Aspect | Details |
---|---|
Duration | 3 Hours |
Attendees | Care Connect Eng team, Product Managers, DevEx Engineers, DevSecOps Team |
Element | Description |
---|---|
Scenarios Covered | 1. AI Generated External phishing email utilizing admin credentials 2. Attack against Machine Processes and the data lake 3. SQL Injection attack 4. Insider attack taking Quant algorithms |
Methodologies Used | - Cyber Attack Killchain - MITRE ATT&CK Framework - STRIDE for control gap assessments |
Category | Details |
---|---|
Risks Identified | 4 High Risks, 1 Medium Risk |
Controls Required | 1. Regular security audits using ASVS 2. Patch management 3. Comprehensive employee phishing awareness training 4. Web Application Firewall (WAF) implementation 5. Multi-factor Authentication (MFA) deployment 6. Continuous network traffic monitoring 7. Role-based Access Control (RBAC) implementation |
Control | Description |
---|---|
Security Audits | Conduct regular audits using ASVS, focusing on Solaris Health 360 to detect vulnerabilities and weaknesses |
Patch Management | Ensure Solaris Health 360 and underlying technologies are up-to-date and protected against known vulnerabilities |
Phishing Awareness Training | Educate users about phishing risks, identification, and reporting procedures |
Web Application Firewall | Implement WAF tailored to Solaris Health 360's traffic patterns to monitor and filter malicious activity |
Multi-factor Authentication | Enhance authentication security to prevent unauthorized access |
Network Monitoring | Continuously monitor network traffic to detect and respond to suspicious activity |
Role-based Access Control | Implement RBAC within Solaris Health 360 to limit access to sensitive health data based on user roles and permissions |