PS3.15 DICOM PS3.15 2021D - Security and System Management Profiles Page 2
Total Page:16
File Type:pdf, Size:1020Kb
PS3.15 DICOM PS3.15 2021d - Security and System Management Profiles Page 2 PS3.15: DICOM PS3.15 2021d - Security and System Management Profiles Copyright © 2021 NEMA A DICOM® publication - Standard - DICOM PS3.15 2021d - Security and System Management Profiles Page 3 Table of Contents Notice and Disclaimer ........................................................................................................................................... 11 Foreword ............................................................................................................................................................ 13 1. Scope and Field of Application ............................................................................................................................. 15 1.1. Security Policies and Mechanisms ................................................................................................................. 15 1.2. System Management Profiles ........................................................................................................................ 15 2. Normative References ....................................................................................................................................... 17 3. Definitions ....................................................................................................................................................... 21 4. Symbols and Abbreviations ................................................................................................................................. 25 5. Conventions ..................................................................................................................................................... 27 6. Security and System Management Profile Outlines .................................................................................................. 29 6.1. Secure Use Profiles .................................................................................................................................... 29 6.2. Secure Transport Connection Profiles ............................................................................................................. 29 6.3. Digital Signature Profile ............................................................................................................................... 29 6.4. Media Storage Security Profiles ..................................................................................................................... 30 6.5. Network Address Management Profiles ........................................................................................................... 30 6.6. Time Synchronization Profiles ....................................................................................................................... 30 6.7. Application Configuration Management Profiles ................................................................................................ 30 6.8. Audit Trail Profiles ...................................................................................................................................... 31 7. Configuration Profiles ......................................................................................................................................... 33 7.1. Actors ...................................................................................................................................................... 33 7.2. Transactions .............................................................................................................................................. 34 A. Secure Use Profiles (Normative) .......................................................................................................................... 37 A.1. Online Electronic Storage Secure Use Profile ................................................................................................... 37 A.1.1. SOP Instance Status ............................................................................................................................ 37 A.2. Basic Digital Signatures Secure Use Profile ..................................................................................................... 38 A.3. Bit-preserving Digital Signatures Secure Use Profile .......................................................................................... 39 A.4. Basic SR Digital Signatures Secure Use Profile ................................................................................................ 39 A.5. Audit Trail Message Format Profile ................................................................................................................ 39 A.5.1. DICOM Audit Message Schema ............................................................................................................. 40 A.5.1.1. Audit Message Schema .................................................................................................................. 40 A.5.1.2. Codes Used Within The Schema ...................................................................................................... 44 A.5.1.2.1. Audit Source Type Code .......................................................................................................... 44 A.5.1.2.2. Participant Object Type Code Role ............................................................................................. 44 A.5.1.2.3. Participant Object Data Life Cycle .............................................................................................. 45 A.5.1.2.4. Participant Object ID Type Code ................................................................................................ 46 A.5.2. General Message Format Conventions .................................................................................................... 46 A.5.2.1. UserID ........................................................................................................................................ 50 A.5.2.2. AlternativeUserID .......................................................................................................................... 50 A.5.2.3. Username .................................................................................................................................... 51 A.5.2.4. Multi-homed Nodes ....................................................................................................................... 51 A.5.2.5. EventDateTime ............................................................................................................................. 51 A.5.2.6. ParticipantObjectTypeCodeRole ....................................................................................................... 51 A.5.3. DICOM Specific Audit Messages ............................................................................................................ 52 A.5.3.1. Application Activity ........................................................................................................................ 53 A.5.3.2. Audit Log Used ............................................................................................................................. 53 A.5.3.3. Begin Transferring DICOM Instances ................................................................................................ 54 A.5.3.4. Data Export .................................................................................................................................. 56 A.5.3.4.1. UserIsRequestor .................................................................................................................... 58 A.5.3.5. Data Import .................................................................................................................................. 58 A.5.3.6. DICOM Instances Accessed ............................................................................................................ 60 A.5.3.7. DICOM Instances Transferred ......................................................................................................... 61 A.5.3.8. DICOM Study Deleted .................................................................................................................... 63 A.5.3.9. Network Entry ............................................................................................................................... 64 A.5.3.10. Query ........................................................................................................................................ 65 A.5.3.11. Security Alert .............................................................................................................................. 66 A.5.3.12. User Authentication ...................................................................................................................... 68 A.5.3.13. Order Record .............................................................................................................................. 69 - Standard - Page 4 DICOM PS3.15 2021d - Security and System Management Profiles A.5.3.14. Patient Record ............................................................................................................................ 70 A.5.3.15. Procedure Record ....................................................................................................................... 71 A.6. Audit Trail Message Transmission Profile - SYSLOG-TLS