Network Performance Requirements | ||
|---|---|---|
Adequate network performance is critical to ensure timely access to medical images and stable viewer operation. While the system may function under a range of conditions, faster networks with lower latency significantly improve usability and reliability. |
Minimum Network Specifications | ||
|---|---|---|
The following minimum requirements must be met for acceptable performance:
Networks that do not meet these thresholds may experience slower image loading times, delayed viewer responsiveness, or degraded user experience. |
Optimal Performance Configuration | ||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
For optimal performance and scalability, the following environment is recommended: | ||||||||||||||
| ||||||||||||||
Cybersecurity Controls | ||
|---|---|---|
The following cybersecurity controls are strongly recommended to protect patient data, ensure system integrity, and support regulatory compliance. | ||
Log Management | ||
It is strongly recommended that network, system, and storage (bucket/object) logs are enabled, captured, and retained.
Effective log management supports incident investigation, audit readiness, and ongoing security monitoring. | ||
Encryption of Data at Rest | ||
All storage systems containing medical images or associated metadata must be encrypted:
Encrypting data at rest protects against unauthorized access in the event of infrastructure compromise. | ||
Encryption of Data in Transit | ||
All data transmitted between systems must be protected in transit:
Secure transmission ensures patient data confidentiality and integrity while traversing the network. | ||
Firewall Configuration | ||
Firewall rules should be configured to limit network access to only required services.
Network segmentation and leastexposure firewall rules reduce attack surface and improve overall system security. | ||
User Permissions and Access Control | ||
User and service access should follow the Principle of Least Privilege (PoLP):
Proper access control limits unauthorized activity and reduces the impact of compromised credentials. |