On Sun, 2004-03-07 at 12:09, Thomas Clark wrote: > Hi All, > > If one resorts to hardware to support security be sure to post guards. > WWII proved than > reliance upon hardware devices to provide adequate security is misplaced.
One should never rely entirely on any single security mechanism - be it hardware, software or wetware (human behaviour). I think you are probably referring to the German Enigma encryption machines. The encryption was only broken because of operator error in re-using the same keys, or in using standard opening phrases in the messages. Had these human errors not been made, then the people at Bletchley Park would never have broken Enigma, despite their very clever use of electronic mechanical computers (and later thermionic valve computers) to attach the ciphers. The Enigma hardware itself was not flawed. > No > security or inadequate > security mechanisms are invitations. I think that is an important observation - attackers will chose the easiest path, thus it is important to close easy and obvious problems (such as client-side browser caching) if at all possible. Tim C > A single breach will likely destroy > confidence. The > ability to re-configure and re-deploy is essential. > > Regards! > > -Thomas Clark > > > Tim Churches wrote: > > >On Sun, 2004-03-07 at 10:18, Tim Cook wrote: > > > > > >>On Sat, 2004-03-06 at 14:17, Tim Churches wrote: > >> > >> > >>>In general, caches should be > >>>held on encrypted filesystems, either on-disc or in-memory, with the > >>>keys (or a key to the keys) to the encryption/decryption managed by a > >>>daemon which purges the keys from memory when asked (eg locking the > >>>device) or automatically after a short period of disuse. > >>> > >>> > >>Well, now that would certainly be a secure way to handle caching. If I > >>were worrying about national secrets. > >> > >> > > > >Personal health information is more important than national secrets to > >the individuals concerned. Furthermore, it only takes the compromise of > >a handful of individuals' confidential information, and publication of > >this fact, before public confidence in your EHR evaporates. So I don't > >think that is overkill. Note, however, the use of the subjunctive > >"should". That's the way it ought to be done, and it is technically > >achievable. Unfortunately, browser and OS vendors/writers don't chose to > >do that by default. But certainly it can be done - on Linux systems, it > >is quite easy to set up encrypted filesystems and to store the browser > >cache on these. Likewise on Windows - individual directories can be > >encrypted (although there are distinct flaws in the way the encryption > >keys are handled in Windows - still, better than not encrypted). > > > > > > > >>Do you go to this extreme now (as a manager) when doing your risk > >>assessments? I am wondering what the total (additional) costs of system > >>design and hardware resources is when these facilities are implemented. > >> > >> > > > >Risk assessment: client workstations are often shared between users and > >located in insecure locations, laptops are stolen or lost all the time. > >Thus confidential information which is captured in a cache on these > >systems needs to be secured. Note that if the EHR user is, say, a > >physician, then there may be details of hundreds of patients in their > >workstation/laptop cache. > > > >Does this represent a challenge to applications,especially Web browser > >applications? Yup. > > > >Are technical solutions possible? Yup - see above. > > > >Is all of this costly? Well, my view is that additional hardware > >security devices are probably unnecessary (and almost all are > >unnecessarily proprietary anyway), and the software required to > >implement what I describe above is free (at least for Linux - on > >Windows, file system encryption is only available on server versions, I > >think - at least that is the case with Windows 2000 - not sure with > >Windows XP/XP Pro). Does the administration and training involved cost > >money? Definitely, security doesn't come free. Is the expense worth it? > >See above - only takes a handful of confidentiality breaches before you > >can kiss confidence in your EHR goodbye for several years. > > > > > > > >>I think that in most cases we can reliably depend on locked doors and > >>holding people responsible for protecting data they are entrusted with. > >> > >> > > > >Surely you jest? Client workstations, even in large hospitals (or > >especially in large hospitals) have to be considered insecure, likewise > >desktop PCs in doctor's offices - common targets for drug-related > >burglary, and especially laptops and handheld devices which are pinched > >or misplaced with monotonous regularity. > > > >The same applies to EHR/EMR servers, especially servers which are not > >housed in dedicated, secured data centres, although even the latter are > >far from invulnerable - see for example > >http://www.smh.com.au/articles/2003/09/04/1062548967124.html - and then > >there is the off-site back-up media etc to consider. > > > > > > > >>I will agree that security training needs to include this awareness so > >>that users know how to properly store each of these devices when not in > >>use. > >> > >> > > > >Security engineering is all about building systems which fail > >gracefully. Certainly training users is vital, but relying entirely on > >users, or system administrators, or anyone, to always do the right thing > >is a recipe for inevitable security failure. It is always better to > >build additional protection into the fabric of information systems, as > >long as the cost is justified - and that comes back to risk assessment > >as you note. > > > > -- Tim C PGP/GnuPG Key 1024D/EAF993D0 available from keyservers everywhere or at http://members.optushome.com.au/tchur/pubkey.asc Key fingerprint = 8C22 BF76 33BA B3B5 1D5B EB37 7891 46A9 EAF9 93D0 -------------- next part -------------- A non-text attachment was scrubbed... Name: signature.asc Type: application/pgp-signature Size: 189 bytes Desc: This is a digitally signed message part URL: <http://lists.openehr.org/mailman/private/openehr-technical_lists.openehr.org/attachments/20040307/5f1f0801/attachment.asc>