PS3.15
Next
PS3.15
DICOM PS3.15 2013 - Security and System Management Profiles
DICOM Standards Committee
Copyright © 2013 NEMA
Table of Contents
Notice and Disclaimer
Foreword
1. Scope and Field of Application
1.1. Security Policies and Mechanisms
1.2. System Management Profiles
2. Normative References
3. Definitions
3.1. Reference Model Definitions
3.2. Reference Model Security Architecture Definitions
3.3. ACSE Service Definitions
3.4. Security Definitions
3.5. DICOM Introduction and Overview Definitions
3.6. DICOM Conformance Definitions
3.7. DICOM Information Object Definitions
3.8. DICOM Service Class Definitions
3.9. DICOM Communication Support Definitions
3.10. DICOM Security Profile Definitions
4. Symbols and Abbreviations
5. Conventions
6. Security and System Management Profile Outlines
6.1. Secure Use Profiles
6.2. Secure Transport Connection Profiles
6.3. Digital Signature Profile
6.4. Media Storage Security Profiles
6.5. Network Address Management Profiles
6.6. Time Synchronization Profiles
6.7. Application Configuration Management Profiles
6.8. Audit Trail Profiles
7. Configuration Profiles
7.1. Actors
7.2. Transactions
A. Secure Use Profiles (Normative)
A.1. Online Electronic Storage Secure Use Profile
A.1.1. SOP Instance Status
A.2. Basic Digital Signatures Secure Use Profile
A.3. Bit-preserving Digital Signatures Secure Use Profile
A.4. Basic SR Digital Signatures Secure Use Profile
A.5. Audit Trail Message Format Profile
A.5.1. DICOM Audit Message Schema
A.5.2. General Message Format Conventions
A.5.2.1. UserID
A.5.2.2. AlternativeUserID
A.5.2.3. Username
A.5.2.4. Multi-homed Nodes
A.5.2.5. EventDateTime
A.5.3. DICOM Specific Audit Messages
A.5.3.1. Application Activity
A.5.3.2. Audit Log Used
A.5.3.3. Begin Transferring DICOM Instances
A.5.3.4. Data Export
A.5.3.4.1. UserIsRequestor
A.5.3.5. Data Import
A.5.3.6. DICOM Instances Accessed
A.5.3.7. DICOM Instances Transferred
A.5.3.8. DICOM Study Deleted
A.5.3.9. Network Entry
A.5.3.10. Query
A.5.3.11. Security Alert
A.5.3.12. User Authentication
A.6. Audit Trail Message Transmission Profile - SYSLOG-TLS
A.7. Audit Trail Message Transmission Profile - SYSLOG-UDP
B. Secure Transport Connection Profiles (Normative)
B.1. The Basic TLS Secure Transport Connection Profile
B.2. ISCL Secure Transport Connection Profile
B.3. The AES TLS Secure Transport Connection Profile
B.4. Basic User Identity Association Profile
B.5. User Identity Plus Passcode Association Profile
B.6. Kerberos Identity Negotiation Association Profile
B.7. Generic SAML Assertion Identity Negotiation Association Profile
B.8. Secure Use of Email Transport
C. Digital Signature Profiles (Normative)
C.1. Base RSA Digital Signature Profile
C.2. Creator RSA Digital Signature Profile
C.3. Authorization RSA Digital Signature Profile
C.4. Structured Report RSA Digital Signature Profile
D. Media Storage Security Profiles (Normative)
D.1. Basic DICOM Media Security Profile
D.1.1. Encapsulation of A DICOM File in a Secure DICOM File
E. Attribute Confidentiality Profiles
E.1. Application Level Confidentiality Profiles
E.1.1. De-identifier
E.1.2. Re-identifier
E.1.3. Conformance Requirements
E.2. Basic Application Level Confidentiality Profile
E.3. Basic Application Level Confidentiality Options
E.3.1. Clean Pixel Data Option
E.3.2. Clean Recognizable Visual Features Option
E.3.3. Clean Graphics Option
E.3.4. Clean Structured Content Option
E.3.5. Clean Descriptors Option
E.3.6. Retain Longitudinal Temporal Information Options
E.3.7. Retain Patient Characteristics Option
E.3.8. Retain Device Identity Option
E.3.9. Retain UIDs Option
E.3.10. Retain Safe Private Option
F. Network Address Management Profiles
F.1. Basic Network Address Management Profile
F.1.1. Resolve Hostname
F.1.1.1. Scope
F.1.1.2. Use Case Roles
F.1.1.3. Referenced Standards
F.1.1.4. DNS Security Considerations (Informative)
F.1.1.5. DNS Implementation Considerations (Informative)
F.1.1.6. Support For Service Discovery
F.1.2. Configure DHCPserver
F.1.2.1. Scope
F.1.2.2. Use Case Roles
F.1.2.3. Referenced Standards
F.1.3. Find and Use DHCP Server
F.1.3.1. Scope
F.1.3.2. Use Case Roles
F.1.3.3. Referenced Standards
F.1.3.4. Interaction Diagram
F.1.4. Maintain Lease
F.1.4.1. Scope
F.1.4.2. Use Case Roles
F.1.4.3. Referenced Standards
F.1.4.4. Normal Interaction
F.1.5. DDNS Coordination
F.1.5.1. Scope
F.1.5.2. Use Case Roles
F.1.5.3. Referenced Standards
F.1.5.4. Basic Course of Events
F.1.6. DHCP Security Considerations (Informative)
F.1.7. DHCP Implementation Considerations (Informative)
F.1.8. Conformance
G. Time Synchronization Profiles
G.1. Basic Time Synchronization Profile
G.1.1. Find NTP Servers
G.1.1.1. Scope
G.1.1.2. Use Case Roles
G.1.1.3. Referenced Standards
G.1.1.4. Basic Course of Events.
G.1.1.5. Alternative Paths
G.1.1.6. Assumptions
G.1.1.7. Postconditions
G.1.2. Maintain Time
G.1.2.1. Scope
G.1.2.2. Use Case Roles
G.1.2.3. Referenced Standards
G.1.2.4. Basic Course of Events.
G.1.3. NTP Security Considerations (Informative)
G.1.4. NTP Implementation Considerations (Informative)
G.1.5. Conformance
H. Application Configuration Management Profiles
H.1. Application Configuration Management Profile
H.1.1. Data Modelcomponent Objects
H.1.1.1. Device
H.1.1.2. Network Application Entity
H.1.1.3. Network Connection
H.1.1.4. Transfer Capabilities
H.1.1.5. DICOM Configuration Root
H.1.1.6. Devices Root
H.1.1.7. Unique AE Titles Registry Root
H.1.1.8. Unique AE Title
H.1.2. Application Configuration Data Model Hierarchy
H.1.3. LDAP Schema For Objects and Attributes
H.1.4. Transactions
H.1.4.1. Find LDAP Server
H.1.4.1.1. Scope
H.1.4.1.2. Use Case Roles
H.1.4.1.3. Referenced Standards
H.1.4.1.4. Interaction Diagram
H.1.4.1.5. Alternative Paths
H.1.4.2. Query LDAP Server
H.1.4.2.1. Scope
H.1.4.2.2. Use Case Roles
H.1.4.2.3. Referenced Standards
H.1.4.2.4. Interaction Description
H.1.4.3. Update LDAP Server
H.1.4.3.1. Scope
H.1.4.3.2. Use Case Roles
H.1.4.3.3. Referenced Standards
H.1.4.3.4. Interaction Description
H.1.4.3.5. Special Update For Network AE Creation
H.1.4.4. Maintain LDAP Server
H.1.5. LDAP Security Considerations (Informative)
H.1.5.1. Threat Assessment
H.1.5.2. Available LDAP Security Mechanisms
H.1.5.3. Recommendations (Informative)
H.1.6. Implementation Considerations (Informative)
H.1.7. Conformance
H.2. DNS Service Discovery
H.2.1. Scope
H.2.2. Use Case Roles
H.2.3. Referenced Standards
List of Figures
7-1.
Transactions and Actors
F.1-1.
Resolve Hostname
F.1-2.
DNS Referenced Standards
F.1-3.
Configure DHCP Server
F.1-4.
Find and Use DHCP Server
F.1-5.
DHCP Interactions
F.1-6.
Maintain Lease
F.1-7.
DDNS Coordination
G.1-1.
Find NTP Servers
G.2-1.
Maintain Time
H.1-1.
Application Configuration Data Model
H.1-2.
DICOM Configuration Hierarchy
H.1-3.
Find LDAP Server
H.1-4.
Select LDAP Server
H.1-5.
Query LDAP Server
H.1-6.
Update LDAP Server
H.2-1.
Find DICOM Service
List of Tables
A.5.2-1.
General Message Format
A.5.3.1-1.
Application Activity Message
A.5.3.2-1.
Audit Log Used Message
A.5.3.3-1.
Audit Message for Begin Transferring DICOM Instances
A.5.3.4-1.
Audit Message for Data Export
A.5.3.5-1.
Audit Message for Data Import
A.5.3.6-1.
Audit Message for DICOM Instances Accessed
A.5.3.7-1.
Audit Message for DICOM Instances Transferred
A.5.3.8-1.
Audit Message for DICOM Study Deleted
A.5.3.9-1.
Audit Message for Network Entry
A.5.3.10-1.
Audit Message for Query
A.5.3.11-1.
Audit Message for Security Alert
A.5.3.12-1.
Audit Message for User Authentication
B.1-1.
Minimum Mechanisms for TLS Features
B.2-1.
Minimum Mechanisms for ISCL Features
B.3-1.
Minimum Mechanisms for TLS Features
B.4-1.
Minimum Mechanisms for DICOM Association Negotiation Features - Basic User Identity Association Profile
B.5-1.
User Identity Plus Passcode Association Profile - Minimum Mechanisms for DICOM Association Negotiation Features
B.6-1.
Kerberos Identity Negotiation Association Profile - Minimum Mechanisms for DICOM Association Negotiation Features
B.7-1.
Generic SAML Assertion Identity Negotiation Association Profile - Minimum Mechanisms for DICOM Association Negotiation Features
E.1-1.
Application Level Confidentiality Profile Attributes
E.3.10-1.
Safe Private Attributes
F.1-1.
Basic Network Address Management Profile
F.1-2.
DHCP Parameters
G.1-1.
Basic Time Synchronization Profile
H.1-1.
Application Configuration Management Profiles
H.1-2.
Attributes of Device Object
H.1-3.
Child Objects of Device Object
H.1-4.
Attributes of Network AE Object
H.1-5.
Child Objects of Network AE Object
H.1-6.
Attributes of Network Connection Object
H.1-7.
Attributes of Transfer Capability Object
H.1-8.
Attributes of the DICOM Configuration Root Object
H.1-9.
Child Objects of DICOM Configuration Root Object
H.1-10.
Attributes of the Devices Root Object
H.1-11.
Child Objects of Devices Root Object
H.1-12.
Attributes of the Unique AE Titles Registry Root Object
H.1-13.
Child Objects of Unique AE Titles Registry Root Object
H.1-14.
Attributes of the Unique AE Title Object
H.1-15.
LDAP Security Patterns