2
Layered Security on Mainstream IT Platforms Brings Better threat protection • Implement a series of different defenses across the device • Defend against advanced persistent threats (APTs), such as Stuxnet Less support burden • Use familiar technologies deployed in networked clients • Minimize effort to determine if a device is compliant Increased scalability • Administer and monitor equipment in a similar fashion • Implement future security solutions consistently across the network This layered security model spans multiple layers: hardware, virtualization, operating system and services software High Stakes: Medical Device Security and Patient Safety Healthcare IT managers know that medical devices, such as infusion pumps, patient monitors, medical tablets and MRI scanners, can be just as susceptible to malware as standard computers. Keeping them secure in any networked environment is certainly challenging, but the stakes are particularly high for these particular applications since they can affect patient care and outcomes. Proving this point, McAfee* and a medical equipment manufacturer recently raised awareness of security holes with potentially life or death consequences; they identified a networked insulin pump with a security flaw that allows the device to be hacked and subsequently administer a potentially lethal amount of insulin to diabetes patients. 1 Although not typically the target of cyber attacks, medical equipment can become “collateral damage” in a malware outbreak, or even be the weak link that opens the door to a cyber attack. Since there isn't a single security solution capable of addressing all future risks, most would agree it's necessary to incorporate threat protection using a series of different defenses across the system. Why Insist on Mainstream IT Platforms One of the challenges facing healthcare IT organizations is managing and securing a large variety of hardware and software systems. Further complicating matters, many equipment manufacturers develop unique security solutions, the result of designing purpose-built solutions based on non-standard or proprietary components. Consequently, it can be difficult to determine if these medical devices comply with today's security policies and will successfully satisfy future requirements through their expected life. Alternatively, why not take advantage of the same proven security technologies used throughout the IT infrastructure? This is possible when medical devices are based on Intel® vPro™ technology delivered on mainstream standard IT platforms, which greatly simplify medical device management and provide state-of-the- art security protection. One example is Intel® Virtualization Technology (Intel® VT), 2 a key ingredient in Intel vPro technology, which isolates applications from malware by running them in secure partitions. A sample configuration is depicted in Figure 1. Intel® Processor with Multi-core & Virtualization Technology Wind River Hypervisor Communication Port Wind River VxWorks* Microsoft* Windows* 7 Virtual Machine 1 Processor Core 1 Processor Core 2 Wind River* Linux* Secure Virtual Machine 2 Safety-Critical Application Virtual Machine 3 Human Machine Interface Figure 1: Virtualization Example

Threat Protection for Medical Devices - Intel · Layered Security on Mainstream IT Platforms Brings Better threat protection • Implement a series of different ... Figure 1: Virtualization

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Threat Protection for Medical Devices - Intel · Layered Security on Mainstream IT Platforms Brings Better threat protection • Implement a series of different ... Figure 1: Virtualization

Layered Security on Mainstream IT Platforms Brings

Better threat protection

• Implementaseriesofdifferentdefensesacrossthedevice

• Defendagainstadvancedpersistentthreats(APTs),suchasStuxnet

Less support burden

• Usefamiliartechnologiesdeployedinnetworkedclients

• Minimizeefforttodetermineifadeviceiscompliant

Increased scalability

• Administerandmonitorequipmentinasimilarfashion

• Implementfuturesecuritysolutionsconsistentlyacrossthenetwork

This layered security model spans multiple layers:

hardware, virtualization, operating system and services

software

High Stakes: Medical Device Security and Patient Safety

HealthcareITmanagersknowthatmedicaldevices,suchasinfusionpumps,patientmonitors,medicaltabletsandMRIscanners,canbejustassusceptibletomalwareasstandardcomputers.Keepingthemsecureinanynetworkedenvironmentiscertainlychallenging,butthestakesareparticularlyhighfortheseparticularapplicationssincetheycanaffectpatientcareandoutcomes.

Provingthispoint,McAfee*andamedicalequipmentmanufacturerrecentlyraisedawarenessofsecurityholeswithpotentiallylifeordeathconsequences;theyidentifiedanetworkedinsulinpumpwithasecurityflawthatallowsthedevicetobehackedandsubsequentlyadministerapotentiallylethalamountofinsulintodiabetespatients.1Althoughnottypicallythetargetofcyberattacks,medicalequipmentcanbecome“collateraldamage”inamalwareoutbreak,orevenbetheweaklinkthatopensthedoortoacyberattack.Sincethereisn'tasinglesecuritysolutioncapableofaddressingallfuturerisks,mostwouldagreeit'snecessarytoincorporatethreatprotectionusingaseriesofdifferentdefensesacrossthesystem.

Why Insist on Mainstream IT PlatformsOneofthechallengesfacinghealthcareITorganizationsismanagingandsecuringalargevarietyofhardwareandsoftwaresystems.Furthercomplicatingmatters,manyequipmentmanufacturersdevelopuniquesecuritysolutions,theresultofdesigningpurpose-builtsolutionsbasedonnon-standardorproprietarycomponents.Consequently,itcanbedifficulttodetermineifthesemedicaldevicescomplywithtoday'ssecuritypoliciesandwillsuccessfullysatisfyfuturerequirementsthroughtheirexpectedlife.

Alternatively,whynottakeadvantageofthesameprovensecuritytechnologiesusedthroughouttheITinfrastructure?ThisispossiblewhenmedicaldevicesarebasedonIntel®vPro™technologydeliveredonmainstreamstandardITplatforms,whichgreatlysimplifymedicaldevicemanagementandprovidestate-of-the-artsecurityprotection.OneexampleisIntel®VirtualizationTechnology(Intel®VT),2akeyingredientinIntelvProtechnology,whichisolatesapplicationsfrommalwarebyrunningtheminsecurepartitions.AsampleconfigurationisdepictedinFigure1.

Intel® Processor with Multi-core & Virtualization Technology

Wind River Hypervisor

Communication

Port

Wind River

VxWorks*

Microsoft*

Windows* 7

Virtual Machine 1

Processor Core 1 Processor Core 2

Wind River*

Linux* Secure

Virtual Machine 2

Safety-Critical

Application

Virtual Machine 3

Human Machine

Interface

Figure1:VirtualizationExample

Threat Protection for Medical Devices

Page 2: Threat Protection for Medical Devices - Intel · Layered Security on Mainstream IT Platforms Brings Better threat protection • Implement a series of different ... Figure 1: Virtualization

2

For More InformationMovingforward,medicaldevicesbasedonmainstreamITplatformscangreatlysimplifysecuritymanagementwhileofferingstate-of-the-artsecurityprotection.Thistopiciscoveredingreaterdetailinthewhitepaperathttp://download.intel.com/embedded/applications/medical/326505.pdf#iid=5871.

TolearnmoreabouthowIntelvProtechnologycanimproveamedicaldevice'ssecurityposture,visitwww.intel.com/vproandwww.intel.com/healthcare.

Defend Against APT-Class Threats

Stuxnet,asophisticatedAPTandcyberweaponthattargetedandsabotagedautomateduraniumenrichmentfacilitiesinIran,changedthescopeandcontextofcontrolsystemcybersecurityforever.Stuxnetraisedthebar—bycombiningstolencertificatesandmultiplezero-dayexploits.

Improvedsecuritymeasuresarerequired,suchaslockingdownmedicaldeviceswithMcAfee*EmbeddedControl*,awhitelistingapplicationthatensuresonlytrustedapplicationsandfilesarepermittedtoexecute,whileallothersareprohibitedfromlaunching.Whitelistingiswell-suitedformedicaldevicesrunningonlyknownsoftware;thepermittedcodeisenumerated,andanyapplicationorfilenotonthelistispreventedfromexecuting.

Robust Virtualization

Virtualizationallowssafety-criticalapplicationstoruninasecurepartitioncalledavirtualmachine.Intel®VirtualizationTechnology(Intel®VT)2,akeyingredientofIntel®vPro™Technology,providesanotherlayerofprotection.WithIntelVT,memoryaddresstablesaresaferbecausetheyaremanagedbythehardware,notthesoftware,makingitfarmoredifficultforavirustomanipulatethem.DeveloperscanimplementvirtualizationusingtheWindRiver*Hypervisor*,whichtakesadvantageofthehardware-assistedvirtualizationfeaturesofIntelVT.

Seven Safeguards for Protecting Medical DevicesInhealthcare,networkedmedicaldevicescanfallvictimtoalltypesofperpetratorsusingawidevarietyofmethods.Thissectionexplorespotentialvulnerabilitiesandsuggestssafeguards,implementedacrosstheplatform,thateitherhelppreventattacksorminimizetheirimpactuntilcorrectiveactionistaken.

Objective 1: Stop unauthorized data copying

PreventconfidentialpatientrecordsfromfallingintothewronghandsbyimplementingMcAfeeDeviceControl*,whichgiveshospitalITorganizationsgranularcontroloverdataprivileges,suchasspecifyingwhatdatacanbecopiedtoexternaldevices.

Objective 2: Prevent untrusted code execution

Stopworms,viruses,spywareandothermalwarefromeverexecutingbyusingawhitelistingapplication,suchasMcAfeeEmbeddedControl*,thatensuresonlyknowncodecanrun.

Objective 3: Interrogate incoming packets

DetectwhenahackerconcealsavirusinspuriouspacketsbyimplementingaWindRiver*orMcAfeefirewallonthedevicethatdiscardsunwantedpacketsandlogspackets,whichcanbeusedtoidentifypotentialmaliciousactionsatalatertime.

Objective 4: Secure data and communications

Prohibitacompromisedmedicaldevicefrombecomingabasefromwhichahackerlaunchesattacksonothersystemsonthenetworkbyusingapassword-basedauthenticationincorporatedintheWindRiverLinux*Securedistribution.

Objective 5: Prevent unintended interactions between applications

MinimizetheharmmalwarecancausebyrestrictingitsaccesstoothersoftwareelementsrunninginsecurepartitionswiththeaddedhardwareprotectionfromIntelVirtualizationTechnology(IntelVT).

Objective 6: Prevent device performance degradation due to poorly functioning code

Don'tletabadlycodedapplicationorapatchconsumecopiousamountsofCPUcyclesandpotentiallyimpactdevicesafety;instead,runcriticalapplicationsonadedicatedCPUcore,thusdeliveringafixedlevelofcomputingresources.

Objective 7: Reduce attack surface

MinimizeexposuretovirusesenteringvianetworkportsbyrunningWindRiverLinuxSecureasagatekeeper–throughwhichallcommunicationswiththemedicaldevicemustpass–creatingaprotectionlayerforotherdevicesoftware.

1 Source: www.reuters.com/article/2011/10/25/us-medtronic-cybersecurity-idUSTRE79O8EP20111025.2 Intel® Virtualization Technology (Intel® VT) requires a computer system with an enabled Intel® processor, BIOS, virtual machine monitor (VMM), and for some uses,

certain platform software enabled for it. Functionality, performance, or other benefits will vary depending on hardware and software configurations and may require a BIOS update. Software applications may not be compatible with all operating systems. Please check with your application vendor.

Copyright © 2012 Intel Corporation. All rights reserved. Intel, the Intel logo, Intel vPro and Intel Core are trademarks of Intel Corporation in the United States and/or other countries.

*Other names and brands may be claimed as the property of others. Printed in USA 0612/LS/TM/PDF Please Recycle 327597-002US