Executive summary

Over passed week I explored domain of information security applied to a state organization like children hospital and prepared a list of 10 steps to do to establish a foundation of organization's information security. Meanwhile I met with several tradeoffs which is not resolved yet and require tight work with several key persons/organizations around this issue.

The potential client is the children state hospital in a provincial city in Russia. A new year-old Russian law obligates each government organization, including hospitals, to establish, maintain and evolve information security of the organization. Due our talk I was asked to help them to implement and maintain it.

Discovery stage of work included investigation of key law documents. Based on them comprehensive, but not yet complete list of questions had been prepared to get the most complete understanding of the issue. Further research covered search of answers based on my own experience, experience of narrow experts and industry's best practices in Russia and worldwide.

Work on this issue shown some things should be done centralized - besides this state hospital there are more hospitals in city and even more others state organizations who are affected by this law.
Another thing to consider is this law requirements are not diversified much depending on size and budget of an organization -- compliance with all law requirements can become an unbearable burden for a small hospitals. All this had been considered in the proposed solution.

It is important to draw attention to look at proposed solution as a first iteration which will evolve in time based on experience gained over implementation of this steps and changes in threats from external world.

Technical doc with all details and the proposed solution is available by this link

Discovery

Which laws are relevant for this scope?

Bill №250 (указ №250) and bill №1272 (постановление правительства РФ №1272) are main bills for this scope shared with me by hospital's representatives. Further research shown hospitals are categorized as a critical informational infrastructure which is regulated by a separate package of bills.

Recent new order №213 by Federal Security Service complement bill №250.

Obviously a federal law about personal data №152 also should be taken under consideration.

What is a criteria of organization's information security?

There is no common metrics to verify organization's information security.

Common sense tells the main criteria is to prevent a malicious user to get remote access to organization network and systems to steal or corrupt data or get down organizational informational infrastructure.

A couple of information security officers shared FSB checks law papers had been prepared by organization to confirm compliance with law's requirements and also checks your set of measures to mitigate malicious intrusion and possible denial of service.

Recent order №213 gives a clue FSB will start automatic or manual penetration testing of organization in addition to this measures.

What are requirements for an information security officer?

There are many of them, but it is important to emphasis this ones:

1. Law requires formal education in one of the centers authorized by the government.

2. Experience in penetration testing: to build secure infrastructure you have to know how to hack it first.

3. Experience in creating legal papers.

How to organize training for staff?

Many attacks not just involves technical actions, but also actively uses social engineering - work with regular employees to get unauthorized access with their help. That's why set of measures taken to establish and maintain organization's information security should include work with employees in addition to hardware and software parts.

The following set of methods is proposed for the first iteration of corporate training:

- Creation and subsequent distribution of video presentations among employees of the organization that provide them a knowledge they need in the field of information security (frequency once a month)

- Analysis of cases emulating information security incidents to develop necessary theoretical ideas about necessary steps in the area of responsibility of each employee (frequency every three months)

- Carrying out activities that emulate information security incidents to develop real skills of each employee in his/her area of responsibility in the field of information security (frequency once every six months)

What should be used as a foundation of building organization's information security?

In my opinion it should be results gained after penetration testing where tools like Burp suite together with comprehensive OWASP testing guide will help a lot.

Platform like root-me.org should help to get basic experience in penetration testing.

It worth to note two things.

1. We have to be careful with international joint initiatives and institutions. In many cases it is always better to use a power of a whole world rather than efforts of just single country or even groups of countries, but unfortunately such initiatives and institutions are often used as an instrument of global politics against country's interests and security (e.g. credit ratings).
2. Law requires to migrate to software which is not belong to or affiliated with at any form with the list of countries with hostile attitude towards Russia by January 2025. It means we have to find or develop alternative tools to security scanner, Burp suite etc.

What is else left?

Technical document covers many others aspects which are not included into this publication. The tech. doc is available by this link

Solution

Decree No. 250 covers the entire list of state organizations, regardless of their size and available budget. However, the implementation of measures aimed to ensuring information security must take into account the available state organization's budget, so that these measures do not become an unbearable burden. Hence, a conflict is possible between the information security system built in the organization and the requirements of regulatory/supervisory authorities.

The main method of testing the state of an organization's information security should be penetration testing. Perhaps it makes sense instead of hiring an individual in the government organization (to each hospital), agree on regular penetration testing by a third party for the entire city-district. This will provide an opportunity to attract more highly qualified specialists and reduce the overall costs for all government organizations (in this case hospitals) of the city.

Thus, the required minimum measures for a children's city hospital are:

1. Organization of penetration testing for the purpose of stealing documents (data) and system failure.
2. Organizing a DDOS attack (an attack on an organization’s systems leading to system failure).
3. Based on the results of this testing, drawing up recommendations for the organization to eliminate vulnerabilities and the necessary training for the organization’s employees.
4. Implementation of measures to eliminate vulnerabilities.
5. Drawing up a test for knowledge of information security fundamentals, taking into account the results of previous penetration testing, for employees of the organization.
6. Testing the organization's employees for knowledge of information security basics.
7. Training of employees of the organization, taking into account the result of previous penetration testing.
8. Repeated testing of the organization's employees for knowledge of the basics of information security in order to understand whether the training at the fifth step gave any results, and how the training needs to be adjusted to get the desired results.
9. Preparation of legal documents confirming that the organization complies with the requirements of laws in the field of information security (Decree No. 250, Russian Government Decree No. 1272, No. 152, and everything related to the cue)
10. Repeat as necessary (at least once a year)

The city children's hospital is included in the list of critical information infrastructure (CII). The legal requirements for CII were formulated much earlier than Decree No. 250 and it is assumed that the hospital has already implemented these requirements.

In the case of a conflict with regulatory and inspection authorities, it is necessary to expand the list of measures above to the required level.
It is worth noting that this list of measures already in this form conflicts with Decree No. 250 and Government Decree of the Russian Federation No. 1272, that the official responsible for the organization’s information security, by signing this document and limiting himself only to it, comes into conflict with the current legislation - breaks the law.
However, full compliance with the law places a heavy burden on the organization and budget - also an extreme that must be avoided. A possible solution should be sought in negotiations with a lawyer and the city administration.

A few related posts:
Broad vs Narrow specialisation
Three ideas to make healthcare better in Belgorod region, Russia