Network Audit and Vulnerability Assessment for a Northern New England-Based Hospital
Prevent unauthorized access to Hospital information systems, with a focus on securing Protected Health Information (PHI).
Review the architecture and security design of connected systems, perform a “digital x-ray” of network devices to locate vulnerabilities, and conduct electronic testing of IT security controls. Identify high-risk areas needing immediate attention in an executive report deliverable. Provide subsequent consulting services to guide remedial efforts, with an emphasis on addressing threats to patient care and potential unauthorized access to PHI.
HOW WE HELPED
We performed a network and vulnerability assessment to ascertain if system configuration deficiencies or well-known exploits existed that could be leveraged to gain unauthorized access to data, including Personal Health Information (PHI), or cause a system disruption that could impact patient care. This was accomplished by running a suite of tools that are designed to collect and test the Hospital network-connected devices for security vulnerabilities, and also evaluate the effectiveness of IT controls. While running our scanning tools against the client-designated network devices, our team performed a detailed review of network-connected device configurations to identify deviations from well-established security practices.
Following the in-depth discovery and analysis process, we compiled the results into a consolidated, management-ready report with a prioritized list of recommendations to address the identified pain points. Meeting with senior management to review our findings, we formulated an action plan to address the serious nature of the issues discovered. Some of the more perilous issues found included potentially unauthorized system access, unsecure network devices with access to PHI, applications that may contain unauthorized software such as malware, and application vulnerabilities that could be leveraged to install ransomware. Without the network and vulnerability assessment, the Hospital would not be aware of these numerous critical and potentially exploitable vulnerabilities.
The engagement deliverables consisted of a collaborative meeting with the Hospital’s senior leadership and security team and a prioritized list of findings and recommendations including the need to:
- Address significant deficiencies in the user account administration process to prevent unauthorized access,
- Improve network device management to prevent data loss,
- Update and test the Disaster Recovery Plan to ensure system recovery objectives can be met, and
- Rectify the patch management process deficiencies to remedy vulnerabilities that could allow unauthorized access or service disruptions.
Our team provided subsequent consulting services to assist the Hospital’s senior leadership and security team expedite the mitigation of the critical, potentially exploitable vulnerabilities. This work included the development and implementation of a multi-departmental process to grant, remove, and periodically review user accounts and permissions that substantially reduced the risk of unauthorized access. The assessment’s detailed findings are also driving numerous other process and network security improvements that serve to attenuate risk and vulnerability across the enterprise.
Disclaimer of Liability: This publication is intended to provide general information to our clients and friends. It does not constitute accounting, tax, investment, or legal advice; nor is it intended to convey a thorough treatment of the subject matter.