net.ihe.gazelle.assets.SearchCriteria : 69 assertions found for this search Review filtered assertions

Assertion

Applies to

Applied to
Not applied to

Coverage

Covered by
Not covered by
Id scheme
Assertion id
Status
Testable?
#Coverage
#Applies to
Comment
Predicate
Page
Tags
Last changed
Actions
ATNAATNA-10Testable 0 2 Audit Record Repository actor which claims support of the Audit Trail and Node Authentication (ATNA) integration profile shall support the Record Audit Event [ITI-20] transaction.69Table 9.1-14/30/19 4:13:19 PM by NicolasBailliet
ATNAATNA-12Testable 0 2 Secure Node actor which claims support for the Audit Trail and Node Authentication (ATNA) integration profile shall support the Record Audit Event [ITI-20] transaction69Table 9.1-14/30/19 4:13:19 PM by NicolasBailliet
ATNAATNA-13Testable 0 2 This is a grouping requirement. ITI-1 is not required by the ATNA profile. > According to 2nd Review group, the TF is the reference.Secure Node actor which claims support for the Audit Trail and Node Authentication (ATNA) integration profile shall perform the Maintain Time [ITI-1] transaction72Table 9.3-14/30/19 4:13:19 PM by NicolasBailliet
ATNAATNA-15Testable 0 2 Secure Application actor which claims support for the Audit Trail and Node Authentication (ATNA) integration profile may perform the Maitain Time [ITI-1] transaction72Table 9.3-14/30/19 4:13:19 PM by NicolasBailliet
ATNAATNA-16Testable 0 2 see previous comment on ITI-19Secure Application actor which claims support for the Audit Trail and Node Authentication (ATNA) integration profile may perform the Record Audit Event [ITI-20] transaction69Table 9.1-14/30/19 4:13:19 PM by NicolasBailliet
ATNAATNA-20Testable 0 2 The Audit Repository shall support both audit transport mechanisms 70Section 9.1.1.34/30/19 4:13:19 PM by NicolasBailliet
ATNAATNA-21Testable 0 2 The Audit Repository shall support any IHE-specified audit message format, when sent over one of those transport mechanisms. Note that new applications domains may have their own extended vocabularies in addition to the DICOM and IHE vocabularies. This also means that an ATNA Audit Repository is also automatically a Radiology Basic Security Profile Audit Repository because it must support the IHE Provisional Message format and it must support the BSD syslog protocol70Section 9.1.1.34/30/19 4:13:19 PM by NicolasBailliet
ATNAATNA-23Testable 0 2 Secure Node actor may support the Radiology Audit Trail option71Table 9.2-14/30/19 4:13:19 PM by NicolasBailliet
ATNAATNA-24Testable 0 2 Secure Application actors may support the Radiology Audit Trail option71Table 9.2-14/30/19 4:13:19 PM by NicolasBailliet
ATNAATNA-25Testable 0 1 Actors in the IHE Radiology domain Profiles which claim support of the Audit Trail and Node Authentication (ATNA) integration profile are required to implement the Radiology Audit Trail option.83Section 9.5.24/30/19 4:13:18 PM by NicolasBailliet
ATNAATNA-3Testable 0 2 A Secure Node Actor shall be configurable to support both connection authentication and physically secured networks 72Section 9.44/30/19 4:13:19 PM by NicolasBailliet
ATNAATNA-4Testable 0 4 The mechanism for logging audit record messages to the audit record repository shall be either Transmission of Syslog Messages over UDP (RFC5426) with The Syslog Protocol (RFC5424) which formalizes and obsoletes Syslog (RFC-3164), either 2) Transmission of Syslog Messages over TLS (RFC5425) with The Syslog Protocol (RFC5424) which formalizes sending syslog messages over a streaming protocol protectable by TLS.72Section 9.34/30/19 4:13:19 PM by NicolasBailliet
ATNAATNA-6Testable 0 4 A means must be provided to upload the required certificates to the implementation, e.g., via floppy disk or file transfer via network. 72Section 9.44/30/19 4:13:19 PM by NicolasBailliet
ATNAATNA-7Testable 0 2 I don't know what this assertion means.When an IHE profile requires a grouping of an actor with either Secure Node or Secure Application, then the ATNA requirements apply to all actors in the implementation.72Section 9.3.14/30/19 4:13:19 PM by NicolasBailliet
ATNAATNA-8Testable 0 2 When an implementation chooses to support this Integration Profile for an actor, it is required that all IHE actors and any other activities in this implementation support the Audit Trail and Node Authentication Integration Profile. 72Section 9.44/30/19 4:13:19 PM by NicolasBailliet
ITI19ITI19-10reviewedTestable 0 0 The Secure Node or Secure Application shall not reject certificates that contain unknown attributes or other parameters.134Section 3.19.6.1.34/30/19 4:50:25 PM by NicolasBailliet
ITI19ITI19-12reviewedTestable 0 0 The IHE Technical Framework recommends a maximum expiration time for certificates of 2 years.134Section 3.19.6.1.34/30/19 4:50:25 PM by NicolasBailliet
ITI19ITI19-13reviewedTestable 0 0 Using a certificate chain back to an external trusted certificate authority to determine authorizations is strongly discouraged.134Section 3.19.6.1.34/30/19 4:50:25 PM by NicolasBailliet
ITI19ITI19-16reviewedTestable 0 0 For all connections carrying Protected Information (PI), the recommended "well-known port 2762" as specified by DICOM shall be used when the Secure node is configured for use not on a physically secured network.135Section 3.19.6.24/30/19 4:50:25 PM by NicolasBailliet
ITI19ITI19-17reviewedTestable 0 0 For all connections carrying Protected Information (PI), and when the secure node is configured for use on a physically secured network, a different port number shall be used, preferably the standard port 104. 135Section 3.19.6.24/30/19 4:50:25 PM by NicolasBailliet