Health Informatics - Dynamic on-demand virtual private network for health information infrastructure

ISO/TR 11636:2009 explains the network requirements in the healthcare field, the network security of an open network for the healthcare field, and the minimum guidelines for security management of health information exchange, including personal data, between external institutions. These requirements will assist in understanding the operation of security and evaluation of security issues in the healthcare field, and the usefulness of a managed VPN, like a dynamic on-demand VPN. ISO/TR 11636:2009 introduces examples of security measures taken in a dynamic on-demand VPN for exchange of medical information; it is not intended to specify the dynamic on-demand VPN itself. These examples provide network solutions to potential risks in such a user environment.

Informatique de santé — Réseau privé, virtuel, dynamique, sur demande pour infrastructure d'information de santé

General Information

Status
Published
Publication Date
26-Nov-2009
Current Stage
6060 - International Standard published
Start Date
27-Nov-2009
Completion Date
13-Dec-2025

Overview

ISO/TR 11636:2009 - Health Informatics - provides guidance on using a dynamic on‑demand virtual private network (VPN) to support secure health information infrastructure. Published as a Technical Report by ISO/TC 215, it explains network requirements for healthcare, security considerations for using open networks (for example, the Internet), and minimum guidelines for security management when exchanging health and personal data between independent institutions. The report is informative (not a product specification) and includes threat analysis, practical models and example security measures for dynamic on‑demand VPN deployments.

Key Topics

  • Network requirements for healthcare: patterns of expected services (e.g., teleradiology, telepathology, online claims, remote maintenance) and the access/control needs these services impose.
  • VPN technologies and tradeoffs: discussion of IPsec + IKE versus SSL/TLS for secure channels, and where each fits in healthcare applications.
  • Security zones and definitions: terms such as DMZ (demilitarized zone), HSZ (high security zone), and SZ (security zone) to structure network segmentation.
  • Threat analysis and countermeasures: anticipated risks for health information exchange and example mitigation strategies.
  • Operational guidance: minimum security management guidelines, technical and operational checklists for evaluating network security.
  • Case studies and deployment models: examples of regional cooperation portals, online maintenance, teleradiology/telepathology use-cases, and university–regional hospital models.
  • Managed dynamic on‑demand VPN: benefits of a managed service that automates connection parameters and reduces configuration burden on healthcare IT staff.

Applications

ISO/TR 11636:2009 is practical for organizations implementing or evaluating secure healthcare networks:

  • Hospitals and clinics planning secure exchange of patient records and remote diagnostics (teleradiology, telepathology).
  • Regional health networks and portals coordinating multi‑institution collaboration.
  • Medical device vendors and service providers offering remote maintenance or device telemetry.
  • Telecommunication carriers and online service providers (OSPs) designing managed VPN services for healthcare customers.
  • Health IT and security teams using the checklists and threat analyses for risk assessment, procurement, and operational policies.

Using a dynamic on‑demand VPN can lower costs and operational complexity while enabling secure N‑to‑N connectivity across diverse healthcare partners.

Related standards

This Technical Report complements work by ISO technical committee ISO/TC 215 (Health informatics) and should be used alongside local legal and regulatory requirements for patient privacy and data protection when designing health information infrastructures.

Technical report

ISO/TR 11636:2009 - Health Informatics -- Dynamic on-demand virtual private network for health information infrastructure

English language
70 pages
sale 15% off
Preview
sale 15% off
Preview

Frequently Asked Questions

ISO/TR 11636:2009 is a technical report published by the International Organization for Standardization (ISO). Its full title is "Health Informatics - Dynamic on-demand virtual private network for health information infrastructure". This standard covers: ISO/TR 11636:2009 explains the network requirements in the healthcare field, the network security of an open network for the healthcare field, and the minimum guidelines for security management of health information exchange, including personal data, between external institutions. These requirements will assist in understanding the operation of security and evaluation of security issues in the healthcare field, and the usefulness of a managed VPN, like a dynamic on-demand VPN. ISO/TR 11636:2009 introduces examples of security measures taken in a dynamic on-demand VPN for exchange of medical information; it is not intended to specify the dynamic on-demand VPN itself. These examples provide network solutions to potential risks in such a user environment.

ISO/TR 11636:2009 explains the network requirements in the healthcare field, the network security of an open network for the healthcare field, and the minimum guidelines for security management of health information exchange, including personal data, between external institutions. These requirements will assist in understanding the operation of security and evaluation of security issues in the healthcare field, and the usefulness of a managed VPN, like a dynamic on-demand VPN. ISO/TR 11636:2009 introduces examples of security measures taken in a dynamic on-demand VPN for exchange of medical information; it is not intended to specify the dynamic on-demand VPN itself. These examples provide network solutions to potential risks in such a user environment.

ISO/TR 11636:2009 is classified under the following ICS (International Classification for Standards) categories: 35.240.80 - IT applications in health care technology. The ICS classification helps identify the subject area and facilitates finding related standards.

You can purchase ISO/TR 11636:2009 directly from iTeh Standards. The document is available in PDF format and is delivered instantly after payment. Add the standard to your cart and complete the secure checkout process. iTeh Standards is an authorized distributor of ISO standards.

Standards Content (Sample)


TECHNICAL ISO/TR
REPORT 11636
First edition
2009-12-01
Health Informatics — Dynamic
on-demand virtual private network for
health information infrastructure
Informatique de santé — Réseau privé, virtuel, dymanique, sur
demande pour infrastructure d'information de santé

Reference number
©
ISO 2009
PDF disclaimer
This PDF file may contain embedded typefaces. In accordance with Adobe's licensing policy, this file may be printed or viewed but
shall not be edited unless the typefaces which are embedded are licensed to and installed on the computer performing the editing. In
downloading this file, parties accept therein the responsibility of not infringing Adobe's licensing policy. The ISO Central Secretariat
accepts no liability in this area.
Adobe is a trademark of Adobe Systems Incorporated.
Details of the software products used to create this PDF file can be found in the General Info relative to the file; the PDF-creation
parameters were optimized for printing. Every care has been taken to ensure that the file is suitable for use by ISO member bodies. In
the unlikely event that a problem relating to it is found, please inform the Central Secretariat at the address given below.

©  ISO 2009
All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized in any form or by any means,
electronic or mechanical, including photocopying and microfilm, without permission in writing from either ISO at the address below or
ISO's member body in the country of the requester.
ISO copyright office
Case postale 56 • CH-1211 Geneva 20
Tel. + 41 22 749 01 11
Fax + 41 22 749 09 47
E-mail copyright@iso.org
Web www.iso.org
Published in Switzerland
ii © ISO 2009 – All rights reserved

Contents Page
Foreword .iv
Introduction.v
1 Scope.1
2 Terms and definitions .1
3 Abbreviated terms .3
4 Network features in the healthcare field .4
4.1 Pattern of current or expected information services in the healthcare field .4
4.2 Category of healthcare information to be protected (information assets).5
4.3 Network requirements in the healthcare field .6
5 Concept of network construction in the healthcare field.6
5.1 Overview.6
5.2 Responsibility to manage security of healthcare information exchange including personal
information between independent institutions .7
5.3 Security concepts in network systems for medical institutions .8
6 Threat analysis and measures .9
7 Network construction in the healthcare field .10
7.1 Minimum guidelines for security management of healthcare information exchange
including personal information between external institutions.10
7.2 Technical and operational checklists for evaluation of network security.11
7.3 Application of an on-demand VPN .11
8 Cases of security measures in a dynamic on-demand VPN for exchange of healthcare
information with external institutions .12
8.1 Introduction.12
8.2 Regional healthcare cooperation model with a healthcare portal.12
8.3 Online maintenance model.13
8.4 Regional cooperation model with the lead taken by a regional core hospital.14
8.5 Model for teleradiology, remote maintenance and network conferencing with the
cooperation of university hospitals, research institutions and regional hospitals .15
8.6 University hospital model centred around teleradiology, telepathology and network
conferences conducted between a university hospital and regional hospitals .16
Annex A (informative) Threat analysis and measures .18
Annex B (informative) Security management of medical information exchange including personal
data between independent institutions (see reference [6]) .25
Annex C (informative) Technical and operational checklists for the guideline.35
Annex D (informative) Technology used: Dynamic on-demand VPN.62
Bibliography.70

Foreword
ISO (the International Organization for Standardization) is a worldwide federation of national standards bodies
(ISO member bodies). The work of preparing International Standards is normally carried out through ISO
technical committees. Each member body interested in a subject for which a technical committee has been
established has the right to be represented on that committee. International organizations, governmental and
non-governmental, in liaison with ISO, also take part in the work. ISO collaborates closely with the
International Electrotechnical Commission (IEC) on all matters of electrotechnical standardization.
International Standards are drafted in accordance with the rules given in the ISO/IEC Directives, Part 2.
The main task of technical committees is to prepare International Standards. Draft International Standards
adopted by the technical committees are circulated to the member bodies for voting. Publication as an
International Standard requires approval by at least 75 % of the member bodies casting a vote.
In exceptional circumstances, when a technical committee has collected data of a different kind from that
which is normally published as an International Standard (“state of the art”, for example), it may decide by a
simple majority vote of its participating members to publish a Technical Report. A Technical Report is entirely
informative in nature and does not have to be reviewed until the data it provides are considered to be no
longer valid or useful.
Attention is drawn to the possibility that some of the elements of this document may be the subject of patent
rights. ISO shall not be held responsible for identifying any or all such patent rights.
ISO/TR 11636 was prepared by Technical Committee ISO/TC 215, Health informatics.
iv © ISO 2009 – All rights reserved

Introduction
Currently, healthcare information is normally transferred in the form of paper documents or electronic data
through schemes such as dedicated fixed lines connecting the headquarters and branches within a company,
through public networks such as an Integrated Services Digital Network (ISDN), or through a dedicated
network between specific institutions, enabling a virtual network for the specified users in a dedicated service
network managed by communication providers, such as an Internet Protocol virtual private network (IP-VPN).
Therefore, healthcare information cannot be transferred easily while maintaining security in most cases,
because network configurations adequate to these solutions are limited and the costs are very high.
The uses of various service networks in the healthcare field include online claims for medical fees, online
maintenance of medical devices, and remote medical care, such as teleradiology, telepathology and
healthcare information services for regional healthcare cooperation. To provide such services however, it is
necessary for multiple medical institutions to pass healthcare information to each other. A network in which a
single medical institution is dynamically connected to multiple medical institutions and switched to another
institution is required.
To make such a network available to many medical institutions at low cost, an open network such as the
Internet can be used for connecting with different medical institutions, medical device providers, and patients.
We can use the following VPNs as secure channel systems in an open network:
Internet Protocol Security (IPsec) with Internet key exchange (IKE), described as IPsec + IKE which runs
in the network layer with authentication and exchange of encryption keys, and
Secure Sockets Layer (SSL) protocol, which runs in the session layer with encrypted communication
between a Web browser on a client and SSL servers.
Thus, this is adapted to web applications, but other applications, such as e-mail, File Transfer Protocol (FTP),
and unique client/server systems, cannot be used. On the other hand, the combination of IPsec + IKE can be
used with any application needed by medical institutions to provide secure channels without reconstructing
any application software. In addition, SSL has an inherent risk because it provides no protection methods
against well-known lower-layer attacks, session hijacking, false Address Resolution Protocol (ARP)
statements, and so on.
The conventional VPN using IPsec + IKE however, requires complicated configuration of network devices,
and setting up the system without expertise could result in failure to protect healthcare information. Also, it is a
fixed-type VPN and can only be connected with fixed parties.
Lately, telecommunication carriers and online service providers (OSPs) have been developing systems to
provide services with security on network lines, including setting up network devices to safeguard against
these threats, even for a VPN connected in an open network. When a medical institution uses these types of
service, most of the responsibilities related to managing the communication lines fall to these service
providers (SPs). This reduces the responsibility of the medical institution in terms of its security-related
liabilities, which is well suited for organizations without many IT engineers.
A dynamic on-demand VPN, which this Technical Report describes, is one type of VPN. It is not a fixed
connection like 1-to-1, which is generally used in ordinary VPN services. It can easily change connection to
N-to-N, and the connection parameters are provided automatically by the telecommunication carrier. This
makes it suitable for healthcare network infrastructure, as medical institutes are not required to be responsible
for or have expertise in setting up such networks. Also, utilizing the Internet makes the dynamic on-demand
VPN an inexpensive network and thus readily acceptable to medical institutions in terms of cost.
This Technical Report describes the threats anticipated in a healthcare network, as well as how a dynamic
on-demand VPN is actually applied in the healthcare field.
TECHNICAL REPORT ISO/TR 11636:2009(E)

Health Informatics — Dynamic on-demand virtual private
network for health information infrastructure
1 Scope
This Technical Report explains the network requirements in the healthcare field, the network security of an
open network for the healthcare field, and the minimum guidelines for security management of health
information exchange, including personal data, between external institutions.
These requirements will assist in understanding the operation of security and evaluation of security issues in
the healthcare field, and the usefulness of a managed VPN, like a dynamic on-demand VPN.
This Technical Report introduces examples of security measures taken in a dynamic on-demand VPN for
exchange of medical information; it is not intended to specify the dynamic on-demand VPN itself.
These examples provide network solutions to potential risks in such a user environment.
2 Terms and definitions
For the purposes of this document, the following terms and definitions apply.
2.1
demilitarized zone
DMZ
area of a network in which any data exchange with areas outside is allowed
2.2
high security zone
HSZ
area of a network in which no data is exchanged directly with areas outside, except for the purpose of certain
remote maintenance
2.3
IPsec
standard for cipher communication, a protocol that prevents data tampering and provides confidentiality
functions for each IP packet by using an encryption technique
2.4
internet VPN
VPN created via the Internet
NOTE By using the Internet, connections between remote networks can be managed as connections in a LAN, while
maintaining confidentiality.
2.5
IP-VPN
VPN created via a wide-area IP network owned by a communication carrier
NOTE By using an IP-VPN, connections between remote networks can be managed in the same manner as
connections in a local area network (LAN).
2.6
local area network
LAN
network in which computers, printers and other equipment are connected and data are transferred within one
building
2.7
OSI reference model
model that divides the functions of communication equipment, such as computers, into a layer structure based
on the design policy of Open Systems Interconnection (OSI) established by ISO for network structuring, in
order to facilitate heterogeneous network data transfer
NOTE Communication functions are divided into seven layers, and the standard function module for each layer is
defined.
2.8
provider service
service that exchanges data between a telecommunication carrier and an OSP
2.9
relay service
service that establishes a connection for the sole purpose of exchanging data between a network-connected
device within a medical institute and an outside device
2.10
remote access
connection to a network or computer from outside by using lines such as telephone lines
NOTE Remotely accessing a distant computer enables direct operation of the computer as though it is right in front of
the user.
2.11
social insurance medical fee payment fund
organization that reviews medical fees invoiced by medical institutions and makes appropriate payments
NOTE The reviews are performed by a three-party committee consisting of representatives of medical institute
workers, medical insurers (e.g., health insurance companies), and academic experts. The medical institute submits a
medical bill statement (receipt) and claims a payment for the treatment from the health insurance organization. An
organization such as a social insurance medical fee payment fund reviews the receipt and makes a payment to the
medical institution submitting the invoice.
2.12
SSL
protocol that encrypts and transfers data on the internet being able to encrypt current widely used data, such
as World Wide Web (www) and File Transfer Protocol (FTP) data and securely transmit and receive
privacy-related information and credit card numbers
2.13
security zone
SZ
area of a network in which limited data exchange with areas outside is allowed
2.14
virtual private network
VPN
service in which a public line can be used as if it is a dedicated line
NOTE It is used for connecting different bases of a company's internal network, instead of installing dedicated lines,
in order to reduce cost.
2 © ISO 2009 – All rights reserved

2.15
wide area network
WAN
network in which computers in geographically different locations (e.g., at a headquarters building and multiple
branches) are connected through telephone lines or dedicated lines to transfer data
3 Abbreviated terms
For the purposes of this document, the following abbreviations apply.
AES Advanced Encryption Standard
AH authentication header
ASP application service provider
ESP Encapsulating Security Payload
FTP File Transfer Protocol
HEASNET HEAlthcare information Secure NETwork consortium
HMAC Hash Message Authentication Code
IC integrated circuit
IKE Internet key exchange
IPsec Internet Protocol Security
IP-VPN Internet-Protocol-based virtual private network
ISAKMP Internet Security Association and Key Management Protocol
ISDN Integrated Services Digital Network
IT information technology
LAN local area network
L2TP Layer 2 Tunneling Protocol
NAT network address translation
OSI Open Systems Interconnection
OSP online service provider
OSPF Open Shortest Path First
PKI public key infrastructure
QOS quality of service
RADIUS Remote Authentication Dial In User Service
RFC Request for Comments
SHA Secure Hash Algorithm
SI System Integrator
TLS Transport Layer Security
TOS Type of Service
TTL time to live
WAN wide area network
4 Network features in the healthcare field
4.1 Pattern of current or expected information services in the healthcare field
In the healthcare field, the information services listed below are provided. In a healthcare network, both data
security and security by way of access control must be considered so that these services will not influence
each other. In order to clarify the form of network use for currently available or future information services, the
form of service provision for these services will be defined according to the characteristics of data access.
a) Information provision service
This is a service to provide a particular medical institution with access to patient healthcare information from
another medical institution. It includes the following.
⎯ Local collaboration service (for medical institutions and healthcare-related services, such as welfare
and nursing care).
Patient medical treatment or nursing care records, including medical records, examination data,
medical record summaries, physical check-up data, and care records are provided in a variety of
forms, such as letters of referral and local collaboration databases.
⎯ Medical treatment/nursing care information provision service (for patient enquiry).
A patient's medical treatment and nursing care records are disclosed to the patient according to
certain criteria.
⎯ Medical treatment/nursing care information provision service (for general enquiry).
Information on hospitals, diseases and various medical and nursing care practices are provided for
general enquiry.
b) Internet connection service
This is a service to provide medical institutions with access to information sites on the Internet. It includes the
following.
⎯ Internet connection service (for businesses).
Medical institutions access sites judged safe by institutions related to business clients, via the Internet
according to the medical institutions' security policies, obtaining academic information sites and sites providing
service information, such as that of Japan's Ministry of Health, Labour and Welfare.
c) Storage/relay service
Information is stored in a location within or outside a medical institution and then transferred to another
medical institution in order to exchange the information with the distant institution. This service includes the
following.
⎯ Mail service.
E-mails are stored and relayed by mail servers.
⎯ Online claim for medical fee service.
4 © ISO 2009 – All rights reserved

Online claims for medical fees are electronically received and transferred to other institutions. For example, a
social insurance medical fee payment fund receives and examines a claim and then relays or transmits the
claim to an insurer.
⎯ Examination data delivery service.
Results of clinical examination or image diagnosis are delivered from an examination company. The
examination results are later used for electronic medical charts and the ordering and information processing
department systems in a hospital, so that the data are readily available in these systems, for reference.
d) Information processing service
An external institution that has been entrusted with information processing functions by a medical institution
receives information from the medical institution and processes the information as a proxy. This service
includes the following.
⎯ ASP service.
Services for medical institutions, such as electronic medical charts and online claims for medical fees, are
provided as shared-use services. The healthcare information is externally stored.
⎯ External storage (backup) service.
In the event of faults or disasters, to perform system recovery of electronic medical charts and data from
ordering and information processing department systems in a hospital, backup data are transmitted to and
stored in an external institution.
e) Remote maintenance service
Various maintenance services, such as fault diagnosis of medical devices and fault recovery, are remotely
provided by a subcontracted service company. Only connections with specific medical devices whose services
are subcontracted should be available to the service company.
f) Authentication/audit service
Fundamental authentication and audit services, such as public key infrastructure, digital signatures and time
delivery, are used by medical institutions to access particular information. These services include the following.
⎯ Time stamp service.
Time stamps affixed on digital signatures are issued, and a system clock is adjusted to collect audit
logs.
⎯ Validation authority (VA) service.
The validity of public key certificates issued by a certificate authority (CA) is verified.
The forms of provision of these systems are analysed, and the form of secure connection in the network is
defined.
4.2 Category of healthcare information to be protected (information assets)
External attacks on networks are becoming more and more frequent. To protect healthcare information
against such network threats requires maintaining its confidentiality, integrity and availability. Information to be
protected in the healthcare field includes the following, in accordance with ISO/IEC 27799:2008, 5.4:
⎯ personal healthcare information;
⎯ pseudonymised data derived from personal healthcare information via some methodology for
pseudonymous identification;
⎯ statistical and research data, including anonymised data derived from personal healthcare information by
removing personally identifying data;
⎯ clinical/medical knowledge not related to a specific patient or patients, including clinical decision support
data (e.g., data on adverse drug reactions);
⎯ data on health professionals and staff;
⎯ information related to public health surveillance;
⎯ audit trail data produced by healthcare information systems and containing personal healthcare
information or pseudonymous data derived from personal healthcare information, or data about the
actions of users in regard to personal health information;
⎯ system security data, including access control data and other system-related configuration data, for
healthcare information systems.
Such healthcare information will be used in networks for a variety of healthcare/hygiene services, including
online claims for medical fees for medical treatment, online maintenance of medical devices, remote medical
care such as teleradiology and telepathology, and healthcare information services for regional healthcare
cooperation. Ensuring the security of healthcare information with respect to the privacy of patients' personal
information requires a more secure network.
4.3 Network requirements in the healthcare field
The following are the key features for a network used in the healthcare field:
⎯ patients' sensitive personal information is handled;
⎯ large-volume data such as image data are handled;
⎯ medical institutions exchange information in a local area;
⎯ medical devices, network devices, and users must be authenticated as the number of parties to
communication increases;
⎯ network construction expenses will increase.
In view of these features, the requirements for a network in the healthcare field are as follows:
⎯ secure communication;
⎯ high-speed communication of large-volume data;
⎯ implementation and extension of the network to support N-to-N connection;
⎯ authentication of members (users, organizations and devices);
⎯ cost deduction related to secure network connection.
5 Concept of network construction in the healthcare field
5.1 Overview
A typical situation of healthcare information exchange with external institutions involves networks connecting a
regional core hospital, clinics, pharmacies and examination centres as part of regional healthcare cooperation
efforts, together with online maintenance companies for medical devices. Another situation involves online
claims for medical fees to a medical fee payment fund by using ASP-type services.
6 © ISO 2009 – All rights reserved

If medical institutions use networks to exchange healthcare information with other institutions, the information
must be sent to the intended organization in a secure way that never allows others to have access. This
network security must be guaranteed on the communication path from the sender's device to the recipient's
device. Transmitted data must be protected from threats like wiretapping, tampering, intrusion, spoofing and
interference.
This clause assumes certain situations inherent to healthcare information exchange via networks, focusing on
the network connection methods that are to be used.
5.2 Responsibility to manage security of healthcare information exchange including
personal information between independent institutions
5.2.1 Clear demarcation of responsibility
By contract, the sender and the recipient must agree on demarcation of responsibility for data transmission on
the communication path, such as handling of communications failure and other accidents. Then, they must
decide how to share managerial responsibility among themselves, the OSP and the telecommunication carrier.
They must also clarify the scope of managerial responsibility to be assigned to another organization and
define which organization should take the initiative in dealing with possible service failures.
5.2.2 Precautionary measures taken within a medical institution
The medical institution sending healthcare information has managerial responsibility for the information during
the whole process in which the information is transmitted via networks (provided by the telecommunication
carrier) and then received by the intended recipient in an appropriate manner.
Note here that “managerial responsibility” means responsibility for the information in electronic form; in other
words, it means responsibility for ensuring the authenticity of both the content and the persons referred to. For
example, encryption here means encrypting healthcare information to prevent outsiders from determining
what the information means, even if they have wiretapped the communication path. Digital signatures are
helpful for detecting tampering.
From these viewpoints, medical institutions that are going to transmit information are responsible for suitably
protecting the information and must therefore be aware of the following.
a) Protection against wiretapping
When information is exchanged over networks, it can be stolen by way of, for example, a virtual bypass built
on the communication path or a physical device attached to a network device. Medical institutions should take
proper measures to protect healthcare information even if it is stolen during transmission or an unexpected
information leakage or incorrect transmission occurs. One possible measure is to encrypt the healthcare
information itself. The timing and strength level of the encryption vary depending on the confidentiality level of
the information and the usage of the information system in a medical institution. If healthcare information is
transmitted through networks from medical institutions, it is preferable that the information be encrypted.
b) Protection against tampering
When information is transmitted over networks, the risk of tampering is reduced if it is encrypted. The
information can still, however, be altered intentionally or unintentionally because of a failure on the
communication path or other possible causes. Since information can be transmitted without encryption, the
sender must take precautions against tampering. One tampering detection method is the use of digital
signatures.
c) Protection against spoofing
Since networking is not a face-to-face communication method, medical institutions must ensure that the
recipient medical institution is correct when sending information over networks. Also, medical institutions must
verify the identities of both the medical institution sending the information and the transmitted information itself.
For this purpose, some mutual authentication method should be used to identify the recipient/sender properly
at the start/end point of communication, particularly by using proven authentication systems such as public
key and symmetric-key cryptography. In addition to its application for tampering prevention, the use of digital
signatures for healthcare information is also helpful in identifying the medical institution sending the
information.
5.3 Security concepts in network systems for medical institutions
5.3.1 General
Networks with appropriate costs and operation must be selected according to analysis of information security.
Then, the parties responsible for network security must be defined by contract: the telecommunication carrier,
the medical institution or both. This situation roughly divides into the following two cases:
⎯ a protected network path provided by the telecommunication carrier and an OSP;
⎯ a dubious network path provided by the telecommunication carrier and an OSP.
As stated above, medical institutions planning to exchange healthcare information via networks should select
an appropriate type of network, considering how responsibilities should be shared according to the form of
services that they use. They should also understand the characteristics of their security technologies, identify
allowable risks and, if necessary, explain the risks to their patients in order to demonstrate their accountability.
Among a wide variety of network services, the following sections assume several cases and list some key
points.
5.3.2 Communication via closed networks
A “closed network” here means a dedicated network for business use and is defined as a network not
connected to the Internet. There are three connection forms that offer closed networks: a common carrier
leased line, a public network and a closed IP communication network.
Since these networks are not connected to the Internet, they are basically at lower risk of wiretapping,
spoofing and tampering. The risk of wiretapping by a physical method cannot be eliminated however, and it
might be necessary to encrypt the information to be transmitted.
The different features of the three forms of closed networks are described below.
a) Connection over a telecommunication carrier leased line
While network quality is good, extensibility as a form of network connection is low, and the cost is generally
high. Still, it is worthwhile implementing this line if a large amount of significant information needs to be
constantly transmitted.
b) Connection over a public network
Omitting a mechanism for phone number confirmation can result in connection and information transmission
to a wrong number. As with a telecommunication carrier leased line, this public network system has low
extensibility. The transmission speed is lower than that of currently popular broadband connections. This
system is not suitable for sending large amounts of information and large files such as those containing image
data.
c) Connection over a closed IP communication network
This form of connection can be implemented at lower cost than connection over a telecommunication carrier
leased line. Appropriate selection of the contract type and the category of network service can ensure enough
bandwidth to transmit large amounts of information and large files.
These three forms of communication via closed networks have no risk of intrusion from outsiders, and in that
sense, they are safe. Connection services generally do not, however, offer encryption of the data to be
transmitted. There can be cases where different networks supported by different telecommunication carriers
are interconnected via connection points. When networks are interconnected in this way, the recipient's
8 © ISO 2009 – All rights reserved

address can sometimes be interpreted, or additional data can be added to the sender information to be
transmitted. This might cause accidental information leaks.
For these reasons, even with a closed network, medical institutions should take security measures, such as
encryption of healthcare information to make their data harder to discern and introduction of a tampering
detection system, as described in 5.2.2.
5.3.3 Communication via open networks
Considering the wide spread of the broadband network environment, its applications are likely to expand, for
example, by reducing implementation costs by using open networks or building extensive mechanisms for
regional healthcare cooperation. Since there are various threats on the communication path, such as
wiretapping, tampering, intrusion, spoofing and interference, sufficient security measures must be taken.
Encryption of healthcare information is also necessary.
a) Connection over a protected network path by telecommunication carriers and OSP
Even with an open network connection, the telecommunication carrier and OSP might provide their
services via a protected network path with security measures against threats. Medical institutions that use
such services can transfer most of their responsibility for communication path management to these
businesses by defining demarcation points of responsibility by contract.
b) Connection over a medical institution's own open networks
If medical institutions use their own open networks to exchange personal information and other healthcare
information with other institutions, most of the managerial responsibility falls on the medical institutions
themselves. Hence, they must take full responsibility for implementing such networks, and be aware of their
responsibility for guaranteeing technical safety.
With an open network connection, the necessary level of security on the network path depends on the layer at
which the security is guaranteed, among the seven layers of the OSI hierarchical model. (Refer to Annex C).
For example, when communication is made using the SSL protocol, the communication path is encrypted at
the fifth layer, the Session Layer. While the path may be encrypted appropriately, there is a possible risk of
wiretapping in the course of encryption and an inappropriate path being established, since the negotiations
before starting communications are not encrypted. When IPsec is used, a path is encrypted in a layer below
the second or third layer, the Network Layer, and thus the risk of wiretapping is lower than for communication
encrypted by the SSL protocol. Exchange of an encryption key for the path uses IKE to encrypt the details of
the negotiations (SA parameter of IPsec). This eliminates the risk of wiretapping, and the combination of
IPsec + IKE ensures safety.
Regarding SSL/TLS (a modified version of SSLv3), RFC3552 specifies that TLS depends on a reliable
protocol, such as the Transmission Control Protocol (TCP) or Stream Control Transmission Protocol (SCTP).
SSL using TCP in the Transport Layer does not support applications using the User Datagram Protocol (UDP).
TLS is influenced by attacks on the IP Layer without IPsec. Research has pointed out the possible risk of a
security hole in this approach, such as session hijacking or ARP spoofing at a LAN access point. Cases of
financial damage have been reported, including data pilferage and data tampering in financial applications or
the like.
6 Threat analysis and measures
To satisfy the requirements of networks in the healthcare field according to the concept of implementation, it is
necessary to perform threat analysis and to take corresponding measures technically or by way of operation.
A network for healthcare information, including patients' personal information, is composed of multiple
elements, such as the players, technology and operation of medical institutions and network devices. To
assure the security of the entire network, the safety of each element should be established. It is necessary to
examine the technical and operational specifications related to security and considered by medical institutions
throughout the network before designing the network and defining its requirements.
The security of each element is provided by adhering to definite standards, rules and guidelines so as to
maintain a certain level of security. The details are given in Annex A. Threat models are assumed on the basis
of threats to the network or assets to be protected, in terms of RFCs. Guidelines and reference documents
such as RFCs related to security are referenced to examine various security measures and evaluate their
effectiveness. Currently, the protocol of IPsec + IKE as the basis of a VPN system has been concluded to be
effective as a channel security measure using a combination of available technical elements.
7 Network construction in the healthcare field
7.1 Minimum guidelines for security management of healthcare information exchange
including personal information between external institutions
1)
From the viewpoint of ensuring channel security, the following measures are required against network
threats, including wiretapping, tampering, and spoofing.
a) Protected path
⎯ protection against message insertion and virus injection into the network path;
⎯ protection against wiretapping by crackers who try to steal passwords or message texts on the path
between facilities;
⎯ protection against spoofing such as session hijacking and IP address spoofing.
For example, the use of IPsec + IKE meets the above requirements to ensure network path security.
b) Other party authentication specified by the user at the gateways of the sender and recipient institutions
and in the network devices
Useful measures include
⎯ PKI-based authentication;
⎯ use of a pre-shared key.
c) Prevention of spoofing as an authorized user or device.
d) Use of network devices that are confirmed as secure and proper routing to prevent communication with
different institutions via a VPN device in the institution.
e) Security measures, including encryption of information to be transmitted, taken by both the sender and
the recipient
⎯ use of SSL/TLS;
⎯ use of Secure/Multipurpose Internet Mail Extensions (S/MIME);
⎯ encryption of files;
⎯ use of encryption keys conforming to the e-government recommended cipher list.

1) Details of these guidelines are given in Annex B, 6.10 of Reference [6].
10 © ISO 2009 – All rights reserved

f) Assignment of responsibilities and clarification of demarcation points of responsibility by contracts among
medical institutions, telecommunication carriers, SIs, system operation companies and device
maintenance companies offering remote maintenance services.
g) Avoidance of unnecessary logins if remote maintenance is conducted.
h) Confirmation of the scope of responsibility for threat control and communication line quality, including line
availability, before signing a contract with a telecommunication carrier or OSP.
7.2 Technical and operational checklists for evaluation of network security
Services using a network in the healthcare field include the following: online claims for medical fees, online
maintenance of medical devices, remote medical care, and healthcare information services for regional
healthcare cooperation. From the viewpoint of a particular medical institution, the connecting parties are not
fixed and connections will be switched as required between multiple destinations. In such a case, to ensure
the reliability of the healthcare information handled, SIs and SPs that are compliant with the Guidelines for the
Security Management of the Medical Information System, (Second Version) (refer to Annex B) should be
preferentially selected. The medical institution should select a product by considering both its specifications
and its operating conditions and related costs, so that the nonconforming portion of the product specifications
will be covered by operation for the purpose of satisfying all the specifications described in the guidelines. The
items involved in handling healthcare information as defined in the guidelines and observed by a medical
institution have been exhaustively compiled into checklists (refer to Annex C for details).
These checklists cover all the requirements specified in the guidelines for medical institutions to meet when
they deal with healthcare information. The checklists range from operational requirements to technical and
system requirements. For ease of reference, the checklists classify medical institutions according to their
functions. For medical institutions to observe the guidelines, SIs and SPs must provide services and carry out
their functions in accordance with the guidelines. Therefore, each checklist comprises three different
sub-checklists – for managers of medical institutions, for SIs, and for SPs – with different items to be
examined by different providers of service functions. The medical installation managers, SIs, and SPs should
each evaluate the network security of the medical institution and select products by considering both the
product specifications and the operating conditions and related costs.
7.3 Application of an on-demand VPN
Now, sophisticated medical devices have penetrated into medical institutions, including medium- to
small-sized institutions. Greater diagnostic capability is required as devices become m
...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.

Loading comments...

ISO/TR 11636:2009 is a standard that explains the network requirements, network security, and security management guidelines for health information exchange in the healthcare field. It introduces the concept of a dynamic on-demand virtual private network (VPN) as a solution for secure exchange of medical information. The standard provides examples of security measures that can be implemented in a dynamic on-demand VPN to mitigate potential risks in a healthcare environment. However, it does not specify the VPN itself.

記事のタイトル:ISO/TR 11636:2009 - ヘルスインフォマティクス - 健康情報インフラストラクチャのためのダイナミックオンデマンド仮想プライベートネットワークに関するもの 記事の内容:ISO/TR 11636:2009は、医療分野におけるネットワーク要件、医療分野のオープンネットワークのネットワークセキュリティ、および外部機関間の個人データを含む健康情報交換のセキュリティ管理の最低ガイドラインについて説明しています。これらの要件は、医療分野におけるセキュリティの運用やセキュリティ問題の評価を理解し、ダイナミックオンデマンドVPNなどの管理されたVPNの有用性に役立つでしょう。ISO/TR 11636:2009は、医療情報交換におけるセキュアな情報共有のためのダイナミックオンデマンドVPNにおけるセキュリティ対策の例を紹介していますが、ダイナミックオンデマンドVPN自体を具体化するものではありません。これらの例は、ヘルスケア環境における潜在的なリスクに対するネットワークソリューションを提供します。

ISO/TR 11636:2009 discusses the network requirements, security, and guidelines for health information exchange in the healthcare field. It explains the importance of a managed VPN, such as a dynamic on-demand VPN, and provides examples of security measures. The article does not specifically define the dynamic on-demand VPN, but gives network solutions for potential risks in the healthcare environment.

ISO/TR 11636:2009は、医療分野におけるネットワークの要件、医療分野のオープンネットワークのセキュリティ、外部機関間での個人情報を含む健康情報の交換のセキュリティ管理の最小ガイドラインについて説明しています。これらの要件は、医療分野におけるセキュリティの運用と評価、また動的なオンデマンドVPNなどの管理対象のVPNの有用性の理解に役立ちます。ISO/TR 11636:2009では、医療情報の交換における動的なオンデマンドVPNにおいて採られるセキュリティ対策の例を紹介しており、具体的な動的なオンデマンドVPN自体を定義していません。これらの例は、そのようなユーザー環境における潜在的なリスクに対するネットワークソリューションを提供します。

ISO/TR 11636:2009은 의료 분야에서의 네트워크 요구 사항, 의료 분야를 위한 개방형 네트워크의 네트워크 보안, 외부 기관 간 개인 정보를 포함한 건강 정보 교환의 보안 관리 최소 지침에 대해 설명합니다. 이러한 요구 사항은 의료 분야에서 보안 작업의 운영과 보안 문제의 평가, 그리고 동적 온디맨드 VPN과 같은 관리 대상 VPN의 유용성을 이해하는 데 도움을 줄 것입니다. ISO/TR 11636:2009은 의료 정보 공유를 위한 동적 온디맨드 VPN에서 취해지는 보안 조치 예시를 소개하며, 동적 온디맨드 VPN 자체를 명시적으로 지정하지는 않습니다. 이러한 예시는 해당 사용자 환경에서 잠재적인 위험에 대한 네트워크 솔루션을 제공합니다.

기사 제목: ISO/TR 11636:2009 - 의료 정보 인프라를 위한 동적 온디맨드 가상 사설망에 대한 헬스 인포매틱스 - ISO/TR 11636:2009는 의료 분야에서의 네트워크 요구사항, 의료 분야를 위한 개방형 네트워크의 네트워크 보안, 그리고 외부 기관간의 개인 데이터를 포함한 건강정보 교환에 대한 보안 관리 최소 가이드라인을 설명합니다. 이러한 요구사항은 의료 분야에서의 보안 운영과 보안 문제의 평가를 이해하고, 동적 온디맨드 VPN과 같은 관리되는 VPN의 유용성에 도움을 줄 것입니다. ISO/TR 11636:2009는 의료 정보 교환을 위한 동적 온디맨드 VPN에서 적용된 보안 조치에 대한 예시를 제시하며, 동적 온디맨드 VPN 자체를 명시하기 위한 것이 아닙니다. 이러한 예시는 이러한 사용자 환경에서 잠재적인 위험에 대한 네트워크 솔루션을 제공합니다.