Skip to content
NGTEdu Logo

NGTEdu

A PRODUCT OF NGTECH.CO.IN

NGTEdu Logo

NGTEdu

  • Home
  • Cyber Attacks
  • Malware
  • Vulnerabilities
  • Data Breach
  • Home
  • Data Breach
  • ENISA Releases Guidelines for Cloud Security for Healthcare Services
  • Data Breach
  • Malware
  • Vulnerabilities

ENISA Releases Guidelines for Cloud Security for Healthcare Services

5 years ago Anastasios Arampatzis
ENISA Releases Guidelines for Cloud Security for Healthcare Services

The healthcare sector is undergoing digitalization and adopts new technologies to improve patient care, offer new services for remote patients and reach operational excellence. The integration of new technologies in the complex healthcare IT infrastructure creates new challenges regarding data protection and cybersecurity.

On the one hand, the COVID-19 pandemic has been a driver for increased cyber-attacks on healthcare organizations including phishing attacks that aim to collect user credentials as well as ransomware attacks that seek to encrypt the data of hospitals.

On the other hand, the pandemic has helped to stress the need for remote healthcare services. Cloud platforms have provided the elasticity and fast access required for the deployment of these services. Organizations subsequently deployed cloud solutions to cover ERP systems along with health information systems like electronic health records, data analytics, medical devices and telemedicine.

To help IT professionals in healthcare security to establish and maintain cloud security while selecting and deploying appropriate technical and organizational measures, ENISA issued a study that aims to provide cloud security practices for the healthcare sector.

Legislative background

According to the European Union NIS Directive, hospitals are defined as Operators of Essential Services (OES), while cloud providers are Digital Service Providers (DSP). Therefore, both hospitals and cloud vendors must comply with the NIS Directive security requirements when contracting with cloud services.

At the same time, the GDPR defines medical data as a “special category” of personal data, which is sensitive by nature and imposes a higher standard of protection for their processing. Healthcare organizations as data controllers that are processing medical data must implement appropriate technical and administration measures to ensure the security of systems, services and data. Further, cloud providers are considered data processors under GDPR as they are acting on behalf of the data controllers; hence, they have obligations as data controllers.

The report reminds healthcare organizations migrating to the cloud that the Shared Responsibility Model applies, that is, cloud customers and cloud providers have certain security requirements in the cloud (the customers) and of the cloud (the providers).

Figure 1: Cloud security shared responsibilities. Source: ENISA

While migrating to the cloud, healthcare organizations are facing security and data protection challenges. The authors of the ENISA report interviewed healthcare professionals in Europe to explore those obstacles. Those respondents identified the following cloud security and data privacy challenges.

Cloud security challenges

Lack of trust: Stakeholders in the healthcare sector such as patients, physicians, and medical staff indicated a lack of trust of cloud solutions. To combat this, it is helpful to raise awareness for cloud security issues and train personnel in identity, authentication and access management mechanisms. Without training and education, human error and social engineering attacks are likely to prevail.

Lack of security and technology expertise: Migrating the entire on-premises IT infrastructure or individual services to the cloud requires personnel who understand cloud technologies and the associated security and data protection aspects. However, the demand for cloud security experts in the healthcare sector is higher than its supply, hindering cloud computing advancement.

Cybersecurity investment is not a priority: Lack of management buy-in and restricted public financing results in less support to promote the digitalization efforts and to increase cybersecurity and data protection maturity in the healthcare sector.

Regulatory compliance of cloud providers: Healthcare is a heavily regulated industry. As a result, organizations are facing difficulties identifying cloud vendors that are compliant with their legal requirements, thereby limiting their options.

Integration of cloud with legacy systems: The integration of cloud solutions with existing infrastructure is challenging and motivates some organizations to refrain from using cloud services. In many cases, legacy systems that are part of health IT infrastructure cannot be updated, which complicates integration and interoperability with new technologies. Consequently, these systems are more vulnerable to cybersecurity attacks.

Data protection challenges

Privacy by design techniques: The GDPR introduces a legal requirement on privacy by design and by default for both data controllers and data processors. Therefore, healthcare organizations need to ensure that cloud vendors employ such an approach when developing and deploying the service.

Data governance: Healthcare organizations collect and manage patient data. This information is either automatically transferred to the cloud via medical connected devices, or it is submitted by medical practitioners. Data accuracy is essential for healthcare providers. Organizations need to establish data governance policies to identify and classify sensitive data and then apply controls to ensure data accuracy.

Data deletion: It is extremely important to be able to erase data after retention time has expired or upon the data subject’s request without undue delay. However, effective data deletion is a technical challenge.

Encryption: Encryption is important to ensure secrecy and integrity, and it must be applied both to data at rest and data in transit. Encryption needs to be implemented at client- and server-side but also in the channel connecting them.

Cloud security best practices

To address these challenges, ENISA suggests implementing the following security and data protection measures.

  • Identify security and data protection requirements such as legislation, internal policies and legal requirements for specific products.
  • Conduct a risk assessment and data protection impact assessment to identify cybersecurity and data protection threats and risks for cloud deployments and evaluate the impact of the overall risk.
  • Establish processes for security and data protection incident management and define the actions to be taken after a cloud provider security incident. Define roles and responsibilities and align actions with the cloud provider’s security provisions.
  • Define business continuity processes, assign roles and responsibilities, ensure adequate backup and identify the cloud provider’s responsibilities in the event of a service disruption.
  • Identify disaster recovery requirements and ensure that the disaster recovery and data restore processes of the cloud service provider meet these requirements.
  • Ensure the organization’s data are either removed upon contract termination or deleted if data retention period has expired.
  • Define requirements for event logging and continuous monitoring.
  • Determine and setup processes for vulnerability and patch management.
  • Identify, inventory and classify data stored in cloud environments.
  • Enable and ensure encryption for data at rest and in transit.
  • Define security requirements for key management and ensure procedures for key management are implemented.
  • Ensure all data is provided in a standardized format upon request from the cloud provider.
  • Identify and inventory all devices and endpoints and define security baseline for hardening these assets.
  • Ensure and enforce strong authentication and access controls.
  • Establish regular, targeted awareness and training programs for employees and partners.
  • Ensure that traffic between untrusted and trusted environments is restricted and monitored.
  • Apply segmentation practices in accordance with need-to-know, least-privilege principles.
  • Ensure the cloud service provider provides physical security controls to protect data centers and prevent unauthorized physical access.

Conclusion

The adoption of cloud solutions by the healthcare organizations presents improvements in availability, scalability and reliability of services to remote patients. It introduces several security and data protection challenges that need to be addressed to accelerate the digitalization of the healthcare sector. Healthcare organizations should implement the measures described in the ENISA report to ensure the reliability and effectiveness of their operations. However, support is required from government and EU authorities to overcome barriers like understaffing and underbudgeting in hospitals.

You can learn more about how Tripwire helps to secure healthcare infrastructure and protect patient data here.


Editor’s Note: The opinions expressed in this guest author article are solely those of the contributor, and do not necessarily reflect those of Tripwire, Inc.

The post ” ENISA Releases Guidelines for Cloud Security for Healthcare Services” appeared first on TripWire

Source:TripWire – Anastasios Arampatzis

Tags: Cloud, Compliance, COVID-19, Encryption, Finance, Malware, Phishing, Privacy, Ransomware, TripWire

Continue Reading

Previous Cyberattacks Launch Against Vietnamese Human-Rights Activists
Next Cisco Releases Security Patches for Critical Flaws Affecting its Products

More Stories

  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

China-Linked DKnife AitM Framework Targets Routers for Traffic Hijacking, Malware Delivery

1 hour ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Vulnerabilities

CISA Orders Removal of Unsupported Edge Devices to Reduce Federal Network Risk

2 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Asian State-Backed Group TGR-STA-1030 Breaches 70 Government, Infrastructure Entities

4 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach

How Samsung Knox Helps Stop Your Network Security Breach

6 hours ago [email protected] (The Hacker News)
  • Cyber Attacks
  • Data Breach
  • Malware
  • Vulnerabilities

Compromised dYdX npm and PyPI Packages Deliver Wallet Stealers and RAT Malware

7 hours ago [email protected] (The Hacker News)
  • Critical Vulnerability
  • Data Breach
  • Vulnerabilities

Claude Opus 4.6 Finds 500+ High-Severity Flaws Across Major Open-Source Libraries

10 hours ago [email protected] (The Hacker News)

Recent Posts

  • China-Linked DKnife AitM Framework Targets Routers for Traffic Hijacking, Malware Delivery
  • CISA Orders Removal of Unsupported Edge Devices to Reduce Federal Network Risk
  • Asian State-Backed Group TGR-STA-1030 Breaches 70 Government, Infrastructure Entities
  • How Samsung Knox Helps Stop Your Network Security Breach
  • Compromised dYdX npm and PyPI Packages Deliver Wallet Stealers and RAT Malware

Tags

Android APT Bug CERT Cloud Compliance Coronavirus COVID-19 Critical Severity Encryption Exploit Facebook Finance Google Google Chrome Goverment Hacker Hacker News High Severity Instagram iPhone Java Linux Low Severity Malware Medium Severity Microsoft Moderate Severity Mozzila Firefox Oracle Patch Tuesday Phishing Privacy QuickHeal Ransomware RAT Sim The Hacker News Threatpost TikTok TripWire VMWARE Vulnerability Whatsapp Zoom
Copyright © 2020 All rights reserved | NGTEdu.com
This website uses cookies to improve your experience. We'll assume you're ok with this, but you can opt-out if you wish. Read More here.Cookie settingsACCEPT
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these cookies, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may have an effect on your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT