1
Analyzing Risk in Connected Medical Device s Healthcare delivery organizations (HDOs) are dealing with increased risk due to skyrocketing numbers and types of interconnected devices, lack of network segmentation, unsupported OSes and insecure protocols. In addition, cybercriminals are discovering new ways to compromise devices and networks, as well as monetize patient data. It’s no wonder cyberattacks are on the rise. IT CLINICAL MAIL SERVER COMPUTER ON WHEELS IMAGING EQUIPMENT INFUSION PUMPS PATIENT MONITORING WORKSTATION MONITORING EQUIPMENT PACS PHI PC VULNERABILITY SCANNER SIEM EXTERNAL THREATS Cybercriminals or criminal organizations usually try to reap money from cyberattacks, either directly via ransomware and cryptomining or indirectly by selling stolen information or access to infected computers with botnets. INTERNAL THREATS, VENDOR & CONTRACTOR ACCESS HDOs aren’t just running emergency rooms and surgical clinics – they’re running remote access VPNs for vendor support and back offices that require common (yet privileged) workstations. These open the network to the possibility of internal attacks, which may have a financial motivation or other goals such as sabotage. LEGACY SYSTEMS, IMPROPERLY SECURED EQUIPMENT & DEFAULT PASSWORDS Many medical devices are legacy systems that cannot be patched due to availability or certification requirements. Limited/No Visibility into Clinical Network Internal Threats Legacy Systems Default Passwords Improperly Secured Equipment Outdated Inventory Proprietory protocols, no configuration tracking, vendor and contractor access Percentage of U.S. hospitals reporting a significant security incident in 2018 or 2019. Percentage of VLANs with at least one healthcare device also have non-healthcare IoT devices. Architecture of a Typical Healthcare Network HDOs contain an average of 20,000 devices, including IT, IoMT, IoT and OT devices. 82% LACK OF PROPER SEGMENTATION A broad range of IT, IoMT, IoT and OT devices are increasingly communicating on interconnected networks with minimal oversight A mix of personal and medical devices are often located on the same network segments Many medical devices use default credentials, making them the weak links in the network THE IMPORTANCE OF VISIBILITY Cybersecurity for medical devices will be problematic for the next 20 years, and visibility is the key to improvement. BEYOND VISIBILITY AND CONTROL: SECURITY AUTOMATION & ORCHESTRATION Forrester defines visibility and analytics as the foundational prerequisites for Zero Trust and suggests that Zero Trust architecture can reduce an organization’s risk exposure by 37% while reducing security costs by 31%. 2 NETWORK SEGMENTATION: A FUNDAMENTAL CONTROL Gartner analysts suggest enterprises that isolate/segment their campus network devices will experience 25% fewer successful cyberattacks. 1 UNSUPPORTED OSes Devices running vulnerable, unsupported OSes remain constant at .4%, yet these devices are often life-saving systems Of VLANs with at least one healthcare device, 60% also have non-healthcare IoT devices, and 90% have IT devices with potentially vulnerable software or targeted malware USE OF INSECURE PROTOCOLS Insecure protocols and communications between public and private IP addresses exchange medical information in clear text Potential Threats Reducing Risk: Key Takeaways 90% 60% + FEWER ATTACKS 25 % DEVICE VULNERABILITY RISK EXPOSURE 37 % COST REDUCED 31 % 1 Gartner, Segmentation or Isolation: Implementing Best Practices for Connecting ‘All’ Devices, 26 September 2019 2 Forrester, Adopt Next-Gen Access To Power Your Zero Trust Strategy, July 2018 Don’t just see it. Secure it. TM BY FORESCOUT RESEARCH LABS © 2020 Forescout Technologies, Inc. All rights reserved. Forescout Technologies, Inc. is a Delaware corporation. A list of our trademarks and patents is available at https://www.forescout.com/company/legal/intellectual-property-patents-trademarks. Other brands, products, or service names may be trademarks or service marks of their respective owners. Version 10_20. Get the full report at forescout.com/connected-medical-device-security-report External Threat

Analyzing Risk in Connected Medical Device Security

  • Upload
    others

  • View
    3

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Analyzing Risk in Connected Medical Device Security

Analyzing Riskin Connected Medical DevicesHealthcare delivery organizations (HDOs) are dealing with increased risk due to skyrocketing numbers and types of interconnected devices, lack of network segmentation, unsupported OSes and insecure protocols. In addition, cybercriminals are discovering new ways to compromise devices and networks, as well as monetize patient data.

It’s no wonder cyberattacks are on the rise.

IT

CLINICAL

MAI L SERVER

COMPUTERON WHEELS

IMAGING EQUIPMENT

INFUSIONPUMPS

PATIENTMONITORING

WORKSTATION MONITORINGEQUIPMENT

PACS PHI

PC VULNERABILITYSCANNER

SIEM

EXTERNAL THREATS

Cybercriminals or criminal organizations usually try to reap money from cyberattacks, either directly via

ransomware and cryptomining or indirectly by selling stolen information or access to infected computers with botnets.

INTERNAL THREATS, VENDOR &CONTRACTOR ACCESS

HDOs aren’t just running emergency rooms and surgical clinics – they’re running remote access VPNs for vendor support and back o�ces that require common (yetprivileged) workstations. These open the network to the possibility of internal attacks, which may have afinancial motivation or other goals such as sabotage.

LEGACY SYSTEMS, IMPROPERLY SECUREDEQUIPMENT & DEFAULT PASSWORDS

Many medical devices are legacy systems that cannot be patched due to availability or certification requirements.

Limited/No Visibilityinto Clinical Network

Internal Threats

Legacy Systems

Default Passwords

Improperly Secured Equipment

Outdated Inventory

Proprietory protocols,no configuration

tracking, vendor and contractor access

Percentage of U.S. hospitals reporting asignificant security incident in 2018 or 2019.

Percentage of VLANs with atleast one healthcare device alsohave non-healthcare IoT devices.

Architecture of aTypical Healthcare Network

HDOs contain an average of 20,000 devices,including IT, IoMT, IoT and OT devices.

82%

LACK OF PROPER SEGMENTATION

• A broad range of IT, IoMT, IoT and OT devicesare increasingly communicating on interconnectednetworks with minimal oversight

• A mix of personal and medical devices are oftenlocated on the same network segments

• Many medical devices use default credentials,making them the weak links in the network

THE IMPORTANCE OF VISIBILITY

Cybersecurity for medical devices will beproblematic for the next 20 years, andvisibility is the key to improvement.

BEYOND VISIBILITY AND CONTROL: SECURITY AUTOMATION & ORCHESTRATION

Forrester defines visibility and analytics as the foundational prerequisites for Zero Trust and suggests thatZero Trust architecture can reduce an organization’s risk exposure by 37% while reducing security costs by 31%.2

NETWORK SEGMENTATION: A FUNDAMENTAL CONTROL

Gartner analysts suggest enterprises that isolate/segmenttheir campus network devices will experience 25%fewer successful cyberattacks.1

UNSUPPORTED OSes

• Devices running vulnerable, unsupported OSesremain constant at .4%, yet these devices areoften life-saving systems

• Of VLANs with at least one healthcare device,60% also have non-healthcare IoT devices, and90% have IT devices with potentially vulnerablesoftware or targeted malware

USE OF INSECURE PROTOCOLS

• Insecure protocols and communicationsbetween public and private IP addressesexchange medical information in clear text

Potential Threats

Reducing Risk: Key Takeaways

Get the full report at forescout.com

90%

60%

+FEWERATTACKS

25%

DEVICE VULNERABILITY

RISK EXPOSURE37%

COST REDUCED31%

Reducing Risk: Key Takeaways

1 Gartner, Segmentation or Isolation: Implementing Best Practices for Connecting ‘All’ Devices, 26 September 2019 2 Forrester, Adopt Next-Gen Access To Power Your Zero Trust Strategy, July 2018

Don’t just see it. Secure it.™

TM

BY FORESCOUT RESEARCH LABS

© 2020 Forescout Technologies, Inc. All rights reserved. Forescout Technologies, Inc. is a Delaware corporation. A list of our trademarks and patentsis available at https://www.forescout.com/company/legal/intellectual-property-patents-trademarks. Other brands, products, or service names may betrademarks or service marks of their respective owners. Version 10_20.

Get the full report at forescout.com/connected-medical-device-security-report

External Threat