Table of contents exchange of letters with the minister executive summary



Download 5.91 Mb.
View original pdf
Page298/329
Date27.11.2023
Size5.91 Mb.
#62728
1   ...   294   295   296   297   298   299   300   301   ...   329
Report of the COI into the Cyber Attack on SingHealth 10 Jan 2019

COI Report – Part VII
Page 376 of 425

1095. In general, this prioritisation should be based on the following criteria ab Threatb – A threat is any potential direct danger to information systems, or software that is exposed to a higher degree of risk (e.g.
by virtue of its exposure to the internet. Examples of systems facing high threat levels are web servers, email servers and applications, and servers containing sensitive information. Special focus must be placed on patching of email applications, as email attacks are now the most common vector for initial intrusions into systems.
104
Indeed, in this case, CSA’s hypothesis is that the initial infection originated from a phishing email. b)
Vulnerability – A vulnerability signifies the absence of, or a weakness in, a safeguard which could be exploited by an attacker. It could be outdated software which is less secure etc. c)
Criticality – This is a measure of how important or valuable a system is to operations. For example, database servers and network infrastructure would be considered more critical to operations.
1096. Systems facing more threats, or that are more vulnerable, or are mission- critical should be accorded a higher priority in the patch management process.
MOH family’s view is that patching should be carried out comprehensively for all assets connected to the network, in a manner which poses the least cybersecurity exposure.
105
Should a patch be assessed to be less urgent or critical, steps should betaken to mitigate any exposure before the patch is deployed. In general SANS Institute, Securing Against the Most Common Vectors of Cyber Attacks, SANS Institute Reading Room, August 2017. This section maps to CIS Control 3 Continuous Vulnerability Management and CIS Control 8 Malware Defences. Comprehensive patching of all assets connected to the network greatly mitigates the risk associated with unpatched machines.



Download 5.91 Mb.

Share with your friends:
1   ...   294   295   296   297   298   299   300   301   ...   329




The database is protected by copyright ©ininet.org 2024
send message

    Main page