Thus, it should be contemplated, whether it might
be reasonable to expand the view and consider the in-
teraction between zones as well. Furthermore it might
be reasonable to classify each interconnected zone the
same, concerning security issues.
Adjustment of Minimum Standards happens
Infrequently. As mentioned in (Gematik,
Gesellschaft f
¨
ur Telematikanwendungen der Gesund-
heitskarte mbH, 2007, p. 28), the minimum security
standards to be implemented on the HTI have to
be adjusted annually. According to statistics of
CERT
12
, in the first quarter of 2007, there have been
already 2,176 vulnerabilities announced. Regarding
the estimated amount of more than 8,000 uncovered
vulnerabilities during one year, a shorter period for
adjusting the minimum security standards could
improve security.
Inadequate Assumption about the Security of the
Systems inside the HTI. In (Gematik, Gesellschaft
f
¨
ur Telematikanwendungen der Gesundheitskarte
mbH, 2006b, p. 60) it is mentioned, that all IT sys-
tems within the vpn provided by the HTI are consid-
ered to be secure. This argument is for example used
to justify the missing authentication concerning the
connection to the time servers of the HTI. As it is a
fact that there are no completely secure IT systems
13
,
this argument is not acceptable. Also IT systems con-
trolled and maintained by the HTI itself are vulner-
able for example to malware, social engineering at-
tacks, and so on.
Inconsistent with the claim cited above, in
(Gematik, Gesellschaft f
¨
ur Telematikanwendungen
der Gesundheitskarte mbH, 2007, p. 32), it is noted,
that it is not possible to completely avoid threats and
that there will continuously emerge new threats.
Security by Obscurity. In (Gematik, Gesellschaft
f
¨
ur Telematikanwendungen der Gesundheitskarte
mbH, 2007, p. 246), the Gematik claims, that security
by obscurity is not a proper approach securing IT sys-
tems. Nevertheless, the software used for eHC pur-
poses is classified as highly confidential in the same
document. This classification results from parts of the
software being intellectual property of the developing
companies. Of course, copyright issues have to be re-
garded in the eHC environment as well, but also Shan-
non’s maxime and Kerckhoff’s principle
14
should be
considered.
Thus, at least these parts of the eHC related IT
systems, which contain security relevant processes,
12
http://www.cert.org/stats
13
cp. (Huber et al., 2008, p. 10)
14
cp. requirement 002.So.A.AS in (Huber et al., 2008)
should be published completely and not kept secret
to ensure intelectual property.
4.4.2 Analysis of the Connector
Imprecise Specification of the Blacklist Manage-
ment. In the security concept of the Gematik, it is
defined, that each Connector has to validate the cer-
tificate of the vpn concentrator of the central part of
the HTI
15
. In this context, blacklists are used to iden-
tify Connectors with revoked certificates, which have
to be updated periodical (Gematik, Gesellschaft f
¨
ur
Telematikanwendungen der Gesundheitskarte mbH,
2007, p. 63). Besides this definition, no further infor-
mation about implementation and handling of black-
lists can be found in any of the considered documents.
One of the most important issues is, where the Con-
nector retrieves the blacklist information from. they
can obviously not be provided by a server inside of
the HTI, as fetching the blacklist information would
come along with connecting to a potentially inse-
cure vpn concentrator. Furthermore, there are several
authentication requirements concerning the blacklist
service, which have obviously not been considered
yet. If insufficient authentication is used, an attacker
could claim to be a blacklist-server and thus provide
fake blacklists containing some or even all vpn con-
centrators of the HTI. Establishing such an attack, the
HTI would not be reachable any more because of all
of its vpn concentrators being blacklisted by an at-
tacker.
Imprecise Specification of the Trusted Viewer In-
terface. According to (SigG, 2001, 2, no. 11 re-
spectively 17, para. 2) and (SigV, 2001, 15, para. 1c,
2a and 2b) the Connector has to provide a trustworthy
component - a so called Trusted Viewer component -
, which enables the verification of signatures and the
signed content. There are two possibilities of imple-
menting this component. On the one hand, the Con-
nector can contain a build in Trusted Viewer device,
on the other hand, a Trusted Viewer component can
be included as a separate component accessing an ad-
equate Connector interface over the LAN.
Concerning the implementation of the Trusted
Viewer and its interface, conflicting details can
be found in the specification document (Gematik,
Gesellschaft f
¨
ur Telematikanwendungen der Gesund-
heitskarte mbH, 2006b). On the one hand, it is postu-
lated, that every Connector has to implement an inter-
face for the Trusted Viewer no matter if it has a built
in Trusted Viewer component or not (cp. (Gematik,
Gesellschaft f
¨
ur Telematikanwendungen der Gesund-
heitskarte mbH, 2006b, p. 21)), on the other hand, the
15
cp. fig. 1
ICEIS 2008 - International Conference on Enterprise Information Systems
150