Please use a compatible browser :Google Chrome or Mozilla Firefox
Page expired. Any change will be lost. Try to refresh the page.
Gazelle update scheduled, unsaved changes will be lost :
Your session will timeout :
Redeployed...
Logged out...
The server is restarting. Any change will be lost.
 

Integration Profile: Audit Trail and Node Authentication

Integration Profile Information

Id: 48

Keyword: ATNA

Name: Audit Trail and Node Authentication

Description: The ITI Audit Trail and Node Authentication (ATNA) Profile establishes the characteristics of a Basic Secure Node: It describes the security environment (user identification, authentication, authorization, access control, etc.) assumed for the node so that security reviewers may decide whether this matches their environments. It defines basic security requirements for the communications of the node using TLS or equivalent functionality. It defines basic auditing requirements for the node. The profile also establishes the characteristics of the communication of audit messages between the Basic Secure Nodes and Audit Repository nodes that collect audit information.

Status: Final Text

Id
Keyword
Name
Description
Action
1 ARR Audit Record Repository A system unit that receives and collects audit records from multiple systems.
10 SN Secure Node A system unit that validates the identity of any user and of any other node, and determines whether or not access to the system for this user and information exchange with the other node is allowed. Maintains the correct time.
86 SA Secure Application The difference between the Secure Node and the Secure Application is the extent to which the underlying operating system and other environment are secured. A Secure Node includes all aspects of user authentication, file system protections, and operating environment security. The Secure Application is a product that does not include the operating environment. The Secure Application provides security features only for the application features. See section 9.7 for the relationships among a Secure Node, Secure Application, and other actors.
1315 AUDIT_RECORD_FORWARDER Audit Record Forwarder This actor filters audit records that have been received and forwards selected audit records to an Audit Record Repository. Added to the ATNA profile in Sept 2015 in CP-ITI-872
1323 AC Audit Consumer Search for syslog and ATNA audit messages based upon queries using Syslog metadata and ATNA audit message content. Subsequent processing is not defined.
Id
Actor
Integration Profile Option
Assertions
182SN - Secure NodeRAD_AUDIT_TRAIL_OPTION - Radiology Audit Trail 0
249SN - Secure NodeDEPRECATED: ATNA_ENCRYPTION - DEPRECATED ATNA Encryption0
250SA - Secure ApplicationDEPRECATED: ATNA_ENCRYPTION - DEPRECATED ATNA Encryption0
655SN - Secure NodeNONE - None12
656ARR - Audit Record RepositoryNONE - None10
868SA - Secure ApplicationNONE - None8
1776SA - Secure ApplicationRAD_AUDIT_TRAIL_OPTION - Radiology Audit Trail 0
2347AUDIT_RECORD_FORWARDER - Audit Record ForwarderNONE - None0
2357ARR - Audit Record RepositoryRETRIEVE_AUDIT_MSG - Retrieve Audit Message0
2358AC - Audit ConsumerRETRIEVE_AUDIT_MSG - Retrieve Audit Message0
2420SA - Secure ApplicationBCP195_TLS_1.2_FLOOR - BCP195 TLS Secure Transport Connection - TLS 1.2 Floor0
2421SA - Secure ApplicationBCP195_TLS_ALL_VERSIONS - BCP195 TLS Secure Transport Connection - All TLS Versions0
2422SN - Secure NodeBCP195_TLS_1.2_FLOOR - BCP195 TLS Secure Transport Connection - TLS 1.2 Floor0
2423SN - Secure NodeBCP195_TLS_ALL_VERSIONS - BCP195 TLS Secure Transport Connection - All TLS Versions0
2424SA - Secure ApplicationFQDN_VALIDATION_OF_SERVER_CERT - FQDN Validation of Server Certificate0
2425SN - Secure NodeFQDN_VALIDATION_OF_SERVER_CERT - FQDN Validation of Server Certificate0
2562ARR - Audit Record RepositoryATX_FHIR_FEED - ATX_FHIR_FEED0
2563AUDIT_RECORD_FORWARDER - Audit Record ForwarderATX_FHIR_FEED - ATX_FHIR_FEED0
2564SA - Secure ApplicationATX_FHIR_FEED - ATX_FHIR_FEED0
2565SN - Secure NodeATX_FHIR_FEED - ATX_FHIR_FEED0
Assertion Id
Description
ATNA-1 The Audit Trail and Node Authentication Integration Profile requires the use of bi-directional certificate-based node authentication for connections to and from each node.dedede
ATNA-10 Audit Record Repository actor which claims support of the Audit Trail and Node Authentication (ATNA) integration profile shall support the Record Audit Event [ITI-20] transaction.
ATNA-11 Secure Node actor which claims support for the Audit Trail and Node Authentication (ATNA) integration profile shall support the Authentication Node [ITI-19] transaction
ATNA-12 Secure Node actor which claims support for the Audit Trail and Node Authentication (ATNA) integration profile shall support the Record Audit Event [ITI-20] transaction
ATNA-13 Secure Node actor which claims support for the Audit Trail and Node Authentication (ATNA) integration profile shall perform the Maintain Time [ITI-1] transaction
ATNA-14 Secure Application actor which claims support for the Audit Trail and Node Authentication (ATNA) integration profile may perform the Authentication Node [ITI-19] transaction
ATNA-15 Secure Application actor which claims support for the Audit Trail and Node Authentication (ATNA) integration profile may perform the Maitain Time [ITI-1] transaction
ATNA-16 Secure Application actor which claims support for the Audit Trail and Node Authentication (ATNA) integration profile may perform the Record Audit Event [ITI-20] transaction
ATNA-17 The Secure Node Actor shall include the Authenticate Node [ITI-19] transaction for all network connections that may expose private information.
ATNA-18 The Secure Node Actor shall ensure all local user activity (login, logout, etc.) protected to ensure only authorized users.
ATNA-19 The Secure Node Actor shall include the record Audit Event as specified in ITI TF-2a: 3.20
ATNA-2 Secure Nodes shall either prohibit, or be designed and verified to prevent access to PHI, whenever connections are not bi-directionally node-authenticated .
ATNA-20 The Audit Repository shall support both audit transport mechanisms
ATNA-21 The Audit Repository shall support any IHE-specified audit message format, when sent over one of those transport mechanisms. Note that new applications domains may have their own extended vocabularies in addition to the DICOM and IHE vocabularies. This also means that an ATNA Audit Repository is also automatically a Radiology Basic Security Profile Audit Repository because it must support the IHE Provisional Message format and it must support the BSD syslog protocol
ATNA-22 The Audit Repository shall support self protections and user access controls
ATNA-23 Secure Node actor may support the Radiology Audit Trail option
ATNA-24 Secure Application actors may support the Radiology Audit Trail option
ATNA-25 Actors in the IHE Radiology domain Profiles which claim support of the Audit Trail and Node Authentication (ATNA) integration profile are required to implement the Radiology Audit Trail option.
ATNA-28 The Secure Application shall use the Authenticate Node transaction for all network connections to or from the application that may expose private information as specified in ITI TF-2a: 3.19
ATNA-29 The Secure Application shall provide sufficient authentication methods to ensure that only authorized users access the Secure Application

Domains

Id
Keyword
Name
Description
2 ITI IT-Infrastructure The IT Infrastructure Domain supplies infrastructure for sharing healthcare information. An infrastructure interoperability component represents a common IT function that is used as a building block for a variety of use cases... a necessary ingredient, but rarely visible to the end user!! These components may be embedded in an application, but are often deployed as a shared resource within a RHIO or Health Information Exchange.

Tool index

    Copyright IHE 2024
  • Gazelle 7.1.7
Back to top