This page is part of the FHIR Specification (v0.0.82: DSTU 1). The current version which supercedes this version is 5.0.0. For a full list of available versions, see the Directory of published versions

6.7 Resource SecurityEvent - Content

A record of an event made for purposes of maintaining a security log. Typical uses include detection of intrusion attempts and monitoring for inappropriate usage.

6.7.1 Scope and Usage

The security event is based on the ATNA Audit record definitions, originally from RFC 3881, and now managed by DICOM (see DICOM Part 15 Annex A5). This resource is managed collaboratively between HL7, DICOM, and IHE for the MHD/mHealth initiatives.

The primary purpose of this resource is the maintenance of audit log information. However, it can also be used for simple event-based notification or even general indexing of resources stored in a variety of repositories.

6.7.2 Background and Context

Servers that provide support for Security Event resources should not generally accept update or delete operations on the resources, as this would compromise the integrity of the audit record.

Security Events are created as events occur, to track and audit the events. Security Event resources are often (though not exclusively) created by the application responding to the read/query/create/update etc. event. A Provenance resource contains overlapping information, but is a record-keeping assertion that gathers information about the context in which the information in a resource was obtained. Provenance resources are prepared by the application that initiates the create/update etc. of the resource.

6.7.3 Resource Content

SecurityEvent (Resource)EventIdentifier for a family of the eventtype : CodeableConcept 1..1 <<Type of eventSecurityEventType>>Identifier for the category of eventsubtype : CodeableConcept 0..* <<Sub-type of eventSecurityEventSubType>>Indicator for type of action performed during the event that generated the auditaction : code 0..1 <<Indicator for type of action performed during the event that generated the audit.SecurityEventAction>>The time when the event occurred on the sourcedateTime : instant 1..1Indicates whether the event succeeded or failedoutcome : code 0..1 <<Indicates whether the event succeeded or failedSecurityEventOutcome>>A free text description of the outcome of the eventoutcomeDesc : string 0..1ParticipantSpecification of the role(s) the user plays when performing the event. Usually the codes used in this element are local codes defined by the role-based access control security system used in the local contextrole : CodeableConcept 0..* <<Role(s) the user plays (from RBAC)DICOMRoleId>>Direct reference to a resource that identifies the participantreference : Resource(Practitioner|Patient|Device) 0..1Unique identifier for the user actively participating in the eventuserId : string 0..1Alternative Participant Identifier. For a human, this should be a user identifier text string from authentication system. This identifier would be one known to a common authentication system (e.g., single sign-on), if availablealtId : string 0..1Human-meaningful name for the username : string 0..1Indicator that the user is or is not the requestor, or initiator, for the event being auditedrequestor : boolean 1..1Type of media involved. Used when the event is about exporting/importing onto mediamedia : Coding 0..1NetworkAn identifier for the network access point of the user device for the audit eventidentifier : string 0..1An identifier for the type of network access point that originated the audit eventtype : code 0..1 <<The type of network access point that originated the audit eventSecurityEventParticipantNetworkType>>SourceLogical source location within the healthcare enterprise networksite : string 0..1Identifier of the source where the event originatedidentifier : string 1..1Code specifying the type of source where event originatedtype : Coding 0..* <<Code specifying the type of source where event originatedSecurityEventSourceType>>ObjectIdentifies a specific instance of the participant object. The reference should always be version specificidentifier : Identifier 0..1Identifies a specific instance of the participant object. The reference should always be version specificreference : Resource(Any) 0..1Object type being auditedtype : code 0..1 <<Code for the participant object type being auditedSecurityEventObjectType>>Code representing the functional application role of Participant Object being auditedrole : code 0..1 <<Code representing the functional application role of Participant Object being auditedSecurityEventObjectRole>>Identifier for the data life-cycle stage for the participant objectlifecycle : code 0..1 <<Identifier for the data life-cycle stage for the participant objectSecurityEventObjectLifecycle>>Denotes policy-defined sensitivity for the Participant Object ID such as VIP, HIV status, mental health status or similar topicssensitivity : CodeableConcept 0..1 <<The sensitivity of an object in a security event resource. May also encompass confidentiality and rudimentary access controlSecurityEventObjectSensitivity>>An instance-specific descriptor of the Participant Object ID audited, such as a person's namename : string 0..1Text that describes the object in more detaildescription : string 0..1The actual query for a query-type participant objectquery : base64Binary 0..1DetailName of the propertytype : string 1..1Property valuevalue : base64Binary 1..1Identifies the name, action type, time, and disposition of the audited eventevent1..1Logical network location for application activity, if the activity has a network locationnetwork0..1A person, a hardware device or software processparticipant1..*Application systems and processessource1..1Additional Information about the Objectdetail0..*Specific instances of data or objects that have been accessedobject0..*
<SecurityEvent xmlns="http://hl7.org/fhir"> doco
 <!-- from Resource: extension, modifierExtension, language, text, and contained -->
 <event>  <!-- 1..1 What was done -->
  <type><!-- 1..1 CodeableConcept Type/identifier of event --></type>
  <subtype><!-- 0..* CodeableConcept More specific type/id for the event --></subtype>
  <action value="[code]"/><!-- 0..1 Type of action performed during the event -->
  <dateTime value="[instant]"/><!-- 1..1 Time when the event occurred on source -->
  <outcome value="[code]"/><!-- 0..1 Whether the event succeeded or failed -->
  <outcomeDesc value="[string]"/><!-- 0..1 Description of the event outcome -->
 </event>
 <participant>  <!-- 1..* A person, a hardware device or software process -->
  <role><!-- 0..* CodeableConcept User roles (e.g. local RBAC codes) --></role>
  <reference><!-- ?? 0..1 Resource(Practitioner|Patient|Device) Direct reference to resource --></reference>
  <userId value="[string]"/><!-- ?? 0..1 Unique identifier for the user -->
  <altId value="[string]"/><!-- 0..1 Alternative User id e.g. authentication -->
  <name value="[string]"/><!-- 0..1 Human-meaningful name for the user -->
  <requestor value="[boolean]"/><!-- 1..1 Whether user is initiator -->
  <media><!-- 0..1 Coding Type of media --></media>
  <network>  <!-- 0..1 Logical network location for application activity -->
   <identifier value="[string]"/><!-- 0..1 Identifier for the network access point of the user device -->
   <type value="[code]"/><!-- 0..1 The type of network access point -->
  </network>
 </participant>
 <source>  <!-- 1..1 Application systems and processes -->
  <site value="[string]"/><!-- 0..1 Logical source location within the enterprise -->
  <identifier value="[string]"/><!-- 1..1 The id of source where event originated -->
  <type><!-- 0..* Coding The type of source where event originated --></type>
 </source>
 <object>  <!-- 0..* Specific instances of data or objects that have been accessed -->
  <identifier><!-- ?? 0..1 Identifier Specific instance of object (e.g. versioned) --></identifier>
  <reference><!-- ?? 0..1 Resource(Any) Specific instance of resource (e.g. versioned) --></reference>
  <type value="[code]"/><!-- 0..1 Object type being audited -->
  <role value="[code]"/><!-- 0..1 Functional application role of Object -->
  <lifecycle value="[code]"/><!-- 0..1 Life-cycle stage for the object -->
  <sensitivity><!-- 0..1 CodeableConcept Policy-defined sensitivity for the object --></sensitivity>
  <name value="[string]"/><!-- ?? 0..1 Instance-specific descriptor for Object -->
  <description value="[string]"/><!-- 0..1 Descriptive text -->
  <query value="[base64Binary]"/><!-- ?? 0..1 Actual query for object -->
  <detail>  <!-- 0..* Additional Information about the Object -->
   <type value="[string]"/><!-- 1..1 Name of the property -->
   <value value="[base64Binary]"/><!-- 1..1 Property value -->
  </detail>
 </object>
</SecurityEvent>

Alternate definitions: Schema/Schematron, Resource Profile

6.7.3.1 Terminology Bindings

PathDefinitionTypeReference
SecurityEvent.event.type Type of eventIncompletehttp://hl7.org/fhir/vs/security-event-type
SecurityEvent.event.subtype Sub-type of eventIncompletehttp://hl7.org/fhir/vs/security-event-sub-type
SecurityEvent.event.action Indicator for type of action performed during the event that generated the audit.Fixedhttp://hl7.org/fhir/security-event-action
SecurityEvent.event.outcome Indicates whether the event succeeded or failedFixedhttp://hl7.org/fhir/security-event-outcome
SecurityEvent.participant.role Role(s) the user plays (from RBAC)Incompletehttp://hl7.org/fhir/vs/dicm-402-roleid
SecurityEvent.participant.network.type The type of network access point that originated the audit eventFixedhttp://hl7.org/fhir/network-type
SecurityEvent.source.type Code specifying the type of source where event originatedIncompletehttp://hl7.org/fhir/vs/security-source-type
SecurityEvent.object.type Code for the participant object type being auditedFixedhttp://hl7.org/fhir/object-type
SecurityEvent.object.role Code representing the functional application role of Participant Object being auditedFixedhttp://hl7.org/fhir/object-role
SecurityEvent.object.lifecycle Identifier for the data life-cycle stage for the participant objectFixedhttp://hl7.org/fhir/object-lifecycle
SecurityEvent.object.sensitivity The sensitivity of an object in a security event resource. May also encompass confidentiality and rudimentary access controlExamplehttp://hl7.org/fhir/vs/security-event-sensitivity

6.7.3.2 Constraints

6.7.3.3 Using Coded Values

The security event resource and the ATNA Audit record are used in many contexts through healthcare. The coded values defined in the "extensible" bindings above are those widely used and/or defined by DICOM, IHE or ISO, who all defined these codes to meet very specific use cases. These codes should be used when the are suitable, or other codes can be defined.

The set of codes defined for this resource are expected to grow over time, and additional codes may be proposed / requested using the community input link above.

6.7.3.4 Event codes for Common Scenarios

This table summarizes common event scenarios, and the codes that should be used for each case.

ScenariotypesubtypeactionOther
User Login (example)110114 User Authentication110122 User Authentication E ExecuteOne participant which contains the details of the logged in user
OAuth based User Login 110114 User Authentication110122 User Authentication E Executetodo
User Logout (example)110114 User Authentication110123 User Logout E ExecuteOne participant which contains the details of the logged out user
REST operation logged on server (example)rest RESTful Operation[code] defined for operation * (see below)Participant for logged in user, if available, and one object with a reference if at least the type is known as part of the operation. Reference.url should be provided to the granularity known

Security Event Actions for RESTful operations:

OperationAction
create C
read, vread, tags-get, history-instance, history-type, history-system R
update, tags-update U
delete, tags-delete D
search, validate, transaction, conformance, mailbox E

6.7.4 Search Parameters

Search parameters for this resource. The standard parameters also apply. See Searching for more information about searching in REST, messaging, and services.

NameTypeDescriptionPaths
_idtokenThe logical resource id associated with the resource (must be supported by all servers)
_languagetokenThe language of the resource
actiontokenType of action performed during the eventSecurityEvent.event.action
addresstokenIdentifier for the network access point of the user deviceSecurityEvent.participant.network.identifier
altidtokenAlternative User id e.g. authenticationSecurityEvent.participant.altId
datedateTime when the event occurred on sourceSecurityEvent.event.dateTime
descstringInstance-specific descriptor for ObjectSecurityEvent.object.name
identitytokenSpecific instance of object (e.g. versioned)SecurityEvent.object.identifier
namestringHuman-meaningful name for the userSecurityEvent.participant.name
object-typetokenObject type being auditedSecurityEvent.object.type
patientidtokenThe id of the patient (one of multiple kinds of participations)
referencereferenceSpecific instance of resource (e.g. versioned)SecurityEvent.object.reference
(Any)
sitetokenLogical source location within the enterpriseSecurityEvent.source.site
sourcetokenThe id of source where event originatedSecurityEvent.source.identifier
subtypetokenMore specific type/id for the eventSecurityEvent.event.subtype
typetokenType/identifier of eventSecurityEvent.event.type
usertokenUnique identifier for the userSecurityEvent.participant.userId

comments powered by Disqus