R4 Draft for Comment

This page is part of the FHIR Specification (v3.2.0: R4 Ballot 1). The current version which supercedes this version is 5.0.0. For a full list of available versions, see the Directory of published versions . Page versions: R5 R4B R4 R3 R2

6.4 Resource AuditEvent - Content

Security Work GroupMaturity Level: 3 Trial Use Compartments: Device, Patient, Practitioner

A record of an event made for purposes of maintaining a security log. Typical uses include detection of intrusion attempts and monitoring for inappropriate usage.

The audit event is based on the IHE-ATNA Audit record definitions, originally from RFC 3881 , and now managed by DICOM (see DICOM Part 15 Annex A5 ).

  • ASTM E2147 – Setup the concept of security audit logs for healthcare including accounting of disclosures
  • IETF RFC 3881 – Defined the Information Model (IETF rule forced this to be informative)
  • DICOM Audit Log Message – Made the information model Normative, defined Vocabulary, Transport Binding, and Schema
  • IHE ATNA – Defines the grouping with secure transport and access controls; and defined specific audit log records for specific IHE transactions.
  • NIST SP800-92 – Shows how to do audit log management and reporting – consistent with our model
  • HL7 PASS – Defined an Audit Service with responsibilities and a query interface for reporting use
  • ISO 27789 – Defined the subset of audit events that an EHR would need
  • ISO/HL7 10781 EHR System Functional Model Release 2
  • ISO 21089 Trusted End-to-End Information Flows

This resource is managed collaboratively between HL7, DICOM, and IHE.

The primary purpose of this resource is the maintenance of security audit log information. However, it can also be used for any audit logging needs and simple event-based notification.

All actors - such as applications, processes, and services - involved in an auditable event should record an AuditEvent. This will likely result in multiple AuditEvent entries that show whether privacy and security safeguards, such as access control, are the properly functioning across an enterprise's system-of-systems. Thus, it is typical to get an auditable event recorded by both the application in a workflow process, and the servers that support them. For this reason, duplicate entries are expected, which is helpful because it may aid in the detecting of, for example, fewer than expected actors being recorded in a multi-actor process or attributes related to those records being in conflict, which is an indication of a security problem. There may be non-participating actors that also detect a security relevant event and thus would record an AuditEvent, such as a trusted intermediary.

Security relevant events are not limited to communications or RESTful events. They include: software start-up and shutdown; user login and logout; access control decisions; configuration events; software installation; policy rules changes; and manipulation of data that exposes the data to users. See the Audit Event Sub-Type vocabulary for guidance on some security relevant events.

The content of an AuditEvent is intended for use by Security System Administrators, Security and Privacy Information Managers, and Records Management personnel. This content is not intended to be accessible or used directly by other healthcare users, such as Providers or Patients, although reports generated from the raw data would be useful. An example is a Patient-centric Accounting of Disclosures or an Access Report. Servers that provide support for Audit Event resources would not generally accept update or delete operations on the resources, as this would compromise the integrity of the audit record. Access to the AuditEvent would typically be limited to security, privacy, or other system administration purposes.

Relationship of AuditEvent and Provenance resources are often (though not exclusively) created by the application responding to the create/read/query/update/delete/execute etc. event. A Provenance resource contains overlapping information, but is a record-keeping assertion that gathers information about the context in which the information in a resource "came to be" in its current state, e.g., whether it was created de novo or obtained from another entity in whole, part, or by transformation. Provenance resources are prepared by the application that initiates the create/update of the resource and may be persisted with the AuditEvent target resource.

Structure

NameFlagsCard.TypeDescription & Constraintsdoco
.. AuditEvent TUDomainResourceEvent record kept for security purposes
Elements defined in Ancestors: id, meta, implicitRules, language, text, contained, extension, modifierExtension
... type Σ1..1CodingType/identifier of event
Audit Event ID (Extensible)
... subtype Σ0..*CodingMore specific type/id for the event
Audit Event Sub-Type (Extensible)
... action Σ0..1codeType of action performed during the event
AuditEventAction (Required)
... period 0..1PeriodWhen the activity occurred
... recorded Σ1..1instantTime when the event occurred on source
... outcome Σ0..1codeWhether the event succeeded or failed
AuditEventOutcome (Required)
... outcomeDesc Σ0..1stringDescription of the event outcome
... purposeOfEvent Σ0..*CodeableConceptThe purposeOfUse of the event
PurposeOfUse (Extensible)
... agent 1..*BackboneElementActor involved in the event
.... type 0..1CodeableConceptHow agent participated
ParticipationRoleType (Extensible)
.... role 0..*CodeableConceptAgent role in the event
SecurityRoleType (Example)
.... reference Σ0..1Reference(PractitionerRole | Practitioner | Organization | Device | Patient | RelatedPerson)Direct reference to resource
.... userId Σ0..1IdentifierUnique identifier for the user
.... altId 0..1stringAlternative User id e.g. authentication
.... name 0..1stringHuman-meaningful name for the agent
.... requestor Σ1..1booleanWhether user is initiator
.... location 0..1Reference(Location)Where
.... policy 0..*uriPolicy that authorized event
.... media 0..1CodingType of media
Media Type Code (Extensible)
.... network 0..1BackboneElementLogical network location for application activity
..... address 0..1stringIdentifier for the network access point of the user device
..... type 0..1codeThe type of network access point
AuditEventAgentNetworkType (Required)
.... purposeOfUse 0..*CodeableConceptReason given for this user
PurposeOfUse (Extensible)
... source 1..1BackboneElementAudit Event Reporter
.... site 0..1stringLogical source location within the enterprise
.... identifier Σ1..1IdentifierThe identity of source detecting the event
.... type 0..*CodingThe type of source where event originated
Audit Event Source Type (Extensible)
... entity I0..*BackboneElementData or objects used
+ Either a name or a query (NOT both)
.... identifier Σ0..1IdentifierSpecific instance of object
.... reference Σ0..1Reference(Any)Specific instance of resource
.... type 0..1CodingType of entity involved
AuditEventEntityType (Extensible)
.... role 0..1CodingWhat role the entity played
AuditEventEntityRole (Extensible)
.... lifecycle 0..1CodingLife-cycle stage for the entity
ObjectLifecycleEvents (Extensible)
.... securityLabel 0..*CodingSecurity labels on the entity
All Security Labels (Extensible)
.... name ΣI0..1stringDescriptor for entity
.... description 0..1stringDescriptive text
.... query ΣI0..1base64BinaryQuery parameters
.... detail 0..*BackboneElementAdditional Information about the entity
..... type 1..1stringName of the property
..... value[x] 1..1Property value
...... valueStringstring
...... valueBase64Binarybase64Binary

doco Documentation for this format

UML Diagram (Legend)

AuditEvent (DomainResource)Identifier for a family of the event. For example, a menu item, program, rule, policy, function code, application name or URL. It identifies the performed functiontype : Coding [1..1] « Type of event. (Strength=Extensible)Audit Event ID+ »Identifier for the category of eventsubtype : Coding [0..*] « Sub-type of event. (Strength=Extensible)Audit Event Sub-Type+ »Indicator for type of action performed during the event that generated the auditaction : code [0..1] « Indicator for type of action performed during the event that generated the event (Strength=Required)AuditEventAction! »The period during which the activity occurredperiod : Period [0..1]The time when the event occurred on the sourcerecorded : instant [1..1]Indicates whether the event succeeded or failedoutcome : code [0..1] « Indicates whether the event succeeded or failed (Strength=Required)AuditEventOutcome! »A free text description of the outcome of the eventoutcomeDesc : string [0..1]The purposeOfUse (reason) that was used during the event being recordedpurposeOfEvent : CodeableConcept [0..*] « The reason the activity took place. (Strength=Extensible)PurposeOfUse+ »AgentSpecification of the participation type the user plays when performing the eventtype : CodeableConcept [0..1] « The Participation type of the agent to the event (Strength=Extensible)ParticipationRoleType+ »The security role that the user was acting under, that come from local codes defined by the access control security system (e.g. RBAC, ABAC) used in the local contextrole : CodeableConcept [0..*] « What security role enabled the agent to participate in the event (Strength=Example)SecurityRoleType?? »Direct reference to a resource that identifies the agentreference : Reference [0..1] « PractitionerRole|Practitioner| Organization|Device|Patient|RelatedPerson »Unique identifier for the user actively participating in the eventuserId : Identifier [0..1]Alternative agent Identifier. For a human, this should be a user identifier text string from authentication system. This identifier would be one known to a common authentication system (e.g. single sign-on), if availablealtId : string [0..1]Human-meaningful name for the agentname : string [0..1]Indicator that the user is or is not the requestor, or initiator, for the event being auditedrequestor : boolean [1..1]Where the event occurredlocation : Reference [0..1] « Location »The policy or plan that authorized the activity being recorded. Typically, a single activity may have multiple applicable policies, such as patient consent, guarantor funding, etc. The policy would also indicate the security token usedpolicy : uri [0..*]Type of media involved. Used when the event is about exporting/importing onto mediamedia : Coding [0..1] « Used when the event is about exporting/importing onto media. (Strength=Extensible)Media Type Code+ »The reason (purpose of use), specific to this agent, that was used during the event being recordedpurposeOfUse : CodeableConcept [0..*] « The reason the activity took place. (Strength=Extensible)PurposeOfUse+ »NetworkAn identifier for the network access point of the user device for the audit eventaddress : string [0..1]An identifier for the type of network access point that originated the audit eventtype : code [0..1] « The type of network access point of this agent in the audit event (Strength=Required)AuditEventAgentNetworkType! »SourceLogical source location within the healthcare enterprise network. For example, a hospital or other provider location within a multi-entity provider groupsite : string [0..1]Identifier of the source where the event was detectedidentifier : Identifier [1..1]Code specifying the type of source where event originatedtype : Coding [0..*] « Code specifying the type of system that detected and recorded the event. (Strength=Extensible)Audit Event Source Type+ »EntityIdentifies a specific instance of the entity. The reference should always be version specificidentifier : Identifier [0..1]Identifies a specific instance of the entity. The reference should be version specificreference : Reference [0..1] « Any »The type of the object that was involved in this audit eventtype : Coding [0..1] « Code for the entity type involved in the audit event (Strength=Extensible)AuditEventEntityType+ »Code representing the role the entity played in the event being auditedrole : Coding [0..1] « Code representing the role the entity played in the audit event (Strength=Extensible)AuditEventEntityRole+ »Identifier for the data life-cycle stage for the entitylifecycle : Coding [0..1] « Identifier for the data life-cycle stage for the entity (Strength=Extensible)ObjectLifecycleEvents+ »Security labels for the identified entitysecurityLabel : Coding [0..*] « Security Labels from the Healthcare Privacy and Security Classification System. (Strength=Extensible)All Security Labels+ »A name of the entity in the audit eventname : string [0..1]Text that describes the entity in more detaildescription : string [0..1]The query parameters for a query-type entitiesquery : base64Binary [0..1]DetailThe type of extra detail provided in the valuetype : string [1..1]The details valuevalue[x] : Type [1..1] « string|base64Binary »Logical network location for application activity, if the activity has a network locationnetwork[0..1]An actor taking an active role in the event or activity that is loggedagent[1..*]The system that is reporting the eventsource[1..1]Tagged value pairs for conveying additional information about the entitydetail[0..*]Specific instances of data or objects that have been accessedentity[0..*]

XML Template

<AuditEvent xmlns="http://hl7.org/fhir"> doco
 <!-- from Resource: id, meta, implicitRules, and language -->
 <!-- from DomainResource: text, contained, extension, and modifierExtension -->
 <type><!-- 1..1 Coding Type/identifier of event --></type>
 <subtype><!-- 0..* Coding More specific type/id for the event --></subtype>
 <action value="[code]"/><!-- 0..1 Type of action performed during the event -->
 <period><!-- 0..1 Period When the activity occurred --></period>
 <recorded value="[instant]"/><!-- 1..1 Time when the event occurred on source -->
 <outcome value="[code]"/><!-- 0..1 Whether the event succeeded or failed -->
 <outcomeDesc value="[string]"/><!-- 0..1 Description of the event outcome -->
 <purposeOfEvent><!-- 0..* CodeableConcept The purposeOfUse of the event --></purposeOfEvent>
 <agent>  <!-- 1..* Actor involved in the event -->
  <type><!-- 0..1 CodeableConcept How agent participated --></type>
  <role><!-- 0..* CodeableConcept Agent role in the event --></role>
  <reference><!-- 0..1 Reference(PractitionerRole|Practitioner|Organization|
    Device|Patient|RelatedPerson) Direct reference to resource --></reference>
  <userId><!-- 0..1 Identifier Unique identifier for the user --></userId>
  <altId value="[string]"/><!-- 0..1 Alternative User id e.g. authentication -->
  <name value="[string]"/><!-- 0..1 Human-meaningful name for the agent -->
  <requestor value="[boolean]"/><!-- 1..1 Whether user is initiator -->
  <location><!-- 0..1 Reference(Location) Where --></location>
  <policy value="[uri]"/><!-- 0..* Policy that authorized event -->
  <media><!-- 0..1 Coding Type of media --></media>
  <network>  <!-- 0..1 Logical network location for application activity -->
   <address value="[string]"/><!-- 0..1 Identifier for the network access point of the user device -->
   <type value="[code]"/><!-- 0..1 The type of network access point -->
  </network>
  <purposeOfUse><!-- 0..* CodeableConcept Reason given for this user --></purposeOfUse>
 </agent>
 <source>  <!-- 1..1 Audit Event Reporter -->
  <site value="[string]"/><!-- 0..1 Logical source location within the enterprise -->
  <identifier><!-- 1..1 Identifier The identity of source detecting the event --></identifier>
  <type><!-- 0..* Coding The type of source where event originated --></type>
 </source>
 <entity>  <!-- 0..* Data or objects used -->
  <identifier><!-- 0..1 Identifier Specific instance of object --></identifier>
  <reference><!-- 0..1 Reference(Any) Specific instance of resource --></reference>
  <type><!-- 0..1 Coding Type of entity involved --></type>
  <role><!-- 0..1 Coding What role the entity played --></role>
  <lifecycle><!-- 0..1 Coding Life-cycle stage for the entity --></lifecycle>
  <securityLabel><!-- 0..* Coding Security labels on the entity --></securityLabel>
  <name value="[string]"/><!-- ?? 0..1 Descriptor for entity -->
  <description value="[string]"/><!-- 0..1 Descriptive text -->
  <query value="[base64Binary]"/><!-- ?? 0..1 Query parameters -->
  <detail>  <!-- 0..* Additional Information about the entity -->
   <type value="[string]"/><!-- 1..1 Name of the property -->
   <value[x]><!-- 1..1 string|base64Binary Property value --></value[x]>
  </detail>
 </entity>
</AuditEvent>

JSON Template

{doco
  "resourceType" : "AuditEvent",
  // from Resource: id, meta, implicitRules, and language
  // from DomainResource: text, contained, extension, and modifierExtension
  "type" : { Coding }, // R!  Type/identifier of event
  "subtype" : [{ Coding }], // More specific type/id for the event
  "action" : "<code>", // Type of action performed during the event
  "period" : { Period }, // When the activity occurred
  "recorded" : "<instant>", // R!  Time when the event occurred on source
  "outcome" : "<code>", // Whether the event succeeded or failed
  "outcomeDesc" : "<string>", // Description of the event outcome
  "purposeOfEvent" : [{ CodeableConcept }], // The purposeOfUse of the event
  "agent" : [{ // R!  Actor involved in the event
    "type" : { CodeableConcept }, // How agent participated
    "role" : [{ CodeableConcept }], // Agent role in the event
    "reference" : { Reference(PractitionerRole|Practitioner|Organization|
    Device|Patient|RelatedPerson) }, // Direct reference to resource
    "userId" : { Identifier }, // Unique identifier for the user
    "altId" : "<string>", // Alternative User id e.g. authentication
    "name" : "<string>", // Human-meaningful name for the agent
    "requestor" : <boolean>, // R!  Whether user is initiator
    "location" : { Reference(Location) }, // Where
    "policy" : ["<uri>"], // Policy that authorized event
    "media" : { Coding }, // Type of media
    "network" : { // Logical network location for application activity
      "address" : "<string>", // Identifier for the network access point of the user device
      "type" : "<code>" // The type of network access point
    },
    "purposeOfUse" : [{ CodeableConcept }] // Reason given for this user
  }],
  "source" : { // R!  Audit Event Reporter
    "site" : "<string>", // Logical source location within the enterprise
    "identifier" : { Identifier }, // R!  The identity of source detecting the event
    "type" : [{ Coding }] // The type of source where event originated
  },
  "entity" : [{ // Data or objects used
    "identifier" : { Identifier }, // Specific instance of object
    "reference" : { Reference(Any) }, // Specific instance of resource
    "type" : { Coding }, // Type of entity involved
    "role" : { Coding }, // What role the entity played
    "lifecycle" : { Coding }, // Life-cycle stage for the entity
    "securityLabel" : [{ Coding }], // Security labels on the entity
    "name" : "<string>", // C? Descriptor for entity
    "description" : "<string>", // Descriptive text
    "query" : "<base64Binary>", // C? Query parameters
    "detail" : [{ // Additional Information about the entity
      "type" : "<string>", // R!  Name of the property
      // value[x]: Property value. One of these 2:
      "valueString" : "<string>"
      "valueBase64Binary" : "<base64Binary>"
    }]
  }]
}

Turtle Template

@prefix fhir: <http://hl7.org/fhir/> .doco


[ a fhir:AuditEvent;
  fhir:nodeRole fhir:treeRoot; # if this is the parser root

  # from Resource: .id, .meta, .implicitRules, and .language
  # from DomainResource: .text, .contained, .extension, and .modifierExtension
  fhir:AuditEvent.type [ Coding ]; # 1..1 Type/identifier of event
  fhir:AuditEvent.subtype [ Coding ], ... ; # 0..* More specific type/id for the event
  fhir:AuditEvent.action [ code ]; # 0..1 Type of action performed during the event
  fhir:AuditEvent.period [ Period ]; # 0..1 When the activity occurred
  fhir:AuditEvent.recorded [ instant ]; # 1..1 Time when the event occurred on source
  fhir:AuditEvent.outcome [ code ]; # 0..1 Whether the event succeeded or failed
  fhir:AuditEvent.outcomeDesc [ string ]; # 0..1 Description of the event outcome
  fhir:AuditEvent.purposeOfEvent [ CodeableConcept ], ... ; # 0..* The purposeOfUse of the event
  fhir:AuditEvent.agent [ # 1..* Actor involved in the event
    fhir:AuditEvent.agent.type [ CodeableConcept ]; # 0..1 How agent participated
    fhir:AuditEvent.agent.role [ CodeableConcept ], ... ; # 0..* Agent role in the event
    fhir:AuditEvent.agent.reference [ Reference(PractitionerRole|Practitioner|Organization|Device|Patient|RelatedPerson) ]; # 0..1 Direct reference to resource
    fhir:AuditEvent.agent.userId [ Identifier ]; # 0..1 Unique identifier for the user
    fhir:AuditEvent.agent.altId [ string ]; # 0..1 Alternative User id e.g. authentication
    fhir:AuditEvent.agent.name [ string ]; # 0..1 Human-meaningful name for the agent
    fhir:AuditEvent.agent.requestor [ boolean ]; # 1..1 Whether user is initiator
    fhir:AuditEvent.agent.location [ Reference(Location) ]; # 0..1 Where
    fhir:AuditEvent.agent.policy [ uri ], ... ; # 0..* Policy that authorized event
    fhir:AuditEvent.agent.media [ Coding ]; # 0..1 Type of media
    fhir:AuditEvent.agent.network [ # 0..1 Logical network location for application activity
      fhir:AuditEvent.agent.network.address [ string ]; # 0..1 Identifier for the network access point of the user device
      fhir:AuditEvent.agent.network.type [ code ]; # 0..1 The type of network access point
    ];
    fhir:AuditEvent.agent.purposeOfUse [ CodeableConcept ], ... ; # 0..* Reason given for this user
  ], ...;
  fhir:AuditEvent.source [ # 1..1 Audit Event Reporter
    fhir:AuditEvent.source.site [ string ]; # 0..1 Logical source location within the enterprise
    fhir:AuditEvent.source.identifier [ Identifier ]; # 1..1 The identity of source detecting the event
    fhir:AuditEvent.source.type [ Coding ], ... ; # 0..* The type of source where event originated
  ];
  fhir:AuditEvent.entity [ # 0..* Data or objects used
    fhir:AuditEvent.entity.identifier [ Identifier ]; # 0..1 Specific instance of object
    fhir:AuditEvent.entity.reference [ Reference(Any) ]; # 0..1 Specific instance of resource
    fhir:AuditEvent.entity.type [ Coding ]; # 0..1 Type of entity involved
    fhir:AuditEvent.entity.role [ Coding ]; # 0..1 What role the entity played
    fhir:AuditEvent.entity.lifecycle [ Coding ]; # 0..1 Life-cycle stage for the entity
    fhir:AuditEvent.entity.securityLabel [ Coding ], ... ; # 0..* Security labels on the entity
    fhir:AuditEvent.entity.name [ string ]; # 0..1 Descriptor for entity
    fhir:AuditEvent.entity.description [ string ]; # 0..1 Descriptive text
    fhir:AuditEvent.entity.query [ base64Binary ]; # 0..1 Query parameters
    fhir:AuditEvent.entity.detail [ # 0..* Additional Information about the entity
      fhir:AuditEvent.entity.detail.type [ string ]; # 1..1 Name of the property
      # AuditEvent.entity.detail.value[x] : 1..1 Property value. One of these 2
        fhir:AuditEvent.entity.detail.valueString [ string ]
        fhir:AuditEvent.entity.detail.valueBase64Binary [ base64Binary ]
    ], ...;
  ], ...;
]

Changes since DSTU2

AuditEvent
AuditEvent.type
  • Added Element
AuditEvent.subtype
  • Added Element
AuditEvent.action
  • Added Element
AuditEvent.period
  • Added Element
AuditEvent.recorded
  • Added Element
AuditEvent.outcome
  • Added Element
AuditEvent.outcomeDesc
  • Added Element
AuditEvent.purposeOfEvent
  • Added Element
AuditEvent.agent
  • Renamed from participant to agent
AuditEvent.agent.type
  • Added Element
AuditEvent.agent.role
  • Remove Binding http://hl7.org/fhir/ValueSet/dicm-402-roleid (extensible)
AuditEvent.agent.reference
  • Add Reference(PractitionerRole)
AuditEvent.agent.purposeOfUse
  • Type changed from Coding to CodeableConcept
AuditEvent.entity
  • Renamed from object to entity
AuditEvent.entity.type
  • Change value set from http://hl7.org/fhir/ValueSet/object-type to http://hl7.org/fhir/ValueSet/audit-entity-type
AuditEvent.entity.lifecycle
  • Change value set from http://hl7.org/fhir/ValueSet/object-lifecycle to http://hl7.org/fhir/ValueSet/object-lifecycle-events
AuditEvent.entity.detail.value[x]
  • Renamed from value to value[x]
  • Add string
AuditEvent.event
  • deleted

See the Full Difference for further information

This analysis is available as XML or JSON.

See R2 <--> R3 Conversion Maps (status = 8 tests that all execute ok. All tests pass round-trip testing and all r3 resources are valid.).

Structure

NameFlagsCard.TypeDescription & Constraintsdoco
.. AuditEvent TUDomainResourceEvent record kept for security purposes
Elements defined in Ancestors: id, meta, implicitRules, language, text, contained, extension, modifierExtension
... type Σ1..1CodingType/identifier of event
Audit Event ID (Extensible)
... subtype Σ0..*CodingMore specific type/id for the event
Audit Event Sub-Type (Extensible)
... action Σ0..1codeType of action performed during the event
AuditEventAction (Required)
... period 0..1PeriodWhen the activity occurred
... recorded Σ1..1instantTime when the event occurred on source
... outcome Σ0..1codeWhether the event succeeded or failed
AuditEventOutcome (Required)
... outcomeDesc Σ0..1stringDescription of the event outcome
... purposeOfEvent Σ0..*CodeableConceptThe purposeOfUse of the event
PurposeOfUse (Extensible)
... agent 1..*BackboneElementActor involved in the event
.... type 0..1CodeableConceptHow agent participated
ParticipationRoleType (Extensible)
.... role 0..*CodeableConceptAgent role in the event
SecurityRoleType (Example)
.... reference Σ0..1Reference(PractitionerRole | Practitioner | Organization | Device | Patient | RelatedPerson)Direct reference to resource
.... userId Σ0..1IdentifierUnique identifier for the user
.... altId 0..1stringAlternative User id e.g. authentication
.... name 0..1stringHuman-meaningful name for the agent
.... requestor Σ1..1booleanWhether user is initiator
.... location 0..1Reference(Location)Where
.... policy 0..*uriPolicy that authorized event
.... media 0..1CodingType of media
Media Type Code (Extensible)
.... network 0..1BackboneElementLogical network location for application activity
..... address 0..1stringIdentifier for the network access point of the user device
..... type 0..1codeThe type of network access point
AuditEventAgentNetworkType (Required)
.... purposeOfUse 0..*CodeableConceptReason given for this user
PurposeOfUse (Extensible)
... source 1..1BackboneElementAudit Event Reporter
.... site 0..1stringLogical source location within the enterprise
.... identifier Σ1..1IdentifierThe identity of source detecting the event
.... type 0..*CodingThe type of source where event originated
Audit Event Source Type (Extensible)
... entity I0..*BackboneElementData or objects used
+ Either a name or a query (NOT both)
.... identifier Σ0..1IdentifierSpecific instance of object
.... reference Σ0..1Reference(Any)Specific instance of resource
.... type 0..1CodingType of entity involved
AuditEventEntityType (Extensible)
.... role 0..1CodingWhat role the entity played
AuditEventEntityRole (Extensible)
.... lifecycle 0..1CodingLife-cycle stage for the entity
ObjectLifecycleEvents (Extensible)
.... securityLabel 0..*CodingSecurity labels on the entity
All Security Labels (Extensible)
.... name ΣI0..1stringDescriptor for entity
.... description 0..1stringDescriptive text
.... query ΣI0..1base64BinaryQuery parameters
.... detail 0..*BackboneElementAdditional Information about the entity
..... type 1..1stringName of the property
..... value[x] 1..1Property value
...... valueStringstring
...... valueBase64Binarybase64Binary

doco Documentation for this format

UML Diagram (Legend)

AuditEvent (DomainResource)Identifier for a family of the event. For example, a menu item, program, rule, policy, function code, application name or URL. It identifies the performed functiontype : Coding [1..1] « Type of event. (Strength=Extensible)Audit Event ID+ »Identifier for the category of eventsubtype : Coding [0..*] « Sub-type of event. (Strength=Extensible)Audit Event Sub-Type+ »Indicator for type of action performed during the event that generated the auditaction : code [0..1] « Indicator for type of action performed during the event that generated the event (Strength=Required)AuditEventAction! »The period during which the activity occurredperiod : Period [0..1]The time when the event occurred on the sourcerecorded : instant [1..1]Indicates whether the event succeeded or failedoutcome : code [0..1] « Indicates whether the event succeeded or failed (Strength=Required)AuditEventOutcome! »A free text description of the outcome of the eventoutcomeDesc : string [0..1]The purposeOfUse (reason) that was used during the event being recordedpurposeOfEvent : CodeableConcept [0..*] « The reason the activity took place. (Strength=Extensible)PurposeOfUse+ »AgentSpecification of the participation type the user plays when performing the eventtype : CodeableConcept [0..1] « The Participation type of the agent to the event (Strength=Extensible)ParticipationRoleType+ »The security role that the user was acting under, that come from local codes defined by the access control security system (e.g. RBAC, ABAC) used in the local contextrole : CodeableConcept [0..*] « What security role enabled the agent to participate in the event (Strength=Example)SecurityRoleType?? »Direct reference to a resource that identifies the agentreference : Reference [0..1] « PractitionerRole|Practitioner| Organization|Device|Patient|RelatedPerson »Unique identifier for the user actively participating in the eventuserId : Identifier [0..1]Alternative agent Identifier. For a human, this should be a user identifier text string from authentication system. This identifier would be one known to a common authentication system (e.g. single sign-on), if availablealtId : string [0..1]Human-meaningful name for the agentname : string [0..1]Indicator that the user is or is not the requestor, or initiator, for the event being auditedrequestor : boolean [1..1]Where the event occurredlocation : Reference [0..1] « Location »The policy or plan that authorized the activity being recorded. Typically, a single activity may have multiple applicable policies, such as patient consent, guarantor funding, etc. The policy would also indicate the security token usedpolicy : uri [0..*]Type of media involved. Used when the event is about exporting/importing onto mediamedia : Coding [0..1] « Used when the event is about exporting/importing onto media. (Strength=Extensible)Media Type Code+ »The reason (purpose of use), specific to this agent, that was used during the event being recordedpurposeOfUse : CodeableConcept [0..*] « The reason the activity took place. (Strength=Extensible)PurposeOfUse+ »NetworkAn identifier for the network access point of the user device for the audit eventaddress : string [0..1]An identifier for the type of network access point that originated the audit eventtype : code [0..1] « The type of network access point of this agent in the audit event (Strength=Required)AuditEventAgentNetworkType! »SourceLogical source location within the healthcare enterprise network. For example, a hospital or other provider location within a multi-entity provider groupsite : string [0..1]Identifier of the source where the event was detectedidentifier : Identifier [1..1]Code specifying the type of source where event originatedtype : Coding [0..*] « Code specifying the type of system that detected and recorded the event. (Strength=Extensible)Audit Event Source Type+ »EntityIdentifies a specific instance of the entity. The reference should always be version specificidentifier : Identifier [0..1]Identifies a specific instance of the entity. The reference should be version specificreference : Reference [0..1] « Any »The type of the object that was involved in this audit eventtype : Coding [0..1] « Code for the entity type involved in the audit event (Strength=Extensible)AuditEventEntityType+ »Code representing the role the entity played in the event being auditedrole : Coding [0..1] « Code representing the role the entity played in the audit event (Strength=Extensible)AuditEventEntityRole+ »Identifier for the data life-cycle stage for the entitylifecycle : Coding [0..1] « Identifier for the data life-cycle stage for the entity (Strength=Extensible)ObjectLifecycleEvents+ »Security labels for the identified entitysecurityLabel : Coding [0..*] « Security Labels from the Healthcare Privacy and Security Classification System. (Strength=Extensible)All Security Labels+ »A name of the entity in the audit eventname : string [0..1]Text that describes the entity in more detaildescription : string [0..1]The query parameters for a query-type entitiesquery : base64Binary [0..1]DetailThe type of extra detail provided in the valuetype : string [1..1]The details valuevalue[x] : Type [1..1] « string|base64Binary »Logical network location for application activity, if the activity has a network locationnetwork[0..1]An actor taking an active role in the event or activity that is loggedagent[1..*]The system that is reporting the eventsource[1..1]Tagged value pairs for conveying additional information about the entitydetail[0..*]Specific instances of data or objects that have been accessedentity[0..*]

XML Template

<AuditEvent xmlns="http://hl7.org/fhir"> doco
 <!-- from Resource: id, meta, implicitRules, and language -->
 <!-- from DomainResource: text, contained, extension, and modifierExtension -->
 <type><!-- 1..1 Coding Type/identifier of event --></type>
 <subtype><!-- 0..* Coding More specific type/id for the event --></subtype>
 <action value="[code]"/><!-- 0..1 Type of action performed during the event -->
 <period><!-- 0..1 Period When the activity occurred --></period>
 <recorded value="[instant]"/><!-- 1..1 Time when the event occurred on source -->
 <outcome value="[code]"/><!-- 0..1 Whether the event succeeded or failed -->
 <outcomeDesc value="[string]"/><!-- 0..1 Description of the event outcome -->
 <purposeOfEvent><!-- 0..* CodeableConcept The purposeOfUse of the event --></purposeOfEvent>
 <agent>  <!-- 1..* Actor involved in the event -->
  <type><!-- 0..1 CodeableConcept How agent participated --></type>
  <role><!-- 0..* CodeableConcept Agent role in the event --></role>
  <reference><!-- 0..1 Reference(PractitionerRole|Practitioner|Organization|
    Device|Patient|RelatedPerson) Direct reference to resource --></reference>
  <userId><!-- 0..1 Identifier Unique identifier for the user --></userId>
  <altId value="[string]"/><!-- 0..1 Alternative User id e.g. authentication -->
  <name value="[string]"/><!-- 0..1 Human-meaningful name for the agent -->
  <requestor value="[boolean]"/><!-- 1..1 Whether user is initiator -->
  <location><!-- 0..1 Reference(Location) Where --></location>
  <policy value="[uri]"/><!-- 0..* Policy that authorized event -->
  <media><!-- 0..1 Coding Type of media --></media>
  <network>  <!-- 0..1 Logical network location for application activity -->
   <address value="[string]"/><!-- 0..1 Identifier for the network access point of the user device -->
   <type value="[code]"/><!-- 0..1 The type of network access point -->
  </network>
  <purposeOfUse><!-- 0..* CodeableConcept Reason given for this user --></purposeOfUse>
 </agent>
 <source>  <!-- 1..1 Audit Event Reporter -->
  <site value="[string]"/><!-- 0..1 Logical source location within the enterprise -->
  <identifier><!-- 1..1 Identifier The identity of source detecting the event --></identifier>
  <type><!-- 0..* Coding The type of source where event originated --></type>
 </source>
 <entity>  <!-- 0..* Data or objects used -->
  <identifier><!-- 0..1 Identifier Specific instance of object --></identifier>
  <reference><!-- 0..1 Reference(Any) Specific instance of resource --></reference>
  <type><!-- 0..1 Coding Type of entity involved --></type>
  <role><!-- 0..1 Coding What role the entity played --></role>
  <lifecycle><!-- 0..1 Coding Life-cycle stage for the entity --></lifecycle>
  <securityLabel><!-- 0..* Coding Security labels on the entity --></securityLabel>
  <name value="[string]"/><!-- ?? 0..1 Descriptor for entity -->
  <description value="[string]"/><!-- 0..1 Descriptive text -->
  <query value="[base64Binary]"/><!-- ?? 0..1 Query parameters -->
  <detail>  <!-- 0..* Additional Information about the entity -->
   <type value="[string]"/><!-- 1..1 Name of the property -->
   <value[x]><!-- 1..1 string|base64Binary Property value --></value[x]>
  </detail>
 </entity>
</AuditEvent>

JSON Template

{doco
  "resourceType" : "AuditEvent",
  // from Resource: id, meta, implicitRules, and language
  // from DomainResource: text, contained, extension, and modifierExtension
  "type" : { Coding }, // R!  Type/identifier of event
  "subtype" : [{ Coding }], // More specific type/id for the event
  "action" : "<code>", // Type of action performed during the event
  "period" : { Period }, // When the activity occurred
  "recorded" : "<instant>", // R!  Time when the event occurred on source
  "outcome" : "<code>", // Whether the event succeeded or failed
  "outcomeDesc" : "<string>", // Description of the event outcome
  "purposeOfEvent" : [{ CodeableConcept }], // The purposeOfUse of the event
  "agent" : [{ // R!  Actor involved in the event
    "type" : { CodeableConcept }, // How agent participated
    "role" : [{ CodeableConcept }], // Agent role in the event
    "reference" : { Reference(PractitionerRole|Practitioner|Organization|
    Device|Patient|RelatedPerson) }, // Direct reference to resource
    "userId" : { Identifier }, // Unique identifier for the user
    "altId" : "<string>", // Alternative User id e.g. authentication
    "name" : "<string>", // Human-meaningful name for the agent
    "requestor" : <boolean>, // R!  Whether user is initiator
    "location" : { Reference(Location) }, // Where
    "policy" : ["<uri>"], // Policy that authorized event
    "media" : { Coding }, // Type of media
    "network" : { // Logical network location for application activity
      "address" : "<string>", // Identifier for the network access point of the user device
      "type" : "<code>" // The type of network access point
    },
    "purposeOfUse" : [{ CodeableConcept }] // Reason given for this user
  }],
  "source" : { // R!  Audit Event Reporter
    "site" : "<string>", // Logical source location within the enterprise
    "identifier" : { Identifier }, // R!  The identity of source detecting the event
    "type" : [{ Coding }] // The type of source where event originated
  },
  "entity" : [{ // Data or objects used
    "identifier" : { Identifier }, // Specific instance of object
    "reference" : { Reference(Any) }, // Specific instance of resource
    "type" : { Coding }, // Type of entity involved
    "role" : { Coding }, // What role the entity played
    "lifecycle" : { Coding }, // Life-cycle stage for the entity
    "securityLabel" : [{ Coding }], // Security labels on the entity
    "name" : "<string>", // C? Descriptor for entity
    "description" : "<string>", // Descriptive text
    "query" : "<base64Binary>", // C? Query parameters
    "detail" : [{ // Additional Information about the entity
      "type" : "<string>", // R!  Name of the property
      // value[x]: Property value. One of these 2:
      "valueString" : "<string>"
      "valueBase64Binary" : "<base64Binary>"
    }]
  }]
}

Turtle Template

@prefix fhir: <http://hl7.org/fhir/> .doco


[ a fhir:AuditEvent;
  fhir:nodeRole fhir:treeRoot; # if this is the parser root

  # from Resource: .id, .meta, .implicitRules, and .language
  # from DomainResource: .text, .contained, .extension, and .modifierExtension
  fhir:AuditEvent.type [ Coding ]; # 1..1 Type/identifier of event
  fhir:AuditEvent.subtype [ Coding ], ... ; # 0..* More specific type/id for the event
  fhir:AuditEvent.action [ code ]; # 0..1 Type of action performed during the event
  fhir:AuditEvent.period [ Period ]; # 0..1 When the activity occurred
  fhir:AuditEvent.recorded [ instant ]; # 1..1 Time when the event occurred on source
  fhir:AuditEvent.outcome [ code ]; # 0..1 Whether the event succeeded or failed
  fhir:AuditEvent.outcomeDesc [ string ]; # 0..1 Description of the event outcome
  fhir:AuditEvent.purposeOfEvent [ CodeableConcept ], ... ; # 0..* The purposeOfUse of the event
  fhir:AuditEvent.agent [ # 1..* Actor involved in the event
    fhir:AuditEvent.agent.type [ CodeableConcept ]; # 0..1 How agent participated
    fhir:AuditEvent.agent.role [ CodeableConcept ], ... ; # 0..* Agent role in the event
    fhir:AuditEvent.agent.reference [ Reference(PractitionerRole|Practitioner|Organization|Device|Patient|RelatedPerson) ]; # 0..1 Direct reference to resource
    fhir:AuditEvent.agent.userId [ Identifier ]; # 0..1 Unique identifier for the user
    fhir:AuditEvent.agent.altId [ string ]; # 0..1 Alternative User id e.g. authentication
    fhir:AuditEvent.agent.name [ string ]; # 0..1 Human-meaningful name for the agent
    fhir:AuditEvent.agent.requestor [ boolean ]; # 1..1 Whether user is initiator
    fhir:AuditEvent.agent.location [ Reference(Location) ]; # 0..1 Where
    fhir:AuditEvent.agent.policy [ uri ], ... ; # 0..* Policy that authorized event
    fhir:AuditEvent.agent.media [ Coding ]; # 0..1 Type of media
    fhir:AuditEvent.agent.network [ # 0..1 Logical network location for application activity
      fhir:AuditEvent.agent.network.address [ string ]; # 0..1 Identifier for the network access point of the user device
      fhir:AuditEvent.agent.network.type [ code ]; # 0..1 The type of network access point
    ];
    fhir:AuditEvent.agent.purposeOfUse [ CodeableConcept ], ... ; # 0..* Reason given for this user
  ], ...;
  fhir:AuditEvent.source [ # 1..1 Audit Event Reporter
    fhir:AuditEvent.source.site [ string ]; # 0..1 Logical source location within the enterprise
    fhir:AuditEvent.source.identifier [ Identifier ]; # 1..1 The identity of source detecting the event
    fhir:AuditEvent.source.type [ Coding ], ... ; # 0..* The type of source where event originated
  ];
  fhir:AuditEvent.entity [ # 0..* Data or objects used
    fhir:AuditEvent.entity.identifier [ Identifier ]; # 0..1 Specific instance of object
    fhir:AuditEvent.entity.reference [ Reference(Any) ]; # 0..1 Specific instance of resource
    fhir:AuditEvent.entity.type [ Coding ]; # 0..1 Type of entity involved
    fhir:AuditEvent.entity.role [ Coding ]; # 0..1 What role the entity played
    fhir:AuditEvent.entity.lifecycle [ Coding ]; # 0..1 Life-cycle stage for the entity
    fhir:AuditEvent.entity.securityLabel [ Coding ], ... ; # 0..* Security labels on the entity
    fhir:AuditEvent.entity.name [ string ]; # 0..1 Descriptor for entity
    fhir:AuditEvent.entity.description [ string ]; # 0..1 Descriptive text
    fhir:AuditEvent.entity.query [ base64Binary ]; # 0..1 Query parameters
    fhir:AuditEvent.entity.detail [ # 0..* Additional Information about the entity
      fhir:AuditEvent.entity.detail.type [ string ]; # 1..1 Name of the property
      # AuditEvent.entity.detail.value[x] : 1..1 Property value. One of these 2
        fhir:AuditEvent.entity.detail.valueString [ string ]
        fhir:AuditEvent.entity.detail.valueBase64Binary [ base64Binary ]
    ], ...;
  ], ...;
]

Changes since DSTU2

AuditEvent
AuditEvent.type
  • Added Element
AuditEvent.subtype
  • Added Element
AuditEvent.action
  • Added Element
AuditEvent.period
  • Added Element
AuditEvent.recorded
  • Added Element
AuditEvent.outcome
  • Added Element
AuditEvent.outcomeDesc
  • Added Element
AuditEvent.purposeOfEvent
  • Added Element
AuditEvent.agent
  • Renamed from participant to agent
AuditEvent.agent.type
  • Added Element
AuditEvent.agent.role
  • Remove Binding http://hl7.org/fhir/ValueSet/dicm-402-roleid (extensible)
AuditEvent.agent.reference
  • Add Reference(PractitionerRole)
AuditEvent.agent.purposeOfUse
  • Type changed from Coding to CodeableConcept
AuditEvent.entity
  • Renamed from object to entity
AuditEvent.entity.type
  • Change value set from http://hl7.org/fhir/ValueSet/object-type to http://hl7.org/fhir/ValueSet/audit-entity-type
AuditEvent.entity.lifecycle
  • Change value set from http://hl7.org/fhir/ValueSet/object-lifecycle to http://hl7.org/fhir/ValueSet/object-lifecycle-events
AuditEvent.entity.detail.value[x]
  • Renamed from value to value[x]
  • Add string
AuditEvent.event
  • deleted

See the Full Difference for further information

This analysis is available as XML or JSON.

See R2 <--> R3 Conversion Maps (status = 8 tests that all execute ok. All tests pass round-trip testing and all r3 resources are valid.).

 

Alternate definitions: Master Definition (XML, JSON), XML Schema/Schematron + JSON Schema, ShEx (for Turtle) + see the extensions & the dependency analysis

PathDefinitionTypeReference
AuditEvent.type Type of event.ExtensibleAudit Event ID
AuditEvent.subtype Sub-type of event.ExtensibleAudit Event Sub-Type
AuditEvent.action Indicator for type of action performed during the event that generated the eventRequiredAuditEventAction
AuditEvent.outcome Indicates whether the event succeeded or failedRequiredAuditEventOutcome
AuditEvent.purposeOfEvent
AuditEvent.agent.purposeOfUse
The reason the activity took place.ExtensiblePurposeOfUse
AuditEvent.agent.type The Participation type of the agent to the eventExtensibleParticipationRoleType
AuditEvent.agent.role What security role enabled the agent to participate in the eventExampleSecurityRoleType
AuditEvent.agent.media Used when the event is about exporting/importing onto media.ExtensibleMedia Type Code
AuditEvent.agent.network.type The type of network access point of this agent in the audit eventRequiredAuditEventAgentNetworkType
AuditEvent.source.type Code specifying the type of system that detected and recorded the event.ExtensibleAudit Event Source Type
AuditEvent.entity.type Code for the entity type involved in the audit eventExtensibleAuditEventEntityType
AuditEvent.entity.role Code representing the role the entity played in the audit eventExtensibleAuditEventEntityRole
AuditEvent.entity.lifecycle Identifier for the data life-cycle stage for the entityExtensibleObjectLifecycleEvents
AuditEvent.entity.securityLabel Security Labels from the Healthcare Privacy and Security Classification System.ExtensibleAll Security Labels

  • sev-1: On AuditEvent.entity: Either a name or a query (NOT both) (expression on AuditEvent.entity: name.empty() or query.empty())

The AuditEvent resource and the ATNA Audit record are used in many contexts throughout healthcare. The coded values defined in the "extensible" bindings above are those widely used and/or defined by DICOM, IHE or ISO, who defined these codes to meet very specific use cases. These codes should be used when they are suitable. When needed, other codes can be defined.

Note: When using codes from a vocabulary, the displayName can be left off to keep the AuditEvent size small and minimize impact of a large audit log of similar entries.

The set of codes defined for this resource is expected to grow over time, and additional codes may be proposed / requested using the "Propose a change" link above below.

This table summarizes common event scenarios, and the codes that should be used for each case.

ScenariotypesubtypeactionOther
User Login (example)110114 User Authentication110122 User Authentication E ExecuteOne participant which contains the details of the logged-in user.
User Logout (example)110114 User Authentication110123 User Logout E ExecuteOne participant which contains the details of the logged-out user.
REST operation logged on server (example)rest RESTful Operation[code] defined for operation * (see below)Participant for logged in user, if available, and one object with a reference, if at least the type is known as part of the operation. Reference.url should be provided to the granularity known.
Search operation logged on server (example)rest RESTful Operation[code] defined for operation E ExecuteParticipant for logged in user, if available, and one object with a query element.

Audit Event Actions for RESTful operations:

OperationAction
createC
read, vread, history-instance, history-type, history-systemR
updateU
deleteD
transaction, operation, conformance, validate, search, search-type, search-systemE

FHIR interactions can result in a rich description of the outcome using the OperationOutcome. The OperationOutcome Resource is a collection of error, warning or information messages that result from a system action. This describes in detail the outcome of some operation, such as when an RESTful operation fails.

When recording into an AuditEvent that some FHIR interaction has happened, the AuditEvent should include the OperationOutcome from that FHIR interaction. This is done by placing the OperationOutcome into an AuditEvent.entity. Likely as a contained resource, given that OperationOutcome resources often are not persisted.

entity.reference is the OperationOutcome -- Likely contained

entity.type is code OperationOutcome

entity.description explains why this OperationOutcome was included.

See transaction failure example: When a client attempts to post (create) a Observation Resource, using a server Patient endpoint; this would result in an error with an OperationOutcome.

The audit event provides the element purposeOfEvent to convey the purpose of the event and purposeOfUse to convey the reason that a particular actor (machine, person, software) was involved in the event.

purposeOfEvent is an element at the level of AuditEvent and can convey the purpose of the activity that resulted in the event. This will occur when the system that is reporting the event is be aware of the purpose of the event. A specific example would be a radiology reporting system where a radiologist has created and is sending a finished report. This system likely knows the purpose, e.g., "treatment". It is multi-valued because the one event may be related to multiple purposes.

It is also commonplace that the reporting system does not have information about the purpose of the event. In these cases, the event report would not have a purposeOfEvent.

It is also likely that the same event will be reported from different perspectives, e.g., by both the sender and recipient of a communication. These two different perspectives can have different knowledge regarding the purposeOfEvent.

purposeOfUse is an element at the level of agent within AuditEvent. This describes the reason that this person, machine, or software is participating in the activity that resulted in the event. For example, an individual person participating in the event may assert a purpose of use from their perspective. It is also possible that they are participating for multiple reasons, and report multiple purposeOfUse.

The reporting system might not have knowledge regarding why a particular machine or person was involved, and would omit this element in those cases.

When the same event is reported from multiple perspectives, the reports can have different knowledge regarding the purpose.

Search parameters for this resource. The common parameters also apply. See Searching for more information about searching in REST, messaging, and services.

NameTypeDescriptionExpressionIn Common
actiontokenType of action performed during the eventAuditEvent.action
addressstringIdentifier for the network access point of the user deviceAuditEvent.agent.network.address
agentreferenceDirect reference to resourceAuditEvent.agent.reference
(Practitioner, Organization, Device, Patient, PractitionerRole, RelatedPerson)
agent-namestringHuman-meaningful name for the agentAuditEvent.agent.name
agent-roletokenAgent role in the eventAuditEvent.agent.role
altidtokenAlternative User id e.g. authenticationAuditEvent.agent.altId
datedateTime when the event occurred on sourceAuditEvent.recorded
entityreferenceSpecific instance of resourceAuditEvent.entity.reference
(Any)
entity-idtokenSpecific instance of objectAuditEvent.entity.identifier
entity-namestringDescriptor for entityAuditEvent.entity.name
entity-roletokenWhat role the entity playedAuditEvent.entity.role
entity-typetokenType of entity involvedAuditEvent.entity.type
outcometokenWhether the event succeeded or failedAuditEvent.outcome
patientreferenceDirect reference to resourceAuditEvent.agent.reference | AuditEvent.entity.reference
(Patient)
policyuriPolicy that authorized eventAuditEvent.agent.policy
sitetokenLogical source location within the enterpriseAuditEvent.source.site
sourcetokenThe identity of source detecting the eventAuditEvent.source.identifier
subtypetokenMore specific type/id for the eventAuditEvent.subtype
typetokenType/identifier of eventAuditEvent.type
usertokenUnique identifier for the userAuditEvent.agent.userId