tmccormi wrote on Friday, July 17, 2009:
This is what is listed as not passing the CCHIT Certification Requirement for Audit (per ViSolve’s report) and my additions of technical reference. Open for comments…
–Tony
1. The system shall allow an authorized administrator to set the inclusion or exclusion of auditable events based on organizational policy & operating requirements/limits.
2. The system shall support logging to a common audit engine using the schema and transports specified in the Audit Log specification of IHE Audit Trails and Node Authentication (ATNA) Profile.
* http://wiki.ihe.net/index.php?title=Audit_Trail_and_Node_Authentication
Example message format
<AuditMessage>
<EventIdentification>
<EventActionCode>
<EventDateTime>
<EventOutcomeIndicator>
<EventID code>
<EventTypeCode>
</EventIdentification>
<AuditSourceIdentification>
<AuditSourceTypeCode>
</AuditSourceIdentification>
<ParticipantObjectIdentification>
<ParticipantObjectTypeCode>
<ParticipantObjectIDTypeCode>
<ParticipantObjectName>
</ParticipantObjectIdentification>\n");
</AuditMessage>
3. The system shall be able to detect security-relevant events that it mediates and generate audit records for them. At a minimum the events shall include those listed in the Appendix Audited Events. Note: The system is only responsible for auditing security events that it mediates. A mediated event is an event that the system has some active role in allowing or causing to happen or has opportunity to detect. The system is not expected to create audit logs entries for security events that it does not mediate.
4. The system shall record within each audit record the following information when it is available:
1) date and time of the event;
2) the component of the system (e.g. software component, hardware component) where the event occurred; (
3) type of event (including: data description and patient identifier when relevant);
4) subject identity (e.g. user identity); and
5) the outcome (success or failure) of the event.
* The step here is to identify what events need logging and implement the use of a common audit class method in all actions where it is configured to happen in item 1.
5. The system shall provide authorized administrators with the capability to read all audit information from the audit records in one of the following two ways:
1) The system shall provide the audit records in a manner suitable for the user to interpret the information. The system shall provide the capability to generate reports based on ranges of system date and time that audit records were collected.
2) The system shall be able to export logs into text format in such a manner as to allow correlation based on time (e.g. UTC synchronization).
6. The system shall be able to support time synchronization using NTP/SNTP, and use this synchronized time in all security records of time.
7. The system shall have the ability to format for export recorded time stamps using UTC based on ISO 8601. Example: "1994-11-05T08:15:30-05:00" corresponds to November 5, 1994, 8:15:30 am, US Eastern Standard Time.
8. The system shall prohibit all users read access to the audit records, except those users that have been granted explicit read-access. The system shall protect the stored audit records from unauthorized deletion. The system shall prevent modifications to the audit records.