32
Audit Trail and Node Authentication Robert Horn Agfa Healthcare

Audit Trail and Node Authentication Audit Trail and Node Authentication Robert Horn Agfa Healthcare

Embed Size (px)

Citation preview

Page 1: Audit Trail and Node Authentication Audit Trail and Node Authentication Robert Horn Agfa Healthcare

Audit Trail and Node AuthenticationAudit Trail and Node Authentication

Robert HornAgfa Healthcare

Page 2: Audit Trail and Node Authentication Audit Trail and Node Authentication Robert Horn Agfa Healthcare

June 28-29, 2005 Interoperability Strategy Workshop2

IT Infrastructure Security IT Infrastructure Security ProfilesProfiles

2004 Consistent Time (CT) Enterprise User Authentication (EUA)

2005Audit Trail and Note Authentication (ATNA)

2006Cross-Enterprise User Authentication (XUA)Document Digital Signature (DSG)

Page 3: Audit Trail and Node Authentication Audit Trail and Node Authentication Robert Horn Agfa Healthcare

June 28-29, 2005 Interoperability Strategy Workshop3

Assets being ProtectedAssets being Protected

• All security systems exist to protect some asset. IHE follows the legal, regulatory, and medical ethics selection of assets:– Patient and staff safety– Patient and staff health– Patient and staff privacy

Page 4: Audit Trail and Node Authentication Audit Trail and Node Authentication Robert Horn Agfa Healthcare

June 28-29, 2005 Interoperability Strategy Workshop4

Consistent Time (CT)Consistent Time (CT)

• Network Time Protocol ( NTP) version 3 (RFC 1305) • Actor must support manual configuration:

– Manual IP address or hostname for time server– preferably 3 or more servers should be supported– Automatic discovery and broadcast will not be tested

• Required accuracy: 1 second• Optional Secure NTP may be tested• Required for use of ATNA, EUA, XUA. All time tags must

be time synchronized.• See http://www.ntp.org for extensive technical details on the

protocol, and your vendor documentation for installation and configuration.

Page 5: Audit Trail and Node Authentication Audit Trail and Node Authentication Robert Horn Agfa Healthcare

June 28-29, 2005 Interoperability Strategy Workshop5

Compatibility with RadiologyBasic Security

• “But, what if I already have systems that support Basic Security?”– ATNA + Radiology Option is backward compatible with Basic Security

– Integration Statements should change support claim from “Basic Security” to “Radiology Option for ATNA”

– For some actors there will be scenario requirements for the connectathon. This emulates having a hospital security office setting a security policy. It is not an official recommendation that these requirements are universally applicable.

Page 6: Audit Trail and Node Authentication Audit Trail and Node Authentication Robert Horn Agfa Healthcare

June 28-29, 2005 Interoperability Strategy Workshop6

ATNAATNAIHE GoalIHE Goal

• IHE makes cross-node security management easy:– Only a simple manual certificate installation is needed,

although more sophisticated systems (LDAP, PKI) can be used.

– Implementations should separate the authentication, authorization, and accountability functions to accommodate the needs of different locations.

– Enforcement is driven by ‘a posteriori audits’ and real-time visibility, not detailed access controls.

Page 7: Audit Trail and Node Authentication Audit Trail and Node Authentication Robert Horn Agfa Healthcare

June 28-29, 2005 Interoperability Strategy Workshop7

ATNAATNANetwork EnvironmentsNetwork Environments

• Physically secured networks• Explicit physical security preventing access by other nodes, or• VPN and VLAN technologies that provide equivalent network

isolation.• Encryption is not required, only host authentication.

• Protected networks• Physical security that prevents modification or installation of

unauthorized equipment• The network is shared with other authorized nodes within the

enterprise that should not have unrestricted access to patient information.

• Encryption is required.

Page 8: Audit Trail and Node Authentication Audit Trail and Node Authentication Robert Horn Agfa Healthcare

June 28-29, 2005 Interoperability Strategy Workshop8

ATNAATNANode SecurityNode Security

• ATNA specifies some of the capabilities that are needed, e.g. access control. But:– ATNA does not specify policies– ATNA does not specify mechanisms, although

other IHE protocols like EUA are obvious candidates.

• Connectathon performs only rudimentary validation of node security functions.

Page 9: Audit Trail and Node Authentication Audit Trail and Node Authentication Robert Horn Agfa Healthcare

June 28-29, 2005 Interoperability Strategy Workshop9

ATNAATNANode AuthenticationNode Authentication

• X.509 certificates for node identity and keys• These will be provided at the Connectathon and may change

during the connectathon.

• TCP/IP Transport Layer Security Protocol (TLS) for node authentication, and optional encryption

• Actor must be able to configure certificate list of authorized nodes.

• The connectathon validates use of an explicit list of certificates for authorized machines.

• ATNA presently specifies mechanisms for HTTP, DICOM, and HL7

Page 10: Audit Trail and Node Authentication Audit Trail and Node Authentication Robert Horn Agfa Healthcare

June 28-29, 2005 Interoperability Strategy Workshop10

Why node authentication?Why node authentication?

• Many systems are shared access, e.g. CT systems, where the machine identity is more important than the operator’s identity for security purposes.

• A CT operator is only permitted to update CT records from a CT system.

• Some systems operate autonomously, e.g. PACS archive.• Knowing identity of the PACS administrator on duty is not useful

when monitoring PACS activity. There might be nobody logged in.

• Machine access is usually controlled by the site administration.

• Even authorized users are not permitted to use personal machines.

Page 11: Audit Trail and Node Authentication Audit Trail and Node Authentication Robert Horn Agfa Healthcare

June 28-29, 2005 Interoperability Strategy Workshop11

ATNAATNAAuditing SystemAuditing System

• Designed for surveillance rather than forensic use.• Two audit message formats

– IHE Radiology interim format, for backward compatibility with radiology

– IETF/DICOM/HL7/ASTM format, for future growth• DICOM Supplement 95• IETF RFC-3881 for Common Audit Message• ASTM E.214• HL7 Audit Informative documents

• Both formats are XML encoded messages, permitting extensions using XML standard extension mechanisms.

Page 12: Audit Trail and Node Authentication Audit Trail and Node Authentication Robert Horn Agfa Healthcare

June 28-29, 2005 Interoperability Strategy Workshop12

State of the Message StandardsState of the Message Standards

• Interim IHE format, mature but limited to only basic radiology uses

• IETF Audit message format (RFC-3881) • Stable, generic

• See www.xml.org/xml/schema/7f0d86bd/healthcare-security-audit.xsd

Page 13: Audit Trail and Node Authentication Audit Trail and Node Authentication Robert Horn Agfa Healthcare

June 28-29, 2005 Interoperability Strategy Workshop13

State of the Message StandardsState of the Message Standards

• DICOM Supplement 95– RFC-3881format specialized to cover activities by

imaging equipment– Frozen Draft for trial implementation

• The purpose of frozen draft is to find mistakes through trial implementations like this IHE Connectathon.

• There have been mistakes found already.• More mistakes will be found, please report them as you find

them.• There is a review scheduled for November 2005 by the

DICOM committee to make fixes and assess whether it is ready to publish as a standard.

Page 14: Audit Trail and Node Authentication Audit Trail and Node Authentication Robert Horn Agfa Healthcare

June 28-29, 2005 Interoperability Strategy Workshop14

State of the Message StandardsState of the Message Standards

• IHE Technical Framework• First effort at detailing non-imaging activities

• The purpose of frozen draft is to find mistakes through trial implementations like this IHE Connectathon.

• There have been mistakes found already.

• More mistakes will be found, please report them as you find them.

Page 15: Audit Trail and Node Authentication Audit Trail and Node Authentication Robert Horn Agfa Healthcare

June 28-29, 2005 Interoperability Strategy Workshop15

First MistakeFirst Mistake

• Both DICOM Supplement 95 and IHE Technical Framework use:

• EventID

– And should have used• EventTypeCode

Page 16: Audit Trail and Node Authentication Audit Trail and Node Authentication Robert Horn Agfa Healthcare

June 28-29, 2005 Interoperability Strategy Workshop16

ATNAATNAAuditable EventsAuditable Events

Actor-start-stop The starting or stopping of any application or actor.

Audit-log-used Reading or modification of any stored audit log

Begin-storing-instances The storage of any persistent object, e.g. DICOM instances, is begun

Health-service-event Other health service related auditable event.

Instances-deleted The deletion of persistent objects.

Instances-stored The storage of persistent objects is completed.

Page 17: Audit Trail and Node Authentication Audit Trail and Node Authentication Robert Horn Agfa Healthcare

June 28-29, 2005 Interoperability Strategy Workshop17

ATNAATNAAuditable EventsAuditable Events

Medication Medication is prescribed, delivered, etc.

Mobile-machine-event Mobile equipment is relocated, leaves the network, rejoins the network

Order-record-event An order is created, modified, completed.

Patient-care-assignment Patient care assignments are created, modified, deleted.

Patient-care-episode Auditable patient care episode event that is not specified elsewhere.

Patient-record-event Patient care records are created, modified, deleted.

Page 18: Audit Trail and Node Authentication Audit Trail and Node Authentication Robert Horn Agfa Healthcare

June 28-29, 2005 Interoperability Strategy Workshop18

ATNAATNAAuditable EventsAuditable Events

PHI-export Patient information is exported outside the enterprise, either on media or electronically

PHI-import Patient information is imported into the enterprise, either on media or electronically

Procedure-record-event A procedure record is created, modified, or deleted.

Query-information Any auditable query not otherwise specified.

Security-administration Security alerts, configuration changes, etc.

Study-object-event A study is created, modified, or deleted.

Study-used A study is viewed, read, or similarly used.

Page 19: Audit Trail and Node Authentication Audit Trail and Node Authentication Robert Horn Agfa Healthcare

June 28-29, 2005 Interoperability Strategy Workshop19

Audit Events for XDSAudit Events for XDS

• The primary audit events for XDS transactions are:– PHI Import (e.g., when data is obtained from the

Repository/Registry)– PHI Export (e.g., when a submission set is provided to the

Repository/Registry)

• Details of affinity domain organizational boundaries determine which activities are imports and exports.

• Other audit events, e.g., user login, also must be reported.• There is a separate audit repository for each organization.

There is not one audit repository for the entire affinity domain.

Page 20: Audit Trail and Node Authentication Audit Trail and Node Authentication Robert Horn Agfa Healthcare

June 28-29, 2005 Interoperability Strategy Workshop20

ATNAATNARecord Audit EventRecord Audit Event

• Reliable Syslog (RFC 3195) is the new transport for Audit Records, although BSD Syslog protocol (RFC 3164) is permitted for backward compatibility with Radiology Basic Security.

• RFC 3195 implementations exist, but they are new and limited. Some vendors may to prefer RFC 3164 until there are multiple third party implementations of 3195 available.

• RFC 3195 may evolve based on industry experience with the new implementations.

• The primary gain from RFC 3195 is guaranteed reliability and security. RFC 3164 is subject to data loss on overloaded networks and eavesdropping on unprotected networks.

Page 21: Audit Trail and Node Authentication Audit Trail and Node Authentication Robert Horn Agfa Healthcare

June 28-29, 2005 Interoperability Strategy Workshop21

An exampleAn example

• The following is an example of messages that might be generated during a routine imaging examination.

• Scenarios are being prepared for some connectathon workflows.

• Contributions to scenarios are welcomed, especially for the newer IHE disciplines where there is less experience with auditing. Only IHE Radiology has multi-year experience with its use.

Page 22: Audit Trail and Node Authentication Audit Trail and Node Authentication Robert Horn Agfa Healthcare

June 28-29, 2005 Interoperability Strategy Workshop22

A Study is OrderedA Study is Ordered

Order Record created:

Identify the person and/or process creating the order

Identify the patient

Note, this is just a security and privacy log so other order details are not needed.

XYZ Actor “Order Record”

Page 23: Audit Trail and Node Authentication Audit Trail and Node Authentication Robert Horn Agfa Healthcare

June 28-29, 2005 Interoperability Strategy Workshop23

Modality ActivityModality Activity

• This is issued only by the DSS/Order Filler, not by the modalities.

• Shows:• Identity of Querying Machine

• Identity of Local responding process

• Query description and contents

DSS/OrderFiller

“Query”

Page 24: Audit Trail and Node Authentication Audit Trail and Node Authentication Robert Horn Agfa Healthcare

June 28-29, 2005 Interoperability Strategy Workshop24

Patient Arrives and is MedicatedPatient Arrives and is Medicated

• Several events are generated:• The patient record is read, • The order is read, • The procedure record is created, and• Medication is given

• The audit reports indicate the persons and/or processes, and the patient involved.

ABC Actor

“Order Record”

“Procedure Record”

“Medication Event”

“Patient Record”

Page 25: Audit Trail and Node Authentication Audit Trail and Node Authentication Robert Horn Agfa Healthcare

June 28-29, 2005 Interoperability Strategy Workshop25

The study is performedThe study is performed

EvidenceCreator

“Begin Transferring Instances”

“Procedure Record”

“Procedure Record”DSS/

Order Filler

Image Manager/Image Archive

“Instances Transferred”

“Order Record”

Page 26: Audit Trail and Node Authentication Audit Trail and Node Authentication Robert Horn Agfa Healthcare

June 28-29, 2005 Interoperability Strategy Workshop26

Study PerformedStudy Performed

• The Procedure Records track the progress of the MPPS

• The Instances audit records track the progress of the data

• The order record reflects the updated order status on completion of the study

Page 27: Audit Trail and Node Authentication Audit Trail and Node Authentication Robert Horn Agfa Healthcare

June 28-29, 2005 Interoperability Strategy Workshop27

The study is read (examine data)The study is read (examine data)

ReportCreator

“Begin Transferring Instances”

“Instances Accessed”

“Study Deleted”

“Procedure Record”

Image Manager/Image Archive

“Instances Transferred”

“Query Record”

Page 28: Audit Trail and Node Authentication Audit Trail and Node Authentication Robert Horn Agfa Healthcare

June 28-29, 2005 Interoperability Strategy Workshop28

The Study is readThe Study is read

• This shows the DICOM evidence related transactions.

• The image manager reports the queries to find the patient record (from a person or prefetch process) and the studies sent to the workstation.

• The workstation reports the studies received, the studies examined, the update to procedure status, and the final deletion of the unneeded copies of the studies. These are at the level of studies examined, not a detailed listing of each image examined.

Page 29: Audit Trail and Node Authentication Audit Trail and Node Authentication Robert Horn Agfa Healthcare

June 28-29, 2005 Interoperability Strategy Workshop29

The study is read (deliver report)The study is read (deliver report)

ReportCreator

“Begin Transferring Instances”

“Procedure Record”

Report Manager

“Instances Transferred”

“Order Record”

Page 30: Audit Trail and Node Authentication Audit Trail and Node Authentication Robert Horn Agfa Healthcare

June 28-29, 2005 Interoperability Strategy Workshop30

The study is read (deliver report)The study is read (deliver report)

• This shows the activity tracking the resulting report:– The report writer reads the procedure schedule,

transfers a report to the report manager, and updates the procedure status.

– The report manager receives the finished report, and updates the order status.

Page 31: Audit Trail and Node Authentication Audit Trail and Node Authentication Robert Horn Agfa Healthcare

June 28-29, 2005 Interoperability Strategy Workshop31

What it takes to be a secure nodeWhat it takes to be a secure node

• The entire host must be secured, not just individual actors.

• The entire host must have appropriate user access controls for identification, authentication, and authorization.

• All communications that convey protected information must be authenticated and protected from interception. This means every protocol, not just the IHE transactions.

• All health information activities should generate audit trails, not just the IHE actors.

Page 32: Audit Trail and Node Authentication Audit Trail and Node Authentication Robert Horn Agfa Healthcare

June 28-29, 2005 Interoperability Strategy Workshop32

What it takes to be a secure nodeWhat it takes to be a secure node

• The Secure node is more than add-on auditing capability. The complete work effort includes:

• Deciding what events should be auditable• Instrumenting all applications to detect auditable events and

generate audit messages.• Ensuring that all communications connections are protected.• Establishing a local security mechanism to protect all local

resources.• Establishing configuration mechanisms for:

– Time synchronization using Consistent Time (CT) profile– Certificate management– Network configuration