Medical Device Security Considerations – Case Study

Slides:



Advertisements
Similar presentations
Smart Grid - Cyber Security Small Rural Electric George Gamble Black & Veatch
Advertisements

A Covenant University Presentation By Favour Femi-Oyewole, BSc, MSc (Computer Science), MSc (Information Security) Certified COBIT 5 Assessor /Certified.
Security Controls – What Works
ISO 17799: Standard for Security Ellie Myler & George Broadbent, The Information Management Journal, Nov/Dec ‘06 Presented by Bhavana Reshaboina.
(Geneva, Switzerland, September 2014)
Risk management planning related to Health Information Technology
Network security policy: best practices
Website Hardening HUIT IT Security | Sep
A project under the 7th Framework Programme CPS Workshop Stockholm 12/04/2010 Gunnar Björkman Project Coordinator A Security Project for the Protection.
Information Security Technological Security Implementation and Privacy Protection.
SEC835 Database and Web application security Information Security Architecture.
Storage Security and Management: Security Framework
K E M A, I N C. NERC Cyber Security Standards and August 14 th Blackout Implications OSI PI User Group April 20, 2004 Joe Weiss
How Hospitals Protect Your Health Information. Your Health Information Privacy Rights You can ask to see or get a copy of your medical record and other.
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Compliance with FDA Regulations: Collecting, Transmitting and Managing Clinical Information Dan C Pettus Senior Vice President iMetrikus, Inc.
April 14, A Watershed Date in HIPAA Privacy Compliance: Where Should You Be in HIPAA Security Compliance and How to Get There… John Parmigiani National.
Unit 6b System Security Procedures and Standards Component 8 Installation and Maintenance of Health IT Systems This material was developed by Duke University,
GSHRM Conference Cyber Security Education Shri Cockroft, CISO Piedmont Healthcare, Inc. September 21, 2015.
Security Policies and Procedures. cs490ns-cotter2 Objectives Define the security policy cycle Explain risk identification Design a security policy –Define.
℠ Pryvos ℠ Computer Security and Forensic Services May 27, 2015 Copyright © 2015 Pryvos, Inc. 1.
Ali Alhamdan, PhD National Information Center Ministry of Interior
FFIEC Cyber Security Assessment Tool
Albany Bank Corporation Security Incident Management Program.
HHS Security and Improvement Recommendations Insert Name CSIA 412 Final Project Final Project.
Important acronyms AO = authorizing official ISO = information system owner CA = certification agent.
Cook Children’s 1 Theresa Meadows, RN, MS, CHCIO Senior Vice President and CIO Co-Chair HHS Health Care Cyber Security Task Force July 2016 Cybersecurity:
Security and resilience for Smart Hospitals Key findings
Proactive Incident Response
Enhancing Network Security
Cyber Issues for Design Professionals
BruinTech Vendor Meet & Greet December 3, 2015
Information Security Program
MEM Cybersecurity Working Group Update to PCD Technical Committee
An Overview on Risk Management
Cybersecurity - What’s Next? June 2017
Healthcare Cybersecurity: State of Industry
Team 1 – Incident Response
Security Standard: “reasonable security”
Cybersecurity of Medical Devices
MEM Cybersecurity Working Group Update to PCD Technical Committee
Compliance with hardening standards
The Internal Audit Role in assessing Cybersecurity
Understanding HIPAA Dr. Jennifer Lu.
Intelligent Buildings and Cybersecurity
Data Compromises: A Tax Practitioners “Nightmare”
PCD MEM Medical Device IT Management
Medical Device Cybersecurity Legislative Activities - Overview
Cyber Protections: First Step, Risk Assessment
Hello, Today we will look at cyber security and the Internet of Things and how it could impact our business.
BUILDING A PRIVACY AND SECURITY PROGRAM FOR YOUR NON-PROFIT
Joe, Larry, Josh, Susan, Mary, & Ken
Unfortunately, any small business could face the risk of a data breach or cyber attack. Regardless of how big or small your business is, if your data,
SAM GDPR Assessment <Insert partner logo here>
We want to hear from you! chime16.org/evals
Cybersecurity Special Public Meeting/Commission Workshop for Natural Gas Utilities September 27, 2018.
Information Security Risk Management
County HIPAA Review All Rights Reserved 2002.
Information Security Awareness
How to Mitigate the Consequences What are the Countermeasures?
Cybersecurity ATD technical
Drew Hunt Network Security Analyst Valley Medical Center
HIPAA SECURITY RULE Copyright © 2008, 2006, 2004 by Saunders an imprint of Elsevier Inc. All rights reserved.
Third-party risk management (TPRM)
Managing IT Risk in a digital Transformation AGE
Tobey Clark, Director*, Burlington USA
Anatomy of a Common Cyber Attack
IoT in Healthcare: Life or Death
Presentation transcript:

Medical Device Security Considerations – Case Study Jeanie Larson Chief Information Security Officer UC Davis Medical Center @katkarma1

Current Trends: Medical Device Security Medical devices are easy-targets and used as entry-points into networks for attackers “Network-connected/configured medical devices that are infected by malware can disable a device from properly performing its clinical function. This, in turn, could lead to a patient safety concern.” Suzanne Schwartz, Director, FDA Center for Devices and Radiological Health

Why the Focus on Medical Device Security? 2008 Pacemaker hack (Kevin Fu, Umass Amherst) Insulin Pump hack (Jerome Radcliffe, Black Hat Conference) Disovery of a wide-range of vulnerabilities, including Surgical and anesthesia devices, Ventilators, Infusion Pumps, Defibrillators, Patient Monitors, and Laboratory Equipment Department of Homeland Security Alerts (ICS CERT) Government Accountability Office (GAO) Report FBI Alerts to Healthcare Industry, NIST NCCoE Medical Device Use Case project launched AAMI / ECRI Safety Warning on cyber risks HHS OIG Announced that it will include networked medical devices in upcoming audits FDA Cybersec7urity Guidance and Workshop – Poastmarket 2011 2013 2013 2014 2014 2015 2016

Old Model / New Paradigm Cybersecurity CIA Triad Confidentiality Integrity Availability And sometimes non-repudiation Patient Safety < -- > Human Life & Safety Patient Safety

CIA and Patient Safety Patient Safety Considerations: Confidentiality – breach of patient information, HIPAA regulatory and liability (civil and regulatory) Integrity - data used to make treatment decisions – patient safety Availability – outage creates critical gap in patient monitoring or treatment patient safety

CIA –Risk Considerations for Medical Device Security Medical device is hacked or infected with malware! Now what? Leave it. Shut it down. Rebuild. Who makes the decision? Consider multi-disciplinary approach to manage risk and apply compensating controls Establish governance, create a charter, engage appropriate stakeholders

Incident Response and Medical Devices Asset inventory – medical devices should be easily identified as such during incident response triage Incident Response vendor support model What is the SLA / Response requirement? Liability – shared liability? Contractual liability. Incident Response Plan Identify roles and responsibilities Include a decision and notification / escalation matrix Patient safety / patient harm – how would you know? Are medical devices assessed or forensically examined after a patient safety event?

Medical Device Security Considerations Risks: Patient safety (lives) Operational / Downtime Data Breaches / Fines Revenue / Financial Patient trust & Staff morale National security Vulnerability: Tightly regulated “turn-key” systems Long useful life Poorly protected & patched No detection & alerting Ecosystem Complexity Vulnerability of device, hospital, & health system Network connected Threats: Targeted attacks Collateral damage Malware remediation Theft / Loss Compliance violation Lateral attack / weakest link exploitation Hacktivism, terrorism Symantec Corp, 2016

How to Secure the Un-securable? Framework or Methodology Imperative to identify and use a framework or methodology Medical Device Risk Assessment Platform Cybersecurity Framework (NIST) Incident Response Plan should outline medical device response and governance Threat modeling will help when with security mitigation plan Device Management Diagnostic / monitoring / control (treatment) Map threats to mitigation strategies (Cyber Threat Statement for Medical Devices) Asset identification, categorization and isolation Consider multi-tier approach based on criticality of impact to patient safety

Caveats and Disclaimers The content of this session is from a cybersecurity practitioner’s perspective. For clarity, the term ”medical device” in this presentation refers to a device that meets the following criteria: “An instrument, apparatus, implement, machine, contrivance, implant, in vitro reagent, or other similar article including a component part or accessory” (FDA Medical Device Definition) Diagnostic equipment Pumps Pill dispensers Wearable /embedded devices Or more practically, any (network connected) device that is controlled by a computer that is used to monitor, treat, diagnose, or impact patient care.

Case Study – Additional Disclaimer For purposes of this presentation, limited to a single type of diagnostic device (EEG). NOTE: This could be any vendor or any provider, anywhere.

Case # 1 – Malware Infected Diagnostic Medical Device Malware infected medical diagnostic device – Could impact Confidentiality, Integrity and / or Availability ANY of these COULD impact patient safety Used in diagnosis and treatment decisions by physician Neurology Department uses embedded medical application (running on Windows OS) to monitor patients seizure activity Data integrity could be an issue Safety of patient diagnosis/ treatment decisions Decision – leave it up or shut it down? Risk assessment – patient safety paramount

Case Study – Neurology Diagnostic Device Vendor documentation: Connecting to the NNN-123 through the LAN converter, a secondary data stream can be controlled by a local or network station and sent to a separate file storage location. The integration of the vital sign data is available at the bedside, as well as remotely for more timely EEG intervention by the reviewing clinician.

Malware Controlled Medical Device Security monitoring detected: Calling home to multiple countries including France, China, Russia, Ukraine and Panama Remote Access Trojan Appeared to be part of a controlled botnet (IOCs, TTPs) Attempts to remediate revealed sophisticated anti-forensics capability High availability requirement in service environment – serving patient care

Many Vulnerabilities Security Vulnerabilities: Connects via LAN (connected to Internet) – isolation difficult because it needs to upload data to imaging system Poor authentication (Username = Password) Requires Local Admin privileges to operate application Support model – vendor remote access Zero platform hardening - unpatched operating system and unnecessary services enabled Communication not secure No encryption No anti-virus installed Security patches not applied - ever Running on end-of-life operating system Healthcare provider CULTURE!

Challenges in Decision Making – Medical Devices Malware infected medical device Confidentiality, Integrity and / or Availability issues caused by malware COULD impact patient safety Risk Decision Who is authorized to make the decisions regarding malware infected or hacked medical devices? Little or no understanding of ramification of a cyber event on functionality of device and consequently impact to patient. Primary goal: Patient Care Little or no understanding of impact to patient. Primary goal: Containment Keep patient appointments. Primary goal: Availability! We have patients scheduled! Take it off the network! I need these diagnostic results! IT Technician Physician Biomed / Scheduler

Where do we go from here? Evaluate your environment Do you know where your medical devices are? What are the vulnerabilities? What compensating controls are applied? Do you know who makes decisions when a medical device is compromised? Is a multidisciplinary team involved in risk decisions regarding medical devices that are hacked/malware infected? Are medical devices addressed in your Incident Response Plan? Solid methodology or framework needed to secure medical devices Governance to ensure risk decisions are being made at the appropriate level and by the appropriate party in the organization - include appropriate stakeholders

Where do we go from here? Remember the “human factor” – security awareness and communication Incident lifecycle – educate employees about incidents occurring in your environment Post-mortem cyber-forensic review of medical equipment Information Sharing – Information Sharing and Analysis Center (ISAC) NH-ISAC – Medical device working group MDISS – FDA named ISAO for medical devices Share vulnerability information, risk assessments, threat information appropriately Proactively consume and act upon intelligence information

In Summary Cybersecurity triad – Confidentiality – Integrity – Availability Need to understand the impact of each of these as applied to medical device security and patient safety A framework or methodology is necessary to identify and address vulnerabilities and ensure the secure operation of medical devices Threat modeling for medical devices will help in developing a security strategy Incident response plans need to address medical device breaches. Multi-disciplinary team approach recommended – physician / practitioner, Biomed, IT, cybersecurity Don’t forget the human factor – engage employees, including practitioners and Biomed personnel – educate them! Get involved – NH-ISAC or MDISS – leverage community assessments and emerging frameworks www.nhisac.org www.mdiss.org Contact info Jeanie Larson – jeanielarson@me.com

Resources for more information NH-ISAC http://www.nhisac.org/ Medical Device Innovation, Safety and Security Consortium http://www.mdiss.org/ https://mdrap.mdiss.org/ Hacking Healthcare IT in 2016 http://icitech.org/wp-content/uploads/2016/01/ICIT-Brief-Hacking-Healthcare-IT-in-2016.pdf http://www.bloomberg.com/features/2015-hospital-hack/ http://deceive.trapx.com/AOAMEDJACK_210_Landing_Page.html Securing Hospitals – A Research Study and Blueprint - Security Evaluators https://www.securityevaluators.com/hospitalhack/securing_hospitals.pdf