Report of the COI into the Cyber Attack on SingHealth 10 Jan 2019
Part VII – Recommendations by the Committee on TORs #3, #4, and #5 TABLE OF CONTENTS – PART VII 35 PREAMBLE ..................................................................................................... 221 35.1 Terminology ................................................................................................. 221 Recommendations for TORs # 3, #4, and #5 ............................................... 222 Key considerations for recommendations .................................................... 225 Priority Recommendations ........................................................................... 227 Additional Recommendations ...................................................................... 231 36 RECOMMENDATION #1: AN ENHANCED SECURITY STRUCTURE AND READINESS MUST BE ADOPTED BY IHIS AND PUBLIC HEALTH INSTITUTIONS ....................................................................................................... 235 36.1 Gaps between policy and practice must be addressed ................................. 235 36.2 IHiS must adopt a “defence-in-depth” approach ......................................... 237 36.2.1 Reviewing legacy systems ............................................................................... 238 36.2.2 Reviewing all assets including lower-priority assets ...................................... 239 36.2.3 Reviewing the network .................................................................................... 241 36.3 Cybersecurity must be viewed as a risk management issue, and not merely a technical issue – decisions should be deliberated at the appropriate management level, to balance the trade-offs between security, operational requirements and cost .................................................................................. 242 Ensuring appropriate lines of reporting ....................................................... 243 36.4.1 Ensuring appropriate management visibility ................................................. 244 36.4.2 Ensuring appropriate cybersecurity resources at the Cluster senior management level ........................................................................................... 245