This page is part of the FHIR Specification (v0.06: DSTU 1 Ballot 2). The current version which supercedes this version is 5.0.0. For a full list of available versions, see the Directory of published versions

Resource SecurityEvent - Formal Definitions 3.16.4

The formal definitions for the elements in the securityevent resource. Also available as an XML file.

SecurityEvent
DefinitionA record of an event
Control1..1
CommentsBased on ATNA (RFC 3881)
SecurityEvent.event
Definitionidentifies the name, action type, time, and disposition of the audited event
Control1..1
SecurityEvent.event.id
DefinitionIdentifier for a specific audited event
Control1..1
TypeCoding
RequirementsThis identifies the audited function. For "Execute" Event Action Code audit records, this identifies the application function performed.
Commentse.g., a menu item, program, rule, policy, function code, application name, or URL. It identifies the performed function
SecurityEvent.event.action
DefinitionIndicator for type of action performed during the event that generated the audit
Control0..1
Typecode from SecurityEventEventAction
RequirementsThis broadly indicates what kind of action was done on the Participant Object
SecurityEvent.event.dateTime
DefinitionThe time when the event occurred on the source
Control1..1
Typeinstant
RequirementsThis ties an event to a specific date and time. Security audits typically require a consistent time base, e.g., UTC, to eliminate time-zone issues arising from geographical distribution
CommentsIn a distributed system, some sort of common time base, e.g., an NTP [RFC1305] server, is a good implementation tactic
SecurityEvent.event.outcome
DefinitionIndicates whether the event succeeded or failed
Control1..1
Typecode from SecurityEventEventOutcome
CommentsIn some cases a "success" may be partial, for example, an incomplete or interrupted transfer of a radiological study. For the purpose of establishing accountability, these distinctions are not relevant
SecurityEvent.event.code
DefinitionIdentifier for the category of event
Control0..*
TypeCoding
RequirementsThis field enables queries of messages by implementation-defined event categories
SecurityEvent.participant
Definitiona person, or a hardware device or software process
Control0..*
CommentsThere may be more than one user per event, for example, in cases of actions initiated by one user for other users, or in events that involve more than one user, hardware device, or system process. However, only one user may be the initiator/requestor for the event
SecurityEvent.participant.userId
DefinitionUnique identifier for the user actively participating in the event
Control1..1
Typestring
RequirementsThis field ties an audit event to a specific user
Commentsa unique value within the Audit Source ID. For node-based authentication -- where only the system hardware or process, but not a human user, is identified -- User ID would be the node name
SecurityEvent.participant.otherUserId
DefinitionUser identifier text string from authentication system. This identifier would be one known to a common authentication system (e.g., single sign-on), if available
Control0..1
Typestring
RequirementsIn some situations a user may authenticate with one identity but, to access a specific application system, may use a synonymous identify. For example, some "single sign on" implementations will do this. The alternative identifier would then be the original identify used for authentication, and the User ID is the one known to and used by the application
SecurityEvent.participant.name
Definitionhuman-meaningful name for the user
Control0..1
Typestring
RequirementsThe User ID and Alternative User ID may be internal or otherwise obscure values. This field assists the auditor in identifying the actual user
SecurityEvent.participant.requestor
DefinitionIndicator that the user is or is not the requestor, or initiator, for the event being audited.
Control1..1
Typeboolean
RequirementsThis value is used to distinguish between requestor-users and recipient-users. For example, one person may initiate a report-output to be sent to a another user
SecurityEvent.participant.role
DefinitionSpecification of the role(s) the user plays when performing the event, as assigned in role-based access control security
Control0..*
TypeCoding
RequirementsThis value ties an audited event to a user's role(s). It is an optional value that might be used to group events for analysis by user functional role categories
SecurityEvent.participant.network
Definitionlogical network location for application activity
Control0..1
SecurityEvent.participant.network.type
DefinitionAn identifier for the type of network access point that originated the audit event
Control0..1
Typecode from SecurityEventParticipantNetworkType
RequirementsThis datum identifies the type of network access point identifier of the user device for the audit event. It is an optional value that may be used to group events recorded on separate servers for analysis of access according to a network access point's type
SecurityEvent.participant.network.id
DefinitionAn identifier for the network access point of the user device for the audit event
Control0..1
Typestring
RequirementsThis datum identifies the user's network access point, which may be distinct from the server that performed the action. It is an optional value that may be used to group events recorded on separate servers for analysis of a specific network access point's data access across all servers
CommentsThis could be a device id, IP address, or some other identifier associated with a device
SecurityEvent.source
Definitionapplication systems and processes
Control0..*
CommentsSince multi-tier, distributed, or composite applications make source identification ambiguous, this collection of fields may repeat for each application or process actively involved in the event. For example, multiple value-sets can identify participating web servers, application processes, and database server threads in an n-tier distributed application. Passive event participants, e.g., low-level network transports, need not be identified
SecurityEvent.source.site
DefinitionLogical source location within the healthcare enterprise network
Control0..1
Typestring
RequirementsThis value differentiates among the sites in a multi-site enterprise health information system
Commentsa hospital or other provider location within a multi-entity provider group
SecurityEvent.source.id
DefinitionIdentifier of the source where the event originated
Control1..1
Typestring
RequirementsThis field ties the event to a specific source system. It may be used to group events for analysis according to where the event occurred
SecurityEvent.source.type
DefinitionCode specifying the type of source where event originated
Control0..*
TypeCoding from SecurityEventSourceType
RequirementsThis field indicates which type of source is identified by the Audit Source ID. It is an optional value that may be used to group events for analysis according to the type of source where the event occurred
SecurityEvent.object
Definitionspecific instances of data or objects that have been accessed
Control0..*
Commentsrequired unless the values for Event Identification, Active Participant Identification, and Audit Source Identification are sufficient to document the entire auditable event. Because events may have more than one participant object, this group can be a repeating set of values.
SecurityEvent.object.type
Definitionobject type being audited
Control0..1
Typecode from SecurityEventObjectType
RequirementsTo describe the object being acted upon. In addition to queries on the subject of the action in an auditable event, it is also important to be able to query on the object type for the action
CommentsThis value is distinct from the user's role or any user relationship to the participant object
SecurityEvent.object.role
DefinitionCode representing the functional application role of Participant Object being audited
Control0..1
Typecode from SecurityEventObjectRole
RequirementsFor some detailed audit analysis it may be necessary to indicate a more granular type of participant, based on the application role it serves
CommentsSee Rfc 3881 for rules concerning matches between role and type
SecurityEvent.object.lifecycle
DefinitionIdentifier for the data life-cycle stage for the participant object
Control0..1
Typecode from SecurityEventObjectLifecycle
RequirementsInstitutional policies for privacy and security may optionally fall under different accountability rules based on data life cycle. This provides a differentiating value for those cases
CommentsThis can be used to provide an audit trail for data, over time, as it passes through the system
SecurityEvent.object.idType
DefinitionDescribes the identifier that is contained in Participant Object ID
Control1..1
TypeCoding from SecurityEventObjectIdType
SecurityEvent.object.id
DefinitionIdentifies a specific instance of the participant object
Control1..1
Typestring
CommentsValue format depends on Participant Object Type Code and the Participant Object ID Type Code
SecurityEvent.object.sensitivity
DefinitionDenotes policy-defined sensitivity for the Participant Object ID such as VIP, HIV status, mental health status, or similar topics
Control0..1
Typestring
RequirementsThis field identifies a specific instance of an object, such as a patient, to detect/track privacy and security issues
CommentsValues are institution- and implementation-defined text strings
SecurityEvent.object.name
DefinitionAn instance-specific descriptor of the Participant Object ID audited, such as a person's name
Control0..1
Typestring
CommentsThis field may be used in a query/report to identify audit events for a specific person, e.g., where multiple synonymous Participant Object IDs (patient number, medical record number, encounter number, etc.) have been used
SecurityEvent.object.query
DefinitionThe actual query for a query-type participant object
Control0..1
Typebase64Binary
RequirementsFor query events it may be necessary to capture the actual query input to the query process in order to identify the specific event. Because of differences among query implementations and data encoding for them, this is a base 64 encoded data blob. It may be subsequently decoded or interpreted by downstream audit analysis processing
SecurityEvent.extension
DefinitionSee Extensions
Control0..*
TypeExtension
RIM Mapping[varies]
SecurityEvent.text
DefinitionText summary of resource (for human interpretation)
Control1..1
TypeNarrative

This is an old version of FHIR retained for archive purposes. Do not use for anything else
Implementers are welcome to experiment with the content defined here, but should note that the contents are subject to change without prior notice.
© HL7.org 2011 - 2012. FHIR v0.06 generated on Tue, Dec 4, 2012 00:03+1100. License