Author: Craig Stancl, Scott Bauer, Cory Endle
Email: craig.stancl2@nih.gov, scott.bauer@nih.gov, cory.endle@nih.gov
Team: LexEVS
Contract: 16X237
Client: NCI CBIIT
National Institutes of Heath
US Department of Health and Human Services
Â
The purpose of this document is to document the security plan for the National Cancer Institute Center for Biomedical Informatics and Information Technology (NCI CBIIT) LexEVS Release 6.5.
Information Systems Security Plan
A list of the industry standard security controls expected in this product
- HTTPS REST security (if needed)
- Possible uses:
- URI Resolver administration
- CTS2 Development Framework administration
- LexEVS REST secure ontology access/token transfer
- Possible uses:
- RFC 2196
- Specifiically, section 3.1.2 Separation of Services
- This architecture will allow services to be separated to those needing to be exposed externally and those that do not.
- Services NOT to expose externally:
- URI Resolver administration
- CTS2 Development Framework administration
- Specifiically, section 3.1.2 Separation of Services
The components of the CBIIT technologies used for security controls
None
Any expected deviation from the standards
None