Title: SECURITY POLICIES AND PROCEDURES PANEL DISCUSSION
1SECURITY POLICIES AND PROCEDURES PANEL DISCUSSION
- Joint DSIC, TBPT, CTMS Meeting
- Natcher Building, National Institutes of Health
(NIH) 45 Center Drive, Bethesda,
MarylandNovember 29, 2006
2Session Goals
- Examine current security management, policy,
procedure assumptions - Clarify where outstanding issues are in major
workspaces - Discuss how current architecture and security
project data from IRB interviews supports - One to two actionable items if possible
3Agenda
- Key drivers
- Frank Manion, FCCC
- Tissue Banks
- Jack London, TJU
- Clinical Trials
- Warren Kibbe, Northwestern
- Susan Pannoni, CoH
- Patient Advocates
- Diane Paul
- Technology Policy and Trust Management
- Bill Weems, UTHSC
- Chris Loudon, Federal e-Authentication
project/Enspire Technologies - QA 20 minutes
- Recap capture and validate the notes derived
from the audience
4Policy Models
- Effective collaboration in a federation requires
- Data standards for authentication
- Data standards for authorization
- Standardization of policy models
- All current grids/federations have policy models
for - Identity/Certificate issuance (trust fabric
maintenance) - Attribute release policies (required for
authorization, implication for privacy) - Authorization/Entitlement issuance (conditions
and mechanisms for authorization) - Security Incident handling (trust fabric
maintenance) - These are being standardized according to policy
frameworks for both secure operation and to allow
federations to inter-operate - Most built on RFC 2527
- Newer, more robust framework is RFC 3647 reviewed
by American Bar Association
5Policy Decisions
- Do we have an appropriate model of authentication
- Strong identity vetting across all workspaces?
- Same for authorization
- Static versus dynamic roles
- Are current processes sufficient for binding
authorization to data objects - Are current development processes sufficient
- Should there be a security/policy review group
- Operating models for trust maintenance
- Risk assessment
- Accountability
6TBPT
7General caBIG Security Framework
- Authentication will be an institutional
responsibility. - Authorization will be application and institution
specific. - Overall governance will be on a grid level, with
institutional participation.
8TBPT-Specific Security Issues
- Currently, mandated security for biorepositories
relates to the protection of privacy of the data
characterizing the biospecimens, not the
biospecimens themselves. - Conceivably the identifying potential of the
biospecimen genetic material may lead to future
security issues relating to the material itself,
as well as the annotation.
9TBPT-Specific Security Issues
- Within an institution, authorization may be a
function of the instance of an application. - Separate tumor banks often exist within one
institution (created and maintained by different
departments or investigators). - Different instances of the same application may
be necessitated by a need for different
authorizations, e.g., - An investigator may be an honest broker for his
breast tissue bank, but a researcher for
someone elses prostate bank.
10CTMS
- Susan PannoniCity of Hope National Medical
Center spannoni_at_coh.orgWarren KibbeRobert H.
Lurie Comprehensive Cancer Center Northwestern
University wakibbe_at_northwestern.edu
11 Purpose of CTMS WSThe Clinical
Trial Management Systems Workspace is developing
a comprehensive set of modular, interoperable and
standards based tools designed to meet the
diverse clinical trials management needs of the
Cancer Center community. The tools developed
will be configurable to meet the needs of Cancer
Centers with little or no clinical data
management systems in place as well as those with
robust systems, and will take into account the
diversity of clinical research activities and
local practices that exist among these Cancer
Centers.
12CTMS Data Considerations
- Secure Information Held Locally
- Protect Patient Health Information
- Protect Scientific Findings until Publication
- Traceable provenance and access
- Information Distributed on an As-Needed Basis
- Protocol Specific Sharing/Export of Data to
Cooperative Group, Coordinating Center or
Pharmaceutical Sponsor - Regulatory Reporting
- Patients are now Active Consumers of Health Care
and Research rather than Passive Recipients
13General caBIG Security Framework
- Authentication will be an institutional
responsibility. - Authorization will be application and institution
specific. - Authorization needs to be data-driven
- Roles are dependent on the protocol and the
organizational source of the data. Needs to
accommodate Pharma, NCI, and cooperative group
studies. - Protocol Based Security (restrict access to
clinicians and research staff involved with the
study) - Role Based Security (DSMB, IRB, Quality
Assurance) - Institutional Security (for Multi-Center/Consortiu
m trials) - Overall governance will be on a grid level, with
institutional participation. - Centralized Management of Standard Code Lists
Pushed Out to Adopters of caBIG Modules - Sponsors able to Push Out Protocol Information
to Eliminate Duplicate Entry and Errors
14Administration of Identity
- Probably will vary from Institution to
Institution - Most Larger Institutions have a
Division/Department Responsible for Clinical
Trials Management - Security for Financial Billing or Protocol
Authoring may be Managed by a Different Group - May leverage Shibboleth or LDAP for institutional
authentication and authorization
15Patient Advocates
16Vulnerabilities
- Loose Lips Sink Ships
- OR HOW COMMON IS COMMON SENSE?
17Vulnerabilities
- WHO HOLDS THE KEYS TO THE KINGDOM?
18Vulnerabilities
19Technology Policy Trust Management
- William Weems, UT Health Science Ctr
- Chris Louden, Enspier Technologies
- representing Federal Govt. e-Authentication
20Identity Management for caBIG
- Identity management (IdM) is critical to the
operation of the Cancer Biomedical Information
Grid (caBIG) if it is to enable seamless, secure
collaborative research among individuals using
restricted resources operated by numerous
organizations. caBIG member institutions must
agree upon a shared trust fabric for identity
management. Individuals affiliated with member
institutions must have certified identities that
permit relying caBIG applications and personnel
to - authenticate the certified physical identity of a
credentialed claimant - to determine from trusted attribute authorities
(AA) if an authenticated claimant has the
appropriate identity attributes to - access restricted resources at a defined level of
authorization, and/or - provision approved restricted resources with
certain identity information.
21Key Concepts
- Two types of identity
- Physical identity is unique to only one person
(Responsibility of the credentialing authority) - Personal attributes. Each attribute is usually
not unique to a single individual. (Generally the
validity of these attributes are managed by many
sources of authority (SOAs) and systems of
records (SORs). They are often referred to as
authorization attributes.) Examples - entitlements,
- memberof,
- roles,
- potentially an infinite number of attributes
managed by multiple SOAs within and external to
an organization..
22Authentication Credential
- Certifies at a known level of assurance (LOA)
that the claimant presenting the credential is
the certified entity. The certified credential
must minimally - Positively identify the certifying authority
(CA). - Positively identify a person whose physical
identity was vetted - Provide a persistent unique identifier for the
vetted person. - Provide a level of assurance that the credential
is presentable only by the person it
authenticates.
23Levels of Assurance (LOA)
- The extent to which an electronic identity
credential may be trusted to actually represent
that the individual explicitly identified by the
credential is the same person engaging in the
electronic transaction with application, service
or relying party. LOA is dependent of - trustworthiness of the identity proofing process,
and - trustworthiness of the credential management
function
24Authentication Policies Procedures
- Determine if IdM policies and procedures for
identity vetting, registration, issuance of
authentication credentials, and credential
management will be based on an accepted body of
standards. Adherence to the U.S. E-Authentication
Standards, for example, will permit the use of
authentication credentials provided by a number
of trusted partners and will greatly facilitate a
broad range of research, clinical and
administrative collaborative efforts and
requirements. - Decide if authentication credentials are to be
used solely for access or also for digital
signatures (It is recommended that credentials be
capable of producing digital signatures.) - Decide if username/password credentials (e.g.
E-authentication LOA 2) as well as cryptographic
based credentials (e-authentication LOA 3 and 4)
will be required. - Define what organization(s) will be the
authentication credentialing/certifying authority
or authorities.
25Federal Government Programs
- Federal Public Key Infrastructure (FPKI)
- High Assurance / Certificate Based Credentials
- Federal Bridge Certificate Authority (FBCA)
- Common Policy
- Criteria Methodology (for Cross Certification)
- Substantial Traction
- E-Authentication
- Federal Identity Federation
- 19 agencies, 6 IdPs, 32 enabled applications
- Inter-federation pilot with inCommon
- Planned demo 12/4 in Chicago Internet2 fall
member meeting - SAML product testing, member Acceptance Testing
- 67 New Applications planned for FY2007
- Trust Model
- Homeland Security Presidential Directive 12
(HSPD-12) - Merges Logical and Physical Access into a single
smart card - Required for federal employees and contractors
See http//www.idmanagement.gov
26Federal PKI
HEBCA?
TAG PMA
See http//www.cio.gov/fpkipa
27E-Authentication Trust Model
1. Establish e-Authentication risk and assurance
levels for Governmentwide use (OMB M-04-04
Federal Policy Notice 12/16/03)
2. Establish standard methodology for
e-Authentication risk assessment (ERA)
3. Establish technical assurance standards for
e-credentials and credential providers (NIST
Special Pub 800-63 Authentication Technical
Guidance)
4. Establish methodology for evaluating
credentials/providers on assurance criteria
(Credential Assessment Framework)
6. Establish common business rules for use of
trusted 3rd-party credentials
5. Establish trust list of trusted credential
providers for govt-wide (and private sector) use
See http//www.cio.gov/eauthentication
28HSPD-12
- Policies / Standards
- FIPS 201 Personal Identity Verification of
Federal Employees and Contractors - SP 800-79 Guidelines for Certification and
Accreditation - Many many more on card interfaces, cryptography,
middleware - http//csrc.nist.gov/piv-program/index.html
See http//www.whitehouse.gov/news/releases/2004/0
8/20040827-8.html
29Q A
30(No Transcript)
31Recommendations
- Will need alternate/interim policy frameworks for
first drafts - Suggestions for using Teragrid policies
- Uses ISO 177992005 and RFC 3647
- Will point to general policy statements
- Will not provide trust
- What matters will be what is in, what is not
- Will need to grapple with the issues of identity
management project wide - Will need to grapple with assignment of
authorization attributes on data objects in the
data model - Risk assessment methodologies should be used for
policy development - Policy frameworks and development methods such as
ISO/IEC 17799 and COBIT v4 should be used to help
define security and policy work - Still need broader, cross-domain consensus on a
security model or models - Convene a cross project working group
32(No Transcript)
33General caBIG Security Framework
- Authentication will be an institutional
responsibility. - Authorization will be application and institution
specific. - Overall governance will be on a grid level, with
institutional participation.
Note Within an enterprise, authentication,
authorization, and overall governance are often
operated in a coordinated manner, by the same
administrative unit, with no effort to
distinguish among them or to establish clear
boundaries between them. On the grid these will
certainly be administered separately, often by
different organizations that are not accountable
to each other, or to a common authority. Decomposi
ng security functions into logically separable
activities, then designing security operations
and policies in a way that allows sensible
interoperation among the different components is
substantially more complex than simply extending
an enterprise model to a multi-site environment.
34TBPT-Specific Security Issues
- Currently, mandated security for biorepositories
relates to the protection of privacy of the data
characterizing the biospecimens, not the
biospecimens themselves. - Conceivably the identifying potential of the
biospecimen genetic material may lead to future
security issues relating to the material itself,
as well as the annotation. - For example, in forensics, biological evidence
(fingerprints or DNA samples) is considered a
more reliable identifier than written records. In
principle, DNA from a biospecimen could be used
to identify the donor as effectively as DNA
evidence can be used in forensic analysis. As DNA
analysis continues to drop in cost and
complexity, it is very likely that concern will
begin to mount about the inherent, irremediable
identifiability within any biospecimen.
35(No Transcript)