15
©2018, The MITRE Corporation. All rights reserved. Approved for public release. Distribution unlimited. Case number 18-0665.. Defending the Telehealth Ecosystem Ronnie Daldos, CISSP Lead Cyber Engineer Cyber Physical and Mobile Technologies

Defending the Telehealth Ecosystem - Mitre Corporation · 2018-03-06 · A threat-informed defense will improve upon existing defenses by providing healthcare organizations a structured

  • Upload
    others

  • View
    5

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Defending the Telehealth Ecosystem - Mitre Corporation · 2018-03-06 · A threat-informed defense will improve upon existing defenses by providing healthcare organizations a structured

©2018, The MITRE Corporation. All rights reserved. Approved for public release. Distribution unlimited. Case number 18-0665..

Defending the Telehealth Ecosystem

Ronnie Daldos, CISSP

Lead Cyber Engineer

Cyber Physical and Mobile Technologies

Page 2: Defending the Telehealth Ecosystem - Mitre Corporation · 2018-03-06 · A threat-informed defense will improve upon existing defenses by providing healthcare organizations a structured

| 2 |

The Power of Perspective

Common problems have common solutions

Systems thinking approach enables effective solutions

©2018, The MITRE Corporation. All rights reserved. Approved for public release. Distribution unlimited. Case number 18-0665.

Page 3: Defending the Telehealth Ecosystem - Mitre Corporation · 2018-03-06 · A threat-informed defense will improve upon existing defenses by providing healthcare organizations a structured

| 3 |

Agenda

▪ Telehealth Ecosystem—A Complex “System of Systems”

▪ Cybersecurity and Privacy Risks

▪ Threat-Informed Defense

▪ Home Telehealth Use Case

▪ Key Takeaways

©2018, The MITRE Corporation. All rights reserved. Approved for public release. Distribution unlimited. Case number 18-0665.

Page 4: Defending the Telehealth Ecosystem - Mitre Corporation · 2018-03-06 · A threat-informed defense will improve upon existing defenses by providing healthcare organizations a structured

| 4 |

Enabling Healthcare Delivery and Outcomes

Clinical & Web-Based

Video

©2018, The MITRE Corporation. All rights reserved. Approved for public release. Distribution unlimited. Case number 18-0665.

Home Telehealth

Store and Forward

Rural Health Access

Innovative Concepts (e.g., AI with Wearables)

Remote/On Demand Staffing

(e.g., Surge)

Disaster Response

Page 5: Defending the Telehealth Ecosystem - Mitre Corporation · 2018-03-06 · A threat-informed defense will improve upon existing defenses by providing healthcare organizations a structured

| 5 |

The Telehealth EcosystemA Complex “System of Systems”

©2018, The MITRE Corporation. All rights reserved. Approved for public release. Distribution unlimited. Case number 18-0665.

A highly distributed infrastructure with multiple access methods under independent management often utilizing multi-tenant environments.

Store and ForwardSystems (e.g., Teleradiology)

Page 6: Defending the Telehealth Ecosystem - Mitre Corporation · 2018-03-06 · A threat-informed defense will improve upon existing defenses by providing healthcare organizations a structured

| 6 |

Examples of Telehealth Cybersecurity and Privacy Risks

©2018, The MITRE Corporation. All rights reserved. Approved for public release. Distribution unlimited. Case number 18-0665.

Unsecured Endpoints (e.g., Medical, Consumer

Devices

Page 7: Defending the Telehealth Ecosystem - Mitre Corporation · 2018-03-06 · A threat-informed defense will improve upon existing defenses by providing healthcare organizations a structured

| 7 |

Existing Defenses Inadequate to Protect Against the Growing Cyber Threat

Changing Healthcare Environment

▪ Growth in telehealth services

▪ Emphasis on value based care, meaningful use and changes in reimbursement models

▪ Electronic information sharing for coordinated care (e.g., EHR)

▪ Mobility & interconnected medical devices

Existing Healthcare Architecture

▪ Increased level of interconnectedness

▪ Expanded attack surface

▪ Distributed ownership & management

▪ Cloud hosting in multi-tenant environment

Existing Healthcare Defenses

▪ Focus on perimeter/defense in depth

▪ HIPAA Compliance vs threat focus

▪ Lack of cyber situational awareness

▪ Limited technology funding

▪ Limited qualified cyber workforce

Critical Needs

▪ Ensure the confidentiality, integrity, availability, and safetyof the healthcare services providing patient care.

▪ Improve existing defenses which are a soft target for the advanced persistent threat and criminal actors

▪ Identity and Access Management (IDAM)

▪ Improve cyber situational awareness

A threat-informed defense will improve upon existing defenses by providing healthcare organizations a structured approach to identify, prioritize, and mitigate cyber risk.

©2018, The MITRE Corporation. All rights reserved. Approved for public release. Distribution unlimited. Case number 18-0665.

Page 8: Defending the Telehealth Ecosystem - Mitre Corporation · 2018-03-06 · A threat-informed defense will improve upon existing defenses by providing healthcare organizations a structured

| 8 |

Why Use a Threat-Informed Approach?

▪ Taking a threat-informed approach to cyber risk management allows:

– Prioritizing limited cyber resources & funds on threats most relevant to your environment.

– Assessing based on risk rather than compliance.

– Understanding cyber adversary tactics, techniques and procedures (TTPs).

▪ Identify gaps in defense & detection capabilities

▪ Strategic tool acquisition©2018, The MITRE Corporation. All rights reserved. Approved for public release. Distribution unlimited. Case number 18-0665.

Page 9: Defending the Telehealth Ecosystem - Mitre Corporation · 2018-03-06 · A threat-informed defense will improve upon existing defenses by providing healthcare organizations a structured

| 9 |

What is a Threat-Informed Defense?

▪ Knowledge of the adversary’s goals and motivations

▪ Identification of relevant threats

– Sources of Threat Intelligence - Internal sources, NH-ISAC/ISAO’s, MITRE CAPEC™ & ATT&CK™

▪ An asset inventory with identification of their vulnerabilities

– NIST National Vulnerability Database (NVD) – CVE R , CWETM, US/ICS-CERT

▪ Ranking system to prioritize threats (e.g., likelihood, impact)

▪ Security controls that mitigate risk

▪ Test cases that are exercised to evaluate the effectiveness of security controls

▪ Reevaluate your environment against new threats

©2018, The MITRE Corporation. All rights reserved. Approved for public release. Distribution unlimited. Case number 18-0665.

Page 10: Defending the Telehealth Ecosystem - Mitre Corporation · 2018-03-06 · A threat-informed defense will improve upon existing defenses by providing healthcare organizations a structured

| 10 |

Who is Targeting Healthcare?

Insider Threat

Hacktivist

Criminals

Nation State

©2018, The MITRE Corporation. All rights reserved. Approved for public release. Distribution unlimited. Case number 18-0665.

Page 11: Defending the Telehealth Ecosystem - Mitre Corporation · 2018-03-06 · A threat-informed defense will improve upon existing defenses by providing healthcare organizations a structured

| 11 |

Understanding Your Adversaries

https://www.securityevaluators.com/hospitalhack/securing_hospitals.pdf

Threats addressed by existing defensive capabilities

Threats not addressed by existing defensive capabilities

©2018, The MITRE Corporation. All rights reserved. Approved for public release. Distribution unlimited. Case number 18-0665.

Page 12: Defending the Telehealth Ecosystem - Mitre Corporation · 2018-03-06 · A threat-informed defense will improve upon existing defenses by providing healthcare organizations a structured

| 12 |

Use Case: Home Telehealth

Vulnerability:Hard Coded Passwords

Vulnerability:Endpoint communications not verified.

Home Network (Cloud / Data Center) (Healthcare Organization)Network

Threat: Modify or disable ICD

Threat: Gain access to the monitor

Threat: Compromise integrity & availability of patient data

Threat: Intercept data or credentials

Threat: Gain access to clinicians credentials

Vulnerability:Weak or non-existent access controls

Vulnerability:Targeted Users

**Mitigation:IDAM

Mitigation: Code Security Review, Patch, IDAM

Mitigation:Encryption, IDAM

Mitigation: User Education, 2FA, Least Privilege

Vulnerability:Insecure Application Program Interface (API)

IDAM - Identity & Access Management

Mitigation: Encryption, Code review, Continuous Monitoring of API

2FA – Two Factor Authentication**NOTE – Requires solution aligned with clinical constraints

Pacemaker w/Implantable Cardiac Defibrillator (ICD) Monitor

©2018, The MITRE Corporation. All rights reserved. Approved for public release. Distribution unlimited. Case number 18-0665.

Page 13: Defending the Telehealth Ecosystem - Mitre Corporation · 2018-03-06 · A threat-informed defense will improve upon existing defenses by providing healthcare organizations a structured

| 13 |

Key Takeaways

▪ Telehealth is transforming the delivery of healthcare

▪ The telehealth ecosystem is a complex system of systems

▪ Taking a threat-informed approach to risk management helps you identify & prioritize threats that are relevant to the telehealth ecosystem.

▪ Prioritizing threats helps to focus cyber resources and funds on threats that are most likely to have the highest impact on the telehealth ecosystem

▪ Reevaluate for threats and vulnerabilities anytime changes are made within the telehealth ecosystem

©2018, The MITRE Corporation. All rights reserved. Approved for public release. Distribution unlimited. Case number 18-0665.

Page 14: Defending the Telehealth Ecosystem - Mitre Corporation · 2018-03-06 · A threat-informed defense will improve upon existing defenses by providing healthcare organizations a structured

| 14 |

Thank You!

Questions?

Interested in learning more about MITRE ATT&CK?

Julie Connolly from MITRE and Denise Anderson from NH-ISAC will be presenting:

“Detecting Cyber Threats with ATT&CK™ Analytics”

Tomorrow (3/7) @ 10am Session #123 - Marcello 4401

©2018, The MITRE Corporation. All rights reserved. Approved for public release. Distribution unlimited. Case number 18-0665.

Page 15: Defending the Telehealth Ecosystem - Mitre Corporation · 2018-03-06 · A threat-informed defense will improve upon existing defenses by providing healthcare organizations a structured

| 15 |

Follow up

To download a copy of this presentation, visit:

https://health.mitre.org/himss18

Improving the Patient Experience

Follow us on social media: @MITREhealth

Protecting Data & Devices

©2018, The MITRE Corporation. All rights reserved. Approved for public release. Distribution unlimited. Case number 18-0665.