Cybersecurity Practices for Health Care Organizations~ RJ BLANCHARD BENEFIT SERVICES

Page 15

Sub-Practices for Medium-Sized Organizations 1.M.A

Basic E-mail Protection Controls

NIST FRAMEWKORK REF: PR.DS-2, ID.RA-2, PR.PT-3, DE.CM-4, PR.AC-4, PR.AC-1, PR.AC-7

Standard antispam and antivirus (AV) filtering controls are basic protections that should be implemented in any e-mail system. Both are implemented directly on the e-mail platform. These controls assess inbound and outbound e-mails from known malicious senders or patterns of malicious content. Table 1 provides a list of suggested security implementations for e-mail protection controls. Table 1. E-mail Protection Controls Control 

Description

 Real-time blackhole 3 list

Community-based lists of IP addresses and host names of known or poten�al spam originators. Consider Spamhaus, Spamcop, DNSRBL, or lists provided by your e-mail vendor.

 Distributed checksum clearinghouse (DCC)

The DCC is a distributed database that contains a checksum of messages. E-mail messages go through a checksum algorithm and then checked against the database. Depending upon the threshold of checksum matches, these can be determined to be spam or malicious messages.

Open relays are Simple Mail Transfer Protocol (SMTP) servers that enable the relay of third-party messages. SMTP is cri�cal for the delivery of messages, but you must configure it to allow messages only from trusted sources. Failure to do this may permit a spammer or hacker to exploit the “trust” of your mail server to transmit malicious content.

Spam/virus checks on outbound e-mails can detect malicious content, revealing compromised accounts and poten�al security incidents. Review e-mail spam/virus rules as part of Cybersecurity Practice #8: Security Operations Center and Incident Response.

Scan all e-mail content against an AV engine with up-to-date signatures. If possible, this control should unpack compressed files (such as zip files) to check for embedded malware.

Removal of open relays

Spam/virus check on outbound messages

AV check

3. Murthy Raju, “Using RBL and DCC for Spam Protection,” Linux/com, last modified June 14, 2007, https://www.linux.com/news/using-rbl-and-dcc-spam-protection. 15


Turn static files into dynamic content formats.

Create a flipbook

Articles inside

Appendix B: References

3min
pages 105-108

Table 13. Incident Response Plays for Attacks Against Medical Devices

8min
pages 93-96

Table 15. Acronyms and Abbreviations

0
page 100

Table 14. Example Cybersecurity Policies for Consideration

0
page 97

Cybersecurity Practice #9: Medical Device Security

10min
pages 87-91

Table 12. Timeframes for Resolving Medical Device Vulnerabilities

1min
page 92

Table 11. Roles and Responsibilities for an Organizational CIRT

17min
pages 79-86

Table 9. Factors for Consideration in Penetration Test Planning

6min
pages 69-72

Cybersecurity Practice #6: Network Management

15min
pages 57-64

Cybersecurity Practice #8: Security Operations Center and Incident Response

4min
pages 73-74

Table 10. Example Incident Response Plays for IR Playbooks

5min
pages 75-78

Cybersecurity Practice #7: Vulnerability Management

5min
pages 65-67

Cybersecurity Practice #5: IT Asset Management

8min
pages 52-56

Table 7. Expanding DLP to Other Data Channels

3min
pages 49-51

Table 6. Data Channels for Enforcing Data Policies

2min
page 48

Table 3. Example of a Data Classification Schema

1min
page 43

Table 5. Security Methods to Protect Data

6min
pages 45-47

Table 4. Suggested Procedures for Data Disclosure

1min
page 44

Cybersecurity Practice #4: Data Protection and Loss Prevention

1min
page 42

Cybersecurity Practices at Medium-Sized Health Care Organizations

4min
pages 4-6

Table 1. E-mail Protection Controls

19min
pages 15-23

Cybersecurity Practice #3: Identity and Access Management

23min
pages 31-41

Cybersecurity Practice #2: Endpoint Protection Systems

1min
page 24

Table 2. Basic Endpoint Controls to Mitigate Risk at Endpoints

9min
pages 25-30

Cybersecurity Practices at Large Health Care Organizations

3min
pages 7-8

Cybersecurity Practice #1: E-mail Protection Systems

1min
page 14

Introduction

0
page 3
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.