SlideShare a Scribd company logo
1 of 12
GT.M/Linux Robustness, Security, &
 Continuity of Business for VistA


                  K.S. Bhaskar
      Fidelity Information Services, Inc.
             ks.bhaskar@fnf.com
              +1 (610) 578-4265
Objectives


• Correct information and usable functionality is available for
  those who need it, when they need it
   – Within limits of the design and implementation
• Not available otherwise




                                                                  2
Layers


• VistA – separate topic, covered by Dave Whitten
• MUMPS [GT.M]
• Operating System [GNU/Linux]




                                                    3
GT.M Security


• Daemonless architecture
   – Processes run with normal user ids
   – Processes can access database files if they have
     access permissions granted by the operating system
   – Enable / control using file ownership & permissions;
     user & group ids
        • Use Access Control Lists (ACLs) or SE Linux for finer
          grained control
• Published security model – read it, understand it, use it




                                                                  4
GT.M Database and Routine Access



      Routine            Routine

                                             $ZROutines

        $ZGbldir


  Process                          Process
                    global
                   directory

                                                  shared memory
                                                 control structures


  database                         journal
     file                            file
                                                                      5
GT.M Security – ASP



           Routine         Routine             $ZROutines

$ZGbldir
                                                     shared memory
                                                    control structures
                      global
                     directory
    Process                          Process                database
                                                               file




                                                             journal
                                  shared memory                file
database        journal
                                 control structures
   file           file
                                                                         6
Robustness


• Journaling
   – Use before image journaling in production
   – Consider journaling even for development environments
       • NOBEFORE may suffice, unless replicated
• Backup early, backup often
• Integrity
   – Trust but verify




                                                         7
Logical multi-site operation



                Secondary


   Primary           ...          Tertiary


1 primary
                Secondary            ...

             16 secondaries
                                  Tertiary

                              256 tertiaries

                                               4096 quarternaries
                                                                8
Linux security


• Use Linux security!
   – Each user has own user id
   – Each group has own group id
   – ssh, xinetd, stunnel, etc. – build on standard security
     models and tools that the Internet infrastructure is built
     on




                                                                  9
Encryption


• Use the loop-aes file system
   – Databases
   – Journal files
   – Swap files
• Remember to encrypt back-ups (e.g., with mcrypt)
   – Unencrypted backups are perhaps the most overlooked
      serious vulnerability
• You can't stop the National Security Agency from getting
  your patient data if they want to, but you can make it hard
  for them




                                                           10
What gives?


• The weakest link
   – If humans and strong passwords are your weakest link,
     you have done a good job of security
   – Absolute security does not exist – you just want to make
     it not a worthwhile investment of time and effort




                                                           11
Thank you


    K.S. Bhaskar
ks.bhaskar@fnf.com
 +1 (610) 578-4265




                     12

More Related Content

Similar to VistA GT.M & Linux Security 062506

DefCon 2012 - Anti-Forensics and Anti-Anti-Forensics
DefCon 2012 - Anti-Forensics and Anti-Anti-ForensicsDefCon 2012 - Anti-Forensics and Anti-Anti-Forensics
DefCon 2012 - Anti-Forensics and Anti-Anti-Forensics
Michael Smith
 
Red Hat Storage - Introduction to GlusterFS
Red Hat Storage - Introduction to GlusterFSRed Hat Storage - Introduction to GlusterFS
Red Hat Storage - Introduction to GlusterFS
GlusterFS
 
ModeShape 3 overview
ModeShape 3 overviewModeShape 3 overview
ModeShape 3 overview
Randall Hauch
 
Key-value databases in practice Redis @ DotNetToscana
Key-value databases in practice Redis @ DotNetToscanaKey-value databases in practice Redis @ DotNetToscana
Key-value databases in practice Redis @ DotNetToscana
Matteo Baglini
 
App cap2956v2-121001194956-phpapp01 (1)
App cap2956v2-121001194956-phpapp01 (1)App cap2956v2-121001194956-phpapp01 (1)
App cap2956v2-121001194956-phpapp01 (1)
outstanding59
 
Inside the Hadoop Machine @ VMworld
Inside the Hadoop Machine @ VMworldInside the Hadoop Machine @ VMworld
Inside the Hadoop Machine @ VMworld
Richard McDougall
 

Similar to VistA GT.M & Linux Security 062506 (20)

DefCon 2012 - Anti-Forensics and Anti-Anti-Forensics
DefCon 2012 - Anti-Forensics and Anti-Anti-ForensicsDefCon 2012 - Anti-Forensics and Anti-Anti-Forensics
DefCon 2012 - Anti-Forensics and Anti-Anti-Forensics
 
Novell File Management Suite Use Cases
Novell File Management Suite Use CasesNovell File Management Suite Use Cases
Novell File Management Suite Use Cases
 
Novell File Management Suite Use Cases
Novell File Management Suite Use CasesNovell File Management Suite Use Cases
Novell File Management Suite Use Cases
 
Gluster Webinar: Introduction to GlusterFS
Gluster Webinar: Introduction to GlusterFSGluster Webinar: Introduction to GlusterFS
Gluster Webinar: Introduction to GlusterFS
 
Novell Storage Manager: Your Secret Weapon for Simplified File and User Manag...
Novell Storage Manager: Your Secret Weapon for Simplified File and User Manag...Novell Storage Manager: Your Secret Weapon for Simplified File and User Manag...
Novell Storage Manager: Your Secret Weapon for Simplified File and User Manag...
 
Novell File Management Suite: Intelligently Manage File Storage for Maximum B...
Novell File Management Suite: Intelligently Manage File Storage for Maximum B...Novell File Management Suite: Intelligently Manage File Storage for Maximum B...
Novell File Management Suite: Intelligently Manage File Storage for Maximum B...
 
Red Hat Storage - Introduction to GlusterFS
Red Hat Storage - Introduction to GlusterFSRed Hat Storage - Introduction to GlusterFS
Red Hat Storage - Introduction to GlusterFS
 
Panzura & Scality - Cloud Storage made seamless - Cloud Expo New York City 2012
Panzura & Scality - Cloud Storage made seamless - Cloud Expo New York City 2012Panzura & Scality - Cloud Storage made seamless - Cloud Expo New York City 2012
Panzura & Scality - Cloud Storage made seamless - Cloud Expo New York City 2012
 
How to build an admin guy
How to build an admin guyHow to build an admin guy
How to build an admin guy
 
Windows 7 Architecture
Windows 7 ArchitectureWindows 7 Architecture
Windows 7 Architecture
 
ModeShape 3 overview
ModeShape 3 overviewModeShape 3 overview
ModeShape 3 overview
 
Intro to GlusterFS Webinar - August 2011
Intro to GlusterFS Webinar - August 2011Intro to GlusterFS Webinar - August 2011
Intro to GlusterFS Webinar - August 2011
 
Firebird database recovery and protection for enterprises and ISV
Firebird database recovery and protection for enterprises and ISVFirebird database recovery and protection for enterprises and ISV
Firebird database recovery and protection for enterprises and ISV
 
You suck at Memory Analysis
You suck at Memory AnalysisYou suck at Memory Analysis
You suck at Memory Analysis
 
Key-value databases in practice Redis @ DotNetToscana
Key-value databases in practice Redis @ DotNetToscanaKey-value databases in practice Redis @ DotNetToscana
Key-value databases in practice Redis @ DotNetToscana
 
Databases
DatabasesDatabases
Databases
 
Novell File Management Suite for Microsoft Active Directory Environments
Novell File Management Suite for Microsoft Active Directory EnvironmentsNovell File Management Suite for Microsoft Active Directory Environments
Novell File Management Suite for Microsoft Active Directory Environments
 
Hard Disk Encryptions
Hard Disk EncryptionsHard Disk Encryptions
Hard Disk Encryptions
 
App cap2956v2-121001194956-phpapp01 (1)
App cap2956v2-121001194956-phpapp01 (1)App cap2956v2-121001194956-phpapp01 (1)
App cap2956v2-121001194956-phpapp01 (1)
 
Inside the Hadoop Machine @ VMworld
Inside the Hadoop Machine @ VMworldInside the Hadoop Machine @ VMworld
Inside the Hadoop Machine @ VMworld
 

More from ckuyehar

Iehr ciif sdk-slides-draft-h
Iehr ciif sdk-slides-draft-hIehr ciif sdk-slides-draft-h
Iehr ciif sdk-slides-draft-h
ckuyehar
 
Clinica PECS2
Clinica PECS2Clinica PECS2
Clinica PECS2
ckuyehar
 
RPMS EHR WorldVistA 061607
RPMS EHR WorldVistA 061607RPMS EHR WorldVistA 061607
RPMS EHR WorldVistA 061607
ckuyehar
 
Vista For Research
Vista For ResearchVista For Research
Vista For Research
ckuyehar
 
Mexico Pittsburgh Ece Introduction
Mexico Pittsburgh Ece IntroductionMexico Pittsburgh Ece Introduction
Mexico Pittsburgh Ece Introduction
ckuyehar
 
FQHC Orientation
FQHC OrientationFQHC Orientation
FQHC Orientation
ckuyehar
 
Chart Book 2006
Chart Book 2006Chart Book 2006
Chart Book 2006
ckuyehar
 
WorldVistA 061607
WorldVistA 061607WorldVistA 061607
WorldVistA 061607
ckuyehar
 
WorldVistA by K.S. Bhaskar
WorldVistA by K.S. BhaskarWorldVistA by K.S. Bhaskar
WorldVistA by K.S. Bhaskar
ckuyehar
 
FDA Presentation 07/17/07
FDA Presentation 07/17/07FDA Presentation 07/17/07
FDA Presentation 07/17/07
ckuyehar
 
Landis - System Administration
Landis - System AdministrationLandis - System Administration
Landis - System Administration
ckuyehar
 
Landis - Mumps
Landis - MumpsLandis - Mumps
Landis - Mumps
ckuyehar
 
FileMan Training Part 3
FileMan Training Part 3FileMan Training Part 3
FileMan Training Part 3
ckuyehar
 
FileMan Training Part 1
FileMan Training Part 1FileMan Training Part 1
FileMan Training Part 1
ckuyehar
 
FileMan Training Part 2
FileMan Training Part 2FileMan Training Part 2
FileMan Training Part 2
ckuyehar
 
WorldVistA Business Plan Overview
WorldVistA Business Plan OverviewWorldVistA Business Plan Overview
WorldVistA Business Plan Overview
ckuyehar
 
WorldVistA Business Plan
WorldVistA Business PlanWorldVistA Business Plan
WorldVistA Business Plan
ckuyehar
 

More from ckuyehar (20)

Iehr ciif sdk-slides-draft-h
Iehr ciif sdk-slides-draft-hIehr ciif sdk-slides-draft-h
Iehr ciif sdk-slides-draft-h
 
American Recovery and Reinvestment Act of 2009 HIT
American Recovery and Reinvestment Act of 2009 HITAmerican Recovery and Reinvestment Act of 2009 HIT
American Recovery and Reinvestment Act of 2009 HIT
 
The Rise and Fall and Rise of Standard MUMPS
The Rise and Fall and Rise of Standard MUMPSThe Rise and Fall and Rise of Standard MUMPS
The Rise and Fall and Rise of Standard MUMPS
 
Clinica PECS2
Clinica PECS2Clinica PECS2
Clinica PECS2
 
RPMS EHR WorldVistA 061607
RPMS EHR WorldVistA 061607RPMS EHR WorldVistA 061607
RPMS EHR WorldVistA 061607
 
Vista For Research
Vista For ResearchVista For Research
Vista For Research
 
Mexico Pittsburgh Ece Introduction
Mexico Pittsburgh Ece IntroductionMexico Pittsburgh Ece Introduction
Mexico Pittsburgh Ece Introduction
 
Iahit
IahitIahit
Iahit
 
FQHC Orientation
FQHC OrientationFQHC Orientation
FQHC Orientation
 
Chart Book 2006
Chart Book 2006Chart Book 2006
Chart Book 2006
 
WorldVistA 061607
WorldVistA 061607WorldVistA 061607
WorldVistA 061607
 
WorldVistA by K.S. Bhaskar
WorldVistA by K.S. BhaskarWorldVistA by K.S. Bhaskar
WorldVistA by K.S. Bhaskar
 
FDA Presentation 07/17/07
FDA Presentation 07/17/07FDA Presentation 07/17/07
FDA Presentation 07/17/07
 
Landis - System Administration
Landis - System AdministrationLandis - System Administration
Landis - System Administration
 
Landis - Mumps
Landis - MumpsLandis - Mumps
Landis - Mumps
 
FileMan Training Part 3
FileMan Training Part 3FileMan Training Part 3
FileMan Training Part 3
 
FileMan Training Part 1
FileMan Training Part 1FileMan Training Part 1
FileMan Training Part 1
 
FileMan Training Part 2
FileMan Training Part 2FileMan Training Part 2
FileMan Training Part 2
 
WorldVistA Business Plan Overview
WorldVistA Business Plan OverviewWorldVistA Business Plan Overview
WorldVistA Business Plan Overview
 
WorldVistA Business Plan
WorldVistA Business PlanWorldVistA Business Plan
WorldVistA Business Plan
 

Recently uploaded

Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Sheetaleventcompany
 
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
lizamodels9
 
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
amitlee9823
 
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
dlhescort
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
amitlee9823
 

Recently uploaded (20)

Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023Mondelez State of Snacking and Future Trends 2023
Mondelez State of Snacking and Future Trends 2023
 
Cracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptxCracking the Cultural Competence Code.pptx
Cracking the Cultural Competence Code.pptx
 
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRLBAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
BAGALUR CALL GIRL IN 98274*61493 ❤CALL GIRLS IN ESCORT SERVICE❤CALL GIRL
 
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
Chandigarh Escorts Service 📞8868886958📞 Just📲 Call Nihal Chandigarh Call Girl...
 
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
Call Girls From Pari Chowk Greater Noida ❤️8448577510 ⊹Best Escorts Service I...
 
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
Enhancing and Restoring Safety & Quality Cultures - Dave Litwiller - May 2024...
 
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
Nelamangala Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore...
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service NoidaCall Girls In Noida 959961⊹3876 Independent Escort Service Noida
Call Girls In Noida 959961⊹3876 Independent Escort Service Noida
 
Falcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in indiaFalcon Invoice Discounting platform in india
Falcon Invoice Discounting platform in india
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptxB.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
B.COM Unit – 4 ( CORPORATE SOCIAL RESPONSIBILITY ( CSR ).pptx
 
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
(Anamika) VIP Call Girls Napur Call Now 8617697112 Napur Escorts 24x7
 
Falcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to ProsperityFalcon's Invoice Discounting: Your Path to Prosperity
Falcon's Invoice Discounting: Your Path to Prosperity
 
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
Call Girls Service In Old Town Dubai ((0551707352)) Old Town Dubai Call Girl ...
 

VistA GT.M & Linux Security 062506

  • 1. GT.M/Linux Robustness, Security, & Continuity of Business for VistA K.S. Bhaskar Fidelity Information Services, Inc. ks.bhaskar@fnf.com +1 (610) 578-4265
  • 2. Objectives • Correct information and usable functionality is available for those who need it, when they need it – Within limits of the design and implementation • Not available otherwise 2
  • 3. Layers • VistA – separate topic, covered by Dave Whitten • MUMPS [GT.M] • Operating System [GNU/Linux] 3
  • 4. GT.M Security • Daemonless architecture – Processes run with normal user ids – Processes can access database files if they have access permissions granted by the operating system – Enable / control using file ownership & permissions; user & group ids • Use Access Control Lists (ACLs) or SE Linux for finer grained control • Published security model – read it, understand it, use it 4
  • 5. GT.M Database and Routine Access Routine Routine $ZROutines $ZGbldir Process Process global directory shared memory control structures database journal file file 5
  • 6. GT.M Security – ASP Routine Routine $ZROutines $ZGbldir shared memory control structures global directory Process Process database file journal shared memory file database journal control structures file file 6
  • 7. Robustness • Journaling – Use before image journaling in production – Consider journaling even for development environments • NOBEFORE may suffice, unless replicated • Backup early, backup often • Integrity – Trust but verify 7
  • 8. Logical multi-site operation Secondary Primary ... Tertiary 1 primary Secondary ... 16 secondaries Tertiary 256 tertiaries 4096 quarternaries 8
  • 9. Linux security • Use Linux security! – Each user has own user id – Each group has own group id – ssh, xinetd, stunnel, etc. – build on standard security models and tools that the Internet infrastructure is built on 9
  • 10. Encryption • Use the loop-aes file system – Databases – Journal files – Swap files • Remember to encrypt back-ups (e.g., with mcrypt) – Unencrypted backups are perhaps the most overlooked serious vulnerability • You can't stop the National Security Agency from getting your patient data if they want to, but you can make it hard for them 10
  • 11. What gives? • The weakest link – If humans and strong passwords are your weakest link, you have done a good job of security – Absolute security does not exist – you just want to make it not a worthwhile investment of time and effort 11
  • 12. Thank you K.S. Bhaskar ks.bhaskar@fnf.com +1 (610) 578-4265 12