Slide 1

Slide 1 text

Securing  patient  data  in  a   hostile  world   Some  thoughts  on  device  &   mobile  trust Kenneth White March 24, 2015 ・ Health IT Series

Slide 2

Slide 2 text

Background •  Safety-critical software engineering •  Clinical Research o  Global central labs: academic, startup biotech, mid & large commercial pharma •  FDA technical groups - biosensor data standards (ambulatory & telemetry ECG) •  Machine Learning & expert systems •  Network security

Slide 3

Slide 3 text

Current  Work •  Open Crypto Audit Project o  Large-scale security & cryptography audit of OpenSSL o  TrueCrypt audit •  Dovel Labs o  Cloud security R&D practice o  Open data, human-centered application design •  DHIS2 & BAO Systems •  Open source public health surveillance •  WHO, Doctors without Borders, US State Dept…

Slide 4

Slide 4 text

Mobile  apps  are  cloud •  What’s the intended use? o Heart rate monitor: gym treadmill or EKG? o See new draft guidance on communication & storage integration for mobile medical apps §  http://www.fda.gov/downloads/Training/CDRHLearn/ UCM435363.pdf o Discretionary enforcement o “Active monitoring” vs. “Healthy lifestyle” •  Where are data stored (device & remote)? •  Information transport, encryption, controls

Slide 5

Slide 5 text

It’s  a  dangerous  world

Slide 6

Slide 6 text

No content

Slide 7

Slide 7 text

And  it’s  not  limited  to   traditional  adversaries

Slide 8

Slide 8 text

This  is  a  problem

Slide 9

Slide 9 text

But  so  is  this

Slide 10

Slide 10 text

No content

Slide 11

Slide 11 text

People  are  beginning  to  re-­‐‑ examine  trust  of  the  entire   software  supply  chain

Slide 12

Slide 12 text

No content

Slide 13

Slide 13 text

Fortunately,  strong  security   options  are  more  rich  than  ever

Slide 14

Slide 14 text

Emerging  Adoption o  Smarter network defense (Splunk, Dark Viking, real- time threat feeds & response) o  Stronger core network protocols o  HTTP/2 rolling out in browsers o  SSL → TLS 1.3 o  Strong primitives •  Elliptic Curve Cryptography (ECC) •  Ephemeral key exchange (PFS) •  Deprecating RSA & legacy suites

Slide 15

Slide 15 text

Emerging  Adoption o  At-rest disk & volume encryption w/ off-cloud key management o  Hardware Security Module (HSM) key appliances o  Open multi-factor auth options (TOTP 2FA/MFA apps) o  Sophisticated VPC networking (VPNs, bastion & private vLANs, fine-grain roles & group network ACLs) o  Ubiquitous auditing & monitoring •  CloudTrails •  Elasticsearch •  AlienVault/OSSIM

Slide 16

Slide 16 text

IAM  Role-­‐‑Authorized  One-­‐‑time  Credentials

Slide 17

Slide 17 text

What’s  working •  Governance automation •  Production full-stack orchestration (the “Dev” word) o  Ansible, Salt, Puppet, Chef, Docker, Rocket •  Validate the process & configuration engine •  Cloud o  Medidata CTMS o  Bristol-Myers Squibb modeling o  Cardiac safety (HeartSignals) •  Explicit threat models o  But see also Anthem, Premara Blue Cross, Sony •  Database & disk encryption are fundamentally misunderstood technologies

Slide 18

Slide 18 text

Parting  Thoughts o  Intelligence & defense collaboration & sharing is critical o  Best practices for cloud are simply first principles for systems o  Understanding the difference between regulator guidance vs. mandates o  Encryption isn’t a magic bullet o  Understand your threat model o  Insulin pumps probably don’t need to be on the Internet

Slide 19

Slide 19 text

Thank  You!

Slide 20

Slide 20 text

Contacts Labs kenneth.white @ doveltech . com OCAP admin @ opencryptoaudit . org Twitter @kennwhite LinkedIn linkedin.com/in/biotech Talks speakerdeck.com/kwhite