Skip to article frontmatterSkip to article content

Security Overview

Introduction

The JupyterHealth Pre-MVP security focuses on establishing a secure privacy-preserving transmission of patient data from:

API Credentials

API credentials in JupyterHub

The JupyterHealth pre-MVP application is registered as a Partner application (two, actually - one ‘prod’ to represent the pre-MVP itself, and one ‘testing’ for testing configurations).

There are two partner applications registered:

These credentials are stored in AWS SecretManager:

The JupyterHub user ‘role’ is granted read access to ch-cloud-creds-{name} and read/write access to ch-cloud-storage-{name}.

Pre-MVP considerations

In the pre-MVP, from the perspective of CommonHealth cloud and data access, all JupyterHub users are equivalent and indistinguishable and act collectively as the pre-MVP. That is, all JupyterHub users have:

Following the pre-MVP, users will login to JupyterHub with SMART-on-FHIR as an OAuth provider, and will authenticate directly as themselves via scoped access tokens, rather than always acting as the partner application. This will allow per-user access control, registered and enforced by SMART-on-FHIR, outside JupyterHub.

Encryption

Cryptography

Data Flow Diagram