Table of contents exchange of letters with the minister executive summary



Download 5.91 Mb.
View original pdf
Page73/329
Date27.11.2023
Size5.91 Mb.
#62728
1   ...   69   70   71   72   73   74   75   76   ...   329
Report of the COI into the Cyber Attack on SingHealth 10 Jan 2019

COI Report – Part III
Page 83 of 425

servers as being part of this mission-critical system. Citrix servers were instead viewed simply as a means by which a mission-critical system is accessed, but are not themselves part of that system. This mindset on the lower criticality of the
Citrix servers may have indirectly resulted in the vulnerabilities listed above. In addition, this mindset was expressed in the following two facts as well a) The SGH Citrix servers were not monitored for real-time analysis and alerts of vulnerabilities and issues arising from these servers. b) Vulnerability scanning, which was carried out for mission-critical systems, was not carried out for the SGH Citrix servers. Vulnerability scanning is an inspection of the potential points of exploit on a computer to identify gaps insecurity. In the context of
IHiS, the rules prescribed invulnerability scanning included their internal security policies on issues such as minimum password lengths. Thus, if vulnerability scanning of the SGH Citrix servers had been carried out, the fact that the LA. had a weak password that did not comply with IHiS’ password policies would have been identified. Ina similar vein, the SA. account would have been detected as an unused account.
246. There are also clear indications of poor cyber hygiene and alack of security consciousness on the part of the Citrix administrators. This is clearly seen in examples such as failing to change the password for the LA. account, and the deliberate use of alternative methods to avoid PAM when logging into the Citrix servers. Further examples evincing poor cyber hygiene and alack of security consciousness will be covered in section 15.7 (pg 89) below, where the Committee presents its findings in respect of other weaknesses that were identified in the FY H-Cloud Pen-Test.





COI Report – Part III
Page 84 of 425

Download 5.91 Mb.

Share with your friends:
1   ...   69   70   71   72   73   74   75   76   ...   329




The database is protected by copyright ©ininet.org 2024
send message

    Main page