Table of contents exchange of letters with the minister executive summary



Download 5.91 Mb.
View original pdf
Page210/329
Date27.11.2023
Size5.91 Mb.
#62728
1   ...   206   207   208   209   210   211   212   213   ...   329
Report of the COI into the Cyber Attack on SingHealth 10 Jan 2019

COI Report – Part VII
Page 252 of 425

723. The Committee recognises that at the time of the Cyber Attack, IHiS had in place a range of enterprise-level security technologies including a) preventive measures for endpoints, servers, network security, and applications and b) detection measures such as continuous, real time monitoring.
724. Broadly speaking, IHiS had put in place a first line of defence to protect the “perimeter”,
54
and several other common necessities such as antivirus and anti-malware systems, intrusion detection/prevention systems, and a SIEM security information and event management) system.
725. However, as demonstrated in the Cyber Attack, there were gaps in the security framework which allowed the attacker to more easily enter the network, traverse and compromise wide-ranging systems, and make off with the crown jewels. The following measures address the aforementioned gaps.
37.2 Gaps in response technologies must be filled by acquiring
endpoint and network forensics capabilities
726. While Leong Seng’s evidence has addressed the technological measures in place to support prevention and detection measures, the silence in relation to technological systems in place to support the response to a cyber attack is telling.
IHiS does not have such technological support in place. The Response Measures he has informed the Committee of relate only to processes.
37.2.1
Endpoint forensics
727. There is no enterprise-level forensics platform in place – IHiS uses only open source software for its forensics. These tools require IT security staff to The perimeter is the outer wall or the (logical) borderline around an organisation’s infrastructure and network, which separates it from an untrusted network such as the Internet.



COI Report – Part VII
Page 253 of 425

physically go to individual machines to image them, or to take memory dumps – this is a process that simply takes too long, according to Vivek, and valuable time is lost in responding to a security incident.
728. In any event, even with the use of the open source forensics software, IHiS had no dedicated and suitably-equipped computers to run the desktop-based forensic software Benjamin in fact used his personal laptop when running the software during forensic investigations.
This being the only computer that could be used to carryout forensic investigations, the processing of digital forensic evidence required a painfully long amount of time.
729. The gap in the response technologies available at IHiS undoubtedly hampered the response to the Cyber Attack, and their ability to limit the impact of the Cyber Attack.
730. We recommend the implementation of a centralised enterprise-level forensics platform for collection and analysis of digital evidence. Features of such a system would include a) degree visibility across all endpoints b) Remote collection of forensic artefacts and c) An ability to search and collect forensic evidence across multiple devices concurrently.
731. In the case of the Cyber Attack, the IHiS SMD did not have access to an endpoint detection and response (“EDR”) system
55
that would have allowed rapid isolation and containment of the infected systems, and enabled the rapid
collection of forensic evidence from multiple systems at the same time. Vivek testified that an EDR system would have allowed the team to fast-track the See section 37.3 below for further elaboration on EDR systems.



Download 5.91 Mb.

Share with your friends:
1   ...   206   207   208   209   210   211   212   213   ...   329




The database is protected by copyright ©ininet.org 2024
send message

    Main page