{"id":345,"date":"2023-11-03T15:36:57","date_gmt":"2023-11-03T15:36:57","guid":{"rendered":"https:\/\/xnat-repository.icr.ac.uk\/?page_id=345"},"modified":"2024-02-21T22:04:58","modified_gmt":"2024-02-21T22:04:58","slug":"for-infosec","status":"publish","type":"page","link":"https:\/\/xnat-repository.icr.ac.uk\/?page_id=345","title":{"rendered":"For infosec"},"content":{"rendered":"<div class=\"n2_clear\"><ss3-force-full-width data-overflow-x=\"body\" data-horizontal-selector=\"body\"><div class=\"n2-section-smartslider fitvidsignore  n2_clear\" data-ssid=\"8\"><div id=\"n2-ss-8-align\" class=\"n2-ss-align\"><div class=\"n2-padding\"><div id=\"n2-ss-8\" data-creator=\"Smart Slider 3\" data-responsive=\"fullwidth\" class=\"n2-ss-slider n2-ow n2-has-hover n2notransition  \">\n        <div class=\"n2-ss-slider-1 n2-ow\">\n            <div class=\"n2-ss-slider-2 n2-ow\">\n                <div class=\"n2-ss-slide-backgrounds n2-ow-all\"><div class=\"n2-ss-slide-background\" data-public-id=\"1\" data-mode=\"fill\"><div class=\"n2-ss-slide-background-image\" data-blur=\"0\" data-opacity=\"100\" data-x=\"50\" data-y=\"50\" data-alt=\"\" data-title=\"\"><picture class=\"skip-lazy\" data-skip-lazy=\"1\"><img decoding=\"async\" src=\"\/\/xnat-repository.icr.ac.uk\/wp-content\/uploads\/2023\/10\/Christina_and_Vonnie_grey_1900x600.png\" alt=\"\" title=\"\" loading=\"lazy\" class=\"skip-lazy\" data-skip-lazy=\"1\"><\/picture><\/div><div data-color=\"RGBA(255,255,255,0)\" style=\"background-color: RGBA(255,255,255,0);\" class=\"n2-ss-slide-background-color\"><\/div><\/div><\/div>                <div class=\"n2-ss-slider-3 n2-ow\">\n                    <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 1900 600\" data-related-device=\"desktopPortrait\" class=\"n2-ow n2-ss-preserve-size n2-ss-preserve-size--slider n2-ss-slide-limiter\"><\/svg><div data-first=\"1\" data-slide-duration=\"0\" data-id=\"20\" data-slide-public-id=\"1\" data-title=\"Christina_and_Vonnie_grey_1900x600\" class=\"n2-ss-slide n2-ow  n2-ss-slide-20\"><div role=\"note\" class=\"n2-ss-slide--focus\" tabindex=\"-1\">Christina_and_Vonnie_grey_1900x600<\/div><div class=\"n2-ss-layers-container n2-ss-slide-limiter n2-ow\"><div class=\"n2-ss-layer n2-ow n-uc-MYtlW9V16DBZ\" data-sstype=\"slide\" data-pm=\"default\"><\/div><\/div><\/div>                <\/div>\n                            <\/div>\n        <\/div>\n        <\/div><ss3-loader><\/ss3-loader><\/div><\/div><div class=\"n2_clear\"><\/div><\/div><\/ss3-force-full-width><\/div>\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">FAQ for information security officers<\/h2>\n\n\n\n<p>The following list of questions has been drawn from interactions with IT, Information Governance and Information Security officers at a number of NHS institutions over the last five years.<\/p>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary>What is the name and supplier of the system\/product?<\/summary>\n<p>eXtensible Neuroimaging Archive Toolkit (XNAT), supplied by the Flywheel LLC and the&nbsp; Neuroinformatics Research Group, Washington University School of Medicine in St Louis. Software development has been funded continuously by NIH R01 grant since 2008 (and earlier via other public grant mechanisms). XNAT is an open-source product that has a long track record and is used by many of the world&#8217;s leading academic healthcare institutions for managing image data.<\/p>\n<\/details>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary>What exactly is XNAT and what does it do?<\/summary>\n<p>XNAT (<a href=\"http:\/\/www.xnat.org\/\" target=\"_blank\" rel=\"noreferrer noopener\">www.xnat.org<\/a>) is a secure data-curation platform for images used in research projects. Its core function is to manage the import, archiving, processing, visualisation and secure distribution of image and related study data.&nbsp;<\/p>\n<\/details>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary>Who will host data? (in-house solution\/cloud, name of the provider)<\/summary>\n<p>Data will be hosted either by the Institute of Cancer Research (ICR) or Royal Marsden (RM) depending on the particular project.<\/p>\n\n\n\n<p>For projects domiciled with ICR, data are stored on ICR-owned equipment at the <a href=\"https:\/\/virtusdatacentres.com\/locations\/uk\/london\/london-4-slough\">VIRTUS LONDON4 data centre in Slough<\/a>. LONDON4 is the home of the Jisc Shared Data Centre, comprising of approximately 25 academic and research organisations. This represents some of the UK&#8217;s most powerful supercomputers.<\/p>\n\n\n\n<p>Projects domiciled with RM are hosted on the RM&#8217;s Azure Cloud tenancy, with data stored only in the  UK. A generalised Data Protection Impact Assessment for the use of XNAT has been approved and signed off by RM and a detailed risk assessment was undertaken as part of this. &nbsp;<\/p>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary>What physical security measures are in place to protect hardware used to store data?<\/summary>\n<p>The LONDON4 site is highly secure. VIRTUS operates a &#8216;defence-in-depth&#8217; approach to security. With a dedicated on-site security team 24\/7, protecting IT infrastructure is VIRTUS\u2019 highest priority.<\/p>\n\n\n\n<p>Microsoft provides similar guarantees regarding the physical layer that provides its UK cloud infrastructure.&nbsp;<\/p>\n<\/details>\n<\/details>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary>What servers do your systems run on?&nbsp;<\/summary>\n<p>Our current systems are Ubuntu 20.04 LTS VM servers.<\/p>\n\n\n\n<p>For projects stored in ICR&#8217;s jurisdiction, VMs run under a vSphere hypervisor on a resilient three-node physical cluster, and built from a hardened template supplied by IT security professionals in The Institute of Cancer Research,&nbsp;based on the CIS Ubuntu Linux Benchmark 1.0.0. The hardware infrastructure for the servers is located within Jisc shared data centre (part of the secure Virtus LONDON 4 data centre, physically located in Slough). Physical access procedures are tightly controlled. Topologically, all systems lie completely within the ICR&#8217;s internal network (i.e., not exposed in the DMZ) and, hence behind the ICR&#8217;s main firewall. Risk is minimised by opening only those ports that are strictly necessary for operation of the system, currently, those dedicated to the HTTPS and DICOM protocols.<\/p>\n\n\n\n<p>For projects stored within RM, our Azure servers are managed by the RM&#8217;s partner infrastructure company <a href=\"https:\/\/www.agilisys.co.uk\/\">Agilisys<\/a>.&nbsp;The XNAT Team has hardened the VMs according to the same high standards as within the ICR on-premises estate and the XNAT Team also provides day-to-day management of applications on these servers.<\/p>\n\n\n\n<p>There are no end-user logins and no opportunity for end users to write data to the system other than via the XNAT application. The systems run no &#8220;end-user applications&#8221; (e.g., word processing, email clients, web browsers, etc.) so that even system administrators have little possibility to inadvertently access malware.<\/p>\n<\/details>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary>How do you ensure that the systems are updated?&nbsp;<\/summary>\n<p>For servers in ICR&#8217;s jurisdiction, the update system is managed by ICR Digital Services. Security patches are applied within days of becoming available. Other package updates are flagged and applied by the XNAT Team at the next suitable downtime period.&nbsp;<\/p>\n\n\n\n<p>For servers in RM&#8217;s Azure subscription, security updates and patches are applied in a timely fashion by <a href=\"https:\/\/www.agilisys.co.uk\/\">Agilisys<\/a>, the RM&#8217;s cloud infrastructure technical partner. Other package updates are applied at the next convenient opportunity by the XNAT Team. <\/p>\n<\/details>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary>What security measures are in place to protect our data? (AV\/endpoint protection, Firewall, hard drive encryption standards, etc.)<\/summary>\n<p>For ICR servers, protection is provided via Crowdstrike Falcon endpoint protection and the main ICR firewall, with restrictive rules allowing access for external users only via ICR web proxy (HTTPS traffic) or main firewall (traffic via the DICOM protocol).<\/p>\n\n\n\n<p>RM servers are protected by an extremely restrictive firewall that allows access only to a small number of whitelisted external sites.<\/p>\n<\/details>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary>Do you encrypt data at rest?&nbsp;<\/summary>\n<p>No. Given the previously described measures taken to protect the physical hardware, this is not necessary.&nbsp;<\/p>\n\n\n\n<p><\/p>\n<\/details>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary>How will you transfer the data? (transfer solutions, encryption standards, etc.)<\/summary>\n<p>Transfer will take place via the HTTPS protocol encrypted using the TLS1.2 standard.&nbsp;<\/p>\n<\/details>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary>What are the access control measures? (2FA, minimum password requirements, VPN, IP whitelisting, etc.)<\/summary>\n<p>Access to the XNAT servers on which data are stored is controlled via either the ICR or RM (as appropriate) network username, password and 2FA provision, and is available only to a handful of sysadmins. Access to the XNAT webapp is protected as follows:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>XNAT accounts are issued to a limited range of authorised users.<\/li>\n\n\n\n<li>XNAT accounts are accessed via username and password, with a maximum of 5 failed logins (after which the account is locked for a specified time period, currently 1 hour)<\/li>\n\n\n\n<li>XNAT user session auto-logout for inactivity occurs after 15 minutes<\/li>\n\n\n\n<li>XNAT users are disabled for inactivity if no there are no logins for a specified time period.<\/li>\n\n\n\n<li>Within XNAT, data are available according to role-based access that minimises visibility to non-authorised users.<\/li>\n<\/ul>\n<\/details>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary>Has penetration testing been conducted and were all high risks addressed?<\/summary>\n<p>Penetration testing was conducted by <a href=\"https:\/\/mti.com\/\">MTI Technology<\/a>  in May 2023 and all security considerations were addressed in a detailed response document.<\/p>\n<\/details>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary>Who is responsible for managing access control? Who grants access to the system?<\/summary>\n<p>Simon Doran, with certain aspects delegated to local ICR database administrator, Thesha Thavaraja. At all times we are guided by the relevant PIs and Trial Steering Committees of the various trials\/studies hosted.<\/p>\n<\/details>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary>Are you going to use portable devices to handle our data?<\/summary>\n<p>Deliberately not. By design, our systems are based on fixed servers and we strongly encourage networked data upload. We strongly discourage the use of portable media (e.g., DVDs, USB hard drives or memory sticks). However, If the latter turn out to be the only way that a collaborator can deliver data to us, <em>in extremis<\/em>, we will accept pseudonymised or fully anonymised data on suitably encrypted hard drives (with the liability on the data originator to specify the hardware and level of encryption appropriately).&nbsp;<\/p>\n<\/details>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary>What data types will you use? (DOB, CHI, Name, Address, diagnosis, etc.)<\/summary>\n<p>The main data type we use is&nbsp;<em>anonymised DICOM image<\/em>. We will store some patient demographic information as mandated by clinical studies, but only data that does not identify the patient (e.g., weight and height, smoking status and age (but not DOB)).&nbsp;<\/p>\n<\/details>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary>Can you provide details of any data backup? (physical location, retention period, etc.)<\/summary>\n<p>For data stored within ICR&#8217;s jurisdiction, backup is to the ICR\u2019s Research Data Storage (RDS) infrastructure, geo-dispersed between Slough and our premises at Sutton. The retention period for these backups is negotiable on a study-by-study, but is typically the same as agreed for the clinical study\/trial as a whole.&nbsp;For data stored on RM&#8217;s Azure platform, backup is provided under the terms of the RM&#8217;s SLA with infrastructure partner Agilisys.<\/p>\n<\/details>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary>How will the data be removed? (Certified\/Industry approved standards of data deletion, hardware decommissioning standards)<\/summary>\n<p>The primary copy of the data will be removed from XNAT either via the web interface or programmatically via the REST API. System administrators are able to inspect the filesystem to ensure files have been removed. The server disks will not be removed from the server room except in the case of malfunction (in which case they will be replaced under a service agreement, with the original being handed to the ICR IT department for secure destruction of data). The server will remain in the data centre until it is decommissioned, at which point ICR staff will render data non recoverable. ICR has a subsection on data destruction as part of its Retention Policy. Data stored on RM&#8217;s Azure tenancy will be removed via appropriate actions by Agilisys colleagues.<\/p>\n<\/details>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary>Will any 3rd parties have access to our data?&nbsp;<\/summary>\n<p>The people with access to the data will be:&nbsp;<\/p>\n\n\n\n<ol class=\"wp-block-list\" start=\"1\">\n<li>The list of authorised XNAT users for the study\/trial.&nbsp;<\/li>\n\n\n\n<li>The XNAT system administrators (currently, Simon Doran, James Darcy and Thesha Thavaraja). This access is required in order to manage the platform.&nbsp;<\/li>\n\n\n\n<li>Selected staff from ICR Digital Services or RM Digital, as required to provide technical support. It is not expected that these staff will need to inspect any clinical trial data.<\/li>\n<\/ol>\n<\/details>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary>What access control monitoring\/auditing measures are in place?<\/summary>\n<p>All database activity (i.e., all REST queries) are saved in XNAT\u2019s access.log file, which records the access date and time (with millisecond precision) name of the accessing user and a description of the activity.<\/p>\n\n\n\n<p><\/p>\n<\/details>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary>Who is responsible for system management? (support contact, SLAs, etc.)<\/summary>\n<p>Simon Doran, Senior Staff Scientist at ICR, with certain aspects delegated to the ICR Digital Services and Agilisys as relevant.<\/p>\n<\/details>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary>Is XNAT Desktop Client safe to download and install?<\/summary>\n<ul class=\"wp-block-list\">\n<li>Yes. XNAT Desktop Client is the recommended software for uploading data into XNAT. It has the following advantages:&nbsp;<\/li>\n<\/ul>\n\n\n\n<ol class=\"wp-block-list\" start=\"1\">\n<li>It is specifically designed for uploading to XNAT with an improved workflow&nbsp;<\/li>\n\n\n\n<li>It enables pixel level anonymisation to avoid leakage of &#8220;burned-in&#8221; patient information&nbsp;<\/li>\n\n\n\n<li>It allows the ICR XNAT team to ensure that data uploaders pseudonymise data correctly and always use the correct &#8220;anonymisation scripts&#8221; for a given study. This is particularly important in multicentre trials where metadata consistency is important.\u00a0<\/li>\n<\/ol>\n\n\n\n<ul class=\"wp-block-list\">\n<li>XNAT Desktop Client should be downloaded directly from&nbsp;<a href=\"https:\/\/xnat.org\/download\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/xnat.org\/download<\/a>. It has the following security features:&nbsp;<\/li>\n<\/ul>\n\n\n\n<ol class=\"wp-block-list\" start=\"1\">\n<li>It is built on a version of Java to which Oracle has committed to extended support until December 2030.&nbsp;<\/li>\n\n\n\n<li>It is digitally signed.&nbsp;<\/li>\n\n\n\n<li>The open-source nature of the software means that IT Security departments can verify the code that will be run should they choose to do so.&nbsp;<\/li>\n\n\n\n<li>It is actively maintained: four major releases in 2023; latest release 2023-06-09.\u00a0<\/li>\n\n\n\n<li>The ICR has privileged access to the development team and JIRA issue tracker, and can thus warn of any security alerts rapidly.&nbsp;<\/li>\n<\/ol>\n<\/details>\n","protected":false},"excerpt":{"rendered":"<p>FAQ for information security officers The following list of questions has been drawn from interactions with IT, Information Governance and Information Security officers at a number of NHS institutions over the last five years.<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":335,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-345","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/xnat-repository.icr.ac.uk\/index.php?rest_route=\/wp\/v2\/pages\/345","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/xnat-repository.icr.ac.uk\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/xnat-repository.icr.ac.uk\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/xnat-repository.icr.ac.uk\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/xnat-repository.icr.ac.uk\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=345"}],"version-history":[{"count":22,"href":"https:\/\/xnat-repository.icr.ac.uk\/index.php?rest_route=\/wp\/v2\/pages\/345\/revisions"}],"predecessor-version":[{"id":786,"href":"https:\/\/xnat-repository.icr.ac.uk\/index.php?rest_route=\/wp\/v2\/pages\/345\/revisions\/786"}],"up":[{"embeddable":true,"href":"https:\/\/xnat-repository.icr.ac.uk\/index.php?rest_route=\/wp\/v2\/pages\/335"}],"wp:attachment":[{"href":"https:\/\/xnat-repository.icr.ac.uk\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=345"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}