Log Your CRUD: Design Principles for Software Logging Mechanisms
Title | Log Your CRUD: Design Principles for Software Logging Mechanisms |
Publication Type | Conference Paper |
Year of Publication | 2014 |
Authors | King, Jason, Williams, Laurie |
Conference Name | Proceedings of the 2014 Symposium and Bootcamp on the Science of Security |
Publisher | ACM |
Conference Location | Raleigh, NC, USA |
ISBN Number | 978-1-4503-2907-1 |
Keywords | accountability, ACM CCS, audit, black-box testing, case study, CPS Domains, cyber security, Database Activity Monitoring, Database and Storage Security, electronic health record software, Foundations, Health Care, healthcare, logging mechanism, Medical Devices, nonrepudiation, science, science of security, Software and Application Security |
Abstract | According to a 2011 survey in healthcare, the most commonly reported breaches of protected health information involved employees snooping into medical records of friends and relatives. Logging mechanisms can provide a means for forensic analysis of user activity in software systems by proving that a user performed certain actions in the system. However, logging mechanisms often inconsistently capture user interactions with sensitive data, creating gaps in traces of user activity. Explicit design principles and systematic testing of logging mechanisms within the software development lifecycle may help strengthen the overall security of software. The objective of this research is to observe the current state of logging mechanisms by performing an exploratory case study in which we systematically evaluate logging mechanisms by supplementing the expected results of existing functional black-box test cases to include log output. We perform an exploratory case study of four open-source electronic health record (EHR) logging mechanisms: OpenEMR, OSCAR, Tolven eCHR, and WorldVistA. We supplement the expected results of 30 United States government-sanctioned test cases to include log output to track access of sensitive data. We then execute the test cases on each EHR system. Six of the 30 (20%) test cases failed on all four EHR systems because user interactions with sensitive data are not logged. We find that viewing protected data is often not logged by default, allowing unauthorized views of data to go undetected. Based on our results, we propose a set of principles that developers should consider when developing logging mechanisms to ensure the ability to capture adequate traces of user activity. |
URL | http://doi.acm.org/10.1145/2600176.2600183 |
DOI | 10.1145/2600176.2600183 |
Citation Key | King:2014:LYC:2600176.2600183 |
- CPS Domains
- Medical Devices
- Health Care
- Science of Security
- Foundations
- electronic health record software
- Software and Application Security
- Science of Security
- science
- nonrepudiation
- medical devices
- logging mechanism
- Healthcare
- health care
- foundations
- accountability
- Database and Storage Security
- Database Activity Monitoring
- cyber security
- CPS Domains
- case study
- black-box testing
- audit
- ACM CCS
- ACM CCS
- Cyber Security
- Database Activity Monitoring
- Database and Storage Security
- Software and Application Security