1 challenges for protecting the privacy of health information: required certification can leave...

18
1 Challenges for Protecting the Privacy of Health Information: Required Certification Can Leave Common Vulnerabilities Undetected Ben Smith, Andrew Austin, Matt Brown, Jason King, Jerrod Lankford, Andrew Meneely, Laurie Williams

Upload: myra-daniels

Post on 20-Jan-2016

213 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: 1 Challenges for Protecting the Privacy of Health Information: Required Certification Can Leave Common Vulnerabilities Undetected Ben Smith, Andrew Austin,

1

Challenges for Protecting the Privacy of Health Information: Required Certification

Can Leave Common Vulnerabilities Undetected

Ben Smith, Andrew Austin, Matt Brown, Jason King, Jerrod Lankford, Andrew Meneely, Laurie Williams

Page 2: 1 Challenges for Protecting the Privacy of Health Information: Required Certification Can Leave Common Vulnerabilities Undetected Ben Smith, Andrew Austin,

2

Page 3: 1 Challenges for Protecting the Privacy of Health Information: Required Certification Can Leave Common Vulnerabilities Undetected Ben Smith, Andrew Austin,

Risks and Assets

• Medical Records– STDs, psych history, anti-depressants

• Service– Inaccessibility can mean patient death

• Identity and Financial Information– What’s in your wallet?

• Authenticity and Audit Trail– Doctor fakes a test result, Insider Threats

• Legal Fees– Lawsuits cost more than a good EHR

3

Page 4: 1 Challenges for Protecting the Privacy of Health Information: Required Certification Can Leave Common Vulnerabilities Undetected Ben Smith, Andrew Austin,

Research Questions

• How do market-ready EHRs perform in an attack scenario?

• What can attackers achieve by exploiting security weaknesses in existing EHRs?

EHR: Electronic Health Record System

4

Page 5: 1 Challenges for Protecting the Privacy of Health Information: Required Certification Can Leave Common Vulnerabilities Undetected Ben Smith, Andrew Austin,

Agenda

• Method

• EHR Certification Processes

• Results– Implementation Bugs– Design Flaws

• Recommendations

5

Page 6: 1 Challenges for Protecting the Privacy of Health Information: Required Certification Can Leave Common Vulnerabilities Undetected Ben Smith, Andrew Austin,

EHR Certification

• Dominant certification bodies in the US (approved by ONC):– Certification Commission for Healthcare

Information Technology (CCHIT) – National Institute of Standards and Technology

(NIST).• CCHIT Criteria

– 286 Functional Criteria, 213 Test Scripts (manual)– 46 Security Criteria, 112 Test Scripts.– Security consists of encryption, hashing,

passwords.

6

Page 7: 1 Challenges for Protecting the Privacy of Health Information: Required Certification Can Leave Common Vulnerabilities Undetected Ben Smith, Andrew Austin,

EHR Certification (2)

• NIST Criteria– Similar to CCHIT certification– 36 Test Scripts– Security test scripts focus on passwords and

hashing.– One exception: VE170.302.t-1.05:

“The tester shall perform an action not authorized by the assigned permissions.”

7

Page 8: 1 Challenges for Protecting the Privacy of Health Information: Required Certification Can Leave Common Vulnerabilities Undetected Ben Smith, Andrew Austin,

Method

• Created attack team from the first six authors

• Worked in a distributed fashion

• Held meetings to attack in parallel

• Used knowledge of software security

• Two test servers, one for each EHR: contained demo data (no broken laws)

• One auxiliary server to assist in attacks

8

Page 9: 1 Challenges for Protecting the Privacy of Health Information: Required Certification Can Leave Common Vulnerabilities Undetected Ben Smith, Andrew Austin,

Method: Target EHRs

OpenEMR ProprietaryMed

License GPL Proprietary

Popularity 1168 downloads/mo 21,000 patient records

Size (SLOC/Files) 305,000 / 1,600 120,000 / 900

Version 3.2 (2/16/2010) 1.0 (3/31/2010)

Contributing Developers 18 12

Platform PHP ASP.NET

9

Page 10: 1 Challenges for Protecting the Privacy of Health Information: Required Certification Can Leave Common Vulnerabilities Undetected Ben Smith, Andrew Austin,

Security Issue Categories

• Gary McGraw: Building Security In• Implementation Bugs

– Not indicated in design– Developer mistake– Code-level

• Design Flaws– Happened at the design stage– High-level functionality that is risky– Functionality itself is vulnerable

10

Page 11: 1 Challenges for Protecting the Privacy of Health Information: Required Certification Can Leave Common Vulnerabilities Undetected Ben Smith, Andrew Austin,

OpenEMR: SQL Injection

11

Page 12: 1 Challenges for Protecting the Privacy of Health Information: Required Certification Can Leave Common Vulnerabilities Undetected Ben Smith, Andrew Austin,

Both EHRs: Cross-site Scripting

12

Page 13: 1 Challenges for Protecting the Privacy of Health Information: Required Certification Can Leave Common Vulnerabilities Undetected Ben Smith, Andrew Austin,

Design Flaws

• In OpenEMR, the administrator can read or change another user’s password.

• In ProprietaryMed, there is no logging of any transaction.

• In ProprietaryMed, there is no authorization control on patient records.

13

Page 14: 1 Challenges for Protecting the Privacy of Health Information: Required Certification Can Leave Common Vulnerabilities Undetected Ben Smith, Andrew Austin,

OpenEMR: phpMyAdmin

14

Page 15: 1 Challenges for Protecting the Privacy of Health Information: Required Certification Can Leave Common Vulnerabilities Undetected Ben Smith, Andrew Austin,

Summary

• CCHIT and NIST would be ineffective and detecting any of the exploits or design flaws demonstrated in this paper.

• Security is a crucial aspect of healthcare IT due to HIPAA, and the cost of exploits.

• Passwords, hashing, encryption are important, but is insufficient!

15

Page 16: 1 Challenges for Protecting the Privacy of Health Information: Required Certification Can Leave Common Vulnerabilities Undetected Ben Smith, Andrew Austin,

Recommendations

• Uncover implementation bugs by executing attacks from a list such as CWE/SANS Top 25, simulate attacker behavior.

• Execute attacks on every component of the system, get some sense of coverage.

• Examine design flaws as well as implementation bugs.

16

Page 17: 1 Challenges for Protecting the Privacy of Health Information: Required Certification Can Leave Common Vulnerabilities Undetected Ben Smith, Andrew Austin,

Security as Entry Criteria

• Currently, docs see “certified” and they assume EHR is secure.

• Certification is not the best way to ensure the security of a system (security by checklist)

• Regardless, security testing should be conducted before and as a prerequisite to functional testing for EHRs.

17

Page 18: 1 Challenges for Protecting the Privacy of Health Information: Required Certification Can Leave Common Vulnerabilities Undetected Ben Smith, Andrew Austin,

Thank you!

• Any questions?

• Healthcare Wiki:

http://realsearchgroup.com/healthcare

18