{"id":1010,"date":"2009-02-27T22:37:33","date_gmt":"2009-02-28T06:37:33","guid":{"rendered":"http:\/\/cubist.cs.washington.edu\/Security\/2009\/02\/27\/1010\/"},"modified":"2009-02-27T22:39:33","modified_gmt":"2009-02-28T06:39:33","slug":"1010","status":"publish","type":"post","link":"https:\/\/secblog.cs.washington.edu\/Security\/2009\/02\/27\/1010\/","title":{"rendered":""},"content":{"rendered":"<p class=\"MsoNormal\">\n<p class=\"MsoNormal\">Intel healthcare: SOA Expressway for Health Care<\/p>\n<p class=\"MsoNormal\">http:\/\/www.intel.com\/healthcare\/ps\/soa\/index.htm?iid=health+lhn_soa<\/p>\n<p class=\"MsoNormal\">Intel has created a scalable, easy to deploy health care network with the hopes of enabling sharing and collaboration of health care information.<span> <\/span>Intel Health Care network is build upon common components such as J2EE and the .Net framework, relying upon a High-performance XML Engine for data transmission.<span> <\/span>It is a &#8220;codeless&#8221; system, which means the network can be deployed and managed without the need for software development assistance.<span> <\/span>Once fully deployed this network promises great cost and efficiency gains, as healthcare and patient information can be shard much more easily.<span> <\/span>However the creation of a new system which will handle large amounts of sensitive patient and drug information brings about many interesting security questions.<\/p>\n<p class=\"MsoNormal\">\n<p class=\"MsoNormal\">Assets:<\/p>\n<p class=\"MsoListParagraphCxSpFirst\" style=\"margin-left: 0.75in; text-indent: -0.25in;\"><!--[if !supportLists]--><span style=\"font-family: Symbol;\"><span>\u00b7<span style=\"font-family: &quot;Times New Roman&quot;; font-style: normal; font-variant: normal; font-weight: normal; font-size: 7pt; line-height: normal; font-size-adjust: none; font-stretch: normal; -x-system-font: none;\"> <\/span><\/span><\/span><!--[endif]--><span> <\/span>Patient Information &#8211; it is of utmost importance to protect all sensitive patient information, including condition and treatment as well as address and billing information.<span> <\/span><\/p>\n<p class=\"MsoListParagraphCxSpLast\" style=\"margin-left: 0.75in; text-indent: -0.25in;\"><!--[if !supportLists]--><span style=\"font-family: Symbol;\"><span>\u00b7<span style=\"font-family: &quot;Times New Roman&quot;; font-style: normal; font-variant: normal; font-weight: normal; font-size: 7pt; line-height: normal; font-size-adjust: none; font-stretch: normal; -x-system-font: none;\"> <\/span><\/span><\/span><!--[endif]-->Drug information \u2013 Many hospitals have strict regulatory policies on the management of drugs, outlining proper administration and inventory practices.<span> <\/span>The integrity (and sometimes secrecy) of information regarding the status of the pharmaceuticals in the organization <span> <\/span><span> <\/span>must be maintained.<\/p>\n<p class=\"MsoNormal\">Adversaries:<\/p>\n<p class=\"MsoListParagraphCxSpFirst\" style=\"margin-left: 0.75in; text-indent: -0.25in;\"><!--[if !supportLists]--><span style=\"font-family: Symbol;\"><span>\u00b7<span style=\"font-family: &quot;Times New Roman&quot;; font-style: normal; font-variant: normal; font-weight: normal; font-size: 7pt; line-height: normal; font-size-adjust: none; font-stretch: normal; -x-system-font: none;\"> <\/span><\/span><\/span><!--[endif]-->Doctors and hospital workers \u2013 The primary users of the system will be the various hospital staff.<span> <\/span>They will have the most interaction with the system as they will use it on a daily basis.<span> <\/span>Hospital staff utilizing the network will require a certain amount of authority (within the system) in order to properly operate it.<span> <\/span>This presents a potential threat, as they will have direct access to patient and drug information, as well as the authority to modify this information.<span> <\/span><\/p>\n<p class=\"MsoListParagraphCxSpMiddle\" style=\"margin-left: 0.75in; text-indent: -0.25in;\"><!--[if !supportLists]--><span style=\"font-family: Symbol;\"><span>\u00b7<span style=\"font-family: &quot;Times New Roman&quot;; font-style: normal; font-variant: normal; font-weight: normal; font-size: 7pt; line-height: normal; font-size-adjust: none; font-stretch: normal; -x-system-font: none;\"> <\/span><\/span><\/span><!--[endif]--><span> <\/span>Network maintenance technicians \u2013 The system is designed to be stand-alone on a day-to-day basis.<span> <\/span>There will be instances when the system will require a certain amount of routine technical maintenance. The people performing this maintenance will be very familiar with the internal workings of the system and will have full access to the system.<span> <\/span>This poses a threat, as it could potentially compromise patient information.<span> <\/span><\/p>\n<p class=\"MsoListParagraphCxSpLast\" style=\"margin-left: 0.75in; text-indent: -0.25in;\"><!--[if !supportLists]--><span style=\"font-family: Symbol;\"><span>\u00b7<span style=\"font-family: &quot;Times New Roman&quot;; font-style: normal; font-variant: normal; font-weight: normal; font-size: 7pt; line-height: normal; font-size-adjust: none; font-stretch: normal; -x-system-font: none;\"> <\/span><\/span><\/span><!--[endif]-->Patients \u2013 If patients are given a chance to interact with the system, it may be possible that they can in some way compromise the system to extract confidential information, or falsify information.<span> <\/span><\/p>\n<p class=\"MsoNormal\">Potential Weaknesses:<\/p>\n<p class=\"MsoListParagraphCxSpFirst\" style=\"margin-left: 0.75in; text-indent: -0.25in;\"><!--[if !supportLists]--><span style=\"font-family: Symbol;\"><span>\u00b7<span style=\"font-family: &quot;Times New Roman&quot;; font-style: normal; font-variant: normal; font-weight: normal; font-size: 7pt; line-height: normal; font-size-adjust: none; font-stretch: normal; -x-system-font: none;\"> <\/span><\/span><\/span><!--[endif]-->Information Storage \u2013 If sensitive information is stored on accessible and\/or unencrypted hard drives, it becomes increasingly easy to tamper with those components (the disks) in the interest of obtaining or modifying confidential information.<span> <\/span><\/p>\n<p class=\"MsoListParagraphCxSpLast\" style=\"margin-left: 0.75in; text-indent: -0.25in;\"><!--[if !supportLists]--><span style=\"font-family: Symbol;\"><span>\u00b7<span style=\"font-family: &quot;Times New Roman&quot;; font-style: normal; font-variant: normal; font-weight: normal; font-size: 7pt; line-height: normal; font-size-adjust: none; font-stretch: normal; -x-system-font: none;\"> <\/span><\/span><\/span><!--[endif]-->Information Interception over Transmission \u2013 When sensitive information is shared between multiple nodes (a network), there must some kind of transmission mechanism.<span> <\/span>Such a mechanism could be a weakness if it does not properly protect the integrity and confidentiality of the data being transmitted.<span> <\/span>Also if the mechanism is not robust or reliable, this could result in the loss of important patient information, vital to patient care.<span> <\/span><\/p>\n<p class=\"MsoNormal\">Defenses:<\/p>\n<p class=\"MsoListParagraphCxSpFirst\" style=\"margin-left: 0.75in; text-indent: -0.25in;\"><!--[if !supportLists]--><span style=\"font-family: Symbol;\"><span>\u00b7<span style=\"font-family: &quot;Times New Roman&quot;; font-style: normal; font-variant: normal; font-weight: normal; font-size: 7pt; line-height: normal; font-size-adjust: none; font-stretch: normal; -x-system-font: none;\"> <\/span><\/span><\/span><!--[endif]-->Required authentication \u2013 all persons who will have any interaction with the system should have a strong means of identifying and authenticating themselves as valid users.<span> <\/span>All users should be limited in their actions and given just enough authority to perform the needed task.<\/p>\n<p class=\"MsoListParagraphCxSpMiddle\" style=\"margin-left: 0.75in; text-indent: -0.25in;\"><!--[if !supportLists]--><span style=\"font-family: Symbol;\"><span>\u00b7<span style=\"font-family: &quot;Times New Roman&quot;; font-style: normal; font-variant: normal; font-weight: normal; font-size: 7pt; line-height: normal; font-size-adjust: none; font-stretch: normal; -x-system-font: none;\"> <\/span><\/span><\/span><!--[endif]-->All information (both patient and otherwise) should be stored on encrypted hard drives which are protected physically.<span> <\/span><\/p>\n<p class=\"MsoListParagraphCxSpLast\" style=\"margin-left: 0.75in; text-indent: -0.25in;\"><!--[if !supportLists]--><span style=\"font-family: Symbol;\"><span>\u00b7<span style=\"font-family: &quot;Times New Roman&quot;; font-style: normal; font-variant: normal; font-weight: normal; font-size: 7pt; line-height: normal; font-size-adjust: none; font-stretch: normal; -x-system-font: none;\"> <\/span><\/span><\/span><!--[endif]-->Any transmission of information should be done through an encrypted channel.<\/p>\n<p class=\"MsoNormal\">Risks:<\/p>\n<p class=\"MsoNormal\">The risks associated with this system are of grave consequences, as they involve sensitive and personal information for many patients.<span> <\/span>The risk of information leakage\/compromise is present not only when the system is accessed\/operated by hospital staff, but is also inherent in the fact that much sensitive information is stored and transmitted over potentially unsafe mediums.<span> <\/span><\/p>\n<p class=\"MsoNormal\">Conclusion:<\/p>\n<p class=\"MsoNormal\">The Intel SOA Expressway for Health Care is a very promising technology which unites health care services and provides access to a great breadth of information.<span> <\/span>It is important to handle this information with great care and a sense of responsibility, as the information is oftentimes sensitive private.<span> <\/span>Intel is doing this by utilizing industry standard security practices, such as XML and web Security. <span> <\/span><\/p>\n<p class=\"MsoNormal\">\n","protected":false},"excerpt":{"rendered":"<p>Intel healthcare: SOA Expressway for Health Care http:\/\/www.intel.com\/healthcare\/ps\/soa\/index.htm?iid=health+lhn_soa Intel has created a scalable, easy to deploy health care network with the hopes of enabling sharing and collaboration of health care information. Intel Health Care network is build upon common components &hellip; <a href=\"https:\/\/secblog.cs.washington.edu\/Security\/2009\/02\/27\/1010\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":122,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5],"tags":[],"class_list":["post-1010","post","type-post","status-publish","format-standard","hentry","category-security-reviews"],"_links":{"self":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/posts\/1010","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/users\/122"}],"replies":[{"embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/comments?post=1010"}],"version-history":[{"count":5,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/posts\/1010\/revisions"}],"predecessor-version":[{"id":1011,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/posts\/1010\/revisions\/1011"}],"wp:attachment":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/media?parent=1010"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/categories?post=1010"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/tags?post=1010"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}