Using Service Aware Standards to Secure the Exchange of the Electronic Health Record



Similar documents
Identity Management for Interoperable Health Information Exchanges

Empowering Patients and Enabling Providers

ConnectVirginia EXCHANGE Onboarding and Certification Guide. Version 1.4

Interoperable, Federated Identity Management Frameworks Across Enterprise Architectures. We can do this.

Implementing the DoD/VA Virtual Lifetime Electronic Record

XACML and Access Management. A Business Case for Fine-Grained Authorization and Centralized Policy Management

White Paper Cybercom & Axiomatics Joint Identity & Access Management (R)evolution

Health IT Interoperability: HITSP Overview, Update and Discussion

Patient Controlled Health Records Standards and Technical Track

Electronic Health Network - Case Study Consent2Share Share with Confidence

An open source software tool for creating and managing patient consents electronically in IHE XDS.b environments

SIGNIFICANT CHANGES DOCUMENT

Virtual Lifetime Electronic Record (VLER) Health Information Exchange in the Department of Veterans Affairs (VA)

On XACML, role-based access control, and health grids

White Paper The Identity & Access Management (R)evolution

CONNECTing to the Nationwide Health Information Network (NHIN)

Illinois Health Information Exchange Client Readiness Technical Assessment Checklist

Securing Enterprise: Employability and HR

OPENIAM ACCESS MANAGER. Web Access Management made Easy

Cloud SSO and Federated Identity Management Solutions and Services

OpenHRE Security Architecture. (DRAFT v0.5)

IBM Interoperable Healthcare Information Infrastructure (IHII) Overview. China October 2006 IBM

Bringing Cloud Security Down to Earth. Andreas M Antonopoulos Senior Vice President & Founding Partner

SECURITY AND AUTHORIZATION ISSUES IN HL7 ELECTRONIC HEALTH RECORDS: A SEMANTIC WEB SERVICES BASED APPROACH RICHARD SCOTT PATTERSON

Identity, Privacy, and Data Protection in the Cloud XACML. David Brossard Product Manager, Axiomatics

Electronic Submission of Medical Documentation (esmd) CDA Digital Signatures. January 8, 2013

Department of Veterans Affairs VA DIRECTIVE 6510 VA IDENTITY AND ACCESS MANAGEMENT

Security Architecture Principles A Brief Introduction. Mark Battersby , Oslo

NIST s Guide to Secure Web Services

Entitlements Access Management for Software Developers

APIs The Next Hacker Target Or a Business and Security Opportunity?

This Working Paper provides an introduction to the web services security standards.

Florida HIE Gateway of Gateway Partners Readiness Questionnaire

An Oracle White Paper Dec Oracle Access Management Security Token Service

Health Information Security and Privacy Collaboration (HISPC) National Conference

Recommendation for Complete Electronic Health Records and Patient Privacy Protection in the Stimulus Bill. January 15, 2009

DEPARTMENTAL REGULATION

An Operational Architecture for Federated Identity Management

IBM. How can we support the requirement of creating dynamic, flexible and cost effective solution in the IAM area?

Four Goals of Certification

SECURITY INFRASTRUCTURE Standards and implementation practices for protecting the privacy and security of shared genomic and clinical data

Social Security Administration (SSA) Experience with Provider Directory HIT Security and Privacy WG

Key Management Best Practices

Standards for Identity & Authentication. Catherine J. Tilton 17 September 2014

Securing Web Services From Encryption to a Web Service Security Infrastructure

Business and Process Requirements Business Requirements mapped to downstream Process Requirements. IAM UC Davis

Open Data Center Alliance Usage: Infrastructure as a Service (IaaS) Privileged User Access rev. 1.0

HL7 EHR System Functional Model and Standard (ISO/HL ), Release 2

GFIPM & NIEF Single Sign-on Supporting all Levels of Government

Audio: This overview module contains an introduction, five lessons, and a conclusion.

HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT

Privacy & Security Requirements: from EHRs to PHRs

Northrop Grumman. Health Information Exchange in the U.S. Michele Kang Vice President & General Manager Northrop Grumman Corporation

CS 356 Lecture 28 Internet Authentication. Spring 2013

2. APPLICABILITY AND SCOPE

Privacy, Access and Security Services (PASS) Access Control Services Conceptual Model. Release 1.0

System of Systems to Provide Quality of Service Monitoring, Management and Response in Cloud Computing Environments

Interagency Advisory Board Meeting Agenda, August 25, 2009

Identity and Access Management Initiatives in the United States Government

Laying a Foundation for the Next 10 Years of Secure, Interoperable Exchange

Status: Final. Form Date: 30-SEP-13. Question 1: OPDIV Question 1 Answer: OS

Privacy Management Standards: What They Are and Why They Are Needed Now

GENERIC SECURITY FRAMEWORK FOR CLOUD COMPUTING USING CRYPTONET

Web Services Security with SOAP Security Proxies

Department of Veteran Affairs. Fred Catoe Office of Cyber and Information Security AAIP Project Manager March 2004

Gaps in Patient-Centric Healthcare Standards. IEEE Health IT Standards Study Group March 29, 2006

EHR Standards Landscape

Domain 12: Guidance for Identity & Access Management V2.1

IHE IT Infrastructure Technical Framework Supplement. Secure Retrieve (SeR) Trial Implementation

Using SOA to deliver a Healthcare Interoperability Platform that improves medical outcomes and enables public health surveillance

Software and Cloud Security

Version: January 2008 ASTM E-31: EHR and Informatics Standards Education For Health Professional Disciplines. Background

Securing Web Services With SAML

The Government-wide Implementation of Biometrics for HSPD-12

2013 AWS Worldwide Public Sector Summit Washington, D.C.

The Unique Alternative to the Big Four. Identity and Access Management

Laserfiche for Federal Government MEET YOUR AGENCY S MISSION

HIMSS Interoperability Showcase 2011

Redpaper Axel Buecker Craig Forster Sridhar Muppidi Borna Safabakhsh

AHIMA Curriculum Map Health Information Management Baccalaureate Degree Approved by AHIMA Education Strategy Committee February 2011

South Carolina Health Information Exchange (SCHIEx)

Department of Defense SHA-256 Migration Overview

U.S. Department of Health and Human Services (HHS) The Office of the National Coordinator for Health Information Technology (ONC)

CliQr CloudCenter. Multi-Tenancy

SPML (Service Provisioning Markup Language) and the Importance of it within the Security Infrastructure Framework for ebusiness

A Service Oriented Security Reference Architecture

NATIONAL HEALTH POLICY FORUM. January 2010

Recommendations for the PIA. Process for Enterprise Services Bus. Development

Vetting, Proofing and Registration Focus Group

A Conceptual Model of Practitioner Authentication Prior to Providing Telemedicine Services in Developing Countries

VA Enterprise Design Patterns: VA SOA Design Patterns for VistA Evolution

Life After PIV. Authentication In Federated Spaces. Presented to. Card Tech/Secure Tech. May By Lynne Prince Defense Manpower Data Center

Federation Are We Ready? Alec Cartwright Authentication Common Capability Design Authority

Building Regional and National Health Information Systems. Mike LaRocca

Mobile Device as a Platform for Assured Identity for the Federal Workforce

Secure Identity Propagation Using WS- Trust, SAML2, and WS-Security 12 Apr 2011 IBM Impact

CONNECT Vangent Health Information Exchange Open Source (HIEOS) Document Registry and Repository Installation and Configuration Manual

Server based signature service. Overview

2011 AHIMA Curriculum Competencies and Knowledge Clusters - Health Information Management Baccalaureate Degree Effective August, 2011

Presented By: Muhammad Afzal 08May, 2009

Transcription:

Using Service Aware Standards to Secure the Exchange of the Electronic Health Record SOA in Healthcare Conference Arlington, VA John (Mike) Davis David Staggs (SAIC) Department of Veterans Affairs July 12, 2010

Agenda Introduction Implementation Summary 2

Virtual Lifetime Electronic Record On April 9, 2009, President Obama directed the Department of Defense and the Department of Veterans Affairs to create the Virtual Lifetime Electronic Record: will ultimately contain administrative and medical information from the day an individual enters military service throughout their military career and after they leave the military. -President Barack Obama 3

Virtual Lifetime Electronic Record Strategy Allow health care providers access to Servicemembers and Veterans health records, in a secure and authorized way, regardless of whether care is delivered in the private sector, Department of Defense (DoD), or VA More efficient, effective, and timely than creating a single DoD /VA system Builds on existing DoD and VA Electronic Health Record capabilities Solves the need to share information with the private sector Not a large acquisition program Avoids obsolescence as Electronic Health Record systems modernize 4

Top Health Care System Security Requirements Security and privacy infrastructure for end-to-end data sharing High-assurance person identifiers across federated domains Organizational and personal policy enforcement User accountability for potential security events (audit) Security assurance, interoperability through standards, common processes, and system certification 5

Patient Privacy Requirements Key Concept: Enforce both Consumer and Enterprise Privacy policy with Common Security Services Enforcing consumer privacy policy is a security concern Agreement to enforce privacy is a business decision/contract with consumer Basic consumer privacy policies both control access and constrain security 6

Web of Standards and Related Organizations HL7 CDA Consent Directive Health Care Functional Role Standard SOA Security and Privacy Security/Privacy Info Models Privacy Confidentiality Codes HL7 Service Aware Architecture CPP Access Control System ISO via US TAG Mike Davis Privilege Office of Management Health Information, Security Architect Structural and Functional ANSI- April Roles, 20, 2010 +++ INCITS Text Color Key RBAC Standard Standards RBAC Implementation Models/Draft standards CDA=Clinical Document Architecture FIPS=Federal Information Processing Standard HL7=Health Level 7 HITSP=Healthcare Information Technology Standards Panel NHIN=Nationwide Health Information Network NHIN NHIN Updates OASIS SAML, XACML, WS- Trust Profiles NIST Certification Profiles HITSP CCHIT FIPS/Special Publications ISO=International Standards Organization NIST=National Institute of Standards & Technology OASIS=Organization for the Advancement of Structured Information Standards RBAC=Role Based Access Control Structured Information Standards ASTM Privilege Management Structural Roles Authorization/Privacy Preference standards and Interface Specifications Demos IHE Health Care Profiles SAML=Security Assertion Markup Language SOA=Service Oriented Architecture XACML=eXtensible Access Control Markup Language 7

Conduct Interoperability Demonstrations Key Concept: Validate approach through interoperability demonstrations (reference implementations and testing) RSA Conference March 2010 Multi-vendor demonstration of NHIN Connect Security & Privacy HIMSS Apr 2009 First end-toend demonstration of privacy consents and access control London Conference Oct 2008 Extensions to the RSA demonstration adding SAML RSA Conference April 2008 Multi-vendor demonstration of OASIS XACML profile HIS=Health Information System NHIN=Nationwide Health Information Network SAML=Security Assertion Markup Language XACML= extensible Access Control Markup Language 8

Implementation 9

Reference Model Overview GW=Gateway PEP=Policy Enforcement Point ROI=Release of Information Office 10

Consumer Privacy & econsent 11

Meet ONC Consumer Preferences Requirements Consumers should be able to: Define permissions for who is permitted to access information Express how their health information would be made available Authorize release of their health information Establish various types of consumer preferences (consents, advance directives, etc.) Define privacy preference conditions including: By type of information (all data, segmentation of data) By role and criteria based access, including type of encounter, embargoed records (VIP, legal restrictions) By time (start, end, duration) By level of participation (opt-in, opt-out, with or without additional classifications, with or without additional granularity) By purpose of use NHIN=Nationwide Health Information Network ONC=Office of the National Coordinator VIP=Very Important Person Fully meets Partially meets Does not meet 12

Patient Viewpoint (to-be) Consent Directive 13

econsent Signature Service Framework Electronic Forms Repository Signature Service Approval Authentication Service Demographic Service 1 2 User Input 3 Veteran Patient Signature is bound to document 14

Leverages HL7 Consent Directive Analysis Model 15

Privacy Management 16

17

Security Management 18

Security Management Provide control and management of security mechanisms providing security services Control and provision enterprise security policy, identity and authorizations (IAM) and other security information Generate configuration data, cryptographic keys Provide security management for logging of security relevant events, recovery and support for breach reporting 19

VA Identity and Access Management Veterans Identity Proofing Standardized Proofing Process Other Sources (SSA, OPM, etc.) Correlate & Store Proofing Service Provider Proofing Repository BIRLS LMS PIV Beneficiaries Employees VA Trusted Agent Administer Identity Identity Proofing Process Check Identity Verify & Capture Identity Provide Identity Information VADIR PAID Healthe -Vet Vista Contractors Affiliates VIC Card Issuance Process Veterans & Beneficiaries E-Auth Credentialing Process PIV Card Process Employees, Contractors, & Affiliates Smith, Patricia PIV MPI E - Benefits ETA/ IFCAP BIRLS=Beneficiary Identification and Records Locator System ebenefits=electronic Benefits ETA/IFCAP=Integrated Funds Control, Accounting, and Procurement LMS=Learning Management System MPI=Master Patient Index PAID=Personal and Accounting Integrated Data System PIV=Personal Identity Verification VADIR=VA/DoD Identity Repository VIC=Veteran Identity Care VISTA=Veterans Health Information Systems and Technology Architecture 20

Access Control Service 21

Consumer Preferences and Policy (CPP) SOA High- Level Framework HITSP TP20 Access Control, TP30 Manage Consent Directives, OASIS XSPA SAML, WS-TRUST HITSP=Healthcare Information Technology Standards Panel OASIS=Organization for the Advancement of Structured Information Standards SAML=Security Assertion Markup Language TP=Transaction Package XACML=eXtensible Access Control Markup Language 22

HL7 Access Control Service Framework 23

OASIS XSPA SAML Attribute Assertion Attributes use to enforce security and privacy in an XSPA cross enterprise exchange of patient data Organization Location SubjectID (User) Purpose of Use (POU) POU POU Role (S) Role (F) Permission 1 {Action, Object} Permission 2 {Action, Object} Permission 3 {Action, Object} Permission N {Action, Object} Unique identifier specific to a given entity. Described in XSPA profiles and mutually agreed upon by participating entities. Structural Role Refer to [ASTM E1986-98 (2005)] Functional Role Refer to ANSI-INCITS 359-2004 Compliant [HL7-PERM] 24

NHIN San Diego Physical Deployment (To-Be) ADI=Access Control Decision Information CDS=Clinical Data Services HDR=Health Data Repository MPI=Master Patient Index NHIN=Nationwide Health Information Network PDP=Policy Decision Point PEP=Policy Enforcement Point ROI=Release of Information RPC=Remote Procedure Call WS=Web Services XACML=eXtensible Access Control Markup Language 25

Advanced Concept Demonstrations Patient Protecting the Human Genome - RSA 2010 PHR Service Patient has ability to view their Genotype and determine whether to deny access to all or portions of it. Visibility To Patient Policy Patient Policy Constrains access to specific AT-RISK SNPs based on characteristics and/or disease grouping Constraints Access Control System PDP XSPA Enabled Service Provider PIP PEP Assertion Consumption Obligation Clinical Adaptive Services Request for Patients genotype Response Continuous Re-validation of Patient Policy Intent Provider Patient s Genotype Original Mapping Genome Wide Association Studies Service GWAS GWAS=Genome-wide Association Study PDP=Policy Decision Point PEP=Policy Enforcement Point PHR=Patient Health Record PIP=Policy Information Point SNIP=Single Nucleotide Polymorphism XSPA=Cross-enterprise Security and Privacy Authorization New diseases and characteristics are mapped Multiple Organizations Contribute Findings Trusted/Clinically relevant providers 26

Global Participants System and Participant Locations RSA 2008 San Francisco, CA Oasis XACML InterOp Demonstration Ditton Manor, London, UK HIMSS 2009 Chicago, IL RSA 2010 San Francisco, CA 27

Implemented Security and Privacy Policies Demonstrate the Enforcement of Patient Consent Directives Opt-In / Opt-Out Deny Access based on Organizations Deny Access based on Role Deny Access based on Purpose of Use* Deny Access to Specific Providers Mask C32 Results based on Role (future release)** Mask C32 Results for Specific Providers (future release)** Mask C32 Results based on data sensitivity (not supported) Demonstrate the Enforcement of Organizational Policies Limit access to specific organizations Limit access during specific hours of the day Require certain roles based on purpose of use and service requested Require certain permissions based on purpose of use and service requested * Demonstration only. Current model is single purpose of use **Future capability. Requires ability of Adaptor to accept obligation 28

XACML Policy Examples - Patient Denial based on subjects ASTM structured role: Patient Policy Demonstrated Advanced Concepts of Obligations Opt-IN Blacklisted Organizations Confidentiality/Sensitive Data Blacklisted Provider Role Based Denial Blacklisted Provider Unique ID Based Denial Data Redaction Provider Role Data Redaction Provider Unique Identifier Genomics <Policy PolicyId="urn:oasis:names:tc:xspa:1.0:resource:patient:dissenting:role" RuleCombiningAlgId="urn:oasis:names:tc:xacml:1.0:rule-combining-algorithm:denyoverrides"> <Description>Denies the request from the subject if their role is not permitted by the patient.</description> - <Target> - <Resources> - <Resource> - <ResourceMatch MatchId="urn:oasis:names:tc:xacml:1.0:function:string-equal"> <AttributeValue DataType="http://www.w3.org/2001/XMLSchema#string">urn:oasis:names:tc:xspa:1.0:reso urce:hl7:type:medical-record</attributevalue> <ResourceAttributeDesignator AttributeId="urn:oasis:names:tc:xspa:1.0:resource:hl7:type" DataType="http://www.w3.org/2001/XMLSchema#string" /> </ResourceMatch> </Resource> </Resources> </Target> - <Rule Effect="Deny" RuleId="urn:oasis:names:tc:xspa:1.0:patient:dissenting:roles:deny"> <Description>Evaluates the dissenting-role (if available) against the subject's role.</description> <Target /> - <Condition> - <Apply FunctionId="urn:oasis:names:tc:xacml:1.0:function:and"> - <Apply FunctionId="urn:oasis:names:tc:xacml:1.0:function:string-subset"> <SubjectAttributeDesignator AttributeId="urn:oasis:names:tc:xacml:2.0:subject:role" DataType="http://www.w3.org/2001/XMLSchema#string" /> <ResourceAttributeDesignator AttributeId="urn:oasis:names:tc:xspa:1.0:resource:patient:dissenting-role" DataType="http://www.w3.org/2001/XMLSchema#string" /> </Apply> </Apply> </Condition> </Rule> </Policy> 29

View of Summary of Care Record (C32) 30

Current State Nationwide Health Information Network Connect provides a basic Policy Decision Point (PDP) Jericho Systems PDP with 12 pre-filled policies Used in interoperability demonstrations Can be used to deploy, test, and benchmark any provider s solution 31

Next Steps OASIS Reference Model XSPA Profile of WS-Trust OASIS XACML Ontology OASIS Privacy Management Reference Model (PMRM) HL7 SOA PASS Audit HL7 Security and Privacy Ontology HL7 Services Aware Interoperability Framework ISO Purpose of Use 32

Summary Core service aware standards are in place and new standards are under development Domain information models customize the services specification to accommodate individual verticals QUESTIONS? Vendors have demonstrated the ability to implement security and privacy services protecting electronic health records Clinical adaptive services can extend the reach of security to protect segmented data in the electronic health record 33

For Further Information 34

Demonstration Videos Use Case Examples Patient Privacy Clinical Data Masking Healthcare Organization Policy Emergency Treatment Protecting the Human Genome http://www.youtube.com/watch?v=rkbatmgwgz4 http://www.youtube.com/watch?v=8aa2uy6isqs http://www.youtube.com/watch?v=a3htxcu2sa8 Overviews XSPA Technology Overview Part 1 XSPA Technology Overview Part 2a XSPA Technology Overview Part 2b http://www.youtube.com/watch?v=fqqrwnbg-ie http://www.youtube.com/watch?v=tvht9yz2ekk http://www.youtube.com/watch?v=3izvvdnvmiu *Larger videos are available for viewing at: http://www.ascendahealthcare.com/himss2009.html 35

Business Case for Health Information Sharing News Report Nationwide Health Information Network: San Diego Project Electronic processes replace paper-based health information requests saving weeks or months Advanced security and privacy mechanisms ensure appropriate access to patient records Patients have the option to allow or prevent sharing of some of their information 36