CISA Releases Comprehensive Mitigation Guide to Fortify Healthcare Cybersecurity

CISA Releases Comprehensive Mitigation Guide to Fortify Healthcare Cybersecurity

By

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has unveiled a crucial mitigation guide aimed at fortifying the cybersecurity defenses of the Healthcare and Public Health (HPH) Sector. The new guidance, a supplement to the HPH Cyber Risk Summary released on July 19, 2023, outlines strategic measures to combat pervasive cyber threats affecting the sector.

Mapping Cybersecurity Goals and Practices

CISA's mitigation guide strategically maps its Cross-Sector Cybersecurity Performance Goals (CPGs) to the 405(d) Health Industry Cybersecurity Practices (HCIP): Managing Threats and Protecting Patients guidance. The latter was jointly published by the Department of Health and Human Services (HHS) and the Health Sector Coordinating Council (HSCC). This alignment serves as a comprehensive approach to bolstering cybersecurity across the HPH sector.

Identifying and Addressing Vulnerabilities

CISA has identified key vulnerabilities and insecure configurations prevalent in the HPH sector, presenting opportunities for threat actors to exploit. The top vulnerabilities include web application vulnerabilities, encryption weaknesses, unsupported software and Windows operating systems, known exploited vulnerabilities, and vulnerable services. These vulnerabilities are often exploited in phishing, ransomware, and denial of service attacks, leading to data breaches.

Three Pillars of Mitigation Strategies

The 25-page guidance document outlines three essential mitigation strategies designed to enhance defenses against common attack vectors:

  1. Asset Management and Security: The guide emphasizes the importance of creating and maintaining a complete inventory of all assets within an organization's network. A comprehensive asset inventory allows healthcare organizations to focus on securing assets, implementing network segmentation, and using demilitarized zones (DMZs) and firewalls to shield assets from unauthorized access.
  2. Identity Management and Device Security: As the HPH sector transitions to online systems, the guide stresses the need for effective identity management and device security controls. Recommendations include focusing on email security, phishing prevention, access management, password policies, data protection, and data loss prevention strategies.
  3. Vulnerability, Patch, and Configuration Management: Proactive scanning for vulnerabilities, assessing and prioritizing threats, mitigating vulnerabilities, verifying addressed vulnerabilities, and continuous improvement of defenses form the core of this strategy. The guidance underscores the importance of implementing security configuration management (SecCM) to identify and address misconfigurations in default system settings.
Urging Secure Practices in Product Development

Beyond recommendations for healthcare organizations, CISA has urged technology manufacturers to adopt secure-by-design principles. This includes embedding necessary security measures throughout a product's entire lifecycle and ensuring that default configurations are secure.

The release of this mitigation guide underscores CISA's commitment to enhancing cybersecurity in the healthcare sector, providing a comprehensive roadmap to address evolving threats and fortify the industry's resilience against cyber attacks.

The GRC Report is the first word in governance, risk, and compliance news. As your trusted source for comprehensive coverage, the GRC Report keeps you informed and equipped to navigate the evolving landscape of governance, risk, and compliance. And remember, the GRC Report isn't just a news source; it's a community of professionals who share your passion for GRC excellence. Don't miss out on our insightful articles and breaking news – join the conversation and empower your GRC journey.