Skip to main content
banner image
venafi logo

Secure Your Distributed Medical Devices with Robust Machine Identity Management

Secure Your Distributed Medical Devices with Robust Machine Identity Management

iot-healthcare-machine-identity-management
July 11, 2022 | Anastasios Arampatzis

Healthcare cybersecurity is a particularly complex and difficult task. With the goal of keeping patients safe while simultaneously protecting their medical data, it presents a challenging balancing act for cybersecurity professionals. If you add to those challenges the vast number of IoT devices, regulatory compliance such as HIPAA, GDPR, and NIS, and the unprecedented impact of the coronavirus pandemic, healthcare cybersecurity may seem like an overwhelming task. Healthcare organizations can reduce their risk surface by securing their distributed medical devices with machine identity management.

Take Control of Your Machine Identities With Automation and ELIMINATE Outages
Healthcare organizations are increasingly targeted by criminals

The healthcare industry continued to be one of the the most targeted sector in 2021, witnessing a 51% increase in breaches since 2019. While patient privacy has always been a common concern when it comes to healthcare organization breaches, a new study has found that cyber-attacks in the industry can have devastating effects on patient safety as well.

Many organizations have reported that healthcare ransomware attacks have resulted in longer lengths of stays in hospital and delays in procedures and tests that have resulted in poor outcomes including an increase in patient mortality. And respondents reported an increase in the number of patients being diverted to other facilities and an increase in complications from medical procedures due to ransomware attacks.

In 2020 alone, 560 healthcare facilities in the U.S. were reported as victims of ransomware attacks in 80 different incidents. These attacks resulted in:

  • Large amounts of Protected Health Information (PHI) and other sensitive data being stolen
  • Electronic Health Records (EHRs) being rendered temporarily inaccessible and in some cases permanently lost
  • Delayed procedures, tests, and treatment
Connected medical devices are vulnerable

Over half of internet-connected devices used in hospitals have a vulnerability that could put patient safety, confidential data, or the usability of a device at risk, according to a new report from the healthcare cybersecurity company Cynerio. The report analyzed data from over 10 million devices at over 300 hospitals and health care facilities globally, which the company collected through connectors attached to the devices as part of its security platform.

The most common type of internet-connected device in hospitals was an infusion pump. These devices can remotely connect to electronic medical records, pull the correct dosage of a medication or other fluid, and dispense it to the patient. Infusion pumps were also the devices most likely to have vulnerabilities that could be exploited by criminals—73% were found to have a vulnerability. Experts worry that breaches into devices like these, which are directly connected to patients, could be used to hurt or threaten them directly.

The more worrying threat is from ransomware groups that break into hospital systems through a vulnerable device and lock up the hospital’s digital networks—leaving doctors and nurses unable to access medical records, devices, and other digital tools—and demand a ransom to unlock them.

Lack of authentication creates man-in-the-middle risks

Another report from Kaspersky Labs found 33 vulnerabilities in the most widely used data transfer protocol for internet of things (IoT) medical devices, known as MQTT. These vulnerabilities were 10 more than the previous year, putting patient data at risk.

MQTT is a common solution in most IoT gadgets, including medical devices. As the Kaspersky researchers point out, authentication isn’t required, and encryption is sparse, making devices with MQTT exposed to man-in-the-middle attacks and data theft.

Healthcare organizations need to invest in machine identity management

The wide range of threats that healthcare organizations are facing demand quick response. As a result, healthcare entities are investing in cybersecurity solutions. According to the most recent study by Global Market Insights, the healthcare cybersecurity market size is anticipated to hit a record valuation of $35.5 billion by 2027. Among all security controls, medical device security accounts for 21.5% of the total investments. This increased investment is driven by two factors—the expanded attack surface and regulatory compliance.

The best way to secure medical devices is through a comprehensive machine identity management. Machine identities identify and authenticate the various connected devices to the organization’s network. Using unique identities for every connected device, healthcare organizations can validate the authenticity of the device and ensure the integrity of its communications with other medical devices.

To reap the benefits of machine identities, the respective private keys must be protected. Using a Hardware Security Module (HSM) is the best way to provide tamper-proof, hardware-based security of the secret private keys. If the private key is compromised, the whole machine identity’s structure falls apart like a castle in the sand.

In addition to having secure and robust machine identities, healthcare organizations need to validate the authenticity and integrity of the software running in the medical connected devices. Code signing process verifies that a software component is valid and authenticates the identity of the developer. Code signing also demonstrates that the code has not changed or tampered with since it was released.

Venafi Trust Protection Platform is the machine identity management solution that will allow healthcare organizations to reap the benefits of IoT devices while protecting TLS keys and certificates, SSH keys, and code signing keys across their enterprise. The Trust Protection Platform powers enterprise solutions that give you the visibility, intelligence, and automation to protect machine identities throughout your organization. To learn more, contact one of our experts.

Related Posts

Like this blog? We think you will love this.
orchestration-and-automation-machine-identities
Featured Blog

Orchestration and Automation are Critical for Machine Identities

The challenges of identity-based zero trust security

Read More
Subscribe to our Weekly Blog Updates!

Join thousands of other security professionals

Get top blogs delivered to your inbox every week

See Popular Tags

You might also like

TLS Machine Identity Management for Dummies
eBook

TLS Machine Identity Management for Dummies

Certificate-Related Outages Continue to Plague Organizations
White Paper

CIO Study: Certificate-Related Outages Continue to Plague Organizations

About the author

Anastasios Arampatzis
Anastasios Arampatzis

Anastasios Arampatzis is a retired Hellenic Air Force officer with over 20 years of experience in evaluating cybersecurity and managing IT projects. He works as an informatics instructor at AKMI Educational Institute, while his interests include exploring the human side of cybersecurity.

Read Posts by Author
get-started-overlay close-overlay cross icon
get-started-overlay close-overlay cross icon
Venafi Risk assessment Form Image

Sign up for Venafi Cloud


Venafi Cloud manages and protects certificates



* Please fill in this field Please enter valid email address
* Please fill in this field Password must be
At least 8 characters long
At least one digit
At last one lowercase letter
At least one uppercase letter
At least one special character
(@%+^!#$?:,(){}[]~`-_)
* Please fill in this field
* Please fill in this field
* Please fill in this field
*

End User License Agreement needs to be viewed and accepted



Already have an account? Login Here

×
get-started-overlay close-overlay cross icon

How can we help you?

Thank you!

Venafi will reach out to you within 24 hours. If you need an immediate answer please use our chat to get a live person.

In the meantime, please explore more of our solutions

Explore Solutions

learn more

Email Us a Question

learn more

Chat With Us

learn more