Table of contents exchange of letters with the minister executive summary



Download 5.91 Mb.
View original pdf
Page45/329
Date27.11.2023
Size5.91 Mb.
#62728
1   ...   41   42   43   44   45   46   47   48   ...   329
Report of the COI into the Cyber Attack on SingHealth 10 Jan 2019





COI Report – Part II
Page 45 of 425

12.4 IT security audits
127. IHiS does not have its own internal audit department. Audits, including IT security audits, are carried out by MOHH GIA. Periodically, the GIA would conduct audits on the clusters' network and systems. The team that looks at IT within GIA conducts audits of both CII and non-CII systems.
128. The HITSPS states that independent audits of PHI’s IT systems are to be conducted by the GIA periodically to evaluate and test the adequacy of, and the compliance to prevailing IT security policies and standards.
12.4.1
CII audits on the SCM system
129. Since the SCM system is a CII system, SingHealth as CII owner is to conduct an independent cybersecurity audit of the SCM system at least once every 12 months, with the scope of the audit conducted in accordance with
CSA’s requirements. These results are then to be submitted to Sector Lead CSG, together with mitigation/improvement plan and timeline. GIA would carryout the audit itself, while CSG as Sector Lead would followup on the results to track the progress of action plans for reporting to MOHH management. Further details on CSG’s role in followup are at section 12.5 (pg 46) below.
12.4.2
Audits for non-CII systems and the FY H-Cloud Pen-Test
130. For non-CII systems, the GIA will prepare an audit workplan, with inputs from SingHealth management. These audits are typically conducted by the GIA, although the GIA may contract some audits to external auditors. Findings of these internal audits are reported to SingHealth's Audit Committee, and where risks are highlighted in the audit, will be surfaced to SingHealth's Risk Oversight Committee (“ROC”). The GIA keeps SingHealth updated on audit findings and the status of remediation plans in response to the audit findings, at Audit Progress This requirement has been superceded by the requirements of the Cybersecurity Act, which came into force on 31 August 2018.



Download 5.91 Mb.

Share with your friends:
1   ...   41   42   43   44   45   46   47   48   ...   329




The database is protected by copyright ©ininet.org 2024
send message

    Main page