Introduction to Medical Security in 170 minutes Fall 2011 Summary • We present the general concepts of information security – What security means – How security is a process that must be managed – How to protect information and assets • We then consider security within the medical environment, and • Conclude with a pair of practical medical security scenarios. 2 So What is Security?? • Responsible for protecting customers. – Ensure confidentiality-integrity of customer information – Maintain customer contracted service availability. – Enforce customer access to only authorized features. – Ensure error-free and non-malicious interaction between customers and the system. • Responsible for protecting the system itself. – Maintain the confidentiality and integrity of system information. – Enforce operations access to those system attributes authorized – Providing error-free and non-malicious interaction between operations and the system. 3 What do the words "trust" and privacy mean Trust: – We routinely establish a qualitative measure of trust with those we associate/interact with regarding: • Honesty, reliability, . . . – Unfortunately we have yet to identify a quantitative measure of confidence – The best achievable is some measure of assurance that a person or thing cannot abuse the degree of "trust" we have that they will act as expected Privacy: – Privacy is actually the ability to control who has access to information, such as: • Location, credit card numbers, medical condition, DNA 4 Where do we start with measuring assurance • Begins with understanding what needs protection • We need to inventory: – Objects (a.k.a. assets, tangible / intangible property) – Subjects (a.k.a. actors, users) • Also need to identify what/how each subject (class) is allowed to interact with which objects • These Subject – Object – Allowed Access relationships represent the level of "trust" we grant to subjects • For organizations, relationships referred to as policy statements 5 Security Governance - ISO 27001 • Specifies requirements for establishing, implementing, operating, monitoring, reviewing, maintaining and improving a documented Information Security Management System within the context of the organization's overall business risks • Specifies requirements for the implementation of security controls customized to the needs of individual organizations or parts thereof. • Designed to ensure the selection of adequate and proportionate security controls that protect information assets and give confidence to interested parties. • Covers all types of organizations (e.g. commercial enterprises, government agencies, not-for profit organizations). 6 The Role of Policy – ISO 27002 • Developed hierarchically & decomposed into fine grained security requirements • Identifies what assets an organization considers of value • Captures asset value and sensitivity – (e.g. public, proprietary, restricted, copyrighted, Attorney-Client-Privileged) • Identifies organizational subgroups and "need-to-know" by group • Specifies form of authorization required to access an asset • Drives Security Model consideration 7 Integrity Policy Principles of Operation Separation of duty – If two or more steps are required to perform a critical function then at least two different people should perform the steps • Separation of function – Developers do not develop new programs on production systems – Developers do not process production data on development systems • Auditing – Logging must be in place to enable one to determine what actions took place when and by whom 8 Security Models • A security model will – Describe the entities governed by the policy – Define the rules that instantiate the policy • Security models – capture policies for confidentiality and for integrity – Can apply to static policies and where dynamic changes of access rights are required – Some are formal and others are informal Threat Model Security Policy/ Security Model Security Mechanisms 9 Security Models—Classification • Multilevel Security (MLS) or Mandatory Access Control (MAC): concerned with control of vertical information flow – Bell-LaPadula (BLP)—classic confidentiality – HRU (Harrison-Ruzzo-Ullman) deals with creation/deletion of files on which BLP is silent – Biba: BLP upside down deals with integrity ignores confidentiality • Multilateral or Compartmented Security: concerned with control of horizontal information flow – Chinese Wall Model: prevent conflict of interest in professional practice – Clark-Wilson banking, aimed at authentication rather than confidentiality – BMA (British Medical Association)—information flow permitted by medical ethics TOP SECRET A B C D E SECRET CONFIDENTIAL OPEN multilevel shared data multilateral 10 Vulnerabilities There are now thousands of known vulnerabilities] New vulnerabilities discovered every week & exposures published for anyone to review. Automated attack info/scripts for anyone avail almost immediately Most of these vulnerabilities fall into the following categories. Operating system vulnerabilities Introduced from within an operating system design or implementation. Protocol-specific vulnerabilities Characteristic of a protocol & often most intractable since modification may cause loss of interoperability. Configuration vulnerabilities Come from a variety of sources, such as: Hackers may introduce configuration changes that weaken security (e.g. login with a null password). Administrators may unwittingly change the configuration to a less-secure state (like leave tftp enabled). Users may introduce changes to facilitate tedious tasks (like configure a .netrc file with hostname, login, and password for access to another host). Application-specific vulnerabilities Like operating system vulnerabilities, these are difficult to address since the vendor is typically the only one in the position to fix security weaknesses. [1] Internet Security Systems (http://www.iss.net). Security Threats Vs. Attacks • A threat is a potential violation of security. – Thus one is dealing with probabilities • An attack is any action that violates security. – Active adversary (malicious intent) – Inadvertent error (non-malicious intent) – Passive adversary (malicious intent) 12 Security Threat Agents and Attacks • Who are the Adversaries? – Modern systems design based on commercial technology and open standards. – Today’s technology is for sale to all potential customers from a large number of sources. – Since the end of the Cold War, article of faith to declare that the United States no longer faces a technologically sophisticated adversary. – Implies that none of our potential adversaries possess the scientific and engineering establishment of the former Soviet Union. Insider Adversary Expertise Access 3rd Party Technician High High Employee Visitor Intelligence Agent Cyber Criminal Outsider Medium High Medium High Medium High Medium High to to to to Hacker Medium Terrorist Low to Medium High High Medium Low to Medium Low to Medium Low Backing Medium to High Low Risk Tollerance High Low Low to Medium Medium to High Medium to High Low to Medium Low Low Medium to High High Low High 13 Prime Security Objectives Confidentiality: Confidentiality of stored and transferred information, Integrity: Protection of stored and transferred information, Accountability: Accountability for all service invocations and for all network management activities; any entity should be responsible for any actions initiated Availability: All legitimate entities should experience correct access to services and facilities. 14 Security Attacks – In the Abstract • • • • Interruption: This is an attack on availability Interception: This is an attack on confidentiality Modification: This is an attack on integrity Fabrication: This is an attack on authenticity 15 Impact of Attacks • Theft of confidential information • Unauthorized use of – Network bandwidth – Computing resource • Spread of false information • Disruption of legitimate services All attacks can be related and are dangerous! 16 Risk Analysis Risk Analysis (a.k.a. Threat Vulnerability Analysis <TVA>) = 1. 2. 3. Identify asset and its value (physical and logical, such as equipment, data, services, reputation, …) Identify vulnerability of asset = type of asset exposure (degree of exposure), duration of asset exposure Identify threat to asset = type of threat agent, method of attack by threat agent, probability of attack occurring, probability of attack success, degree of damage to targeted asset as a percentage of asset value = probability of damage to an asset over a specified timeframe And can be restated as: - Asset Ax has a value of $x, exposure degree of EDx, exposure timeframe as ETx - Threat Tz is composed of Thread Agent TAz, an Attack Az, which has a probability of occurrence AOz which has a probability of success ASz resulting in percent of damage ADz = Tz (Ax ) = Magnitude of damage in $ over timeframe 17 Security Services 18 User Authentication • An operating system bases much of its protection on knowing who a user of the system is • Authentication mechanisms fall into the following categories: – What the user knows: • Passwords, PINs, etc. – What the user is: • Biometrics, based on a physical characteristic of the user – Fingerprint, voice, face • Use of Passwords – The most common authentication mechanism – Assumed to be known only to the user and the system – How systems behave during validation: • Someone enters (a guessed) username – Do not respond with the message UNKNOWN user • Ask for both username and password and respond as FAILURE is no match 19 Authenticating People vs. Machines People Based on Something possessed Something known Personal attribute Can (sometimes) remember password; Password should be mnemonic & relatively easy to remember Writing it down is less secure. Subject Attributes (Biometrics) – fingerprints, signatures, iris, retina, hand geometry, voice, face, etc. Machines Can store high quality secret, e.g. long random looking number; Can perform long and/or complex cryptographic computations. 20 Cryptographic Functions and Their Uses Functions. 1. Public key: two keys – public key e and private (always kept secret) key d 2. Secret key: one key – shared secret key S 3. Hashes: no key or shared secret key S; and has still useful security uses!! Uses: Confidentiality while transmitting over insecure channels (untrusted connections). Confidential storage on Insecure Media. Authentication: validate that asserted identity of subject can be reasonably linked to subject (in personal terms prove you are who you claim to be) Peer-Entity (both human-system and inter-system Information (Data) Origin Information Integrity Verification: prove message not altered Non-repudiation (Sender, Receipt, Timestamp, Notary) 21 Keyed Hash for Authentication • Also called Message Digest, Digital Fingerprint, Digital Authenticator • Is an authentication mechanism that works as follows: Digest-algorithm: data block of arbitrary length plus secret key bit sequence of fixed length Properties: - If one or several bits of data change, message digest changes too - Forger in possession of a given message cannot construct fake message with same message digest WITHOUT shared secret key - Only provides "Data Origin Authentication" and integrity detection Algorithms: - MD5 (RFC 1321) hash-function: X 128-bit sequence (processed in blocks of 512 bits) - SHA-1 hash-function: X 160-bit sequence (processed in blocks of 512 bits) - SHA-256 & SHA-515 now being discussed 22 MAC & Symmetric Encryption Alice Bob Message Authentication via MAC & secret key Clear-text Message Shared Secret Key MD5 or SHA1 message Digest Algorithm 128 or 160 bit keyed digest Clear-text Message 128 or 160 bit keyed digest Shared Secret Key MD5 or SHA1 message Digest Algorithm 128 or 160 bit keyed digest Message Authentication via symmetric encryption & secret key = means no modification in transit and sent by Alice = Not = means modification in transit or not sent by Alice Shared Secret Key Clear- text(M) Shared Secret Key Symmetric Encryption Algorithm (Encrypt) Cipher- text (C) Symmetric Encryption Algorithm (Decrypt ) Clear- text(M) 23 Asymmetric Encryption Alice’s Public Key Encrypting with Alice’s Private key Alice Clear-text Message (M) Alice’s Public Key Alice Clear-text Message (M) Asymmetric Encryption Algorithm (Encrypt) Asymmetric Encryption Algorithm (Decrypt) Clear-text Message (M) Asymmetric Encryption Algorithm (Decrypt) Clear-text Message (M) Cipher-text Message (C) Jerry Bob Alice’s Public Key Alice’s Private Key Asymmetric Encryption Algorithm (Encrypt) Alice’s Private Key Jerry Asymmetric Encryption Algorithm (Decrypt) Clear-text Message (M) Cipher-text Message (C) Asymmetric Encryption Algorithm (Decrypt) Clear-text Message (M) Encrypting with Alice’s Public key Bob Alice’s Public Key 24 Key Management • Spans key: – Generation, storage, possibly escrow, distribution, revocation, destruction, archiving • Problem: – How do we establish and distribute keys when a new node is added? – Naïve - Brute Force approach: » – - generate n new keys – one for each of the nodes of the network; - securely distribute security key to each node of network obviously not workable for large number of nodes • Primary approaches are: – Key Distribution Center (KDC) – Public Key Infrastructures (PKI) – Diffie-Hellman Key Negotiation Protocol B A C D E 25 Common Security Mechanisms • • • • • • • • IEEE 802.1X IP Security (IPSec) Packet Filtering (Firewalls) Application Gateways Deep Packet Inspection (IDS-IPS) Transport Layer Security (TLS, SSL, DTLS, SSH) Email Security (PGP, SMIME) Extensible Markup Language (XML) • Whenever security mechanisms are used, one cannot ignore the management of these mechanisms "these are issues that students can explore in more detail for their thesis work" 26 Security Management • Security Event-Fault-Attack Management – Event collection (IDS, traps, etc.), reconciliation/consolidation, Alarm generation, attack identification, attack mitigation • Security Configuration Management – Packet filtering rules, cryptographic policies and parameters, security patches, access control rules, login accounts, etc. • Login Access Management – Login authorization for administrative, craft, peer-carrier, law enforcement, vendor, customer (enterprise, wholesale, retail) • Authentication Credentials Management – passwords, SecureID (tokens), Radius, symmetric/asymmetric cryptographic key material • Verification & Validation Management – Auditing, Vulnerability Analyses, Intrusion Detection 27 10 minute break, please be prompt. 28 Healthcare—Security Examples This health care security discussion follows the presentation in Ross Anderson 2008 "Security Engineering" (Computer Lab, U Cambridge, UK, http://www.cl.cam.ac.uk/~rja14/) • Privacy of Patient Record in Hospital Systems • Protection of Patient Identity in Research Studies • Security of Web-Based Applications • New Safety Risks in New Technologies 29 Hospitals: Privacy of Patient Record Systems • Who should have access to patient data and for how long? – Obviously not all staff – Devise and implement rules such as "nurses in department can see record of any patient treated by the department in the last year" • Difficulties for traditional security systems – Changing security roles, e.g. nurses change department. Traditional security systems use role based models but prefer static roles – Cross dependencies: if personnel system is used to drive access, e.g. nurse file in personnel system includes access privileges, personnel system becomes critical for safety, privacy or for both. Traditional security systems strive to define separate domains/levels with limited cross dependencies 30 Research: Protection of Patient Identity • How do we anonymize /de-identify data reliably? • Difficult because removing names and encryption does not protect from revealing identity through queries such as "Show all records of males between 25 and 35 years treated for tear of the anterior cruciate ligament (ACL) in 2003". (ACL is the most serious basketball injury, requiring surgery, 9-12 months rehab, and potentially lasting limitations on running and jumping.) Protection techniques are known as inference control 31 Web-Based Applications: Safety & Security • New Assurance Problems: – reference books (e.g. drug directories) move online assurance that life-critical data (e.g. dosage per body weight), are correct as published by the relevant authority, not mangled due to transport, storage, interference, etc. data integrity becomes a safety issue – doctors process patient records from home/laptops/PDA need suitable authentication and encryption tools 32 New Technologies: New Risks • New risks not well understood, e.g. online radiology systems: X-rays go directly from machine to server in distant town (not as previously in an envelope to the operating theatre) network failure can stop the surgery just as can power failure Difference: typically there are clear procedures for dealing with outages of power, telephone, etc. but how to deal with server crash or network disruptions is rarely well documented. 33 Medical Information Systems & Security • Younger field than defense and banking • Healthcare spending in developed countries is a much larger percentage of GDP than military for the US in 2009 healthcare spending (including private) is – $2,142 B or 17.6% of GDP https://www.cms.gov/NationalHealthExpendData/25_NHE_Fact_sheet.asp (DHSS website) vs. – $640 B or 4.7% for defense http://data.worldbank.org/indicator/MS.MIL.XPND.GD.ZS • 2006 study by Department of Health and Human Services (DHHS) : investments in IT will be recouped in 3-13 years & will make services safer and more efficient • 2012 US Budget: health 22.62% defense 19.27% http://www.whitehouse.gov/omb/budget 34 The Controversy of Medical Data Privacy • 1995: Mark Farley, convicted child rapist working as orthopedic technician in Newton-Wellesley Hospital, Newton, MA, was using patient records to find targetsHIPPA cosponsored by Ed Kennedy • UK attempt to centralize all medical record in 1995-96 led to a confrontation with the BMA • Late 1990s: Iceland national medical database project that also incorporates genetic and genealogical data to track inherited diseases across generation, caused uproar. – 11% of population opted out – Supreme Court decided the database should be opt-in rather than optout – ca. half the population now participates 35 The Controversy… (continued) • Debate on Safety vs. Privacy Tradeoff of Emergency Medical Information in Europe – emergency medical data should be readily available for safety – "readily available" can mean less secure and vice versa "secure" can mean "not readily available" – Germany: current prescriptions and allergy on medical insurance card that person carries—private/secure, but is it safe? If patient falls ill in country where smart card readers are not available this becomes a safety risk and the alternative information in human-readable format on a bracelet is safer though less secure – UK: government is creating a 'summary care record' of prescriptions and allergies kept on central database, available to many health-care workers (emergency services, out-of-hour help lines)—safe, but not secure as it may reveal sensitive information, e.g. HIV, depression, alcoholism. 36 HIPAA (Health Insurance Portability & Accountability Act) 1996 passed by Congress in; 2003 as HIPAA Final Security Rule; 2006 further simplified; includes five technical security services requirements and required and addressable implementation specs (CFR 45 § 164.312 Technical safeguards. • Access control – required: unique user identification (i.e. no group and generic logins), emergency access procedure – addressable: automatic logoff, encryption/decryption • Audit control – addressable: health information has not been altered or destroyed in an unauthorized manner. • Data Integrity • Person or Entity Authentication • Transmission Security – addressable: integrity controls, encryption/decryption Common-sense general requirements; Few implementation specifics. 37 Summary of Challenges/Requirements for Security Engineer • • • • Dynamic Security Roles—Role Based Models Multilateral/Compartmented Security Model Safety vs. Security Tradeoffs Access Control Decisions involve the – data subject (e.g. consent to disclose health data, religious beliefs, sexual orientation, etc.) as opposed to by a – central authority (defense systems) or by – system user (discretionary) 38 The Threat Model • main threat: access abuse by insiders • most common threat vector (path/tool to attack target): social engineering, e.g. the perpetrator calls the doctor's office "Hello, this is Dr. Henderson from Mass General. Your patient, Bob Smith, had an accident and was brought into ER unconscious. Can you tell me….." Most of the time Dr. Henderson gets everything he asks for… • operational security is not part of healthcare culture; and this is good thing: "If everybody was as unhelpful as intelligence-agency staff are trained to be, the world would grind to a halt." (R. Anderson. Security Engineering, p.285) 39 The Threat Model (continued) • Lack of technical security knowledge: old PC sold with recoverable data. • Large centralized databases are managed more professionally but at the same time are a more valuable target and the abuse potentially more damaging. aggregation of data increases risks – Veterans' Administration has centralized system. After Hurricane Katrina veterans who were refugees in other states had their records readily available in the local VA hospital at any place in the country. – May 2006 personal information on all 26.5 million veterans (including names, SS, etc.) stolen from the residence of an employee who had taken them home w/o authorization. 40 BMA Security Policy Ross J Anderson (1996) Security in Clinical Information Systems states the following nine principles (A Security Policy Model for Clinical Information Systems , IEEE Symposium on Security and Privacy, in html at http://www.cl.cam.ac.uk/~rja14/policy11/policy11.html ): • Access control: Each identifiable clinical record shall be marked with an access control list naming the people or groups of people who may read it and append data to it. The system shall prevent anyone not on the access control list from accessing the record in any way. " • Record Opening: A clinician may open a record with herself and the patient on the access control list. Where a patient has been referred, she may open a record with herself, the patient and the referring clinician(s) on the access control list. • Control: One of the clinicians on the access control list must be marked as being responsible. Only she may alter the access control list, and she may only add other health care professionals to it. 41 BMA Security Policy (continued) • Consent and notification : The responsible clinician must notify the patient of the names on his record's access control list when it is opened, of all subsequent additions, and whenever responsibility is transferred. His consent must also be obtained, except in emergency or in the case of statutory exemptions. • Persistence: No-one shall have the ability to delete clinical information until the appropriate time period has expired. • Attribution: All accesses to clinical records shall be marked on the record with the subject's name, as well as the date and time. An audit trail must also be kept of all deletions. • Information flow: Information derived from record A may be appended to record B if and only if B's access control list is contained in A's. 42 BMA Security Policy • Aggregation control: There shall be effective measures to prevent the aggregation of personal health information. In particular, patients must receive special notification if any person whom it is proposed to add to their access control list already has access to personal health information on a large number of people. • Trusted Computing Base: Computer systems that handle personal health information shall have a subsystem that enforces the above principles in an effective way. Its effectiveness shall be subject to evaluation by independent experts. 43 Inference Control • Privacy protection in secondary applications, such as databases for research, cost controls, clinical audits is even harder then in hospital systems: • Standard protection is de-identification or anonymization: remove names & addresses but well designed queries can find the identity • US Healthcare Finance Administration (HCFA) maintains three sets of records: complete; beneficiary encrypted (names and SS obscured) for trusted researchers; public-access • HIPAA recognizes medical de-identified information as information that has been 'properly' de-identified, i.e. – 18 specific identifiers have been removed and operator has no knowledge that remaining information can be used to identify the subject – qualified statistician concludes risk is substantially limited – If such data are inadequate for research HIPAA recognizes limited data sets with more information available to contractually bound & qualified users 44 Inference Control Theory • Developed by Denning and others late 1970s-early 1980s • Objective: prevent disclosure of sensitive statistics • Characteristic formula is expression (in some DB query language) that selects a set, known as query set of records. • Smallest query sets, obtained by logical AND of all its attributes (or their negation) are known as elementary sets or cells. • Statistics of query sets may be sensitive statistics if they meet certain criteria, e.g. set size too small. • D—set of statistics disclosed • P—set of sensitive statistics D P Privacy assured if where P is the complement of P D P if the protection is precise 45 Inference Control • Simplest protection: limit query size • Most important attack: Trackers—query sets that reveal identity – individual tracker example: there is only one female faculty in the department; then a set of just two queries reveal her salary: "Average salary of all faculty in the department?" "Average salary of all male faculty?" – general trackers—sets of formulae that can reveal any sensitive statistic. disappointingly, they are not very difficult to construct. It was shown that If smallest query set less than a quarter of all statistics, and no restrictions on the type of query Then one can find a formula that provides general trackers. (Denning et al, 1979) • Area of active research 46 Practical Problem #1 A Nigerian cyber crime team wants to access medical records in a particular hospital, to create a fictitious billing scheme so they can steal money from insurance companies. The criminals have an accomplice who works as a technician for a service company to deliver computer supplies and install PCs at the hospital. • What can hospital security personnel do to protect the hospital and its patients from such a threat? – Please consider what: • the key issues are, • vulnerabilities the delivery person could exploit • the hospital should do when dealing with suppliers • possible security mechanisms the hospital should deploy 47 Practical Problem #1 Response • Vulnerabilities: – Technician access to hospital network and patient records system when installing a PC. • The threat: – Technician eavesdrops (passive attack) on network traffic looking for hospital employee identities & authentication information (login IDs and passwords) – Technician tries to access patient records system by masquerading (active attack) as a legitimate hospital employee • Key issues: – How to ensure only authorized access to hospital network communications and patient records – Hospital relies on company for employee background checks, however this does not abrogate hospital from responsibility 48 Practical Problem #1 Response (continued) • Possible hospital actions regarding 3rd party suppliers: – Background check on supplier company to verify reputation and integrity – Confirm company has a security program governing employee behavior – Contract with company should include clauses on company obligations and liabilities. • Possible hospital deployed security mechanisms: – Require that patient record access requires proper authentication and access compartmentalized by hospital employee role/department – Train/educate hospital employees about social engineering – Deploy network access controls, such as 802.1X, to prevent unauthorized access to network. – Limit access to hospital systems via a role-based multilateral system. For example, the technician would find it easiest masquerade as a floor nurse given his/her limited time and information BUT nurses should not be granted access to billing or insurance information. 49 Practical Problem #2 Dr. Hastings reviews the record of one of his patients and is puzzled when he sees that the radiologist noted a small growth in the brain three years ago but there is no follow up exams and labs and the latest entry gives the patient a clean bill of health. • What could have happened? • How can the doctor determine what happened? • How can hospital system security have prevented this from happening? 50 Practical Problem #2 Response • What could have happened? – The most likely cause would be by accident (as in a mistake by a nurse or other hospital employee who is authorized access to the record • How can Doctor determine what happened? – If all changes to patient records are recorded in a log/audit file then Doctor can request examination of the log entries to identify who accessed the record, when access occurred and what was done when record was accessed (Attribution) • How could hospital system security have prevented this from happening? – Not allow deletions of information to patient records prior to the expiration of a specified time period (Persistence) – Not allow modification of information in patient records without confirmation by second employee (Separation of Duties) 51 Thank You Tanya Zlateva (zlateva@bu.edu) Stuart Jacobs (sjjacobs@bu.edu) 52