This
page
is
part
of
the
FHIR
Specification
(v1.0.2:
DSTU
2).
The
current
version
which
supercedes
this
version
is
This page is part of the FHIR Specification (v1.4.0:
STU
3 Ballot 3). The current version which supercedes this version is
5.0.0
.
For
a
full
list
of
available
versions,
see
the
Directory
of
published
versions
. For a full list of available versions, see the
Directory of published versions
D.24
General
Security
Considerations
General Security Considerations
DAF
transactions
often
make
use
of
patient-specific
information
which
could
be
exploited
by
malicious
actors
resulting
in
exposure
of
patient
data.
For
this
reason,
all
DAF
transactions
must
be
secured
appropriately
with
access
to
limited
authorized
individuals,
data
protected
in
transit,
and
appropriate
audit
measures
taken.
Implementers
should
be
aware
of
the
security
considerations
associated
with
FHIR
transactions,
particularly
those
related
to:
DAF transactions often make use of patient-specific information which could be exploited by malicious actors resulting in exposure of patient data. For this reason, all DAF transactions must be secured appropriately with access to limited authorized individuals, data protected in transit, and appropriate audit measures taken.
Implementers should be aware of the
security considerations
associated with FHIR transactions, particularly those related to:
-
Communications
-
Authentication
-
Authorization/Access
Control
Authorization/Access Control
-
Audit
Logging
Audit Logging
-
Digital
Signatures
Digital Signatures
-
Security
Labels
Security Labels
-
Narrative
For
the
purposes
of
DAF,
security
conformance
requirements
are
as
follows:
Systems
SHALL
establish
a
risk
analysis
and
management
regime
that
conforms
with
HIPAA
security
regulatory
requirements.
In
addition
US
Federal
systems
SHOULD
conform
with
the
risk
management
and
mitigation
requirements
defined
in
NIST
800
series
documents.
This
SHOULD
include
security
category
assignment
in
accordance
with
NIST
800-60
vol.
2
Appendix
D.14.
The
coordination
of
risk
management
and
the
related
security
and
privacy
controls
–
policies,
administrative
practices,
and
technical
controls
–
SHALL
be
defined
in
the
Business
Associate
Agreements.
Systems
SHALL
reference
a
single
time
source
to
establish
a
common
time
base
for
security
auditing,
as
well
as
clinical
data
records,
among
computing
systems.
The
selected
time
service
SHOULD
be
documented
in
the
Business
Associate
Agreements.
Systems
SHALL
use
the
AuditEvent
resource
to
capture
audit
logs
of
the
various
transactions.
Systems
SHOULD
capture
as
many
For the purposes of DAF, security conformance requirements are as follows:
-
Systems SHALL establish a risk analysis and management regime that conforms with HIPAA security regulatory requirements. In addition US Federal systems SHOULD conform with the risk management and mitigation requirements defined in NIST 800 series documents. This SHOULD include security category assignment in accordance with NIST 800-60 vol. 2 Appendix D.14. The coordination of risk management and the related security and privacy controls – policies, administrative practices, and technical controls – SHALL be defined in the Business Associate Agreements.
-
Systems SHALL reference a single time source to establish a common time base for security auditing, as well as clinical data records, among computing systems. The selected time service SHOULD be documented in the Business Associate Agreements.
-
Systems SHALL use the
AuditEvent
resource
data
elements
as
appropriate
based
on
local
policies.
The
following
events
SHOULD
trigger
an
audit
event:
Every
successful
and
unsuccessful
Resource
Request
(GET,
READ,
vREAD
etc.)and
corresponding
Response.
Every
Authentication
and
Authorization
request
Security
decisions
related
to
consent,
digital
signatures,
data
release
and
security
labelling
of
returned
resources
Systems
SHALL
use
TLS
version
1.0
or
higher
for
all
transmissions
not
taking
place
over
a
secure
network
connection.
(Using
TLS
even
within
a
secured
network
environment
is
still
encouraged
to
provide
defense
in
depth.)
US
Federal
systems
SHOULD
conform
with
FIPS
PUB
140-2.
Systems
SHALL
conform
to
FHIR
Communications
requirements.
For
Authentication
and
Authorization,
Systems
SHALL
use
the
Smart
On
FHIR
resource to capture audit logs of the various transactions. Systems SHOULD capture as many AuditEvent resource data elements as appropriate based on local policies. The following events SHOULD trigger an audit event:
-
Every successful and unsuccessful Resource Request (GET, READ, vREAD etc.)and corresponding Response.
-
Every Authentication and Authorization request
-
Security decisions related to consent, digital signatures, data release and security labelling of returned resources