|
Discussions of Interoperability Exchange, Privacy, and Security in Healthcare by John Moehrke - CyberPrivacy. Topics: Health Information Exchange, Document Exchange XDS/XCA/MHD, mHealth, Meaningful Use, Direct, Patient Identity, Provider Directories, FHIR, Consent, Access Control, Audit Control, Accounting of Disclosures, Identity, Authorization, Authentication, Encryption, Digital Signatures, Transport/Media Security, De-Identification, Pseudonymization, Anonymization, and AI Transparency.
Friday, August 28, 2020
IHE ITI Supplements Updated
Thursday, August 13, 2020
FHIR Security and Privacy Tutorial
My slides are freely available on google sheets at this easy to type address http://bit.ly/FHIR-SecPriv. Each time I give the tutorial I update these master slides. So each time you go there you will see the latest set of slides. Some slides do have notes, and there are additional detail in slides that I don't cover during the tutorial.
I would prefer to give this tutorial in three parts, but typically only have two. If I could give it in three parts this would be the agendaPart 1 - Basics
- Security Principles
- Privacy Principles
- Basic Security and Privacy Considerations
- Anonymous Read
- Business Sensitive
- Individual Sensitive
- Patient Sensitive
- Not Classified
- HTTP[S] - TLS
- Authentication & Authorization
- SMART on FHIR
- IUA
- Mutual-Authenticated TLS
- Access Denied Responses
Part 2 - FHIR capability
- Provenance
- Basic
- Digital Signature
- Audit Logging
- Audit Reporting
- Audit Purging
- Consent - for Privacy
- HEART
- Attribute Based Access Control
- Security Tags
- Compartments / Clearance
- Obligations
- Break-Glass
- De-Identification
Part 3 - Practical application
- Multiple Organization Provider Directory
- using relational linking
- Multiple Organization Profile Directory
- using security tags as compartments with clearance
- Extra-Sensitive Treatment
- Share with Protections
- De-Identified Research
Thursday, July 30, 2020
Panel Moderation: ONC Tech Forum - Advancing Trust of Third-Party Applications
I have been asked to moderate the afternoon Track 3 on Monday (1:00-2:30 pm Eastern Time)
Track 3: API Standards and InnovationAdvancing Trust of Third-Party Applications: Issues and software solutionsThe 21st Century Cures Act Final Rule requires that Health IT Modules provide a standardized API for patient services, including the ability for patients to use third-party applications of their choice. This session will explore industry implications of direct-to-consumer health IT products, privacy and security policies and considerations for the future.
Thursday, June 18, 2020
IHE ITI Work Items summer 2020
IHE use of IG Build tool (not exclusively ITI, but we do dominate active members)
Tuesday, June 16, 2020
Web API security as foundation for #FHIR
Web API Security -- OWASP Top 10 Web Application Security Risks
- Injection. Injection flaws
- Broken Authentication.
- Sensitive Data Exposure.
- XML External Entities (XXE).
- Broken Access Control.
- Security Misconfiguration.
- Cross-Site Scripting XSS.
- Insecure Deserialization.
- Using Components with Known Vulnerabilities.
- Insufficient Logging & Monitoring.
OAuth 2.0 Security Best Current Practice
This document describes best current security practice for OAuth 2.0. It updates and extends the OAuth 2.0 Security Threat Model to incorporate practical experiences gathered since OAuth 2.0 was published and covers new threats relevant due to the broader application of OAuth 2.0.
IETF Best Current Practice in security
- BCP038 Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing
- BCP046 Recommended Internet Service Provider Security Services and Procedures
- BCP061 Strong Security Requirements for Internet Engineering Task Force Standard Protocols
- BCP072 Guidelines for Writing RFC Text on Security Considerations
- BCP106 Randomness Requirements for Security
- BCP136 Secure Connectivity and Mobility Using Mobile IPv4 and IKEv2 Mobility and Multihoming (MOBIKE)
- BCP140 Preventing Use of Recursive Nameservers in Reflector Attacks
- BCP188 Pervasive Monitoring Is an Attack
- BCP194 BGP Operations and Security
- BCP195 Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)
- BCP199 DHCPv6-Shield: Protecting against Rogue DHCPv6 Servers
etc...
Wednesday, April 8, 2020
Disaster use of HIE is a PurposeOfUse
The video gives a good background that is important. I will let the video describe it.
Essentially it is a very thin web front-end that enables authorized users to gain READ-ONLY access to health information on patients for Treatment use only. It thus needs to
- manage authorized sites using the access system. These sites need to be carefully managed to be quickly deployed, yet there needs to be confidence that when one site is deployed that it is authorized.
- manage users at that site. where these users are often temporary workers that have migrated to the disaster area to help out. Thus the system needs to provision user accounts, while making sure that policy and procedures assure that the users are all legitimate users
- track all users actions so that there is traceability and accountability
- patient discovery mechanism
- document discovery of list of documents
- display of user selected document
Putting it together using Interoperability
PurposeOfUse
Treatment
plus Disaster
UPDATED: I think Disaster PurposeOfUse could also be a signal that the retention of any data returned is only for the duration of the episode/encounter and no longer than the declared Disaster. If this is not folded into the PurposeOfUse of Disaster, then it needs to be addressed in the Disaster Site Certificate policy. Somehow retention is different, and as such needs to be expressed as different.
Write access
Tuesday, April 7, 2020
Privacy-Preserving Proximity Tracing -- well done #PbD
The use-case they are addressing is discovering who someone has been close to, when later that individual is found to be positive COVID-19 infected; while maintaining everyone's privacy.
Their documentation shows good design thinking and transparency of risks, mitigation, and residual. It shows that when one includes Privacy-By-Design from the beginning of a project, that one can preserve privacy while creating a system that meets needs. There is further FAQ on issues
Not only is this a good design of a system, it is excellent exemplar of a specification that includes Privacy Considerations and Security Considerations. These sections outline the persona of attackers, motivations of attackers, and methods these attackers might use. They then go into the design mechanisms that they have included to thwart these attacks. They do also include references to regulation/law that would be used against successful attackers. I like this inclusiveness of technical design and policy enforcement.
Some concerns I did not see addressed, although these seem small. These are more operational issues than privacy risks:
- They never express the storage usage on the mobile device. It seems that someone in a very populated area would harvest many EphID. So it is not clear how much storage space is needed. The nice part is that this is stored on the device. They do hint at this in a FAQ that asks about upload, where they express that some might need to upload 600MB daily, which tells me that I might need to store on my device 600MB * 14 day window = 8.5Gig. And this is with compression they outline. FAQ
- They did not address the risk that a mobile device will have some backup (or storage space harvesting) that might expose the data to those beyond the individual using the mobile device. They seem to expect that everyone has perfect control over their own device, which many flashlight applications have proven is a fallacy.
- They don't explain how the end-user is convinced that they have a distributed model of the solution and assured that there is not a centralized exposure. The security and privacy features they have put into place are hard to explain to a typical end-user. I think this is mitigated by the very nature that there is an application that must be installed for this to work. That application will be scrutinized by privacy and security professionals. And further if it is found to be not following the design, it can be revoked from the app-store.
- They don't address well the case where an attacker has motivation to monitor one individual. In this case the attacker can grab EphID for a very short time, where it is known only the targeted individual is present. Then monitor positive individuals looking only at that one targeted individual. Likely a high-value individual, so that kind of an individual should be careful in using this kind of an app. Note that high-value might be overall high-value, such as a sports figure; or may be a local high-value individual, like an estranged spouse.
- They indicate some location data would be recorded, but I couldn't find what that is. They only indicate that the EphID and gross time is captured. I think this is all that is needed, but it is not clear that is all they keep.
- Their proximity detection is only for proximity of the two humans. It does not address when an infected individual leaves virus behind that is picked up much later. The virus can survive in the air for a period of time, and on surfaces much much longer. So there will be many false-negatives.