DOD Medical Device Cybersecurity Considerations



Similar documents
The Business Case for Security Information Management

Defining a Secure Mobile Framework Architecture at DHA

Defending Against Data Beaches: Internal Controls for Cybersecurity

Big Data, Big Risk, Big Rewards. Hussein Syed

Cybersecurity for Medical Devices

Attachment A. Identification of Risks/Cybersecurity Governance

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Uncheck Yourself. by Karen Scarfone. Build a Security-First Approach to Avoid Checkbox Compliance. Principal Consultant Scarfone Cybersecurity

Information Security for Managers

Risk Management Framework (RMF): The Future of DoD Cyber Security is Here

Cyber Security Metrics Dashboards & Analytics

INFORMATION SECURITY STRATEGIC PLAN

AUTHORED BY: George W. Gray CTO, VP Software & Information Systems Ivenix, Inc. ADDRESSING CYBERSECURITY IN INFUSION DEVICES

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

Information Security and Risk Management

Information & Asset Protection with SIEM and DLP

Cyber Security An Exercise in Predicting the Future

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

Information Security Risk and Compliance Series Risking Your Business

OCIE CYBERSECURITY INITIATIVE

Cybersecurity: What CFO s Need to Know

Leveraging MITA to Implement Service Oriented Architecture and Enterprise Data Management. Category: Cross Boundary Collaboration

Bridging the HIPAA/HITECH Compliance Gap

2014 Defense Health Information Technology Symposium Cloud Computing in the Defense Health Agency

Virginia Government Finance Officers Association Spring Conference May 28, Cloud Security 101

Obtaining Enterprise Cybersituational

How to Use the NYeC Privacy and Security Toolkit V 1.1

Privacy Governance and Compliance Framework Accountability

Using the HITRUST CSF to Assess Cybersecurity Preparedness 1 of 6

High Level Cyber Security Assessment 2/1/2012. Assessor: J. Doe

Department of Defense INSTRUCTION

Healthcare Cybersecurity Risk Management: Keys To an Effective Plan

Cybersecurity and internal audit. August 15, 2014

MHS Health Information Technology Transformation March 1, 2016

Utica College. Information Security Plan

Personal Security Practices of the CAO

Maintaining PCI-DSS compliance. Daniele Bertolotti Antonio Ricci

CYBERSECURITY CHALLENGES FOR DOD ACQUISITION PROGRAMS. Steve Mills Professor of Information Technology

Beyond Good Practice: Why HIPAA only addresses part of the data security problem

Information Blue Valley Schools FEBRUARY 2015

CS 2 SAT: The Control Systems Cyber Security Self-Assessment Tool

MEDICAL DEVICE Cybersecurity.

Cyber Security and Privacy - Program 183

How To Manage Risk On A Scada System

N-Dimension Solutions Cyber Security for Utilities

Cybersecurity. Are you prepared?

October 24, Mitigating Legal and Business Risks of Cyber Breaches

NSERC SSHRC AUDIT OF IT SECURITY Corporate Internal Audit Division

Enterprise Scheduling Platform: The Pathway to Improving IT Integration

Suzanne B. Schwartz, MD, MBA Director Emergency Preparedness/Operations & Medical Countermeasures (EMCM Program) CDRH/FDA

Defense Healthcare Management Systems

Everything You Wanted to Know about DISA STIGs but were Afraid to Ask

micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8.

Wasting Money on the Tools? Automating the Most Critical Security Controls. Mason Brown Director, The SANS Institute

Enterprise Security Tactical Plan

How SPAWAR s Information Technology & Information Assurance Technical Authority Support Navy Cybersecurity Objectives

HIPAA and HITECH Compliance for Cloud Applications

U.S. FLEET CYBER COMMAND U.S. TENTH FLEET DoD RMF Transition

Computer Security Incident Response Plan. Date of Approval: 23- FEB- 2015

Compliance, audit, risk, security what s the difference and why do we need it?

DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy IT Risk Strategy V0.1 April 21, 2014

Click to edit Master title style

Department of Homeland Security Federal Government Offerings, Products, and Services

ALERT LOGIC FOR HIPAA COMPLIANCE

A Guide to Successfully Implementing the NIST Cybersecurity Framework. Jerry Beasley CISM and TraceSecurity Information Security Analyst

1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers.

RMF. Cybersecurity and the Risk Management. Framework UNCLASSIFIED

White Paper Achieving GLBA Compliance through Security Information Management. White Paper / GLBA

PREFACE TO SELECTED INFORMATION DIRECTIVES CHIEF INFORMATION OFFICER MEMORANDUM

NICE and Framework Overview

Security management solutions White paper. IBM Tivoli and Consul: Facilitating security audit and compliance for heterogeneous environments.

Roadmaps to Securing Industrial Control Systems

FEDERAL HOUSING FINANCE AGENCY ADVISORY BULLETIN AB Cyber Risk Management Guidance. Purpose

CYBER SECURITY, A GROWING CIO PRIORITY

Experience the commitment WHITE PAPER. Information Security Continuous Monitoring. Charting the Right Course. cgi.com 2014 CGI GROUP INC.

Cybersecurity The role of Internal Audit

State of Oregon. State of Oregon 1

Information Security Program Management Standard

Secure Content Automation Protocol (SCAP): How it is increasingly used to automate enterprise security management activities

Information Security Program CHARTER

FREQUENTLY ASKED QUESTIONS

Enterprise Cybersecurity: Building an Effective Defense

BIG SHIFT TO CLOUD-BASED SECURITY

Integrating Cybersecurity with Emergency Operations Plans (EOPs) for Institutions of Higher Education (IHEs)

Managing the Unpredictable Human Element of Cybersecurity

Data Privacy and Gramm- Leach-Bliley Act Section 501(b)

VENDOR MANAGEMENT. General Overview

FINRA Publishes its 2015 Report on Cybersecurity Practices

Transcription:

Enedina Guerrero, Acting Chief, Incident Mgmt. Section, Cyber Security Ops Branch 2015 Defense Health Information Technology Symposium DOD Medical Device Cybersecurity Considerations 1

DHA Vision A joint, integrated, premier system of health, supporting those who serve in the defense of our country. 2

Learning Objectives Identify processes a medical device user community must apply to protect confidentiality and integrity of electronic information Recognize how Information Technology, Cyber Security and Clinical Engineering/Medical Logistics collaboration is critical to maintain an organization's protection posture Recognize the various protection postures an organization may implement with regards to medical devices host security and in compliance with a DHA Single Security Architecture 3

Agenda Background Directives for Securing Resources Three Part Problem Implementing a Different Approach Risk Assessment Threats High Level View The Process Conclusion 4

Background DHA Health Information Technology (HIT) Directorate in an effort to reduce variability by means of standardization Established a cross functional Integrated Project Team (IPT) to meet multiple technical needs and process initiatives in support of standardization of cybersecurity classifications, criteria and mitigations for Medical Devices mapped to the DHA network architecture. Developed a technical architecture available as part of the Medical Community of Interest (Med-COI) architecture Special Purpose Node (SSPN) delivering defense in depth protections Supports the alignment of process and implementation, but does not own the Medical Device implementation. 5

Directives for Securing Resources Executive Orders, Directives and Guidance Healthcare and Public Health part of Critical Infrastructure Sector (Presidential Policy Directive/PPD-21) National Infrastructure Protection Plan Healthcare and Public Health Sector Specific Plan Health Information Technology (HITECH) Act of 2009 provisions Health and Human Services (HHS) directives Food and Drug Administration (FDA) and HHS guidance 6

Department of Defense Instructions (DoDI) for Securing Resources DoDI 8510.01 Risk Management Framework (RMF), dated 12 March 2014 Platform Information Technology (PIT) / Industrial Control Systems (ICS) Cybersecurity Authorization Metrics Each system, and PIT must have Authorizing Official for authorizing the system s operation DoDI 8500.01 Cybersecurity, dated 14 March 2014 Comply with DoDI 8500 Cybersecurity & DoDI 8510 RMF All IT that receives, processes, stores, displays or transmits DoD information will.be consistent with applicable DoD cybersecurity policies, standards, and architectures. Examples of platforms that may include PIT are: medical devices and health information technologies 7

Three Part Problem The need: Increased need to share electronic patient data has increased number of networked medical devices and applications Medical devices are key tools used to diagnose and treat DOD beneficiaries The guidance: Public laws and DOD regulations provide general guidance on protection requirements, gaps remain for systems that cannot meet traditional cyber security measures FDA regulated devices for a specific purpose cannot be treated as regular information technology (IT) devices 8

Three Part Problem (con t) The challenge: Safety, effectiveness and data, and system security are key properties for connecting networked medical devices without compromising delivery of care and the organization Connecting a regulated medical device to an unregulated network results in a medical IT network with a new set of risks possibly affecting patient safety and medical efficacy Convergence of various medical devices built by multiple vendors on a single network increase number of security vulnerabilities likelihood of compromising data confidentiality, integrity, and availability 9

Implementing a Different Approach DHA HIT sponsored a DHA Medical Device Information Assurance (IA) Architecture and Standards Integrated Project Team to: Align and standardize cybersecurity architecture and mitigations for Medical Devices across DHA Stakeholders supporting: Clinical Functions DHA Consolidation, Med-COI Transition, and Defense Healthcare Management System Modernization (DHMSM) Delivery Acknowledge resource limitations leading to trade-offs Achieve dual goal: Improve patient outcomes and secure networks Maximize medical device vendor vulnerability management controls Leverage to maximum extent Med-COI Single Security Architecture (SSA) SSPN defense in-depth protections 10

Implementing a Different Approach (con t) DHA delivers a single, centrally managed directory and cyber security services infrastructure providing authentication and authorization to simplify and optimize resource access. 11

Risk Assessment Traditional published IT guidance provides a general framework Med-COI SPPN approach recognizes that Each healthcare activity is unique and must be evaluated as such An overarching or one size fits all type of assessment does not take into consideration the diversity of systems found in one location 12

Threats Reported cases Malware on Healthcare.gov health insurance marketplace (PCWorld, Sep 14) Possible vulnerabilities in two computerized drug infusion pumps manufactured by Hospira (AHA News, May 15) Community Health Systems Inc. data exfiltration affecting about 4.5 million patients (CIO Website, Aug 14) Healthcare and Public Health Sector Cyber Risk Framework 13

High Level View The Process In collaboration with Cyber Security Division (CSD), DHA MEDLOG, and Medical Services Identify medical device DOD RMF system and information type categorization From categorization generate Request for Information/Query (RFI/RFQ) Vendor Cyber security questionnaire Initiate Authorization or Risk Assessment process approved for Medical Devices deployed in a Med- COI SSPN 14

High Level View The Process (con t) Evaluation of aggregate system components increase impact of configuration changes Interconnection points and dependencies require evaluation to avoid outages Requires analysis beyond what is required in traditional networks Cybersecurity support for medical devices is the responsibility of IT and Cybersecurity Staff Support cybersecurity processes, IT patches and network resources Clinical Engineering and BioMed staff Management & scheduling of medical device maintenance Oversight of safe use of all medical devices Medical Device Vendor Warranty and contract support for medical devices 15

Conclusion Healthcare practitioners and business partners will rely on digital communications and shared data Policies, laws, and regulatory guidance provide a framework for security and privacy needs DHA desired end state for medical devices Assured delivery of Medical Device data across devices and infrastructure Standardized infrastructure protections Standardized classification, controls criteria and mitigations Standardized risk review, Authorization and Connection Approval process 16

Contact Information Enedina Dina Guerrero Acting Chief, Incident Management/SOC Liaison Section Cyber Security Operations Branch, Cyber Security Division enedina.guerrero.civ@mail.mil 17

Questions? 18

Evaluations Please complete your evaluations 19

References AHA News Now (2015, May). FDA alerts health care facilities to infusion pump cybersecurity vulnerability. AHA News Website. Retrieved from AHA News website at http://news.aha.org/article/fda-alerts-health-care-facilities-to-infusion-pump-cybersecurityvulnerability Eastwood, B. (2014, Aug). Community Health Breach Highlights Healthcare Security Vulnerabilities. CIO Website. Retrieved from CIO website at http://www.cio.com/article/2597970/healthcare/community-health-breach-highlights-healthcaresecurity-vulnerabilities.html Paul, I. (2014, Sep). Botnet malware discovered on Healthcare.gov server. PCWorld Website. Retrieved from PCWorld website at http://www.pcworld.com/article/2603361/botnet-malware-discoveredon-healthcaregov-server.html 20