This wiki has undergone a migration to Confluence found Here
Difference between revisions of "April 12, 2016 Security Conference Call"
Jump to navigation
Jump to search
Line 77: | Line 77: | ||
Note that there will be a FHIR Security call at 2pm PT/5pm ET | Note that there will be a FHIR Security call at 2pm PT/5pm ET | ||
See agenda at [http://wiki.hl7.org/index.php?title=HL7_FHIR_Security_2016-26-05 FHIR Security Agenda] | See agenda at [http://wiki.hl7.org/index.php?title=HL7_FHIR_Security_2016-26-05 FHIR Security Agenda] | ||
+ | ==Minutes== | ||
+ | * Kathleen chaired | ||
+ | * Approved March 29, 2016 Minutes - unanimous. | ||
+ | * PSS Proposal for a Privacy Impact and Security Risk Assessment IG to support the P&SbD IG. (Mike Davis): Received request from another WG to provide some material on the impact on Privacy. Privacy and Security are interdependent. The PSS provides the ability for project to do Privacy by Design ("cookbook" Process) - The Privacy Impact assessment is similar to a Risk Assessment and focused on a set of criteria. | ||
+ | **Comment (Glen): We have the potential create a process between Privacy impact assessment and Security Impact Assessment. | ||
+ | **Comment (Mike): Privacy Impact Assessment is similar to a Risk Assessment. OASIS Privacy by Design is moving into towards a standards, and we should incorporate within uses within healthcare. | ||
+ | **Comment (Glen): There will be interactions between Privacy Risk Assessment (looking on the impact of Privacy), and the Security impact, and to look at the total impact. The Risk to Privacy impacts the Risk to Security, except in the overlap space. | ||
+ | **Comment Mike: The mechanism of addressing Privacy belongs in security. Add a product Privacy Risk assessment as a compliment to Risk assessment. The project proposal at the moment focuses more on Privacy by design. Privacy impact statement is the same as a risk assessment, it is not a design for a system You design a system to mitigate the risk. The Privacy by design project should be at a higher level oriented to meeting the privacy requirements not the risk. The Risk assessment is separate to see if we met the requirements. | ||
+ | **Question (Kathleen): Do we put this in Privacy by Design or create a separate project? | ||
+ | **Comment (Rick): I think we should invite the architecture board for next vote? | ||
+ | **Mike: Disagrees inviting Architecture board. | ||
+ | **Mike notes that the OASIS Privacy by Design is on a 6 month break, and would like to put this discussion on hold. Mike will speak to Ann form OASIS. | ||
+ | Next Step (Kathleen): Topic to be deferred | ||
+ | *Privacy & Security by Design - update - Rick | ||
+ | **Scheduling meeting with ARB , CBCC, and Security co-chairs to come to a mutual understanding to see from the result of the project. From the discussion during the CBCC call, we will look to modify to look at the procedural flow Privacy and Security high level concepts. Example: "Map the relationship between consent (type of permission/policy/ and policy is specified in the contract), and Policy (a policy is specified in a contract). | ||
+ | *Question: Is the CBCC aware of our (Security WG) Privacy and Security Domain Analysis model? | ||
+ | *(Glen) -Answer Rick: my next step will be to introduce them to the Security Domain Analysis Model, and then move forward with Privacy by Design | ||
+ | Rick reminded WG about the Joint project meetings (ARB, CBCC, Security) held Tuesdays at 5 p.m. Eastern. Meeting information and invite<http://www.hl7.org/concalls/CallDetails.aspx?concall=30475> | ||
+ | * PASS Audit Conceptual Model - Diana | ||
+ | **PASS Access Control Services Conceptual Model - Received a response from Bernd, and will forward information to Mike and Alex to complete the last of the comments. This is the last outstanding item and may lead to the withdrawal of negative vote. | ||
+ | **PASS we voted on PSS Audit Key, made minor edits (A) Shared Scope Statement, and after comments will present to the entire group, and once everyone agrees will share with steering division. Shared with CBCC group, they will vote on it next week. (This is a new PSS). The Original Scope was for Security Surveillance purposes and we were not at the time covering Provenance, and Transaction Log to be Separate. To take out the Word Audit trail, and Changes to Clinical Information followed by Brackets () Transaction Log. Propose to follow the Model of Access Control. -Next Step: To add pass like to follow the form of past Access Control | ||
+ | Comments on Out of Scope: - (Diane) Capture of Persistence of Audit Trail in changes to clinical information. Glen moved to accept PSS; Mike seconded. Passed: 8-0-0. | ||
+ | **Joint Vocabulary Alignment Update - Diana - Invited Gary to shed light on Past Cycle events. NTR | ||
+ | * FHIR Security report out - John: NTR |
Latest revision as of 06:19, 19 April 2016
Back to Security Work Group Main Page
Attendees
x | Member Name | x | Member Name | x | Member Name | |||
---|---|---|---|---|---|---|---|---|
x | Kathleen ConnorSecurity Co-chair | . | Duane DeCouteau | . | Chris Clark | |||
x | John MoehrkeSecurity Co-chair | . | Johnathan Coleman | . | Aaron Seib | |||
. | Alexander Mense Security Co-chair | . | Ken Salyards | . | Christopher D Brown TX | |||
. | Trish WilliamsSecurity Co-chair | . | Gary Dickinson | x | Dave Silver | |||
Mike Davis | . | Ioana Singureanu | . | Mohammed Jafari | ||||
x | Suzanne Gonzales-Webb | . | Rob Horn | . | Galen Mulrooney | |||
x | Diana Proud-Madruga | . | Ken Rubin | . | William Kinsley | |||
x | Rick Grow | . | Paul Knapp | x | Mayada Abdulmannan | |||
x | Glen Marshall, SRS | . | Bill Kleinebecker | . | Christopher Shawn | |||
. | Oliver Lawless | . | [mailto | . | Serafina Versaggi | |||
x | Beth Pumo | . | Russell McDonell | . | Paul Petronelli , Mobile Health | |||
. | Christopher Doss | . | Kamalini Vaidya | . | [mailto: TBD ] |
Agenda DRAFT
- ( 5 min) Roll Call, Agenda Approval
- ( 5 min) Approve Security WG April 5, 2016 Minutes
- (10 min) Privacy & Security by Design - update - Rick
- Joint project meetings (ARB, CBCC, Security) held Tuesdays at 5 p.m. Eastern. Meeting information and invite
- ( 5 min) PASS Access Control Services Conceptual Model - Diana
- ( 5 min) Joint Vocabulary Alignment Update - Diana
- ( 5 min) PASS Audit Conceptual Model – Diana
- ( 5 min) FHIR Security report out - John
Note that there will be a FHIR Security call at 2pm PT/5pm ET See agenda at FHIR Security Agenda
Minutes
- Kathleen chaired
- Approved March 29, 2016 Minutes - unanimous.
- PSS Proposal for a Privacy Impact and Security Risk Assessment IG to support the P&SbD IG. (Mike Davis): Received request from another WG to provide some material on the impact on Privacy. Privacy and Security are interdependent. The PSS provides the ability for project to do Privacy by Design ("cookbook" Process) - The Privacy Impact assessment is similar to a Risk Assessment and focused on a set of criteria.
- Comment (Glen): We have the potential create a process between Privacy impact assessment and Security Impact Assessment.
- Comment (Mike): Privacy Impact Assessment is similar to a Risk Assessment. OASIS Privacy by Design is moving into towards a standards, and we should incorporate within uses within healthcare.
- Comment (Glen): There will be interactions between Privacy Risk Assessment (looking on the impact of Privacy), and the Security impact, and to look at the total impact. The Risk to Privacy impacts the Risk to Security, except in the overlap space.
- Comment Mike: The mechanism of addressing Privacy belongs in security. Add a product Privacy Risk assessment as a compliment to Risk assessment. The project proposal at the moment focuses more on Privacy by design. Privacy impact statement is the same as a risk assessment, it is not a design for a system You design a system to mitigate the risk. The Privacy by design project should be at a higher level oriented to meeting the privacy requirements not the risk. The Risk assessment is separate to see if we met the requirements.
- Question (Kathleen): Do we put this in Privacy by Design or create a separate project?
- Comment (Rick): I think we should invite the architecture board for next vote?
- Mike: Disagrees inviting Architecture board.
- Mike notes that the OASIS Privacy by Design is on a 6 month break, and would like to put this discussion on hold. Mike will speak to Ann form OASIS.
Next Step (Kathleen): Topic to be deferred
- Privacy & Security by Design - update - Rick
- Scheduling meeting with ARB , CBCC, and Security co-chairs to come to a mutual understanding to see from the result of the project. From the discussion during the CBCC call, we will look to modify to look at the procedural flow Privacy and Security high level concepts. Example: "Map the relationship between consent (type of permission/policy/ and policy is specified in the contract), and Policy (a policy is specified in a contract).
- Question: Is the CBCC aware of our (Security WG) Privacy and Security Domain Analysis model?
- (Glen) -Answer Rick: my next step will be to introduce them to the Security Domain Analysis Model, and then move forward with Privacy by Design
Rick reminded WG about the Joint project meetings (ARB, CBCC, Security) held Tuesdays at 5 p.m. Eastern. Meeting information and invite<http://www.hl7.org/concalls/CallDetails.aspx?concall=30475>
- PASS Audit Conceptual Model - Diana
- PASS Access Control Services Conceptual Model - Received a response from Bernd, and will forward information to Mike and Alex to complete the last of the comments. This is the last outstanding item and may lead to the withdrawal of negative vote.
- PASS we voted on PSS Audit Key, made minor edits (A) Shared Scope Statement, and after comments will present to the entire group, and once everyone agrees will share with steering division. Shared with CBCC group, they will vote on it next week. (This is a new PSS). The Original Scope was for Security Surveillance purposes and we were not at the time covering Provenance, and Transaction Log to be Separate. To take out the Word Audit trail, and Changes to Clinical Information followed by Brackets () Transaction Log. Propose to follow the Model of Access Control. -Next Step: To add pass like to follow the form of past Access Control
Comments on Out of Scope: - (Diane) Capture of Persistence of Audit Trail in changes to clinical information. Glen moved to accept PSS; Mike seconded. Passed: 8-0-0.
- Joint Vocabulary Alignment Update - Diana - Invited Gary to shed light on Past Cycle events. NTR
- FHIR Security report out - John: NTR