Table of contents exchange of letters with the minister executive summary


Gaps between policy and practice must be addressed



Download 5.91 Mb.
View original pdf
Page198/329
Date27.11.2023
Size5.91 Mb.
#62728
1   ...   194   195   196   197   198   199   200   201   ...   329
Report of the COI into the Cyber Attack on SingHealth 10 Jan 2019
36.1 Gaps between policy and practice must be addressed
684. A comprehensive IT security policy, on its own, serves little purpose. For such a policy to be effective in fact (as opposed to in theory, the practice on the ground must comply with policy. Hence, any gaps between policy and practice must be addressed.
685. As regards the public healthcare sector, Dr Lim Woo Lip (“Dr Lim”)’s opinion is that the existing IT security policy framework appears relatively well- established. However, there are obvious gaps between policy and practice – for example



COI Report – Part VII
Page 236 of 425

(a) Password management policies were not properly implemented b) Incident reporting policies were not followed c) Security hardening policies were not properly implemented (e.g. Remote Desktop Protocol access was not disabled, and there were patching delays and d)
User-ID management policies were not properly implemented (e.g. unused or dormant accounts not disabled.
686. As part of enhancing the public healthcare sector’s security posture, these gaps must be addressed.
687. To achieve this, CE, CSA has recommended “deliberate efforts to
improve training and adherence to SOPs, as well as raising the level of
awareness and cyber hygiene of the healthcare sector’s personnel”. The Committee agrees and recommends the following a) Training and Table Top Exercises (“TTXes”). There should be greater emphasis on training and TTXes for IT staff so as to build familiarity with policy, and to reveal weaknesses and gaps in practice. One of the greatest security assets is an organisation’s own employees, but only if they have been properly trained to comply with security policies and to identify potential security problems.
46
The benefits of training and realistic TTXes will be discussed further in section 38 (pg 269) below, in the context of improving incident response processes. b) Audit and compliance. Regular audits and compliance checks are also important. They help to identify noncompliance, and if
46
Network and System Security (John R. Vacca) (Elsevier Inc, 2010) (“Network and System Security”)
at p.



Download 5.91 Mb.

Share with your friends:
1   ...   194   195   196   197   198   199   200   201   ...   329




The database is protected by copyright ©ininet.org 2024
send message

    Main page