure that there is at least one way to design a system.
See:
Hi,
ReplyDeleteIf you could take a few minutes to answer my questions, I would really appreciate it.
Q) When should the Document Consumer Actor send the auditlog message (about 'registry stored query event') to the audit repository? Immediately after an request event occurs? or after recieved response occurs? or anytime?
Thank you in advance, happy new year...
The answer to "When" is a design question. As part of the design one will determine when they can fully populate the audit log message. Specifically as I indicated above the EventOutcomeIndicator is likely the last bit of information that you need to know before you can log the event. Clearly as soon as a failure happens, you can log the failure. But you can't log success until you know, within your design, that you have successfully received the response to your query. Where this is in your design will be different.
ReplyDeleteFor a Service: I would like to put it as close to after I have returned the results as I can, so that I can be sure that successful response was delivered. But depending on my design, I might record it as soon as I have determined that I will be able to return success, for example I have validated parameters and have entered the request into a high-reliable-command-queue.
For a Client: this typically isn't known until the response comes back and you parse the response.
No matter where I place it, my system will do it consistently. It is this consistency that the Security/Privacy office will use to recognize the pattern for my system. This normal pattern is what is compared to abnormal situations. Indeed showing a normal pattern is common in legal cases, where as showing code design is not.