Health IT RESTful Application Programming Interface (API) Security Considerations Transport & Security Standards Workgroup March 18, 2015.

Slides:



Advertisements
Similar presentations
1Copyright © 2010, Printer Working Group. All rights reserved. PWG Plenary TCG Activity Summary December 2010 Irvine, CA – PWG Meeting Ira McDonald (High.
Advertisements

Internet Protocol Security (IP Sec)
Secure RESTful Interface Profile Phase 1 Briefing
Cloud computing security related works in ITU-T SG17
Interoperability Roadmap Comments Sections E, F, and G Transport & Security Standards Workgroup Dixie Baker, chair Lisa Gallagher, co-chair March 11, 2015.
© 2014 The MITRE Corporation. All rights reserved. Mark Russell OAuth and OpenID Connect Risks and Vulnerabilities 12/3/2014 Approved for Public Release;
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
January 23-26, 2007 Ft. Lauderdale, Florida IP Communications, Secure – By Design Roger W. Farnsworth.
Update on Interoperability Roadmap Comments Sections E, F, and G Transport & Security Standards Workgroup Dixie Baker, chair Lisa Gallagher, co-chair March.
User Managed Privacy Using Distributed Trust Privacy and Security Research Workshop Carnegie Mellon University May 29-30, 2002 Lark M. Allen / Wave Systems.
Finalize RESTful Application Programming Interface (API) Security Recommendations Transport & Security Standards Workgroup January 28, 2014.
User Authentication Recommendations Transport & Security Standards Workgroup December 10, 2014.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Single-Sign On and Federated Identity.
©2012 Check Point Software Technologies Ltd. Cloud Security Tamir Zegman Architect.
Principles of Computer Security: CompTIA Security + ® and Beyond, Third Edition © 2012 Principles of Computer Security: CompTIA Security+ ® and Beyond,
Copyright © 2006 CyberRAVE LLC. All rights reserved. 1 Virtual Private Network Service Grid A Fixed-to-Mobile Secure Communications Framework Managed Security.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
HIT Standards Committee HIT Standards Committee Privacy and Security Workgroup Discussion of NwHIN Power Team Recommendations August 6,
Network Security Lecture 26 Presented by: Dr. Munam Ali Shah.
The Internet Identity Layer OpenID Connect Update for HIT Standards Committee’s Privacy and Security Workgroup Wednesday, March 12th from 10:00-2:45 PM.
Workgroup Discussion on RESTful Application Programming Interface (API) Security Transport & Security Standards Workgroup January 12, 2014.
Draft – discussion only Content Standards WG (Documents and Data) Proposed HITSC Workgroup Evolution 1 Architecture, Services & APIs WG Transport and Security.
HIT Policy Committee NHIN Workgroup Recommendations Phase 2 David Lansky, Chair Pacific Business Group on Health Danny Weitzner, Co-Chair Department of.
Serving society Stimulating innovation Supporting legislation Danny Vandenbroucke & Ann Crabbé KU Leuven (SADL) AAA-architecture for.
Identity Management Hannes Tschofenig. Motivation OAuth was created to allow secure and privacy friendly sharing of data. OAuth is not an authentication.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
ACM 511 Introduction to Computer Networks. Computer Networks.
HIT Policy Committee Report from HIT Standards Committee Privacy and Security Workgroup Dixie Baker, SAIC December 15, 2009.
Observations from the OAuth Feature Survey Mike Jones March 14, 2013 IETF 86.
National Computational Science National Center for Supercomputing Applications National Computational Science GSI Online Credential Retrieval Requirements.
Need for Security Control access to servicesControl access to services Ensure confidentialityEnsure confidentiality Guard against attacksGuard against.
The ERA of API in the World of IoT Jing Zhang-Lee November, 2015.
HIT Policy Committee NHIN Workgroup HIE Trust Framework: HIE Trust Framework: Essential Components for Trust April 21, 2010 David Lansky, Chair Farzad.
Justin Richer The MITRE Corporation October 8, 2014 Overview of OAuth 2.0 and Blue Button + REST.
E-Authentication & Authorization Presentation to the EA2 Task Force March 6, 2007.
Discussion - HITSC / HITPC Joint Meeting Transport & Security Standards Workgroup October 22, 2014.
Framing Identity Management Recommendations Transport & Security Standards Workgroup November 19, 2014.
API Task Force Josh Mandel, Co-Chair Meg Marshall, Co-Chair December 4, 2015.
1 Chapter 7 WEB Security. 2 Outline Web Security Considerations Secure Socket Layer (SSL) and Transport Layer Security (TLS) Secure Electronic Transaction.
1 Network Security: Introduction Behzad Akbari Fall 2009 In the Name of the Most High.
IS3220 Information Technology Infrastructure Security
Secure Mobile Development with NetIQ Access Manager
Lecture 6 (Chapter 16,17,18) Network and Internet Security Prepared by Dr. Lamiaa M. Elshenawy 1.
Henric Johnson1 Chapter 7 WEB Security Henric Johnson Blekinge Institute of Technology, Sweden
Copyright © 2009 Trusted Computing Group An Introduction to Federated TNC Josh Howlett, JANET(UK) 11 June, 2009.
Jim McEachern Senior Technology Consultant ATIS July 8, 2015.
Access Policy - Federation March 23, 2016
Identity and Access Management
Data and Applications Security Developments and Directions
Paul Woods Chair, MITIGATION: Ensuring we procure cloud services taking into account of the risks involved Paul Woods Chair, ISNorthEast.
OpenID Enhanced Authentication Profile (EAP) Working Group
OpenID Enhanced Authentication Profile (EAP) Working Group
ESA Single Sign On (SSO) and Federated Identity Management
BY: SHIVI AGRAWAL ( ) CSE-(6)C
Component-Based Software Engineering: Technologies, Development Frameworks, and Quality Assurance Schemes X. Cai, M. R. Lyu, K.F. Wong, R. Ko.
Introduction to the FAPI Read & Write OAuth Profile
How to Mitigate the Consequences What are the Countermeasures?
K!M SAA LOGICAL SECURITY Strong Adaptive Authentication
Platform Architecture
OpenID Enhanced Authentication Profile (EAP) Working Group
IT Management Services Infrastructure Services
OpenID Enhanced Authentication Profile (EAP) Working Group
OpenID Enhanced Authentication Profile (EAP) Working Group
Presentation transcript:

Health IT RESTful Application Programming Interface (API) Security Considerations Transport & Security Standards Workgroup March 18, 2015

Context Background The TSS WG Chairs acknowledged the importance of identifying and addressing the security vulnerabilities and overall risks associated with Health IT RESTful APIs During the TSS WG’s deliberations, the chairs of the TSS WG and the Architecture, Services, and Application Program Interface (API) Work Group (ASA WG) met and agreed upon the need to provide considerations to ONC regarding Health IT RESTful API Security There is no single authoritative source of security guidance or best practices for implementing the OAuth 2.0 specification Many open-source OAuth 2.0 libraries exist, and developers sometimes are inclined to select one without full knowledge of the security implications 1

Context - Continued Pertinent Internet Engineering Task Force (IETF) Specifications: OAuth 2.0 Authorization Framework -- RFC 6749 OAuth 2.0 Authorization Framework: Bearer Token Usage -- RFC 6750 OAuth 2.0 Threat Model and Security Considerations -- RFC

Considerations The following are some recommended topics to consider for client and browser software across multiple platforms including mobile in enabling Health IT (HIT) to be certified for implementing a secure application programming interface (API) for information sharing between partners using RESTful APIs: o Use OAuth 2.0 and OpenID Connect standards with transport layer security (TLS) encryption to secure HIT RESTful APIs o Use the OAuth 2.0 implementation model most appropriate for the architecture and risk profile of the application o OpenID Connect enables single sign-on across multiple applications, which increases the importance of a strong initial login – assure that the method used to initially authenticate the user is sufficiently strong for the application use case 2

Considerations - Continued The following are some recommended topics to consider for client and browser software across multiple platforms including mobile in enabling Health IT (HIT) to be certified for implementing a secure application programming interface (API) for information sharing between partners using RESTful APIs: o Strengthen client and browser software authentication by using standardized signed web tokens* instead of passwords transmitted over the network o Use TLS encryption with server side authentication to assure clients that they are communicating with the correct server and to protect data transmitted across the established link o Minimize the risk of data exposure through redirect manipulation by using declared redirect Unique Resource Identifiers (URIs) during client registration o Establish and enhance HIT RESTful API security vulnerability testing to minimize evolving cybersecurity risks *A web token signature is a verified and secure means of representing claims to be transferred between two parties 2

Considerations - Continued The following are some recommended topics to consider for client and browser software across multiple platforms including mobile in enabling Health IT (HIT) to be certified for implementing a secure application programming interface (API) for information sharing between partners using RESTful APIs: o Ensure appropriate awareness and mitigation of Cross-Site API vulnerabilities o Vendors should provide to customers current information regarding HIT technology compatibility and interoperability with browsers and client software/platforms, and potential impacts on security o Vendors should incorporate threat monitoring and risk mitigation into the HIT vendor’s product management lifecycle o ONC should also track the efforts of the OpenID Foundation Health Relationship Trust (HEART) Working Group and the Argonaut Project, both of which are addressing privacy and security for RESTful HIT APIs 3