감사 추적 및 노드 검증
ATNA : Audit Trail and Node Authentication
The Audit Trail and Node Authentication (ATNA) Integration Profile is part if the IHE IT Infrastructure technical framework.
- It describes the security environment (user identification, authentication, authorization, access control, etc.) assumed for the node so that security reviewers may decide whether this matches their environments.
- It defines basic auditing requirements for the node.
- It defines basic security requirements for the communications of the node using TLS or equivalent functionality.
- It establishes the characteristics of the communication of audit messages between the Basic Secure Nodes and Audit Repository nodes that collect audit information.
- It defines a Secure Application actor for describing product configurations that are not able to meet all of the requirements of a Secure Node.
The Audit Trail and Node Authentication (ATNA) Integration Profile establishes security measures which, together with the Security Policy and Procedures, provide patient information confidentiality, data integrity and user accountability.
Benefits
Assistance to sites in implementing security and confidentiality policies.
Details
- The Audit Trail and Node Authentication (ATNA) Integration Profile
contributes to access control by limiting network access between nodes and limiting access to each node to authorized users. Network communications between secure nodes in a secure domain are restricted to only other secure nodes in that domain. Secure nodes limit access to authorized users as specified by the local authentication and access control policy.
- User Authentication
The Audit Trail and Node Authentication Integration Profile requires only local user authentication. The profile allows each secure node to use the access control technology of its choice to authenticate users. The use of Enterprise User Authentication is one such choice, but it is not necessary to use this profile.
- Connection Authentication
The Audit Trail and Node Authentication Integration Profile requires the use of bi-directional certificate-based node authentication for connections to and from each node. The DICOM, HL7, and HTML protocols all have certificate-based authentication mechanisms defined. These authenticate the nodes, rather than the user. Connections to these machines that are not bi-directionally node-authenticated shall either be prohibited, or be designed and verified to prevent access to PHI.
- Audit Trails
User Accountability is provided through Audit Trail. The Audit Trail needs to allow a security officer in an institution to audit activities, to assess compliance with a secure domain’s policies, to detect instances of non-compliant behavior, and to facilitate detection of improper creation, access, modification and deletion of Protected Health Information (PHI).
'Trunk' 카테고리의 다른 글
갤럭시 노트9 512GB + 삼성 무선충전기 구매/개봉기 (0) | 2018.11.12 |
---|---|
Synology DS718+ 구매/개봉기 (0) | 2018.11.09 |
[일본어] 히라가나 가타카나 표 (0) | 2017.01.02 |
[HTTP] MIME Type (0) | 2016.12.26 |
[VS2010] #error Please use the /MD switch for _AFXDLL builds (0) | 2016.12.21 |