Cookbook for Security Considerations

From IHE Wiki
Jump to navigation Jump to search

As not all IHE profile writers are security experts, this cookbook is intended to provide basic knowledge on conducting a risk assessment and some “tricks of the trade” relevant to Security Considerations section writing. It is not only based on best practice in the field of risk assessment and mitigation but also on the experience of the ITI Technical Committee while compiling the Security Considerations section for new profiles during the year 5 cycle (mainly XCA and RFD).

This cookbook is specifically intended for IHE profile writers. Though it is based on best practice, it is not a complete method for thorough risk assessment of a package product. IHE does not endorse any use of this cookbook outside of the scope of IHE profile editing.

After presenting the basics of risk assessment and risk mitigation, the cookbook explains how to scope Security Considerations for IHE profiles and finally provides guidelines on the effective writing of the Security Considerations section.

The Process

Formal White Paper can be found at http://www.ihe.net/Technical_Framework/upload/IHE_ITI_Whitepaper_Security_Cookbook_2008-11-10.pdf

This breaks down to generally:

  1. Define the Scope of the Profile.
    1. Define existing Security Mitigations
    2. Define the Assets that need to be protected
      1. This is usually the data objects, and network-services exposed
  2. Risk Process
    1. Brainstorm on potential risks (focus on risks to Data-Confidentiality, Data-Integrity, or Data-Availability)
      1. See Figure 2.2.1-2: Generic Scenario Components
    2. Determine for each how bad (Impact) it would be if it did happen
      1. See Figure 2.2.1-3: Guidelines of impact relevance for IHE profiles
    3. Determine each Likelyhood to happen
      1. See Table 2.2.2-3: Example of probability of occurrence
    4. Calculate the Risk Value
      1. See Table 2.2.2-5: Example of matrix for relevant risks identification
    5. Address the highest Risk Values first.
      1. See section 2.2.3.2 Identify mitigations
    6. Each time you put a mitigation in place, you must re-assess as the mitigation may have introduced a new Risk or adjusted the Likelyhood or Impact on other Risks.
      1. See section 2.2.3.3 Evaluate mitigations
  3. Write the Security Considerations section
    1. Volume 1: Security Considerations section is for risks and mitigations that are profile-wide
    2. Volume 2+: Security Considerations sections are for risks and mitigations that are transaction or content specific.


Do NOT use this tool :-)

Resources

Formal White Paper can be found at http://www.ihe.net/Technical_Framework/upload/IHE_ITI_Whitepaper_Security_Cookbook_2008-11-10.pdf

Examples of Risk Assessment Spreadsheets