Product Security; Security Features - GE CARESCAPE B850 Service Manual

Monitor
Hide thumbs Also See for CARESCAPE B850:
Table of Contents

Advertisement

3.6 Product security

The patient monitoring software incorporates an assortment of security features designed to
allow a flexible approach to safe and secure implementation, focusing on the principles of
confidentiality, integrity, and availability. These features assist you in using the system in a
manner that protects patient privacy and security in your setting, and also addresses
expectations for the environment where the system will be used.

3.6.1 Security features

Access control
Access control is the overall mechanism used to determine and enforce the following:
Who has access
How individuals gain access
When access is permitted
What information may be accessed
Other than clinical and Webmin applications, access to other subsystems (for example BIOS) is
restricted. The clinical and Webmin application interfaces have a role-based access control (for
example, biomed and clinical). A user may log into these interfaces (for example, Webmin) to
perform operations that are limited to the generic user. See the user and service manuals for
detailed information on available features.
Authentication
Authentication is the process of proving individual identity, and is a key element in an access
control system. In the clinical and Webmin applications, there are certain features that require
user authentication. To access these features, the user must log into the clinical and Webmin
applications with a valid username and password.
Authorization
Authorization is the process of granting and revoking access to information, and is another key
element in an access control system. Although primarily an administrative process that is
driven by an organization's policies and procedures, the patient monitor contains features that
will help implement and enforce an organization's method.
Both clinical and Webmin applications have an authorization mechanism to provide
information to the user.
Audit
The ability to record and examine system activity is crucial to a successful information security
program, as well as a regulatory requirement in most environments. The patient monitor stores
system and Webmin access logs.
Malicious software protection
Vigilant defense on many levels is required to keep systems free from compromise by
malicious software. Effective protection requires cooperation and partnership between GE and
our customers.
Based on the Linux Operating System, the patient monitor has a built-in firewall to allow
external communication to occur on a limited number of ports on the IX Network.
The following product features contribute to defense against malicious software:
System integrity checking
System introduction
23
2106778-001

Advertisement

Table of Contents
loading

Table of Contents