Assuring Identities in an Open Trust Framework Interoperability and Connectivity: Privacy, Security and Trust in Health Information Exchange - 5th Annual.

Slides:



Advertisements
Similar presentations
HCQ P MEDICARES HEALTH CARE QUALITY IMPROVEMENT PROGRAM QualityNet Exchange Dennis Stricker Director, Information Systems Group Office of Clinical Standards.
Advertisements

National HIT Agenda and HIE John W. Loonsk, M.D. Director of Interoperability and Standards Office of the National Coordinator Department of Health.
Achieving online trust through Mutual Authentication.
Overview of US Federal Identity Management Initiatives Peter Alterman, Ph.D. Chair, Federal PKI Policy Authority and Asst. CIO E-Authentication, NIH.
Levels of Assurance: An Overview Peter Alterman, Ph.D. Chair, Federal PKI Policy Authority.
EDUCAUSE 2001, Indianapolis IN Securing e-Government: Implementing the Federal PKI David Temoshok Federal PKI Policy Manager GSA Office of Governmentwide.
TFTM Interim Trust Mark/Listing Approach Paper Discussion Deck TFTM Committee IDESG Plenary Meeting January 14, IDESG TFTM Committee1.
1 Jan 2013 © Health Level Seven International ®, Inc. All Rights Reserved. HL7 International and Health Level Seven International are registered.
Kantara Initiative Identity Assurance Framework Overview and Value Proposition March 8, 2011.
FIPS 201 Personal Identity Verification For Federal Employees and Contractors National Institute of Standards and Technology Information Technology Laboratory.
Functional component terminology - thoughts C. Tilton.
August 2004 Providing Industry-wide Security and Identity Management Solutions.
The SAFE-BioPharma Identity Proofing Process Author of Record SWG (Digital Credentials) October 3, 2012 Peter Alterman, Ph.D. Chief Operating Officer,
Connecticut Ave NW, Washington, DC Direct Exchange from Provider to Patient/Consumer ….and Back! David C. Kibbe, MD MBA.
Technical Issues with Establishing Levels of Assurance Zephyr McLaughlin Lead, Security Middleware Computing & Communications University of Washington.
Cross Sector Digital Identity Initiative March 12, 2014 Hearing on the National Strategy for Trusted Identities in Cyberspace (NSTIC) Cross Sector Digital.
1 Trust Framework Portable Identity Schemes Trust Framework Portable Identity Schemes NIH iTrust Forum December 10, 2009 Chris Louden.
Healthcare Identity Assurance Work Group a project of the Kantara Initiative Introduction to: By John Fraser, MEDNETWorld.com October 22 nd, 2009.
Federated Identity, Levels of Assurance, and the InCommon Silver Certification Jim Green Identity Management Academic Technology Services © Michigan State.
Building Trusted Transactions Identity Authentication & Attribute Exchange In Public and Private Federations OASIS Conference September 2010 Joni Brennan,
E-Authentication: What Technologies Are Effective? Donna F Dodson April 21, 2008.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Single-Sign On and Federated Identity.
The E-Authentication Initiative An Overview Peter Alterman, Ph.D. Assistant CIO for e-Authentication, NIH and Chair, Federal PKI Policy Authority The E-Authentication.
Introduction to OIX: A Market Solution to Online Identity Trust Don Thibeau.
Policy, Trust and Technology Mitigating Risk in the Digital World David L. Wasley Camp 2006 © David L. Wasley, 2006.
Privacy and Security Tiger Team Meeting Discussion Materials Today’s Topic Recommendations on Trusted Identities for Providers in Cyberspace August 20,
Assuring Identities in an Open Trust Framework The Identity Assurance Framework Kantara Initiative Presentation to the Kantara Healthcare Identity.
E-Authentication: The Need for Open-Standards in Implementing E-Government October 6, 2004 The E-Authentication Initiative.
TFTM Interim Trust Mark/Listing Approach Paper Analysis of Current Industry Trustmark Programs and GTRI PILOT Approach Discussion Deck TFTM Committee.
Payment Gateways for e-Government services 24 May 2007
5 th Annual Conference on Technology & Standards April 28 – 30, 2008 Hyatt Regency Washington on Capitol Hill
Elements of Trust Framework for Cyber Identity & Access Services CYBER TRUST FRAMEWORK Service Agreement Trust Framework Provider Identity Providers Credential.
1 EAP and EAI Alignment: FiXs Pilot Project December 14, 2005 David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
U.S. Department of Agriculture eGovernment Program July 15, 2003 eAuthentication Initiative Pre-Implementation Status eGovernment Program.
HIT Policy Committee NHIN Workgroup Recommendations Phase 2 David Lansky, Chair Pacific Business Group on Health Danny Weitzner, Co-Chair Department of.
E-Authentication: Simplifying Access to E-Government Presented at the PESC 3 rd Annual Conference on Technology and Standards May 1, 2006.
1 7 th CACR Information Workshop Vulnerabilities of Multi- Application Systems April 25, 2001 MAXIMUS.
Levels of Assurance in Authentication Tim Polk April 24, 2007.
Privacy and Security Tiger Team Meeting Discussion Materials Today’s Topic Recommendations on Trusted Identities for Providers in Cyberspace August 6,
Identity Management: A Technical Perspective Richard Cissée DAI-Labor; Technische Universität Berlin
Authority of Information Technology Application National Center of Digital Signature Authentication Ninh Binh, June 25, 2010.
Credentialing in Higher Education Michael R Gettes Duke University CAMP, June 2005, Denver Michael R Gettes Duke University
Federated Authentication at NIH: Trusting External Credentials at Known Levels of Assurance Debbie Bucci and Peter Alterman November, 2009.
Consumer Authentication for Networked Personal Health Information Redwood Health Information Collaborative March 18, 2008 Josh Lemieux Director, Personal.
All Rights Reserved 2014 © CMG Consulting LLC Federated Identity Management and Access Andres Carvallo Dwight Moore CMG Consulting, LLC October
“Trust me …” Policy and Practices in PKI David L. Wasley Fall 2006 PKI Workshop.
Identity Federations and the U.S. E-Authentication Architecture Peter Alterman, Ph.D. Assistant CIO, E-Authentication National Institutes of Health.
1 Federal Identity Management Initiatives Federal Identity Management Initatives David Temoshok Director, Identity Policy and Management GSA Office of.
Kno2 1 October 22, Agenda Introduction Goal of Pilot Tier Piloting Activity to Pilot Role of Kno2 in the pilot Standards and Technologies Under.
HIT Policy Committee NHIN Workgroup HIE Trust Framework: HIE Trust Framework: Essential Components for Trust April 21, 2010 David Lansky, Chair Farzad.
Transforming Government Federal e-Authentication Initiative David Temoshok Director, Identity Policy and Management GSA Office of Governmentwide Policy.
Kantara Initiative Privacy Framework Overview and Value Proposition 13 May 2011.
Don Thibeau, Executive Director, OpenID Foundation (OIDF) Drummond Reed, Executive Director, Information Card Foundation (ICF)
Attribute Delivery - Level of Assurance Jack Suess, VP of IT
Case Study: Applying Authentication Technologies as Part of a HIPAA Compliance Strategy.
Peter Alterman, Ph.D. Chair, Federal PKI Policy Authority Meet FedFed.
10/08/20041 © 2004 Pete Palmer Federated Identity Management and Regional Health Information Organizations Pete Palmer, Principal Security Analyst, Guidant.
Federal Initiatives in IdM Dr. Peter Alterman Chair, Federal PKI Policy Authority.
The Federal E-Authentication Initiative David Temoshok Director, Identity Policy GSA Office of Governmentwide Policy February 12, 2004 The E-Authentication.
E-Authentication Guidance Jeanette Thornton, Office of Management and Budget “Getting to Green with E-Authentication” February 3, 2004 Executive Session.
Kantara Initiative Healthcare Identity Assurance Work Group
Data and Applications Security Developments and Directions
Tokens & Proofing De-Mystified
Privacy, Security, and Identity Management Update
E-Authentication: What Technologies Are Effective?
HIMSS National Conference New Orleans Convention Center
Dashboard eHealth services: actual mockup
Global Authentication: Liberty Alliance Identity Assurance Framework
Appropriate Access InCommon Identity Assurance Profiles
ONC Update for HITSP Board
Presentation transcript:

Assuring Identities in an Open Trust Framework Interoperability and Connectivity: Privacy, Security and Trust in Health Information Exchange - 5th Annual WHIT Congress – 11/10/2009 The Identity Assurance Framework Kantara Initiative Pete Palmer Co-Chair - Kantara Healthcare Identity Assurance Work Group

Disclaimer Provider This presentation is the result of work developed by volunteers of the Electronic Authentication Partnership, the Liberty Alliance, and the Kantara Initiative and is not a work product of Surescripts.

Kantara Overview Founded: April 20, 2009 Trustees: AOL, BT, CA, Fidelity, Intel, Internet Society, Liberty Alliance, Neustar, Novell, NRI, NTT, Oracle, PayPal and Sun ( see: ) Purpose: To bridge and harmonize identity community efforts To ensure secure online interactions To enhance personal privacy To assure interoperability between OpenID, Liberty, InfoCard and other identity management solutions.

Kantara Healthcare Work Group Founded: August, 2009 History: Was Liberty Alliance Health Care Work Group Purposes: Implement patient access to their medical information and health care providers system using open source solutions Implement simplified health care worker identity management Review/Endorse identity assurance framework to support health information exchanges (HIEs) and the US nationwide health information network (NHIN) Review/endorse patient identification standards for on-line and card identifiers Work with vendors to help foster interoperability Current co-chairs: John Fraser, MEDNETWorld.com, Pete Palmer, Surescripts, and Rick Moore, eHealth Ohio. Home Page: Full Charter is at:

Identity in the Physical World

Today’s Collection of Identity Silos Joe’s Fish Market.Com Tropical, Fresh Water, Shell Fish, Lobster,Frogs, Whales, Seals, Clams

What the User wants… Simplified online experience Get rid of the need for multiple user-ids and passwords Fewer clicks Protected personal information Reduce my risk from fraud Better product & service offerings Web 2.0 and/or “smart phone” data service integration

There are Two Problem Areas  Technical Interoperability  Does the client application I'm using “talk” to the systems I want to use? (can I type in my PIN on my iPhone and have unfettered access to services without logging in again?)  Does the system that authenticates me (vouches for me) “talk” to the service provider systems I want to access? (can I login to my bank's site and use that to pay my taxes, book travel, and check my Gmail account?)  Operational Interoperability & Assurance  Do the commercial and government systems “trust” each others' systems, operating procedures, vetting practices, etc.? (i.e., understand & accept the distribution of liability when/if something goes wrong) We’ll focus today on the Operational Interoperability & Assurance Aspects

…so why the need for a common standard? Identity Assurance Framework

ATM Historic Analogy Seamless Access Across all Networks Linkage of Trust Domains.com Bank ATM Network A Bank ATM Network B Bank ATM Network C Bank A ATM Card Bank B ATM Card Bank C ATM Card Separate Cards with Each Bank Individual Accounts with Many Web Sites.com Bank A ATM Card Bank B ATM Card Bank C ATM Card Linked Cards within Bank Networks Federated Accounts within Trust Domain.com Bank ATM Network A Bank ATM Network B Bank ATM Network C

Federated Cloud: RP applications trusting Federations, who enroll & monitor CSP’s compliant w/FO policies, based on Assessor Assessments Identity Ecosystem: Trust End user (subscriber) Federation Operator Assessor Government Applications, Services, Resources Authentication Technology Credential Service Provider Relying Parties

Identity Assurance Framework  What is it?  Framework supporting mutual acceptance, validation and lifecycle maintenance across identity federations (i.e. systems that trust each other)  Started with EAP Trust Framework, UK tScheme and US e-Auth Federation Credential Assessment Framework as baseline  Harmonized, best-of-breed industry identity assurance standard  Identity credential policy  Business procedure and rule set  Baseline commercial terms  Guideline to foster inter-federation (i.e. inter-trust) on a global scale  It consists of 4 parts:  Assurance Levels  Service Assessment Criteria  Assurance Assessment Scheme and Certification Program  Business Rules/Deployment Guidelines

IAF enabled Inter-Federated Cloud: RP applications trusting [Certified Federations, who enroll & monitor] IAF compliant CSP’s, based on Accredited Assessor Assessments Identity Ecosystem: Trust after IAF End user (subscriber) Federation Operator Assessor Government Applications, Services, Resources Accredited Assessors List IAF’s Initial Focus Authentication Technology Certified Federations List Credential Service Provider Relying Parties

IAF Assurance Levels  Four Primary Levels of Assurance  Level 1 – Little or no confidence in asserted identity’s validity  Level 2 – Some confidence  Level 3 – Significant level of confidence  Level 4 – Very high level of confidence  CSPs are certified by Assessors to a specific Level(s)

Note: Assurance level criteria as posited by the OMB M & NIST SP IAF Assurance Levels Illustrated Multi-factor auth; Cryptographic protocol; “soft”, “hard”, or “OTP” tokens Stringent criteria – stronger attestation and verification of records Stringent organizational criteria Access to an online brokerage account 3 Multi-factor auth w/hard tokens only; crypto protocol w/keys bound to auth process More stringent criteria – stronger attestation and verification Stringent organizational criteria Dispensation of a controlled drug or $1mm bank wire 4 Single factor; Prove control of token through authentication protocol Moderate criteria - Attestation of Govt. ID Moderate organizational criteria Change of address of record by beneficiary 2 PIN and PasswordMinimal criteria - Self assertion Minimal Organizational criteria Registration to a news website 1 Assessment Criteria – Credential Mgmt Assessment Criteria – Identity Proofing Assessment Criteria – Organization Example Assurance Level

Assurance Assessment Scheme & Certification Program Oversight by Member Committee (ARB) Assessor is Accredited based on application of demonstrated expertise CSP service is Certified to LOA(s) based on IAF compliance Technology is Certified to be Interoperable User has safe, simple access to services Credential Service Provider Relying Parties

17 The Result – Identity Ecosystem Commercial Social Networks Financial Government Institutions Industry Employers Family/ Friends People, Entities, Machines... Ubiquitous interoperability Minimize or Eliminate “Token Necklace” Customer Convenience Consistent User Experience Plain Language Simplified On-boarding Low-to-No Cost Ease of Service Selection Clear Risk & Liability

PHR Hospitals Clinics Payors Health Information Exchange - HIE RLS EMR Interoperability for Interoperability for Patient Lookup Patient Lookup Clinical Document Exchange Clinical Document Exchange Privacy and Security Privacy and Security Goal: Health care simplified authentication Simplified Sign Ons HIE Member Users Simplified Sign Ons: to Clinics, Google Health, MS HealthVault, etc, or via iPhone or similar smartphone apps Patient Logins Health Information Systems – Clinics, Hospitals, etc PatientsHealthcare Workers HIE Gateway NHIN Gateway

More Information on IAF and the Assurance Certification Program certification/Identity+Assurance+Certification +Program Thank You!