Privacy and Security Tiger Team Meeting Discussion Materials Today’s Topic Recommendations on Trusted Identities for Providers in Cyberspace August 20,

Slides:



Advertisements
Similar presentations
Experiences with Massive PKI Deployment and Usage Daniel Kouřil, Michal Procházka Masaryk University & CESNET Security and Protection of Information 2009.
Advertisements

Digital Certificate Installation & User Guide For Class-2 Certificates.
Key distribution and certification In the case of public key encryption model the authenticity of the public key of each partner in the communication must.
Overview of US Federal Identity Management Initiatives Peter Alterman, Ph.D. Chair, Federal PKI Policy Authority and Asst. CIO E-Authentication, NIH.
Digital Certificate Installation & User Guide For Class-2 Certificates.
Interoperability Roadmap Comments Sections E, F, and G Transport & Security Standards Workgroup Dixie Baker, chair Lisa Gallagher, co-chair March 11, 2015.
© Southampton City Council Sean Dawtry – Southampton City Council The Southampton Pathfinder for Smart Cards in public services.
15June’061 NASA PKI and the Federal Environment 13th Fed-Ed PKI Meeting 15 June ‘06 Presenter: Tice DeYoung.
Identity Assurance at Virginia Tech CSG January 13, 2010 Mary Dunker
ESign-Online Digital Signature Service February 2015 Controller of Certifying Authorities Department of Electronics and Information Technology Ministry.
The SAFE-BioPharma Identity Proofing Process Author of Record SWG (Digital Credentials) October 3, 2012 Peter Alterman, Ph.D. Chief Operating Officer,
Confidential 1 Electronic Prescribing of Controlled Substances (EPCS) Part 1 of a 3 Part Series Chuck Klein, Ph.D. GM/Director, Medication Management.
Lecture 23 Internet Authentication Applications
U.S. Department of Justice Drug Enforcement Administration Office of Diversion Control Electronic Prescriptions for Controlled Substances Michelle Ferritto,
1 Privacy and Security Tiger Team Meeting Discussion Materials Topics Patient Authentication Hearing Questions for RFC on Meaningful Use Stage 3 October.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
EDUCAUSE Fed/Higher ED PKI Coordination Meeting
Update on Interoperability Roadmap Comments Sections E, F, and G Transport & Security Standards Workgroup Dixie Baker, chair Lisa Gallagher, co-chair March.
HITSP – enabling healthcare interoperability 1 enabling healthcare interoperability 1 Standards Harmonization HITSP’s efforts to address HIT-related provisions.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE CSci530: Computer Security Systems Authentication.
Confidential 1 Electronic Prescribing of Controlled Substances: Prescriber Identity Proofing and Credentialing Part 2 of a 3 Part Series Chuck Klein, Ph.D.
User Authentication Recommendations Transport & Security Standards Workgroup December 10, 2014.
Identity Management and PKI Credentialing at UTHSC-H Bill Weems Academic Technology University of Texas Health Science Center at Houston.
August 12, Meaningful Use *** UDOH Informatics Brown Bag Robert T Rolfs, MD, MPH.
Identity Management What is it? Why? Responsibilities? Bill Weems Academic Computing University of Texas Health Science Center at Houston.
Federal Requirements for Credential Assessments Renee Shuey ITS – Penn State February 6, 2007.
HIT Policy Committee Privacy and Security Tiger Team Deven McGraw, Chair Paul Egerman, Co-Chair Provider Authentication Recommendations November 19, 2010.
Policy, Trust and Technology Mitigating Risk in the Digital World David L. Wasley Camp 2006 © David L. Wasley, 2006.
Chapter 10: Authentication Guide to Computer Network Security.
2015 User Conference Electronic Prescribing of Controlled Substances (EPCS) April 25, 2015 Presented by: Peter Minio Product Manager, Pediatric and Primary.
Author of Record Digital Identity Management Sub-Workgroup October 24, 2012.
HIT Standards Committee Hearing on Trusted Identity of Patients in Cyberspace November 29, 2012 Jointly sponsored by HITPC Privacy and Security Tiger Team.
Chapter 14 Encryption: A Matter Of Trust. Awad –Electronic Commerce 2/e © 2004 Pearson Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic.
U.S. Department of Justice Drug Enforcement Administration Office of Diversion Control Electronic Prescriptions for Controlled Substances June 1, 2010.
Privacy and Security Tiger Team Recommendations Adopted by The Health IT Policy Committee Relevant to Consumer Empowerment May 24, 2013.
Authentication, Access Control, and Authorization (1 of 2) 0 NPRM Request (for 2017) ONC is requesting comment on two-factor authentication in reference.
Privacy and Security Tiger Team Today’s Discussion: MU3 RFC Comments May 8, 2013.
Privacy and Security Tiger Team Trusted Identity of Providers in Cyberspace Follow-Up Recommendations September 6, 2012.
Update on Interoperability Roadmap Comments Sections G, F and E Transport & Security Standards Workgroup Dixie Baker, chair Lisa Gallagher, co-chair March.
Health Insurance Portability and Accountability Act of 1996 (HIPAA) Proposed Rule: Security and Electronic Signature Standards.
Lecture 23 Internet Authentication Applications modified from slides of Lawrie Brown.
Nationwide Health Information Network: Conditions for Trusted Exchange Request For Information (RFI) Steven Posnack, MHS, MS, CISSP Director, Federal Policy.
Privacy and Security Tiger Team Trusted Identity of Providers in Cyberspace Recommendations August 1, 2012.
HIT Standards Committee Privacy and Security Workgroup: Initial Reactions Dixie Baker, SAIC Steven Findlay, Consumers Union June 23, 2009.
Federated or Not: Secure Identity Management Janemarie Duh Identity Management Systems Architect Chair, Security Working Group ITS, Lafayette College.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
HIT Policy Committee NHIN Workgroup Recommendations Phase 2 David Lansky, Chair Pacific Business Group on Health Danny Weitzner, Co-Chair Department of.
Electronic Submission of Medical Documentation (esMD) Identity Proofing Sub-Workgroup October 31, 2012.
Levels of Assurance in Authentication Tim Polk April 24, 2007.
Privacy and Security Tiger Team Meeting Discussion Materials Today’s Topic Recommendations on Trusted Identities for Providers in Cyberspace August 6,
General Session/ Presentation: “Cross Training: Security Best Practices from Other Industries”.
DIGITAL SIGNATURE. GOOD OLD DAYS VS. NOW GOOD OLD DAYS FILE WHATEVER YOU WANT – PUT ‘NA’ OR ‘-’ OR SCRATCH OUT FILE BACK DATED, FILE BLANK FORMS, FILE.
NIST E-Authentication Technical Guidance Bill Burr Manager, Security Technology Group National Institute of Standards and Technology
Identity Proofing, Signatures, & Encryption in Direct esMD Author of Record Workgroup John Hall Coordinator, Direct Project June 13, 2012.
DIGITAL SIGNATURE.
1 Federal Identity Management Initiatives Federal Identity Management Initatives David Temoshok Director, Identity Policy and Management GSA Office of.
HIT Policy Committee NHIN Workgroup HIE Trust Framework: HIE Trust Framework: Essential Components for Trust April 21, 2010 David Lansky, Chair Farzad.
Privacy and Security Tiger Team Potential Questions for Request for Comment Meaningful Use Stage 3 October 3, 2012.
Attribute Delivery - Level of Assurance Jack Suess, VP of IT
Case Study: Applying Authentication Technologies as Part of a HIPAA Compliance Strategy.
E-Prescribing of Controlled Substances and HHS’ Health IT Efforts Jodi G. Daniel, JD, MPH Director, ONC Office of Policy and Planning.
The Federal E-Authentication Initiative David Temoshok Director, Identity Policy GSA Office of Governmentwide Policy February 12, 2004 The E-Authentication.
E-Authentication Guidance Jeanette Thornton, Office of Management and Budget “Getting to Green with E-Authentication” February 3, 2004 Executive Session.
Identity Management Overview
Trust Profiling for Adaptive Trust Negotiation
Electronic Prescriptions for Controlled Substances
EDUCAUSE Fed/Higher ED PKI Coordination Meeting
Federal Requirements for Credential Assessments
PASSHE InCommon & Federated Identity Workshop
HIMSS National Conference New Orleans Convention Center
Presentation transcript:

Privacy and Security Tiger Team Meeting Discussion Materials Today’s Topic Recommendations on Trusted Identities for Providers in Cyberspace August 20, 2012

Overview of Today’s Discussion Review straw recommendation defining “riskier” transactions and outstanding issues Presentations from entities using two-factor authentication in provider settings Finalize recommendations on provider authentication Refinements, if any, to be done via 2

Revised Straw Recommendation (1of 2) The Tiger Team believes that ONC should move toward individual-user level credentials to meet NIST Level of Assurance (LoA) 3 for riskier exchange transactions, ideally by Meaningful Use Stage 3. Such riskier transactions are those: –that will travel across a network any part of which is or could be unsecured, such as across the open Internet or an unsecured wireless connection –where a person is logging in from outside of the physical confines of the organization (where the individual cannot be observed by others) ? 3 Note: Related recommendations on this subject are included in the backup slides 7 and 8.

Revised Straw Recommendation (2of 2) Such riskier transactions should be identified by each organization as part of its required security risk analysis Low risk activity, such as on-site, intra-organizational access to systems/data (where users can be observed by others) should not require LoA 3. 4

Outstanding Issues Are additional refinements needed to the definition of “riskier” transactions? What, if any, burden issues are associated with the use of two-factor authentication and how are they being managed? –Informed by today’s presentations Does this recommendation implicate a MU Stage 3 requirement for certified EHR systems? If so, how would such a requirement be articulated? What are the implications of setting the bar above what DEA requires (re: ID proofing) for institutional practitioners for e-prescribing controlled substances? 5

Backup slides Backup Slides 6

Recommendations to the HIT Policy Committee 2.As an interim step, the ONC could require baseline two-factor authentication (per NIST ) with existing organization-driven identity proofing (LOA “2.5”) –Two-factor authentication provides additional assurance –Entities not yet required to implement more robust identity proofing per NIST Should extend to all clinical users accessing/exchanging data in the riskier exchange transactions. 7

Recommendations 4.ONC’s work to implement this recommendation should be informed by NSTIC and aim to establish trust within the health care system, taking into account provider workflow needs and the impact of approaches to trusted identity on health care on health care quality and safety. For example, NSTIC also will focus on the capability to pass along key attributes that can be attached to identity. The capability to pass key attributes – e.g., valid professional license – may be critical to facilitating access to data. 5.ONC should consult with NIST about future iterations of NIST to identify any unique needs in the healthcare environment that must be specifically addressed. 8

Authentication Requirements LOA2LOA3 Single factorMulti-factor NIST LOA2 Identity Proofing (or higher) NIST LOA3 Identity proofing (or higher) Approved cryptographic techniques required Approved cryptographic required for all operations Eaves dropper, on-line guessing prevented Eavesdropper, replay, on-line guessing, verifier impersonation and man-in-the- middle attacks prevented LOA3/LOA 4 Multi-factor may be usedMinimum of two factors required; 3 token types may be used: “soft” cryptographic tokens, “hard” cryptographic tokens and “one-time password” device tokens. Examples: shared secret, mobile one- time- password (OTP) application, PKI, USB token, credit card password tokens, RFID or blue tooth token 9

LOA2/LOA3 Identity Proofing Required Information Level 2Level 3 In person Possession of valid current primary Government Picture ID applicant’s picture, and either address of record or nationality of record (e.g. driver’s license or passport) Level 2 plus ID must be verified Remote Possession of a valid Government ID (e.g. a driver’s license or passport) number and Financial account number (e.g., checking account, savings account, loan or credit card) with confirmation via records of either number. Same as Level 2 but confirmation via records of both numbers. 10

Level 2Level 3 Inspects photo-ID, compare picture to applicant, record ID number, address and DoB. If ID appears valid and photo matches applicant then: a) If ID confirms address of record, authorize or issue credentials and send notice to address of record, or; b) If ID does not confirm address of record, issue credentials in a manner that confirms address of record. Essentially same as Level 2 plus Verify via the issuing government agency or through credit bureaus or similar databases. Confirm that: name, DoB, address and other personal information in record are consistent with the application. LOA2/LOA3 Identity Proofing Registration Authority (RA) In Person Process Person 11

LOA2/LOA3 Identity Proofing Registration Authority (RA) Remote Process Level 2Level 3 Verifies information provided by applicant including ID number or account number through record checks either with the applicable agency or institution or through credit bureaus or similar databases, and confirms that: name, DoB, address other personal information in records are on balance consistent with the application and sufficient to identify a unique individual. Address confirmation and notification: a) Sends notice to an address of record confirmed in the records check or; b) Issues credentials in a manner that confirms the address of record supplied by the applicant; or c) Issues credentials in a manner that confirms the ability of the applicant to receive telephone communications or at number or address associated with the applicant in records. Verifies information provided by applicant including ID number and account number through record checks either with the applicable agency or institution or through credit bureaus or similar databases, and confirms that: name, DoB, address and other personal information in records are consistent with the application and sufficient to identify a unique individual. Address confirmation: a) Issue credentials in a manner that confirms the address of record supplied by the applicant; or b) Issue credentials in a manner that confirms the ability of the applicant to receive telephone communications at a number associated with the applicant in records, while recording the applicant’s voice. 12

Privacy and Security Tiger Team DEA E-Prescribing for Controlled Substances: Identity Proofing & Authentication Requirements August 10,

Background DEA’s Interim Final Rule for Electronic Prescriptions for Controlled Substances (EPCS) was published on March 31, 2010 (75 FR ) and authorizes e-prescriptions for controlled substancesDEA’s Interim Final Rule for Electronic Prescriptions for Controlled Substances The rule became effective on June 1, 2010 The IFR establishes requirements for e-prescribing applications, which must: –Undergo a third-party audit or –Be reviewed and certified by an approved certification body. NIST and GSA approved this process based on the reasoning that it was consistent with NIST (and now must align with ) 14

EPCS Interim Final Rule Individual practitioners in private practice (i.e., those practitioners not seeking access to an institutional practitioner's applications), must use approved certification authorities (CAs) and similar credential service providers (CSPs) for identity proofing and credentialing ID proofing must meet NIST SP Assurance Level 3 although a CA or CSP may impose higher standards For practitioners obtaining a two-factor authentication credential that does not include a digital certificate, DEA requires the authentication credential to come from a CSP approved by the GSA Office of Technology Strategy/Division of Identity Management –Note the GSA office as been renamed to the GSA Office of Information Integrity and Access/Identity Assurance and Trusted Access Division. This Division will rely on credentials that have been approved by Federally approved trust framework providers. 15

EPCS Interim Final Rule For practitioners obtaining a digital certificate, DEA requires the digital certificate come from a CA that is cross-certified with the Federal Bridge Certification Authority (FBCA) at a basic assurance level or higher Institutional practitioners are permitted, but not required, to do their own in-house, in-person (not remote) identity proofing –DEA does NOT require these practitioners to meet the requirements of LoA3 for identity proofing because "these institutions already conduct extensive checks before they credential a practitioner" –These practitioners may also obtain identify proofing from an approved CA or CSP –These practitioners may issue authentication credentials themselves or obtain them from an approved CA or CSP –They may also decide to have each practitioner obtain identity proofing and the authentication credential on their own. 16

EPCS Interim Final Rule For both individual and institutional practitioners, two-factor authentication is required –Permissible factors are: a biometric, a knowledge factor (e.g., a password), or a hard token –No biometric second factors have been approved by any of the Federally approved Trust Framework Providers 17

Use of Biometrics for Authentication NIST is for remote applications, i.e., when no attendant is watching the users trying to log on to a system Security/privacy issues with biometrics –Biometrics are not secrets and may be spoofed relatively easily and inexpensively –Anti-spoofing techniques are not mature enough to write a spec for or test for performance –Data at rest can be encrypted but traditional cryptography cannot be used to protect patient's data to do matching, in the same way that password authentication is done Although ONC and other NIST-assisted efforts are underway to address these issues, solutions may be some time off 18