Table of contents exchange of letters with the minister executive summary



Download 5.91 Mb.
View original pdf
Page202/329
Date27.11.2023
Size5.91 Mb.
#62728
1   ...   198   199   200   201   202   203   204   205   ...   329
Report of the COI into the Cyber Attack on SingHealth 10 Jan 2019

COI Report – Part VII
Page 241 of 425

However, these are manual processes which not only are error-prone but will also require constant updating.
698. Hence, experts such as Dr Lim have recommended the use of an asset discovery tool to automate the asset discovery and management process, as opposed to a physical asset register updated manually. In his expert opinion, such a tool should be adopted to augment a network access control solution (which is limited in its effectiveness as a tool to discover and manage assets in the network.
699. The Committee was informed that IHiS is planning to setup a central Public Key Infrastructure (“PKI”) to issue digital certificates such that only authorised devices and applications with valid certificates can connect to IHiS’ network, and intends for the central PKI to support key exchange for encryption purposes.
700. The Committee also notes that IHiS is working towards the implementation of posture checking, which will ensure that endpoints have necessary operating system (“OS”) patches and antivirus/malware signature updates before they are allowed to connect to the corporate network. This measure will help to enhance network access controls.
36.2.3
Reviewing the network
701. In addition to the abovementioned regular reviews, rules that allow or limit network traffic between different network segments must be periodically reviewed to identify vulnerabilities. In particular, any changes to the network configuration or architecture must trigger a separate security review to check that the change has not created new gaps in the existing layers of defence. As regards the Cyber Attack, following the migration of the SCM system to H-Cloud, there remained an open network connection from the Citrix server farm at SGH to the
SCM database server at H-Cloud data centre. The open network connection was a critical pathway exploited by the attacker.



Download 5.91 Mb.

Share with your friends:
1   ...   198   199   200   201   202   203   204   205   ...   329




The database is protected by copyright ©ininet.org 2024
send message

    Main page