Hospital information system anti-unification technology strategy paper
Abstract : With the rapid development of the information industry, the hospital's medical business and information technology is increasingly close to the hospital's information management system, making the hospital information management system's own security problems are more and more prominent. At present, the illegal query of the database, such as the commercial purpose of the "unified party", seriously affects the public image of the hospital, but also seriously damage the interests of patients. To this end, from a technical point of view to explore the hospital information system anti-tuning strategy, through the prior rights management prevention, real-time monitoring and audit trail and other measures to reduce the probability of unification of the party, so as to promote the healthy and rapid development of medical services.
Keywords: hospital information system; anti-tuning; sensitive data
The commercial purpose of the "unification of the party" is to establish the black chain of medical rebates an important part of the state and the media attention of the important social focus of the problem, not only seriously affect the public image of the hospital, but also seriously affect the hospital's public image, but also seriously affected the development of health care services. It not only seriously affects the public image of hospitals, but also seriously jeopardizes the interests of patients. In order to meet the requirements of the Ministry of Health on further deepening the governance of commercial bribery in the field of medicine purchasing and marketing, and to promote the healthy and rapid development of medical services, from a technical point of view to explore the strategy of the hospital information system anti-tuning party.
1 hospital information systems in the existence of security risks
1.1 host protection is not perfect
The system hosts the lack of protection mechanisms, the front-end does not have any protection equipment, even if the installation of the protection device, can only be for the IP address / port and so on, can not be recognized as the information of the data layer, and at the same time will affect the response time of the entire system. The response time of the whole system. The operating system or application software itself has hidden dangers, and it is especially difficult to prevent various security holes using the application system and middleware.
1.2 Lax management of system super-users
The management of administrator accounts and super-user accounts/passwords is not strict, or the use of privileges to violate the data operation, and there is no corresponding supervision and record.
1.3 Confidentiality system in vain
Even if a strict management system is in place, there is no effective means to enforce it.
1.4 Lack of effective data supervision
There is no effective data auditing mechanism, and the management of sensitive data is generally characterized by a lack of security policies.
1.5 Sensitive data from internal outflow
Software vendors, service outsourcing, data maintenance staff or hospital personnel use software backdoors, or job convenience to obtain sensitive data, there is no set of complete and effective technical means to protect them.
2 Anti-tuning technical strategies
By introducing a third-party software anti-tuning system to monitor and control access to the hospital information system and data, and adopting the means of prior rights management to prevent, real-time monitoring and alarming and auditing tracking, the probability of the occurrence of illegal tuning can be effectively reduced to meet the needs of hospitals. "The company's management requirements are based on a multi-pronged approach that emphasizes on education, system and technology.
2.1 Deployment of anti-unification system
The hospital anti-unification system is deployed in a bypass mode, which only needs to be connected to the `data mirroring port' of the hospital's network core switch without changing the hospital's original network configuration, and monitors the host's access behaviors such as Telnet, FTP, SSH and other access behaviors with detailed records; and realizes access control to the specific applications and client hosts to prohibit them from accessing sensitive resources, thus enabling them to access sensitive resources.
Auto Sync with Cloud
No need to change the existing network configuration of the hospital.
2.2 Pre-emptive rights management prevention
To strengthen the management of the hospital information system for drugs and consumables statistics, the Information Technology Department has taken effective measures such as authorization, encryption, and controlling the scope of terminal information collection, and has implemented a hierarchical management of the rights of each department to query the hospital's information through the computer network. Without authorization and for the record, any department or individual may not call the hospital information system function menu related to drugs.
2.3 Real-time monitoring, alarm and audit trail
According to the common statements and behaviors of the unified party operations, formulate the corresponding identification rules, organize and analyze the massive and disorderly data in the hospital's application system, and restore all the staff's operations, including business access, system maintenance, and policy configuration. At the same time, it establishes a set of user access behavior model of HIS system (hospital information system) database, including thousands of dynamic elements such as account number, IP address, client tool, SQL statement, return result, etc., and then combines with administrator's settings to screen and record the behavior of TUF, and alarms the suspicious TUF behaviors at the first time and reminds and warns them in various forms, such as text messages, emails, flashing, and web pages. Alert. Let the administrator in the first time to grasp who (who) at what moment (when) where (where) using what tools (way) on the database which operation, take away what data (what). Under certain conditions, the anti-tuning system can block system access based on source/destination IP address, source/destination MAC address, access time, access content, and other conditions to control client access to unauthorized applications.
3 Anti-tunneling effectiveness
By adopting the technical means of Anti-tunneling system to eliminate the behavior of hospitals, not only to achieve the administrator at all levels of the audit of the operation behavior, and effectively prevent the administrator's abuse of privileges, but also to provide a guarantee for the traceability of the Anti-tunneling behavior to reduce the security risks of the system maintenance personnel; not only a complete record, analysis of the sensitive data query, but also to ensure the integrity and security of the system. It also provides a complete record of sensitive data queries, changes, deletions, and other operations to protect the security of important data, as well as controlling access to the system from illegal terminals to ensure business continuity.
4 Conclusion
The construction of hospital information security is an important part of the construction of the hospital's information technology, the protection of patient privacy, doctor's medication information, financial information, and other important data, are the security of the hospital's operations. Through a variety of management systems, technical means to protect the hospital information, especially the anti-tunneling system and the use of audit mechanisms to track down after the fact the records of the tunnel, is an important part of the construction of the hospital's information security.
References
[1]Lai Wei, Xin Xiaoxia, Wu Ruming, et al. Research on data auditing of regional medical information *** enjoyment platform[J]. Journal of Medical Informatics,2010,31(12):14-17.
[2]Green Alliance Technology. Repositioning Operations and Maintenance Security Auditing[J]. Network Administrator World,2012(24):48-49.
[3]Li Jingcheng. Hospital information security construction[J]. Computer CD-ROM Software and Applications,2012(15):14-15.
;