HIT Standards Committee Technical Review of The Direct Project Dixie Baker December 17, 2010.

Slides:



Advertisements
Similar presentations
1 HIT Standards Committee Privacy and Security Workgroup: Reformatted Standards Recommendations & Implementation Guidance Dixie Baker, SAIC Steven Findlay,
Advertisements

HIT Standards Committee Privacy and Security Workgroup Recommendations for Electronic Health Record (EHR) Query of Provider Directories Dixie Baker, Chair.
WTO, Trade and Environment Division
Recommendations on Certification of EHR Modules HIT Standards Committee Privacy and Security Workgroup April 11, 2014.
Enhancing Data Quality of Distributive Trade Statistics Workshop for African countries on the Implementation of International Recommendations for Distributive.
1 HIT Standards Committee Privacy and Security Workgroup: Recommendations Dixie Baker, SAIC Steven Findlay, Consumers Union August 20, 2009.
S&I Framework Provider Directories Initiative esMD Work Group October 19, 2011.
HITPC Information Exchange Workgroup Discussion of Governance RFI May 16,
HIT Policy Committee Privacy and Security Tiger Team Deven McGraw, Chair Paul Egerman, Co-Chair Certificate Authority- Provider Authentication Recommendations.
NHIN Direct Project Communications Work Group Message for State HIE/RECs August 30, 2010.
Supporting Meaningful Use Stage 2 Transition of Care Requirements
Web Services and the Semantic Web: Open Discussion Session Diana Geangalau Ryan Layfield.
THE DICOM 2014 Chengdu Workshop August 25, 2014 Chengdu, China Keeping It Safe Brad Genereaux, Agfa HealthCare Product Manager Industry Co-Chair, DICOM.
S&I Framework Doug Fridsma, MD, PhD Director, Office of Standards and Interoperability, ONC Fall 2011 Face-to-Face.
HISP-to-HISP Discussion May 13, HISP Definition What is a HISP? An organization that provides security and transport services for directed exchange.
Understanding and Leveraging MU2 Optional Transports Paul M. Tuten, PhD Senior Consultant, ONC Leader, Implementation Geographies Workgroup, Direct Project.
Secure Systems Research Group - FAU Web Services Standards Presented by Keiko Hashizume.
Deployment Models A. client (no S/MIME) »NHIN-Direct developed security agent »off-the-shelf S/MIME proxy B. client using Native S/MIME »Internet.
Document Confidentiality Milan Petkovic, Ray Krasinski Structured Documents / Security WGs HL-7 Cambridge Meeting October, 2010.
Justice Information Network Strategic Plan Development Justice Information Network Board March 18, 2008 Mo West, JIN Program Manager.
HIT Standards Committee Hearing on Trusted Identity of Patients in Cyberspace November 29, 2012 Jointly sponsored by HITPC Privacy and Security Tiger Team.
HIT Standards Committee Privacy and Security Workgroup Dixie Baker, Chair Walter Suarez, Co-Chair June 22, 2011.
The NISO Question/Answer Transaction Protocol (QATP) AVIAC January 2004 Donna Dinberg Library and Archives Canada Mark Needleman Sirsi Corporation.
HIT Policy Committee Nationwide Health Information Network Governance Workgroup Recommendations Accepted by the HITPC on 12/13/10 Nationwide Health Information.
HIT Standards Committee HIT Standards Committee Privacy and Security Workgroup Discussion of NwHIN Power Team Recommendations August 6,
Demystifying the Business Analysis Body of Knowledge Central Iowa IIBA Chapter December 7, 2005.
An XMPP (Extensible Message and Presence Protocol) based implementation for NHIN Direct 1.
Federal Aviation Administration Federal Aviation Administration 1 Presentation to: Name: Date: Federal Aviation Administration AMHS Security Security Sub-Group.
TFTM Interim Trust Mark/Listing Approach Paper Analysis of Current Industry Trustmark Programs and GTRI PILOT Approach Discussion Deck TFTM Committee.
Nationwide Health Information Network: Conditions for Trusted Exchange Request For Information (RFI) Steven Posnack, MHS, MS, CISSP Director, Federal Policy.
Module 6 Planning and Deploying Messaging Security.
HIT Standards Committee Privacy and Security Workgroup: Initial Reactions Dixie Baker, SAIC Steven Findlay, Consumers Union June 23, 2009.
HIT Policy Committee Information Exchange Workgroup NwHIN Conditions for Trusted Exchange Request For Information (RFI) May 15,
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
IEEE SCC41 PARs Dr. Rashid A. Saeed. 2 SCC41 Standards Project Acceptance Criteria 1. Broad market application  Each SCC41 (P1900 series) standard shall.
HIT Policy Committee NHIN Workgroup Recommendations Phase 2 David Lansky, Chair Pacific Business Group on Health Danny Weitzner, Co-Chair Department of.
HIT Policy Committee Privacy & Security Workgroup Update Deven McGraw Center for Democracy & Technology Rachel Block Office of Health Information Technology.
February 8, 2005IHE Europe Educational Event 1 Integrating the Healthcare Enterprise Basic Security Robert Horn Agfa Healthcare.
Web Services Standards. Introduction A web service is a type of component that is available on the web and can be incorporated in applications or used.
HIT Policy Committee Information Exchange Workgroup NwHIN Conditions for Trusted Exchange Request For Information (RFI) May 18,
1. 2 Overview In Exchange security is managed by assigning permissions in Active Directory Exchange objects are secured with DACL and ACEs Permissions.
HIT Policy Committee Report from HIT Standards Committee Privacy and Security Workgroup Dixie Baker, SAIC December 15, 2009.
© 2003 The MITRE Corporation. All rights reserved For Internal MITRE Use Addressing ISO-RTO e-MARC Concerns: Clarifications and Ramifications Response.
S&I Provider Directories Initiative Revisions to Initiative Charter July 1, 2011.
S&I PUBLIC HEALTH REPORTING INITIATIVE: DEVELOPING OF A TEAMING APPROACH S&I Public Health Reporting Initiative Nikolay Lipskiy, MD, DrPH, Co-Lead September,
Identity Proofing, Signatures, & Encryption in Direct esMD Author of Record Workgroup John Hall Coordinator, Direct Project June 13, 2012.
HIT Standards Committee NwHIN Power Team Preliminary Results Dixie Baker, Chair August 17,
HIT Standards Committee Overview and Progress Report March 17, 2010.
Scalable Trust Community Framework STCF (01/07/2013)
Draft Provider Directory Recommendations Begin Deliberations re Query for Patient Record NwHIN Power Team July 10, 2014.
September, 2005What IHE Delivers 1 Cross-Enterprise Document Point-to-point Interchange (XDM) IHE Vendors Workshop 2006 IHE IT Infrastructure Education.
Dec 5, 2007NEA Working Group1 NEA Requirement I-D IETF 70 – Vancouver Mahalingam Mani Avaya Inc.
HIT Policy Committee NHIN Workgroup HIE Trust Framework: HIE Trust Framework: Essential Components for Trust April 21, 2010 David Lansky, Chair Farzad.
Discussion - HITSC / HITPC Joint Meeting Transport & Security Standards Workgroup October 22, 2014.
HIT Policy Committee Meeting Nationwide Health Information Network Governance June 25, 2010 Mary Jo Deering, PhD ONC, Office of Policy and Planning NHIN.
End-to-middle Security in SIP draft-ono-sipping-end2middle-security-04 Kumiko Ono IETF62.
Document Encryption Profile Brief Profile Proposal for 2009/10 presented to the IT Infrastructure Planning Committee Martin Rosner, Paul Koster October.
Provider Directories Tasking, Review and Mod Spec Presentation NwHIN Power Team April 17, 2014.
Basic Security Cor Loef Philips Medical Systems Co-Chair IHE Radiology Technical Committee.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
INFORMATION ASSURANCE POLICY. Information Assurance Information operations that protect and defend information and information systems by ensuring their.
HIT Standards Committee NwHIN Power Team Dixie Baker, Chair July 20,
S/MIME T ANANDHAN.
ELECTRONIC MAIL SECURITY
ELECTRONIC MAIL SECURITY
Security Mechanisms Network Security.
Presentation transcript:

HIT Standards Committee Technical Review of The Direct Project Dixie Baker December 17, 2010

Review Team Dixie Baker (Team Lead) Carol Diamond David McCallie John Moehrke Cris Ross Walter Suarez

Review Objective To assess the extent to which the NHIN Direct Project’s* body of existing documentation meets the ONC's goal of defining a "set of policies, standards and services that enable simple, direct, scalable transport over the Internet to be used for secure and meaningful exchange between known participants in support of meaningful use" –Simple means responsive to the Implementation WG's guidelines driven by ease of implementation, concern for the "little guy," and recognition of the fact that the development community is broad and "unspecialized" –Direct means transport of content from a sender to a receiver, with no content-aware intermediary services –Scalable means ability to support increasing workload and to adapt to new exchange models –Secure means minimizing confidentiality, integrity, and availability risk to the content being transported *Note that the “NHIN Direct Project” has been renamed “The Direct Project.” However, for consistency with the language used in the artifacts examined, we will use the term “NHIN Direct” in this presentation.

Approach 1.Reviewed key documents to assess degree to which they described a transport that was simple, direct, secure, and scalable –Design Principles –Consensus Proposal Outlines transport specifications for SMTP-based exchange and for using XDR for exchanges with NHIN Exchange participants –Core Specification –Specification for using XDR and XDM for direct messaging –Security and Trust Consensus Proposal 2.Overall assessment 3.Reached consensus

Simplicity (1 of 2) Is it simple?  Yes  No  Undetermined –Core specification document is “messy” – would be difficult to develop against –Too much optionality –“Suggests” use of Domain Name Service (DNS) to discover and distribute digital certificates -- which has never been used for this purpose, and may duplicate capabilities available from other services (e.g., GSA USAccess for federal agencies) –Requires the sender to know the technical capabilities of the receiver (e.g., Transport Layer Security is optional; allows destination to reject content object, without constraining criteria for rejection)

Simplicity (2 of 2) Recommendation: Make it simple – SMTP transport of S/MIME-secured content objects between entities –Clean up the core specification –Remove optionality –Remove necessity of sender to know the capabilities of the receiver –Remove TLS and S/MIME wrapping from the core specification as options for protecting against information leakage (see Security recommendations) –Don’t require DNS as the only mechanism for certificate discovery and distribution; recommend a standard for certificate discovery and distribution

Direct Exchange Is it direct?  Yes  No  Undetermined –Allows receiver to reject content that does not meet expectations – without constraining the reasons for rejection Recommendation: Make it direct –Keep the NHIN Direct scope as intended – secure exchange of content objects from organization A to organization B –Keep content-agnostic Sender should be able to send, and receiver should be able to accept, a variety of unstructured, semi-structured, and structured content –Content standards are generally controlled by national requirements such as HIPAA, Meaningful Use, and others Default is human-readable content package

Scalability Is it scalable?  Yes  No  Undetermined –Scalable for the purposes for which it was designed Recommendation: Clarify intended purpose and usage –Not well suited for workflows involving high-transactional- volume, point-to-point exchanges that require mechanisms to deal with complex discovery, addressing, and routing issues We consider these workflow issues outside the control of basic NHIN Direct technology –Local policy may limit bandwidth requirements of attachments (e.g., large images) – again, outside the control of basic NHIN Direct technology

Security (1 of 2) Is it secure?  Yes  No  Undetermined –By default, NHIN Direct uses S/MIME and X.509 digital certificates to secure content end-to-end S/MIME verifies the identity of sender and receiver, and encrypts and integrity-protects message content Some risk of data leakage through header fields (to/from, subject) – manageable through policy and guidance –Core specification contains ambiguous requirements regarding the use of TLS and full message wrapping to protect against data-leakage, creating confusion and complexity “SHOULD” provide capability to use mutually authenticated Transport Layer Security (TLS) for all communications Full message wrapping is “RECOMMENDED” and “OPTIONAL” – but warns that some receivers “may present such messages in ways that are confusing to end users“

Security (2 of 2) Recommendation: Specify S/MIME as standard for securing NHIN Direct content end-to-end –Remove TLS and message wrapping as security options in core specification – consider as potential security enhancements to be addressed in future implementation specifications –Address residual risk through policy direction regarding suitable content for subject fields

Observed Discontinuity (1 of 2) Team noted a discontinuity between NHIN Direct’s intended scope and the exchange model presented in the XDR/XDM specification Team recognizes that a need exists for an on/off-ramp capability to facilitate exchanges between small providers and NHIN Exchange participants –How end-points are implemented to address this need is a deployment issue and is inappropriate to include in the core NHIN Direct specification –Appropriate to include in implementation specification to increase efficiency of content processing for exchanges with organizations who have implemented IHE profiles

Observed Discontinuity (2 of 2) Including XDR/XDM as part of the NHIN Direct Project core specification creates concerns with respect to 3 of our 4 criteria –Increases complexity –No longer “direct” exchange –Security is undeterminable Although preliminary work to separate routing and content metadata has been done, not yet accepted by IHE – and is likely to remain an “option” and not part of the core XDR specification Security considerations have not been addressed pending completion of the risk assessment (which is pending completion of the metadata work) Recommend removing XDR/XDM from the NHIN Direct core specification

Overarching Recommendation Support Postel’s Law: “Be conservative in what you send; be liberal in what you receive” (a.k.a. Robustness Principle) –Enable senders to send the minimum information necessary, with high confidence of the identity of the receiver and with end- to-end security protection –Enable receivers to receive a content object without constraints on the format or coding of the information contained therein, other than assurance of its provinence and safety –Optionality among Standards should be limited, but services should have maximum flexibility (Fridsma’s corollary) Recommend that the HITSC adopt both Postel’s Law and Fridsma’s corollary as principles in the development of standards moving forward