Table of contents exchange of letters with the minister executive summary



Download 5.91 Mb.
View original pdf
Page312/329
Date27.11.2023
Size5.91 Mb.
#62728
1   ...   308   309   310   311   312   313   314   315   ...   329
Report of the COI into the Cyber Attack on SingHealth 10 Jan 2019

COI Report – Part VII
Page 396 of 425

1151. The Committee notes that IHiS is conducting atrial of a VB solution with a select group of hospital users to ensure smooth usability with minimal disruption to hospital operations. This trial will allow IHiS to study how VB can be deployed effectively, how functions within the healthcare setting where internet access is integral can be identified, and how to minimise impact and disruption on other systems.



COI Report – Part VII
Page 397 of 425

49 RECOMMENDATION #14: INCIDENT RESPONSE PLANS
MUST MORE CLEARLY STATE WHEN AND HOW Ab bSECURITY INCIDENT IS TO BE REPORTED
#VIGILANCE DETECTION #RESPONSE
1152. Employees should be trained on how to respond to security incidents so that they know what to do when an attack occurs. Without an incident response plan, it will be difficult to minimise the damage of a security breach as employees will be left to their own devices. Precious time can be lost trying to figure out what actions to take. Some malware infections spread at lightning speed as was seen in May 2017 with the WannaCry ransomware outbreak, where infections crossed borders and hopped between continents in a matter of hours.
49.1 An incident response plan for IHiS staff must be formulated for
security incidents relating to Cluster systems and assets
1153. As mentioned before, IHiS’ incident reporting processes are set out in the following documents a)
SIRF – translates the requirements of the NCIRF into the context of PHIs; and b)
IR-SOP – cluster-level standard operating procedure for responding to security incidents.
1154. The SIRF is meant primarily fora sector-to-CII level, and it is for the Cluster CIOs and their IT leads to develop lower level processes to comply with its requirements.
1155. In relation to the IR-SOP, the reporting lines in the document begin with the Cluster ISO and GCIO, but there is no established procedure for reporting a security incident to the Cluster ISO or GCIO. There was no written protocol for how IHiS staff were to escalate a matter internally or determine when to report



Download 5.91 Mb.

Share with your friends:
1   ...   308   309   310   311   312   313   314   315   ...   329




The database is protected by copyright ©ininet.org 2024
send message

    Main page