HL7 FHIR Security 2018-04-10
Jump to navigation Jump to search
Weekly: Tuesday at 02:00 EST
Web conference desktop and VOIP https://www.freeconferencecall.com/join/security36 Online Meeting ID: security36 Phone: +1 515-604-9567, Participant Code: 880898 Please be aware that teleconference meetings are recorded to assist with creating the meeting minutes
|Member Name||Member Name||Member Name|
|x||John Moehrke Security Co-Chair||x||Kathleen Connor Security Co-Chair||x||Alexander Mense Security Co-chair|
|.||Suzanne Gonzales-Webb CBCC Co-Chair||x||Johnathan Coleman CBCC co-chair||.||Chris Shawn Security co-chair|
|.||Ali Massihi||.||Mike Davis||x||Nathan Botts Mobile co-chair|
|x||Diana Proud-Madruga||x||Joe Lamy AEGIS||x||Beth Pumo|
|.||Irina Connelly||x||Matt Blackman Sequoia||.||Mark Underwood NIST|
|.||Peter Bachman||.||Grahame Greve FHIR Program Director||x||Kevin Shekleton (Cerner, CDS Hooks)|
|x||Luis Maas EMR Direct||.||Dave Silver||x||Francisco Jauregui|
- approval of agenda
- approval of HL7 FHIR Security 2018-04-03 Minutes
- Johnathan specific guidance given a paper from ONC that might guide improvements to the security guidance
- Johnathan confirms he can attend
- KEY PRIVACY AND SECURITY CONSIDERATIONS FOR HEALTHCARE APPLICATION PROGRAMMING INTERFACES (APIS)
- All security open http://gforge.hl7.org/gf/project/fhir/tracker/?action=TrackerItemBrowse&tracker_id=677&tracker_query_id=4967
- Improvement beyond SMART scopes
- Patient Directed backend communication
- Oauth App Registration
- Certificate Management
- Input Validation
- ACTION: John - find in current spec on Input Validation to see if it captures Security need. If so, then add pointer to it from security, if not then we need to build text
- ONC: Ensure that API cannot be manipulated to unintentionally expose health information or system vulnerability information.
- Add to top level security punch list: " Disable any messages that may have been used for debugging or error trapping purposes in a development environment to limit the exposure of information that may make an EHR vulnerable to attack."
- Continuous security testing and remediation
- Using off-the-shelf and open-source tools to simulate attacks, code inspection, and in other ways probe for vulnerabilities, and remediation of those vulnerabilities following Risk-Management methodology.
- New business
- Motion: JC/KC - Where secure http communications are needed, include TLS 1.2 or higher as best-practice in the specification, and consider it as a candidate for being a requirement.
- Modify first sentence of second paragraph: "TLS 1.2 or higher SHOULD be used for all production data exchange, and disable support for lower versions of TLS."
- post-paragraph add : "When using TLS use with strong cipher suites (e.g, AES)."
- References: SMART-on-FHIR, NIST SP 800-52, IETF RFC xxxx on HTTP ......
- Action: Matt will provide references used in Sequoia
- Tracker 15907
- stream for Security and Privacy discussions. Specification development, and Implementation.
- stream for Patient Empowerment. Discussions about empowering patients. Focus on deployment and advocacy.
- Proposed FHIR Connectathon track for Cologne -- GDPR
- Blockchain FHIR Connectathon
- Grahame is trying to find a community wanting to 'play' with blockchain. He is willing to standup the infrastructure.
- See blockchain zulip stream https://chat.fhir.org/#narrow/stream/blockchain
- John Chaired
- agenda approved
- approved HL7 FHIR Security 2018-04-03 Minutes
- Discussed Input Validation
- created and approved CR#15909
- There was significant discussion around if we should include the second sentence on testing recommendations. The concern that any move into testing might be seen as overly prescriptive or specifically limited. Second concern is that this might lead to a precedent that we include a testing recommendation for every security line item.
- Likely need overall guidance to use a security framework...