Improving Cyber Security in the NHS - Imperial College London
←
→
Page content transcription
If your browser does not render page correctly, please read the page content below
Improving Cyber Security in the NHS Saira Ghafur Gianluca Fontana Guy Martin Emilia Grass Jonathan Goodman Ara Darzi
Contents Page 1. Executive summary 4 2. Introduction 6 3. What does cyber security entail? 7 4. What makes the health sector particularly vulnerable? 10 5. NHS cyber security accountabilities 12 6. Emerging challenges 18 7. Key practice priorities 26 8. Research priorities 30 9. Summary 32 10. References 33 2 1
Foreword Advisory Board The last few years have seen a surge of new digital Imperial College London has established a new technologies being used in healthcare, and as a interdisciplinary collaboration for cyber security in consequence, ever-larger quantities of data are being healthcare between the Institute of Global Health generated. With this digital evolution comes a wealth Innovation (IGHI) and the Institute of Security Science of opportunities to improve the health and care of and Technology (ISST). This collaboration will serve as patients, and to prevent, cure and manage illness. Over a leading hub for translational research in cyber security the past century, health system leaders have progressed for healthcare, both in the UK and globally and will aim toward these goals, aided by significant advances in to provide a powerful engine to support the incubation science and technology: new vaccines, medicines and and transformation of research through academic Professor Chris Hankin, Co-Director of the Professor Nick Jennings CB FREng, Vice-Provost surgical techniques; technologies, such as excellence, aligned objectives, funding and resources. Institute for Security Science and Technology, (Research and Enterprise), Imperial College London telehealthcare, which can dramatically improve access, Imperial College London Professor Nick Jennings, CB FREng, is responsible for and analytics to better measure the costs and variations This report identifies some key insights for the UK health Professor Hankin’s research is in theoretical computer promoting, supporting and facilitating Imperial College of care provision. These factors contribute to and care sector to consider for future cyber security science, cyber security and data analytics. He leads London’s research performance and for leading on improvements in life expectancy across the globe. practices, policies and protocols; this includes multidisciplinary projects focused on developing the delivery of the Research and Enterprise Strategy. increased investment, improved governance and advanced visual analytics and providing better decision He also holds a chair in Artificial Intelligence in the However, there are also enormous risks. The NHS holds greater accountability, which are essential to protect support to defend against cyber attacks for both Departments of Computing and Electrical and Electronic large amounts of sensitive and valuable data in the NHS from future attacks. enterprise systems and industrial control systems. He Engineering. Before joining Imperial College London, vulnerable systems. Effective cyber security is not just is Director of the UK’s Research Institute on Trustworthy Professor Jennings was Regius Professor of Computer about protecting data, it is fundamental for maintaining I would like to take the opportunity to thank all those Inter-connected Cyber-physical Systems (RITICS). He Science at the University of Southampton and the UK the safety, privacy and trust of patients. The global who have contributed to the production of this report, is Chair of the UK’s Academic Resilience and Security Government’s Chief Scientific Advisor for National cyber attack, WannaCry, in 2017 compromised IT across with a special thanks to our advisory board who have Community (Academic RiSC) and sits on the ministerial Security. Professor Jennings is an internationally- the NHS, starkly demonstrating the vulnerability of in-depth knowledge across academia, industry, oversight group of the Security and Resilience Growth recognised authority in the areas of artificial intelligence, the NHS. There is no quicker way of undermining the healthcare and government. Partnership. He is Chair of the Association for autonomous systems, cyber security and agent-based public’s trust than by allowing essential systems to Computing Machinery (ACM) Europe Council. He computing. be compromised or personal data to be lost. is also a member of the ACM Publications Board. Rachel Dunscombe, CEO of the NHS Digital Cal Leeming, Founder & CEO, River Oakfield Academy and a strategic advisor for Salford Royal Cal Leeming is a cyber security expert and co-founder NHS Foundation Trust of several startups, including The Zebra and PixelMags, Rachel additionally works with KLAS Research building and recently appointed to the Healthcare Cyber security a rigorous evidence base for success factors in the Advisory Board for Imperial College London. The story implementation of digital health and care solutions. behind Cal’s journey is remarkable. After a nefarious start As part of her role at Salford Group she has delivered the where his natural curiosity and obsession to understand Global Digital Exemplar and two NHS Vanguards. She is how things work led him astray, he was caught hacking at also an Ambassador for the ECHAlliance / Digital Health the age of 12, making him the youngest child ever to be Society and an ambassador for CHIME, the professional prosecuted under the Computer Misuse Act in the UK. body for global healthcare CIOs. She currently holds Now in his early 30s, Cal’s ingenuity and ambition have a Visiting Professorship at Imperial College London and earned him the reputation of a trusted industry icon. is a certified CHCIO - a US healthcare CIO certification. Professor the Lord Darzi of Denham OM KBE PC FRS 2 3
1 Executive summary Ineffective cyber security is a clear and present danger Technology is expected to “transform” the NHS. to patient safety in the UK and worldwide. As the recent Innovations like the increased use of artificial WannaCry attack on the NHS showed, cyber incidents intelligence, cloud computing and connected devices can significantly disrupt health and care systems and can support more effective care. However, as healthcare directly contribute to patient harm. The NHS was found relies more on technology, the risk of cyber disruption to be vulnerable and not adequately prepared to respond, will also significantly increase, unless appropriate with limited capability and uncertain accountability for actions are taken. In addition, cyber attackers are cyber security. In the future, the threat and becoming more sophisticated and focused on the consequences will inevitably grow due to an increased health sector. reliance on technology in healthcare, and evolution in the motivation and sophistication of malign actors. Key Insights 1. A culture of risk awareness and good cyber security 6. The mapping of interdepencies across the IT needs to be embedded across the NHS and this needs landscape and the consequences of shared to be effectively communicated to the public. infrastructure in the face of a cyber attack need to be better understood. There is a need to effectively model the impact of IT incidents across local, regional and national systems. 2. The oversight and governance of cyber security and 7. A mandated framework for cyber security should be risk needs to be streamlined and simplified. further developed, tested and implemented along with operational resilience testing and assurance in the While WannaCry was a wide-ranging attack that In examining the opportunities, threats and challenges healthcare sector. happened to impact health systems including the NHS, of emerging technologies in the context of cyber in 2018 hackers specifically targeted the Singapore security, this report aims to identify some of the actions healthcare group SingHealth and stole the information that can and should be taken at the policy and research 3. An approach to developing sustainable minimum 8. The infrastructure required for interconnected of 1.5 million patients. In addition, WannaCry blocked level now and in the near term in order to ensure they cyber security standards is needed for the design, build networks needs to be better understood to ensure access to NHS systems, but was very visible. The threat are successfully exploited. and procurement of medical devices. the healthcare system is secure at scale. to patients would have been even bigger if data had been subtly manipulated, for example changing a Addressing the future threat effectively will require patient’s blood type in the Electronic Health Record, appropriate actions to decrease vulnerability and without being detected. This highlights that any cyber improve resilience in the event of an attack. 4. Research is needed into the development of future 9. Research into a better understanding of how and with attack in healthcare is a threat to patient safety. data architectures that allow permeable boundaries what speed attacks propagate is needed order to design It is critical to understand and manage the underlying of access and control to meet the specific context of time-relevant responses. risk factors, by addressing unclear governance, healthcare; the need to widen access whilst putting vulnerable security architectures and modifying in place features to restrict the ability of cyber damage cultures and behaviours that lead to increased risk. to propagate. It is also vital to take preventative action in order to reduce the risk of an attack being successful. 5. The NHS Digital Data Security programme needs to 10. Cyber security attacks need to be viewed as a be expanded and appropriately resourced to provide fundamental threat to patient safety and not just an a single strategic cyber forum. IT issue. 4 5
2 3 Introduction What does cyber security entail? Emerging technology has the potential to transform Prior to this, there were already well-publicised and healthcare. Artificial intelligence will make it possible to alarming examples of cyber attacks targeting healthcare accurately diagnose complex conditions with economy organisations, such as the Anthem Insurance hack in at scale and speed; networked devices will allow the 2015, which has cost over $100 million in settlements remote monitoring and dosage of drugs; the and much more in costs to date after 79 million records proliferation of wearable devices will allow patients to were breached, or the ransomware attack on the augment their health records with “pattern of life” data; Hollywood Presbyterian Medical Centre in 2016 which robotic surgery will replace the conventional variety for cost $17,000 in Bitcoin payment to bring to an end, many procedures, and improved communications will having effectively shut down the hospital for many drastically reduce the need for patients to travel long days.2,3 More recently, in 2018, SingHealth, the largest distances for consultations. healthcare provider in Singapore, suffered a cyber attack which resulted in the breach of 1.5 million Given the well-reported pressure on health services, records.4 every effort should be made to harvest the benefits that technology can bring, but in order to do this it Healthcare is one of the most frequently targeted is essential that it be done not only safely, but also sectors by hackers, in part because security among securely with the understanding that technology particular institutions is variable and because private is not safe unless it is secure. health data can be valuable on the dark web.2,5 Given the size of the population the NHS serves, major breaches In recent years, the number and severity of cyber represent a significant threat. attacks against healthcare systems and hospitals has increased significantly, compromising the health Cyber attacks can also have a significant impact on information of millions of people. In May 2017, the patient safety. As modern technology has become WannaCry ransomware programme encrypted data indispensable in healthcare operations, the and files on 230,000 computers in 150 countries and vulnerabilities to cyber threats are increasing devastated the NHS.1 Key systems were blocked, exponentially. This can happen a number of ways: preventing staff from accessing patient data and critical data can be stolen; data may be deleted or, even worse, services; thousands of appointments and surgeries corrupted in a way that is not obvious until years later; The UK’s National Cyber Security Centre (NCSC) defines A moving target were cancelled, necessitating, in some cases, care medical devices such as magnetic resonance imaging cyber security as how individuals and organisations diversion to other hospitals. (MRI) scanners, computed tomography (CT) scanners, reduce the risk of cyber attack from malicious attempts As the types of attacks launched in cyberspace have or implantable cardiac defibrillators can be hacked, to damage, disrupt or gain unauthorised access to become more sophisticated, the terminology has in The WannaCry attack was not, however, targeted at causing direct harm to patients. Maintaining the security computer systems, networks or devices, via cyber turn become more complex in an effort to account for the NHS, though it was allegedly state-sponsored. Other of healthcare is not only vital to ensure the safety of means.6 While this definition is largely comprehensive the changing nature of attacks and the varieties of major organisations were affected, including: patients, but also to maintain their trust in those given how cyber security is practiced today, the world interfaces and networks that require protection. In Telefonica, FedEx, Nissan, Russian Railways, and the securing their health. of information technology has and continues to evolve. healthcare, while data privacy and its associated Bank of China. Yet the biggest impact was undoubtedly As technology changes and what counts as ‘cyber’ security risks are a crucial issue that governments and felt by the NHS. As health systems worldwide watched Notwithstanding the ongoing strategies to tackle cyber becomes broader, defining cyber security, and the members of the public focus on, medical device security on, it became apparent how vulnerable healthcare is to security within the NHS, the current healthcare growing number of terms that fall into cyber security is an under-appreciated issue that may become a any cyber threat. landscape makes the attainment of a cyber secure studies, will become increasingly difficult. pressing concern in the coming years.7 future challenging. Healthcare networks are vulnerable as cyber security has not been prioritised as part of The salient issue in cyber security is, however, always The increasing complexity of the subject does not, corporate strategy and investment. Current governance protection from different modes of undesirable or however, preclude the categorisation and classification of medical technology is orientated towards clinical unpermitted access, but as more systems and devices of important aspects. Indeed, any discussion of cyber safety despite increased device connectivity. This become reliant on increasingly complex digital security ‘necessarily shifts to contexts and conditions complex governance structure is further complicated by technologies the potential for exploitation will rise. that determine the process by which key actors the plethora of legacy infrastructure and practice Our goal in this section is to discuss what qualifies as subjectively arrive at a shared understanding of how throughout the healthcare sector. a cyber security incident, and to describe the varying to conceptualise and ultimately respond to a security types of cyber security incidents currently seen across threat.’7 While offering a comprehensive definition for industries and their effectiveness. each aspect of cyber security may be akin to hitting a moving target given that technologies and incidents are always changing and new threats emerging, the critical notions of protection should remain constant. 6 7
Types of breaches These sources and causes of cyber incidents are logically distinct, though there is often overlap among Table 1: Common terms relevant to cyber security 9,10 Table 1 gives common types of cyber security breaches. them: with social engineering, for example, the A group of primary distinctions should, however, be malicious intent of an individual or group may overlap Credential reuse Download attack something that will allow the made among them, which is set out in Figure 1. While with the accidental contributions of a well-intentioned This type of attack relies as much on The unintentional installation of attacker to do something the user breaches often have identical or similar consequences user. An individual may similarly exploit a cyber security a malicious hacker’s intentions and malicious software or virus onto a may not be aware of such as stealing for the system affected, i.e. the loss of data, loss of system with the backing of a political group. abilities as it does on the frequency device without the user’s knowledge credentials or installing malware. control or access to the system, and so forth, the causes with which users use identical or consent. May also be known of those breaches vary significantly, both in source and Regardless of the type of attack or the intention of the passwords when logging on to as a drive-by download. Ransomware intent. Distinguishing between causes, sources, and individual causing the data loss, cyber security different websites. If one website’s Malicious software that makes data intentions of the actor directly causing the breach can measures involve protection of data and the prevention database containing user logon Exploit or systems unusable until the victim help to predict and prevent future breaches, either of unauthorised access, whatever its cause. The credentials are leaked, hackers May refer to software or data that makes a payment. through technological or behavioural interventions. purpose of cyber security protocols are therefore to attempt to use this information, takes advantage of a vulnerability prevent and minimise the damage from all types of which usually appears on the dark in a system to cause unintended Session hijacking This is not an exhaustive list, and other, more innovative breaches. Awareness about how breaches occur, and web, to access user data from other consequences. In this case, a malicious hacker takes forms of malicious attack will undoubtedly become how malicious attacks are changing with the advent of websites. For example, if all control of communication between more common over the coming years. The key new technologies, is necessary for doing so. credentials for a badly protected Human error a user and server, enabling him/her distinctions among these terms — and probably among gaming forum are stolen, hackers From forgetting to log off a public to steal the data flowing between all possible varieties of cyber breach — is in the source will use these usernames and machine to forgetting USB drives the two parties. and/or cause. Figure 1 portrays these distinctions, which passwords to try to log on to banking on the bus, human error accounts rest on whether a breach is intentional or accidental, websites with the same details. for an enormous amount of data loss Smishing state-sponsored or amateur. per year. Fifty-three percent of all Phishing via SMS: mass text Cross-site scripting cases of data loss may be due to messages sent to users asking In this type of attack, a malicious mistakes or neglect on the part for sensitive information (e.g. bank hacker targets a specific website’s of the healthcare organisation details) or encouraging them to visit users by injecting a legitimate in question.8 a fake website. website’s content with code that can infect users’ browsers. Any Malware Social engineering information the user communicates One of the most common sources of Manipulating people into carrying through the website is then breach, malware is an amalgamation out specific actions, or divulging funnelled directly to the hacker. of ‘malicious’ and ‘software.’ information, that are of use to an Malware can be used to steal data, attacker. Cyber attack monitor machine usage, or control Malicious attempts to damage, devices, but almost always requires Spear-phishing disrupt or gain unauthorised access that an authorised user, mistakenly A more targeted form of phishing, Figure 1: Root causes of cyber incidents to computer systems, networks or otherwise, installs the where the email is designed to look or devices, via cyber means. programme onto his or her machine. like it’s from a person the recipient knows and/or trusts. Individual Accidental Denial of service Pharming An amateur hacker exploits a system The cyber incident is the result of While this type of attack does not An attack on network infrastructure SQL injection attack without the backing of a government, negligence or mistake, without reference lead directly to loss of data, it can that results in a user being This type of attack specifically hacking rganisaion, or political faction. to any malicious intent or larger agenda. disable users from accessing the redirected to an illegitimate website targets databases built using the page; when financial institutions, despite the user having entered the SQL programming language. In this for example, are targeted, this type correct address. case, a malicious hacker may breach Cyber Incidents of attack has the potential to the database through the language damage a country’s economy. Phishing the database is built with; this can Malicious Group or state Phishing is a particular type of email lead the database to reveal The incident in question results from an A group of agents exploit a system Dictionary attack scam, whereby victims are targeted information contained within it intent to exploit the system for any for political or economic reasons. A type of brute force attack in which from seemingly genuine persons or to unauthorised users. reason. the attacker uses known dictionary services, with the aim of tricking the words, phrases or common recipient into either providing Sources: National Cyber Security Centre, UK, and passwords as their guesses. personal details or clicking on NHS Digital; ‘human error’ is an original definition. 8 9
4 What makes the health sector particularly vulnerable? Data Guardian’s 10 data security standards, no detailed to support the delivery of care, whilst the use of Summary Points specifications are provided. temporary staff increases the inherent challenges of tracking and monitoring access and use of systems ● Investments to cyber ● Outdated and ● Inefficient incident ● Complex structures Therefore, it is not unusual that old software is used as and data. security are unsupported IT response capabilities hinder fast and efficient long as it is regularly patched or not connected. In fact, not given priority infrastructures and exist due to lack of responsiveness in the all 80 NHS organisations that were affected by Employee behaviour is a crucial aspect of healthcare medical devices increase cyber security face of a cyber attack WannaCry had failed to apply the Microsoft update cyber security that is frequently overlooked. Easy access ● Untrained staff constitute NHS vulnerabilities specialists patch that had been recommended by NHS Digital.15 to the most personal aspects of a patient’s life means (unintentional) internal that the potential for malicious activity is ever-present, threats Although important steps are being taken to resolve particularly if data belongs to high-profile patients. these issues, much work remains to be done. Without There are publicised examples of such behaviours accurate asset inventories of what is on a network, of staff being disciplined and hospitals fined following Healthcare is one of the most frequently targeted sectors by hackers, in part because security among The competing demands of organisations will face the challenge of not being able to patch that which they don’t know exists. To date, no inappropriately accessing and sometimes leaking the medical records of celebrities.17-18 institutions is variable and because private health data investing in IT and direct patient care catalogue exists to systematically list all software and can be valuable on the dark web.2,5 Given the size of the There has been chronic underinvestment in healthcare hardware deployed within the NHS. This leads to a Currently, it is mandatory for all NHS staff members population the NHS serves, major breaches, such as IT, especially compared with other market sectors; NHS severe lack of visibility of NHS vulnerabilities. Hence, to complete online training on information governance 2017’s WannaCry attack, represent a significant threat. organisations spend only 1-2% of running costs on IT it is not easily possible to evaluate the NHS’s resilience (including cyber security), though recent evidence services compared with 4-10% elsewhere.14 To embed a against cyber attacks. suggests that only 12% of trusts reached the NHS Digital The scale and availability security culture, there needs to be progressive target of 95% compliance.15 requirements for sensitive data investment in IT and an economic impact assessment Skills and capability to understand what is working. With limited budgets, Hiring trained cyber security staff is difficult for the Highly complicated governance As other sectors aim to limit access to data, the nature health systems are faced with difficult choices in NHS, as it is unable to compete with commercial of healthcare and its sheer scale dictates that patient allocating resources, and cyber security investment is salaries. In December 2018, about 1.5 years after structures records need to be available to multiple staff members often not a priority when organisations struggle to meet WannaCry, a Redscan freedom of information (FOI) The NHS, like all other health systems, is a complex and now to patients as well. The personal and financial minimum requirements for IT provision. This is often request showed that as much as 25% of NHS trusts behemoth of many organisations that provide information included in medical records not only seen as a trade-off in all sectors, though the potential had no employees with cyber security qualifications.15 leadership and governance for services across the contains some of the most sensitive aspects of a consequences for healthcare, both economic and in It also highlighted that among trusts with 3000 to board. The oversight for cyber security is led by the person’s life, but may also be as valuable on the dark terms of patient safety, may be catastrophic. 4000 employees annual cyber security training DHSC and different accountabilities have been assigned web as credit card data, making records attractive expenditure may be as little as £500. Financing to the Arm’s Length Bodies (ALBs; see Figure 2). targets to malicious hackers.11,12 Recent cyber incidents While the UK government has invested heavily in cyber shortages also reputedly make it difficult for the NHS in the healthcare industry showcase this: in 2015, 78 security measures, a year after WannaCry none of the to hire competent cyber security personnel given the One main problem is the lack of clarity and transparency million records were stolen from the Anthem Blue Cross 200 NHS hospitals inspected by the Care Quality large pay gaps between public sector and private leading to partly overlapping competencies. Such Insurance System in the United States, and over 1.5 Commission and NHS Digital met the criteria for Cyber sector wages for similar work.16 uncoordinated processes result in higher costs, million records were stolen from the Singapore health Security Essentials Plus certification, a basic standard inefficiencies and waste of resources. Complicated system, including that of the country’s prime minister in for security within the UK.1 While no organisation had Employee behaviour and culture interrelationships prevent the NHS from responding to 2018.2,4 passed an assessment commissioned by NHS Digital, Most sectors aim to reduce their cyber risk by locking- cyber attacks in as fast and agile way as possible. In the the purpose was to create a baseline and gauge down systems and limiting access to records. In field of cyber security, efficient responsiveness is critical Outside healthcare, records can be used for blackmail improvement. (See page 16) healthcare however, this is difficult as access is for ensuring smooth-running operations, fast recovery or, as is becoming increasingly common, in the United required by multiple users to ensure safe delivery of from disruptions and mitigating negative impacts on States, for identity theft: according to Forbes, about 1% The extended legacy IT estate care. In fact, there is a renewed drive to widen access patients. of the US population filed some kind of credit card Besides the complexity of the NHS, the IT landscape across providers, share even more data and give complaint in 2016, 13% of which concerned identity within the system is highly heterogeneous and patients and staff alike access to health records across Several key vulnerabilities, with particular emphasis on theft.13 As much as 10% of the US population had inconsistent. For instance, different networks like the a range of devices and settings. patient safety, are endemic to the healthcare industry medical records breached in the same year and these Health and Social Care Network (HSCN), local authority and require immediate intervention to enable a safe records can be found on the dark web selling for a mere Public Services Network (PSN), or direct internet Healthcare is actively widening access and opening and secure future for healthcare. While the UK $100 each.13 As health records often contain enough connections are in place, requiring differing security up systems whilst simultaneously collecting an government has, in the wake of WannaCry, begun to information to steal a patient’s identity, their value can approaches. Although the Department of Health and ever-greater range and depth of data. Furthermore, the take steps to mitigate the risks these vulnerabilities be a great deal more in the wrong hands. Social Care (DHSC), NHS England, and NHS increasing dependency on agency and temporary pose, more work is needed to determine the specific Improvement have defined the Data Security and staffing within the health sector adds greater risks unique to the NHS, which will in turn lead to Protection Requirements (DSPR) based on the National vulnerabilities and risk. Staff may be unfamiliar with improved cyber resilience. systems and dependent upon the sharing of credentials 10 11
Figure 2: National Accountabilities for Cyber Security of DHSC (black box) and ALBs (grey boxes) Department Information NHS NHS of Health and Incident report Commissioners Improvement England* Social Care* Briefing Lead Single oversight Digital regional NHS framework teams Digital National Data Government Notification and Ministers Guardian departments cooperation Incident report Health and social ICO Oversight care providers Incident Incident report response Support Emergency plan coordination Data security standards Central Audit Adult social Primary Community Health CSUs CCGs Trusts NCSC government chairs care care care care Interface management Cabinet office Individual Private Community Mental health Acute care Ambulance Foundation contractors sector ALBs health trusts trusts trusts trusts trusts Other cyber security units Government DHSC departments ALBs and agencies Incident Social health providers (general) *Since the 1st of July, roles and responsibilities for cyber security information at DHSC and NHS England have been incorporated under NHS X Social health providers (specific units) Figure reprinted with permission from the Lancet Digital Health (Ghafur et al. 2019).19 12 13
5 NHS cyber security accountabilities Summary Points ● This section highlights ● NHS cyber security ● Newly introduced NHS ● It is hoped that through the different national accountabilities are incident response the launch of NHS X will and local bodies complex and processes aim at help streamline NHS accountable for interrelated improving cyber cyber-security healthcare cyber resilience, e.g. through accountabilities security and their roles CareCERT The Government Communications Headquarters NHS Digital plays a central role in threat detection, (GCHQ) is an intelligence and security organisation response and recovery. As an example, the launch of the responsible for providing signals intelligence and cyber security operations centre (CSOC), has seen an information assurance to the government and armed increased threat intelligence capabilities; this has forces of the United Kingdom. The NCSC, part of GCHQ, resulted in several nationwide potential cyber attacks was established in October 2016 to be the UK’s national intercepted and prevented and has blocked 1.4 million authority for cyber security advice and incident communication attempts with malware botnets. management. It has a mandate to help bring coherence and transparency to UK cyber security, in support of the Based on the Single Oversight Framework, NHS government’s commitment to make the UK the safest Improvement monitors data security standards of NHS place to live and work online. As part of GCHQ, it can trusts and provides support to achieve required security draw on the unique capabilities of the UK’s intelligence levels. It ensures that health and social care providers agencies to help us do this. take the recommended measures for improving cyber resilience. Similarly, NHS England is accountable for GCHQ and NCSC provide intelligence and support for ensuring that cyber security standards of, for example, all critical sectors in the UK, however, DHSC and the the NHS Standard Contract are implemented and that After a cyber attack ALBs coordinate and provide Complexity of accountabilities ALBs are responsible for operationalising services emergency plans exist in case of a cyber emergency. support in terms of response actions. In particular, Figure 2 highlights the significant complexity of NHS across the NHS. Since the WannaCry attack, the NHS In addition, Commissioning Support Units (CSUs), audit NHS England acts upon its Emergency Preparedness, organisational structures due to the large number of has taken several steps to increase its cyber resilience, chairs and Clinical Comissioning Groups (CCGs) are Resilience and Response (EPRR) framework, ALBs and sovereign organisations. One main problem and accountabilities have been assigned to the DHSC supported by NHS England on how to increase cyber coordinating and managing all efforts to mitigate and is that some bodies have partly the same and ALBs, as shown in Figure 2. This figure highlights the security. NHS Improvement and NHS England act as control the negative impacts. In the case of a major accountabilities and competencies, leading to multiple significant complexity of NHS organisational structures information providers concerning cyber security to attack NHS England guides the response activities of the and not necesseraly uniformed response activites. As due to the large number of ALBs and sovereign healthcare providers and commissioners, respectively. overall system. In collaboration with NHS Improvement shown in Figure 2, NCSC receives information about a organisations. communication about the respective incident to all cyber attack directly from NHS Digital and additionally In the case of a cyber incident different processes and health and social care organisations is established. NHS through DHSC, making the information transfer The DHSC is accountable for the regulatory oversight measures take place. For instance, NHS Digital, the Digital, supported by NCSC, is a further adviser helping cumbersome and complex. of Trusts and Foundation Trusts under the Network and Information Commissioner’s Office (ICO) and the NCSC the healthcare system in responding to cyber incidents Information Systems (NIS) Regulations as well as for the have to be informed as soon as an attack is detected. on a national and local level. Different networks like the Health and Social Care compliance of the data security standards applying to As indicated by Figure 2, NHS Digital pass the Network (HSCN), local authority networks or direct all health and care providers. 12 It also takes on the role information onto the DHSC as the Competent Authority internet connections are in place, requiring different as an interface manager between the Cabinet Office, for the health sector. The Department provides incident security approaches. Although the DHSC, NHS England health and social care providers and other government information to NCSC and is responsible to brief the and NHS Improvement have defined the Data Security departments and agencies. Ministers and the National Data Guardian at the same and Protection Requirements (DSPR) based on the time. In turn, NCSC provides intelligence information National Data Guardian’s 10 data security standards, no and the National Data Guardian advises how to share detailed specifications are provided. As commissioners and secure data. of GP IT services, CCGs must ensure commissioned GP IT providers are contractually required to comply with these requirements. 14 15
Figure 3: Securing Cyber Resilience software within 48 hours. New initiatives like the NHS Digital Security Operations Centre are intended to DHSC plans for cyber resilience NHS CSUs increase NHS Digital’s monitoring and cyber security In October 2018, the DHSC published a report outlining Trusts capabilities. its plans to improve cyber resilience within the NHS.22 CareCERT Collect The report, part of the Data and Cyber Security The development of CareCERT into the Cyber Security Programme being developed by the DHSC along with Operations Centre (CSOC) will support NHS Digital in the aforementioned ALBs, details current and planned cyber security Expand CareCERT inspections services offering enhanced services across the sector. The spending on cyber security in the NHS, the estimated NHS NHS Digital Security deployment of over 900,000 instances of Advanced costs of WannaCry overall, and plans for decreasing Digital Operations Centre Threat Protection (ATP) has improved both the the risks associated with cyber security in the short protection of end point devices, and the capability the and long term. CSOC has to hunt and identify threats across the sector. In addition to outlining spending and software plans, This is complemented by centrally funded interventions the DHSC provides 22 recommendations for the NHS, at a local level designed to increase cyber resilience and and its constituent trusts and practices, to mitigate improve security postures, as well as providing services, technological vulnerabilities throughout the country. In CQC NHS NHS NHSX* e.g. vulnerability scanning and protected domain name addition to a new agreement with Microsoft to ensure all England Improvement system (DNS) ,launching in 2019, that health systems are updated appropriately and as needed, the organisations can utilise. department plans to spend £150 million over the next *NHSX will combine teams from DHSC, NHS England and NHS Improvement. three years to ‘protect key services from the impact of NHS Digital have performed on-site cyber security cyber attacks.’22 These methods of protection include, assessments on all Trusts and a number of primary care primarily, improvement of infrastructure, interventions Incident response and specialist Cyber advisors for their ‘Well Led’ Inspections. providers based on the Cyber Security Essentials Plus certification. The Data Security Protection Toolkit has to address weaknesses often found in the NHS, and investment in NHS Digital’s Cyber Security Operations In the case of an incident, all health and care increased the capability to better assess the broader Centre. Site assessments are planned, over the coming organisations have to inform NHS Digital through Although cyber incidents are reported and registered in system with supporting services for on-site years, to determine whether individual sites are doing the Information Governance (IG) Toolkit and the a database, the data are not systematically processed assessments. As a result, NHS Digital is able to provide enough to prevent cyber incidents. Information Commissioner’s Office (ICO) if the incident or statistically evaluated. Therefore, the fundamental tailored advice to NHS organisations on the cyber exceeds level 2. In this instance, the IG Toolkit has been understanding and awareness of potential risks and security capabilities and how to mitigate future threats.21 NHSX replaced by the Data Security and Protection (DSP) threats are missing. Since NHS Digital does not measure A new ALB, NHSX, was launched on the 1st of July, 2019. Toolkit, which is an online self-assessment tool risks or vulnerabilities on a local level, it is not possible One recommendation from the NHS CIO’s WannaCry NHSX brings teams from the DHSC, NHS England and measuring the performance of health and care to assess the impact a cyber attack would have on the report is for all large NHS Organisations to achieve CE+ NHS Improvement together to drive digital organisations against DSPR. NHS’s IT infrastructure, data, and patients in advance. certification by June 2021. NHS Digital have performed transformation and lead policy, implementation and On-Site Cyber Security assessments including CE+ on change. It is headed by Matthew Gould, who previously Performance against the DSPT standards is the baseline Efforts have been made to improve the NHS’s all Trusts and a number of primary care providers. As of served as the UK government's Director of Cyber used to inform progress, is monitored by NHS England, responsiveness to cyber threats. In 2016 NHS Digital March 2019, 38 organisations are already CE+ certified, Security.22 Among other responsibilities, NHSX will and applies to all NHS organisations, Local Authorities was commissioned by the Department of Health to 27 months before the target date. Achieving CE+ is a mandate cyber security standards across health and and bodies commissioned or contracted to provide develop a Care Computer Emergency Response Team pass/fail assessment, as organisations improve security social care, to ensure that all organisations related to services who process personal confidential health and (CareCERT).20 CareCERT consists of three key services, controls the more will become CE+ certified. the NHS have security protocols from inception. adult social care data. Over 27000 DSPT self- which support stronger cyber security across health and assessments have been completed with over 97% social care: a national cyber security incident It is hoped that the launch of NHSX will help streamline meeting the DSPT standard and 532 organisations management function, good practice guidance on cyber and simplify the national cyber security accountabilities exceeding it. security for the health and social care system, and for the NHS by integrating the roles and responsibilities national level threat advisories which are broadcast to of the cyber security teams at NHS England and the A new version of the toolkit was released by NHS Digital organisations across the health and social care sector.20 DHSC. This will be key to help front line NHS IT teams in in June 2019 incorporating a broader range of external Figure 3 gives an overview of how CareCERT is used to implementing any national and local protocols. security standards Cyber Essentials, EU NIS, Minimum improve cyber resilience. Cyber Security Standard (MCSS) and the NCSC Cyber Assessment Framework. It is a requirement for large If an alert is triggered by the CareCERT Collect system NHS organisations’ DSPT self-assessments to be all NHS trusts and Commissioning Support Units (CSUs) independently audited annually. Additionally, NHS have to report what they have done in response, e.g. Digital is working with the CQC on providing expertise implementing security patches or updating anti-virus 16 17
6 Emerging challenges Connected medical devices Opportunity If a method of assuring the cyber security of connected medical devices can be achieved, it will be possible to deliver a fully integrated and scaled ecosystem of connected medical devices across healthcare providers and patients. The data captured by connected medical devices, if fully integrated, will provide real-time information and open new opportunities for understanding diseases and treating patients. There are currently small-scale test beds of this type of device integration being conducted. For example, Imperial College Healthcare Trust are currently piloting Whilst robust regulatory standards for safety exist there the integration of monitoring devices with its EHR. The is a lack of explicit cyber security equivalents that monitoring devices capture observations and this data medical devices must meet to be released to the automatically flows into the patient’s EHR. It produces market. Most now recognise that a set of security an early warning score for the patients which can incite guidelines must be developed. The US Food and Drug early medical intervention. Administration (FDA) is leading in this space; while the EU’s medical device regulations are less well-defined Threats/challenges than those of the FDA, two publications in May 2017 Summary Points If nothing is done and adoption of medical devices introduced strict rules around post-market surveillance continues at pace and scale there could be mass of all medical devices approved for use in member ● This section looks at ● Connected medical ● Implications of decisions ● Secured access to introduction of poorly regulated or unsecure medical states.23 All member states are required, since the the cyber security devices can have made by artificial patient data and records devices that are hyper-connected and vulnerable to publication of these papers, to maintain close challenges of emerging dramatic cascading intelligence algorithms is essential to mitigate cyber threat. At present, healthcare providers are surveillance of all approved devices, to monitor any tools including: effects in the case of are not yet well the risks of manipulation unable to effectively and consistently risk assess the hazardous incidents, and to report all corrective action connected medical cyber attacks understood in the and theft of data as well adoption and integration of emerging technologies and taken thereafter. devices, algorithmic healthcare context as disruption of care there is a persistent lack of agreed minimum standards decision making, ● Deficient monitoring operations due to for security. A report from British Standards Institution (BSI) notes, Electronic Health mechanisms of cloud ● Discrimination and unauthorised actions however, that these documents do not deal closely with Records, robotics, services imply manipulation of DNA Current landscape the subject of security, and instead focus on the safety cloud computing and complete reliance on data can have far- There is a lack of procurement policy to monitor of medical devices approved in EU member states. precision medicine third-party reaching consequences and regulate devices being used in care delivery. The EU regulations specify only that all devices should organisations for the individuals and Additionally, there is little incentive for suppliers of maintain ‘state of the art’ security which will require their relatives medical devices to provide appropriate levels of cyber time (and potentially the accumulation of case law) to security due to the high cost, with a lack of mandate to credibly evolve into a commonly understood baseline. do so. The consensus among experts, both within the cyber security and medical areas, is that this risk is real, The Department of Culture, Media and Sport (DCMS) The NHS, along with health systems across the world, and combined use is likely to generate a step-change in pressing, and that high security standards are needed launched a Code of Practice for consumer internet of is becoming ever more reliant on technology to deliver quality and nature within this sector. The challenge will more than ever, with the advent of advanced medical things (IoT) security in 2018.24 This Code of Practice sets safe patient care. There are exciting new innovations be to adopt technologies safely and securely and devices. out practical steps for IoT manufacturers and industry that have the promise to change the way care is appreciate the emerging cybersecurity challenges that stakeholders to improve the security of consumer IoT delivered and offer new treatments and discoveries. become more apparent as these technologies are more products and associated services in the home, through Some of these technologies such as artificial intelligence commonplace. a set of 13 guidelines.24 Despite this code of practice (AI) and robotics are already in use at relatively small being introduced, there is still not an equivalent guide scale and in some trusts. However, their widespread for medical devices. 18 19
Artificial intelligence: algorithmic impacts of AI algorithms upon clinical liability, as the Electronic Health Records (EHRs) Current landscape human is removed as the authoritative decision-maker, The WannaCry attack showcased the vulnerabilities decision making have not been considered. Opportunity posed by EHR systems when clinical staff cannot get Opportunity EHRs will be the foundation of a digital healthcare access to critical information. Even if an attack is Clinical decisions may be delegated to algorithms The nature of AI means that it is often trained locally by system that configures data from medical technology. determined to have been accidental, any disruption including AI and machine learning. There is the the data that is inputted into the machine. This means Patient access to their own data in the future will enable that removes access to EHRs has the potential to disrupt opportunity to use data collated by a plethora of that the machines quickly become specialised, easily them to better understand and manage their own care, preventing treatment, congesting care pathways medical devices to provide data-driven, real-time adaptable and significantly divergent from those medical data and give them greater autonomy in their and impacting patient safety. Removing access is one diagnostics and care management decisions. The supplied by the same manufacturer. The implication healthcare decisions. thing; another consideration is a malicious attempt to accuracy and efficiency of algorithmic decision-making of this is that traditional fixes such as ‘patching’ will corrupt data over a period of time where it is difficult will allow for early intervention of medical care, become redundant as a singular fix will not be suitable Salford Royal NHS Foundation Trust is currently to detect, creating a lack of confidence and reliability personalised treatment and real-time monitoring for for all machines that have been trained using different exploring how to integrate medical devices so that the in the data. Over-reliance on badly connected EHR patients. Ultimately, appropriate and managed use of data and it cannot be proven that it is better than before data generated can provide real-time information and systems may leave the NHS vulnerable to a widespread algorithmic decision-making will save time, improve the fix. The adaptability and specialist capabilities of AI decision-making. The trust is working with Marand from shutdown in the event of an intentional attack. accuracy and reduce cost for the NHS. can be favourable, but they also present a challenge Slovenia on an open EHR platform. A patient portal from a governance and assurance perspective as the allows patients to share their blood glucose and blood The ambition for the healthcare service is for patients Threat/challenges machines have the ability to change momentarily and pressure readings from devices, with a clinician then to have access to their medical records. This again adds As the healthcare sector begins to introduce algorithmic cannot be treated in an identical manner. able to access and review the data. another layer of risk in terms of cyber security and if the decision-making into clinical settings, significant parameters of access and control are not appropriately consideration must be given to the implications they Current landscape Threats/challenges managed then patient data may be vulnerable to may have upon patients or practitioners. If an algorithm The DHSC launched a code of conduct for data-driven If the parameters of access and control for an increasing cyber threats. As patients begin to have makes the wrong decision, who will be held responsible health and care technology (February 2019) with 10 key individual’s EHR are not appropriately managed, then systematic access to their own data, the government and how will this be managed? A recent study principles.26 There is a small-scale pilot of a mobile patient data may be vulnerable to misuse and cyber must find ways to educate the public on how to safely demonstrated how attackers can use deep learning to phone-based application using AI technology to alert threat. The supporting infrastructure for EHRs must store and share their personal data. add or remove evidence of lung cancer from medical staff to patients at risk of deterioration and death provide secure flexibility to service the need of each scans that in turn could not be differentiated by the through kidney failure. user and the healthcare sector needs to establish a data reporting radiologists25. It is evident that, at present, architecture that would set the appropriate parameters processes are not yet established to effectively manage of access and control for different users of EHRs. algorithmic decision-making in healthcare. Soon the delegated decision will be much more complex (e.g. diagnosing chronic medical conditions). In addition, the 20 21
Robotics Current landscape Current investment into developing robotics is Opportunity underpinned by the UK government’s plans to invest Robotics in healthcare have the potential to transform £300 million in RAS (Robotics and Autonomous the delivery of care in a variety of ways, such as carrying Systems) research between 2012 and 2020. out repetitive tasks (e.g. patient observations), aiding Additionally, GrowMeUp is an ongoing project endorsed a human surgeon or executing operations independent by the EU that is developing a robot that has the of human intervention. Robots will significantly impact capability to respond to changes in an individual’s delivery of care for the elderly either through assisted routine and environment.27 living or end-of-life care by prolonging personal independence. For healthcare, the ambition is that this As observed by the Parliamentary Office for Science will reduce the pressure put on the NHS in the face of an and Technology, ‘Many of the robots and robotic devices ageing population. developed for social care appear to still be at the conceptual or design phase’.28 The real challenge Threats/challenges is understanding whether or not robotics can be Robotics use a complex mesh of AI algorithms to make integrated into clinical environments alongside existing decisions. As previously discussed, there is a risk that technologies and governance practices. removing the human factor from the decision-making process drastically changes clinical liabilities for which the healthcare sector is not currently prepared to manage safely, securely and at scale. The successful adoption of robotics to realise potential benefits to the healthcare sector is reliant on effectively managing the human interaction with them. 22 23
Threats/challenges While progress is being made to adopt cloud computing Precision medicine solutions, there is still a lack of awareness and Opportunity education around the technology, which could be Precision medicine has the potential to facilitate exacerbated by a culture wary of putting trust in servers more effective treatment options for rare as well as they cannot directly control.36 Cloud services are noncommunicable diseases. The concept of using a supposed to be monitored 24/7 by specialist third-party person’s genomic data to design treatments tailored to IT staff and alert clients of any suspicious behaviour. that person is no longer a far-fetched concept, because There are some instances where this has failed to of the decreasing cost of genome sequencing and its happen. As of January 2019, 416 cases were investigated availability through research initiatives.40 by the US Department of Health and Human Services’ Office for Civil Rights involving security breaches of The 100,000 Genomes Project was first announced in health information, 47% of which were caused by an 2013 through the establishment of a private company, IT incident or hacking.37 Genomics England, owned by the DHSC. The aim of the project was to sequence the DNA of 75,000 patients Cloud computing These incidents highlight another challenge of cloud with cancer as well as families affected by rare disease. computing: healthcare providers are completely There has been success in treating patients based on Opportunity reliant on third parties to store and protect their data. their genomic data.41,42 Cloud computing will allow large-scale analysis of Healthcare providers need to have, at least, some medical data to support healthcare services, especially degree of oversight to ensure that their cloud service The UK Biobank has collected over 500,000 medical when combined with AI. According to the 2017 supplier is complying with regulatory frameworks. They records, DNA samples, as well as other biological Even the suspicion that participants’ data could be Healthcare Information and Management Systems also need mechanisms in place to continuously monitor samples and health and wellbeing data from volunteers. compromised is enough to generate scepticism of Society (HIMSS) Analytics Cloud Survey, 65% of the company’s compliance through using security tools If volunteers consented, these data could be genomic sequencing schemes. Unlike social security hospitals had been utilising cloud services in some and audit logs. anonymised and linked to their EHR to correlate them or national insurance numbers, credit card information capacity, and it is expect that the majority of EHRs with hospital statistics. By 2020, the organisation is and other data subject to fraud, DNA data of an will be cloud-based by 2020.29 The UK NHS Blood and Current landscape hoping to make these anonymised records publicly individual cannot be changed and are shared, to some Transplant, for example, has been using IBM Cloud NHS Digital has issued a guidance document approving available.43,44 extent, with their relatives.47 However, there is little to no to optimise its organ allocation scheme by analysing healthcare organisations’ use of cloud computing, privacy protection in place for the extended relatives of medical records in the cloud to identify potential provided that appropriate safeguards are put in place.38 Threats/challenges individuals who take part in uploading their DNA to open transplant recipients.30 In 2018, Arthritis Research The challenge, however, is to navigate the fragmented While precision medicine is more accessible than ever databases or taking part in genomic research. UK launched a cognitive virtual assistant, powered by structure of the NHS in order to implement adoption of to the general public and has had various success Therefore, as the popularity of seeking health and IBM Cloud and AI, which was trained by specialists to cloud computing, as well as overcome cultural stories, there are still concerns about research ancestry insights grows, so does the threat to relatives’ provide personalised 24/7 support for arthritis resistance. Local service agreements should also outline participants, as well as their relatives, becoming victims privacy and their risk of being affected by a hacking patients.31 what the scope of the cloud services are, who is of hacking or DNA discrimination. In December 2018, incident.48 responsible for what, who holds insurance, who’s Genomics England were forced to address reports that, When integrated properly, the security of cloud-based indemnifying whom and what the healthcare provider’s because of multiple cyber attacks on their database Current landscape solutions has the potential to exceed that of local rights are to access the data.39 of 85,000 individuals’ genomes, they had to move To protect the data of participants of genomic research, servers alone.32 Furthermore, the operational costs of participants’ data to a secure Ministry of Defence (MoD) policymakers have restricted access to pools of on-demand cloud computing and storage are low, base. Genomics England maintained that there was anonymised biomedical genetic data.49,50 If hackers which is supportive of the push for increased access to “no evidence” that it had been targeted by any cyber were able to match genetic information with personal EHRs, digital health solutions and the analysis of attacks, that patient data had never been moved and information, there are a myriad of malicious uses medical data for research purposes.33-35 in fact resided in a secure government-owned facility for that combination of information. These include based in the UK.45,46 exploiting people in positions of power, identity theft, framing a person for criminal activity and holding genetic data ransom in return for a steep price and in a worst case scenario, using mass data to develop bio-weapons.51 24 25
You can also read