Consultancy Infrastructure Requirements for Fast, Reliable and Secure HL7 V3 Messaging Andrew Hinchley CPL Consulting.

Slides:



Advertisements
Similar presentations
Network Security Chapter 1 - Introduction.
Advertisements

1 HL7 Educational Session – eHealth Week Budapest 2011 © Health Level Seven International, Inc. All Rights Reserved. HL7 and Health Level Seven.
Steps towards E-Government in Syria
Integrated Care Records David Hancorn & Julia Hopper HealthSystems Consultants Ltd Research & Practice Workshop Edinburgh, 11th/12.
Health Records Management Practitioner
Registry system data exchange General design requirements Pre-sessional Consultations on Registries 19 October 2002 New Delhi, India UNFCCC secretariat.
Standards. A definition A standard is a collection of specifications that has been endorsed by some group so that they may all agree on these issues and.
Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
CHAPTER 8: SECURITY IN COMPUTER NETWORKS Encryption Encryption Authentication Authentication Security Security Secure Sockets Layer Secure.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
Information Security Policies and Standards
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Latest techniques and Applications in Interprocess Communication and Coordination Xiaoou Zhang.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
Viewpoint Consulting – Committed to your success.
Enterprise Architecture The Arkansas Approach. Key Areas What is enterprise architecture? Why is it important? How you can participate Current status.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Internet Protocol Security (IPSec)
Connect – Mersey Care NHS Trust & SCC Knowledge Driven Health.
Chapter 8 Web Security.
The Integrated Care Record Service - a Local Trusts Perspective Peter Knight Head of IM&T Winchester & Eastleigh Healthcare Trust.
Australia’s Experience in Utilising Performance Information in Budget and Management Processes Mathew Fox Assistant Secretary, Budget Coordination Branch.
Lecture slides prepared for “Business Data Communications”, 7/e, by William Stallings and Tom Case, Chapter 8 “TCP/IP”.
1 Microsoft Windows NT 4.0 Authentication Protocols Password Authentication Protocol (PAP) Challenge Handshake Authentication Protocol (CHAP) Microsoft.
Dr. Lo’ai Tawalbeh 2007 INCS 741: Cryptography Chapter 1:Introduction Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus
Yorkshire Centre for Health Informatics Detailed Walkthrough of the NHS MIM, and Message Implementation Manual for Discharge Yorkshire Centre for Health.
Cryptography and Network Security
Eng. Wafaa Kanakri Second Semester 1435 CRYPTOGRAPHY & NETWORK SECURITY Chapter 1:Introduction Eng. Wafaa Kanakri UMM AL-QURA UNIVERSITY
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
Electronic Payment Systems. How do we make an electronic payment? Credit and debit cards Smart cards Electronic cash (digital cash) Electronic wallets.
Internet Security for Small & Medium Business Week 6
Implementing ISA Server Publishing. Introduction What Are Web Publishing Rules? ISA Server uses Web publishing rules to make Web sites on protected networks.
Chapter 13 – Network Security
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Protocols and the TCP/IP Suite
1 Secure Commonwealth Panel Health and Medical Subpanel Debbie Condrey - Chief Information Officer Virginia Department of Health December 16, 2013 Virginia.
Representatives Conference June Today’s briefing should provide… Understanding of government's direction of travel/future of community services.
Network Security Lecture 9 Presented by: Dr. Munam Ali Shah.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
Philip Firth IM&T Strategy Implementation Manager Wrightington, Wigan & Leigh NHS Trust Formulating a strategy for systems integration and selecting an.
XML Web Services Architecture Siddharth Ruchandani CS 6362 – SW Architecture & Design Summer /11/05.
1 Chapter Overview Password Protection Security Models Firewalls Security Protocols.
WebServices, GridServices and Firewalls Matthew J. Dovey Technical Manager Oxford e-Science Centre
1 MIIS IAM Nationwide Journey - MIIS & IAM. 2 Agenda 1.Introduction Original objectives Definition of terms 2.MIIS 3.IAM Introduction Definition Approach.
Customer Interface for wuw.com 1.Context. Customer Interface for wuw.com 2. Content Our web-site can be classified as an service-dominant website. 3.
SOA-39: Securing Your SOA Francois Martel Principal Solution Engineer Mitigating Security Risks of a De-coupled Infrastructure.
Catawba County Board of Commissioners Retreat June 11, 2007 It is a great time to be an innovator 2007 Technology Strategic Plan *
Medical Manager Unit 9 ICBS 170. Medical Manager Electronic Data Interchange (EDI)  Ability to request, receive, transfer and integrate information electronically.
Distribution and components. 2 What is the problem? Enterprise computing is Large scale & complex: It supports large scale and complex organisations Spanning.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
1 Delivering Single Assessment within the NHS National Programme for IT Dr Paul Whatling Senior Clinical Consultant.
Slide 1 From Data to Intelligence™ Collaboration & communication Collaboration in the NHS Who, and where, and making it happen 13 December
Virtual Private Network. ATHENA Main Function of VPN  Privacy  Authenticating  Data Integrity  Antireplay.
National Enrolment Service (NES) Overview October 2015 – June 2016.
© University of Reading Information Technology Services 23 December 2015 Information Security Policy Mike Roch - Director of IT.
AUDIT OF INTERNAL CONTROL Day V Sessions I & II. Session Overview Periodical audit of existence of internal control in order to examine its effectiveness.
Endpoints Lesson 17. Skills Matrix Endpoints Endpoints provide a reliable, securable, scalable messaging system that enables SQL Server to communicate.
Existing Systems Peter Dyke Programme Manager – Existing Systems NHS Connecting for Health
Supporting the NHS to deliver better, safer, quality care NHS Connecting for Health.
LESSON 12 Business Internet. Electronic business, or e-business, is the application of information and communication technologies (ICT) in support of.
EDI ( ELECTRONIC DATA INTERCHANGE). Strategic Impact of EDI Business processes can become more efficient Customer-supplier relationships may change more.
Distribution and components
Goals Introduce the Windows Server 2003 family of operating systems
Andrew Hinchley CPL Consulting
Enterprise Integration
Unit 8 Network Security.
Cryptography and Network Security
Presentation transcript:

Consultancy Infrastructure Requirements for Fast, Reliable and Secure HL7 V3 Messaging Andrew Hinchley CPL Consulting

Consultancy UK direction HL7 V3 offers many options as how the supporting network and security infrastructure is implemented HL7 V3 Infrastructure ballot offers rich set of options for implementing message wrappers and related support messages This is a brief review of the directions that the NHS is taking in supporting HL7 V3 for ICRS messaging

Consultancy Caveats –NPfIT development In a number of areas, NPfIT decisions depend on the results of contractual negotiations which are still under way In others, decisions have yet to be taken with the immediate focus being on completing what is needed to specify and develop the Electronic Booking Service for mid-2004

Consultancy General Principles in networking and security area Supply a set of network services able to be used for a variety of purposes including messaging Implement security infrastructure that provides protection against threats to a variety of communication flows

Consultancy General status - December 2003 Much of the detailed solution has been specified by each short-listed NASP against the NHS stated requirements Selection of the NASP in December will trigger the implementation of the selected NASP’s solutions

Consultancy Security Approach ICRS focuses on high level security mechanisms to counter risks –Pseudonymisation for Secondary Uses –Legitimate Relationships and Sealed enveloped –Role Based Access Control ICRS security solutions for the underlying network can then use standard components –Retain NHS private network with NHS access controls and Code of Connection –Where necessary use link encryption or VPN encryption as appropriate

Consultancy Security Approach For the purposes of this talk, Legitimate Relationships and Sealed envelopes do not impact messages or the network Role Base Access Control may impact messaging if/when authorisation meta- data needs to be carried with the message For initial ICRS applications this is not yet found to be necessary

Consultancy Role-based Access Control In an organisation with as many staff as the NHS, authorised access to clinical information on a “need-to-know” basis is seen as a key requirement Need to provide methods whereby access can be checked and authorised before access is granted A successful universal approach can be used for many types of access including GUI and message-based access

Consultancy Role-based Access Control(RBAC) RBAC requires up-to-date accurate directories of staff Need to tie into NHS initiatives to build staff directories Issues –How many access roles need to be defined? –Business functions can be classified in a way which helps defines which roles should be granted access

Consultancy Role-based Access Control healthcare experiences elsewhere Some implementation experience from US Recent proposals from Veterans Administration –to be presented to HL7 at next WGM –Likely to include specific proposals for including authorisation information in message wrappers

Consultancy Network Infrastructure Retain and strengthen dedicated network for NHSnet comes up for replacement – revised N3 Consider applying encryption close to network : link SSL Increasing focus by Cabinet Office on robustness of key national resources: CNI - Critical National Infrastructure, which includes health. Pressure to enhance network integrity and security from perspective of risks to CNI Specific to Messaging: Need for specific HL7 V3 message transport specifications

Consultancy

Message Routing The message wrapper provides a permanent envelope for the message throughout this transit Messages will be forwarded through relays which need to be able to use the V3 wrapper to apply forward routing as needed V3 messages may need to be carried over a number of different transport protocols between source and destination

Consultancy Message transport services In line with general ICRS approach to communications infrastructure services designed to support a number of requirements including messaging Web Services is a potentially attractive general solution:- –Define message transport services based on SOAP –In HL7 Microsoft have submitted drafts which include use of WSDL

Consultancy Web Services Architecture

Consultancy Web Services transport Reliable Delivery Service not yet stable Link encryption adequate for now. Do not require WS-Security WSDL preferred by companies such as Microsoft to standardise stub software SOAP wrapper may need to duplicate some of the information in the V3 wrapper

Consultancy Application acknowledgements HL7 V3 messaging should not have to rely completely on the network for reliable delivery HL7 V3 defines an end-to-end application acknowledgement and this is being used in NPfIT applications. Messaging is then a true end-to-end service, an independent service layer in the network stack

Consultancy Requirements for message-based authentication or encryption? Current NPfIT plans do not include requirements for either of these:- –Messages pass between trusted NHS Organisations. There is no requirement therefore for authentication information to be carried in the message –Where necessary, link-level encryption can be used to protect messages in transit between NHS Organisations –Within an NHS Organisation any protection requirements are addressed by a local assessment of risks

Consultancy TMS - Transaction and Messaging Service Over time the ICRS TMS will provide an increasing level of functionality –TMS provides additional routing intelligence over that of a standard message relay –TMS may create message copies, for instance to allow copies of clinical reports to be stored in the spine –TMS will have the capability of splitting or recombining messages in future applications as/when these functions are found useful

Consultancy Summary (1) N3 replacement needs less functions than existing network –Focus on high integrity –High speed –High availability –Network Code of Conduct –Level 3 eGIF dial-up access –Interconnects with LSPs

Consultancy Summary (2) Underlying network does not need specific messaging capabilities NASP/LSPs manage messaging layers together Security focus is high level, protecting access to assets on need-to-know basis