COI Report – Part VII
Page
297 of
425 available, Dan’s view was that
it should be done regularly, especially for critical systems.
861. Relatedly, on the issue of timing for organisations to start deploying threat hunting, Vivek cautioned that an organisation’s security setup would have to reach a certain level of maturity,
which could take several years, before threat hunting would be of meaningful benefit. In his opinion, the focus areas should first be on developing threat intelligence and the Security Operations Centre, with threat hunting and cyber range exercises to follow several years down the line.
862. At the same time, however,
it is encouraging that Bruce, Leong Seng and
IHiS have identified threat hunting as an area that IHiS will move into. Leong
Seng testified that IHiS was looking to setup an Advanced Security Operation Centre (“
ASOC”) which would provide proactive services such as active threat hunting.
863. In light of the foregoing, we recommend that IHiS together with its ASOC evaluate the value of conducting threat hunting in the public healthcare institutions systems presently, and as soon as practicable, move to ensure that threat hunting is regularly carried
out on high value systems, including CII like the SCM system, by an independent third-party service provider with the expertise to do so.