Integrating the Healthcare Enterprise The Integration Profiles: Basic Security Profile
Secure Node Verifies and Authenticates the User AuditRepository Failures are reported
Network Connection Verification AuditRepository Security Provides Certificates Identity Confirmed during connection IHE Transactions Failures are reported
Data Exchange Logging AuditRepository Event Report
Audit Records Picture of Screenfull Of Audit Messages
Audit Detail Picture of Details Of one audit message
Audit Log Repository Picture of One from Connectathon Gathers audit reports in one location. May provide analysis or detection facility (beyond the scope of IHE)
NTP Servers Basic security specifies the use of standard network time protocol (NTP). These are necessary so that event reports from multiple machines can be compared. These may also serve other clinical or operational purposes.
Basic Security Environment Required Physical Security Doors, key access, etc. restrict access Communications and Equipment are kept in restricted access areas Access to equipment is controlled Cabinets, wiring, etc. are protected.
Basic Security Environment Required Network Security Firewalls, VPN, and other access controls. Unauthorized external access is denied. Additional security facilities may be in place if warranted by local conditions.
Review of Benefits Verifies that only secure nodes exchange data. Provides audit facility to Verify compliance with procedures Permit detection of inappropriate behavior Without interfering with time critical activities