Leave a comment at the end of this page or email contact@krishagni.com
OpenSpecimen Security features
Latest technology stack
OpenSpecimen is built using the latest versions of all the technology platforms used internally. This includes Tomcat, Apache, MySQL (or MySQL), Java, VueJS, etc.
HTTPS/SSL
OpenSpecimen use an SSL-enabled webserver to encrypt data over the network.
User account security
Organizational Single Sign On (SSO)
This enables users to login into OpenSpecimen using their organizational credentials. It also ensures only active organizational users can access OpenSpecimen. You can configure one or more Identity Providers (IdP) to authenticate users in OpenSpecimen.
Currently, we support LDAP and SAML-based authentication, apart from the in-built user module of OpenSpecimen.
Two-factor authentication
Two-factor Authentication enables OpenSpecimen customers to implement an additional security layer to protect user accounts. When 2FA is configured, users must enter an additional One Time Password (OTP) along with the username and password.
This system-level configuration applies only to local accounts (i.e., non-SAML/LDAP accounts).
Password encryption
User passwords for local accounts are stored in the MySQL database. To protect the user passwords, OpenSpecimen uses bcrypt
to hash the passwords before storing them in the database.
Application features
Password protection
Note: This does not apply if user accounts are integrated with the Customer's Identity Providers (IdP).
Password should be of length N characters (default 8)
Password complexity defined via RegEx as per customer needs (default: one capital, one number, special character)
Cannot be the same as the last N passwords
Password expiry every N days
Passwords are never emailed in free text
Passwords are stored in a one-way encrypted format
Accounts are locked after N failed attempts
Accounts are locked after N days of inactivity
Where N is configured as per the Customer's needs.
Login Audit
Every login and logout session is recorded, including failed login attempts. Refer to Other Audit Reports for more details.
Data manipulation audit
Every action resulting in changed data is audited (i.e., create, edit, delete). The audit information contains the following:
Timestamp
User id
IP address
Record id
In the case of edit: old value and new value
Refer to Audit Logs for more details.
Reporting audit
The system maintains an audit log for every report run. The audit information contains the following:
User ID
Timestamp
Report ID
Internal SQL generated
Refer to Other Audit Reports for more details.
PHI data security
Across the globe, the security of PHI data is a matter of concern. There are many strict rules (e.g. HIPAA in the USA, GDPR rules in Europe, etc.). OpenSpecimen provides features to make clients compliant with these rules.
Restricted access to PHI
You can restrict users from viewing PHI data by giving the “Participant (DeID)” privilege.
Data shared via emails
PHI data is not included in any emails. To download any data, the user is provided a link, and he/she has to log in to OpenSpecimen to download the data.
Please refer to this wiki page for more details.
Administrator emails
Administrator email address: Email address is mentioned in Settings --> ‘Administrator Email Address'. All the emails in the systems are CC’d to this email.
IT admin: IT admin email address is mentioned in Settings --> IT administrator email address. This email address is optional and receives notifications for uncaught system errors.
DB encryption for MySQL
To ensure data privacy and minimize data vulnerability, OpenSpecimen provides an option to encrypt the MySQL database "at rest" and "in transit".
We can encrypt the data files using the keyring plugin provided by MySQL. Please refer to this Wiki page.
Leave a comment at the end of this page or email contact@krishagni.com