XMLWordPrintableJSON

Details

    • Icon: Change Request Change Request
    • Resolution: Persuasive with Modification
    • Icon: Medium Medium
    • FHIR Core (FHIR)
    • DSTU2
    • Security
    • BaseResource
    • Security Labels
    • Hide

      add a the following to the beginning of H4 "Core Security Labels", after the existing first paragraph:

      The Security Label vocabulary has three patterns of use: (1) Bundle: Security/Privacy considerations of a data set, (2) Context: Describe security/privacy context of a request for data, and (3) Meta Data: to indicate security/privacy meta about that data. 

      Bundle: A bundle is a container for a collection of data. Some uses of bundle are for communicating search results, sending data, or persisting data (See Bundle). The Bundle would carry meta about the data contained in the bundle. Specifically the confidentiality 'high water" mark, the authorized purposeOfUse, the required compartment clearance, Refrain, and Obligations that must be maintained. Where the "high water" mark is an indication of the most high confidentiality. Depending on Policy, the Bundle might include the cross-section of sensitivity or integrity, although this is usually not included. 

      Context: Requests (e.g. Read, Query, message triggers) - would describe the context of the request using purposeOfUse and compartment/clearance. The request might declare the highest confidentiality desired. It is unlikely to see in a request a declaration of sensitivity or integrity. It is also unlikely to see Obligations within a Request. (See Bundle for Response, where these are appropriate)

      Meta Data: All resources have a meta.security element to hold descriptions (meta) about the data relative to privacy and security risk. Thus data may be tagged with confidentiality, sensitivity, and integrity. The data might be tagged with the indication of collection context using compartment or purposeOfUse. Data would not typically be tagged with Refrain, or Obligations.

       More complex use of tagging in the data resource, bundle, context, or in Provenance, is possible.

      Show
      add a the following to the beginning of H4 "Core Security Labels", after the existing first paragraph: The Security Label vocabulary has three patterns of use: (1) Bundle: Security/Privacy considerations of a data set, (2) Context: Describe security/privacy context of a request for data, and (3) Meta Data: to indicate security/privacy meta about that data.  Bundle: A bundle is a container for a collection of data. Some uses of bundle are for communicating search results, sending data, or persisting data (See Bundle). The Bundle would carry meta about the data contained in the bundle. Specifically the confidentiality 'high water" mark, the authorized purposeOfUse, the required compartment clearance, Refrain, and Obligations that must be maintained. Where the "high water" mark is an indication of the most high confidentiality. Depending on Policy, the Bundle might include the cross-section of sensitivity or integrity, although this is usually not included.  Context: Requests (e.g. Read, Query, message triggers) - would describe the context of the request using purposeOfUse and compartment/clearance. The request might declare the highest confidentiality desired. It is unlikely to see in a request a declaration of sensitivity or integrity. It is also unlikely to see Obligations within a Request. (See Bundle for Response, where these are appropriate) Meta Data: All resources have a meta.security element to hold descriptions (meta) about the data relative to privacy and security risk. Thus data may be tagged with confidentiality, sensitivity, and integrity. The data might be tagged with the indication of collection context using compartment or purposeOfUse. Data would not typically be tagged with Refrain, or Obligations.  More complex use of tagging in the data resource, bundle, context, or in Provenance, is possible.
    • Kathleen Connor / Luis Maas: 8-0-1
    • Enhancement
    • Non-substantive
    • R5

    Description

      The HCS is a bag of security vocabulary. This has been somewhat explained on security-labels, however there is confusion that would be helped by specific guidance. Such as

      Some of the vocabulary are used in three different ways. To tag data, transactions, and requests.

      Bundle – would carry the 'high water" marking (confidentiality, sensitivity, integrity), compartment/purposeOfUse constraints, and Obligations.

      All other resources are more likely to only be tagged with confidentiality, sensitivity, and integrity; and would be unlikely (discourage) to have compartment, purposeOfUse, or Obligations.

      Requests (e.g. Read, Query, message triggers) - would leverage purposeOfUse and compartment. It is unlikely to see in a request a declaration of confidentiality, sensitivity, or integrity. It is also unlikely to see Obligations within a Request. (See Bundle for Response, where these are appropriate)

      Attachments

        Activity

          People

            john_moehrke John Moehrke
            john_moehrke John Moehrke
            Watchers:
            1 Start watching this issue

            Dates

              Created:
              Updated:
              Resolved: