140 likes | 152 Views
Learn about the importance of auditing controls in healthcare, including access control, monitoring behavior, and local security policies. Explore how audit and access control coexist, with a focus on different audit systems and emerging audit message schemas.
E N D
Auditing for Accountability in Healthcare Robert Horn, Agfa, Glen Marshall, Siemens
Security Methods • Access Control • Get permission before allowing action • Suitable for situations, e.g. restricting access to authorized medical staff • Audit Control • Allow action without interference, trusting the judgement of the staff. • Monitor behavior to detect and correct errors. • Both have a place in security systems • Local security policies determine what is handled by access control, and what is handled by audit controls.
Audit System Audit Control: Local Policy determines what events to report, and when. Security Audit Message Standard Defines how to describe events Repository Local Policy determines what reports to keep, analyze, etc. Access Control Activity Event Encode a Description Report? Send to Repository
Standards Efforts • IETF - Security Audit Message structure (similar to HL7 version 3 XML structures) • HL7 – Define descriptions of potentially auditable events in the HL7 domain, utilizing the IETF structure • DICOM – Define descriptions of potentially auditable events in the DICOM domain, utilizing the IETF structure
Existing Audit Message • Interim effort by IHE • Radiology-centric view of events • Demonstrated functional capabilities • Part of the IHE Technical Framework • Provides a basis for evaluating the more general solution being developed by IETF, HL7, DICOM, and ASTM • Will coexist with the more general solution, and gradually be replaced by the more general solution.
Emerging Audit Message • New Effort for IHE IT Infrastructure 2004+ • Informed by DICOM, HL7, ASTM, and IHE • Posted as IETF Internet Draft, leading to RFC • Anticipates an enterprise audit repository • Supports uniform policy administration • Enables integration of security surveillance • Provides extensibility to accommodates various government regulations plus enterprise and local policies
EventActionCode EventDateTime EventOutcomeIndicator Emerging Audit Message Schema(2)
UserID AlternativeUserID UserName UserIsRequestor NetworkAccessPointID NetworkAccessPointTypeCode Emerging Audit Message Schema(3)
AuditEnterpriseSiteID AuditSourceID Emerging Audit Message Schema(4)
ParticipantObjectID ParticipantObjectTypeCode ParticipantObjectTypeCodeRole ParticipantObjectDataLifeCycle ParticipantObjectSensitivity Emerging Audit Message Schema(5)
Emerging Audit Message • Extensibility • Is a fully conformant XML Schema • Direct extension: add elements • Restriction: constrain values • Vocabulary: reference to externally defined nomenclature from any source