Description. Information exposure through query strings in URL is when sensitive data is passed to parameters in the URL. This allows attackers to obtain sensitive data such as usernames, passwords, tokens (authX), database details, and any other potentially sensitive data.
Do you have any thoughts or guidance on this topic? Break the standard (and REST) and implement these GETs as POSTs? Create a proxy table that maps sensitive ids to external ids and require the usage of the external id on the query parameter?
OWASP is fantastic resource. Everyone should use it.
However on the topic of GET vs POST for search in FHIR, I do have some further emphasis and guidance:
The FHIR core specification addresses the basic support, and thus why Search is supported on POST as well as GET. All the examples are using GET, but that is just because it is easier to show in examples.
The OWASP article does recognize that using TLS is helpful against untrusted infrastructure. Fully protecting against them. Communications about patient data better be protected using TLS as any request (GET or POST) will be returning patient data, thus the query parameters are just as vulnerable as the query response. So, using TLS will prevent all of the Internet infrastructure from grabbing any patient identity or sensitive data.
The problem, as the OWASP article points out is that logging or inspection might happen on the Client or on the Server on either end of the TLS communication. What they don't say in the OWASP article is that the vulnerability is due to failure to secure the endpoints. Again, patient data will be flowing, so to be worried about query parameters and not data is silly. Either an endpoint is designed and secured properly, or it should not be trusted with patient data. So the distinction between POST and GET is really odd. You either have control and can be trusted; or you don't have control and not trusted. If you can't be trusted with GET then you can't be trusted with POST.
Body logging
If your logging is out-of-control, then I assert you must assume your audit logs are recording the content of the body. Thus the POST body is logged, as is the Response body.
Protect the whole System
Servers can certainly protect themselves fully. Any logging can be controlled to log high quality logs and protect the log storage and access fully, or to not log anything. We are trusting these servers to have secured patient data, so certainly they should be expected to be able to securely store log files too. Even cloud based servers that have scale functionalities can be properly secured. If you just secure your database engine, then you have not secured your server. You must secure everything, not just the easy stuff.
So, clients are the biggest exposure point. Applications (aka not browser hosted code) have full control of their environment and thus can also be designed to NOT log things.
Browser apps that leverage the browser for display and networking are not securable, at all! They should not be trusted with patient data, say nothing about allowing them to use GET vs POST. The exception that is often allowed is when the whole client computer is controlled, such as a Clinician application. So, are browser apps forbidden, no. But, like Servers a whole Client can be secured. If the whole Client is secured then there is no problem, if anything in the Client isn't secured then the patient data is just as at risk as the logs.
Any service, intermediary, or client that can't be trusted to maintain secure logs should not be trusted at all. Anyone that puts patient data on a service that can't maintain logs securely is the actual problem.Anyone that allows a insecure client to gain access to patient data is the actual problem.
Patients have rights
Note one exception that as a Patient advocate I must remind everyone... Patients are empowered to make stupid decisions for themselves. It is useful to explain that the patient has chosen an insecureable client, but it is not proper to forbid using the application the patient has chosen. In this case the patient has the right. Privacy Principles favor giving the data to the patient over using security as an excuse to not give them the data. Warn the patient first, but if they say they understand and really want it to happen, then do it.
Not all of FHIR is patient data
That said, there are many uses of FHIR that are not about patient identifiable data. Infrastructure resources, Directory resources, vocabulary resources, definitional resources, etc.
And there are uses of FHIR on synthetic data, or properly de-identified data.
Conclusion
I have rallied against this security theatre against GET. POST is not more secure than GET. It is not. In fact GET enables better, for example in that it supports cache control with trusted infrastructure. GET is also expressly idempotent, where POST is not explicitly (although POST search very likely is).
Comment with arguments for/against this position. I feel confident, but I also know that I don't know everything.
I agree, but the way people are fixed to this speaks to a lack of confidence in managing log access. Which is typically true for general web servers, but cannot be true for servers handling PHI / Clinical data
Note that FHIR Paging forces the use of GET for next / previous page. So, one needs to address securing GET
Note that POST URL parameters are part of the http specification. So just changing to POST changes nothing. One must change to POST NOT using URL parameters, but content type application/x-www-form-urlencoded with the parameters in the body.
This article summarizes a concept that came from my blog reader. This is actually published in a personal Implementation Guide at -- https://johnmoehrke.github.io/RelatedPersonConsent/ . This concept has not been proposed as a formal work item, but I think it would fit nicely in IHE Basic Patient Privacy Consents for Mobile that I have proposed (more on that soon).
This IG focuses on a use-case where the existence of a representative (e.g. guardian) is backed by a rationale and agreement from the Patient. Specifically some cases:
When the Patient is a minor and the representative is a parent.
When an adult Patient is physically or mentally competent, but still wants to appoint a representative to manage his/her medical records (e.g., a Lawyer).
When the Patient does not have competency to manage their medical records, thus some representative is assigned.
When the courts appoint a representative.
There may be more, but this list gives us a set of perspectives upon the reason why there is a need for a Consent to back the representative.
Thus
Patient resource is used to identify the Patient
RelatedPerson resource is used to identify the representative
Consent resource is used to document the Patient agreement with the representative. This might further be used in advanced cases to define what the RelatedPerson is allowed to do, and thus differentiate between multiple RelatedPerson resources a division of responsibilities.
Relationship between RelatedPerson and Consent
The RelatedPerson resource would be the way that most will document a relationship between a patient and a representative (e.g., guardian). It is a clear link between the Patient and the other person. However the RelatedPerson does not have anywhere to explain the details of why the relationship exists, or any conditions on the relationship. There is a RelatedPerson.relationship that can be used to differentiate some roles, but this is very coarse level.
RelatedPerson.relationship has a clear code for Father, Mother, etc.
It is not clear to me that the RelatedPerson needs to have some indication that there is a Consent explaining the rationale. One would determine this by searching for Consents that point at the RelatedPerson instance. It is possible that the RelatedPerson.relationship could hold normal codes explaining the relationship, and one more that indicates that a rationale is available. Not clear that is proper or needed. It is also possible that there should be an element in RelatedPerson to point at the Consent, but I am not sure yet about that either.
Thus for any given RelatedPerson, one can look for Consent.provision.actor.references that include the RelatedPerson.id value. this can be done by searching on Consent using the actor parameter:
GET [path]/Consent?actor=RelatedPerson/1234
might be good to make sure the Consent is for that patient, and that the Consent is PERMITing that RelatedPerson… etc…
There are other rules that might be possible to do with invariants, but I just itemize them:
The RelatedPerson.patient must be the same as the Consent.patient
The Consent.provision.agent.reference must be the same as the RelatedPerson.id
The Consent is authorizing (permit) the RelatedPerson, and is not expired.
Authorizing Consent Extension
This may seem cumbersome, so I was thinking that an extension in RelatedPerson that explicitly points at the Consent would be more appropriate.
Note that this extension does make the creation of the Consent and RelatedPerson resources difficult as they both reference each-other. Thus from a purely REST perspective one needs to create the RelatedPerson resource, then create the Consent that points at the RelatedPerson, then UPDATE the RelatedPerson to add the extension that points back at the Consent. This kind of double pointers is discouraged in REST and in FHIR.
Consent profiling
As with any Consent, often there is paperwork that ultimately holds the legal details. This legal paperwork is critical to overall legal precedent, and represents the ceremony of the act of consent from the patient. These details should be captured by a DocumentReference and Binary. The Consent.sourceReference would then point at that DocumentReference. (Could use Consent.sourceAttachment, but I am not a fan of bloating the Consent with that detail).
The Consent then would need to be profiled. The main difference from the FHIR core Consent I outlined in my Consent article is that this might be a specific kind of Privacy Consent delegating authority, and the RelatedPerson instance would be indicated specifically in the .provision.agent.
status - would indicate active
category - would indicate patient consent, specifically a delegation of authority
patient - would indicate the Patient resource reference for the given patient
dateTime - would indicate when the privacy policy was presented
performer - would indicate the Patient resource if the patient was presented, a RelatedPerson for parent or guardian
organization - would indicate the Organization that presented the privacy policy, and that is going to enforce that privacy policy
source - would point at the specific signed consent by the patient
policy.uri - would indicate the privacy policy that was presented. Usually, the url to the version-specific policy
provision.type - permit - given there is no way to deny, this would be fixed at permit.
provision.agent.reference - would indicate the RelatedPerson resource
provision.agent.role - would indicate this agent is delegated authority
In the case where the court or some actor that is not the Patient is compelling the RelatedPerson relationship, then the Consent.performer would indicate that the Patient is not the one granting the relationship, but rather the guardian or the courts.
using Consent to enable access control
One advantage of using a Consent resource as defined here is that there would be a natural set of provisions in a Consent that would be processable by an Access Control engine that understands Consent. This Access Control engine would not need to understand RelatedPerson, other than to know that a given user is a RelatedPerson (vs Patient, Person, Practitioner, etc). Thus the Consent.permit rules are used to mediate access to that Patient’s data by that given user.
Consideration
Given this setup, a newborn would need a Consent drafted as soon as that newborn has a Patient resource to enable the parents’ access. This could be done by the system creating the newborn Patient resource. This could also be done using Implied Consent mechanisms, which is a default policy that is used when no Consent exists for a given Patient->agent relationship.
Same is true for any new Patient for which there is some precedent for implied consent representative.
Forcing a Consent to exist does prove that the representative relationship is explicit, and is thus more transparent. Implied representative relationships are common, but not very transparent.
Workflow of capturing the Consent
The Consent resource is not intended to be used to drive the workflow of the capturing of the Consent. The Consent is following the “Event Pattern”, which means that it is the output of an event. The workflow that preceded this event would need to be managed by other resources in the Request pattern
The Task resource is generic and can do this work. There are some specializations of Task, so we could end up at some kind of a Task derivative that is specific to the workflow leading up to a Consent. However it is first best to see if Task can be profiled to address the workflow.
For example a use-case where the Patient nominates a potential Person to become their RelatedPerson; that triggering a GP to review and approve it; that triggering some legal review and approval; resulting in a Consent instance and the creation of the RelatedPerson. This workflow could be profiled into an ActivityDefinition… I like the power of this modeling concept, but have not done it formally so am not sure of all the possible issues.
Note we have tried to keep workflow states out of the Consent.status; but some states have gotten in that I don’t think are proper. But at this time we allow them in until there is a more formal task flow.
Examples
There is a basic example of a Patient delegating their father as their RelatedPerson. The resource objects are clickable to their examples.
Everywhere -- virtual -- anywhere around the globe or space-stations
Many FHIR based IHE - Profiles (Implementation Guides) will be tested, in addition to the other popular Interoperability specifications from IHE. There will even be some testing of HL7 published Implementation Guide.
I will be present in Atlanta, as hard as I have tried to be sent to Switzerland.
IHE, especially the IT-Infrastructure domain, has been publishing specifications in HTML format and Implementation Guide format on a new web site -- https://profiles.ihe.net.
This web site is enabled with Google Analytics. Thus there is some data available that indicates which parts of the IT-Infrastructure specifications are of interest. Presuming they are interesting because they are used. Google Analytics data is not perfect, there will be no analytics from people using script blocking Browsers. So, there is likely 25% more activity than the analytics show.
Just looking at the data for May 2022. The first view is that the IHE specifications are of global interest. This is dominated by the USA, but is quickly followed by Germany, Italy, France, India, Netherlands, Austria, China, Canada, and Switzerland. From the picture, there is interest almost everywhere. Actually, I wonder why not everywhere?
The next perspective is to just growth over time. So over the month of May the number of users (as defined by google analytics, don't ask me to explain that) is growing. Fun part of this diagram is the purple line that shows that the readership does indeed, mostly, take the weekends off.
Last perspective is to simply look at the traffic per page, as viewed as traffic interest per Profile/Specification. So the following is the ranked list of IT-Infrastructure Profiles in the order. I have included some fun graphics. No, I am not going to explain the graphics. Note that 40% of these are #FHIR based.
The HL7 FHIR Security & Privacy online class describes how to protect a FHIR server (through access control and authorization), how to document what permissions a user has granted (consent), how to enable appropriate access by apps and users and how to keep records about what events have been performed (audit logging and provenance).
This will be a refreshed version of the Tutorial I have given annually to HL7 2021, 2020, and 2019. Each year I do update and enrich the content. More, if you ask questions.
My slides are freely available on google slides at this easy to type address http://bit.ly/FHIR-SecPriv. Each time I give the tutorial I update these master slides. So each time you go there you will see the latest set of slides. Some slides do have notes, and there are additional detail in slides that I don't cover during the tutorial.
In the past, I have had to compress these into two parts, but will be able to give them in the natural three parts
Part 1 - Basics
Security Principles
Privacy Principles
Basic Security and Privacy Considerations
Anonymous Read
Business Sensitive
Individual Sensitive
Patient Sensitive
Not Classified
HTTP[S] - TLS
Authentication & Authorization
SMART on FHIR
IUA
Mutual-Authenticated TLS
Access Denied Responses
Part 2 - FHIR capability
Provenance
Basic
Digital Signature
Audit Logging
Audit Reporting
Audit Purging
Consent - for Privacy
HEART
Permission
Attribute Based Access Control
Security Tags
Compartments / Clearance
Obligations
Break-Glass
De-Identification
Part 3 - Practical application
Multiple Organization Provider Directory
using relational linking
Multiple Organization Profile Directory
using security tags as compartments with clearance