Difference between revisions of "Cookbook for Security Considerations"
JohnMoehrke (talk | contribs) (New page: As not all HL7 standards writers are security experts, this cookbook is intended to provide basic knowledge on conducting a risk assessment and some “tricks of the trade” relevant to [...) |
JohnMoehrke (talk | contribs) |
||
Line 7: | Line 7: | ||
= The Process = | = The Process = | ||
− | Formal | + | Formal Process should be followed. See the References below |
This breaks down to generally: | This breaks down to generally: |
Revision as of 21:56, 15 February 2010
As not all HL7 standards writers are security experts, this cookbook is intended to provide basic knowledge on conducting a risk assessment and some “tricks of the trade” relevant to Security Considerations section writing. It is not only based on best practice in the field of risk assessment and mitigation but also on the experience of the Security Workgroup while compiling the Security Considerations section for new HL7 works.
This cookbook is specifically intended for HL7 standards writers. Though it is based on best practice, it is not a complete method for thorough risk assessment of a package product. HL7 does not endorse any use of this cookbook outside of the scope of HL7 standards editing.
After presenting the basics of risk assessment and risk mitigation, the cookbook explains how to scope Security Considerations for HL7 standards and finally provides guidelines on the effective writing of the Security Considerations section.
The Process
Formal Process should be followed. See the References below
This breaks down to generally:
- Define the Scope of the Profile.
- Define existing Security Mitigations (e.g. ATS inclusion of Transport Layer Security)
- Define the Assets that need to be protected
- This is usually the data objects, and network-services exposed
- Risk Process
- Brainstorm on potential risks (focus on risks to Data-Confidentiality, Data-Integrity, or Data-Availability)
- See Figure 2.2.1-2: Generic Scenario Components
- Determine for each how bad (Impact) it would be if it did happen
- See Figure 2.2.1-3: Guidelines of impact relevance for IHE profiles
- Determine each Likelyhood to happen
- See Table 2.2.2-3: Example of probability of occurrence
- Calculate the Risk Value
- See Table 2.2.2-5: Example of matrix for relevant risks identification
- Address the highest Risk Values first.
- See section 2.2.3.2 Identify mitigations
- Each time you put a mitigation in place, you must re-assess as the mitigation may have introduced a new Risk or adjusted the Likelyhood or Impact on other Risks.
- See section 2.2.3.3 Evaluate mitigations
- Brainstorm on potential risks (focus on risks to Data-Confidentiality, Data-Integrity, or Data-Availability)
- Write the Security Considerations section
- Volume 1: Security Considerations section is for risks and mitigations that are profile-wide
- Volume 2+: Security Considerations sections are for risks and mitigations that are transaction or content specific.
- focus on the relevant risks and how they have been addressed. The security section should be a literary presentation of the security constraints (e.g. mandatory or optional grouping with IHE security profile), the security features as well as a summary of the reasons why these constraints and features are required (risks addressed). It should also include a summary of the risks left to be mitigated by developers and implementers.
Do NOT use this tool :-)
Resources
- Tutorial Presentation on the Security Risk Assessment Cookbook Version 7.4
- Formal Security Cookbook Paper Version 2.4
- Template Spreadsheet for Risk Assessment at ftp://ftp.ihe.net/Document_templates/Security_Considerations/
- IHE Equivalent Process
Examples of Risk Assessment Spreadsheets
- SAML use in CCOW -- spreadsheet not yet published
- CDA-Consent -- spreadsheet not yet published