PHIN Certification Evaluation



Similar documents
Websense Secure Messaging User Help

Security Enhancements 3/9/15

Data Provenance. Functional Requirements Document: Developed in Response to the Data Provenance Task Force Recommendations. Version 1.

PUBLIC HEALTH INFORMATION NETWORK (PHIN) PHIN COMMUNICATION AND ALERTING (PCA) GUIDE

How To Access A Secure From The State Of Iceland

How to access and reply to an Egress Switch Secure free of charge. Opening a Switch Secure New User

Collaboration Protocol Agreement Guide. Public Health Information Network Messaging System (PHINMS)

SEC External Guide for Using Accellion

PCA er 2.0 User Guide

HAN Resource Manual May 2013

Texas Medicaid & Healthcare Partnership (TMHP)

Secure Message Center User Guide

Diners Club Corporate Account Manager

DocuSign Desk Guide. Sign a Contract Electronically Other Actions in DocuSign 2. Assign Signature to Authorized Signer.

DocuSign Quick Start Guide. In Person Signing. Overview. Table of Contents

HMRC Secure Electronic Transfer (SET)

Work Connect for ios. User Guide

New World Construction FTP service User Guide

Using Voltage Secur

External End User Training Guide: Secure Extract

SharePoint Services: Using Workflows

MCCG PowerChart. Message Center Complete Manual. Hold the Ctrl key down & then left click on a link below to navigate to it:

Moderator can share files with all participants and participant can share with moderator.

Data Exchange and Protocol Process Flows for Electric Deregulation in The State of New Jersey

MusicMark. Electronic Batch Registration: Getting Started

Wakefield Council Secure and file transfer User guide for customers, partners and agencies


SMS Text Messaging. Guide & User Instructions Revised. America s Largest Message Notification Provider

Using the Fax Out for Signature Feature

Receiving Secure s

PHIN MS Detailed Security Design

How to Complete the Application for Paraoptometric Certification. A quick guide to completing and submitting your application

GMass Getting Started Guide

Audit Review of the. Corporate Purchase Card Process

Background Information

Microsoft Outlook 2010 Hints & Tips

ONLINE BILL PAY QUICK REFERENCE GUIDE

Outpatient Dialysis Clinic NHSN Enrollment Steps 1 5 Illustrated Guide

The Stage 2 Summary of Care objective (Core 15) involves 3 measures. The 3rd of these measures is that the provider satisfy one of the following:!

MSGCU SECURE MESSAGE CENTER

Popmoney FAQs. To send money, log in to your online bank account and look for Popmoney.

TIBCO Slingshot User Guide

State of Michigan Data Exchange Gateway. Web-Interface Users Guide

BOI EazyPay Payments Platform:: Enabling Personal Payments

For EDI requirements related to Party America contact members of the Party City EDI Team:

MUTUAL OF OMAHA SECURE SYSTEM CLIENT/PARTNER USER GUIDE

Secur User Guide

How To Electronically Sign A Document On Docusign.Com

Ease-E-Club Client Management Software by Computerease

DOHP Page 1 of 5 TABLE OF CONTENTS. I. Policy 2. II. Authority 2. III. Supportive Data 2. IV. Signature Block with Effective Date 2

OX Guard Product Guide v1.0 V1.0

GroupWise Web Access 8.0

Cisco Personal Communications Assistant (PCA)

DocuShare Agent User Guide

I. Overview of the industry DVIR Recommended Practice

Using Webmail. Technical Manual: User Guide. Document Updated: 1/07. The Webmail Window. Displaying and Hiding the Full Header.

BULK SMS APPLICATION USER MANUAL

MICROSOFT OUTLOOK 2010 READ, ORGANIZE, SEND AND RESPONSE S

Can I manually trigger secure to encrypt a message that does not contain PI or other sensitive information? Yes, by use of the word TID.

Personal Banking Switch Kit. Getting Started

Mass . General Use

-- Reading and Printing

SMS for REST Professional

Country Club Bank- Intro to Mobile Banking- Android & iphone Apps

LinkPoint Connect for Salesforce Tutorial Lotus Notes Edition

A FOSTER WHEELER (THAILAND) LTD PROOFPOINT SECURE FILE TRANSFER SERVER USER DOCUMENTATION

Multi-Factor Authentication (MFA) Monday, December 14, Slide 1 - of 34

New Jersey Department of Health. Electronic Laboratory Reporting On-Boarding Manual. Version 1.4

Convenience, Control and Efficiency

User Guide Supplement. S/MIME Support Package for BlackBerry Smartphones BlackBerry Pearl 8100 Series

Using Webmail. Document Updated: 9/08. Technical Manual: User Guide. The Webmail Window. Displaying and Hiding the Full Header.

Admin Guide Domain Administration. Version 21

ASSIST NOTIFICATIONS

Microsoft Outlook And- Outlook Web App (OWA) Using Office 365

Encryption User Guide

Homeland Security Information Network Program Management Office

IBM Aspera Add-in for Microsoft Outlook 1.3.2

S-Doc User Guide. Instructions on using the Secure Document Online Courier with the CAAT Pension Plan. September 2012

Getting Started... Login to your Account. Set your Preferences Once logged in, click Preferences on the left.

QUICK REFERENCE GUIDE

Answers to Cardmember questions about Online Services and statement delivery.

Using Webmail. Document Updated: 11/10. Technical Manual: User Guide. The Webmail Window. Logging In to Webmail. Displaying and Hiding the Full Header

Nationstar Mortgage Secure Client User Guide

Technical Documentation SEPPmail Outlook Add-In v1.5.3

ReviewSnap Quick Training Reference Creating a Self-Review

End-User Reference Guide

End-User Reference Guide

Reading an sent with Voltage Secur . Using the Voltage Secur Zero Download Messenger (ZDM)

HIPAA TRANSACTION 837 INSTITUTIONAL STANDARD COMPANION GUIDE

Replacements TECHNICAL REFERENCE. DTCCSOLUTIONS Dec Copyright 2009 Depository Trust Clearing Corporation. All Rights Reserved.

User Guide Package Exception Management

Popmoney FAQs. Send money to anyone using their address, mobile number, or account information.

Safeguarding Your Personal Information Using Encryption

OWA - Outlook Web App

EJGH Encryption User Tip Sheet of 8

Secure Information for Sending and Receiving for both DIDD Staff and Providers or Other Outside entities.

eperformance Step-by-Step Help Guide for Employees

Android App Quick Start Guide

Configuring Alerts in Brightstor V1.00

EDI Compliance Report

Transcription:

PHIN Evaluation This document includes the PHIN details, specific notes for applicants and the evaluation steps and test scenarios for the PHIN listed below. The evaluation steps and test scenarios detailed in this document are designed to test compliance with specific PHIN. The PHIN Group will evaluate the applicant s performance against the expected results. The applicant must successfully complete all of the steps in order to receive this PHIN. PHIN : Cascade Alerting Details Attributes: Version: 2 Status: Current Target Date: 12/17/2010 PHIN Requirements and PHIN Documents PHIN Requirements Version 2.01, 04/30/2010; Available at: http://www.cdc.gov/phin/resources/requirements.html PHIN and Process Version 1.0, 08/21/2008; Available at: http://www.cdc.gov/phin/resources/certification/index.html The applicable PHIN Requirements and associated PHIN Requirement #1 (Compose Messages) PHIN Requirement #2 (Securely Send Messages) PHIN Requirement #3 (Securely Receive, Parse and Process Messages) PHIN Requirement #5 (Security and Availability of Electronic Information Systems) (Note: PHIN Requirement #4 does not apply to this PHIN ) Applicable Implementation and Specification Guides PHIN Communication and Alerting (PCA) Guide, Version 1.3, 04/27/2010; Available at: http://www.cdc.gov/phin/resources/guides.html) PHIN Exchange Developer Guide, Version 1.0, 04/30/2010; Available at: http://www.cdc.gov/phin/resources/guides.html) PHIN Evaluation: Cascade Alerting 1 of 7

Notes to applicants: The evaluation steps and test scenarios detailed in this document are designed to test compliance with specific PHIN. The cascade alerts messages composed by the applicant will be validated for compliance with the PHIN Communications and Alerting Guide The messages must have or convey the required data attributes and follow the vocabulary specified in the guide Optional data elements that are included in a message will be validated for compliance PHIN Evaluation: Cascade Alerting 2 of 7

Evaluation: The PHIN evaluation for Cascade Alerting includes two parts: Part #1: Security and Availability Evaluation Part #2: Alerting Demonstration Part #1 Security and Availability Evaluation Preparation for Applicant: Download and use the PHIN Security and Availability Assessment Tool (Available at: http://www.cdc.gov/phin/resources/certification/index.html) to assist with selfevaluating compliance with the PHIN for PHIN Requirement #5. Download the PHIN Security and Availability Self-Attestation Form (Available at: http://www.cdc.gov/phin/resources/certification/index.html) and identify the appropriate individual to sign the form. Process steps: The security and availability evaluation is a self-assessment performed by the applicant. A designated individual for the applicant signs the PHIN Security and Availability Self-Attestation Form to verify the self-assessment determined compliance with the PHIN for PHIN Requirement #5. Step ID Evaluation Steps Expected Result 1.1 Applicant completes the PHIN The applicant has completed a self-assessment and returns the Security and signed self-attestation form to indicate compliance with the Availability Self-Attestation Form security and availability certification criteria. and submits to the PHIN Group. CC #: 5.1, 5.2, 5.3, 5.3.1 5.3.58 PHIN Evaluation: Cascade Alerting 3 of 7

Part #2 Alerting Demonstration Partner Preparation: 1. Partner must use PHIN Exchange to send and receive messages. 2. PHIN Group (PCG) will send the partner the test data file a minimum of 2 business days prior to certification evaluation date. 3. PCG will provide the partner instructions for sending the alert messages to the PCG. 4. The partner will provide the PCG instructions for sending the alert messages to the partner. ID Evaluation Steps Expected Result Use PHIN Exchange 2.1 Use PHIN Exchange to send and receive the Cascade Alert and Cascade Acknowledgement messages for steps 2.2 2.7 and 2.9 2.12. Composing and Securely Sending 2.2 Compose and securely send supplied in test case #1 to a standard test alert of Moderate severity. 2.3 Compose and securely send supplied in test case #2 to a standard test alert of Severe severity. All messages are sent and received successfully via PHIN Exchange. CC#: 2, 2.1, 2.2, 2.3, 2.4 PHIN Evaluation: Cascade Alerting 4 of 7

ID Evaluation Steps Expected Result 2.4 Compose and securely send supplied in test case #3 to demonstrate the ability to a compose Sensitive test alert of Extreme severity. 2.5 Compose and securely send, supplied in test case #4 to 2.4 a standard test alert of Moderate severity and requesting an acknowledgement. 2.6 Compose and securely send supplied in test case #5 to an update test alert to change the severity of the cascade alert sent in step 2.2 from Moderate to Minor 2.7 Compose and securely send supplied in test case #6 to a cancel test alert to cancel the cascade alert sent in step 2.6. PHIN Evaluation: Cascade Alerting 5 of 7

ID Evaluation Steps Expected Result 2.8 Assumption: Applicant has just Applicant has a process that will: received a notification from CDC 1. Respond to the error notice indicating that an error was 2. Correct the indicated error (including resending a message if encountered in processing a necessary) Cascade Alert Message 3. Initiate any necessary corrective action process CC #: 2.5 Applicant describes the process to respond and correct the error. Securely Receive, Parse and Process 2.9 Receive, parse and process an acknowledgement cascade alert message sent from the PCG. The acknowledgement will be based on the message partner sends in step 2.5. 2.10 Receive, parse and process a cascade alert message sent from the PCG. The partner is able to securely receive, parse and process the cascade alert message. Partner is able to demonstrate processing of the cascade alert acknowledgement via method approved by PCG. Possible method might include: Screen shot from alerting system indicating receipt, date/time, etc.) The partner is able to securely receive, parse and process the cascade alert message. Partner is able to demonstrate processing of the cascade alert via method approved by PCG. Possible methods include: 1. Message routed back to the PCG via an explicit recipient in the message 2. Screen shot from alerting system indicating receipt, date/time, etc.) CC# 3, 3.1, 3.3, 3.4 CC# 3, 3.1, 3.2, 3.3, 3.4 PHIN Evaluation: Cascade Alerting 6 of 7

ID Evaluation Steps Expected Result 2.11 Receive, parse and process a cascade alert message sent from the PCG that requests an acknowledgement. The partner is able to securely receive, parse and process the cascade alert message. Partner is able to demonstrate processing of the cascade alert via method approved by PCG. Possible methods include: 1. Message routed back to the PCG via an explicit recipient in the message 2. Screen shot from alerting system indicating receipt, date/time, etc.) CC# 3, 3.1, 3.3, 3.4 2.12 Compose and securely send The received cascade alert acknowledgement is valid: cascade alert acknowledgements, 2, message in responses to the 2.1, 2.2, 2.3, cascade alert messages sent in steps #2.10 & #2.11. 2.13 Assumption: Applicant has just encountered an error while processing a cascade alert message. Applicant describes the process to inform the message sender of the error, either via message or some alternative means. 3. Message contains appropriate vocabulary values for the acknowledgement Applicant has a process that will inform the message sender of the error and includes details to identify the message that failed. 3.2 CC #: 3.5 PHIN Evaluation: Cascade Alerting 7 of 7