1technation.com
Vol. 13
ADVANCING THE BIOMEDICAL / HTM PROFESSIONAL
DIGITAL SUPPLEMENT
Healthcare Security Under the Microscope PAGE 2
Automating Cybersecurity for HTM Lifecycle Managers PAGE 6
IPSOS Medical Device Security Research: What Biomedical Teams Said PAGE 10
DIGITAL SUPPLEMENT
SPONSORED BY
DISCLAIMER: MD Publishing (TechNation) takes every precaution to ensure accuracy of content; however, the information, opinions, and statements expressed in the articles and advertisements herein are those of the writer and/or advertiser, and not those of our company.
HEALTHCARE SECURITY U A
n analysis of deployment data to better understand the cybersecurity risks facing healthcare organizations today.
The device landscape is growing exponentially, adding to the complexity of networks (both IT
on analysis of more than 1,500 medical VLANs with 430,000 devices.
and clinical); and making it difficult to manage and improve security posture. For this article, we have pulled source data from the Forescout
EXPLOSION OF CONNECTED DEVICES IN HEALTHCARE
Device Cloud, a repository of host and network
2
information for more than 8 million devices,
The number of connected devices is growing at
We all know the Internet of Medical Things
making it one of the largest crowdsourced device
hyper speed, expanding the attack surface and
(IoMT) continues to offer exciting possibilities
repositories. For this research, we limited Device
making it difficult to scale security. These devices
for healthcare organizations to improve patient
Cloud analysis to 75 healthcare deployments
include healthcare devices like patient tracking
care. We’re also acutely aware of how this digital
with over 10,000 virtual local area networks
and identification systems, infusion pumps and
transformation and increase in connectivity
(VLANs) and 1.5 million devices. Since the
imaging systems. It also includes infrastructure
introduces privacy and security risks that has led
primary focus of the report is the status of
devices such as building automation systems,
to triple digit increases in attacks.
medical devices, many of the results are based
physical security systems, uninterrupted power
DIGITAL SUPPLEMENT | FORESCOUT
SPONSORED BY FORESCOUT
UNDER THE MICROSCOPE supplies, backup generators and other OT
prioritize the best course of action. Security and
concentrate on securing building automation
systems and devices that are increasingly joining
risk management teams that attempt to mitigate
systems. Given these siloed priorities, who is
IT networks.
every risk will realize marginal results. By fully
responsible for looking at security holistically?
understanding threats on the network and
At the most basic level, healthcare organizations
pinpointing the devices that are harboring the
need to be aware of the Clinical, IT, IoT and
most risk, it’s possible to maximize productivity,
OT devices connecting to their networks. This
increase ROI and reduce risk across the network.
awareness helps to break down security silos,
UNDERSTANDING AND PRIORITIZING RISK The convergence of the clinical, IT and OT networks creates a new class of security risks. Cybercriminals can now move laterally
brings the right groups together to discuss
CLASSES OF DEVICES ON MEDICAL VLANS
across any of them. The increase in mergers
security strategies, and provides the foundation for a holistic approach to security. The classes of
and acquisitions, which are prevalent in the
Many networks still operate in organizational
devices will likely shift in size as more medical
healthcare sector, further amplifies these security
silos, leaving gaps in security. Clinical engineers
devices connect to networks, making it critical to
challenges. Much like clinical diagnosis and
often focus on securing connected medical
regularly review and adapt security strategies.
treatment, CISOs must detect risks early and
devices while facilities and operations teams
SPONSORED BY FORESCOUT
FORESCOUT | DIGITAL SUPPLEMENT
3
IT devices: Personal computers, laptops, purpose-built workstations, servers, thick and thin clients, virtualization hypervisors and enterprise
Devices in Health Delivery IT
networking gear.
IoT
IoMT and OT
IoMT and OT devices: Medical devices, critical care systems, building
8%
automation/HVAC systems, power generators, badging and other facilities-related devices as well as IP-enabled security cameras and physical security systems. IoT devices: VoIP phones, network printers, mobile devices, tablets, controllers and converters, video conferencing devices, presentation
53%
39%
systems, smart TVs, entertainment consoles, various accessories.
THE MOST COMMON CONNECTED MEDICAL DEVICES Inpatient medical facilities tend to see a higher percentage of devices that are “connected” to a patient. Per-patient devices such as patient identification and tracking systems, infusion pumps, and patient monitors represent the majority of healthcare devices on clinical networks. This makes sense as they are the devices tracking and monitoring patients on a 1:1 ratio. Devices such as those used
Most Common Connected Medical Devices
in laboratory diagnostics or medical imaging represent a smaller number because they are shared devices. These more expensive systems tend to become long-lived legacy devices that are challenging to patch and keep updated.
3%
4%
DIVERSITY OF DEVICE OPERATING SYSTEMS 5%
The diversity of device operating systems can make managing security increasingly challenging. When looking at the different types of operating systems found on medical VLANs, more than half
6%
(59%) were Windows operating systems and 41% were a mix of other variants, including mobile, embedded firmware and network
12%
infrastructure. Patching and updating operating systems in healthcare environments— especially acute care facilities—can be challenging and require devices to remain online and available. Some medical
32%
devices cannot be patched, may require vendor approval or need patches to be manually implemented.
4
DIGITAL SUPPLEMENT | FORESCOUT
38%
SPONSORED BY FORESCOUT
DEVICE VENDOR COMPLEXITY ON THE RISE
KEY TAKEAWAYS FROM THIS RESEARCH
Today’s healthcare organizations are technology-saturated environments.
It’s critical for healthcare organization clinical, security, and risk management
Device vendors have historically not designed products with security as
leaders to work together to secure all devices across the extended HDO. Solely
a top priority, making it more challenging to manage and secure them. In
focusing on securing medical devices rather than securing all device classes can
addition, vendors approach clinicians with devices that end up connected
cause significant gaps in your security posture. A holistic approach to security
to the network, bypassing security and risk protocols. IT and security
requires continuous visibility and control over the entire connected-device
teams may detect these unauthorized connected devices, but typically are
ecosystem—including understanding the role a device visibility and control
unable to classify or easily locate them. Multi-site healthcare campuses
platform can play in orchestrating actions among heterogeneous security and IT
are not technically homogeneous by any means—more than 30% of
management tools. As stated previously, the costs of inaction can be staggering.
organizations’ medical VLANs support more than a hundred distinct
Every second that a device remains noncompliant extends your window
device vendors—and that diversity doesn’t include the vendor tally from
of vulnerability and increases your risk factor—exposing your healthcare
the other functional networks, such as back office, front office, and more.
organization to significant patient safety, financial and business consequences.
In many instances, the vendors themselves are responsible for patching and
Healthcare organizations have a choice: invest in proactive risk planning and
maintaining specialized clinical systems.
mitigation efforts now or pay later and face the wrath of security-conscious regulatory agencies, patients and legislators.
The study revealed that: 40% of deployments had more than 20 different operating systems on their medical VLANs.
Diversity of Operating Systems on Medical VLANs Number of OS Variants on Medical VLANs
40
36%
Windows OS vs. All Other OS Variants
35 29%
30 25 20
Number of Device Vendors on Medical VLANs
15
33%
35
10
30
20%
2% <5
13%
5-10 11-20 21-30 31-49
50+
Windows OS 59% Other OS Variants 41%
9%
10 5 0
<20
9%
0
20 15
11%
5
25%
25
13%
20-49
50-99
100-199
Number of Device Vendors
SPONSORED BY FORESCOUT
200+
34% of organizations’ medical VLANs support more than 100 distinct device vendors.
FORESCOUT | DIGITAL SUPPLEMENT
5
Automating Cybersecurity for HTM Lifecycle Managers
6
DIGITAL SUPPLEMENT | FORESCOUT
SPONSORED BY FORESCOUT
Integrating with CMMS and MDS2 to inventory your entire fleet must be “automatic”. Clinical engineers, as well as their IT Security
synergies between the departments.
counterparts, face many challenges to ensure
to understand the role and function of that device to properly monitor and secure it. With medical device
“always on” operations. They don’t want to rely
Even if all of your medical devices are successfully
security, however, you would supplement that with
on manufacturer support for patches, nor do they
cataloged and inventoried, without enhanced
the needed visibility to intelligently define endpoint
have the time or bandwidth to piece together data
network visibility, it will be difficult to identify
trust relationships, restrict lateral communications,
trails to figure out what happened, where it began,
and oversee the device configuration and network
and generate best practice segmentation regimens for
or how to respond. Often, there is little time to
calibrations needed to maintain security. Adding
healthcare networks.
act, and a breach or ransomware attack can shut
to the complexities of IoMT, medical devices tend
down the entire hospital for hours, days, or weeks.
to employ communications protocols unique to
To get an accurate, granular view of your network
What’s more, the attack surface continues to widen
the industry or proprietary to manufacturers that
endpoints and workflows along with an appropriately
so it’s critical that both clinical and IT teams see it
traditional security solutions do not understand and
nuanced topological perspective you can now expand
all and can effectively manage and mitigate all the
therefore cannot protect.
on what your NAC does and achieve simplified
associated risks.
automation with no need for boots on the ground to The numbers speak for themselves – the healthcare
bridge any gaps. Now you can get answers to any of
MEDICAL DEVICES IN THE DIGITAL TERRAIN
industry is one of the most targeted by cyber
these questions and ensure continuous updates with
attackers hitting an all-time high in 2021. With 82
choices for how to mitigate any of the identified and
A hospital’s digital terrain is often comprised of IT
global ransomware incidents logged by May 25,
prioritized medical device risks.
or Information Technology (e.g., servers, firewalls,
20211, and a total of 45 million PHI breaches by
workstations), OT or Operations Technology
year-end2, there’s no sign of this letting up.
(e.g., elevators, HVAC), IoT or Internet of Things (e.g., security cameras, Alexa device in a hospital kitchen), and IoMT or Internet of Medical Things (e.g., hospital beds, imaging, ventilators, etc.).
terrain are connected to their network. You can’t
What will determine the membership of each group?
1 HHS – HC3 Healthcare Industry Victimization for Global Ransomware Incidents 2021
•
What type of traffic is necessary for the constituent devices to function as designed?
2 Critical Insights Healthcare breach report 2021
Every health delivery organization needs to know exactly how many assets across their digital
•
EVOLVING YOUR NAC TO MEET THE NEEDS OF THE DIGITAL TERRAIN
•
What should be blocked?
•
What type of traffic flow is expected for each group?
afford to have blind spots. There are approximately 17,000 hospitals around •
Where exactly are the bounds placed – from
One comprehensive source of truth for all
the world. With an estimated 20,000 devices
connected assets is critical. Clinical operations
in each that’s more than 340 million connected
a security point of view – for deviations from
and IT security teams must work together to
medical devices. Devices can take a wide range of
normal behavior?
arrive at one source of truth, which can be difficult
forms, serving a variety of different purposes, and
when working with different data sets that
come from many different vendors – each device
potentially overlap or leave gaps. Continuously
type, clinical applications, and vendor having its
assessing compliance and risk posture without
own security implications. With such a large and
requiring SPAN/TAP across all cyber assets is
diverse network to secure, the challenge is to achieve
another aspect of security that clinical operations
simultaneously granular and panoramic visibility
must automate. You should expect that in your
as needed to survey your inventory, plot out smart
day-to-day operations, your assets integrate with
access control policies, and empower context-aware
dozens of third-party cybersecurity products to
flow monitoring.
bolster native assessment capabilities. You will
CYBERMDX – A FORESCOUT COMPANY With more than 300 healthcare provider customers, Forescout has long been dedicated to the mission of healthcare delivery. Earlier this year, we solidified that commitment by acquiring Medical Device Security leader CyberMDX. With its holistic solution focused on IoMT and clinical networks, we have added a unique capability to our Forescout
want to decide how to assess your assets and then
NAC or Network Access Control is the way that
Continuum platform. This empowers you to access a
adapt the assessments over time to address your
most organizations monitor the devices and users
much broader set of data insights and capabilities, as
changing needs.
-- authorized and unauthorized -- trying to access the
well as specifically developed technology to address
network. For hospitals, the digitalization of medical
the distinctive IT needs and challenges for medical
devices and processes has now added many, if not
devices, including benefits like:
CRITICAL TIME FOR HEALTHCARE PROVIDERS
most, clinical assets to the connected world. This is As connected medical devices become perhaps
the central reason why the clinical and IT networks
the most critical component of the digital terrain,
need to be considered together.
biomedical engineers have a clear responsibility to keep cyber security in mind, from procurement
Today, your NAC portal might show that a CT
and implementation to the regular monitoring and
scanner may appear as a “Windows 7” endpoint, and
updating of such devices. The sooner every hospital
while the machine may indeed be running Windows
realizes the overlap between clinical operations
7, reporting it only as such is not enough to address
and cyber security, the sooner it can leverage the
the nature of your digital ecosystem. You really need
SPONSORED BY FORESCOUT
•
Highly granular, real-time visibility of IoT / IoMT / connected medical devices
•
Organization-wide, departmental, and device group-based risk analysis
•
Rapid anomaly detection, identifying attacks at the point of impact
FORESCOUT | DIGITAL SUPPLEMENT
7
The Forescout and CyberMDX Advantage The CyberMDX Healthcare Security
return that feed with other devices
high-fidelity clinical information (e.g.,
Suite is now part of the Forescout
on your network not normally
physical location, recalls, MDS2,
Continuum platform. While other
captured, ensuring enrichment and
serial numbers, vulnerabilities,
medical device security solutions
comprehensive visibility.
etc.) delivering unique levels
provide some level of integration with NAC providers, none can deliver either the depth or breath of integration and capabilities as Forescout Continuum. CyberMDX software was built to integrate with all the major NAC (Network Access Controls) solutions, but only through Forescout Continuum can you achieve the highest level of visibility and asset intelligence bidirectionally. Don’t settle for solutions that stop after medical device data feeds the external systems. With Forescout, you can automatically
•
Yes, that’s right. With Forescout Continuum, your hospital network will effortlessly secure your medical network assets, as well as the IT, OT, and IoT ones. Why should you care about assets outside of medical ones? Because infiltrations traverse networks and anything that can get in and cause a hospital shutdown impacts you no matter what part of the network you are managing. In addition, CyberMDX enriches the
of protection. We provide the 360-degree monitoring and network parameters to intelligently trigger quarantine processes, while Continuum carries out the actual quarantine. We ensure your medical devices are automatically segmented to their own separate VLAN. The pairing with Continuum enforcement yields a 100% scalable end-to-end solution tailored and continuously evolving according to your HDO’s needs.
Forescout Continuum data with
AI context-aware micro-segmentation policy
trust relationships and access policies
empowers better decision making and
generation
risk-reward analyses •
•
Superior network visibility, monitoring, and
Actionable analytics and best practice
device classification across attack surfaces –
reporting
Medical, OT, IoT and IT assets
•
Provides insights into smarter resource allocation, procurement, and maintenance planning
•
Original HIT vulnerability research and zero-
•
Not simply relying on MAC OUI identification but focusing on the device itself
day protection
RISK ANALYSIS AND ATTACK DETECTION
with layers of security
NEW VALUE IN THE NEW NORMAL
Ensures a constantly up-to-date security •
Gleaning insight into the network context of
posture of the individual devices as well as the
The digital terrain generated vastly more entry
each device, commonly used for access policies
entire fleet / operation
points to infiltrate the network. It’s a key driver
and incident response processes
for the constant cat and mouse game played by hackers and defenders. It’s why Forescout is
Improved IT ecosystem security, empowers rapid
ASSET MANAGEMENT AND ANALYTICS
response to a potential incident
•
Integrates with FDA databases
Each device is assigned a risk score, based on not
•
Asset utilization tracking can be leveraged to
and detected threats but also the criticality of the
determine ideal (low disruption) scheduling
device and its impact on the business
always working to help you stay ahead. As the only provider who can protect your hospital across this entire terrain, we are also working hard to deepen our capabilities within each
only known vulnerabilities, network positioning,
area. The technology stack from CyberMDX
windows for maintenance
will deliver operational efficiencies for your inventory management, your asset management
Holistic, multi-level view of the cyber risks facing •
Leveraging device flow visibility
and analytics, your risk analysis and attack
the organizations (on top of device profile and
and domain expertise to detect and
detection capabilities, and your threat prevention
ecosystem level risk scoring)
automatically alert the relevant manager
preparedness. Below are some of the ways.
of anomalies such as misconfiguration,
Simplifies compliance efforts with HIPAA focused
connectivity issues, recalls, etc.
reporting, reflecting compliance posture and
INVENTORY MANAGEMENT
documenting actions taken to improve it. •
•
Greater insights achieved per device
Faster and more comprehensive delivery of endpoint impacting information
functionality and safe use factors to define
8
DIGITAL SUPPLEMENT | FORESCOUT
SPONSORED BY FORESCOUT
THREAT PREVENTION •
Delivers superior device flows and visibility and facilitates network micro segmentation
•
Provides the policies for NACs to enforce – streamlining, accelerating, and strengthening the process
•
Makes available details for incident response, including quarantine procedures, device context, attack impact, etc.
•
Identifies risk factors still unknown to the broader cyber security community, perpetually fortifying network policies and device management accordingly
WHY THIS IS ESSENTIAL TECH IN YOUR HOSPITAL’S TECH NATION Many generic IT or IoT security tools introduce valuable controls to your IT ecosystem. However, a cyber security solution built for a general environment will lack the necessary intelligence to empower and protect a healthcare operation. Firewalls, SIEMs, and NACs are long-standing technologies we have relied on to enforce well-defined security policies through what are essentially binary switches throughout your network. The digital terrain requires us to augment these tools with new ones that provide the insights needed to build smart rules and refine security policies for your specific needs. IT standards and universally maintained blocklists can go a long way toward hiding these limitations; but there is nothing generic about a hospital’s connected environment. Strong security demands context-aware intelligence to match its controls. Whether you have Forescout eyeSight, or a different NAC product installed, Forescout Continuum will integrate with our purpose-built IoMT intelligence solution. Deep visibility and insights are needed to find and solve for hidden problems. Some medical device vulnerabilities can go undetected for years until they are uncovered by a technician or researcher armed with the appropriate knowledge and experience. If you can’t deliver that type of expertise and focus from your staff, you’ll want to outsource it – and it won’t be from providers of general IT solutions. Whether it’s medical device security, context-aware network visibility, risk assessment, OT or IoT security, threat intelligence and protection, or business-enhancing operational analytics, Forescout Continuum has everything you need to automate cybersecurity in your complex healthcare environment.
SPONSORED BY FORESCOUT
FORESCOUT | DIGITAL SUPPLEMENT
9
IPSOS Research – What Biomedical leaders said about Medical Device Security
Perception of how Ransomware impacts the clinical team’s “Personal Reputation”
In 2021, CyberMDX and Philips worked with global research leader IPSOS on an industry report that examined attitudes, concerns, and impacts on medical device security as well as
No impact at all 17%
cybersecurity across large and midsize healthcare delivery organizations. This study surveyed 130 hospital executives in Information Technology (IT) and Information Security (IS) roles, as well BioMed technicians and engineers. The respondents, who averaged 15 years of experience in their fields, provided insight into the current state of medical device security within hospitals as well as highlighted the challenges their organizations face. We extracted the responses from the biomedical technicians so you can see their
Low to Moderate Impact 30%
specific views.
Average Ransomware Cost
$2,000,000
Severe Impact 53%
Biomedical Response
Perception of what Ransomware is most likely to impact Source: IPSOS study by CyberMDX and Philips - “Perspectives in Healthcare Security” August 2021
63% 50% 47% 27% 23% 17% 10% 10% 10% 7%
Axis Title 10
DIGITAL SUPPLEMENT | FORESCOUT
SPONSORED BY FORESCOUT
Extremely Concerned Medical and IoT devices as a vector for cyber attacks Cyber attacks in your hospital
70% 67%
Cyber attacks in the healthcare industry
77%
Medical Devices Not Protected Bluekeep
50%
Apache Struts
57%
Wannacry
63%
Ryuk
83%
MDHex or MDHexRay
67%
Notpetya
77%
Device Inventory Knowledge Don’t know and don’t have a way to know
23%
Cyber Insurance Don’t Know
Don’t know but have a dashboard that can tell me
67%
No longer have it No, we don’t have it Yes, we have it
Know the exact number
7% 3% 20% 70%
10% ROI from Cybersecurity
Device Inventory Mechanics Alerts in time to act Don’t Know
Fully Manual
1% 13% 43%
Mix of manual and automated Limited visibility
Full visibility all automated
SPONSORED BY FORESCOUT
53%
Time Saved
67%
Critical Vulnerabilities found
53%
Log of major attacks
80%
23% 20%
FORESCOUT | DIGITAL SUPPLEMENT
11
presents
9 1:1 The
9 questions in a 1:1 with industry experts
Listen in Now Episode 1: Explores the healthcare delivery challenges that clinical and IT security teams face from hackers seeking to disrupt them, shut them down, or hold them ransom. Our special guest:
The 9 1:1 was created to help us explore and better understand how to navigate the urgent cybersecurity needs and imperatives challenging leaders today.
Automated Cybersecurity Across Your Digital Terrain
Forescout leads the industry in providing complete coverage of any network (Clinical, IT, OT, or IoT). More than 3,000 global organizations (300+ in healthcare alone) rely on Forescout – and our more than 20 years experience – to effectively secure their facilities, assets, and users. Shouldn’t yours?
Learn more at Forescout.com