ASTM E2595 - 07(2013) Standard Guide for Privilege Management Infrastructure (Withdrawn 2017).pdf
《ASTM E2595 - 07(2013) Standard Guide for Privilege Management Infrastructure (Withdrawn 2017).pdf》由会员分享,可在线阅读,更多相关《ASTM E2595 - 07(2013) Standard Guide for Privilege Management Infrastructure (Withdrawn 2017).pdf(31页珍藏版)》请在麦多课文档分享上搜索。
1、Designation: E2595 07 (Reapproved 2013) An American National StandardStandard Guide forPrivilege Management Infrastructure1This standard is issued under the fixed designation E2595; the number immediately following the designation indicates the year oforiginal adoption or, in the case of revision, t
2、he year of last revision. A number in parentheses indicates the year of last reapproval. Asuperscript epsilon () indicates an editorial change since the last revision or reapproval.INTRODUCTIONThis guide arises from the ongoing development and implementation of privilege managementinfrastructures (P
3、MIs) within the healthcare environment. The healthcare environment supported bythis guide is enterprise-wide and extends beyond traditional borders to include external providers,suppliers, and other healthcare partners. This guide supports privilege management within distributedcomputing as well as
4、service-oriented architecture environments. This guide supports a distributedsecurity environment in which security is also a distributed service.The healthcare sector is continually improving the delivery of care by leveraging technical advancesin computer-based applications. Health professionals a
5、re increasingly accessing multiple applicationsto schedule, diagnose, and administer patient care. These disparate applications are typicallyconnected to a common network infrastructure that typically supports patient, business, andnonbusiness services, communications, and protocols. Because increas
6、ed access is made possiblethrough a common network infrastructure, secure access to these distributed, and often looselycoupled applications, is even more important than when these applications were accessed asstand-alone devices.Secure access to legacy computer-based healthcare applications typical
7、ly involves authentication ofthe user to the application using single-factor identification, such as a password, or multifactoridentification, such as a password combined with a token or biometric devices. After authentication,the application determines the authority that user may have to use aspect
8、s of the application.Determining the level of authority a user has is typically done, if at all, by each application. Theapplication may restrict operations (such as read, write, modify, or delete) to an application-specificgroup or role affiliation. Authenticated users are frequently associated wit
9、h groups or roles using alocal database or flat file under the control of an application administrator.The use of a local mechanism for authorization creates a patchwork of approaches difficult toadminister centrally across the breadth of a healthcare enterprise. That is, the software logicdetermini
10、ng authorization is distinctive to each application. In some cases, applications can be adaptedto use a network database that contains a trusted source of name-value pairs. This information allowsapplications to determine the users group or role affiliation. This approach permits centralized control
11、over a shared user base. However, the resulting granularity of control over user authorization is coarseand shall be interpreted by each application specialist. Granularity of user authority can only beimproved by increasing the number of application-specific groups or roles in the shared database.S
12、toring information specific to each application causes exponential growth of roles per user and resultsin provisioning difficulties. The better solution is to associate industry standard permissions to users.Each application can examine the permissions listed for a user and determine their level ofa
13、uthorization regardless of their group affiliation within the healthcare organization.The resulting system is a PMI. By the nature of the problem, the privileges shall be defined in anindustry standard way. This guide will discuss various aspects of identifying a PMI standard tovendors providing hea
14、lthcare applications to the contemporary healthcare enterprise.1. Scope1.1 This guide defines interoperable mechanisms to manageprivileges in a distributed environment. This guide is orientedtowards support of a distributed or service-oriented architec-ture (SOA) in which security services are thems
15、elves distrib-uted and applications are consumers of distributed services.1.2 This guide incorporates privilege management mecha-nisms alluded to in a number of existing standards (forCopyright ASTM International, 100 Barr Harbor Drive, PO Box C700, West Conshohocken, PA 19428-2959. United StatesNOT
16、ICE: This standard has either been superseded and replaced by a new version or withdrawn.Contact ASTM International (www.astm.org) for the latest information1example, Guide E1986 and Specification E2084). The privilegemechanisms in this guide support policy-based access control(including role-, enti
17、ty-, and contextual-based access control)including the application of policy constraints, patient-requested restrictions, and delegation. Finally, this guide sup-ports hierarchical, enterprise-wide privilege management.1.3 The mechanisms defined in this guide may be used tosupport a privilege manage
18、ment infrastructure (PMI) usingexisting public key infrastructure (PKI) technology.1.4 This guide does not specifically support mechanismsbased on secret-key cryptography. Mechanisms involvingprivilege credentials are specified in ISO 9594-8:2000 (attri-bute certificates) and Organization for the Ad
19、vancement ofStructured Information Standards (OASIS) Security AssertionMarkup Language (SAML) (attribute assertions); however, thisguide does not mandate or assume the use of such standards.1.5 Many current systems require only local privilege man-agement functionality (on a single computer system).
20、 Suchsystems frequently use proprietary mechanisms. This guidedoes not address this type of functionality; rather, it addressesan environment in which privileges and capabilities (authori-zations) shall be managed between computer systems acrossthe enterprise and with business partners.1.6 This stan
21、dard does not purport to address all of thesafety concerns, if any, associated with its use. It is theresponsibility of the user of this standard to establish appro-priate safety and health practices and determine the applica-bility of regulatory limitations prior to use.2. Referenced Documents2.1 A
22、STM Standards:2E1762 Guide for Electronic Authentication of Health CareInformationE1985 Guide for User Authentication and AuthorizationE1986 Guide for Information Access Privileges to HealthInformationE2084 Specification for Authentication of Healthcare Infor-mation Using Digital Signatures (Withdra
23、wn 2009)3E2212 Practice for Healthcare Certificate Policy2.2 ANSI Standards:4X9.45 Enhanced Management Controls Using Digital Sig-natures and Attribute CertificatesINCITS 359 Role-Based Access Control2.3 HL7 Standard:5Health Level 7 Context Management “CCOW” (ClinicalContext Object Workgroup) Standa
24、rd, Version 1.52.4 IETF Standards:6RFC 3198 Terminology for Policy-Based ManagementRFC 3280 Internet X.509 Public Key Infrastructure Certifi-cate and Certificate Revocation List (CRL) ProfileRFC 3881 Security Audit and Access Accountability Mes-sage XML Data Definitions for Healthcare Applications2.
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
5000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ASTM E2595 07 2013 Standard Guide for Privilege Management Infrastructure Withdrawn 2017

链接地址:http://www.mydoc123.com/p-287096.html