Table of contents exchange of letters with the minister executive summary



Download 5.91 Mb.
View original pdf
Page233/329
Date27.11.2023
Size5.91 Mb.
#62728
1   ...   229   230   231   232   233   234   235   236   ...   329
Report of the COI into the Cyber Attack on SingHealth 10 Jan 2019

COI Report – Part VII
Page 283 of 425

39.1.4
A process must be established to track that vulnerabilities identified in
a vulnerability assessment are addressed
821. The CCoP requires CII owners to establish a process to track and address vulnerabilities identified in a vulnerability assessment and in a penetration test, and validate that all identified vulnerabilities have been adequately addressed. We further recommend that IHiS/SingHealth state clearly as part of the process a) who (organisation/department/team) will have ownership for the respective tasks of drawing up action plans to address the vulnerabilities reviewing and/or approving the action plans implementing the action plans tracking the progress of the action plans validating that the vulnerabilities have been addressed reporting on the progress/status of the action plans and overseeing the process and b) where feasible, what timeframes would be applicable for the respective tasks.
39.2 Safety reviews, evaluation and certification of vendor products
must be carried out where feasible
822. One of the factors that CSA assessed had contributed to the Cyber Attack was that there were signs of insecure coding practices, and it was likely that the attacker had exploited this vulnerability to retrieve the credentials of the AA. account. This incident underscores the importance of ensuring the security of vendor applications and systems which are used by an organisation, particularly where they relate to CII.
823. Indeed, the CCoP provides that the CII owner shall establish processes for validating vendors compliance with cybersecurity requirements in terms of contract (for example, third party review) and product validation.




COI Report – Part VII
Page 284 of 425

39.2.1
Code reviews and safety reviews
824. As part of CSA’s technical recommendations, CSA also recommended that organisations should conduct code review of applications that are installed on critical systems and ensure that such reviews have been performed to their satisfaction. This is to verify that there are no instances of insecure programming or security flaws that may present vulnerabilities or backdoors that could be exploited by cyber attackers. As to how an organisation could go about procuring the conduct of such code reviews, Dan Yock Hau (“Dan”) elaborated in oral testimony on a few options a) As a customer purchasing critical software, the organisation could try to exercise its customer’s rights to see what access it could get to the source code to conduct its own review. b) The organisation could also consider leveraging government reviews/certifications. Dan cited the example of how some companies, e.g. Microsoft, had setup transparency centres in certain countries and allowed governments to, as the proxy/agent at the national level, go through the source code, verify the source code and certify it at the national level so that others could use it. c) Alternatively, the organisation/customer could list down the standards and criteria by which it would have conducted a source code review, and ask the vendor to conduct an internal review based on those criteria and give a declaration that those criteria were met.
825. Dan explained that it was better to verify the application before buying it, and that such verification was an important function to be done during the tender, and before the organisation signed the contract with the vendor rather than to test the application after purchase.



Download 5.91 Mb.

Share with your friends:
1   ...   229   230   231   232   233   234   235   236   ...   329




The database is protected by copyright ©ininet.org 2024
send message

    Main page