Release 4 FHIR CI-Build

This page is part of the Continuous Integration Build of FHIR Specification (v4.0.1: R4 - Mixed Normative and STU ) in it's permanent home (it will always (will be available incorrect/inconsistent at this URL). The current version which supercedes this version is 5.0.0 . For a full list of available versions, see times).
See the Directory of published versions icon . Page versions: R5 R4B R4 R3 R2

Responsible Owner: Security icon Work Group Maturity Level : 3   Trial Use Normative Security Category : Not Classified Compartments : Device , Group , Patient , Practitioner

Detailed Descriptions for the elements in the AuditEvent resource.

Requirements AuditEvent.agent.network.type This datum identifies the type of network access point identifier of the user device for the audit event. It is an optional value that may be used to group events recorded on separate servers for analysis of access according to a network access point's type. AuditEvent.agent.purposeOfUse Element Id AuditEvent.agent.purposeOfUse Definition Cardinality 0..* Terminology Binding Invariants AuditEvent.entity.type Cardinality 0..1 Terminology Binding Audit event entity type ( Extensible ) Type AuditEvent.entity.lifecycle Element Id AuditEvent.entity.lifecycle Definition Identifier for the data life-cycle stage for the entity. AuditEvent.entity.securityLabel Element Id AuditEvent.entity.securityLabel Invariants Invariants
Element Id AuditEvent
Definition

A record of an event made relevant for purposes of maintaining a security log. Typical uses include detection of intrusion attempts such as operations, privacy, security, maintenance, and monitoring for inappropriate usage. performance analysis.

Short Display Record of an event
Cardinality 0..*
Type DomainResource
Comments Summary false
Comments

Based on IHE-ATNA.

Element Id AuditEvent.type
Definition

Identifier for a family of Partitions the event. For example, a menu item, program, rule, policy, function code, application name audit event into one or URL. It identifies the performed function. more categories that can be used to filter searching, to govern access control and/or to guide system behavior.

Short Display High level categorization of audit event
Cardinality 1..1
Terminology Binding Example Audit Event ID ( Extensible Example )
Type Coding CodeableConcept
Alternate Names This identifies the performed function. For "Execute" Event Action Code audit records, this identifies the application function performed. category; EventTypeCode
Summary true
Comments

Categorization might be done automatically (inferred by code) or manually by user assertion. The absence of a category MAY limit the ability to determine when the element SHOULD be handled, so strong consideration SHOULD be given to how systems will be able to determine category values for legacy data and how data that cannot be categorized will be handled. As well, some categories might not be mutually exclusive, so systems SHOULD prepare for multiple declared categories - even within a single category 'axis'. In general, there SHOULD NOT be a 'strong' binding ('required' or 'extensible') on the category element overall. Instead, the element can be sliced and bindings can be asserted that apply to particular repetitions.

Element Id AuditEvent.subtype
Definition

Identifier Describes what happened. The most specific codes for the category of event.

Short Display Specific type of event
Cardinality 0..*
Terminology Binding Example Audit Event Sub-Type ( Extensible Example )
Type Coding CodeableConcept
Requirements Meaning if Missing The .type element is sufficiently specific.
Requirements

This field enables queries of messages by implementation-defined event categories.

Alternate Names code; EventID
Summary true
Element Id AuditEvent.action
Definition

Indicator for type of action performed during the event that generated the audit.

Short Display Type of action performed during the event
Cardinality 0..1
Terminology Binding AuditEventAction Audit Event Action ( Required )
Type code
Requirements

This broadly indicates what kind of action was done on the AuditEvent.entity by the AuditEvent.agent.

Summary true
Element Id AuditEvent.period AuditEvent.severity
Definition

Indicates and enables segmentation of various severity including debugging from critical.

Short Display emergency | alert | critical | error | warning | notice | informational | debug
Cardinality 0..1
Terminology Binding Audit Event Severity ( Required )
Type code
Meaning if Missing No declared severity.
Summary true
Comments

ATNA will map this to the SYSLOG PRI element.

Element Id AuditEvent.occurred[x]
Definition

The time or period during which the activity occurred.

Short Display When the activity occurred
Cardinality 0..1
Type Period | dateTime
Comments [x] Note See Choice of Datatypes for further information about how to use [x]
Summary false
Comments

The time or period can be a little arbitrary; where possible, the time should SHOULD correspond to human assessment of the activity time.

Element Id AuditEvent.recorded
Definition

The time when the event was recorded.

Short Display Time when the event was recorded
Cardinality 1..1
Type instant
Requirements

This ties an event to a specific date and time. Security audits typically require a consistent time base (e.g. UTC), to eliminate time-zone issues arising from geographical distribution.

Summary true
Comments

In a distributed system, some sort of common time base (e.g. an NTP [RFC1305] server) is a good implementation tactic.

Element Id AuditEvent.outcome
Definition

Indicates whether the event succeeded or failed. A free text descripiton can be given in outcome.text.

Short Display Whether the event succeeded or failed
Cardinality 0..1
Requirements

when a code is given there must be one code from the given codeSystem, and MAY be other equivilant codes from other codeSystems (for example http response codes such as 2xx, 4xx, or 5xx).

Summary true
Comments

In some cases a "success" MAY be partial, for example, an incomplete or interrupted transfer of a radiological study. For the purpose of establishing accountability, these distinctions are not relevant.

Element Id AuditEvent.outcome.code
Definition

Indicates whether the event succeeded or failed.

Short Display Whether the event succeeded or failed
Cardinality 1..1
Terminology Binding AuditEventOutcome Example Audit Event Outcome ( Required Preferred )
Type code Coding
Requirements

when a code is given there must be one code from the given codeSystem.

Summary true
Comments

In some cases a "success" may MAY be partial, for example, an incomplete or interrupted transfer of a radiological study. For the purpose of establishing accountability, these distinctions are not relevant.

Element Id AuditEvent.outcomeDesc AuditEvent.outcome.detail
Definition

A free Additional details about the error. This MAY be a text description of the outcome of error or a system code that identifies the event. error.

Short Display Additional outcome detail
Cardinality 0..*
0..1 Terminology Binding Example Audit Event Outcome Detail ( Example )
Type string CodeableConcept
Summary true
Comments

A human readable description of the error issue SHOULD be placed in details.text.

Element Id AuditEvent.purposeOfEvent AuditEvent.authorization
Definition

The purposeOfUse (reason) authorization (e.g., PurposeOfUse) that was used during the event being recorded.

Short Display Authorization related to the event
Cardinality 0..*
Terminology Binding V3 Value SetPurposeOfUse PurposeOfUse icon ( Extensible Example )
Type CodeableConcept
Requirements

Record of any relevant security context, not restricted to purposeOfUse valueSet. May include security compartments, refrain, obligation, or other security tags.

Alternate Names PurposeOfEvent
Summary true
Comments

Use AuditEvent.agent.purposeOfUse AuditEvent.agent.authorization when you know that it is specific to the agent, otherwise use AuditEvent.purposeOfEvent. AuditEvent.authorization. For example, during a machine-to-machine transfer it might not be obvious to the audit system who caused the event, but it does know why.

Element Id AuditEvent.basedOn
Definition

Allows tracing of authorization for the events and tracking whether proposals/recommendations were acted upon.

Short Display Workflow authorization within which this event occurred
Cardinality 0..*
Type Reference ( Any )
Requirements

Allows tracing of authorization for the audit event and tracking whether proposals/recommendations were acted upon.

Summary false
Element Id AuditEvent.patient
Definition

The patient element is available to enable deterministic tracking of activities that involve the patient as the subject of the data used in an activity.

Short Display The patient is the subject of the data used/created/updated/deleted during the activity
Cardinality 0..1
Type Reference ( Patient )
Requirements

When the .patient is populated it SHALL be accurate to the subject of the used data. The .patient SHALL NOT be populated when the used data used/created/updated/deleted (.entity) by the activity does not involve a subject. Note that when the patient is an agent, they will be recorded as an agent. When the Patient resource is Created, Updated, or Deleted it will be recorded as an entity. May also affect access control.

Summary true
Element Id AuditEvent.encounter
Definition

This will typically be the encounter the event occurred, but some events MAY be initiated prior to or after the official completion of an encounter but still be tied to the context of the encounter (e.g. pre-admission lab tests).

Short Display Encounter within which this event occurred or which the event is tightly associated
Cardinality 0..1
Type Reference ( Encounter )
Requirements

Links the audit event to the Encounter context. May also affect access control.

Summary false
Comments

This will typically be the encounter the audit event was created during, but some audit events MAY be initiated prior to or after the official completion of an encounter but still be tied to the context of the encounter (e.g. pre-admission lab tests).

Element Id AuditEvent.agent
Definition

An actor taking an active role in the event or activity that is logged.

Short Display Actor involved in the event
Cardinality 1..*
Requirements

An agent can be a person, an organization, software, device, or other actors that may MAY be ascribed responsibility.

Alternate Names ActiveParticipant
Comments Summary true
Comments

Several agents may MAY be associated (i.e. have some responsibility for an activity) with an event or activity.

For example, an activity may MAY be initiated by one user for other users or involve more than one user. However, only one user may MAY be the initiator/requestor for the activity.

When a network are used in an event being recorded, there SHOULD be distinct agent elements for the known actors using the network. The agent with a network detail would be the responsible agent for use of that network.

Element Id AuditEvent.agent.type
Definition

Specification The Functional Role of the participation type the user plays when performing the event.

Short Display How agent participated
Cardinality 0..1
Terminology Binding ParticipationRoleType Participation Role Type ( Extensible Preferred )
Type CodeableConcept
Requirements

Functional roles reflect functional aspects of relationships between entities. Functional roles are bound to the realization/performance of acts, where actions might be concatenated to an activity or even to a process. This element will hold the functional role that the agent played in the activity that is the focus of this Provenance. Where an agent played multiple functional roles, they will be listed as multiple .agent elements representing each functional participation. See ISO 21298:2018 - Health Informatics - Functional and structural roles, and ISO 22600-2:2014 - Health Informatics - Privilege Management and Access Control - Part 2: formal models.

Summary false
Comments

For example: assembler, author, prescriber, signer, investigator, etc.

Element Id AuditEvent.agent.role
Definition

The structural roles of the agent indicating the agent's competency. The security role that enabling the user was acting under, that come from local codes defined by agent with respect to the access control security system (e.g. RBAC, ABAC) used activity.

Short Display Agent role in the local context. event
Cardinality 0..*
Terminology Binding SecurityRoleType Example Security Role Type ( Example )
Type CodeableConcept
Requirements

This value ties an audited event Structural roles reflect the structural aspects of relationships between entities. Structural roles describe prerequisites, feasibilities, or competences for acts. Functional roles reflect functional aspects of relationships between entities. Functional roles are bound to a user's role(s). It is an optional value that the realization/performance of acts, where actions might be used concatenated to group events for analysis by user functional role categories. an activity or even to a process. See ISO 21298:2018 - Health Informatics - Functional and structural roles, and ISO 22600-2:2014 - Health Informatics - Privilege Management and Access Control - Part 2: formal models..

Comments Summary false
Comments

Should be roles relevant to the event. Should not be an exhaustive list of roles. For example: Chief-of-Radiology, Nurse, Physician, Medical-Student, etc.

Element Id AuditEvent.agent.who
Definition

Reference to who this agent is that was involved in the event.

Short Display Identifier of who
Cardinality 0..1 1..1
Type Reference ( PractitionerRole | Practitioner | PractitionerRole | Organization | Device CareTeam | Patient | Device | DeviceDefinition | RelatedPerson | Group | HealthcareService )
Requirements

This field ties an audit event to a specific resource or identifier.

Alternate Names userId
Summary true
Comments

Where a User ID is available it will go into who.identifier. AuditEvent.agent.altId Element Id AuditEvent.agent.altId Definition Alternative agent Identifier. For a human, this should be a user identifier text string from authentication system. This identifier would be one known to a common authentication system (e.g. single sign-on), if available. Cardinality 0..1 Type string Requirements In some situations, Where a human name of the user may authenticate with one identity but, to access a specific application system, may use a synonymous identify. For example, some "single sign on" implementations (human readable) it will do this. The alternative identifier would then be the original identify used for authentication, and the User ID is the one known to and used by the application. go into who.display.

Element Id AuditEvent.agent.requestor
Definition

Indicator that the user is or is not the requestor, or initiator, for the event being audited.

Short Display Whether user is initiator
Cardinality 1..1 0..1
Type boolean
Requirements Meaning if Missing false
Requirements

This value is used to distinguish between requestor-users and recipient-users. For example, one person may MAY initiate a report-output to be sent to another user.

Summary true
Comments

There can only be one initiator. If the initiator is not clear, then do not choose any one agent as the initiator.

Element Id AuditEvent.agent.location
Definition

Where the agent location is known, the agent location when the event occurred.

Short Display The agent location when the event occurred
Cardinality 0..1
Type Reference ( Location )
Summary false
Element Id AuditEvent.agent.policy
Definition

The policy or plan Where the policy(ies) are known that authorized the activity being recorded. agent participation in the event. Typically, a single activity may MAY have multiple applicable policies, such as patient consent, guarantor funding, etc. The policy would also indicate the security token used.

Short Display Policy that authorized the agent participation in the event
Cardinality 0..*
Type uri
Requirements

This value is used retrospectively to determine the authorization policies.

Comments Summary false
Comments

For example: Where an OAuth token authorizes, the unique identifier from the OAuth token is placed into the policy element Where a policy engine (e.g. XACML) holds policy logic, the unique policy identifier is placed into the policy element.

Element Id AuditEvent.agent.media AuditEvent.agent.network[x]
Definition

Type of media involved. Used when When the event is about exporting/importing onto media. utilizes a network there SHOULD be an agent describing the local system, and an agent describing remote system, with the network interface details.

Cardinality Short Display 0..1 This agent network location for the activity
Terminology Binding Cardinality Media Type Code ( Extensible ) 0..1
Type Coding Reference ( Endpoint )| uri | string
Requirements [x] Note Usually, this is used instead of specifying a network address. This field is not used for Media Id (i.e. the serial number See Choice of a CD). Datatypes AuditEvent.agent.network Element Id AuditEvent.agent.network for further information about how to use [x]
Definition Requirements

Logical When a network location for application activity, if protocol is used the activity endpoint is associated with the agent most directly using the endpoint. This is usually the software agent that has a implemented the application level protocol. Preference is to define network location. in terms of a Reference(Endpoint), or URI; use string only when address or hostname is all that is known. When encoding using string it is best to encode using the formal canonical host name, but if you can't, then you can encode numeric in Literal address form using square brackets '[]' as a v4 string (in dotted notation), or v6 string (in colon notation).

Cardinality 0..1 Summary AuditEvent.agent.network.address Element Id AuditEvent.agent.network.address false
Definition Comments

An identifier for When remote network endpoint is known, another agent representing the remote agent would indicate the remote network access point endpoint used. Convention is to indicate data flowing from Source to Destination. The convention for Search, given data flows both ways (query parameters vs results), is to have the Source as the initiator of the user device for Search Transaction, and the audit event. Destination the responder to the Search transaction.

Requirements Element Id This datum identifies the user's network access point, which may be distinct from the server that performed the action. It is an optional value that may be used to group events recorded on separate servers for analysis of a specific network access point's data access across all servers. AuditEvent.agent.authorization
Comments Definition

This could be a device id, IP address or some other identifier associated with a device. The authorization (e.g., PurposeOfUse) that was used during the event being recorded.

Element Id AuditEvent.agent.network.type Definition Short Display An identifier Allowable authorization for the type of network access point that originated the audit event. this agent
Cardinality 0..1 0..*
Terminology Binding AuditEventAgentNetworkType PurposeOfUse icon ( Required Example )
Type code CodeableConcept
Requirements

The reason (purpose Record of use), specific any relevant security context, not restricted to this agent, that was used during the event being recorded. purposeOfUse valueSet. May include security compartments, refrain, obligation, or other security tags.

Alternate Names V3 Value SetPurposeOfUse ( Extensible ) PurposeOfUse
Type Summary CodeableConcept false
Comments

Use AuditEvent.agent.purposeOfUse AuditEvent.agent.authorization when you know that is specific to the agent, otherwise use AuditEvent.purposeOfEvent. AuditEvent.authorization. For example, during a machine-to-machine transfer it might not be obvious to the audit system who caused the event, but it does know why.

Element Id AuditEvent.source
Definition

The system actor that is reporting the event.

Short Display Audit Event Reporter
Cardinality 1..1
Requirements

The event is reported by one source.

Comments Summary true
Comments

Since multi-tier, distributed, or composite applications make source identification ambiguous, this collection Events are reported by the actor that detected them. This MAY be one of fields may repeat for each application or process actively involved in the event. For example, multiple value-sets can identify participating web servers, application processes, and database server threads in an n-tier distributed application. Passive event participants (e.g. low-level network transports) need not actors, but MAY also be identified. different. The actor MAY be a human such as a medical-records clerk disclosing data manually, that clerk would be the source for the record of disclosure.

Element Id AuditEvent.source.site
Definition

Logical source location within the healthcare enterprise network. For example, a hospital or other provider location within a multi-entity provider group.

Short Display Logical source location within the enterprise
Cardinality 0..1
Type string Reference ( Location )
Requirements

This value differentiates among the sites in a multi-site enterprise health information system.

Summary false
Element Id AuditEvent.source.observer
Definition

Identifier of the source where the event was detected.

Short Display The identity of source detecting the event
Cardinality 1..1
Type Reference ( PractitionerRole | Practitioner | PractitionerRole | Organization | Device CareTeam | Patient | Device | RelatedPerson )
Requirements

This field ties the event to a specific source system. It may MAY be used to group events for analysis according to where the event was detected.

Alternate Names SourceId
Summary true
Element Id AuditEvent.source.type
Definition

Code specifying the type of source where event originated.

Short Display The type of source where event originated
Cardinality 0..*
Terminology Binding Audit Event Source Type ( Extensible Preferred )
Type Coding CodeableConcept
Requirements

This field indicates which type of source is identified by the Audit Source ID. It is an optional value that may MAY be used to group events for analysis according to the type of source where the event occurred.

Summary false
Element Id AuditEvent.entity
Definition

Specific instances of data or objects that have been accessed.

Short Display Data or objects used
Cardinality 0..*
Requirements

The event may MAY have other entities involved.

Alternate Names ParticipantObject
Comments Summary true
Comments

Required unless the values for event identification, agent identification, and audit source identification are sufficient to document the entire auditable event. Because events may MAY have more than one entity, this group can be a repeating set of values.

Element Id AuditEvent.entity.what
Definition

Identifies a specific instance of the entity. The reference should SHOULD be version specific. This is allowed to be a Parameters resource.

Short Display Specific instance of resource
Cardinality 0..1
Type Reference ( Any )
Summary true
Element Id AuditEvent.entity.type Definition Comments

The type of the object that was involved Use .what.display when all you have is a string (e.g. ParticipantObjectName). Use .what.identifier when you have an entity not in this audit event. FHIR form.

Element Id AuditEvent.entity.role
Definition

Code representing the role the entity played in the event being audited.

Short Display What role the entity played
Cardinality 0..1
Terminology Binding AuditEventEntityRole Example Audit Event Entity Role ( Extensible Example )
Type Coding CodeableConcept
Requirements

For some detailed audit analysis it may MAY be necessary to indicate a more granular type of entity, based on the application role it serves.

Cardinality Summary 0..1 false
Requirements Element Id Institutional policies for privacy and security may optionally fall under different accountability rules based on data life cycle. This provides a differentiating value for those cases. AuditEvent.entity.securityLabel
Comments Definition

This can be used to provide an audit trail Security labels for data, over time, as it passes through the system. identified entity.

Definition Short Display Security labels for on the identified entity. entity
Cardinality 0..*
Terminology Binding SecurityLabels Example set of Security Labels ( Extensible Example )
Type Coding CodeableConcept
Requirements

This field identifies the security labels for a specific instance of an object, such as a patient, to detect/track privacy and security issues.

Comments Copied from entity meta security tags. AuditEvent.entity.name Element Id AuditEvent.entity.name Definition A name of the entity in the audit event. Cardinality 0..1 Type string Requirements Use only where entity can't be identified with an identifier. Summary true false
Comments

This field may be used in a query/report to identify audit events for a specific person. For example, where multiple synonymous Copied from entity identifiers (patient number, medical record number, encounter number, etc.) have been used. meta security tags.

Element Id AuditEvent.entity.description
Definition

Text that describes the entity in more detail.

Short Display Descriptive text
Cardinality 0..1
Type string
Requirements Summary Use only where entity can't be identified with an identifier. false
Element Id AuditEvent.entity.query
Definition

The query parameters for a query-type entities.

Short Display Query parameters
Cardinality 0..1
Type base64Binary
Requirements

For query events, it may MAY be necessary to capture the actual query input to the query process in order to identify the specific event. Because of differences among query implementations and data encoding for them, this is a base 64 encoded data blob. It may MAY be subsequently decoded or interpreted by downstream audit analysis processing.

Summary true
Comments

The meaning and secondary-encoding of the content of base64 encoded blob is specific to the AuditEvent.type, AuditEvent.subtype, AuditEvent.entity.type, and AuditEvent.entity.role. The base64 is a general-use and safe container for event specific data blobs regardless of the encoding used by the transaction being recorded. An AuditEvent consuming application must understand the event it is consuming and the formats used by the event. For example, if auditing an Oracle network database access, the Oracle formats must be understood as they will be simply encoded in the base64binary blob.

The DICOM AuditMessage schema does not support both .name and .query being populated.

Element Id AuditEvent.entity.detail
Definition

Tagged value pairs for conveying additional information about the entity.

Short Display Additional Information about the entity
Cardinality 0..*
Requirements

Implementation-defined data about specific details of the object accessed or used.

Summary false
Element Id AuditEvent.entity.detail.type
Definition

The type name of extra detail provided in the value. This element is the tag for the value. Where a simple string is used for the tag name, use the CodeableConcept.display element.

Short Display The name of the extra detail property
Cardinality 1..1
Terminology Binding Example value set Audit Event Entity Detail Type ( Example )
Type CodeableConcept
string Summary false
Element Id AuditEvent.entity.detail.value[x]
Definition

The value of the extra detail.

Short Display Property value
Cardinality 1..1
Type Quantity | CodeableConcept | string | boolean | integer | Range | Ratio | time | dateTime | Period | base64Binary
[x] Note See Choice of Data Types Datatypes for further information about how to use [x]
Requirements

Should not duplicate the entity value unless absolutely necessary.

Comments Summary false
Element Id AuditEvent.entity.agent
Definition

The value can be string when known entity is attributed to be a string, else base64 encoding should be used an agent to protect binary or undefined content. The meaning and secondary-encoding of express the content of base64 encoded blob is specific to agent's responsibility for that entity in the AuditEvent.type, AuditEvent.subtype, AuditEvent.entity.type, and AuditEvent.entity.role. The base64 activity. This is most used to indicate when persistence media (the entity) are used by an agent. For example when importing data from a general-use device, the device would be described in an entity, and safe container for event specific the user importing data blobs regardless of from that media would be indicated as the encoding entity.agent.

Short Display Entity is attributed to this agent
Cardinality 0..*
Type See AuditEvent.agent
Summary false
Comments

A usecase where one AuditEvent.entity.agent is used by where the transaction being recorded. An AuditEvent consuming application must understand Entity that was used in the event it creation/updating of a target resource, is consuming and not in the formats used by context of the event. For example if auditing an Oracle network database access, same custodianship as the Oracle formats must target resource, and thus the meaning of AuditEvent.entity.agent is to say that the entity referenced is managed elsewhere and that this Agent provided access to it. This would be understood similar to where the Entity being referenced is managed outside FHIR, such as they will through HL7 V2, v3, or XDS. This might be simply encoded where the Entity being referenced is managed in another FHIR resource server. Thus it explains the base64binary blob. provenance of that Entity's use in the context of this AuditEvent activity.