ISO 17090-1:2008
(Main)Health informatics — Public key infrastructure — Part 1: Overview of digital certificate services
Health informatics — Public key infrastructure — Part 1: Overview of digital certificate services
ISO 17090-1:2008 defines the basic concepts underlying use of digital certificates in healthcare and provides a scheme of interoperability requirements to establish a digital certificate-enabled secure communication of health information. It also identifies the major stakeholders who are communicating health-related information, as well as the main security services required for health communication where digital certificates may be required. ISO 17090-1:2008 gives a brief introduction to public key cryptography and the basic components needed to deploy digital certificates in healthcare. It further introduces different types of digital certificate — identity certificates and associated attribute certificates for relying parties, self-signed certification authority (CA) certificates, and CA hierarchies and bridging structures.
Informatique de santé — Infrastructure de clé publique — Partie 1: Vue d'ensemble des services de certificat numérique
General Information
Relations
Standards Content (Sample)
INTERNATIONAL ISO
STANDARD 17090-1
First edition
2008-02-15
Health informatics — Public key
infrastructure —
Part 1:
Overview of digital certificate services
Informatique de santé — Infrastructure de clé publique —
Partie 1: Vue d'ensemble des services de certificat numérique
Reference number
ISO 17090-1:2008(E)
©
ISO 2008
---------------------- Page: 1 ----------------------
ISO 17090-1:2008(E)
PDF disclaimer
This PDF file may contain embedded typefaces. In accordance with Adobe's licensing policy, this file may be printed or viewed but
shall not be edited unless the typefaces which are embedded are licensed to and installed on the computer performing the editing. In
downloading this file, parties accept therein the responsibility of not infringing Adobe's licensing policy. The ISO Central Secretariat
accepts no liability in this area.
Adobe is a trademark of Adobe Systems Incorporated.
Details of the software products used to create this PDF file can be found in the General Info relative to the file; the PDF-creation
parameters were optimized for printing. Every care has been taken to ensure that the file is suitable for use by ISO member bodies. In
the unlikely event that a problem relating to it is found, please inform the Central Secretariat at the address given below.
COPYRIGHT PROTECTED DOCUMENT
© ISO 2008
All rights reserved. Unless otherwise specified, no part of this publication may be reproduced or utilized in any form or by any means,
electronic or mechanical, including photocopying and microfilm, without permission in writing from either ISO at the address below or
ISO's member body in the country of the requester.
ISO copyright office
Case postale 56 • CH-1211 Geneva 20
Tel. + 41 22 749 01 11
Fax + 41 22 749 09 47
E-mail copyright@iso.org
Web www.iso.org
Published in Switzerland
ii © ISO 2008 – All rights reserved
---------------------- Page: 2 ----------------------
ISO 17090-1:2008(E)
Contents Page
Foreword. iv
Introduction . v
1 Scope . 1
2 Normative references . 1
3 Terms and definitions. 2
3.1 Healthcare context terms. 2
3.2 Security services terms . 3
3.3 Public key infrastructure related terms. 6
4 Abbreviations . 9
5 Healthcare context. 10
5.1 Certificate holders and relying parties in healthcare. 10
5.2 Examples of actors. 10
5.3 Applicability of digital certificates to healthcare.12
6 Requirements for security services in healthcare applications . 12
6.1 Healthcare characteristics . 12
6.2 Digital certificate technical requirements in healthcare . 13
6.3 Separation of authentication from encipherment . 14
6.4 Health industry security management framework for digital certificates. 15
6.5 Policy requirements for digital certificate issuance and use in healthcare . 15
7 Public key cryptography . 15
7.1 Symmetric vs asymmetric cryptography . 15
7.2 Digital certificates. 16
7.3 Digital signatures. 16
7.4 Protecting the private key. 16
8 Deploying digital certificates. 17
8.1 Necessary components . 17
8.2 Establishing identity using qualified certificates . 18
8.3 Establishing speciality and roles using identity certificates . 19
8.4 Using attribute certificates for authorization and access control . 20
9 Interoperability requirements . 20
9.1 Overview . 20
9.2 Options for deploying healthcare digital certificates across jurisdictions . 21
9.3 Option usage . 22
Annex A (informative) Scenarios for the use of digital certificates in healthcare. 23
Bibliography . 35
© ISO 2008 – All rights reserved iii
---------------------- Page: 3 ----------------------
ISO 17090-1:2008(E)
Foreword
ISO (the International Organization for Standardization) is a worldwide federation of national standards bodies
(ISO member bodies). The work of preparing International Standards is normally carried out through ISO
technical committees. Each member body interested in a subject for which a technical committee has been
established has the right to be represented on that committee. International organizations, governmental and
non-governmental, in liaison with ISO, also take part in the work. ISO collaborates closely with the
International Electrotechnical Commission (IEC) on all matters of electrotechnical standardization.
International Standards are drafted in accordance with the rules given in the ISO/IEC Directives, Part 2.
The main task of technical committees is to prepare International Standards. Draft International Standards
adopted by the technical committees are circulated to the member bodies for voting. Publication as an
International Standard requires approval by at least 75 % of the member bodies casting a vote.
Attention is drawn to the possibility that some of the elements of this document may be the subject of patent
rights. ISO shall not be held responsible for identifying any or all such patent rights.
ISO 17090-1 was prepared by Technical Committee ISO/TC 215, Health informatics.
This first edition cancels and replaces the Technical Specification (ISO/TS 17090-1:2002), which has been
revised and brought to the status of International Standard.
ISO 17090 consists of the following parts, under the general title Health informatics — Public key
infrastructure:
⎯ Part 1: Overview of digital certificate services
⎯ Part 2: Certificate profile
⎯ Part 3: Policy management of certification authority
iv © ISO 2008 – All rights reserved
---------------------- Page: 4 ----------------------
ISO 17090-1:2008(E)
Introduction
The healthcare industry is faced with the challenge of reducing costs by moving from paper-based processes
to automated electronic processes. New models of healthcare delivery are emphasizing the need for patient
information to be shared among a growing number of specialist healthcare providers and across traditional
organizational boundaries.
Healthcare information concerning individual citizens is commonly interchanged by means of electronic mail,
remote database access, electronic data interchange and other applications. The Internet provides a highly
cost-effective and accessible means of interchanging information, but it is also an insecure vehicle that
demands additional measures be taken to maintain the privacy and confidentiality of information. Threats to
the security of health information through unauthorized access (either inadvertent or deliberate) are increasing.
It is essential to have available to the healthcare system, reliable information security services that minimize
the risk of unauthorized access.
How does the healthcare industry provide appropriate protection for the data conveyed across the Internet in a
practical, cost-effective way? Public key infrastructure (PKI) and digital certificate technology seek to address
this challenge.
The proper deployment of digital certificates requires a blend of technology, policy and administrative
processes that enable the exchange of sensitive data in an unsecured environment by the use of “public key
cryptography” to protect information in transit and “certificates” to confirm the identity of a person or entity. In
healthcare environments, this technology uses authentication, encipherment and digital signatures to facilitate
confidential access to, and movement of, individual health records to meet both clinical and administrative
needs. The services offered by the deployment of digital certificates (including encipherment, information
integrity and digital signatures) are able to address many of these security issues. This is especially the case if
digital certificates are used in conjunction with an accredited information security standard. Many individual
organizations around the world have started to use digital certificates for this purpose.
Interoperability of digital certificate technology and supporting policies, procedures and practices is of
fundamental importance if information is to be exchanged between organizations and between jurisdictions in
support of healthcare applications (for example between a hospital and a community physician working with
the same patient).
Achieving interoperability between different digital certificate implementations requires the establishment of a
framework of trust, under which parties responsible for protecting an individual’s information rights may rely on
the policies and practices and, by extension, the validity of digital certificates issued by other established
authorities.
Many countries are deploying digital certificates to support secure communications within their national
boundaries. Inconsistencies will arise in policies and procedures between the certification authorities (CAs)
and the registration authorities (RAs) of different countries if standards development activity is restricted to
within national boundaries.
Digital certificate technology is still evolving in certain aspects that are not specific to healthcare. Important
standardization efforts and, in some cases, supporting legislation are ongoing. On the other hand, healthcare
providers in many countries are already using or planning to use digital certificates. ISO 17090 seeks to
address the need for guidance of these rapid international developments.
© ISO 2008 – All rights reserved v
---------------------- Page: 5 ----------------------
ISO 17090-1:2008(E)
ISO 17090 describes the common technical, operational and policy requirements that need to be addressed to
enable digital certificates to be used in protecting the exchange of healthcare information within a single
domain, between domains and across jurisdictional boundaries. Its purpose is to create a platform for global
interoperability. It specifically supports digital certificate-enabled communication across borders, but could
also provide guidance for the national or regional deployment of digital certificates in healthcare. The Internet
is increasingly used as the vehicle of choice to support the movement of healthcare data between healthcare
organizations and is the only realistic choice for cross-border communication in this sector.
ISO 17090 should be approached as a whole, with the three parts all making a contribution to defining how
digital certificates can be used to provide security services in the health industry, including authentication,
confidentiality, data integrity and the technical capacity to support the quality of digital signature.
This part of ISO 17090 defines the basic concepts underlying the use of digital certificates in healthcare and
provides a scheme of interoperability requirements to establish digital certificate-enabled secure
communication of health information.
ISO 17090-2 provides healthcare-specific profiles of digital certificates based on the international standard
X.509 and the profile of this, specified in IETF/RFC 3280 for different types of certificates.
ISO 17090-3 deals with management issues involved in implementing and using digital certificates in
healthcare. It defines a structure and minimum requirements for certificate policies (CPs) and a structure for
associated certification practice statements. ISO 17090-3 is based on the recommendations of the
informational IETF/RFC 3647, and identifies the principles needed in a healthcare security policy for cross
border communication. It also defines the minimum levels of security required, concentrating on the aspects
unique to healthcare.
Comments on the content of this document, as well as comments, suggestions and information on the
application of these standards, may be forwarded to the ISO/TC 215 secretariat at adickerson@himss.org or
WG4 convenor, Ross Fraser, and WG4 secretariat at w4consec@medis.or.jp.
vi © ISO 2008 – All rights reserved
---------------------- Page: 6 ----------------------
INTERNATIONAL STANDARD ISO 17090-1:2008(E)
Health informatics — Public key infrastructure —
Part 1:
Overview of digital certificate services
1 Scope
This part of ISO 17090 defines the basic concepts underlying use of digital certificates in healthcare and
provides a scheme of interoperability requirements to establish a digital certificate-enabled secure
communication of health information. It also identifies the major stakeholders who are communicating health-
related information, as well as the main security services required for health communication where digital
certificates may be required.
This part of ISO 17090 gives a brief introduction to public key cryptography and the basic components needed
to deploy digital certificates in healthcare. It further introduces different types of digital certificate — identity
certificates and associated attribute certificates for relying parties, self-signed certification authority (CA)
certificates, and CA hierarchies and bridging structures.
2 Normative references
The following referenced documents are indispensable for the application of this document. For dated
references, only the edition cited applies. For undated references, the latest edition of the referenced
document (including any amendments) applies.
ISO 17090-2, Health informatics — Public key infrastructure — Part 2: Certificate profile
ISO 17090-3:2008, Health informatics — Public key infrastructure — Part 3: Policy management of
certification authority
ISO/IEC 27002, Information technology — Security techniques — Code of practice for information security
management
IETF/RFC 3126, Electronic Signature Formats for long term electronic signatures
IETF/RFC 3161, Internet X.509 Public Key Infrastructure Time-Stamp Protocol (TSP)
IETF/RFC 3281, An Internet Attribute Certificate Profile for Authorization
© ISO 2008 – All rights reserved 1
---------------------- Page: 7 ----------------------
ISO 17090-1:2008(E)
3 Terms and definitions
For the purposes of this document, the following terms and definitions apply.
3.1 Healthcare context terms
3.1.1
application
identifiable computer running software process that is the holder of a private encipherment key
NOTE 1 Application, in this context, can be any software process used in healthcare information systems including
those without any direct role in treatment or diagnosis.
NOTE 2 In some jurisdictions, including software, processes can be regulated medical devices.
3.1.2
device
identifiable computer-controlled apparatus or instrument that is the holder of a private key
NOTE 1 This includes the class of regulated medical devices that meet the above definition.
NOTE 2 Device, in this context, is any device used in healthcare information systems, including those without any
direct role in treatment or diagnosis.
3.1.3
healthcare actor
regulated health professional, non-regulated health professional, sponsored healthcare provider, supporting
organization employee, patient/consumer, healthcare organization, device or application that acts in a health-
related communication and requires a certificate for a digital certificate-enabled security service
3.1.4
healthcare organization
officially registered organization that has a main activity related to healthcare services or health promotion
EXAMPLES Hospitals, Internet healthcare web site providers and healthcare research institutions.
NOTE 1 The organization is recognized to be legally liable for its activities but need not be registered for its specific
role in health.
NOTE 2 An internal part of an organization is called here an organizational unit, as in X.501.
3.1.5
non-regulated health professional
person employed by a healthcare organization, but who is not a regulated health professional
EXAMPLES Medical receptionist who organizes appointments or nurses' aid who assists with patient care.
NOTE The fact that the employee is not authorized by a body independent of the employer in his professional
capacity does not, of course, imply that the employee is not professional in conducting his services.
3.1.6
patient
consumer
person who is the receiver of health-related services and who is an actor in a health information system
3.1.7
privacy
freedom from intrusion into the private life or affairs of an individual when that intrusion results from undue or
illegal gathering and use of data about that individual
[ISO/IEC 2382-8:1998, definition 08.01.23]
2 © ISO 2008 – All rights reserved
---------------------- Page: 8 ----------------------
ISO 17090-1:2008(E)
3.1.8
regulated health professional
person who is authorized by a nationally recognized body to be qualified to perform certain health services
EXAMPLES Physicians, registered nurses and pharmacists.
NOTE 1 The types of registering or accrediting bodies differ in different countries and for different professions.
Nationally recognized bodies include local or regional governmental agencies, independent professional associations and
other formally and nationally recognized organizations. They may be exclusive or non-exclusive in their territory.
NOTE 2 A nationally recognized body in this definition does not imply one nationally controlled system of professional
registration but, in order to facilitate international communication, it would be preferable for one nationwide directory of
recognized health professional registration bodies to exist.
3.1.9
sponsored healthcare provider
health services provider who is not a regulated health professional in the jurisdiction of his/her practice, but
who is active in his/her healthcare community and sponsored by a regulated healthcare organization
EXAMPLES A drug and alcohol education officer who is working with a particular ethnic group, or a healthcare aid
worker in a developing country.
3.1.10
supporting organization
officially registered organization that is providing services to a healthcare organization, but which is not
providing healthcare services
EXAMPLES Healthcare financing bodies such as insurance institutions, suppliers of pharmaceuticals and other goods.
3.1.11
supporting organization employee
person employed by a healthcare organization or a supporting organization
EXAMPLES Medical records transcriptionists, healthcare insurance claims adjudicators and pharmaceutical order
entry clerks.
3.2 Security services terms
3.2.1
access control
means of ensuring that the resources of a data processing system can be accessed only by authorized
entities in authorized ways
[ISO/IEC 2382-8:1998, definition 08.04.01]
3.2.2
accountability
property that ensures that the actions of an entity may be traced uniquely to the entity
[ISO 7498-2:1989, definition 3.3.3]
3.2.3
asymmetric cryptographic algorithm
algorithm for performing encipherment or the corresponding decipherment in which the keys used for
encipherment and decipherment differ
[ISO/IEC 10181-1:1996, definition 3.3.1]
© ISO 2008 – All rights reserved 3
---------------------- Page: 9 ----------------------
ISO 17090-1:2008(E)
3.2.4
authentication
process of reliably identifying security subjects by securely associating an identifier and its authenticator
NOTE See also data origin authentication.
3.2.5
authorization
granting of rights, which includes the granting of access based on access rights
[ISO 7498-2:1989, definition 3.3.10]
3.2.6
availability
property of being accessible and useable upon demand by an authorized entity
[ISO 7498-2:1989, definition 3.3.11]
3.2.7
ciphertext
data produced through the use of encipherment, the semantic content of which is not available
NOTE Adapted from ISO 7498-2:1989.
3.2.8
confidentiality
property that information is not made available or disclosed to unauthorized individuals, entities or processes
[ISO 7498-2:1989, definition 3.3.16]
3.2.9
cryptography
discipline that embodies principles, means and methods for the transformation of data in order to hide its
information content, prevent its undetected modification and/or prevent its unauthorized use
[ISO 7498-2:1989, definition 3.3.20]
3.2.10
cryptographic algorithm
cipher
method for the transformation of data in order to hide its information content, prevent its undetected
modification and/or prevent its unauthorized use
3.2.11
data integrity
property that data have not been altered or destroyed in an unauthorized manner
[ISO 7498-2:1989, definition 3.3.21]
3.2.12
data origin authentication
corroboration that the source of data received is as claimed
[ISO 7498-2:1989, definition 3.3.22]
4 © ISO 2008 – All rights reserved
---------------------- Page: 10 ----------------------
ISO 17090-1:2008(E)
3.2.13
decipherment
decryption
process of obtaining, from a ciphertext, the original corresponding data
[ISO/IEC 2382-8:1998, definition 08.03.04]
NOTE A ciphertext can be enciphered a second time, in which case a single decipherment does not produce the
original plain text.
3.2.14
digital signature
data appended to, or cryptographic transformation of, a data unit that allows a recipient of the data unit to
prove the source and integrity of the data unit and protect against forgery, e.g. by the recipient
[ISO 7498-2:1989, definition 3.3.26]
NOTE See cryptography.
3.2.15
encipherment
encryption
cryptographic transformation of data to produce ciphertext
[ISO 7498-2:1989, definition 3.3.27]
NOTE See cryptography.
3.2.16
identification
performance of tests to enable a data processing system to recognize entities
[ISO/IEC 2382-8:1998, definition 08.04.12]
3.2.17
identifier
piece of information used to claim an identity, before a potential corroboration by a corresponding
authenticator
[ENV 13608-1]
3.2.18
integrity
proof that the message content has not been altered, deliberately or accidentally, in any way during
transmission
NOTE Adapted from ISO 7498-2:1989.
3.2.19
key
sequence of symbols that controls the operations of encipherment and decipherment
[ISO 7498-2:1989, definition 3.3.32]
3.2.20
key management
generation, storage, distribution, deletion, archiving and application of keys in accordance with a security
policy
[ISO 7498-2:1989, definition 3.3.33]
© ISO 2008 – All rights reserved 5
---------------------- Page: 11 ----------------------
ISO 17090-1:2008(E)
3.2.21
non-repudiation
service providing proof of the integrity and origin of data (both in an unforgeable relationship), which can be
verified by any party
3.2.22
private key
key that is used with an asymmetric cryptographic algorithm and whose possession is restricted (usually to
only one entity)
[ISO/IEC 10181-1:1996, definition 3.3.10]
3.2.23
public key
key that is used with an asymmetric cryptographic algorithm and that can be made publicly available
[ISO/IEC 10181-1:1996, definition 3.3.11]
3.2.24
role
set of behaviours that is associated with a task
3.2.25
security
combination of availability, confidentiality, integrity and accountability
[ENV 13608-1]
3.2.26
security policy
plan or course of action adopted for providing computer security
[ISO/IEC 2382-8:1998, definition 08.01.06]
3.2.27
security service
service, provided by a layer of communicating open systems, which ensures adequate security of the systems
or of data transfers
[ISO 7498-2:1989, definiton 3.3.51]
3.3 Public key infrastructure related terms
3.3.1
attribute authority
AA
authority that assigns privileges by issuing attribute certificates
3.3.2
attribute certificate
data structure, digitally signed by an attribute authority, that binds some attribute values with identification
about its holder
6 © ISO 2008 – All rights reserved
---------------------- Page: 12 ----------------------
ISO 17090-1:2008(E)
3.3.3
authority certificate
certificate issued to a certification authority or to an attribute authority
3.3.4
certificate
public key certificate
3.3.5
certificate distribution
act of publishing certificates and transferring certificates to security subjects
3.3.6
certificate extension
extension fields (known as extensions) in X.509 certificates which provide methods for associating additional
attributes with users or public keys and for managing the certification hierarchy
NOTE Certificate extensions can be either critical (i.e. a certificate-using system has to reject the certificate if it
encounters a critical extension it does not recognise) or non-critical (i.e. it can be ignored if the extension is not
recognised).
3.3.7
certificate generation
act of creating certificates
3.3.8
certificate management
procedures relating to certificates, i.e. certificate generation, certificate distribution, certificate archiving and
revocation
3.3.9
certificate profile
specification of the structure and permissible content of a certificate type
3.3.10
certificate revocation
act of removing any reliable link between a certificate and its related owner (or security subject owner)
because the certificate is not trusted any more, even though it is unexpired
3.3.11
certificate holder
entity that is named as the subject of a valid certificate
3.3.12
certificate verification
act of verifying that a certificate is authentic
3.3.13
certification
procedure by which a third party gives assurance that all or part of a data processing system conforms to
security requirements
[ISO/IEC 2382-8:1998, definition 08.01.18]
© ISO 2008 – All rights reserved 7
---------------------- Page: 13 ----------------------
ISO 17090-1:2008(E)
3.3.14
certification authority
CA
certificate issuer
authority trusted by one or more relying parties to create and assign certificates and which may, optionally,
create the relying parties' keys
NOTE 1 Adapted from ISO/IEC 9594-8:2001.
NOTE 2 Authority in the CA term does not imply any government authorization, but only denotes that it is trusted.
NOTE 3 Certificate issuer may be a better term, but CA is very widely used.
3.3.15
certificate policy
CP
named set of rules which indicates the applicability of a certificate to a particular community and/or class of
application with common security requirements
[IETF/RFC 3647]
3.3.16
certification practice statement
CPS
statement of the practices that a certification authority employs in issuing certificates
[IETF/RFC 3647]
3.3.17
public key certificate
PKC
X.509 public key certificates (PKCs) that bind an identity and a public key
NOTE 1 The identity can be used to support identity-based access control decisions after the client
...
Questions, Comments and Discussion
Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.