Got feedback or spotted a mistake?

Leave a comment at the end of this page or email contact@krishagni.com

OpenSpecimen Security features

Latest technology stack

OpenSpecimen is built using the latest versions of all the technology platforms used internally. This includes Tomcat, Apache, MySQL (or MySQL), Java, VueJS, etc.

HTTPS/SSL

OpenSpecimen use an SSL-enabled webserver to encrypt data over the network.

User account security

Organizational Single Sign On (SSO)

This enables users to login into OpenSpecimen using their organizational credentials. It also ensures only active organizational users can access OpenSpecimen. You can configure one or more Identity Providers (IdP) to authenticate users in OpenSpecimen. 

Currently, we support LDAP and SAML-based authentication, apart from the in-built user module of OpenSpecimen.

Two-factor authentication

Two-factor Authentication enables OpenSpecimen customers to implement an additional security layer to protect user accounts. When 2FA is configured, users must enter an additional One Time Password (OTP) along with the username and password.

This system-level configuration applies only to local accounts (i.e., non-SAML/LDAP accounts).

Password encryption

User passwords for local accounts are stored in the MySQL database. To protect the user passwords, OpenSpecimen uses bcrypt to hash the passwords before storing them in the database.

Application features

Password protection

Note: This does not apply if user accounts are integrated with the Customer's Identity Providers (IdP).

  • Password should be of length N characters (default 8)

  • Password complexity defined via RegEx as per customer needs (default: one capital, one number, special character)

  • Cannot be the same as the last N passwords

  • Password expiry every N days

  • Passwords are never emailed in free text

  • Passwords are stored in a one-way encrypted format

  • Accounts are locked after N failed attempts

  • Accounts are locked after N days of inactivity

Where N is configured as per the Customer's needs. 

Login Audit

Every login and logout session is recorded, including failed login attempts. Refer to Other Audit Reports for more details.

Data manipulation audit

Every action resulting in changed data is audited (i.e., create, edit, delete). The audit information contains the following:

  1. Timestamp

  2. User id

  3. IP address

  4. Record id

  5. In the case of edit: old value and new value

Refer to Audit Logs for more details.

Reporting audit

The system maintains an audit log for every report run. The audit information contains the following:

  1. User ID

  2. Timestamp

  3. Report ID

  4. Internal SQL generated

Refer to Other Audit Reports for more details.

PHI data security

Across the globe, the security of PHI data is a matter of concern. There are many strict rules (e.g. HIPAA in the USA, GDPR rules in Europe, etc.). OpenSpecimen provides features to make clients compliant with these rules.

Restricted access to PHI

You can restrict users from viewing PHI data by giving the “Participant (DeID)” privilege.

Data shared via emails

PHI data is not included in any emails. To download any data, the user is provided a link, and he/she has to log in to OpenSpecimen to download the data.

Please refer to this wiki page for more details.

Administrator emails

Administrator email address: Email address is mentioned in Settings --> ‘Administrator Email Address'. All the emails in the systems are CC’d to this email.

IT admin: IT admin email address is mentioned in Settings --> IT administrator email address. This email address is optional and receives notifications for uncaught system errors.

 

Got feedback or spotted a mistake?

Leave a comment at the end of this page or email contact@krishagni.com