Cybersecurity Practices for Health Care Organizations~ RJ BLANCHARD BENEFIT SERVICES

Page 87

Cybersecurity Practice #9: Medical Device Security Cybersecurity Practice 9: Medical Device Security Health care systems use many diagnostic and therapeutic methods for patient Data that may PHI treatment. These range from be affected technological systems that capture, 9.M.A Medical Device Management render, and provide detailed images of 9.M.B Endpoint Protections Medium Subscans to devices that connect directly to 9.M.C Identity and Access Management Practices the patient for diagnostic or therapeutic 9.M.D Asset Management purposes. Such devices may have 9.M.E Network Management 9.L.A Vulnerability Management straightforward implementations, such Large Sub9.L.B Security Operations and Incident Response as bedside monitors that monitor vital Practices 9.L.C Procurement and Security Evaluations signs during an inpatient stay, or they 9.L.D Contacting the FDA may be more complicated, such as  Attacks Against Connected Medical Devices that Key Mitigated May Affect Patient Safety infusion pumps that deliver specialized Risks therapies and require continual drug library updates. These complex and interconnected devices affect patient safety, well-being, and privacy, and they represent potential attack vectors in health delivery organizations’ (HDOs’) digital systems. As such, these devices should be robustly designed and properly secured.

This section focuses on the methods that HDOs can employ to protect connected medical devices. Specifically, it addresses the actions that HDOs are permitted to take, how to align with the Medical Device and Health IT Joint Security Plan, and how to best work with device manufacturers and the U.S. FDA. Any device that connects directly to a patient for diagnosis or therapy should undergo extensive quality control to that it is safe for use. Rigorous stipulations, managed by the FDA, are in place for the development and release of such systems. The organizations that produce these devices, referred to as device manufacturers, should comply with regulations. Organizations that purchase devices and use them for the treatment of patients are the clinical providers. In the context of this relationship, they are the HDOs. Given the highly regulated nature of medical devices and the specialized skills required to modify them, it is ill-advised for HDOs to make configuration changes without the support of the device manufacturer. Doing so may put the HDO at risk of voiding warranties, result in legal liabilities, and, at worst, harm the patient. Therefore, traditional security methods used to secure assets cannot necessarily be deployed in the case of medical devices. For example, one cannot simply apply a patch to a vulnerable component of the OS that runs a medical device. In 2018, the Healthcare Sector oordinating ouncil’s Joint ybersecurity Working Group released a guidance document for device manufacturers on developing and releasing secure medical devices.39 39. Medical Device and Health IT Joint Security Plan, 2018. 87


Turn static files into dynamic content formats.

Create a flipbook

Articles inside

Appendix B: References

3min
pages 105-108

Table 13. Incident Response Plays for Attacks Against Medical Devices

8min
pages 93-96

Table 15. Acronyms and Abbreviations

0
page 100

Table 14. Example Cybersecurity Policies for Consideration

0
page 97

Cybersecurity Practice #9: Medical Device Security

10min
pages 87-91

Table 12. Timeframes for Resolving Medical Device Vulnerabilities

1min
page 92

Table 11. Roles and Responsibilities for an Organizational CIRT

17min
pages 79-86

Table 9. Factors for Consideration in Penetration Test Planning

6min
pages 69-72

Cybersecurity Practice #6: Network Management

15min
pages 57-64

Cybersecurity Practice #8: Security Operations Center and Incident Response

4min
pages 73-74

Table 10. Example Incident Response Plays for IR Playbooks

5min
pages 75-78

Cybersecurity Practice #7: Vulnerability Management

5min
pages 65-67

Cybersecurity Practice #5: IT Asset Management

8min
pages 52-56

Table 7. Expanding DLP to Other Data Channels

3min
pages 49-51

Table 6. Data Channels for Enforcing Data Policies

2min
page 48

Table 3. Example of a Data Classification Schema

1min
page 43

Table 5. Security Methods to Protect Data

6min
pages 45-47

Table 4. Suggested Procedures for Data Disclosure

1min
page 44

Cybersecurity Practice #4: Data Protection and Loss Prevention

1min
page 42

Cybersecurity Practices at Medium-Sized Health Care Organizations

4min
pages 4-6

Table 1. E-mail Protection Controls

19min
pages 15-23

Cybersecurity Practice #3: Identity and Access Management

23min
pages 31-41

Cybersecurity Practice #2: Endpoint Protection Systems

1min
page 24

Table 2. Basic Endpoint Controls to Mitigate Risk at Endpoints

9min
pages 25-30

Cybersecurity Practices at Large Health Care Organizations

3min
pages 7-8

Cybersecurity Practice #1: E-mail Protection Systems

1min
page 14

Introduction

0
page 3
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.