Table of contents exchange of letters with the minister executive summary


RECOMMENDATION #3: STAFF AWARENESS ON CYBERSECURITY



Download 5.91 Mb.
View original pdf
Page180/329
Date27.11.2023
Size5.91 Mb.
#62728
1   ...   176   177   178   179   180   181   182   183   ...   329
Report of the COI into the Cyber Attack on SingHealth 10 Jan 2019
38
RECOMMENDATION #3: STAFF AWARENESS ON CYBERSECURITY
MUST BE IMPROVED TO ENHANCE CAPACITY TO PREVENT, DETECT,
AND RESPOND TO SECURITY INCIDENTS ................................................... 269
38.1
The level of cyber hygiene among users must continue to be improved ..... 270 A Security Awareness Programme should be implemented to reduce organisational risk ........................................................................................ 273 IT staff must be equipped with sufficient knowledge to recognise the signs of a security incident in a real-world context ................................................... 276
39
RECOMMENDATION #4: ENHANCED SECURITY CHECKS MUST BE
PERFORMED, ESPECIALLY ON CII SYSTEMS ............................................. 279
39.1
Vulnerability assessment must be conducted regularly ............................... 279
39.1.1
Vulnerability assessments must be conducted regularly and following specified
events on all CII, mission-critical, and/or internet-facing systems ................ 280
39.1.2
The scope of the vulnerability assessment should extend to all assets and
systems connected to the CII, mission-critical and/or internet-facing system in
question........................................................................................................... 281
39.1.3
Vulnerability assessments should also be conducted regularly on other critical
assets which may not be part of or connected to CII, mission-critical or
internet-facing systems ................................................................................... 282



COI Report – Part VII
Page 215 of 425

39.1.4
A process must be established to track that vulnerabilities identified in a
vulnerability assessment are addressed. 283 Safety reviews, evaluation and certification of vendor products must be carried out where feasible ............................................................................ 283
39.2.1
Code reviews and safety reviews .................................................................... 284
39.2.2
Evaluation and certification ........................................................................... 286 Penetration testing must be conducted regularly ......................................... 288
39.3.1
Penetration tests must be conducted regularly and following specified events
on all CII, mission-critical and/or internet-facing systems ............................ 289
39.3.2
The scope of the penetration tests should extend to key assets and systems
connected to the CII, mission-critical and/or internet-facing system in
question........................................................................................................... 291
39.3.3
Penetration tests should also be conducted regularly on applications, systems
and networks which may not be part of or connected to CII, mission-critical or
internet-facing systems ................................................................................... 291
39.3.4
Penetration tests should be conducted outside of the regular schedule if a need
to do so is indicated ........................................................................................ 292
39.3.5
Penetration tests should be conducted by persons with the appropriate levels of
expertise .......................................................................................................... 292
39.3.6
A process must be established to track that vulnerabilities uncovered by a
penetration test are addressed ........................................................................ 294
39.3.7
A more comprehensive penetration test of the SCM application should be
conducted ........................................................................................................ 294 Red teaming should be carried out periodically .......................................... 294 Threat hunting must be considered .............................................................. 296

Download 5.91 Mb.

Share with your friends:
1   ...   176   177   178   179   180   181   182   183   ...   329




The database is protected by copyright ©ininet.org 2024
send message

    Main page