Table of contents exchange of letters with the minister executive summary



Download 5.91 Mb.
View original pdf
Page25/329
Date27.11.2023
Size5.91 Mb.
#62728
1   ...   21   22   23   24   25   26   27   28   ...   329
Report of the COI into the Cyber Attack on SingHealth 10 Jan 2019

COI Report – Part II
Page 15 of 425

Chuan continued to concurrently hold his appointment as MOH
CISO; and d)
IHiS took over from MOHH the responsibility as Sector Lead
7
for the healthcare sector, and CSG took over from MOHH ISSD the day-to-day operational activities of the Sector Lead. Kim Chuan became the Sector Lead point-of-contact within IHiS, an appointment that he had held when MOHH was the Sector Lead.
38. More details on CSG’s role maybe found at section 9.2 (pg 29) below.
39. Operationally, the employment of IT personnel is centralised at IHiS, though IT personnel employed by IHiS are deployed back to the Clusters to deliver their IT projects and maintain their IT systems. The key IT personnel deployed to the Clusters include the Cluster Group Chief Information Officers
(“GCIOs”) and Cluster Information Security Officers (“Cluster ISOs”). The Cluster GCIOs and Cluster ISOs are charged with ensuring that Cluster IT initiatives are aligned to the broader objectives, strategies and policies for the public healthcare sector.
40. To balance the Clusters need for some autonomy and flexibility in implementation, each Cluster continues to control its own IT budget, for which it remains responsible and accountable. Each Cluster GCIO prepares his Clusters IT workplan and budget for his Board IT Committee’s approval, while keeping in mind public healthcare sector-wide cybersecurity policies and strategies. To date, SingHealth has approved all, and not moderated down, any budget request relating to cybersecurity.

7
The Sector Lead is the organisation responsible for coordination and information dissemination regarding the protection of CII in the respective sectors. CSA works together with and assists Sector Leads to fulfil their roles and responsibilities for CII protection.



COI Report – Part II
Page 16 of 425

6.4.2
Scope and scale of IHiS’ IT operations
41. Overall, IHiS manages a sizeable IT environment across the public healthcare system. The scale of IHiS’ operations and security measures is summarised in Figure 2 below. Notably, IHiS manages a total of 60,852 endpoints, 6,232 servers, monitors three terabytes of internet traffic per day, and there are 500 firewall denied attempts per second.
Figure 2: Scale of operations & security across public healthcare

Download 5.91 Mb.

Share with your friends:
1   ...   21   22   23   24   25   26   27   28   ...   329




The database is protected by copyright ©ininet.org 2024
send message

    Main page