SlideShare a Scribd company logo
We take Security and
Data Protection
Seriously
Physical Security
The MRX servers are housed in Telehouse Data
Centre, Docklands, London.
Physical Security
Telehouse provides:
•Independent client card identification access system.
•Secure & monitored single-person point of entry,
physically guarded 24/7 and integrated digital video
camera surveillance.
•Proximity card access will be provided from the main
Data Centre building and will be issued to specific
facilities management suites.
•Strict security processes in place to ensure delivery and
loading of goods are secure.
Physical Security
•CCTV coverage for the perimeter, common areas and facilities
management suites.
•Perimeter fence is fitted with intruder sensing.
•Secure access procedures to ensure nominated staff can gain
authorised access to the facility day or night.
Server Connectivity
https – Secure Web for user access to the system.
SSH – Secure Shell using a non standard port for
system administration access to the system.
Both these connection
types use public-key
cryptography to protect
data travelling between
client and server using
256-bit encryption.
Mrx security
Mrx security
Server Connectivity
Public Key Certificate
•Every client that connects to the server must
have a Private Key Installed that matches a
Public Key held on the server.
•Each Client has their own key pair.
•Without a valid key pair it is impossible to
connect to the server remotely.
Mrx security
Mrx security
Sensitive Data Storage
•Stored in a secure area of a SAN located
in the same rack as the server in
Telehouse London.
•Deleted once it has been downloaded.
•Encrypted using the OpenPGP standard.
Sensitive Data Storage
OpenPGP (Pretty Good Privacy)
•Uses Public Private Key Encryption.
•Public Key held on the server used
to Encrypt data.
•Private key held by the client is the
only way to Decrypt the data.
•Minimum 2048-bit Encryption.
Identity Control
Organisations new to MR X request access to the
system by completing an online form on the public
web site.
Identity Control
We verity the authenticity, address, telephone number
of the applicant organisation and capture details of the
senior staff using yell and industry specific lists.
Identity Control
We call the applicant organisation using the
publicly available phone number, confirm the
authority of the person applying. We verbally agree
pass phrases for keys, and initial password for the
system with the applicant.
Key and Certificate Control
The agreed passwords and phrases are passed to
the system administration team on paper (no
electronic copy is taken and any form of copying of
the original paper copy is not allowed).
Key and Certificate Control
•The system administrators, using a stand alone
computer create and signs the key pair for connecting
to the server using the agreed passphrase.
•The User is created on the system.
•The public key is loaded onto the MR-X servers.
•Paper containing pass phrases and
passwords are destroyed.
•All keys are valid for 1 year.
•Keys can be revoked if they are
compromised.
Key and Certificate Control
The following are emailed to the applicant:
•Private key and Certificate.
•Root Certificate.
•User name.
•Instructions as to what to do next.
•User Manual.
Key and Certificate Control
•The client follows the instructions sent to them to
install certificates (they require the passphrase
previously agreed with us) on to any computers they
require to access the MR-X system.
•The client can then log onto the system, change their
password, create additional users.
•The instructions make the client aware that they are
responsible for their own security and they must advise
us if security is breached.
PGP Implementation
•PGP is only required to be installed by those
organisations receiving Medical Records.
•For those that require PGP as a desktop application we
provide a link to the Gpg4win program.
•For those that receive a large number of Medical
records we can provide a hardware solution.
PGP Implementation
Instructions are given to the client:
•How to create a PGP key pair.
•How to use Gpg4win with the MR-X system.
•To send us the Public key.
PGP Implementation
•We will call the client to confirm they sent us the key
and to authenticate it through the key fingerprint.
•We will sign and install the public key on the MR-X
servers.
•We will register the key against the clients account on
the MR-X system and activate the “receive medical
records” feature.

More Related Content

PPTX
Authentication
PDF
Unsafe Harbor - Tailoring Encryption to Meet HIPAA and Safe Harbor
PPTX
Application layer Security in IoT: A Survey
PPTX
Secure remote device access
PPTX
IP Protocol Security
PPTX
eWON_SecurityV5 - Public
PDF
Tatanet Corporate Presentation
PPTX
Authentication
Unsafe Harbor - Tailoring Encryption to Meet HIPAA and Safe Harbor
Application layer Security in IoT: A Survey
Secure remote device access
IP Protocol Security
eWON_SecurityV5 - Public
Tatanet Corporate Presentation

What's hot (20)

PPTX
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
PPTX
Advance Consulting Experts
PPSX
Wireless Network Security
PPT
Lesson 3- Remote Access
PDF
Fortinet FortiGate 100D
PDF
Panda Security - Gatedefender
PPTX
Access Control Firewall
PPTX
OwnYIT CSAT + SIEM
PPT
LAN Security
PPTX
Improvement WiFi Security Network Access
PPTX
Wireless Network security
PPTX
Security standard
PDF
Wireless Security Audits
PPT
SGSB Webcast 2 : Smart grid and data security
PPT
Fortigate Training
PDF
Access RouterOS using Multi-Factor Authentication
PPTX
Secured Communication Infrastructure for Substation Automation
PDF
Virtual private network
PPT
The WiKID Strong Authentication Systems Overview
PPTX
Provable Device Cybersecurity in Blockchain Transactions
Entrepreneurship & Commerce in IT - 11 - Security & Encryption
Advance Consulting Experts
Wireless Network Security
Lesson 3- Remote Access
Fortinet FortiGate 100D
Panda Security - Gatedefender
Access Control Firewall
OwnYIT CSAT + SIEM
LAN Security
Improvement WiFi Security Network Access
Wireless Network security
Security standard
Wireless Security Audits
SGSB Webcast 2 : Smart grid and data security
Fortigate Training
Access RouterOS using Multi-Factor Authentication
Secured Communication Infrastructure for Substation Automation
Virtual private network
The WiKID Strong Authentication Systems Overview
Provable Device Cybersecurity in Blockchain Transactions
Ad

Similar to Mrx security (20)

PDF
Datasheet: Security
PDF
Implementing the 5 Pillars of IT Security for MQTT
PPTX
Cloud Security_Module_1_Module_2_3_4.pptx
PPTX
Public Digital Identity as a Service
PPT
Security Issues of Cloud Computing
PPTX
Network security
PPT
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
PPSX
Secure electronic transaction
PPTX
How to do right cryptography in android part 3 / Gated Authentication reviewed
PPTX
How to write secure code
PPTX
Security framework
PPTX
L4 internet security
PDF
Ch11 Vpn
DOCX
Authentic Assessment Project (AAP) Jan 2017Background Informat.docx
PPT
Implementing an improved security for collin’s database and telecommuters
PPTX
Single Sign-On & Strong Authentication
PPT
Material best practices in network security using ethical hacking
PPTX
Access-control-system
PDF
Basics of Data Security and Cryptographic techniques
PPT
VPN Computer NEtwork cyber security.ppt
Datasheet: Security
Implementing the 5 Pillars of IT Security for MQTT
Cloud Security_Module_1_Module_2_3_4.pptx
Public Digital Identity as a Service
Security Issues of Cloud Computing
Network security
MOBILE & WIRELESS SECURITY And MOBILE & WIRELESS SECURITY
Secure electronic transaction
How to do right cryptography in android part 3 / Gated Authentication reviewed
How to write secure code
Security framework
L4 internet security
Ch11 Vpn
Authentic Assessment Project (AAP) Jan 2017Background Informat.docx
Implementing an improved security for collin’s database and telecommuters
Single Sign-On & Strong Authentication
Material best practices in network security using ethical hacking
Access-control-system
Basics of Data Security and Cryptographic techniques
VPN Computer NEtwork cyber security.ppt
Ad

Recently uploaded (20)

PDF
Zenith AI: Advanced Artificial Intelligence
PDF
A novel scalable deep ensemble learning framework for big data classification...
PDF
project resource management chapter-09.pdf
PDF
Mushroom cultivation and it's methods.pdf
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PPTX
OMC Textile Division Presentation 2021.pptx
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Hindi spoken digit analysis for native and non-native speakers
PPTX
Tartificialntelligence_presentation.pptx
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PDF
Encapsulation theory and applications.pdf
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
Enhancing emotion recognition model for a student engagement use case through...
PPTX
A Presentation on Touch Screen Technology
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PDF
1 - Historical Antecedents, Social Consideration.pdf
PPTX
TLE Review Electricity (Electricity).pptx
Zenith AI: Advanced Artificial Intelligence
A novel scalable deep ensemble learning framework for big data classification...
project resource management chapter-09.pdf
Mushroom cultivation and it's methods.pdf
NewMind AI Weekly Chronicles - August'25-Week II
OMC Textile Division Presentation 2021.pptx
Programs and apps: productivity, graphics, security and other tools
Hindi spoken digit analysis for native and non-native speakers
Tartificialntelligence_presentation.pptx
Accuracy of neural networks in brain wave diagnosis of schizophrenia
Encapsulation theory and applications.pdf
SOPHOS-XG Firewall Administrator PPT.pptx
A comparative study of natural language inference in Swahili using monolingua...
Enhancing emotion recognition model for a student engagement use case through...
A Presentation on Touch Screen Technology
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
1 - Historical Antecedents, Social Consideration.pdf
TLE Review Electricity (Electricity).pptx

Mrx security

  • 1. We take Security and Data Protection Seriously
  • 2. Physical Security The MRX servers are housed in Telehouse Data Centre, Docklands, London.
  • 3. Physical Security Telehouse provides: •Independent client card identification access system. •Secure & monitored single-person point of entry, physically guarded 24/7 and integrated digital video camera surveillance. •Proximity card access will be provided from the main Data Centre building and will be issued to specific facilities management suites. •Strict security processes in place to ensure delivery and loading of goods are secure.
  • 4. Physical Security •CCTV coverage for the perimeter, common areas and facilities management suites. •Perimeter fence is fitted with intruder sensing. •Secure access procedures to ensure nominated staff can gain authorised access to the facility day or night.
  • 5. Server Connectivity https – Secure Web for user access to the system. SSH – Secure Shell using a non standard port for system administration access to the system. Both these connection types use public-key cryptography to protect data travelling between client and server using 256-bit encryption.
  • 8. Server Connectivity Public Key Certificate •Every client that connects to the server must have a Private Key Installed that matches a Public Key held on the server. •Each Client has their own key pair. •Without a valid key pair it is impossible to connect to the server remotely.
  • 11. Sensitive Data Storage •Stored in a secure area of a SAN located in the same rack as the server in Telehouse London. •Deleted once it has been downloaded. •Encrypted using the OpenPGP standard.
  • 12. Sensitive Data Storage OpenPGP (Pretty Good Privacy) •Uses Public Private Key Encryption. •Public Key held on the server used to Encrypt data. •Private key held by the client is the only way to Decrypt the data. •Minimum 2048-bit Encryption.
  • 13. Identity Control Organisations new to MR X request access to the system by completing an online form on the public web site.
  • 14. Identity Control We verity the authenticity, address, telephone number of the applicant organisation and capture details of the senior staff using yell and industry specific lists.
  • 15. Identity Control We call the applicant organisation using the publicly available phone number, confirm the authority of the person applying. We verbally agree pass phrases for keys, and initial password for the system with the applicant.
  • 16. Key and Certificate Control The agreed passwords and phrases are passed to the system administration team on paper (no electronic copy is taken and any form of copying of the original paper copy is not allowed).
  • 17. Key and Certificate Control •The system administrators, using a stand alone computer create and signs the key pair for connecting to the server using the agreed passphrase. •The User is created on the system. •The public key is loaded onto the MR-X servers. •Paper containing pass phrases and passwords are destroyed. •All keys are valid for 1 year. •Keys can be revoked if they are compromised.
  • 18. Key and Certificate Control The following are emailed to the applicant: •Private key and Certificate. •Root Certificate. •User name. •Instructions as to what to do next. •User Manual.
  • 19. Key and Certificate Control •The client follows the instructions sent to them to install certificates (they require the passphrase previously agreed with us) on to any computers they require to access the MR-X system. •The client can then log onto the system, change their password, create additional users. •The instructions make the client aware that they are responsible for their own security and they must advise us if security is breached.
  • 20. PGP Implementation •PGP is only required to be installed by those organisations receiving Medical Records. •For those that require PGP as a desktop application we provide a link to the Gpg4win program. •For those that receive a large number of Medical records we can provide a hardware solution.
  • 21. PGP Implementation Instructions are given to the client: •How to create a PGP key pair. •How to use Gpg4win with the MR-X system. •To send us the Public key.
  • 22. PGP Implementation •We will call the client to confirm they sent us the key and to authenticate it through the key fingerprint. •We will sign and install the public key on the MR-X servers. •We will register the key against the clients account on the MR-X system and activate the “receive medical records” feature.