Merge Direct Transport SWG 05092014 rev3

advertisement
Direct Transport SWG – ONC Data Access Framework
Statement of Principles Document for MU2 Transitions of Care
First Draft, Comments Solicited from Workgroup
Version 1.0.1
DRAFT DOCUMENT, COMMENTS WELCOME
This Statement of Principles document describes key aspects of a Transition of Care (ToC) implementation proposed by Dr.
Stephen Beller, Peter Bachman, and Sabatini Monatesti who are fully responsible for its content. In this document, we explore a
DAF/Direct implementation that enables secure queries via the Direct Applicability Statement to meet MU2 ToC requirements.
There would be an Implementation Guide corresponding to this document for purposes of design.
Statements herein represent the opinions, beliefs, and best judgments of the authors and may be adopted by the DAF Direct SWG
as a specific use case using different implementations. As such, they are not necessarily subjected to the same level of formal
scientific review as Standards or Guidelines. Each institution or practice should decide individually whether to implement some,
none, or all of the principles in the statement based on the sound medical judgment of medical personnel participating in that
institution or practice.
I.
Introduction:
a.
b.
c.
d.
e.
The described implementation conforms with the Direct Applicability Statement, STA to STA methodology (Direct
Applicability Statement secure transport agent1) for sending and receiving medical Protected Health Information
(PHI) securely over the Internet. It also combines the element of “known verifiable endpoints” under the control
of a private key holder using multiple layers of verification that is widely recognized by Certificate Authority
industry groups for different industry verticals and does not require the unusual use of DNS to validate PHI
exchange.
There are defined endpoint security requirements2 between and among partners mutually authenticated to NIST
800-63-1 LOA 3 3 in what we describe generally as a “social/clinical network.” This network leverages
authentication, authorization and encryption to protect PHI based on HIPAA requirements, as well as computer
security and network best practices recognized by security frameworks.
We recognize that there are known and unknown risks. Known risks include: DDOS, DNS spoofing, X.509v3
Certificate falsification, MITM, cyberspace military attacks from a foreign power, or insider threats, alteration of
patient data records (data integrity). Unknown risks include: CVE software flaws or zero day vulnerabilities which
are dynamic, even though they may have wide spread application such as the recent coding error in the OpenSSL
software libraries. If there is a CVE assigned it is assumed that use case actors will update their software to
mitigate risk exposure.
There is no trade group, community of interest, or trust framework with a “get out of jail free card” that prevents
it members from being sued for negligence. There are, however, legal limitations imposed by the Certificate Policy
Statement as defined by the American Bar Association.
The digital signatures used to support our implementation’s ToC use case, which is described below, have
advanced ETSI non-repudiation qualities that are currently outside the scope of Direct dual use encryption
certificates. The use of additional verification technology3 is defined by the S&I Framework esMD work groups in
terms of time stamps and verification which are assumed to be valid in court for 20 years. This anticipates risk of
cryptographic protocol failure, expiration of a specific individual digital certificate, and the business failure of a
1
2
3
http://www.directproject.org
http://www.commoncriteriaportal.org/files/epfiles/st_vid10390-vr.pdf
RFC 3161
S.J. Monatesti, S. Beller, P. Bachman
May 9, 2014
1
Direct Transport SWG – ONC Data Access Framework
f.
g.
h.
certificate authority that may have received the “Internet Death Sentence”4 or have been removed from usage
from a trust bundle.
We assume that HISPs using these advanced digital signatures have or will adopt appropriate X.509v3 certificates.
These certificates allow for interoperability based on anti-fraud legal trust framework requirements as described
by the ongoing effort of the American Bar Association Working Group on Trust Frameworks (including Direct
Trust). Refer to idmanagement.gov for details on other trust frameworks.
The PKI private keys in our use case are managed directly by the sender who possesses the private key using local
secure storage, instead of through a third party agent or proxy (such as a HISP in non-pass-through mode). This
results in higher security against network and HISP insider attacks according to the Direct Project security analysis.
5
The entire taxonomy of potential risks and mitigations is not covered in this document, but has been
documented elsewhere.
Our implementation is a secure, interoperable, MU2 compliant nationwide health information (NwHIN)
architecture. It includes novel features such as the “Computerized Health Agent (CHA).” The CHA is a separate
software element that is distinguished from the Direct Applicability Statement’s Security/Trust Agent (STA)
technical messaging endpoint located within a HISP or at a provider’s desktop or email gateway. While we use a
COTS e-mail client as an appropriate STA, it differs from the normative definition of “Direct Transport.”
i.
We do not define the usage of edge protocols because it is not part of Direct Transport. For example, the typical
use of TLS certifies the name of a computer endpoint (server) in the DNS, and not a recipient STA., This creates a
security gap as PHI is transferred (however briefly) from the server memory unencrypted to the HISP mail queue
to be sent via the HISP STA. As such, the HISP must handle PHI in the clear. This is similar to the situation that
occurred at Target when they were recently hit with a memory scraping software program at their point of sale
terminals.
j.
Any provider’s identity can be uniquely validated in the X.500/LDAP Directory. The provider is listed in the
Directory” (i) according to his/her assigned alpha-numeric Object Identifier (OID), (ii) under both the HL7 realm6
k.
l.
and the X.500 Administrative Domain, c=US7, or (iii) under a subentry of a nationally validated entity using ANSI, a
federation, or a state Directory as described in relevant ISO and IETF documents under the c=US naming scheme.
Sole trust in DNS entries is misplaced because accurate replies to queries depend on multiple factors such as DNS
Security (DNSSEC) and digitally signing root server entries for TLD, (top level domains) as described in the
documentation and implementation guide for S&I Framework Provider Directory. Direct does not specify DNSSEC
or encrypted DNS replies. In fact, incorrect DNS replies are acceptable to Direct because the sender identity is
independently verifiable by the individual certificate. However, DNS vulnerabilities can result in spoofing of
certificate entries since they cannot be tied back to the individual in a meaningful way.
In terms of Direct, only the “subject alternative name” field in the certificate is defined as having either a “Direct
Address” or an “Organizational DNS Name,” which are both valid fields under RFC-5280 and extends X.509v3 for
various Internet profiles.
m. The provider Directory tightly binds a certificate’s subject field with a Directory’s subject entry; this differs from
DNS, which binds the certificate’s subject field with the Directory’s alternative subject field. Since the Directory
validates the subject and not the alternative subject field, use of DNS requires an additional level of security that is
4
5
6
7
http://en.wikipedia.org/wiki/DigiNotar
http://wiki.directproject.org/Threat+Models
http://wiki.hl7.org/index.php?title=Realm
RFC1218, http://tools.ietf.org/html/rfc1218
S.J. Monatesti, S. Beller, P. Bachman
May 9, 2014
2
Direct Transport SWG – ONC Data Access Framework
not provided by any “trust organization.” As such, the solution we will demonstrate conforms with the Federal
Bridge in that subjects are defined in the Directory under c = US, which enables the secure exchange between all
certificate subjects without unnecessary barriers. For example, a similar “namespace” occurs between zip code
n.
and home address, with name, uniquely identifies the occupant and binds it to the endpoint.
A provider Directory (TS 21091)8 will be provisioned in X500/LDAP or DSML connected to databases linked through
web services using HPD+ as the shared schema from IHE9 (and already are provisioned in multiple places) the
linkage between the provider’s specialty (say Cardiology) is then available for routing, which obviously would not
be part of the typical Direct certificate specifications to provide a medical context for healthcare information. It
should be noted that the X500/LDAP implementation is one singular directory made up of individual LDAP servers
that are run by ANSI registered organizations. For example, say CERNER wanted to run a national HPD+ LDAP
server it could do so with access through the X500 Directory, or through a DSML enabled database. That would
require that CERNER have a corresponding validated entry in the X500 namespace. Other organizations could
locate themselves underneath CERNER in the Directory information tree (DIT). This allows for navigation to the
distributed directories. An example why DNS is bad in this regards, would have been the classic case of the
domain name “WHITEHOUSE.COM” (the porn site) as opposed to “WHITEHOUSE.GOV.”
o.
p.
q.
The overall technology is voluntarily deployed by participants (and follows NSTIC Fair Information Practice
Principles)10 deployed as an Internet application layer using SMTP to support a Publish Subscribe logical layer
relationship11 between and among a community of authenticated users, and distributed over the Internet with
encryption protocols as was tasked to the ONC by the Executive Branch as a requirement from the public in
(Executive Order 13335, 2004), thus forming an ethically12 enabled social network (EESH) as part of the agile
evolving NwHIN architecture that conforms to the published Executive Branch Cybersecurity Policy.
The EESH is a larger overall concept than any specific data exchange envisioned for healthcare. This specific
implementation leverages common off-the-shelf (COTS) components (that have already met stringent security
analysis testing)13 already in wide use within enterprises and by the public and can provisioned using current open
source and commercial offerings along with Internet and ISO standard services as described by S&I Framework
workgroups such as Provider Directory.
This COTS implementation with custom software as an EHR module and architecture offers rapid compliance
uptake potential among organizations that may not have participated in MU2 incentives and are less likely to be
integrated within current EHR offerings as would be typical in a Hospital setting after MU1. Thus it goes beyond
8
http://www.iso.org/iso/home/store/catalogue_tc/catalogue_detail.htm?csnumber=51432
http://wiki.siframework.org/IHE+HPD+Standard+Analysis
10
http://www.whitehouse.gov/sites/default/files/rss_viewer/NSTICstrategy_041511.pdf
11
An internet application layer is logically independent of transport layers underneath in the OSI stack. Interactions only occur at
known transition points to preserve logical separation. Thus this is more resilient to degradation of normal services in disaster
scenarios and still is capable of carrying current situational knowledge between participants which is required for effective patient
routing. This is a design characteristic carried forward from message routing in nuclear war military planning which formed the
design of the early Arpanet, in which dedicated “telephone circuits” would be disrupted, and messages would be routed as
necessary between surviving nodes such as ICBM silos and civilian infrastructure for command and control functionality. Thus the
Internet design was “disaster ready” by allowing for different layers.
This contrasts with other transports that are also acceptable in this use case for MU2 compliance, such as SOAP which have a tighter
logical binding of transport to data elements but can also use the Internet.
http://en.wikipedia.org/wiki/OSI_model#Layer_7:_application_layer/ For a simple phrase to describe this to non-technical users it
is “Connect pub-sub using Direct” by using the pub-sub design pattern
http://en.wikipedia.org/wiki/Publish%E2%80%93subscribe_pattern implemented by the CHA which is bound to the Direct STA, and
understands the semantics used by the EHR as output in a HL7 C-CDA to the CHA.
12
http://princetonacm.acm.org/tcfpro/presentations/Introduction_of_ethics.pdf
13
http://www.commoncriteriaportal.org/files/epfiles/st_vid10390-vr.pdf
9
S.J. Monatesti, S. Beller, P. Bachman
May 9, 2014
3
Direct Transport SWG – ONC Data Access Framework
II.
MU1 integration to sharing data under MU2, and sets the stage of further integration and patient engagement
under MU3.
r. Network components include LDAP and DNS, Federal Bridge LOA 3 ACES14 Certificates for signing and encryption
for each individual user, CMS/NPI directory data elements as captured in S&I , IHE, ISO TS-21091 X.500 Provider
Directory model, and cleared IP usage of the top level X.500 Administrative Domain Name (C=US) as applied in the
existing FICAM trust framework, to distribute this information over the Internet as described in OID 1.3.6.1.115
along with existing certificate policies and certificate practice statements. It is expected that any NSTIC relying
parties should accept these X.509v3 certificates as a valid proof of identity based on polling of the NSTIC medical
working group during a recent Plenary.16
s. Our specific ethical implementation requires minimizing of potential risk of loss, misuse, or destruction of PHI
leading to reduced patient safety risk, while still providing a national framework enabling comprehensive access to
patient data.
Goals of our ToC implementation
a.
Demonstrate a Direct, HIPAA-compliant, “conduit” implementation.17 The details will be described in an
implementation guide that documents the extensibility, quality assurance18 and applicability of our
implementation for sharing ToC PHI in a disparate HIT industry in a machine to machine, machine to human,
human to human environment.
b.
Deploy a node-to-node (point-to-point, desktop-to-desktop, STA to STA) network model of “Basic Direct” that uses
the SMTP + S/MIME over the internet instead of web services.
Impose no requirements for a BAA or any prior authorizations and authentication other than that provided by the
FICAM trust framework plus c=us X500 Directory integration. This is consistent with the Administrative
Simplification Rule of HIPAA regarding communication between covered entities (as detailed in the Omnibus Final
Rule), which forbids barriers to the exchange of health data between covered entities.
d. Require no additional steps be added to trust the credentials on a business layer as they are presented and
subsequently automatically validated by the software and cryptographic libraries which validate the CA signature
validation path. If the FICAM approved Federal Bridge CA is included in the trust bundle (which is not typically the
case for the Direct Trust), then the FICAM trust network specifically states that the approved credential is valid for
any use as defined in the Certificate Policy Statement, which enables the citizen to drive the process and make
patient centricity a reality in the virtual world.
e. This uses Federal Bridge CAs to enable cross certification and cross Certificates at the Bridge thus creating an
Identity Assurance Hub between certified Certificate Authorities and related participants.
Our specific Use Case for meeting ToC MU2 requirements:
c.
III.
a. Assumptions
i. Using the ethical framework one implement efficient and effective care between acute and long term
care facilities. This is MU2 criteria 15 – 17. The best way to accomplish this goal is by fully communicating
14
https://www.idmanagement.gov/entities-cross-certified-federal-bridge
http://www.alvestrand.no/objectid/1.3.6.1.1.html
16
http://www.idecosystem.org/content/8th-plenary-recap
17
http://www.gpo.gov/fdsys/pkg/FR-2013-01-25/html/2013-01073.htm, “This is consistent with our prior interpretation of the
definition of ``business associate,'' through which we have stated that entities that act as mere conduits for the transport of
protected health information but do not access the information other than on a random or infrequent basis are not business
associates.”
18
http://wiki.siframework.org/Desktop+to+Desktop+Implementation+-+Specification,+Standards+and+Testing
15
S.J. Monatesti, S. Beller, P. Bachman
May 9, 2014
4
Direct Transport SWG – ONC Data Access Framework
all of the data requirements in the federal regulations. The ground truth is that patient’s data is
distributed in different systems and may exist on an attending physician’s EHR at their office, at the Long
Term Care Facility, medical record on paper, etc. This data needs to be gathered up and transmitted to all
the authenticated and authorized members of the care team, so that the patients ToC data to avoid
having the patient ping-pong through the system.
ii. During an care coordination process where patient is ping-ponging between acute and long term care
facility patient information is exchanged based on an N by M array of authorized care givers, i.e., Provider
(1 – N) requesting PHI from Provider (1 – M)19
iii. ToC demands a satisfactory response to the needs of patients by effectively sharing PHI between facilities
in a secure manner.
iv. PHI receivers are facilities that exist physically in the same physical locale and may also have actors that
are not yet electronically enabled, do not yet have EHRs, use artifacts such as Personal Identity
Verification (PIV) cards during the patient incident (episode of care). There may also be a social
relationship that is not electronically verifiable. To properly document interactions when electronic
systems are used for patient transfer to another facility we must make sure the correct data elements are
also included in that transfer, or sent ahead to potential recipients.
v. Once a secured connection is established and verifiable, the PHI receiving party must be able to exchange
relevant PHI with the sending node without requiring additional communication channels for
authorization. In the case of an ambulance crossing various jurisdictions for routing during a disaster, the
use case actors would be able to present adequate electronic credentials that could be verified by the
relying party, such as a FEMA incident commander, to coordinate resources in terms of evacuation of
facilities. There are documented failures during Katrina that this use case would have addressed.
vi. The recipient of patient data (defined use case actor who is authorized by that facility) may have minimal
historical HL7 data within their EHR system. The patient is assumed to be injured or in distress and
requires assessment at the ER prior to admittance, establishing a plan-of-care, administering treatment, ,
transfer, discharge, or release of PHI .
vii. PHI documentation is maintained in a certified EHR for each facility, or the attending physician for that
facility may have the information, which could be accessed to effectuate the ToC.
viii.
Requesting party (Requester) sends a Direct query request to the replying party (Responder) for
information defined in the CDA ToC template and the Responder(s) return those data in a CDA ToC
template encapsulated as an attachment to transport mechanism (e.g., Direct query response with
attachment).
ix. At each endpoint there may be an OASIS environment20 communicating to an EHR or a provider without
an EHR.
b. Use case particulars
i.
We expect that the results of compliance to quality measures will be documented and available to quality
reporting organizations such as CAQH through S&I Framework SDC. Individual implementations may
deviate from this condition.
ii. The implementation will be one step above paper/fax as the medium for transferring documents between
facilities that are electronically verified by the transferring provider using COTS-based applications. If
patient is transferred from point A to B in the physical world, the patient-transfer must be accompanied
with electronically integrated CCDA.
19
20
Universal modeling language
http://www.carevoyantindia.com/HomeHealth.aspx
S.J. Monatesti, S. Beller, P. Bachman
May 9, 2014
5
Direct Transport SWG – ONC Data Access Framework
iii. In the event the patient is not cognizant at the receipt point of care, the implementation will support
effective routing information to an applicable facility to provide stabilization.
iv. Based on the patient’s pre-negotiated preferences, electronically stored mortality or advanced directives
that are not strictly clinical—such as a faith component, or to reconcile patient wishes (ethical
consideration) with owner of legal health power of attorney documentation—will also be made available.
IV.
v. Questions to resolve: who is this patient, does the PHI I have corrected and does it come from a trusted
source21, has the sending party abridged the rights of the patient22, and can recipient system or
authorized person resolve the content23 (OIG reference regarding oversight)?
vi. This implementation would enable relevant access to PHI ensuring that a dialogue between the endpoints
is secured.
Supported Standards
a.
V.
HIPAA, HITECH, IEEE/ACM ethical constraints, X500, X509V3, 360X Closed Loop Referral, SMTP/SMME, HL7V2, S&I
Framework24 applicable guidelines25, Federal Bridge ACES Cert for each participant
b. Required Infrastructure
i. Validated encryption standard
ii. Zip – compression standard
iii. SMTP – mail transport standard
iv. XML – import and export functionality
v. TCP/IP ISO – seven layer stack (Application, Presentation, Security, Transport, Network, Data Link,
Physical)
vi. Spreadsheet, Formulas, Functions and Macro Code – data manipulation standards
vii. File Naming, Format and Storage – data management standards
viii. LOINC/ICD/SNOMED/etc. – data terminology standards
Justification
a.
VI.
Low cost, minimal risk, ethically designed, minimal development and maintenance, meets all HITECH, HIPAA MU2
requirements, promotes real time access to CMS NPI and automatic resolution of provider ID and credentials, i.e.,
authenticated and authorized to process, use PHI, available today for pilot testing.
Conclusion
a. Given the ethical, financial, bio-surveillance, and clinical issues facing HIT interoperability and the poor
performance of EHR to meet clinical practitioner needs the authors believe that the implementation presented
above should be pilot tested ASAP
21
https://oig.hhs.gov/reports-and-publications/archives/workplan/2013/Work-Plan-2013.pdf
http://www.databreachtoday.com/oig-to-review-medical-device-security-a-6490
23
http://blog.himss.org/2013/11/07/how-might-healthcare-organizations-engage-end-users-to-mitigate-risks-to-patient-safety
22
24
25
http://wiki.siframework.org/Desktop+to+Desktop+Implementation+-+Specification,+Standards+and+Testing
http://wiki.siframework.org/Query+Health+DIRECT+and+FlatFile+based+POC
S.J. Monatesti, S. Beller, P. Bachman
May 9, 2014
6
Direct Transport SWG – ONC Data Access Framework
5/9/2014
X
IX. Attachment 1 – EESH N-by-M Array
X.
Sabatini J. Monatesti
Sabatini Monatesti
President
Attachment 2 – Reference of Terms (Acronym Definitions)
a. ACES - FBCA stands for Federal Bridge Certification Authority. ... Authority (FBCA) and Access Certificates for
Electronic Services (ACES) pro
b. AES256 – Advanced Encryption Standard is a symmetric encryption algorithm
c. ANSI – American National Standards Institute
d. BAA – Business Associates Agreement
e. CA – Certificate Authority
f. CAQH – Council for Affordable Quality Healthcare (Washington, DC)
S.J. Monatesti, S. Beller, P. Bachman
May 9, 2014
7
Direct Transport SWG – ONC Data Access Framework
g. CCDA – Consolidated Clinical Document Architecture
h. CHA – Computer Health Agent
i.
CMS/NPI – Centers for Medicare and Medicaid Services/National Provider Identifier
j.
COTS – Common-of-the-Shelf Technology
k. CVE – Common Vulnerability Encounter
l.
DNS – Domain Name Service
m. EESH – Ethically Enabled Social Network
n. EHR – Electronic Health Record
o. ETSI – European Telecommunications Standards Institute 2009
p. FEMA – Federal Emergency Management Agency (USA)
q. FICAM – Federal Identity, Credential, and Access Management
r. FIPP – Fair Information Practice Principles (FIPPs)
s. FISMA –Federal Information Security Management Act of 2002
t. HIPAA – Health Information Portability Accountability Act
u. HISP – Health Information Service Provider
v. HITECH – Health Information Technology for Economic and Clinical Health Act
w. HL7 V2 –Health Level 7 Version 2, standard defines a syntax (grammar)
x. ICD - International Classification of Diseases
y. IEEE/ACM – Institute of Electrical and Electronic Engineers/Association for Computing Machinery
z. IETF – Internet Engineering Task Force
aa. IHE – Information Health Exchange
bb. IP – Internet Protocol
cc. ISO – International Standards Organization
dd. LDAP – Lightweight Directory Access Protocol
ee. LOA 3 –– NIST Level of Assurance @ Level 3, digital signature is a digest of the message being signed and
encrypted by the digital signing algorithm using the private key. Private keys stored on a local computer
S.J. Monatesti, S. Beller, P. Bachman
May 9, 2014
8
Direct Transport SWG – ONC Data Access Framework
should, at a minimum, be protected by a password or Personal Identification Number (PIN). The PIN would
not prevent other covert hacking methods such as keystroke logging. Thus, it is strongly suggested that
signers consider using authentication protocols that meet NIST LOA 3
ff. LOINC – Logical Observation Identifier Name Codes
gg. MITM ––Man-in-the-Middle attack
hh. MU1, MU2, MU3 – Meaningful Use, ONC Measures
ii. NIST– National Institute of Standards and Technology, http://www.nist.gov
jj. NSTIC –The National Strategy for Trusted Identities in Cyberspace
kk. NwHIN – Nationwide Health Information Network
ll. OID – Object Identifier
mm.
ONC – Office of National Coordinator of Health Information Technology
nn. PHI – Personal Health Information
oo. PIV – Personal Identify Verification
pp. PKI – Public Key Infrastructure
qq. RFC - The IETF adopts some of the proposals published as RFCs as Internet standards. Request for Comments
documents
rr. S&I Framework - The Standards and Interoperability (S&I) Framework within the Office of the National
Coordinator for Health
ss. SMIME – Secure/Multipurpose Internet Mail Extensions is a standard for public key encryption and signing of
MIME data
tt. SMTP – Simple Mail Transfer Protocol
uu. SNOMED - Systematized Nomenclature of Human Medicine (a multiaxial nomenclature for indexing medical
records)
vv. STA– As a data holder, you will need to send patient health information (payload) from your system to a
Direct address. In order to do that, your system needs to be able to send that payload through a
Security/Trust Agent (STA).
ww.
SWG – Office of National Coordinator Sub-Workgroup
xx. TCP/IP – Transmission Control Protocol/Internet Protocol
S.J. Monatesti, S. Beller, P. Bachman
May 9, 2014
9
Direct Transport SWG – ONC Data Access Framework
yy. TLS – Transport Layer Security
zz. ToC – Transition of Care
aaa.
XML – eXtensible Markup Language
bbb.
ZIP – Compressed File (PKzip file name extension)
S.J. Monatesti, S. Beller, P. Bachman
May 9, 2014
10
Download