Table of contents exchange of letters with the minister executive summary


Vulnerability assessment must be conducted regularly



Download 5.91 Mb.
View original pdf
Page230/329
Date27.11.2023
Size5.91 Mb.
#62728
1   ...   226   227   228   229   230   231   232   233   ...   329
Report of the COI into the Cyber Attack on SingHealth 10 Jan 2019
39.1 Vulnerability assessment must be conducted regularly
812. According to the Cybersecurity Code of Practice
66
(“CCoP”), vulnerability assessment is the process of identifying, assessing and discovering security vulnerabilities in a system.
813. In turn, the CCoP defines a) architecture review as “a process of reviewing and analysing the
design of the application and network architecture to identify
critical assets, network design weaknesses, sensitive data stores
and business critical interconnections for potential attack vectors
and potential vulnerabilities in the network and application
architectures”; b) host security assessment as “a process of security assessment on
a host to assess the host security configuration that cannot be seen
66
The CCoP was issued on 1 September 2018.



COI Report – Part VII
Page 280 of 425

from the network, to identify additional exposures and
configuration weaknesses. It checks if the host’s systems and
applications are hardened effectively. Host, in this context,
includes operating system, database server, firewall, router/switch,
virtualisation implementation, load balancer, IDS, web proxy, web
server, application server, mail server and wireless devices”; and c) network security assessment as “a process to identify and
evaluate security weaknesses of the network and the network
perimeter of a computer or computer system”.
814. Under the CCoP, the concept of a vulnerability assessment on a system is abroad one, requiring thorough review of the architecture, host security and network security of the system. Against this backdrop, we turn to discuss our recommendations.
39.1.1
Vulnerability assessments must be conducted regularly and following
specified events on all CII, mission-critical, and/or internet-facing
systems
815. We recommend that vulnerability assessments must be conducted on all
CII, mission-critical, and/or internet-facing systems a) prior to the commissioning of the system, or any new systems connected to the system b) after any major changes have been implemented to the system, such as adding on application modules, system upgrades and technology refresh, as well as after any system migration and c) in any event, at least annually.



Download 5.91 Mb.

Share with your friends:
1   ...   226   227   228   229   230   231   232   233   ...   329




The database is protected by copyright ©ininet.org 2024
send message

    Main page