Information Week  is running a piece on FDA Checks of Medical Hardware. After some review a NIST  paper quickly jumped into my head and memories of past experiences washed forward. After emailing our handlers alias it seems that a few of us have some direct experience in this matter.
To plug the critical controls  and just about all apply but to highlight:
CC3: Secure Configuration for Hardware and Software 
CC5: Malware Defense 
An interesting point to this is that in some cases if you patch a medical device you can void it's FDA certification. So a cunundrum quickly surfaces; to patch the Windows Embedded "Critical Life Saving Device" or not to patch.
Horror story, report of a fetal monitor crashing along with event correlation tracking a malware infected device on same subnet. Ended up that the fetal monitor had been infected with malware, fortunately it was not in use.
Another interesting confidence builder? "your IV pump is infected, but don't worry, it can't infect any of the *other* patient equipment" ...
There are some clear root causes to the above scenarios and something that is accelerating this is network convergence along with Bring Your Own Device programs. As most things are transported over Ethernet  networks quickly converge for cost savings measures. It becomes more of a challenge to perform proper network segmentation and traffic separation when you converge N services plus X unmanaged devices.
Something we are observing more often are Physical Infrastructure Security systems (e.g. Building Management, Wireless Door lock systems, Camera Infrastructure, etc) being converged onto Ethernet networks that also host data services to users.
We have seen networks that converge, voice (VoIP), Video, Data and iSCSI  and I can tell you that, let alone providing quality of service, it can become high management overhead process to perform network segmentation. The issue arises when cost savings causes decision makers to "Accept Risk" of converged networks and sometimes not fully understanding said risks.
Now, some things we can do in the short term:
- Make complaints to your local or state authority (Here in the U.S. that's the FDA ). Although this diary is U.S. Centric, it is fairly safe to go down the "Slippery Slope"  that a parity of this issue exists in most modern medical institutions.
- Understand what is on your network, apply the critical controls and segment critical infrastructure to mitigate and reduce risk.
- Introduce segmentation controls like Private VLANs.  Firewalls for traffic separation, access control lists  to restrict device communication.
As the cost savings of Ethernet drives network convergence, we have to take low level measures to reduce risk. Remember a VLAN is not secure traffic separation but only a logical traffic separation measure! It's like saying NAT  is a security protocol...
--- ISC Handler On Duty
Keeping the watch from 35,000 Feet, with In-Flight Wifi on US Flight 1507
Apr 26th 2012
|Thread locked Subscribe||
Apr 26th 2012
9 years ago