hit standards committee privacy and security workgroup

31
HIT Standards Committee HIT Standards Committee Privacy and Security Workgroup Privacy and Security Workgroup Dixie Baker, Chair, Privacy and Security Workgroup Walter Suarez, Co-Chair, Privacy and Security Workgroup March 29, 2011 1

Upload: aideen

Post on 25-Jan-2016

36 views

Category:

Documents


1 download

DESCRIPTION

HIT Standards Committee Privacy and Security Workgroup. Dixie Baker, Chair, Privacy and Security Workgroup Walter Suarez, Co-Chair, Privacy and Security Workgroup March 29, 2011. 1. Privacy and Security Workgroup. Dixie Baker, SAIC Anne Castro, BlueCross BlueShield of South Carolina - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: HIT Standards Committee Privacy and Security Workgroup

HIT Standards CommitteeHIT Standards CommitteePrivacy and Security WorkgroupPrivacy and Security Workgroup

Dixie Baker, Chair, Privacy and Security WorkgroupWalter Suarez, Co-Chair, Privacy and Security Workgroup

March 29, 2011

1

Page 2: HIT Standards Committee Privacy and Security Workgroup

Privacy and Security Workgroup

• Dixie Baker, SAIC• Anne Castro, BlueCross BlueShield of South Carolina• Aneesh Chopra, Federal Chief Technology Officer• Mike Davis, Veterans Health Administration• Lisa Gallagher, HIMSS• Ed Larsen• David McCallie, Cerner Corporation• John Moehrke, General Electric• Steve Findlay, Consumers Union• Wes Rishel, Gartner • Walter Suarez, Kaiser Permanente• Sharon Terry, Genetic Alliance

2

Page 3: HIT Standards Committee Privacy and Security Workgroup

Agenda

• Standards Development Context

• Recommendations for Digital Signature Standard

1. Requirements and Evaluation Criteria for Standard

2. Need for Investigation

3. Policy Questions for HIT Policy Committee

• Status Update on Recommendations for Standard for Enterprise-Level Provider Directories

3

Page 4: HIT Standards Committee Privacy and Security Workgroup

Standards Development Context

Two needs for standards were assigned to Privacy and Security Workgroup: 1) digital certificates and 2) enterprise-level provider directories

4

Page 5: HIT Standards Committee Privacy and Security Workgroup

RECOMMENDATION #1:REQUIREMENTS AND EVALUATION

CRITERIA FOR DIGITAL CERTIFICATE STANDARD

5

Page 6: HIT Standards Committee Privacy and Security Workgroup

Digital Certificate Basics

• A “digital certificate” is an electronic document that certifies that the subject (person or entity) has been issued a pair of encryption keys that are related in such a way that if one key is used to encrypt something (e.g., file, message, data stream), it can be decrypted only by someone holding the other key

– One key is published for anyone to see (“public key”)

– The other key is kept secret by the entity/person to whom the digital certificate has been issued (“private key”)

– Digital certificates are issued by a “certificate authority” (CA) – and digitally signed by the issuing CA

• CA certificates may be self-issued and self-signed certificates

• CAs periodically publish a “certificate revocation list (CRL)” that identifies those certificates that no longer are valid and that have not expired

6

Page 7: HIT Standards Committee Privacy and Security Workgroup

Digital Certificate Basics

• Digital certificates are used for a number of purposes, including: – To authenticate the identity of an entity or person using a challenge-response

mechanism – To digitally sign a message or other transmitted content (“digital signature”)– To share a secret key to be used to exchange private or sensitive information

• The trustworthiness of a digital certificate is dependent upon how much the user trusts the issuer of the certificate – which may be the top CA in a hierarchical PKI, the CA that issued the user’s own certificate, or any other trusted CA

– The practices used by a CA in issuing and managing certificates are described in its Certification Practice Statement (CPS)

– CPSs may be certified by organizations such as the European Telecommunications Standards Institute (ETSI) and WebTrust, or as meeting minimal standards established by specific communities, such as SAFE Bio-Pharma and Federal Bridge

7

Page 8: HIT Standards Committee Privacy and Security Workgroup

Digital Certificate Trust Models

Hierarchical PKI“Multi-Root” Model

(e.g., the Direct Project)

TrustAnchor

(CA)

Alice

User

Trust Anchor

(Root CA)

Trust Anchor

(Root CA)

UserUser

UserUser

TrustAnchor

(CA)

user Alice trusts certificates issued by her own trust anchor and by

other trust anchors she

deems trustworthy

TrustAnchor

(CA)

User

TrustAnchor

(CA)

TrustAnchor

(CA)

User

PKI-1Root CA

CA

CA CA

User

Bob

CA

UserUserUserUser

user Bob trusts everyone in his PKI hierarchy

8

Page 9: HIT Standards Committee Privacy and Security Workgroup

Digital Certificate Content

Signature of CA that issued certificateAlgorithm used by the CA to sign the certificateVersionSerial numberName of the CA that issued certificatePeriod of time for which the certificate is validName of the subject to whom the certificate is issued The subject’s public keyOptional extensions – such as the purposes for which the certificate may be used

9

Page 10: HIT Standards Committee Privacy and Security Workgroup

Recommended Requirements

• Digital certificates must conform to the X.509 V3 certificate profile defined in RFC 5280 (May 2008)

• Digital certificates to support Direct exchanges:– MUST include the set of Basic Certificate Fields defined in Section 4.1 of RFC 5280

– MUST include the Standard Extensions needed to support the simple mail transfer protocol (SMTP) with Secure/Multipurpose Internet Mail Extensions (S/MIME)

– MAY include additional Standard Extensions as defined in Section 4.2 of RFC 5280

• Digital certificates to support NW-HIN exchanges:– MUST include the set of Basic Certificate Fields defined in Section 4.1 of RFC 5280

– MUST include the Standard Extensions needed to support mutually authenticated transport layer security (TLS) connections

– MAY include additional Standard Extensions as defined in Section 4.2 of RFC 5280

• Certificate revocation lists (CRLs) MUST conform to the X.509 V2 CRL profile defined in Section 5 of RFC 5280 (which supports both Online Certificate Status Protocol (OCSP) and full CRL retrieval)

• Nothing in these requirements precludes the specification of a single standard for a certificate usable for both Direct and NW-HIN exchanges

10

Page 11: HIT Standards Committee Privacy and Security Workgroup

Recommended Evaluation Criteria

• Does the standard conform to the X.509 V3 profile defined in RFC 5280?

• Does the standard specify the Basic Certificate Fields and Extensions as REQUIRED for Direct exchanges?

• Does the standard specify the Basic Certificate Fields and Extensions as REQUIRED for NW-HIN exchanges?

• If the standard includes one or more additional Extensions, are these as specified in the Standard Certificate Extensions defined in RFC 5280?

• If the standard includes Extensions applicable only to Direct or NW-HIN exchanges, are the intended usage of these Extensions clear and unambiguous?

• Does the standard include X.509 V2 certificate revocation lists (CRLs) as defined in RFC 5280?

• Is the standard specified clearly and completely enough for a developer to implement?

11

Page 12: HIT Standards Committee Privacy and Security Workgroup

RECOMMENDATION #2:NEED FOR INVESTIGATION OF

ALTERNATIVES FOR CROSS-CERTIFYING DIGITAL CERTIFICATE

ISSUERS WITH FEDERAL BRIDGE CA

12

Page 13: HIT Standards Committee Privacy and Security Workgroup

• All digital certificates used by federal agencies must link back to the Federal Common Policy Framework Certificate Authority (CA) and must include the assurance level under which the certificate was issued

– Four levels (rudimentary, basic, medium, high) correspond to NIST levels 1-4– Includes several “flavors” of medium assurance for software, hardware and

Personal Identity Verification (PIV)-card-based certificates

• Certificates used to support exchanges between federal agencies and state agencies must be issued by a CA that is cross-certified with the Federal Bridge CA

• To enable health exchanges between the NW-HIN Exchange and federal health agencies, the NW-HIN managed Public Key Infrastructure (mPKI) is cross-certified with the Federal Bridge CA

Bridging with Federal Certificate Authority

13

Page 14: HIT Standards Committee Privacy and Security Workgroup

Federal PKI Architecture*

*Adapted from Federal Identity, Credential, and Access Management (FICAM) Roadmap and Implementation Guidance, Nov 10, 2009

Federal Bridge

CA

CertipathBridge

(Aerospace & Defense)

SAFEBiopharma

Bridge

Federal Common

PolicyFrameworkCA

Non-Federal Bridges

NwHINmPKI

One-way, certifier-to-user relationship

Two-way, certifier-to-certifier relationship (“cross-certification”)

14

Page 15: HIT Standards Committee Privacy and Security Workgroup

• The Direct Project allows a “multi-root” model in which certificates are generated by CAs without a common root – such as Healthcare Interoperability Service Providers (HISPs)

• Both NW-HIN and Direct users will need to exchange health information with federal health agencies – most prominently the VA and CMS

• How feasible would it be to require that certificates used in Direct exchanges be obtained from CAs linked to a bridge or CA cross-certified with the Federal Bridge CA?

Direct Exchanges with Federal Entities

15

Page 16: HIT Standards Committee Privacy and Security Workgroup

Notional Architecture with Direct Cross-Certification

*Adapted from Federal Identity, Credential, and Access Management (FICAM) Roadmap and Implementation Guidance, Nov 10, 2009

Federal Bridge

CA

CertipathBridge

(Aerospace & Defense)

SAFEBiopharma

Bridge

Federal Common

PolicyFrameworkCA

Non-Federal Bridges

NW-HINmPKI

DirectBridge

CA

HISP CA

One-way, certifier-to-user relationship

Two-way, certifier-to-certifier relationship (“cross-certification”)

HISP CAHISP CAHISP CA

16

Page 17: HIT Standards Committee Privacy and Security Workgroup

Recommendation to ONC

• To enable Direct users to exchange health information with federal health agencies, the HITSC Privacy and Security Workgroup recommends that the ONC investigate architectural and operational alternatives for cross-certifying Direct CAs with the Federal Bridge CA, including implications on cost, market dynamics, and complexity

17

Page 18: HIT Standards Committee Privacy and Security Workgroup

RECOMMENDATION #3:POLICY QUESTIONS FOR HIT POLICY COMMITTEE

18

Page 19: HIT Standards Committee Privacy and Security Workgroup

Certificate Trust Issue

• A digital certificate can be trusted only to the extent to which the user trusts the CA who issued the certificate

• Anyone can set themselves up as a CA and issue certificates• Certificates used by Direct Project entities may be issued by any

CA – and the decision of whether to trust the certificate is left up to the communicating entity’s trust relationship with the issuing CA (i.e., whether the CA is recognized as a “trust anchor”)

• To exchange information with federal entities (e.g., VA, CMS), the user will need to hold a certificate that was issued by a CA that is trusted by the Federal Bridge CA

19

Page 20: HIT Standards Committee Privacy and Security Workgroup

Recommended Policy Question for HITPC

• Policy and governance are needed around CAs who issue certificates for use in health exchanges, such as Direct– Defining a mechanism for establishing the legitimacy and

trustworthiness of a certificate authority

– Defining a minimum level of trustworthiness for CAs issuing certificates for Direct exchanges; for example:

• Is certification by WebTrust or ETSI sufficient for health information exchange?

• Does the CA need to meet the minimum standard defined for a trusted relationship with the Federal Bridge CA?

20

Page 21: HIT Standards Committee Privacy and Security Workgroup

SPECIFICATION OF REQUIREMENTS FOR ENTITY-LEVEL PROVIDER DIRECTORIES

(ELPDs)

21

Page 22: HIT Standards Committee Privacy and Security Workgroup

Extracted from HITPC Official Meeting Materials

HITPC APPROVED RECOMMENDATIONS RE ELPDs (1 of 4)

22

Page 23: HIT Standards Committee Privacy and Security Workgroup

Extracted from HITPC Official Meeting Materials

HITPC APPROVED RECOMMENDATIONS RE ELPDs (2 of 4)

23

Page 24: HIT Standards Committee Privacy and Security Workgroup

Extracted from HITPC Official Meeting Materials

HITPC APPROVED RECOMMENDATIONS RE ELPDs (3 of 4)

24

Page 25: HIT Standards Committee Privacy and Security Workgroup

Extracted from HITPC Official Meeting Materials

HITPC APPROVED RECOMMENDATIONS RE ELPDs (4 of 4)

25

Page 26: HIT Standards Committee Privacy and Security Workgroup

EL

PD

Nat

ion

al

Reg

istr

y S

yste

m

EL

PD

Nat

ion

al

Reg

istr

y S

yste

m

ELPD Registrar

ELPD

ELPD

ELPD

ELPD Registrar

ELPD Registrar

ELPD Registration Process ELPD Query/Response

ELPD Model

Extracted from HITPC Official Meeting Materials

26

Page 27: HIT Standards Committee Privacy and Security Workgroup

EL

PD

Nat

ion

al

Reg

istr

y S

yste

m

EL

PD

Nat

ion

al

Reg

istr

y S

yste

mELPD

ELPD Registrar

Standards Requirements

Standards for Query/Response

Messages

Standard for ELPD Submission to

National Registry

Standard for ELPD Structure and

Content

ELPD Registrar Certification; ELPD Certification;

Guidelines for Verification/ Validation; Registrar

Reciprocity

Certification Criteria for

EHRs to Support

ELPD Messages

(policy needs)

27

Page 28: HIT Standards Committee Privacy and Security Workgroup

• ELPD Structure and Content

– To support discoverability requirements (entity, information exchange capabilities, entity’s security credentials)

– To support links with ILPDs (each ILPD entry will reference and point to one or more ELPD entries)

– Minimum data set, definition of data elements that includes entity demographics, information exchange capabilities supported and security credentials

• Submission to National Registry

– Publication/posting protocol

Standards Requirements We Need to Recommend (1 of 2)

28

Page 29: HIT Standards Committee Privacy and Security Workgroup

• ELPD Query

– Query language

– Messaging

• EHR Certification Standards and Criteria

Standards Requirements We Need to Recommend (2 of 2)

29

Page 30: HIT Standards Committee Privacy and Security Workgroup

Progress to Date (1 of 2)

• Discussion of HITPC recommendations

• Reviewed Testimony from September 30, 2010, Provider Directory Hearing

• First priority should focus on a “thin layer of discoverability” for entity-level directories – not at the clinician level (important, but second order)

• Reviewed related work

• NW-HIN requirements for directory services (Avinash Shanbhag)

• Department of Vermont Health Access (Hunt Blair)

• The Direct Project (Arien Malec)

• Veterans Health Administration (Mike Davis)

30

Page 31: HIT Standards Committee Privacy and Security Workgroup

Progress to Date (2 of 2)

• HITPC Information Exchange Workgroup scheduled to present recommendations for individual-level provider directories (ILPDs) on April 13

• Clear need to specify separate standards for ELPDs and ILPDs, whild recognizing interdependencies and linkages between the two and use cases involving both

• Requested HITSC leadership’s permission to delay delivery of ELPD requirements recommendations to enable us to consider both concurrently

• Expect to deliver recommendations for both ELPDs and ILPDs to HITSC at May meeting

31