Table of contents exchange of letters with the minister executive summary



Download 5.91 Mb.
View original pdf
Page273/329
Date27.11.2023
Size5.91 Mb.
#62728
1   ...   269   270   271   272   273   274   275   276   ...   329
Report of the COI into the Cyber Attack on SingHealth 10 Jan 2019

COI Report – Part VII
Page 342 of 425

43.1.3
Risks must be thoughtfully identified and prioritised during each
assessment
992. The HITSPS sets out an IT security risk assessment form containing pre- populated threats/risks. The SingHealth Cluster ISO Wee used the same template in 2016 and 2017 to conduct the risk assessment for the SCM system. No thought was given as to whether the same set of threats/risks listed in the template were applicable (at all, or year on year.
993. We recommend that IHiS/SingHealth should proactively identify the applicable threats/risks for each relevant system at each assessment. Risk assessment forms should not come hard-coded with a set of pre-populated threats/risks, such that the same template of fixed threats/risks are reviewed year on year without further thought. In particular, given what IHiS/SingHealth now know about the attacker’s modus operandi in the Cyber Attack, and given that the healthcare sector maybe subject to other APT attacks in future, the threat/risk areas pertaining to each relevant system should be re-looked and identified taking into account the new knowledge gained. As Vivek said, “the way I recommend
risk management be done is you apply your controls to the attackers modus
operandi and see where you have gaps”.
994. Vivek also proposed rethinking the prevalent practice of using asset classification to prioritise risk. He explained that organisations have to operate within a budget, and that requires prioritising investments based on the risk so as to maximise the benefits derived from the budget. Many factors are considered while assessing risk, and asset classification or asset value is one of them. Most classification models are quite simplistic, in that they mostly ignore the effect of network connectivity between systems. As a result, several systems, and especially endpoints, get classified as low priority assets and consequently receive lesser degree of controls coverage including preventive and detective controls. Attackers know this very well, and exploit it using a simple and highly effective modus operandi involving penetrating lower priority assets which receive less coverage for defensive, preventive and detective controls. Thereafter, attackers would perform lateral movement and privilege escalation. It becomes



Download 5.91 Mb.

Share with your friends:
1   ...   269   270   271   272   273   274   275   276   ...   329




The database is protected by copyright ©ininet.org 2024
send message

    Main page