McAfee Embedded Control for Healthcare

Similar documents
McAfee Embedded Control

McAfee Embedded Control for Retail

McAfee Embedded Control

McAfee Embedded Control for Aerospace and Defense

McAfee Public Cloud Server Security Suite

Comprehensive Database Security

McAfee Endpoint Threat Defense and Response Family

The McAfee MOVE Platform and Virtual Desktop Infrastructure

Reducing Operational Costs and Combating Ransomware with McAfee SIEM and Integrated Security

McAfee Endpoint Security

HIPAA Regulatory Compliance

Security by Default: Enabling Transformation Through Cyber Resilience

McAfee epolicy Orchestrator

Defend Against the Unknown

McAfee Complete Endpoint Threat Protection Advanced threat protection for sophisticated attacks

Building Resilience in a Digital Enterprise

McAfee Application Control/ McAfee Change Control Administration

HIPAA COMPLIANCE WHAT YOU NEED TO DO TO ENSURE YOU HAVE CYBERSECURITY COVERED

McAfee Network Security Platform Administration Course

HIPAA Controls. Powered by Auditor Mapping.

Intelligent, Collaborative Endpoint Security

White Paper. Closing PCI DSS Security Gaps with Proactive Endpoint Monitoring and Protection

Sustainable Security Operations

Global Manufacturer MAUSER Realizes Dream of Interconnected, Adaptive Security a Reality

Carbon Black PCI Compliance Mapping Checklist

GDPR: An Opportunity to Transform Your Security Operations

HIPAA Compliance & Privacy What You Need to Know Now

Total Protection for Compliance: Unified IT Policy Auditing

Expand Virtualization. Maintain Security.

Symantec Endpoint Protection

Audience. Overview. Enterprise Protection Platform for PCI DSS & HIPAA Compliance

Database Auditing and Forensics for Privacy Compliance: Challenges and Approaches. Bob Bradley Tizor Systems, Inc. December 2004

Securing Today s Mobile Workforce

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

SECURITY PLATFORM FOR HEALTHCARE PROVIDERS

Integrated McAfee and Cisco Fabrics Demolish Enterprise Boundaries

eguide: Designing a Continuous Response Architecture 5 Steps to Reduce the Complexity of PCI Security Assessments

CA Security Management

SECURITY & PRIVACY DOCUMENTATION

Petroleum Refiner Overhauls Security Infrastructure

PROTECTION FOR WORKSTATIONS, SERVERS, AND TERMINAL DEVICES ENDPOINT SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY

DEEP FREEZE CLOUD FOR HIPAA COMPLIANCE

HIPAA Security Rule Policy Map

HIPAA Compliance Checklist

Putting It All Together:

Services solutions for Managed Service Providers (MSPs)

Security and PCI Compliance for Retail Point-of-Sale Systems

Securing Your Microsoft Azure Virtual Networks

Protecting the Internet of Things

United Automotive Electronic Systems Co., Ltd Relies on McAfee for Comprehensive Security

Securing the Software-Defined Data Center

Remote Access to a Healthcare Facility and the IT professional s obligations under HIPAA and the HITECH Act

HIPAA AND SECURITY. For Healthcare Organizations

McAfee Virtual Network Security Platform

McAfee Advanced Threat Defense

IT SECURITY RISK ANALYSIS FOR MEANINGFUL USE STAGE I

HIPAA Security. 3 Security Standards: Physical Safeguards. Security Topics

Symantec Client Security. Integrated protection for network and remote clients.

HIPAA Security Checklist

HIPAA Security Checklist

Securing Your Amazon Web Services Virtual Networks

SECURE SYSTEMS, NETWORKS AND DEVICES SAFEGUARDING CRITICAL INFRASTRUCTURE OPERATIONS

Symantec Endpoint Protection 14

Data Sheet: Endpoint Security Symantec Multi-tier Protection Trusted protection for endpoints and messaging environments

Product Guide. McAfee Web Gateway Cloud Service

White Paper April McAfee Protection-in-Depth. The Risk Management Lifecycle Protecting Critical Business Assets.

AND FINANCIAL CYBER FRAUD INSTITUTIONS FROM. Solution Brief PROTECTING BANKING

McAfee Host Intrusion Prevention Administration Course

HIPAA Federal Security Rule H I P A A

SIEM: Five Requirements that Solve the Bigger Business Issues

McAfee Web Gateway Administration

The Convergence of Security and Compliance

Policy and Procedure: SDM Guidance for HIPAA Business Associates

NEN The Education Network

Healthcare Privacy and Security:

CA Host-Based Intrusion Prevention System r8

DIRECTIVE ON INFORMATION TECHNOLOGY SECURITY FOR BANK PERSONNEL. June 14, 2018

These rules are subject to change periodically, so it s good to check back once in a while to make sure you re still compliant.

Perimeter Defenses T R U E N E T W O R K S E C U R I T Y DEPENDS ON MORE THAN

Cybersecurity and Hospitals: A Board Perspective

SIEM Solutions from McAfee

McAfee MVISION Cloud. Data Security for the Cloud Era

White Paper. New Gateway Anti-Malware Technology Sets the Bar for Web Threat Protection

McAfee VirusScan and McAfee epolicy Orchestrator Administration Course

McAfee Skyhigh Security Cloud for Amazon Web Services

Managed Endpoint Defense

HIPAA Security and Privacy Policies & Procedures

ENDPOINT SECURITY STORMSHIELD PROTECTION FOR WORKSTATIONS. Protection for workstations, servers, and terminal devices

Understanding the McAfee Endpoint Security 10 Threat Prevention Module

Data Loss Prevention Best Practices for Healthcare

Digital Wind Cyber Security from GE Renewable Energy

Imperva Incapsula Website Security

Securing Devices in the Internet of Things

Product Guide. McAfee Web Gateway Cloud Service

A Checklist for Compliance in the Cloud 1. A Checklist for Compliance in the Cloud

Best Practices in Securing a Multicloud World

HIPAA/HITECH Privacy & Security Checklist Assessment HIPAA PRIVACY RULE

Achieving Cyber-Readiness through Information Sharing Analysis Organizations (ISAOs)

POWERING NETWORK RESILIENCY WITH UPS LIFECYCLE MANAGEMENT

Changing face of endpoint security

Transcription:

McAfee Embedded Control for Healthcare A single solution for system integrity, change control, and policy compliance McAfee Embedded Control for healthcare part of the McAfee product offering maintains the integrity of your system by only allowing authorized code to run and only authorized changes to be made to a system. It automatically creates a dynamic whitelist of the authorized code on the embedded system. Once the whitelist is created and enabled, the system is locked down to the current, known good baseline and no program or code snippet outside the authorized set can run and no unauthorized changes can be made. McAfee secures all of the medical devices and the data on those devices routinely used in a healthcare setting. Key Advantages Minimizes your security risk by controlling what runs on your embedded devices and protecting the memory in those devices Enables you to give access, retain control, reduce support costs Selective enforcement Deploy and forget McAfee Embedded Control is a small-footprint, lowoverhead, application-independent solution that provides deploy-and-forget security on embedded systems by converting a system built on a commercial operating system into a black box with the characteristics of a closed proprietary operating system. It prevents any unauthorized program on disk or injected into memory from executing and prevents unauthorized changes to an authorized baseline. Assured System Integrity Executional control With McAfee Embedded Control enabled, only programs contained in the McAfee dynamic whitelist are allowed to execute. Any other programs are considered unauthorized, their execution is prevented, and the failure is logged by default. This enforcement prevents unauthorized programs such as worms, viruses, and spyware from executing. Memory control Memory control ensures that running processes are protected from malicious attempts to hijack them. Unauthorized code injected into a running process is trapped, halted, and logged. Attempts to gain control of a system through buffer/heap overflow and similar exploits are rendered ineffective, and logged. 1 Change Control McAfee Embedded Control detects changes in real time. It provides visibility into the sources of change and verifies that changes were deployed onto the correct target systems, provides an audit trail of all changes, and allows changes to be made only through authorized means. Make your devices complianceand audit-ready Real time visibility Comprehensive audit Searchable change archive Closed-loop reconciliation 1 McAfee Embedded Control for Healthcare

McAfee Embedded Control allows you to enforce change control processes by specifying the authorized means of making changes. You may control who (people or processes) can apply changes, which certificates are required to allow changes, and when changes may be applied. Audit and Policy Compliance McAfee Integrity Control provides dashboards and reports that help you meet compliance requirements. These reports and dashboards are generated through the McAfee epolicy Orchestrator (McAfee epo ) console, which provides a web-based user interface for users and administrators. McAfee Embedded Control delivers integrated, closed-loop, real-time compliance and audit, complete with a tamperproof system of record for the authorized activity and unauthorized attempts. McAfee Global Threat Intelligence Integration: The Smart Way to Deal with Global Threats for Air-Gap Environments McAfee Global Threat Intelligence (McAfee GTI) is an exclusive McAfee technology that tracks the reputation of files, messages, and senders in real time using millions of sensors worldwide. This feature uses cloud-based knowledge to determine the reputation of all files in your computing environment, classifying them as good, bad, and unknown. With McAfee GTI integration, you ll know with certainty when any malware has been inadvertently whitelisted. The GTI reputation is accessible in internetconnected, as well as isolated, McAfee epo software environments. Healthcare Healthcare systems are increasingly under attack for the simple reason that the information contained in healthcare systems has tremendous value. Exploits are growing more sophisticated, and time-to-exploit is accelerating. Antivirus does not protect against zero-day attacks, insider attacks, or local hospital staff who make errors or do not adhere to security policies. Medical devices are often not regularly updated with new.dat files because they are not always on the network. Despite the progress that the IT industry has made in protecting organizations from external threats and the standard practices now in place at most healthcare organizations, misuses of protected information have spread rampantly in recent years. Indeed, according the Computer Security Institute, insider breaches have recently surpassed viruses as the most-reported information security incident. By mandate, the information that both healthcare professionals and hackers try to access is now in electronic form across an array of devices in nearly every medical arena and department. The Health Insurance Portability and Accountability Act (HIPAA) of 1996, along with the American Recovery and Reinvestment Act of 2009, have legislated investments in Electronic Health Records (EHRs). They have enacted privacy, enforcement, and administrative provisions that imbue trust in EHRs. These provisions have a far-reaching impact on the way HIPAA-covered entities and their partners handle and protect patient information. McAfee Embedded Security Addresses HIPAA HIPAA Administrative Safeguard 164.308(a)(1)(i): Security Management Process. 164.308(a)(1)(ii)(B): Risk Management. 164.308(a)(1)(ii)(C): Sanction Policy. 164.308(a)(1)(ii)(D): Information System Activity Review. 164.308(a)(3)(i): Workforce Security. 164.308(a)(4)(i): Information Access Management. 164.308(a)(5)(ii)(B): Protection from Malicious Software. 164.308(a)(5)(ii)(C): Login Monitoring. 164.308(a)(6)(ii): Response and Reporting. 164.308(a)(8): Evaluation. HIPAA Technical Safeguard 164.312(a)(2)(i): Unique User Identification. 164.312(b): Audit Controls. 164.312(c)(2): Integrity. HIPAA Physical Safeguard 164.310(a)(2)(ii): Facility Security Plan. 164.310(a)(2)(iii): Access Control and Validation Procedures. 164.310(b): Workstation Use. 164.310(d)(2)(iii) Accountability. 2 McAfee Embedded Control for Healthcare

Complicating matters, the FDA also has specific requirements for embedded systems deployed in the healthcare system: Systems must do only what they are designed to do. Systems cannot perform other functions. When systems need to change, only manufacturers can change them. All of the above are always true and can always be proven. The FDA calls out two areas where proactive, selective, auditable control is essential. McAfee Embedded Control specifically addresses many of the requirements imposed by HIPAA and the FDA by controlling what software can run and what software can change on any system. It ensures that any software change can happen only via authorized mechanisms for example, authorized change control time windows, authorized updaters, or only secure signed updates. It can help keep the production environment of medical systems in a known predictable state while keeping them secure against any external malicious threat or internal personnel unauthorized change threats. About McAfee Embedded Security Documentation for Commercial Off-the-Shelf Software in Medical Devices (US FDA) What are the computer system specifications for the commercial off-the-shelf (COTS) software? What does the COTS software do? How do you know it works? How will you assure appropriate actions are taken by the end user? What components can and/or must be installed/configured? What steps are permitted or must be taken to install/configure? McAfee Embedded Security solutions help manufacturers ensure that their products and devices are protected from cyberthreats and attacks. McAfee solutions span a wide range of technologies, including application whitelisting, antivirus and anti-malware protection, device management, encryption, and risk and compliance and all leverage the industry-leading McAfee GTI. Our solutions can be tailored to meet the specific design requirements for a manufacturer s device and its architectures. Summary Address via documentation Children s Hospital of Philadelphia uses McAfee Embedded Control on their thin client systems to reduce the total cost of ownership by reducing the number of support calls and by reducing the need for emergency patching. Tim Conners, Director, IT Operations, The Children s Hospital of Philadelphia Next Steps For more information, visit www. mcafee.com/embeddedsecurity or contact your local McAfee representative. How often will the configuration need to be changed? What education and training are required for end users? What measures are taken to prevent operation of non-specified software on medical devices? How will you keep track of (control) the COTS software? How will you ensure that no incorrect versions/patches are introduced? Requires specific control infrastructure with accompanying audit and compliance assurance reporting How will you maintain your COTS software configuration? Where and how will you store your COTS software? How will you ensure proper installation of the COTS software? How will you ensure proper maintenance of lifecycle support for COTS software? 3 McAfee Embedded Control for Healthcare

Feature Description Benefit Guaranteed System Integrity External threat defense Internal threat defense Advanced Change Control Secure authorized updates by manufacturer Verify that changes occurred within approved window Ensure that only authorized code can run. Unauthorized code cannot be injected into memory. Authorized code cannot be tampered with. Local administrator lockdown gives the flexibility to disable even administrators from changing what is authorized to run on a protected system, unless presented by an authentic key. Ensure that only authorized updates can be implemented on in-field embedded systems. Ensure that changes were not deployed outside of authorized change windows. Authorized updaters Ensure that only authorized updaters (people or processes) can implement changes on production systems. Real-Time, Closed Loop, Audit and Compliance Real-time change tracking Track changes as soon as they happen across the enterprise. Comprehensive audit Capture complete change information for every system change: who, what, where, when, and how. Identify sources of change Link every change to its source: who made the change, the sequence of events that led to it, the process/program that affected it. Eliminates emergency patching, reduces number and frequency of patching cycles, enables more testing before patching, reduces security risk for difficult-to-patch systems Reduces security risk from zero-day, polymorphic attacks via malware such as worms, viruses, and Trojans and code injections like buffer overflow, heap overflow, and stack overflow Maintains integrity of authorized files, ensuring the system in production is in a known and verified state Reduces cost of operations via both planned patching and unplanned recovery downtime and improves system availability Protects against internal threat Locks down what runs on embedded systems in production and prevents change even by administrators Ensures that no out-of-band changes can be deployed on systems in the field and prevents unauthorized system changes before they result in downtime and generate support calls Offers manufacturers the choice to retain control over all changes themselves or authorize only trusted customer agents to control changes Prevent unauthorized change during fiscally sensitive time windows or during peak business hours to avoid operational disruption and/ or compliance violations. Ensures that no out-of-band changes can be deployed on production systems. Ensures that no out-of-band changes can be deployed on production systems An accurate, complete, and definitive record of all system changes Validation of approved changes, quick identification of unapproved changes, and increased change success rate 4 McAfee Embedded Control for Healthcare

Feature Description Benefit Low Operational Overhead Deploy and forget Software installs in minutes, no initial Works out of the box and is effective immediately after installation configuration or setup necessary and no ongoing configuration necessary. no ongoing maintenance overhead, making it a favorable choice for a low-opex security solution configuration. Rules-free, signature-free, no learning period, application independent It does not depend on rules or signature databases and is effective across all applications immediately with no learning period. Needs very low attention from an administrator during server lifecycle Protects server until patched or unpatched server with low ongoing OPEX Effectiveness not dependent on quality of any rules or policies Small footprint, low runtime overhead Guaranteed no false positives or false negatives Takes up less than 20 MB disk space. Does not interfere with application s runtime performance. Only unauthorized activity is logged. Ready to be deployed on any mission-critical production system without impacting its run-time performance or storage requirements. Accuracy of results reduces OPEX as compared to other host intrusion prevention solutions by dramatically reducing the time needed to analyze logs daily/weekly. Improves administrator efficiency, reduces OPEX 1. Only available on Microsoft Windows platforms. 2821 Mission College Boulevard Santa Clara, CA 95054 888 847 8766 www.mcafee.com McAfee and the McAfee logo, epolicy Orchestrator, and McAfee epo are trademarks or registered trademarks of McAfee, LLC or its subsidiaries in the US and other countries. Other marks and brands may be claimed as the property of others. Copyright 2017 McAfee, LLC. 60742ds_ embedded-control-healthcare_1213b DECEMBER 2013 5 McAfee Embedded Control for Healthcare