Cybersecurity Practices for Health Care Organizations~ RJ BLANCHARD BENEFIT SERVICES

Page 65

Cybersecurity Practice #7: Vulnerability Management Organizations use vulnerability management to proactively discover vulnerabilities. These processes enable the organization to classify, evaluate, prioritize, remediate, and mitigate the technical vulnerability footprint from the perspective of an attacker. The ability to mitigate vulnerabilities before a hacker discovers them gives the organization a competitive edge and time to address these vulnerabilities in a prioritized fashion.26

Cybersecurity Practice 7: Vulnerability Management Data that may be affected Medium SubPractices Large SubPractices Key Mitigated Risks

PHI 7.M.A 7.M.B 7.M.C 7.M.D 7.L.A 7.L.B   

Host/Server Based Scanning Web Application Scanning System Placement and Data Classification Patch Management, Configuration Management & Change Management Penetration Testing Remediation Planning

Ransomware Attacks Insider, Accidental or Intentional Data Loss Attacks Against Connected Medical Devices that May Affect Patient Safety

There are multiple types of vulnerability scanning. The most wellknown methods are scans against servers (or hosts) and against web applications. These two scan types focus on different considerations.

Sub-Practices for Medium-Sized Organizations 7.M.A

Host/Server-Based Scanning

NIST FRAMEWKORK REF: DE.CM-8

In this model, vulnerability scanners are leveraged to identify weaknesses in OS or third-party applications that reside on a server. There are two scan options: unauthenticated and authenticated. In the unauthenticated model, the scanner has no extra sets of server privileges and queries the server based on ports that are active and present for network connectivity. Depending on the level of sophistication of the software scanner, each server is queried and checked for vulnerabilities. Scan results provide the perspective of an attacker who lacks server access. Vulnerabilities that rate high in this space should be mitigated first, as they are the most likely points at which a hacker could enter the server. Authenticated scans are conducted by letting the vulnerability scanner log in to the server and query all running software with all running versions. The resulting vulnerability lists are usually compared against a database (maintained by the scanner’s vendor), and vulnerabilities are enumerated based on the

26. “CIS Control 3: Continous Vulnerability Management,” Center for Information Security Controls, accessed September 24, 2018, https://www.cisecurity.org/controls/continuous-vulnerabilitymanagement/. 65


Turn static files into dynamic content formats.

Create a flipbook

Articles inside

Appendix B: References

3min
pages 105-108

Table 13. Incident Response Plays for Attacks Against Medical Devices

8min
pages 93-96

Table 15. Acronyms and Abbreviations

0
page 100

Table 14. Example Cybersecurity Policies for Consideration

0
page 97

Cybersecurity Practice #9: Medical Device Security

10min
pages 87-91

Table 12. Timeframes for Resolving Medical Device Vulnerabilities

1min
page 92

Table 11. Roles and Responsibilities for an Organizational CIRT

17min
pages 79-86

Table 9. Factors for Consideration in Penetration Test Planning

6min
pages 69-72

Cybersecurity Practice #6: Network Management

15min
pages 57-64

Cybersecurity Practice #8: Security Operations Center and Incident Response

4min
pages 73-74

Table 10. Example Incident Response Plays for IR Playbooks

5min
pages 75-78

Cybersecurity Practice #7: Vulnerability Management

5min
pages 65-67

Cybersecurity Practice #5: IT Asset Management

8min
pages 52-56

Table 7. Expanding DLP to Other Data Channels

3min
pages 49-51

Table 6. Data Channels for Enforcing Data Policies

2min
page 48

Table 3. Example of a Data Classification Schema

1min
page 43

Table 5. Security Methods to Protect Data

6min
pages 45-47

Table 4. Suggested Procedures for Data Disclosure

1min
page 44

Cybersecurity Practice #4: Data Protection and Loss Prevention

1min
page 42

Cybersecurity Practices at Medium-Sized Health Care Organizations

4min
pages 4-6

Table 1. E-mail Protection Controls

19min
pages 15-23

Cybersecurity Practice #3: Identity and Access Management

23min
pages 31-41

Cybersecurity Practice #2: Endpoint Protection Systems

1min
page 24

Table 2. Basic Endpoint Controls to Mitigate Risk at Endpoints

9min
pages 25-30

Cybersecurity Practices at Large Health Care Organizations

3min
pages 7-8

Cybersecurity Practice #1: E-mail Protection Systems

1min
page 14

Introduction

0
page 3
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.