Managing Trust in e-health with Federated Identity Management



Similar documents
Privacy, Security, and Trust with Federated Identity Management

Nationwide and Regional Health Information Networks and Federated Identity for Authentication and HIPAA Compliance

This way, Bluewin will be able to offer single sign-on for service providers within the circle.

Case Study: SSO for All: SSOCircle Makes Single Sign-On Available to Everyone

LIBERTY ALLIANCE. Case Study: Aetna Enhances Secure Provider Portal with SSO and SAML 2.0. The Company. Key Objectives

FIVE KEY CONSIDERATIONS FOR ENABLING PRIVACY IN HEALTH INFORMATION EXCHANGES

Biometrics and National Strategy for Trusted Identities in Cyberspace Improving the Security of the Identity Ecosystem September 19

Evaluation of different Open Source Identity management Systems

Securing The Cloud With Confidence. Opinion Piece

Preemptive security solutions for healthcare

Identity opens the participation age. Dr. Rainer Eschrich. Program Manager Identity Management Sun Microsystems GmbH

Choosing an SSO Solution Ten Smart Questions

Title: A Client Middleware for Token-Based Unified Single Sign On to edugain

Securing Corporate Data and Making Life Easier for the IT Admin Benefits of Pre Boot Network Authentication Technology

Deploying secure wireless network services The Avaya Identity Engines portfolio offers flexible, auditable management for secure wireless networks.

A secure and auditable Federated Identity and Access Management Infrastructure. Serge Bertini Director, Security Canada

The Primer: Nuts and Bolts of Federated Identity Management

Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009

The Primer: Nuts and Bolts of Federated Identity Management

managing SSO with shared credentials

Case Study: NTT DATA and JAL ONLINE Federate Business Travel Expense Reporting

WebLogic Server 7.0 Single Sign-On: An Overview

Biometric Single Sign-on using SAML Architecture & Design Strategies

Federated Identity in the Enterprise

White Paper Delivering Web Services Security: The Entrust Secure Transaction Platform

Federation Proxy for Cross Domain Identity Federation

Standards for Identity & Authentication. Catherine J. Tilton 17 September 2014

Designing federated identity management architectures for addressing the recent attacks against online financial transactions.

The Role of Federation in Identity Management

The Top 5 Federated Single Sign-On Scenarios

Device-Centric Authentication and WebCrypto

How To Protect A Wireless Lan From A Rogue Access Point

Liberty Alliance Project Setting the Standard for Federated Network Identity

IBX Business Network Platform Information Security Controls Document Classification [Public]

Reducing Cyber Risk in Your Organization

Identity, Credential, and Access Management. Open Solutions for Open Government

Introduction to SAML

Passlogix Sign-On Platform

Standards and Interoperability: The DNA of the EHR

Cloud-based Identity and Access Control for Diagnostic Imaging Systems

DocuSign Single Sign On Implementation Guide Published: March 17, 2016

IDENTITY INFORMATION MANAGMENT ARCHITECTURE SUMMARY Architecture and Standards Branch Office of the CIO Province of BC People Collaboration Innovation

Health Record Banking Alliance

Biometric Single Sign-on using SAML

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Getting Started with Single Sign-On

Big Data, Big Risk, Big Rewards. Hussein Syed

HIPAA Security. 4 Security Standards: Technical Safeguards. Security Topics

White paper. Four Best Practices for Secure Web Access

Glossary of Key Terms

Information Security Network Connectivity Process

Unisys Security Insights: Germany A Consumer Viewpoint

The Benefits of an Industry Standard Platform for Enterprise Sign-On

PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES

Information Protection Framework: Data Security Compliance and Today s Healthcare Industry

Chapter 1: Introduction

The CIO s Guide to HIPAA Compliant Text Messaging

Provide access control with innovative solutions from IBM.

Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs

HIPAA COMPLIANCE AND DATA PROTECTION Page 1

Federated Identity Management Solutions

SOA in the pan-canadian EHR

Evaluating IaaS security risks

Security solutions Executive brief. Understand the varieties and business value of single sign-on.

White paper December Addressing single sign-on inside, outside, and between organizations

REGULATIONS FOR THE SECURITY OF INTERNET BANKING

Information Technology Acceptable Use Policy

OpenHRE Security Architecture. (DRAFT v0.5)

Remote Vendor Monitoring

C21 Introduction to User Access

RSA Adaptive Authentication and Citrix NetScaler SDX Platform Overview

How To Manage Security On A Networked Computer System

Transcription:

ehealth Workshop Konolfingen (CH) Dec 4--5, 2007 Managing Trust in e-health with Federated Identity Management Dr. rer. nat. Hellmuth Broda Distinguished Director and CTO, Global Government Strategy, Sun Microsystems Inc. Spokesperson, Liberty Alliance; Member of the Business Marketing Expert Group Individual Member, SATW; Vice President, Scientific Advisory Board SATW

Healthcare Implications Healthcare is all about communities Patients Providers Insurances Pharmacy that need to share information Securely, with Strong Authentication, and Simplified Identity Management 2

Issues in Healthcare Healthcare: a complex landscape of interaction, information sharing and regulation Many systems and locations where authentication required Each system requires a different password or login Most systems don t interoperate/ talk to each other! Overall requirement to safeguard PHI Complexity reduces security Individuals and organizations must manage many identities Multiple points of vulnerability Adverse impact on interaction and privacy 3

Healthcare: A Complex Community Telemedicine Imaging Pharmacy Health Insurance Laboratory Services Family Doctor Patient Health Information Medical Specialist Research & Education Hospital Hospital Services Billing 4

Enter Liberty Liberty Alliance provides the means to build the Common Framework for e-health Technology Policy Knowledge Certifications Over 150 diverse member companies and organizations from around the world: Government organizations End-user companies System integrators Software and hardware vendors Huge adoption: Close to a billion identities already under Liberty standards 5

Who Is the Liberty Alliance? Consortium developing open standards For federated identity management In coordination with other standards groups Develops open specifications that anyone can implement Liberty does not deliver specific products or services Conformance testing & certification to ensure interoperability 30+ Liberty-enabled products and services currently available Addresses business & policy issues of identity Guidelines, best practices documents, checklists Support for global privacy regulations built into specs 6

Who is the Liberty Alliance? About 150 diverse member companies and organizations representing leaders in IT, mobility, government, service provision, system integration and finance from across the globe Management Board and Sponsor members include: 7

How We Can Build Trust The biggest concern of the principal/patient/customer is privacy Privacy does not mean that nobody knows nothing about me It is about managing the faith of the principal/patient/customer by adhering to the agreed scope and holding the information in trust Customers are afraid of Purpose Creep What could an architecture for privacy and trust management look like? 8

Security Management Identity Management Architecture for Trust Management Policy Authorization Authentication Identity Definitions A combination of business and technology practices which define how a relationship is conducted and services are performed A set of rules governing decisions about what the user can do: access to information, services or resources Assertion of validity of a set of credentials. Credentials express a person s identity. A Yes/No answer Basic set of information that creates a unique entity (a name with a corresponding 9 set of attributes)

Security Management Identity Management Architecture for Trust Management Policy Authorization Digitally Speaking... 4. Business practices to manage risk, enforce security/privacy, provide auditability. User, customer preferences, history, personalized services, 3. Determination of access rights to systems, applications and information: Match credentials against profiles, ACLs, policy Authentication Identity 2. Log on with a UID/PW, token, certificate, biometrics etc. A process that demands the prove that the person presenting them is indeed the person to which credentials were originally issued. accept or reject 1. User, customer, device facts, e.g., name, address, ID, DNA, keys; credentials, certificates 10 that were issued e. g. by a Certification authority

How People Will Trust Policies Policy and its audit have to be guaranteed and certified by a approved public or private independent organization, e. g.: Federal or State data protection agency TÜV (private institution) Audit firm Chamber of Commerce Postal Service or other basic service provider,... This can be achieved with defined processes and responsibilities similar to ISO 9000 ΦTrust is based on policies and the audit of those -- not just on security 11

Liberty's Structure Promotes Privacy and Security Federated structure means no single centralized data storage that would be vulnerable to attack End user has more control of data because permissions travel with data, guiding its use No global identifier--model protects against unauthorized data sharing 12

How it Happens Circle of Trust organizations and individuals Business relationships based on Liberty architecture & operational agreements Enables patients, physicians and healthcare organizations to safely share information in a secure and apparently seamless environment Principal e.g. Patient Principal Principal Principal e.g. Physician e.g.e.g. Physician Physician Identity Provider Identity Provider Authentication Authentication Federation Federation Discovery Service Discovery Service Personal Profile Personal Profile Circle of Trust Service Provider e.g. Hospital Without violating privacy Service Provider Identity-Based Web Service Provider e.g. eprescriptions.com Service Provider e.g. Pharmacy e.g. Physician 13

The Liberty Advantage Wide-spread adoption 1 billion identities under Liberty protocols Multiple vendor competition Freedom of choice Convergence with other standards e.g., SAML2.0, Shibboleth Federated authentication model No central point of failure Built on standards Works with existing legacy systems and future development plans Privacy & security best practices Create trust for all participants Conformance testing & certification Provides for multi-product interoperability 14

Benefits Of Liberty Standards Better information sharing among patient, physician, health insurance, pharmacy Leads to better patient outcomes Information is timely and coordinated Easier for doctor to use electronic systems No re-authentication required More secure for patient Personal health information shared in controlled manner Overall, better service to patient 15

Liberty s Global Membership ~ 150 diverse member companies and organizations representing leaders in IT, mobility, government, service provision, system integration and finance Management Board and Sponsor members include: 16

Accomplishments The de-facto standard for Identity Federation foundation and Web Services Over 1 billion federation-enabled touch-points Numerous case studies of successful deployments annual IDDY awards Global membership representing: enterprise deployers, vendors, governments, and non-profit organization Published Business and Policy guidelines for best practices in legal, privacy, and business deployments World-recognized Liberty Interoperable test and certification program. 17

Liberty Directions Educate the market Addressing Identity Management needs for a Web 2.0 Environment including: Full range of Identity Management use-case scenarios individual to enterprise Anonymous-to-strongly authenticated credential standards and privacy policies Worldwide privacy and government liaison Web-scalability smallest-to-largest systems Open and heterogeneous solution requirements Rich IdM client functionality for flexible deployments Help drive adoption 18

Need to Bring Together Disparate Identity Efforts New identity-related technologies are entering the market The development of generic web services standards has lagged behind identity web services standards Participation in open dialog between leaders followed silo development Despite recent convergence trends, only Liberty technologies have a certification program 19

Through an Open Approach Drive interoperability throughout the Internet Identity Layer Open the doors to collaboration Open up meetings Open up public forums & lists Grow liaison relationships with new communities Publish a huge inventory of previously confidential material The Concordia Program A public call for interop use cases for heterogeneous environments Expand certification program to meet the requirements 20

Concordia s Overarching Goal & Value Drive development of a ubiquitous, interoperable, privacy-respecting layer for identity Helps drive deployment costs down Assures implementers and deployers better success, greater productivity Leads to more commercial products and open source offerings=healthy market Opportunity for better realization of new service offerings Assure interoperability across this layer Deliver confidence to implementers and deployers in implementing today, successful interoperability tomorrow Open development process assures strong, cross-sector, cross-geography participation 21

If we don t act Loss of privacy Compliance regulations Unifying disparate models Lack of interoperability Integrating with legacy systems...all of which can be mitigated by Open technology standards Deployment policy guidance Independent 3rd-party certification 22

Liberty delivers solutions to real problems By Listening to the Market Collaborating with other relevant groups Documenting the requirements Developing specifications and guidelines to meet the needs Certify the products Continuous evolution and improvement 23

Organization 24

A sampling of vendor adoption 25

A sampling of deployment case studies 26

Exciting Current Activities openliberty.org Concordia Forum Identity Governance Framework MRD creation Advanced Client technical specification enhancements IDDY Awards second year Education & workshops Membership Agreement changes Open mail lists Public SIGs New Fee Structure New Membership Benefits structure 27

Call to Action: Join Us! Liberty brings value to our Healthcare members: Federated Identity Management provides plumbing standards that: Support key elements of interoperability Make it much easier for patients, providers and payers to share results of authentication Enable easier, faster compliance with government regulations Become Engaged: See the specifications and white papers at: www.projectliberty.org Become a member! Conformance and compliance testing that assure base levels of interoperability and functionality See also: User centric identity demo at: http://blogs.sun.com/hubertsblog For more information: https://www.projectliberty.org/resources/featured_verticals_health.php 28

Recommendation and Conclusion National and international interoperability with trust and privacy is key Build on existing standards Embrace Federated Identity for role based access and to protect patient's information Federated Identity scales much better than hierarchical approaches The Liberty Alliance is the ideal boiler plate to build the foundation for an interoperable national health network. Join the Alliance, talk to Sun (founder of the Alliance) 29