330 likes | 433 Views
Patient Protection – Ensuring Trust in the Electronic Health Record. John Weigelt National Technology Officer Microsoft Canada. The Evolving Threat. National Interest. Spy. Personal Gain. Motivation. Thief. Personal Fame. Trespasser. Author. Curiosity. Vandal. Script-Kiddy.
E N D
Patient Protection – Ensuring Trust in the Electronic Health Record John WeigeltNational Technology OfficerMicrosoft Canada
The Evolving Threat National Interest Spy Personal Gain Motivation Thief Personal Fame Trespasser Author Curiosity Vandal Script-Kiddy Undergrad Expert Specialist Expertise
“All security frameworks should include a comprehensive, layered approach...” Understanding the Nine Protection Styles of Host-Based Intrusion Prevention Gartner – May 2005 “Integration and simplified manageabilityare important drivers when purchasing security” The State of Security in SMB & Enterprises, Forrester Research, Inc. – Sept. 21, 2005 Threats are moredangerous than ever Fragmentation ofsecurity technology Difficult to use,deploy and manage Increasingly Challenging Security Concerns More advanced Profit motivated More frequent Application-oriented Too many point products Poor interoperability among security products Lack of integration with IT infrastructure Multiple consoles Uncoordinated event reporting & analysis Cost and complexity
Top Security Challenges Viruses, Spyware and Worms Botnets and Rootkits SPAM, Phishing, Evil Twins and Fraud Virus & Malware Prevention Regulatory Compliance Develop and Implement of Security Policies Reporting and Accountability Business Practices Identity Management and Access Control Managing Access in the Extended Enterprise Security Risk of Unmanaged PCs Implementing Defense in Depth Deploying Security Updates System Identification and Configuration Security Policy Enforcement Security Management
Security: Solution Enabler • Better Patient Outcomes for Citizens • Secure Wireless • Secure Mobility • Reliable Client Machines • Healthcare Community Interoperability • Inter-jurisdictional Collaboration • Trusted Digital Communities
Implement Defence in Depth • Engages the entire organization for success • Allows for the allocation of controls outside of IT • Supports a multidisciplinary approach Legislation Policies Procedures Physical Controls Native Application Features Specialized Capabilities
Security and Privacy Foundations Security Security Safeguards Security Data Marking Rules based Approach Bell- Lapadula Biba Risk Management Approach Evaluation Scheme Security Policies Threat Risk Assessment 50BC 1940 Late 60s 1973 1975 1980s 1983 1986 1993 Privacy Policies Data Marking For Privacy Privacy Enhancing Technologies Privacy Legislation Rules based approach Privacy Impact Assessement Privacy 1983 1994 1996 2001 2002 2002
Privacy Challenges • Spotlight on PIPEDA / PHIPA / FOIPPA • Policy interpretations are still emerging • Relationship to Security services misunderstood • Privacy often implemented in a binary manner • Privacy Metrics Developing • Privacy often driven by popular opinion • Focus on privacy enhancing technologies
Designing for Privacy • Implement for all privacy principles • Privacy implementations require defence in depth • A risk managed approach should be taken • Solutions must provide privacy policy agility • Privacy and security must be viewed as related but not dependent • Use existing technology in privacy enhancing ways http://www.microsoft.com/downloads/details.aspx?FamilyId=C48CF80F-6E87-48F5-83EC-A18D1AD2FC1F&displaylang=en
Dependable, Available Predictable, consistent, responsive service Maintainable Resilient, works despite changes Recoverable, easily restored Proven, ready Secure against attacks Protects confidentiality, integrity and availability of data and systems Manageable Protects from unwanted communication Controls for informational privacy Products, online services adhere to fair information principles Commitment to customer-centric Interoperability Recognized industry leader, world-class partner Open, transparent
Microsoft’s Security Vision is Much More… Establishing trust in computing to realize the full potential of an interconnected world
Microsoft’s Security Focus Fundamentally secure platforms enhanced by security products, services and guidance to help keep customers safe • Security awareness and education through partnerships and collaboration • Information sharing on threat landscape • Best practices, whitepapers and tools • Authoritative incident response • Excellence in fundamentals • Security innovations
Engineering for Security Microsoft’s Security Development Lifecycle • Corporate process and standard for security in engineering • Evangelized internally through training • Verified through pre-ship audit • The Security Development Lifecycle book • Privacy Guidelines for Developing Software Products and Services Shared with ISV and IT development partners • Documentation and training • Learning Paths for Security • Active community involvement Automated with tools in Visual Studio • PREfast • FxCop
Summary of Vista Security Stay More Secure • Anti-malware • Restart Manager • Client-based Security Scan Agent • Fine-grained Audit Control • Communicate More Securely • Network Access Protection • Inbound/outbound firewall • PnP Simple Smart Cards • Pluggable Crypto Run More Securely • User Account Protection • Browser Anti-Phishing and Low-rights IE • Windows service hardening • Start More Securely • Hardware-based Secure Startup • Bit-Locker Full Volume Encryption • Code Integrity
Mainstream Mobility Integrated mobile support throughout the platform Windows Vista, Windows Mobile 5, Smartphone Office, MSN … Visual Studio Passport, Alerts, Messenger Windows Server, Enterprise Servers (SQL, BizTalk, Exchange, MMIS, CMS…)
Comprehensive Security Services Edge Server Applications Encrypting File System (EFS) BitLocker™ Information Protection Network Access Protection (NAP) Client and Server OS Identity Management SystemsManagement Active Directory Federation Services (ADFS) Guidance Developer Tools
Connected Healthcare Framework Microsoft architecture and solution collateral collected from national eHealth initiatives around the world Solution patterns, reference architectures, reference implementations and best practices being distilled into a set of eHealth reference architecture collateral Result will be a core healthcare reference architecture capable of supporting a number of eHealth scenarios • “Your User Processes” • “Your Business Processes”
A set of claims someone makes about me Claims are packaged as security tokens Many identities for many uses Useful to distinguish from profiles What is a digital identity?
Identity is Matched to Context In Context • Bank card at ATM • Gov’t ID at border check • Coffee card at coffee stand • MSN Passport at HotMail Out of Context • Coffee card at border check Maybe Out of Context? • Gov’t ID at ATM • SSN as Student ID • MSN Passport at eBay
User control and consent Minimal disclosure for a defined use Justifiable parties Directional identity Pluralism of operators and technologies Human integration Consistent experience across contexts Join the discussion atwww.identityblog.com The Laws of IdentityAn Industry Dialog
Web Self-Asserted Login Domain Login X-Forest Trust Identity Metasystem Federation Domain/Directory Services Certificate Services ADFS Certificate Authority Authentication Spectrum eAuthentication eID Employee Network Access Cross Program Authentication Interjurisdictional Authentication Business Extranet Citizen Service Delivery Products ERM CRM CardSpace LDAP SQL X.500
Helps end users avoid many phishing attacks Support for two-factor authentication Secure subsystem Self-asserted and “managed” identities Reduces reliance on usernames & passwords Consistent user interface for login and registration Grounded in real-world metaphor Returning Identity Control to the End User CardSpace Safer Easier Built on Web Services Protocols
Microsoft Regulatory Compliance Guide
Microsoft’sMITS Compliance Planning Guide The guide identifies specific Microsoft products and services that can be used to help respond to the 120+ mandatory MITS requirements While this guide is focused on MITS, it is also designed to provide a generic framework that can be used to: • Evolve with MITS and related GoC IT Security guidelines • Respond to other guidelines and legislation, not just MITS • Help non-GoC organizations (Provincial, Municipal, Private Industry)
Microsoft Security Collaboration for Governments Primary Security Concern Security mobilization Prescriptive guidance via on-line content, CD-ROM, on-line training, service offerings Primary audience: IT managers & professionals Developers Offerings are designed to address different concerns Security of IT deployments Security Cooperation Program (SCP) Incident response and public safety collaboration Cooperative projects Information exchange Primary audience: Policy and national security agencies Public safety and incident response agencies Government Security Program (GSP) Source code access Certification evidence Training Feedback New - now includes GSHP Primary audience: Policy makers Purchasing decision makers Computing safety Product security