1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317 318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405 406 407 408 409 410 411 412 413 414 415 416 417 418 419 420 421 422 423 424 425 426 427 428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 443 444 445 446 447 448 449 450 451 452 453 454 455 456 457 458 459 460 461 462 463 464 465 466 467 468 469 470 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486 487 488 489 490 491 492 493 494 495 496 497 498 499 500 501 502 503 504 505 506 507 508 509 510 511 512 513 514 515 516 517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553 554 555 556 557 558 559 560 561 562 563 564 565 566 567 568 569 570 571 572 573 574 575 576 577 578 579 580 581 582 583 584 585 586 587 588 589 590 591 592 593 594 595 596 597 598 599 600 601 602 603 604 605 606 607 608 609 610 611 612 613 614 615 616 617 618 619 620 621 622 623 624 625 626 627 628 629 630 631 632 633 634 635 636 637 638 639 640 641 642 643 644 645 646 647 648 649 650 651 652 653 654 655 656 657 658 659 660 661 662 663 664 665 666 667 668 669 670 671 672 673 674 675 676 677 678 679 680 681 682 683 684 685 686 687 688 689 690 691 692 693 694 695 696 697 698 699 700 701 702 703 704 705 706 707 708 709 710 711 712 713 714 715 716 717 718 719 720 721 722 723 724 725 726 727 728 729 730 731 732 733 734 735 736 737 738 739 740 741 742 743 744 745 746 747 748 749 750 751 752 753 754 755 756 757 758 759 760 761 762 763 764 765 766 767 768 769 770 771 772 773 774 775 776 777 778 779 780 781 782 783 784 785 786 787 788 789 790 791 792 793 794 795 796 797 798 799 800 801 802 803 804 805 806 807 808 809 810 811 812 813 814 815 816 817 818 819 820 821 822 823 824 825 826 827 828 829 830 831 832 833 834 835 836 837 838 839 840 841 842 843 844 845 846 847 848 849 850 851 852 853 854 855 856 857 858 859 860 861 862 863 864 865 866 867 868 869 870 871 872 873 874 875 876 877 878 879 880 881 882 883 884 885 886 887 888 889 890 891 892 893 894 895 896 897 898 899 900 901 902 903 904 905 906 907 908 909 910 911 912 913 914 915 916 917 918 919 920 921 922 923 924 925 926 927 928 929 930 931 932 933 934 935 936 937 938 939 940 941 942 943 944 945 946 947 948 949 950 951 952 953 954 955 956 957 958 959 960 961 962 963 964 965 966 967 968 969 970 971 972 973 974 975 976 977 978 979 980 981 982 983 984 985 986 987 988 989 990 991 992 993 994 995 996 997 998 999 1000 1001 1002 1003 1004 1005 1006 1007 1008 1009 1010 1011 1012 1013 1014 1015 1016 1017 1018 1019 1020 1021 1022 1023 1024 1025 1026 1027 1028 1029 1030 1031 1032 1033 1034 1035 1036 1037 1038 1039 1040 1041 1042 1043 1044 1045 1046 1047 1048 1049 1050 1051 1052 1053 1054 1055 1056 1057 1058 1059 1060 1061 1062 1063 1064 1065 1066 1067 1068 1069 1070 1071 1072 1073 1074 1075 1076 1077 1078 1079 1080 1081 1082 1083 1084 1085 1086 1087 1088 1089 1090 1091 1092 1093 1094 1095 1096 1097 1098 1099 1100 1101 1102 1103 1104 1105 1106 1107 1108 1109 1110 1111 1112 1113 1114 1115 1116 1117 1118 1119 1120 1121 1122 1123 1124 1125 1126 1127 1128 1129 1130 1131 1132 1133 1134 1135 1136 1137 1138 1139 1140 1141 1142 1143 1144 1145 1146 1147 1148 1149 1150 1151 1152 1153 1154 1155 1156 1157 1158 1159 1160 1161 1162 1163 1164 1165 1166 1167 1168 1169 1170 1171 1172 1173 1174 1175 1176 1177 1178 1179 1180 1181 1182 1183 1184 1185 1186 1187 1188 1189 1190 1191 1192 1193 1194 1195 1196 1197 1198 1199 1200 1201 1202 1203 1204 1205 1206 1207 1208 1209 1210 1211 1212 1213 1214 1215 1216 1217 1218 1219 1220 1221 1222 1223 1224 1225 1226 1227 1228 1229 1230 1231 1232 1233 1234 1235 1236 1237 1238 1239 1240 1241 1242 1243 1244 1245 1246 1247 1248 1249 1250 1251 1252 1253 1254 1255 1256 1257 1258 1259 1260 1261 1262 1263 1264 1265 1266 1267 1268 1269 1270 1271 1272 1273 1274 1275 1276 1277 1278 1279 1280 1281 1282 1283 1284 1285 1286 1287 1288 1289 1290 1291 1292 1293 1294 1295 1296 1297 1298 1299 1300 1301 1302 1303 1304 1305 1306 1307 1308 1309 1310 1311 1312 1313 1314 1315 1316 1317 1318 1319 1320 1321 1322 1323 1324 1325 1326 1327 1328 1329 1330 1331 1332 1333 1334 1335 1336 1337 1338 1339 1340 1341 1342 1343 1344 1345 1346 1347 1348 1349 1350 1351 1352 1353 1354 1355 1356 1357 1358 1359 1360 1361 1362 1363 1364 1365 1366 1367 1368 1369 1370 1371 1372 1373 1374 1375 1376 1377 1378 1379 1380 1381 1382 1383 1384 1385 1386 1387 1388 1389 1390 1391 1392 1393 1394 1395 1396 1397 1398 1399 1400 1401 1402 1403 1404 1405 1406 1407 1408 1409 1410 1411 1412 1413 1414 1415 1416 1417 1418 1419 1420 1421 1422 1423 1424 1425 1426 1427 1428 1429 1430 1431 1432 1433 1434 1435 1436 1437 1438 1439 1440 1441 1442 1443 1444 1445 1446 1447 1448 1449 1450 1451 1452 1453 1454 1455 1456 1457 1458 1459 1460 1461 1462 1463 1464 1465 1466 1467 1468 1469 1470 1471 1472 1473 1474 1475 1476 1477 1478 1479 1480 1481 1482 1483 1484 1485 1486 1487 1488 1489 1490 1491 1492 1493 1494 1495 1496 1497 1498 1499 1500 1501 1502 1503 1504 1505 1506 1507 1508 1509 1510 1511 1512 1513 1514 1515 1516 1517 1518 1519 1520 1521 1522 1523 1524 1525 1526 1527 1528 1529 1530 1531 1532 1533 1534 1535 1536 1537 1538 1539 1540 1541 1542 1543 1544 1545 1546 1547 1548 1549 1550 1551 1552 1553 1554 1555 1556 1557 1558 1559 1560 1561 1562 1563 1564 1565 1566 1567 1568 1569 1570 1571 1572 1573 1574 1575 1576 1577 1578 1579 1580 1581 1582 1583 1584 1585 1586 1587 1588 1589 1590 1591 1592 1593 1594 1595 1596 1597 1598 1599 1600 1601 1602 1603 1604 1605 1606 1607 1608 1609 1610 1611 1612 1613 1614 1615 1616 1617 1618 1619 1620 1621 1622 1623 1624 1625 1626 1627 1628 1629 1630 1631 1632 1633 1634 1635 1636 1637 1638 1639 1640 1641 1642 1643 1644 1645 1646 1647 1648 1649 1650 1651 1652 1653 1654 1655 1656 1657 1658 1659 1660 1661 1662 1663 1664 1665 1666 1667 1668 1669 1670 1671 1672 1673 1674 1675 1676 1677 1678 1679 1680 1681 1682 1683 1684 1685 1686 1687 1688 1689 1690 1691 1692 1693 1694 1695 1696 1697 1698 1699 1700 1701 1702 1703 1704 1705 1706 1707 1708 1709 1710 1711 1712 1713 1714 1715 1716 1717 1718 1719 1720 1721 1722 1723 1724 1725 1726 1727 1728 1729 1730 1731 1732 1733 1734 1735 1736 1737 1738 1739 1740 1741 1742 1743 1744 1745 1746 1747 1748 1749 1750 1751 1752 1753 1754 1755 1756 1757 1758 1759 1760 1761 1762 1763 1764 1765 1766 1767 1768 1769 1770 1771 1772 1773 1774 1775 1776 1777 1778 1779 1780 1781 1782 1783 1784 1785 1786 1787 1788 1789 1790 1791 1792 1793 1794 1795 1796 1797 1798 1799 1800 1801 1802 1803 1804 1805 1806 1807 1808 1809 1810 1811 1812 1813 1814 1815 1816 1817 1818 1819 1820 1821 1822 1823 1824 1825 1826 1827 1828 1829 1830 1831 1832 1833 1834 1835 1836 1837 1838 1839 1840 1841 1842 1843 1844 1845 1846 1847 1848 1849 1850 1851 1852 1853 1854 1855 1856 1857 1858 1859 1860 1861 1862 1863 1864 1865 1866 1867 1868 1869 1870 1871 1872 1873 1874 1875 1876 1877 1878 1879 1880 1881 1882 1883 1884 1885 1886 1887 1888 1889 1890 1891 1892 1893 1894 1895 1896 1897 1898 1899 1900 1901 1902 1903 1904 1905 1906 1907 1908 1909 1910 1911 1912 1913 1914 1915 1916 1917 1918 1919 1920 1921 1922 1923 1924 1925 1926 1927 1928 1929 1930 1931 1932 1933 1934 1935 1936 1937 1938 1939 1940 1941 1942 1943 1944 1945 1946 1947 1948 1949 1950 1951 1952 1953 1954 1955 1956 1957 1958 1959 1960 1961 1962 1963 1964 1965 1966 1967 1968 1969 1970 1971 1972 1973 1974 1975 1976 1977 1978 1979 1980 1981 1982 1983 1984 1985 1986 1987 1988 1989 1990 1991 1992 1993 1994 1995 1996 1997 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 2017 2018 2019 2020 2021 2022 2023 2024 2025 2026 2027 2028 2029 2030 2031 2032 2033 2034 2035 2036 2037 2038 2039 2040 2041 2042 2043 2044 2045 2046 2047 2048 2049 2050 2051 2052 2053 2054 2055 2056 2057 2058 2059 2060 2061 2062 2063 2064 2065 2066 2067 2068 2069 2070 2071 2072 2073 2074 2075 2076 2077 2078 2079 2080 2081 2082 2083 2084 2085 2086 2087 2088 2089 2090 2091 2092 2093 2094 2095 2096 2097 2098 2099 2100 2101 2102 2103 2104 2105 2106 2107 2108 2109 2110 2111 2112 2113 2114 2115 2116 2117 2118 2119 2120 2121 2122 2123 2124 2125 2126 2127 2128 2129 2130 2131 2132 2133 2134 2135 2136 2137 2138 2139 2140 2141 2142 2143 2144 2145 2146 2147 2148 2149 2150 2151 2152 2153 2154 2155 2156 2157 2158 2159 2160 2161 2162 2163 2164 2165 2166 2167 2168 2169 2170 2171 2172 2173 2174 2175 2176 2177 2178 2179 2180 2181 2182 2183 2184 2185 2186 2187 2188 2189 2190 2191 2192 2193 2194 2195 2196 2197 2198 2199 2200 2201 2202 2203 2204 2205 2206 2207 2208 2209 2210 2211 2212 2213 2214 2215 2216 2217 2218 2219 2220 2221 2222 2223 2224 2225 2226 2227 2228 2229 2230 2231 2232 2233 2234 2235 2236 2237 2238 2239 2240 2241 2242 2243 2244 2245 2246 2247 2248 2249 2250 2251 2252 2253 2254 2255 2256 2257 2258 2259 2260 2261 2262 2263 2264 2265 2266 2267 2268 2269 2270 2271 2272 2273 2274 2275 2276 2277 2278 2279 2280 2281 2282 2283 2284 2285 2286 2287 2288 2289 2290 2291 2292 2293 2294 2295 2296 2297 2298 2299 2300 2301 2302 2303 2304 2305 2306 2307 2308 2309 2310 2311 2312 2313 2314 2315 2316 2317 2318 2319 2320 2321 2322 2323 2324 2325 2326 2327 2328 2329 2330 2331 2332 2333 2334 2335 2336 2337 2338 2339 2340 2341 2342 2343 2344 2345 2346 2347 2348 2349 2350 2351 2352 2353 2354 2355 2356 2357 2358 2359 2360 2361 2362 2363 2364 2365 2366 2367 2368 2369 2370 2371 2372 2373 2374 2375 2376 2377 2378 2379 2380 2381 2382 2383 2384 2385 2386 2387 2388 2389 2390 2391 2392 2393 2394 2395 2396 2397 2398 2399 2400 2401 2402 2403 2404 2405 2406 2407 2408 2409 2410 2411 2412 2413 2414 2415 2416 2417 2418 2419 2420 2421 2422 2423 2424 2425 2426 2427 2428 2429 2430 2431 2432 2433 2434 2435 2436 2437 2438 2439 2440 2441 2442 2443 2444 2445 2446 2447 2448 2449 2450 2451 2452 2453 2454 2455 2456 2457 2458 2459 2460 2461 2462 2463 2464 2465 2466 2467 2468 2469 2470 2471 2472 2473 2474 2475 2476 2477 2478 2479 2480 2481 2482 2483 2484 2485 2486 2487 2488 2489 2490 2491 2492 2493 2494 2495 2496 2497 2498 2499 2500 2501 2502 2503 2504 2505 2506 2507 2508 2509 2510 2511 2512 2513 2514 2515 2516 2517 2518 2519 2520 2521 2522 2523 2524 2525 2526 2527 2528 2529 2530 2531 2532 2533 2534 2535 2536 2537 2538 2539 2540 2541 2542 2543 2544 2545 2546 2547 2548 2549 2550 2551 2552 2553 2554 2555 2556 2557 2558 2559 2560 2561 2562 2563 2564 2565 2566 2567 2568 2569 2570 2571 2572 2573 2574 2575 2576 2577 2578 2579 2580 2581 2582 2583 2584 2585 2586 2587 2588 2589 2590 2591 2592 2593 2594 2595 2596 2597 2598 2599 2600 2601 2602 2603 2604 2605 2606 2607 2608 2609 2610 2611 2612 2613 2614 2615 2616 2617 2618 2619 2620 2621 2622 2623 2624 2625 2626 2627 2628 2629
|
<pre>Network Working Group G. Marshall
Request for Comments: 3881 Siemens
Category: Informational September 2004
<span class="h1">Security Audit and Access Accountability Message</span>
<span class="h1">XML Data Definitions for Healthcare Applications</span>
Status of this Memo
This memo provides information for the Internet community. It does
not specify an Internet standard of any kind. Distribution of this
memo is unlimited.
Copyright Notice
Copyright (C) The Internet Society (2004).
IESG Note
This RFC is not a candidate for any level of Internet Standard. The
IETF disclaims any knowledge of the fitness of this RFC for any
purpose, and notes that it has not had IETF review. The RFC Editor
has chosen to publish this document at its discretion.
Abstract
This document defines the format of data to be collected and minimum
set of attributes that need to be captured for security auditing in
healthcare application systems. The format is defined as an XML
schema, which is intended as a reference for healthcare standards
developers and application designers. It consolidates several
previous documents on security auditing of healthcare data.
<span class="grey">Marshall Informational [Page 1]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-2" ></span>
<span class="grey"><a href="./rfc3881">RFC 3881</a> Security Audit & Access Accountability September 2004</span>
Table of Contents
<a href="#section-1">1</a>. Purpose . . . . . . . . . . . . . . . . . . . . . . . . . . . . <a href="#page-2">2</a>
<a href="#section-2">2</a>. Scope . . . . . . . . . . . . . . . . . . . . . . . . . . . . . <a href="#page-4">4</a>
<a href="#section-2.1">2.1</a>. Data Collection . . . . . . . . . . . . . . . . . . . . . <a href="#page-4">4</a>
<a href="#section-2.2">2.2</a>. Anticipated Data End-uses . . . . . . . . . . . . . . . . <a href="#page-5">5</a>
<a href="#section-2.3">2.3</a>. Conformance . . . . . . . . . . . . . . . . . . . . . . . <a href="#page-6">6</a>
<a href="#section-3">3</a>. Goals . . . . . . . . . . . . . . . . . . . . . . . . . . . . . <a href="#page-6">6</a>
<a href="#section-3.1">3.1</a>. Effective Data Gathering. . . . . . . . . . . . . . . . . <a href="#page-6">6</a>
<a href="#section-3.2">3.2</a>. Efficiency. . . . . . . . . . . . . . . . . . . . . . . . <a href="#page-7">7</a>
<a href="#section-4">4</a>. Trigger Events. . . . . . . . . . . . . . . . . . . . . . . . . <a href="#page-8">8</a>
<a href="#section-4.1">4.1</a>. Security Administration . . . . . . . . . . . . . . . . . <a href="#page-8">8</a>
<a href="#section-4.2">4.2</a>. Audit Administration and Data Access. . . . . . . . . . . <a href="#page-9">9</a>
<a href="#section-4.3">4.3</a>. User Access . . . . . . . . . . . . . . . . . . . . . . . <a href="#page-10">10</a>
<a href="#section-5">5</a>. Data Definitions. . . . . . . . . . . . . . . . . . . . . . . . <a href="#page-13">13</a>
<a href="#section-5.1">5.1</a>. Event Identification. . . . . . . . . . . . . . . . . . . <a href="#page-13">13</a>
<a href="#section-5.2">5.2</a>. Active Participant Identification . . . . . . . . . . . . <a href="#page-17">17</a>
<a href="#section-5.3">5.3</a>. Network Access Point Identification . . . . . . . . . . . <a href="#page-20">20</a>
<a href="#section-5.4">5.4</a>. Audit Source Identification . . . . . . . . . . . . . . . <a href="#page-22">22</a>
<a href="#section-5.5">5.5</a>. Participant Object Identification . . . . . . . . . . . . <a href="#page-24">24</a>
<a href="#section-6">6</a>. XML Schema. . . . . . . . . . . . . . . . . . . . . . . . . . . <a href="#page-31">31</a>
<a href="#section-6.1">6.1</a>. XML Schema Definition . . . . . . . . . . . . . . . . . . <a href="#page-31">31</a>
<a href="#section-6.2">6.2</a>. XML Schema Localization . . . . . . . . . . . . . . . . . <a href="#page-43">43</a>
<a href="#section-7">7</a>. Security Considerations . . . . . . . . . . . . . . . . . . . . <a href="#page-44">44</a>
<a href="#section-8">8</a>. References. . . . . . . . . . . . . . . . . . . . . . . . . . . <a href="#page-44">44</a>
<a href="#section-8.1">8.1</a>. Normative References. . . . . . . . . . . . . . . . . . . <a href="#page-44">44</a>
<a href="#section-8.2">8.2</a>. Informative References. . . . . . . . . . . . . . . . . . <a href="#page-45">45</a>
Acknowledgments. . . . . . . . . . . . . . . . . . . . . . . . . . <a href="#page-45">45</a>
Author's Address . . . . . . . . . . . . . . . . . . . . . . . . . <a href="#page-46">46</a>
Full Copyright Statement . . . . . . . . . . . . . . . . . . . . . <a href="#page-47">47</a>
<span class="h2"><a class="selflink" id="section-1" href="#section-1">1</a>. Purpose</span>
To help assure healthcare privacy and security in automated systems,
usage data needs to be collected. This data will be reviewed by
administrative staff to verify that healthcare data is being used in
accordance with the healthcare provider's data security requirements
and to establish accountability for data use. This data collection
and review process is called security auditing.
This document defines the format of the data to be collected and
minimum set of attributes that need to be captured by healthcare
application systems for subsequent use by an automation-assisted
review application. The data includes records of who accessed
healthcare data, when, for what action, from where, and which
<span class="grey">Marshall Informational [Page 2]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-3" ></span>
<span class="grey"><a href="./rfc3881">RFC 3881</a> Security Audit & Access Accountability September 2004</span>
patients' records were involved. The data definition is an XML
schema to be used as a reference by healthcare standards developers
and application designers.
This document consolidates previously disjointed viewpoints of
security auditing from Health Level 7 (HL7) [<a href="#ref-HL7SASIG" title=""Common Audit Message"">HL7SASIG</a>], Digital
Imaging and Communications in Medicine (DICOM) Working Group 14,
Integrating the Healthcare Enterprise (IHE) [<a href="#ref-IHETF-3" title=""IHE Technical Framework"">IHETF-3</a>], the ASTM
International Healthcare Informatics Technical Committee (ASTM E31)
[<a href="#ref-E2147" title=""E2147-01 Standard Specification for Audit and Disclosure Logs for Use in Health Information Systems"">E2147</a>], and the Joint NEMA/COCIR/JIRA Security and Privacy Committee
[<a href="#ref-NEMASPC" title=""Security and Privacy Auditing in Health Care Information Technology"">NEMASPC</a>]. It is intended as a reference for these groups and other
healthcare standards developers.
The purposes the document fulfills are to:
1) Define data to be communicated for evidence of compliance with, or
violations of, a healthcare enterprise's security and privacy
policies and objectives.
This document defines the audit message format and content for
healthcare application systems. The focus of auditing is to
retrospectively detect and report security/privacy breaches. This
includes capturing data that supports individual accountability
for patient record creation, access, updates, and deletions.
This document does not define healthcare security and privacy
policies or objectives. It also does not include real-time access
alarm actions since there is a perception in the healthcare
community that security measures that inhibit access may also
inhibit effective patient care, under some circumstances.
2) Depict the data that would potentially reside in a common audit
engine or database.
Privacy and security audit data is to be collected on each
hardware system, and there are likely to be separate local data
stores for system-level and application-level audits. Collating
these records and providing a common view - transcending hardware
system boundaries - is seen as necessary for cost-effective
security and privacy policy administration.
The data definitions in this document support such a collation,
but the technical implementation alternatives are not covered in
this document.
<span class="grey">Marshall Informational [Page 3]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-4" ></span>
<span class="grey"><a href="./rfc3881">RFC 3881</a> Security Audit & Access Accountability September 2004</span>
3) Depict data that allows useful queries against audited events.
Audit data, in its raw form, reflects a sequential view of system
activity. Useful inquiries for security and privacy
administration need workflow, business process, organizational,
role, and person-oriented views. Data definitions in this
document anticipate and support creating those views and queries,
but do not define them.
4) Provide a common reference standard for healthcare IT standards
development organizations.
By specifying an XML schema, this document anticipates extensions
to the base schema to meet requirements of healthcare standards
bodies and application developers.
<span class="h2"><a class="selflink" id="section-2" href="#section-2">2</a>. Scope</span>
<span class="h3"><a class="selflink" id="section-2.1" href="#section-2.1">2.1</a>. Data Collection</span>
This document specifies audit data to be collected and communicated
from automated systems. It does not include non-automated processes.
Data for events in the above categories may be selectively collected,
based on healthcare organization policy. This document does not
specify any baseline or minimal policies.
For each audited event, this document specifies the minimal data
requirements plus optional data for the following event categories:
1) Security administrative events - establishing and maintaining
security policy definitions, secured object definitions, role
definitions, user definitions, and the relationships among them.
In general, these events are specific to the administrative
applications.
2) Audit access events - reflecting special protections implemented
for the audit trail itself.
3) Security-mediated events - recording entity identification and
authentication, data access, function access, nonrepudiation,
cryptographic operations, and data import/export for messages and
reports. In general, these events are generic to all protected
resources, without regard to the application data content.
<span class="grey">Marshall Informational [Page 4]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-5" ></span>
<span class="grey"><a href="./rfc3881">RFC 3881</a> Security Audit & Access Accountability September 2004</span>
4) Patient care data events - documenting what was done, by whom,
using which resources, from what access points, and to whose
medical data. In general, these audits are application-specific
since they require knowledge of the application data content.
Security subsystems found in most system infrastructures include a
capability to capture system-level security relevant events like
log-on and security object accesses. This document does not preclude
such functions being enabled to record and supply the data defined in
this document, but transformation of the collected data to the common
XML schema definition may be necessary to support requirements
consolidated auditing views.
Application-level events, such as patient record access, are not
captured by system-level security audits. The defined data support
applications' record access auditing for healthcare institutional
security and privacy assurance plus related policy administration
functions.
System-local data definitions for collection and storage of audit
data, prior to transformation to a common schema and transmission to
a common repository, are not included in this document.
<span class="h3"><a class="selflink" id="section-2.2" href="#section-2.2">2.2</a>. Anticipated Data End-uses</span>
This document anticipates, but does not define, end-uses for the data
collected.
The typical healthcare IT environment contains many systems from
various vendors and developers who have not implemented common or
interoperable security administrative functions. This document
anticipates a requirement to transmit data from several unrelated
systems to a common repository. It also anticipates the aggregated
data which may then be queried and viewed in a variety of ways.
There are distinctions of detail granularity, specificity, and
frequency between audit data required for surveillance versus
forensic purposes. While some surveillance data may be useful for
forensics, the scope of this document is limited to surveillance.
This document does not address access real-time policy violation
alarm actions. There is a perception in the healthcare community
that security measures which inhibit access may also inhibit
effective patient care, under some circumstances.
<span class="grey">Marshall Informational [Page 5]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-6" ></span>
<span class="grey"><a href="./rfc3881">RFC 3881</a> Security Audit & Access Accountability September 2004</span>
This document does not define any data for patient care consents or
patients' permissions for data disclosure. It is conceivable that
the proposed audit data could be input to such applications, however,
assuming strict access controls for audit data have been established.
This document does not define system-specific or application-specific
data that may be collected and reported in addition to the defined
elements. For example, it is conceivable that audit mechanisms may
be useful for tracking financial or payroll transactions. At the
same time, this document does not preclude extending the XML schema
to incorporate additional data.
There is a potential requirement for a set of administrative messages
to be sent from a central source to each participating system to
uniformly specify, control, enable, or disable audit data collection.
Such messages are not included in this document.
<span class="h3"><a class="selflink" id="section-2.3" href="#section-2.3">2.3</a>. Conformance</span>
This document does not include any definitions of conformance
practices. Instead, it anticipates that standards development
organizations that reference this document may specify their own
conformance requirements.
<span class="h2"><a class="selflink" id="section-3" href="#section-3">3</a>. Goals</span>
<span class="h3"><a class="selflink" id="section-3.1" href="#section-3.1">3.1</a>. Effective Data Gathering</span>
The process of assuring that security policies are implemented
correctly is essential to information security administration. It is
a set of interrelated tasks all aimed at maintaining an acceptable
level of confidence that security protections are, in fact, working
as intended. These tasks are assisted by data from automated
instrumentation of system and application functions.
Data gathered from a secured environment is used to accumulate
evidence that security systems are working as intended and to detect
incidents and patterns of misuse for further actions. Once messages
have been collected, various reports may be created in support of
security assurance and administration information requirements.
When a site runs multiple heterogeneous applications, each
application system may have its own security mechanisms - user log-
on, roles, access right permissions and restrictions, etc. Each
application system also has its own security log file that records
security relevant events, e.g., log-in, data access, and updates to
the security policy databases. A system administrator or security
auditor must examine each of these log files to find security
<span class="grey">Marshall Informational [Page 6]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-7" ></span>
<span class="grey"><a href="./rfc3881">RFC 3881</a> Security Audit & Access Accountability September 2004</span>
relevant incidents. Not only is it difficult to examine each of
these files separately, the format and contents of each file may be
confusingly different.
Resolving these issues requires a framework to:
- Maximize interoperability and the meaningfulness of data across
applications and sites
- Minimize ambiguity among heterogeneous systems
- Simplify and limit the costs of administrative audit tasks.
<span class="h3"><a class="selflink" id="section-3.2" href="#section-3.2">3.2</a>. Efficiency</span>
One of the leading concerns about auditing is the potential volume of
data gathering and its impact on application system performance.
Although this document does not prescribe specific implementations or
strategies, the following are meant as informative guidance for
development.
1) Audits should be created for transactions or record-level data
access, not for individual attribute-level changes to data.
2) This document does not discourage locally optimized gathering of
audit data on each application system. Instead, it anticipates
implementation-defined periodic gathering and transmission of data
to a common repository. This common repository would be optimized
for after-the-fact audit queries and reporting, thus unburdening
each application system of those responsibilities. It is also
important to keep the message size compact so that audit data will
not penalize normal network operation.
3) On each application system, a variety of policy-based methods
could be employed to optimize data gathering and storage, e.g.,
selective auditing of only events defined as important plus
workload buffering and balancing. Data gathering itself should be
stateless to avoid the overhead of transactional semantics. In
addition, prior to transmission, some filtering, aggregation, and
summarization of repeated events would reduce the number of
messages. Audit data storage and integrity on each application
system need only be scaled for relatively low-volume and short-
duration requirements, yet be consistent with implementation-
defined minimums for holding the data for subsequent collection.
4) Leveraging existing data collection should be considered. For
example, most commercial security subsystems record events in a
local common log file, so the log file data can be extracted for
communication to a common repository. Also, it is common in some
systems' designs to have a transaction log for data reconstruction
<span class="grey">Marshall Informational [Page 7]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-8" ></span>
<span class="grey"><a href="./rfc3881">RFC 3881</a> Security Audit & Access Accountability September 2004</span>
in event of database loss, so collecting data-update audit data
within this subsystem could reduce impact on application system
performance.
5) A security audit repository would gather all audit message data
from the different applications in one database with one standard
structure. This would allow easier evaluation and querying. Once
a suspicious pattern has been found in the audit log repository,
investigation might proceed with more detail in the application
specific audit log. The presence of a common repository also
simplifies and streamlines the implementation of policies for
audit data storage, integrity, retention, and destruction.
<span class="h2"><a class="selflink" id="section-4" href="#section-4">4</a>. Trigger Events</span>
The following identifies representative trigger events for generating
audit messages. This is not a complete list of trigger events.
For those events arising in the security infrastructure the "minimal"
and "basic" level of auditing as outlined in the Common Criteria
[<a href="#ref-ISO15408-2" title=""ISO/IEC 15408:1999 Common Criteria for Information Technology Security Evaluation, Part 2: Security Functional Requirements"">ISO15408-2</a>] should be used as a reference standard.
<span class="h3"><a class="selflink" id="section-4.1" href="#section-4.1">4.1</a>. Security Administration</span>
This group includes all actions that create, maintain, query, and
display definitions for securing data, functions, and the associated
access policies. For each trigger type, the creation, update or
amendment, deletion, and activation or deactivation are auditable.
<span class="h4"><a class="selflink" id="section-4.1.1" href="#section-4.1.1">4.1.1</a>. Data Definition</span>
This includes creation, modification, deletion, query, and display of
security attributes for data sets, data groups, or classes plus their
atomic data elements or attributes.
<span class="h4"><a class="selflink" id="section-4.1.2" href="#section-4.1.2">4.1.2</a>. Function Definition</span>
This includes, for example, creation, modification, deletion, query,
or display of security attributes and auditable events for the
application functions used for patient management, clinical
processes, registry of business objects and methods, program creation
and maintenance, etc.
<span class="h4"><a class="selflink" id="section-4.1.3" href="#section-4.1.3">4.1.3</a>. Domain Definition</span>
This includes all activities to create, modify, delete, query, or
display security domains according to various organizational
categories such as entity-wide, institutional, departmental, etc.
<span class="grey">Marshall Informational [Page 8]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-9" ></span>
<span class="grey"><a href="./rfc3881">RFC 3881</a> Security Audit & Access Accountability September 2004</span>
<span class="h4"><a class="selflink" id="section-4.1.4" href="#section-4.1.4">4.1.4</a>. Classification Definition</span>
This includes all activities that create, modify, delete, query or
display security categories or groupings for functions and data such
as patient management, nursing, clinical, etc.
<span class="h4"><a class="selflink" id="section-4.1.5" href="#section-4.1.5">4.1.5</a>. Permission Definition</span>
This includes all activities that create, modify, delete, query or
display the allowable access permissions associated with functions
and data, such as create, read, update, delete, and execution of
specific functional units or object access or manipulation methods.
<span class="h4"><a class="selflink" id="section-4.1.6" href="#section-4.1.6">4.1.6</a>. Role Definition</span>
This includes all activities that create, modify, delete, query or
display security roles according to various task-grouping categories
such as security administration, admissions desk, nurses, physicians,
clinical specialists, etc. It also includes the association of
permissions with roles for role-based access control.
<span class="h4"><a class="selflink" id="section-4.1.7" href="#section-4.1.7">4.1.7</a>. User Definition</span>
This includes all activities that create, modify, delete, query, or
display user accounts. It includes password or other authentication
data. It also includes the association of roles with users for
role-based access control, or permissions with users for user-based
access control.
<span class="h3"><a class="selflink" id="section-4.2" href="#section-4.2">4.2</a>. Audit Administration and Data Access</span>
This category includes all actions that determine the collection and
availability of audit data.
<span class="h4"><a class="selflink" id="section-4.2.1" href="#section-4.2.1">4.2.1</a>. Auditable Event Enable or Disable</span>
This reflects a basic policy decision that an event should or should
not be audited. Some, but not necessarily all, triggers or use cases
must create an audit record. The selection of what to audit depends
on administrative policy decisions. Note that, for integrity, this
event should always be audited.
<span class="grey">Marshall Informational [Page 9]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-10" ></span>
<span class="grey"><a href="./rfc3881">RFC 3881</a> Security Audit & Access Accountability September 2004</span>
<span class="h4"><a class="selflink" id="section-4.2.2" href="#section-4.2.2">4.2.2</a>. Audit Data Access</span>
This includes instances where audit data is viewed or reported for
any purpose. Since the audit data itself may include data protected
by institutional privacy policies and expose the implementation of
those policies, access to the data is highly sensitive. This event
should therefore always be audited.
<span class="h4"><a class="selflink" id="section-4.2.3" href="#section-4.2.3">4.2.3</a>. Audit Data Modify or Delete</span>
This includes instances where audit data is modified or deleted.
While such operations are sometimes permitted by systems policies,
modification or destruction of audit data may well be the result of
unauthorized hostile systems access. Therefore, this type of event
should always be audited.
<span class="h3"><a class="selflink" id="section-4.3" href="#section-4.3">4.3</a>. User Access</span>
This category includes events of access to secured data and functions
for which audit data might be collected.
<span class="h4"><a class="selflink" id="section-4.3.1" href="#section-4.3.1">4.3.1</a>. Sign-On</span>
This includes successful and unsuccessful attempts from human users
and automated system. It also includes re-authentication actions and
re-issuing time-sensitive credentials such as Kerberos tickets.
<span class="h4"><a class="selflink" id="section-4.3.2" href="#section-4.3.2">4.3.2</a>. Sign-Off</span>
This includes explicit sign-off events and session abandonment
timeouts from human users and automated systems.
<span class="h4"><a class="selflink" id="section-4.3.3" href="#section-4.3.3">4.3.3</a>. Function Access</span>
This includes user invocation of application or system functions that
have permission definitions associated with them. Note that in a
Discretionary Access Control environment not all functions require
permissions, especially if their impact is benign in relation to
security policies.
The following are examples of trigger events relevant to healthcare
privacy. The actual triggers for institutional data access, policies
for non-care functions, and support regulatory requirements need to
be identified by application-domain standards developers and system
implementers.
<span class="grey">Marshall Informational [Page 10]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-11" ></span>
<span class="grey"><a href="./rfc3881">RFC 3881</a> Security Audit & Access Accountability September 2004</span>
<span class="h5"><a class="selflink" id="section-4.3.3.1" href="#section-4.3.3.1">4.3.3.1</a>. Subject of Care Record Access</span>
This includes all functions which manipulate basic patient data:
- Create, e.g., demographics or patient profile
- Assign identifier, e.g., medical record number
- Update, amend
- Merge/unmerge, e.g., combine multiple medical records for one
patient
- Import/export of data from/to an external source, including
printing and creation of portable media copies.
- Delete, e.g., invalid creation of care record
<span class="h5"><a class="selflink" id="section-4.3.3.2" href="#section-4.3.3.2">4.3.3.2</a>. Encounter or Visit</span>
This includes all functions which associate a subject of care with an
instance of care:
- Create, e.g., demographics or patient profile
- Assign encounter identifier
- Per-admit
- Admit
- Update, amend
- Delete, e.g., invalid creation of encounter record, breakdown of
equipment, patient did not arrive as expected
<span class="h5"><a class="selflink" id="section-4.3.3.3" href="#section-4.3.3.3">4.3.3.3</a>. Care Protocols</span>
This includes all functions which associate care plans or similar
protocols with an instance or subject of care:
- Schedule, initiate
- Update, amend
- Complete
- Cancel
<span class="h5"><a class="selflink" id="section-4.3.3.4" href="#section-4.3.3.4">4.3.3.4</a>. Episodes or Problems</span>
This includes specific clinical episodes within an instance of care.
Initiate:
- Update, amend
- Resolve, complete
- Cancel
<span class="grey">Marshall Informational [Page 11]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-12" ></span>
<span class="grey"><a href="./rfc3881">RFC 3881</a> Security Audit & Access Accountability September 2004</span>
<span class="h5"><a class="selflink" id="section-4.3.3.5" href="#section-4.3.3.5">4.3.3.5</a>. Orders and Order Sets</span>
This includes clinical or supplies orders within an instance or
episode of care:
- Initiate
- Update, amend
- Check for contraindications
- Verify
- Deliver/complete - including instructions
- Cancel
<span class="h5"><a class="selflink" id="section-4.3.3.6" href="#section-4.3.3.6">4.3.3.6</a>. Health Service Event or Act</span>
This includes various health services scheduled and performed within
an instance or episode of care:
- Schedule, initiate
- Update, amend
- Check for contraindications
- Verify
- Perform/complete - including instructions
- Cancel
<span class="h5"><a class="selflink" id="section-4.3.3.7" href="#section-4.3.3.7">4.3.3.7</a>. Medications</span>
This includes all medication orders and administration within an
instance or episode of care:
- Order
- Check
- Check for interactions
- Verify
- Dispense/deliver - including administration instructions
- Administer
- Cancel
<span class="h5"><a class="selflink" id="section-4.3.3.8" href="#section-4.3.3.8">4.3.3.8</a>. Staff/Participant Assignment</span>
This includes staffing or participant assignment actions relevant to
an instance or episode of care:
- Assignment of healthcare professionals, caregivers attending
physician, residents, medical students, consultants, etc.
- Change in assigned role or authorization, e.g., relative to
healthcare status change.
- De-assignment
<span class="grey">Marshall Informational [Page 12]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-13" ></span>
<span class="grey"><a href="./rfc3881">RFC 3881</a> Security Audit & Access Accountability September 2004</span>
<span class="h2"><a class="selflink" id="section-5" href="#section-5">5</a>. Data Definitions</span>
This section defines and describes the data in the XML schema. The
actual XML schema definition is in <a href="#section-6">section 6</a>.
The proposed data elements are grouped into these categories:
1) Event Identification - what was done
2) Active Participant Identification - by whom
3) Network Access Point Identification - initiated from where
4) Audit Source Identification - using which server
5) Participant Object Identification - to what record
<span class="h3"><a class="selflink" id="section-5.1" href="#section-5.1">5.1</a>. Event Identification</span>
The following data identifies the name, action type, time, and
disposition of the audited event. There is only one set of event
identification data per audited event.
<span class="h4"><a class="selflink" id="section-5.1.1" href="#section-5.1.1">5.1.1</a>. Event ID</span>
Description
Identifier for a specific audited event, e.g., a menu item,
program, rule, policy, function code, application name, or URL.
It identifies the performed function.
Optionality: Required
Format / Values
Coded value, either defined by the system implementers or as a
reference to a standard vocabulary. The "code" attribute must be
unambiguous and unique, at least within Audit Source ID (see
<a href="#section-5.4">section 5.4</a>). Examples of Event IDs are program name, method
name, or function name.
For implementation defined coded values or references to
standards, the XML schema defines these optional attributes:
Attribute Value
-------------- --------------------------------------------
CodeSystem OID reference
CodeSystemName Name of the coding system; strongly recommended
to be valued for locally-defined code-sets.
DisplayName The value to be used in displays and reports
OriginalText Input value that was translated to the code
<span class="grey">Marshall Informational [Page 13]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-14" ></span>
<span class="grey"><a href="./rfc3881">RFC 3881</a> Security Audit & Access Accountability September 2004</span>
To support the requirement for unambiguous event identification,
multiple values may not be specified.
Rationale
This identifies the audited function. For "Execute" Event Action
Code audit records, this identifies the application function
performed.
<span class="h4"><a class="selflink" id="section-5.1.2" href="#section-5.1.2">5.1.2</a>. Event Action Code</span>
Description
Indicator for type of action performed during the event that
generated the audit.
Optionality: Optional
Format / Values
Enumeration:
Value Meaning Examples
----- --------------------- ----------------------------------
C Create Create a new database object, such
as Placing an Order.
R Read/View/Print/Query Display or print data, such as a
Doctor Census
U Update Update data, such as Revise
Patient Information
D Delete Delete items, such as a doctor
master file record
E Execute Perform a system or application
function such as log-on, program
execution, or use of an object's
method
Rationale
This broadly indicates what kind of action was done on the
Participant Object.
<span class="grey">Marshall Informational [Page 14]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-15" ></span>
<span class="grey"><a href="./rfc3881">RFC 3881</a> Security Audit & Access Accountability September 2004</span>
Notes
Actions that are not enumerated above are considered an Execute of
a specific function or object interface method or treated two or
more distinct events. An application action, such as an
authorization, is a function Execute, and the Event ID would
identify the function.
For some applications, such as radiological imaging, a Query
action may only determine the presence of data but not access the
data itself. Auditing need not make as fine a distinction.
Compound actions, such as "Move," would be audited by creating
audit data for each operation - read, create, delete - or as an
Execute of a function or method.
<span class="h4"><a class="selflink" id="section-5.1.3" href="#section-5.1.3">5.1.3</a>. Event Date/Time</span>
Description
Universal coordinated time (UTC), i.e., a date/time specification
that is unambiguous as to local time zones.
Optionality: Required
Format / Values
A date/time representation that is unambiguous in conveying
universal coordinated time (UTC), formatted according to the ISO
8601 standard [<a href="#ref-ISO8601" title=""ISO 8601:2000 Data elements and interchange formats -- Information interchange -- Representation of dates and times"">ISO8601</a>]
Rationale
This ties an event to a specific date and time. Security audits
typically require a consistent time base, e.g., UTC, to eliminate
time-zone issues arising from geographical distribution.
Notes
In a distributed system, some sort of common time base, e.g., an
NTP [<a href="./rfc1305" title=""Network Time Protocol (Version 3) Specification, Implementation"">RFC1305</a>] server, is a good implementation tactic.
<span class="h4"><a class="selflink" id="section-5.1.4" href="#section-5.1.4">5.1.4</a>. Event Outcome Indicator</span>
Description
Indicates whether the event succeeded or failed.
<span class="grey">Marshall Informational [Page 15]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-16" ></span>
<span class="grey"><a href="./rfc3881">RFC 3881</a> Security Audit & Access Accountability September 2004</span>
Optionality: Required
Format / Values
Enumeration:
Value Meaning
---- ----------------------------------------------------
0 Success
4 Minor failure; action restarted, e.g., invalid password
with first retry
8 Serious failure; action terminated, e.g., invalid
password with excess retries
12 Major failure; action made unavailable, e.g., user
account disabled due to excessive invalid log-on attempts
Rationale
Some audit events may be qualified by success or failure
indicator. For example, a Log-on might have this flag set to a
non-zero value to indicate why a log-on attempt failed.
Notes
In some cases a "success" may be partial, for example, an
incomplete or interrupted transfer of a radiological study. For
the purpose of establishing accountability, these distinctions are
not relevant.
<span class="h4"><a class="selflink" id="section-5.1.5" href="#section-5.1.5">5.1.5</a>. Event Type Code</span>
Description
Identifier for the category of event.
Optionality: Optional
Format / Values
Coded value enumeration, either defined by the system implementers
or as a reference to a standard vocabulary. For implementation
defined codes or references to standards, the XML schema defines
these optional attributes:
<span class="grey">Marshall Informational [Page 16]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-17" ></span>
<span class="grey"><a href="./rfc3881">RFC 3881</a> Security Audit & Access Accountability September 2004</span>
Attribute Value
-------------- --------------------------------------------
CodeSystem OID reference
CodeSystemName Name of the coding system; strongly recommended
to be valued for locally-defined code-sets.
DisplayName The value to be used in displays and reports
OriginalText Input value that was translated to the code
Since events may be categorized in more than one way, there may be
multiple values specified.
Rationale
This field enables queries of messages by implementation-defined
event categories.
<span class="h3"><a class="selflink" id="section-5.2" href="#section-5.2">5.2</a>. Active Participant Identification</span>
The following data identify a user for the purpose of documenting
accountability for the audited event. A user may be a person, or a
hardware device or software process for events that are not initiated
by a person.
Optionally, the user's network access location may be specified.
There may be more than one user per event, for example, in cases of
actions initiated by one user for other users, or in events that
involve more than one user, hardware device, or system process.
However, only one user may be the initiator/requestor for the event.
<span class="h4"><a class="selflink" id="section-5.2.1" href="#section-5.2.1">5.2.1</a>. User ID</span>
Description
Unique identifier for the user actively participating in the event
Optionality: Required
Format / Values
User identifier text string from the authentication system. It is
a unique value within the Audit Source ID (see <a href="#section-5.4">section 5.4</a>).
Rationale
This field ties an audit event to a specific user.
<span class="grey">Marshall Informational [Page 17]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-18" ></span>
<span class="grey"><a href="./rfc3881">RFC 3881</a> Security Audit & Access Accountability September 2004</span>
Notes
For cross-system audits, especially with long retention, this user
identifier will permanently tie an audit event to a specific user
via a perpetually unique key.
For node-based authentication -- where only the system hardware or
process, but not a human user, is identified -- User ID would be
the node name.
<span class="h4"><a class="selflink" id="section-5.2.2" href="#section-5.2.2">5.2.2</a>. Alternative User ID</span>
Description
Alternative unique identifier for the user
Optionality: Optional
Format / Values
User identifier text string from authentication system. This
identifier would be one known to a common authentication system
(e.g., single sign-on), if available.
Rationale
In some situations a user may authenticate with one identity but, to
access a specific application system, may use a synonymous identify.
For example, some "single sign on" implementations will do this. The
alternative identifier would then be the original identify used for
authentication, and the User ID is the one known to and used by the
application.
<span class="h4"><a class="selflink" id="section-5.2.3" href="#section-5.2.3">5.2.3</a>. User Name</span>
Description
The human-meaningful name for the user
Optionality: Optional
Format / Values
Text string
<span class="grey">Marshall Informational [Page 18]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-19" ></span>
<span class="grey"><a href="./rfc3881">RFC 3881</a> Security Audit & Access Accountability September 2004</span>
Rationale
The User ID and Alternative User ID may be internal or otherwise
obscure values. This field assists the auditor in identifying the
actual user.
<span class="h4"><a class="selflink" id="section-5.2.4" href="#section-5.2.4">5.2.4</a>. User Is Requestor</span>
Description
Indicator that the user is or is not the requestor, or initiator,
for the event being audited.
Optionality: Optional
Format / Values
Boolean, default/assumed value is "true"
Rationale
This value is used to distinguish between requestor-users and
recipient-users. For example, one person may initiate a report-
output to be sent to a another user.
<span class="h4"><a class="selflink" id="section-5.2.5" href="#section-5.2.5">5.2.5</a>. Role ID Code</span>
Description
Specification of the role(s) the user plays when performing the
event, as assigned in role-based access control security.
Optionality: Optional; multi-valued
Format / Values
Coded value, with attribute "code" valued with the role code or
text from authorization system. More than one value may be
specified.
The codes may be implementation-defined or reference a standard
vocabulary enumeration. For implementation defined codes or
references to standards, the XML schema defines these optional
attributes:
<span class="grey">Marshall Informational [Page 19]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-20" ></span>
<span class="grey"><a href="./rfc3881">RFC 3881</a> Security Audit & Access Accountability September 2004</span>
Attribute Value description
-------------- --------------------------------------------
CodeSystem OID reference
CodeSystemName Name of the coding system; strongly recommended
to be valued for locally-defined code-sets.
Display Name The value to be used in displays and reports
OriginalText Input value that was translated to the code
Rationale
This value ties an audited event to a user's role(s). It is an
optional value that might be used to group events for analysis by
user functional role categories.
Notes
Many security systems are unable to produce this data, hence it is
optional.
For the common message, this identifier would be the one known to
a common authorization system, if available. Otherwise, it is a
unique value within the Audit Source ID (see <a href="#section-5.4">section 5.4</a>).
Consider using a globally unique identifier associated with the
role to avoid ambiguity in auditing data collected from multiple
systems.
Role ID is not a substitute for personal accountability.
Ambiguities arise from composite roles and users with multiple
roles, i.e., which role within a composite is being used or what
privilege was a user employing?
<span class="h3"><a class="selflink" id="section-5.3" href="#section-5.3">5.3</a>. Network Access Point Identification</span>
The network access point identifies the logical network location for
application activity. These data are paired 1:1 with the Active
Participant Identification data.
<span class="h4"><a class="selflink" id="section-5.3.1" href="#section-5.3.1">5.3.1</a>. Network Access Point Type Code</span>
Description
An identifier for the type of network access point that originated
the audit event.
Optionality: Optional
Format / Values
<span class="grey">Marshall Informational [Page 20]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-21" ></span>
<span class="grey"><a href="./rfc3881">RFC 3881</a> Security Audit & Access Accountability September 2004</span>
Enumeration:
Value Meaning
----- --------------------------------
1 Machine Name, including DNS name
2 IP Address
3 Telephone Number
Rationale
This datum identifies the type of network access point identifier
of the user device for the audit event. It is an optional value
that may be used to group events recorded on separate servers for
analysis of access according to a network access point's type.
<span class="h4"><a class="selflink" id="section-5.3.2" href="#section-5.3.2">5.3.2</a>. Network Access Point ID</span>
Description
An identifier for the network access point of the user device for
the audit event. This could be a device id, IP address, or some
other identifier associated with a device.
Optionality: Optional
Format / Values
Text may be constrained to only valid values for the given Network
Access Point Type, if specified. Recommendation is to be as
specific as possible where multiple options are available.
Rationale
This datum identifies the user's network access point, which may
be distinct from the server that performed the action. It is an
optional value that may be used to group events recorded on
separate servers for analysis of a specific network access point's
data access across all servers.
Note
Network Access Point ID is not a substitute for personal
accountability. Internet IP addresses, in particular, are highly
volatile and may be assigned to more than one person in a short
time period.
<span class="grey">Marshall Informational [Page 21]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-22" ></span>
<span class="grey"><a href="./rfc3881">RFC 3881</a> Security Audit & Access Accountability September 2004</span>
Examples
Network Access Point ID: SMH4WC02
Network Access Point Type: 1 = Machine Name
Network Access Point ID: 192.0.2.2
Network Access Point Type: 2 = IP address
Network Access Point ID: 610-555-1212
Network Access Point Type: 3 = Phone Number
<span class="h3"><a class="selflink" id="section-5.4" href="#section-5.4">5.4</a>. Audit Source Identification</span>
The following data are required primarily for application systems and
processes. Since multi-tier, distributed, or composite applications
make source identification ambiguous, this collection of fields may
repeat for each application or process actively involved in the
event. For example, multiple value-sets can identify participating
web servers, application processes, and database server threads in an
n-tier distributed application. Passive event participants, e.g.,
low-level network transports, need not be identified.
Depending on implementation strategies, it is possible that the
components in a multi-tier, distributed, or composite applications
may generate more than one audit message for a single application
event. Various data in the audit message may be used to identify
such cases, supporting subsequent data reduction. This document
anticipates that the repository and reporting mechanisms will perform
data reduction when required, but does not specify those mechanism.
<span class="h4"><a class="selflink" id="section-5.4.1" href="#section-5.4.1">5.4.1</a>. Audit Enterprise Site ID</span>
Description
Logical source location within the healthcare enterprise network,
e.g., a hospital or other provider location within a multi-entity
provider group.
Optionality: Optional
Format / Values
Unique identifier text string within the healthcare enterprise.
May be unvalued when the audit-generating application is uniquely
identified by Audit Source ID.
<span class="grey">Marshall Informational [Page 22]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-23" ></span>
<span class="grey"><a href="./rfc3881">RFC 3881</a> Security Audit & Access Accountability September 2004</span>
Rationale
This value differentiates among the sites in a multi-site
enterprise health information system.
Notes
This is defined by the application that generates the audit
record. It contains a unique code that identifies a business
organization (owner of data) that is known to the enterprise. The
value further qualifies and disambiguates the Audit Source ID.
Values may vary depending on type of business. There may be
levels of differentiation within the organization.
<span class="h4"><a class="selflink" id="section-5.4.2" href="#section-5.4.2">5.4.2</a>. Audit Source ID</span>
Description
Identifier of the source where the event originated.
Optionality: Required
Format / Values
Unique identifier text string, at least within the Audit
Enterprise Site ID
Rationale
This field ties the event to a specific source system. It may be
used to group events for analysis according to where the event
occurred.
Notes
In some configurations, a load-balancing function distributes work
among two or more duplicate servers. The values defined for this
field thus may be considered as an source identifier for a group
of servers rather than a specific source system.
<span class="h4"><a class="selflink" id="section-5.4.3" href="#section-5.4.3">5.4.3</a>. Audit Source Type Code</span>
Description
Code specifying the type of source where event originated.
Optionality: Optional
<span class="grey">Marshall Informational [Page 23]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-24" ></span>
<span class="grey"><a href="./rfc3881">RFC 3881</a> Security Audit & Access Accountability September 2004</span>
Format / Values
Coded-value enumeration, optionally defined by system implementers
or a as a reference to a standard vocabulary. Unless defined or
referenced, the default values for the "code" attribute are:
Value Meaning
----- ------------------------------------------------------
1 End-user interface
2 Data acquisition device or instrument
3 Web server process tier in a multi-tier system
4 Application server process tier in a multi-tier system
5 Database server process tier in a multi-tier system
6 Security server, e.g., a domain controller
7 ISO level 1-3 network component
8 ISO level 4-6 operating software
9 External source, other or unknown type
For implementation defined codes or references to standards, the
XML schema defines these optional attributes:
Attribute Value
-------------- --------------------------------------------
CodeSystem OID reference
CodeSystemName Name of the coding system; strongly recommended
to be valued for locally-defined code-sets.
DisplayName The value to be used in displays and reports
OriginalText Input value that was translated to the code
Since audit sources may be categorized in more than one way, there
may be multiple values specified.
Rationale
This field indicates which type of source is identified by the
Audit Source ID. It is an optional value that may be used to
group events for analysis according to the type of source where
the event occurred.
<span class="h3"><a class="selflink" id="section-5.5" href="#section-5.5">5.5</a>. Participant Object Identification</span>
The following data assist the auditing process by indicating specific
instances of data or objects that have been accessed.
These data are required unless the values for Event Identification,
Active Participant Identification, and Audit Source Identification
are sufficient to document the entire auditable event. Production of
<span class="grey">Marshall Informational [Page 24]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-25" ></span>
<span class="grey"><a href="./rfc3881">RFC 3881</a> Security Audit & Access Accountability September 2004</span>
audit records containing these data may be enabled or suppressed, as
determined by healthcare organization policy and regulatory
requirements.
Because events may have more than one participant object, this group
can be a repeating set of values. For example, depending on
institutional policies and implementation choices:
- Two participant object value-sets can be used to identify access
to patient data by medical record number plus the specific health
care encounter or episode for the patient.
- A patient participant and his authorized representative may be
identified concurrently.
- An attending physician and consulting referrals may be identified
concurrently.
- All patients identified on a worklist may be identified.
- For radiological studies, a set of related participant objects
identified by accession number or study number, may be identified.
Note, though, that each audit message documents only a single usage
instance of such participant object relationships and does not serve
to document all relationships that may be present or possible.
<span class="h4"><a class="selflink" id="section-5.5.1" href="#section-5.5.1">5.5.1</a>. Participant Object Type Code</span>
Description
Code for the participant object type being audited. This value is
distinct from the user's role or any user relationship to the
participant object.
Optionality: Optional
Format / Values
Enumeration:
Value Meaning
----- -------------
1 Person
2 System Object
3 Organization
4 Other
<span class="grey">Marshall Informational [Page 25]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-26" ></span>
<span class="grey"><a href="./rfc3881">RFC 3881</a> Security Audit & Access Accountability September 2004</span>
Rationale
To describe the object being acted upon. In addition to queries
on the subject of the action in an auditable event, it is also
important to be able to query on the object type for the action.
<span class="h4"><a class="selflink" id="section-5.5.2" href="#section-5.5.2">5.5.2</a>. Participant Object Type Code Role</span>
Description
Code representing the functional application role of Participant
Object being audited
Optionality: Optional
Format / Values
Enumeration, specific to Participant Object Type Code:
Value Meaning Participant Object Type Codes
----- -------------------- ----------------------------------
1 Patient 1 - Person
2 Location 3 - Organization
3 Report 2 - System Object
4 Resource 1 - Person
3 - Organization
5 Master file 2 - System Object
6 User 1 - Person
2 - System Object (non-human user)
7 List 2 - System Object
8 Doctor 1 - Person
9 Subscriber 3 - Organization
10 Guarantor 1 - Person
3 - Organization
11 Security User Entity 1 - Person
2 - System Object
12 Security User Group 2 - System Object
13 Security Resource 2 - System Object
14 Security Granularity 2 - System Object
Definition
15 Provider 1 - Person
3 - Organization
16 Data Destination 2 - System Object
17 Data Repository 2 - System Object
18 Schedule 2 - System Object
19 Customer 3 - Organization
20 Job 2 - System Object
21 Job Stream 2 - System Object
<span class="grey">Marshall Informational [Page 26]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-27" ></span>
<span class="grey"><a href="./rfc3881">RFC 3881</a> Security Audit & Access Accountability September 2004</span>
22 Table 2 - System Object
23 Routing Criteria 2 - System Object
24 Query 2 - System Object
A "Security Resource" is an abstract securable object, e.g., a
screen, interface, document, program, etc. -- or even an audit
data set or repository.
Rationale
For some detailed audit analysis it may be necessary to indicate a
more granular type of participant, based on the application role
it serves.
<span class="h4"><a class="selflink" id="section-5.5.3" href="#section-5.5.3">5.5.3</a>. Participant Object Data Life Cycle</span>
Description
Identifier for the data life-cycle stage for the participant
object. This can be used to provide an audit trail for data, over
time, as it passes through the system.
Optionality: Optional
Format/Values
Enumeration:
Value Meaning
----- --------------------------------------
1 Origination / Creation
2 Import / Copy from original
3 Amendment
4 Verification
5 Translation
6 Access / Use
7 De-identification
8 Aggregation, summarization, derivation
9 Report
10 Export / Copy to target
11 Disclosure
12 Receipt of disclosure
13 Archiving
14 Logical deletion
15 Permanent erasure / Physical destruction
<span class="grey">Marshall Informational [Page 27]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-28" ></span>
<span class="grey"><a href="./rfc3881">RFC 3881</a> Security Audit & Access Accountability September 2004</span>
Rationale
Institutional policies for privacy and security may optionally
fall under different accountability rules based on data life
cycle. This provides a differentiating value for those cases.
<span class="h4"><a class="selflink" id="section-5.5.4" href="#section-5.5.4">5.5.4</a>. Participant Object ID Type Code</span>
Description
Describes the identifier that is contained in Participant Object
ID.
Optionality: Required
Format / Values
Coded-value enumeration, specific to Participant Object Type Code,
using attribute-name "code". The codes below are the default set.
Value Meaning Participant Object Type Codes
----- ---------------------- -----------------------------
1 Medical Record Number 1 - Person
2 Patient Number 1 - Person
3 Encounter Number 1 - Person
4 Enrollee Number 1 - Person
5 Social Security Number 1 - Person
6 Account Number 1 - Person
3 - Organization
7 Guarantor Number 1 - Person
3 - Organization
8 Report Name 2 - System Object
9 Report Number 2 - System Object
10 Search Criteria 2 - System Object
11 User Identifier 1 - Person
2 - System Object
12 URI 2 - System Object
User Identifier and URI [<a href="./rfc2396" title=""Uniform Resource Identifiers (URI): Generic Syntax"">RFC2396</a>] text strings are intended to be
used for security administration trigger events to identify the
objects being acted-upon.
The codes may be the default set stated above, implementation-
defined, or reference a standard vocabulary enumeration, such as
HL7 version 2.4 table 207 or DICOM defined media types. For
implementation defined codes or references to standards, the XML
schema defines these optional attributes:
<span class="grey">Marshall Informational [Page 28]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-29" ></span>
<span class="grey"><a href="./rfc3881">RFC 3881</a> Security Audit & Access Accountability September 2004</span>
Attribute Value
-------------- --------------------------------------------
CodeSystem OID reference
CodeSystemName Name of the coding system; strongly recommended
to be valued for locally-defined code-sets.
DisplayName The value to be used in displays and reports
OriginalText Input value that was translated to the code
Rationale
Required to distinguish among various identifiers that may
synonymously identify a participant object.
<span class="h4"><a class="selflink" id="section-5.5.5" href="#section-5.5.5">5.5.5</a>. Participant Object Sensitivity</span>
Description
Denotes policy-defined sensitivity for the Participant Object ID
such as VIP, HIV status, mental health status, or similar topics.
Optionality: Optional
Format / Values
Values are institution- and implementation-defined text strings.
<span class="h4"><a class="selflink" id="section-5.5.6" href="#section-5.5.6">5.5.6</a>. Participant Object ID</span>
Description
Identifies a specific instance of the participant object.
Optionality: Required
Format / Values
Text string. Value format depends on Participant Object Type Code
and the Participant Object ID Type Code.
Rationale
This field identifies a specific instance of an object, such as a
patient, to detect/track privacy and security issues.
Notes
Consider this to be the primary unique identifier key for the
object, so it may be a composite data field as implemented.
<span class="grey">Marshall Informational [Page 29]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-30" ></span>
<span class="grey"><a href="./rfc3881">RFC 3881</a> Security Audit & Access Accountability September 2004</span>
<span class="h4"><a class="selflink" id="section-5.5.7" href="#section-5.5.7">5.5.7</a>. Participant Object Name</span>
Description
An instance-specific descriptor of the Participant Object ID
audited, such as a person's name.
Optionality: Optional
Format / Values
Text string
Rationale
This field may be used in a query/report to identify audit events
for a specific person, e.g., where multiple synonymous Participant
Object IDs (patient number, medical record number, encounter
number, etc.) have been used.
<span class="h4"><a class="selflink" id="section-5.5.8" href="#section-5.5.8">5.5.8</a>. Participant Object Query</span>
Description
The actual query for a query-type participant object.
Optionality: Optional
Format / Values
Base 64 encoded data
Rationale
For query events it may be necessary to capture the actual query
input to the query process in order to identify the specific
event. Because of differences among query implementations and
data encoding for them, this is a base 64 encoded data blob. It
may be subsequently decoded or interpreted by downstream audit
analysis processing.
<span class="h4"><a class="selflink" id="section-5.5.9" href="#section-5.5.9">5.5.9</a>. Participant Object Detail</span>
Description
Implementation-defined data about specific details of the object
accessed or used.
<span class="grey">Marshall Informational [Page 30]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-31" ></span>
<span class="grey"><a href="./rfc3881">RFC 3881</a> Security Audit & Access Accountability September 2004</span>
Optionality: Optional
Format
Type-value pair. The "type" attribute is an implementation-
defined text string. The "value" attribute is a base 64 encoded
data.
Rationale
Specific details or values from the object accessed may be desired
in specific auditing implementations. The type-value pair enables
the use of implementation-defined and locally-extensible object
type identifiers and values. For example, a clinical diagnostic
object may contain multiple test results, and this element could
document the type and number and type of results.
Many possible data encodings are possible for this elements, so
the value is a base 64 encoded data blob. It may be subsequently
decoded or interpreted by downstream audit analysis processing.
<span class="h2"><a class="selflink" id="section-6" href="#section-6">6</a>. XML Schema</span>
This section contains the actual XML schema definition for the data
defined in <a href="#section-5">section 5</a>. It also provides brief guidance for specifying
schema localizations for implementation purposes.
The XML schema specified in <a href="#section-6.1">section 6.1</a> conforms with the W3C
Recommendations for XML Schema structure [<a href="#ref-W3CXML-1" title=""XML Schema Part 1: Structures"">W3CXML-1</a>] and data types
[<a href="#ref-W3CXML-2" title=""XML Schema Part 2: Datatypes,"">W3CXML-2</a>].
<span class="h3"><a class="selflink" id="section-6.1" href="#section-6.1">6.1</a>. XML Schema Definition</span>
<xs:schema xmlns:xs="http://www.w3.org/2001/XMLSchema"
elementFormDefault="qualified" attributeFormDefault="unqualified">
<xs:element name="AuditMessage">
<xs:complexType>
<xs:sequence>
<xs:element name="EventIdentification"
type="EventIdentificationType"/>
<xs:element name="ActiveParticipant" maxOccurs="unbounded">
<xs:complexType>
<xs:complexContent>
<xs:extension base="ActiveParticipantType"/>
</xs:complexContent>
</xs:complexType>
</xs:element>
<xs:element name="AuditSourceIdentification"
<span class="grey">Marshall Informational [Page 31]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-32" ></span>
<span class="grey"><a href="./rfc3881">RFC 3881</a> Security Audit & Access Accountability September 2004</span>
type="AuditSourceIdentificationType" maxOccurs="unbounded"/>
<xs:element name="ParticipantObjectIdentification"
type="ParticipantObjectIdentificationType" minOccurs="0"
maxOccurs="unbounded"/>
</xs:sequence>
</xs:complexType>
</xs:element>
<xs:complexType name="EventIdentificationType">
<xs:sequence>
<xs:element name="EventID" type="CodedValueType"/>
<xs:element name="EventTypeCode" type="CodedValueType"
minOccurs="0" maxOccurs="unbounded"/>
</xs:sequence>
<xs:attribute name="EventActionCode" use="optional">
<xs:simpleType>
<xs:restriction base="xs:string">
<xs:enumeration value="C">
<xs:annotation>
<xs:appinfo>Create</xs:appinfo>
</xs:annotation>
</xs:enumeration>
<xs:enumeration value="R">
<xs:annotation>
<xs:appinfo>Read</xs:appinfo>
</xs:annotation>
</xs:enumeration>
<xs:enumeration value="U">
<xs:annotation>
<xs:appinfo>Update</xs:appinfo>
</xs:annotation>
</xs:enumeration>
<xs:enumeration value="D">
<xs:annotation>
<xs:appinfo>Delete</xs:appinfo>
</xs:annotation>
</xs:enumeration>
<xs:enumeration value="E">
<xs:annotation>
<xs:documentation>Execute</xs:documentation>
</xs:annotation>
</xs:enumeration>
</xs:restriction>
</xs:simpleType>
</xs:attribute>
<xs:attribute name="EventDateTime" type="xs:dateTime"
use="required"/>
<xs:attribute name="EventOutcomeIndicator" use="required">
<xs:simpleType>
<span class="grey">Marshall Informational [Page 32]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-33" ></span>
<span class="grey"><a href="./rfc3881">RFC 3881</a> Security Audit & Access Accountability September 2004</span>
<xs:restriction base="xs:integer">
<xs:enumeration value="0">
<xs:annotation>
<xs:appinfo>Success</xs:appinfo>
</xs:annotation>
</xs:enumeration>
<xs:enumeration value="4">
<xs:annotation>
<xs:appinfo>Minor failure</xs:appinfo>
</xs:annotation>
</xs:enumeration>
<xs:enumeration value="8">
<xs:annotation>
<xs:appinfo>Serious failure</xs:appinfo>
</xs:annotation>
</xs:enumeration>
<xs:enumeration value="12">
<xs:annotation>
<xs:appinfo>Major failure; action made unavailable
</xs:appinfo>
</xs:annotation>
</xs:enumeration>
</xs:restriction>
</xs:simpleType>
</xs:attribute>
</xs:complexType>
<xs:complexType name="AuditSourceIdentificationType">
<xs:sequence>
<xs:element name="AuditSourceTypeCode" minOccurs="0"
maxOccurs="unbounded">
<xs:complexType>
<xs:complexContent>
<xs:restriction base="CodedValueType">
<xs:attribute name="code" use="required">
<xs:simpleType>
<xs:restriction base="xs:string">
<xs:enumeration value="1">
<xs:annotation>
<xs:appinfo>End-user display device, diagnostic
display</xs:appinfo>
</xs:annotation>
</xs:enumeration>
<xs:enumeration value="2">
<xs:annotation>
<xs:appinfo>Data acquisition device or
instrument</xs:appinfo>
</xs:annotation>
</xs:enumeration>
<span class="grey">Marshall Informational [Page 33]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-34" ></span>
<span class="grey"><a href="./rfc3881">RFC 3881</a> Security Audit & Access Accountability September 2004</span>
<xs:enumeration value="3">
<xs:annotation>
<xs:appinfo>Web server process</xs:appinfo>
</xs:annotation>
</xs:enumeration>
<xs:enumeration value="4">
<xs:annotation>
<xs:appinfo>Application server process</xs:appinfo>
</xs:annotation>
</xs:enumeration>
<xs:enumeration value="5">
<xs:annotation>
<xs:appinfo>Database server process</xs:appinfo>
</xs:annotation>
</xs:enumeration>
<xs:enumeration value="6">
<xs:annotation>
<xs:appinfo>Security server, e.g., a domain
controller</xs:appinfo>
</xs:annotation>
</xs:enumeration>
<xs:enumeration value="7">
<xs:annotation>
<xs:documentation>ISO level 1-3 network
component</xs:documentation>
</xs:annotation>
</xs:enumeration>
<xs:enumeration value="8">
<xs:annotation>
<xs:appinfo>ISO level 4-6 operating software</xs:appinfo>
</xs:annotation>
</xs:enumeration>
<xs:enumeration value="9">
<xs:annotation>
<xs:appinfo>External source, other or unknown
type</xs:appinfo>
</xs:annotation>
</xs:enumeration>
</xs:restriction>
</xs:simpleType>
</xs:attribute>
</xs:restriction>
</xs:complexContent>
</xs:complexType>
</xs:element>
</xs:sequence>
<xs:attribute name="AuditEnterpriseSiteID" type="xs:string"
use="optional"/>
<span class="grey">Marshall Informational [Page 34]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-35" ></span>
<span class="grey"><a href="./rfc3881">RFC 3881</a> Security Audit & Access Accountability September 2004</span>
<xs:attribute name="AuditSourceID" type="xs:string"
use="required"/>
</xs:complexType>
<xs:complexType name="ActiveParticipantType">
<xs:sequence minOccurs="0">
<xs:element name="RoleIDCode" type="CodedValueType" minOccurs="0"
maxOccurs="unbounded"/>
</xs:sequence>
<xs:attribute name="UserID" type="xs:string" use="required"/>
<xs:attribute name="AlternativeUserID" type="xs:string"
use="optional"/>
<xs:attribute name="UserName" type="xs:string" use="optional"/>
<xs:attribute name="UserIsRequestor" type="xs:boolean"
use="optional" default="true"/>
<xs:attribute name="NetworkAccessPointID" type="xs:string"
use="optional"/>
<xs:attribute name="NetworkAccessPointTypeCode" use="optional">
<xs:simpleType>
<xs:restriction base="xs:unsignedByte">
<xs:enumeration value="1">
<xs:annotation>
<xs:appinfo>Machine Name, including DNS name</xs:appinfo>
</xs:annotation>
</xs:enumeration>
<xs:enumeration value="2">
<xs:annotation>
<xs:appinfo>IP Address</xs:appinfo>
</xs:annotation>
</xs:enumeration>
<xs:enumeration value="3">
<xs:annotation>
<xs:appinfo>Telephone Number</xs:appinfo>
</xs:annotation>
</xs:enumeration>
</xs:restriction>
</xs:simpleType>
</xs:attribute>
</xs:complexType>
<xs:complexType name="ParticipantObjectIdentificationType">
<xs:sequence>
<xs:element name="ParticipantObjectIDTypeCode">
<xs:complexType>
<xs:complexContent>
<xs:restriction base="CodedValueType">
<xs:attribute name="code" use="required">
<xs:simpleType>
<xs:restriction base="xs:string">
<xs:enumeration value="1">
<span class="grey">Marshall Informational [Page 35]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-36" ></span>
<span class="grey"><a href="./rfc3881">RFC 3881</a> Security Audit & Access Accountability September 2004</span>
<xs:annotation>
<xs:appinfo>Medical Record Number</xs:appinfo>
</xs:annotation>
</xs:enumeration>
<xs:enumeration value="2">
<xs:annotation>
<xs:appinfo>Patient Number</xs:appinfo>
</xs:annotation>
</xs:enumeration>
<xs:enumeration value="3">
<xs:annotation>
<xs:appinfo>Encounter Number</xs:appinfo>
</xs:annotation>
</xs:enumeration>
<xs:enumeration value="4">
<xs:annotation>
<xs:appinfo>Enrollee Number</xs:appinfo>
</xs:annotation>
</xs:enumeration>
<xs:enumeration value="5">
<xs:annotation>
<xs:appinfo>Social Security Number</xs:appinfo>
</xs:annotation>
</xs:enumeration>
<xs:enumeration value="6">
<xs:annotation>
<xs:appinfo>Account Number</xs:appinfo>
</xs:annotation>
</xs:enumeration>
<xs:enumeration value="7">
<xs:annotation>
<xs:appinfo>Guarantor Number</xs:appinfo>
</xs:annotation>
</xs:enumeration>
<xs:enumeration value="8">
<xs:annotation>
<xs:appinfo>Report Name</xs:appinfo>
</xs:annotation>
</xs:enumeration>
<xs:enumeration value="9">
<xs:annotation>
<xs:appinfo>Report Number</xs:appinfo>
</xs:annotation>
</xs:enumeration>
<xs:enumeration value="10">
<xs:annotation>
<xs:appinfo>Search Criteria</xs:appinfo>
</xs:annotation>
<span class="grey">Marshall Informational [Page 36]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-37" ></span>
<span class="grey"><a href="./rfc3881">RFC 3881</a> Security Audit & Access Accountability September 2004</span>
</xs:enumeration>
<xs:enumeration value="11">
<xs:annotation>
<xs:appinfo>User Identifier</xs:appinfo>
</xs:annotation>
</xs:enumeration>
<xs:enumeration value="12">
<xs:annotation>
<xs:appinfo>URI</xs:appinfo>
</xs:annotation>
</xs:enumeration>
<xs:enumeration value=""/>
</xs:restriction>
</xs:simpleType>
</xs:attribute>
</xs:restriction>
</xs:complexContent>
</xs:complexType>
</xs:element>
<xs:choice minOccurs="0">
<xs:element name="ParticipantObjectName" type="xs:string"
minOccurs="0"/>
<xs:element name="ParticipantObjectQuery" type="xs:base64Binary"
minOccurs="0"/>
</xs:choice>
<xs:element name="ParticipantObjectDetail"
type="TypeValuePairType" minOccurs="0" maxOccurs="unbounded"/>
</xs:sequence>
<xs:attribute name="ParticipantObjectID" type="xs:string"
use="required"/>
<xs:attribute name="ParticipantObjectTypeCode" use="optional">
<xs:simpleType>
<xs:restriction base="xs:unsignedByte">
<xs:enumeration value="1">
<xs:annotation>
<xs:appinfo>Person</xs:appinfo>
</xs:annotation>
</xs:enumeration>
<xs:enumeration value="2">
<xs:annotation>
<xs:appinfo>System object</xs:appinfo>
</xs:annotation>
</xs:enumeration>
<xs:enumeration value="3">
<xs:annotation>
<xs:appinfo>Organization</xs:appinfo>
</xs:annotation>
</xs:enumeration>
<span class="grey">Marshall Informational [Page 37]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-38" ></span>
<span class="grey"><a href="./rfc3881">RFC 3881</a> Security Audit & Access Accountability September 2004</span>
<xs:enumeration value="4">
<xs:annotation>
<xs:appinfo>Other</xs:appinfo>
</xs:annotation>
</xs:enumeration>
</xs:restriction>
</xs:simpleType>
</xs:attribute>
<xs:attribute name="ParticipantObjectTypeCodeRole" use="optional">
<xs:simpleType>
<xs:restriction base="xs:unsignedByte">
<xs:enumeration value="1">
<xs:annotation>
<xs:appinfo>Patient</xs:appinfo>
</xs:annotation>
</xs:enumeration>
<xs:enumeration value="2">
<xs:annotation>
<xs:appinfo>Location</xs:appinfo>
</xs:annotation>
</xs:enumeration>
<xs:enumeration value="3">
<xs:annotation>
<xs:appinfo> Report</xs:appinfo>
</xs:annotation>
</xs:enumeration>
<xs:enumeration value="4">
<xs:annotation>
<xs:appinfo>Resource</xs:appinfo>
</xs:annotation>
</xs:enumeration>
<xs:enumeration value="5">
<xs:annotation>
<xs:appinfo>Master file</xs:appinfo>
</xs:annotation>
</xs:enumeration>
<xs:enumeration value="6">
<xs:annotation>
<xs:appinfo>User</xs:appinfo>
</xs:annotation>
</xs:enumeration>
<xs:enumeration value="7">
<xs:annotation>
<xs:appinfo>List</xs:appinfo>
</xs:annotation>
</xs:enumeration>
<xs:enumeration value="8">
<xs:annotation>
<span class="grey">Marshall Informational [Page 38]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-39" ></span>
<span class="grey"><a href="./rfc3881">RFC 3881</a> Security Audit & Access Accountability September 2004</span>
<xs:appinfo>Doctor</xs:appinfo>
</xs:annotation>
</xs:enumeration>
<xs:enumeration value="9">
<xs:annotation>
<xs:appinfo>Subscriber</xs:appinfo>
</xs:annotation>
</xs:enumeration>
<xs:enumeration value="10">
<xs:annotation>
<xs:appinfo>Guarantor</xs:appinfo>
</xs:annotation>
</xs:enumeration>
<xs:enumeration value="11">
<xs:annotation>
<xs:appinfo>Security User Entity</xs:appinfo>
</xs:annotation>
</xs:enumeration>
<xs:enumeration value="12">
<xs:annotation>
<xs:appinfo>Security User Group</xs:appinfo>
</xs:annotation>
</xs:enumeration>
<xs:enumeration value="13">
<xs:annotation>
<xs:appinfo>Security Resource</xs:appinfo>
</xs:annotation>
</xs:enumeration>
<xs:enumeration value="14">
<xs:annotation>
<xs:appinfo>Security Granualarity Definition</xs:appinfo>
</xs:annotation>
</xs:enumeration>
<xs:enumeration value="15">
<xs:annotation>
<xs:appinfo>Provider</xs:appinfo>
</xs:annotation>
</xs:enumeration>
<xs:enumeration value="16">
<xs:annotation>
<xs:appinfo>Report Destination</xs:appinfo>
</xs:annotation>
</xs:enumeration>
<xs:enumeration value="17">
<xs:annotation>
<xs:appinfo>Report Library</xs:appinfo>
</xs:annotation>
</xs:enumeration>
<span class="grey">Marshall Informational [Page 39]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-40" ></span>
<span class="grey"><a href="./rfc3881">RFC 3881</a> Security Audit & Access Accountability September 2004</span>
<xs:enumeration value="18">
<xs:annotation>
<xs:appinfo>Schedule</xs:appinfo>
</xs:annotation>
</xs:enumeration>
<xs:enumeration value="19">
<xs:annotation>
<xs:appinfo>Customer</xs:appinfo>
</xs:annotation>
</xs:enumeration>
<xs:enumeration value="20">
<xs:annotation>
<xs:appinfo>Job</xs:appinfo>
</xs:annotation>
</xs:enumeration>
<xs:enumeration value="21">
<xs:annotation>
<xs:appinfo>Job Stream</xs:appinfo>
</xs:annotation>
</xs:enumeration>
<xs:enumeration value="22">
<xs:annotation>
<xs:appinfo>Table</xs:appinfo>
</xs:annotation>
</xs:enumeration>
<xs:enumeration value="23">
<xs:annotation>
<xs:appinfo>Routing Criteria</xs:appinfo>
</xs:annotation>
</xs:enumeration>
<xs:enumeration value="24">
<xs:annotation>
<xs:appinfo>Query</xs:appinfo>
</xs:annotation>
</xs:enumeration>
</xs:restriction>
</xs:simpleType>
</xs:attribute>
<xs:attribute name="ParticipantObjectDataLifeCycle" use="optional">
<xs:simpleType>
<xs:restriction base="xs:unsignedByte">
<xs:enumeration value="1">
<xs:annotation>
<xs:appinfo>Origination / Creation</xs:appinfo>
</xs:annotation>
</xs:enumeration>
<xs:enumeration value="2">
<xs:annotation>
<span class="grey">Marshall Informational [Page 40]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-41" ></span>
<span class="grey"><a href="./rfc3881">RFC 3881</a> Security Audit & Access Accountability September 2004</span>
<xs:appinfo>Import / Copy from original </xs:appinfo>
</xs:annotation>
</xs:enumeration>
<xs:enumeration value="3">
<xs:annotation>
<xs:appinfo>Amendment</xs:appinfo>
</xs:annotation>
</xs:enumeration>
<xs:enumeration value="4">
<xs:annotation>
<xs:appinfo>Verification</xs:appinfo>
</xs:annotation>
</xs:enumeration>
<xs:enumeration value="5">
<xs:annotation>
<xs:appinfo>Translation</xs:appinfo>
</xs:annotation>
</xs:enumeration>
<xs:enumeration value="6">
<xs:annotation>
<xs:appinfo>Access / Use</xs:appinfo>
</xs:annotation>
</xs:enumeration>
<xs:enumeration value="7">
<xs:annotation>
<xs:appinfo>De-identification</xs:appinfo>
</xs:annotation>
</xs:enumeration>
<xs:enumeration value="8">
<xs:annotation>
<xs:appinfo>Aggregation, summarization,
derivation</xs:appinfo>
</xs:annotation>
</xs:enumeration>
<xs:enumeration value="9">
<xs:annotation>
<xs:appinfo>Report</xs:appinfo>
</xs:annotation>
</xs:enumeration>
<xs:enumeration value="10">
<xs:annotation>
<xs:appinfo>Export / Copy to target</xs:appinfo>
</xs:annotation>
</xs:enumeration>
<xs:enumeration value="11">
<xs:annotation>
<xs:appinfo>Disclosure</xs:appinfo>
</xs:annotation>
<span class="grey">Marshall Informational [Page 41]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-42" ></span>
<span class="grey"><a href="./rfc3881">RFC 3881</a> Security Audit & Access Accountability September 2004</span>
</xs:enumeration>
<xs:enumeration value="12">
<xs:annotation>
<xs:appinfo>Receipt of disclosure</xs:appinfo>
</xs:annotation>
</xs:enumeration>
<xs:enumeration value="13">
<xs:annotation>
<xs:appinfo>Archiving</xs:appinfo>
</xs:annotation>
</xs:enumeration>
<xs:enumeration value="14">
<xs:annotation>
<xs:appinfo>Logical deletion</xs:appinfo>
</xs:annotation>
</xs:enumeration>
<xs:enumeration value="15">
<xs:annotation>
<xs:appinfo>Permanent erasure / Physical destruction
</xs:appinfo>
</xs:annotation>
</xs:enumeration>
</xs:restriction>
</xs:simpleType>
</xs:attribute>
<xs:attribute name="ParticipantObjectSensitivity" type="xs:string"
use="optional"/>
</xs:complexType>
<xs:complexType name="CodedValueType">
<xs:attribute name="code" type="xs:string" use="required"/>
<xs:attributeGroup ref="CodeSystem"/>
<xs:attribute name="displayName" type="xs:string" use="optional"/>
<xs:attribute name="originalText" type="xs:string" use="optional"/>
</xs:complexType>
<xs:complexType name="TypeValuePairType">
<xs:attribute name="type" type="xs:string" use="required"/>
<xs:attribute name="value" type="xs:base64Binary" use="required"/>
</xs:complexType>
<xs:attributeGroup name="CodeSystem">
<xs:attribute name="codeSystem" type="OID" use="optional"/>
<xs:attribute name="codeSystemName" type="xs:string"
use="optional"/>
</xs:attributeGroup>
<xs:simpleType name="OID">
<xs:restriction base="xs:string">
<xs:whiteSpace value="collapse"/>
</xs:restriction>
</xs:simpleType>
<span class="grey">Marshall Informational [Page 42]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-43" ></span>
<span class="grey"><a href="./rfc3881">RFC 3881</a> Security Audit & Access Accountability September 2004</span>
</xs:schema>
<span class="h3"><a class="selflink" id="section-6.2" href="#section-6.2">6.2</a>. XML Schema Localization</span>
The schema specified in <a href="#section-6.1">section 6.1</a> may be extended and restricted to
meet local implementation-specific requirements. W3C Recommendation
for XML Schema structure [<a href="#ref-W3CXML-1" title=""XML Schema Part 1: Structures"">W3CXML-1</a>], section 4, is the governing
standard for accomplishing this.
As of the current version of this document, a public reference URI
for the base schema has not been established.
Local definitions reference the common audit message base schema.
For example, here is a schema with a local vocabulary restriction for
"Audit Enterprise Site ID" plus an extension adding a new "Audit
Source Asset Number" element.
The URI used to identify this schema (<a href="http://audit-message-uri">http://audit-message-uri</a>) is a
syntactically valid example that does not represent an actual schema.
Schema validators might report an error when attempting to import a
schema using this URI.
<xs:schema xmlns:audit="http://audit-message-URI"
xmlns:xs="http://www.w3.org/2001/XMLSchema"
elementFormDefault="qualified" attributeFormDefault="unqualified">
<xs:import schemaLocation="http://audit-message-URI"/>
<xs:complexType name="LocaAuditSourceIdentificationType">
<xs:complexContent>
<xs:restriction base="AuditSourceIdentificationType">
<xs:attribute name="AuditEnterpriseSiteID" use="required">
<xs:simpleType>
<xs:restriction base="xs:string">
<xs:enumeration value="Main"/>
<xs:enumeration value="Clinic1"/>
<xs:enumeration value="Clinic2"/>
<xs:enumeration value="Radiology"/>
<xs:enumeration value="Lab"/>
</xs:restriction>
</xs:simpleType>
</xs:attribute>
</xs:restriction>
</xs:complexContent>
</xs:complexType>
<xs:element name="LocalAuditSourceIdentification">
<xs:complexType>
<xs:complexContent>
<xs:extension base="LocaAuditSourceIdentificationType">
<xs:attribute name="AuditSourceAssetNumber" type="xs:string"
<span class="grey">Marshall Informational [Page 43]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-44" ></span>
<span class="grey"><a href="./rfc3881">RFC 3881</a> Security Audit & Access Accountability September 2004</span>
use="required"/>
</xs:extension>
</xs:complexContent>
</xs:complexType>
</xs:element>
</xs:schema>
<span class="h2"><a class="selflink" id="section-7" href="#section-7">7</a>. Security Considerations</span>
Audit data must be secured at least to the same extent as the
underlying data and activities being audited. This includes access
controls as well as data integrity and recovery functions. This
document acknowledges the need for, but does not specify, the
policies and technical methods to accomplish this.
It is conceivable that audit data might have unintended uses, e.g.,
tracking the frequency and nature of system use for productivity
measures. ASTM standard E2147-01 [<a href="#ref-E2147" title=""E2147-01 Standard Specification for Audit and Disclosure Logs for Use in Health Information Systems"">E2147</a>] states, in paragraph
5.3.10, "Prohibit use for other reasons than to enforce security and
to detect security breaches in record health information systems, for
example, the audits are not to be used to explore activity profiles
or movement profiles of employees."
Some audit data arises from security-relevant processes other than
data access. These are the trigger events listed in <a href="#section-4.1">section 4.1</a> and
4.2 of this document. Audit data, defined in this document, can
record the accountabilities for the results of these processes, as
part of a complete security implementation. A discussion of the
associated authorities, reference standards, and implementation
technology choices for the processes is outside the scope of this
document.
<span class="h2"><a class="selflink" id="section-8" href="#section-8">8</a>. References</span>
<span class="h3"><a class="selflink" id="section-8.1" href="#section-8.1">8.1</a>. Normative References</span>
[<a id="ref-E2147">E2147</a>] "E2147-01 Standard Specification for Audit and
Disclosure Logs for Use in Health Information Systems",
ASTM International, June 2002.
[<a id="ref-ISO15408-2">ISO15408-2</a>] "ISO/IEC 15408:1999 Common Criteria for Information
Technology Security Evaluation, Part 2: Security
Functional Requirements", ISO, August 1999.
[<a id="ref-ISO8601">ISO8601</a>] "ISO 8601:2000 Data elements and interchange formats --
Information interchange -- Representation of dates and
times", ISO, December 2000.
<span class="grey">Marshall Informational [Page 44]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-45" ></span>
<span class="grey"><a href="./rfc3881">RFC 3881</a> Security Audit & Access Accountability September 2004</span>
[<a id="ref-RFC1305">RFC1305</a>] Mills, D., "Network Time Protocol (Version 3)
Specification, Implementation", <a href="./rfc1305">RFC 1305</a>, March 1992.
[<a id="ref-RFC2396">RFC2396</a>] Berners-Lee, T., Fielding, R. and L. Masinter, "Uniform
Resource Identifiers (URI): Generic Syntax", <a href="./rfc2396">RFC 2396</a>,
August 1998.
[<a id="ref-W3CXML-1">W3CXML-1</a>] W3C Recommendation "XML Schema Part 1: Structures",
version 1.0, May 2001.
[<a id="ref-W3CXML-2">W3CXML-2</a>] W3C Recommendation "XML Schema Part 2: Datatypes,"
version 1.0, May 2001.
<span class="h3"><a class="selflink" id="section-8.2" href="#section-8.2">8.2</a>. Informative References</span>
[<a id="ref-HL7SASIG">HL7SASIG</a>] Marshall, G. and G. Dickinson, "Common Audit Message",
HL7 Security and Accountability Special Interest Group,
November 2001.
[<a id="ref-IHETF-3">IHETF-3</a>] "IHE Technical Framework", Volume III, HIMMS/RSNA, April
2002.
[<a id="ref-NEMASPC">NEMASPC</a>] "Security and Privacy Auditing in Health Care
Information Technology", Joint NEMA/COCIR/JIRA Security
and Privacy Committee, 26 June 2001.
Acknowledgments
The author gratefully acknowledges the advice and assistance of the
following people during the preparation of this document:
Carmela Couderc, Siemens Medical Solutions
Michael Davis, SAIC
Gary Dickinson
Christoph Dickmann, Siemens Medical Solutions
Daniel Hannum, Siemens Medical Solutions
Robert Horn, Agfa
James McAvoy, Siemens Medical Solutions
John Moehrke, General Electric Medical Systems
Jennifer Puyenbroek, McKesson Information Solutions
Angela Ray, McKesson Information Solutions
Lawrence Tarbox, Siemens Corporate Research
<span class="grey">Marshall Informational [Page 45]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-46" ></span>
<span class="grey"><a href="./rfc3881">RFC 3881</a> Security Audit & Access Accountability September 2004</span>
Author's Address
Glen Marshall
Siemens Medical Solutions Health Services
51 Valley Stream Parkway
Malvern, PA 19312
USA
Phone: (610) 219-3938
EMail: glen.f.marshall@siemens.com
<span class="grey">Marshall Informational [Page 46]</span></pre>
<hr class='noprint'/><!--NewPage--><pre class='newpage'><span id="page-47" ></span>
<span class="grey"><a href="./rfc3881">RFC 3881</a> Security Audit & Access Accountability September 2004</span>
Full Copyright Statement
Copyright (C) The Internet Society (2004).
This document is subject to the rights, licenses and restrictions
contained in <a href="https://www.rfc-editor.org/bcp/bcp78">BCP 78</a>, and at www.rfc-editor.org, and except as set
forth therein, the authors retain all their rights.
This document and the information contained herein are provided on an
"AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/S HE
REPRESENTS OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE
INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR
IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF
THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
Intellectual Property
The IETF takes no position regarding the validity or scope of any
Intellectual Property Rights or other rights that might be claimed to
pertain to the implementation or use of the technology described in
this document or the extent to which any license under such rights
might or might not be available; nor does it represent that it has
made any independent effort to identify any such rights. Information
on the ISOC's procedures with respect to rights in ISOC Documents can
be found in <a href="https://www.rfc-editor.org/bcp/bcp78">BCP 78</a> and <a href="https://www.rfc-editor.org/bcp/bcp79">BCP 79</a>.
Copies of IPR disclosures made to the IETF Secretariat and any
assurances of licenses to be made available, or the result of an
attempt made to obtain a general license or permission for the use of
such proprietary rights by implementers or users of this
specification can be obtained from the IETF on-line IPR repository at
<a href="http://www.ietf.org/ipr">http://www.ietf.org/ipr</a>.
The IETF invites any interested party to bring to its attention any
copyrights, patents or patent applications, or other proprietary
rights that may cover technology that may be required to implement
this standard. Please address the information to the IETF at ietf-
ipr@ietf.org.
Acknowledgement
Funding for the RFC Editor function is currently provided by the
Internet Society.
Marshall Informational [Page 47]
</pre>
|