Cargando…
Resilienz gegen IT-Angriffe an Kliniken: Ergebnisse einer Stabsrahmenübung an einem Universitätsklinikum
BACKGROUND: According to the legal definition healthcare systems and their components (e.g., hospitals) are part of the critical infrastructure of modern industrial nations. During the last few years hospitals increasingly became targets of cyber attacks causing severe impairment of their operabilit...
Autores principales: | , , , , , , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Springer Medizin
2023
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10691995/ https://www.ncbi.nlm.nih.gov/pubmed/37725142 http://dx.doi.org/10.1007/s00101-023-01331-y |
_version_ | 1785152846230978560 |
---|---|
author | Pfenninger, E. G. Schmidt, S. A. Rohland, C. Peters, S. McNutt, D. Kaisers, U. X. Königsdorfer, M. |
author_facet | Pfenninger, E. G. Schmidt, S. A. Rohland, C. Peters, S. McNutt, D. Kaisers, U. X. Königsdorfer, M. |
author_sort | Pfenninger, E. G. |
collection | PubMed |
description | BACKGROUND: According to the legal definition healthcare systems and their components (e.g., hospitals) are part of the critical infrastructure of modern industrial nations. During the last few years hospitals increasingly became targets of cyber attacks causing severe impairment of their operability for weeks or even months. According to the German federal strategy for protection of critical infrastructures (KRITIS strategy), hospitals are obligated to take precautions against potential cyber attacks or other IT incidents. OBJECTIVE: This article describes the process of planning, execution and results of an advanced table-top exercise which took place in a university hospital in Germany and simulated the first 3 days after a cyber attack causing a total failure of highly critical IT systems. MATERIAL AND METHODS: During a first stage lasting about 8 months IT-dependent processes within the clinical routine were identified and analyzed. Then paper-based and off-line back-up processes and workarounds were developed and department-specific emergency plans were defined. Finally, selected central facilities such as pharmacy, laboratory, radiology, IT and the hospitals crisis management team took part in the actual disaster exercise. Afterwards the participants were asked to evaluate the exercise and the hospitals cyber security using a questionnaire. On this basis the authors visualized the hospitalʼs resilience against cyber incidents and defined short-term, medium-term and long-term needs for action. RESULTS: Of the participants 85% assessed the exercise as beneficial, 97% indicated that they received adequate support during the preparations and 75% had received sufficient information; however, only 34% had the opinion that the hospitalʼs and their own preparedness against critical IT failures were sufficient. Before the exercise took place, IT-specific emergency plans were present only in 1.7% of the hospital facilities but after the exercise in 86.7% of the clinical and technical departments. The highest resilience against cyber attacks was not surprisingly reported by facilities that still work routinely with paper-based or off-line processes, the IT department showed the lowest resilience as it would come to a complete shutdown in cases of a total IT failure. CONCLUSION: The authors concluded that the planning phase is the most important stage of developing the whole exercise, giving the best opportunity for working out fallback levels and workarounds and through this strengthen the hospitals resilience against cyber attacks and comparable incidents. A meticulous preparedness can minimize the severe effects a total IT failure can cause on patient care, staff and the hospital as a whole. |
format | Online Article Text |
id | pubmed-10691995 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2023 |
publisher | Springer Medizin |
record_format | MEDLINE/PubMed |
spelling | pubmed-106919952023-12-03 Resilienz gegen IT-Angriffe an Kliniken: Ergebnisse einer Stabsrahmenübung an einem Universitätsklinikum Pfenninger, E. G. Schmidt, S. A. Rohland, C. Peters, S. McNutt, D. Kaisers, U. X. Königsdorfer, M. Anaesthesiologie Originalien BACKGROUND: According to the legal definition healthcare systems and their components (e.g., hospitals) are part of the critical infrastructure of modern industrial nations. During the last few years hospitals increasingly became targets of cyber attacks causing severe impairment of their operability for weeks or even months. According to the German federal strategy for protection of critical infrastructures (KRITIS strategy), hospitals are obligated to take precautions against potential cyber attacks or other IT incidents. OBJECTIVE: This article describes the process of planning, execution and results of an advanced table-top exercise which took place in a university hospital in Germany and simulated the first 3 days after a cyber attack causing a total failure of highly critical IT systems. MATERIAL AND METHODS: During a first stage lasting about 8 months IT-dependent processes within the clinical routine were identified and analyzed. Then paper-based and off-line back-up processes and workarounds were developed and department-specific emergency plans were defined. Finally, selected central facilities such as pharmacy, laboratory, radiology, IT and the hospitals crisis management team took part in the actual disaster exercise. Afterwards the participants were asked to evaluate the exercise and the hospitals cyber security using a questionnaire. On this basis the authors visualized the hospitalʼs resilience against cyber incidents and defined short-term, medium-term and long-term needs for action. RESULTS: Of the participants 85% assessed the exercise as beneficial, 97% indicated that they received adequate support during the preparations and 75% had received sufficient information; however, only 34% had the opinion that the hospitalʼs and their own preparedness against critical IT failures were sufficient. Before the exercise took place, IT-specific emergency plans were present only in 1.7% of the hospital facilities but after the exercise in 86.7% of the clinical and technical departments. The highest resilience against cyber attacks was not surprisingly reported by facilities that still work routinely with paper-based or off-line processes, the IT department showed the lowest resilience as it would come to a complete shutdown in cases of a total IT failure. CONCLUSION: The authors concluded that the planning phase is the most important stage of developing the whole exercise, giving the best opportunity for working out fallback levels and workarounds and through this strengthen the hospitals resilience against cyber attacks and comparable incidents. A meticulous preparedness can minimize the severe effects a total IT failure can cause on patient care, staff and the hospital as a whole. Springer Medizin 2023-09-19 2023 /pmc/articles/PMC10691995/ /pubmed/37725142 http://dx.doi.org/10.1007/s00101-023-01331-y Text en © The Author(s) 2023 https://creativecommons.org/licenses/by/4.0/Open Access Dieser Artikel wird unter der Creative Commons Namensnennung 4.0 International Lizenz veröffentlicht, welche die Nutzung, Vervielfältigung, Bearbeitung, Verbreitung und Wiedergabe in jeglichem Medium und Format erlaubt, sofern Sie den/die ursprünglichen Autor(en) und die Quelle ordnungsgemäß nennen, einen Link zur Creative Commons Lizenz beifügen und angeben, ob Änderungen vorgenommen wurden. Die in diesem Artikel enthaltenen Bilder und sonstiges Drittmaterial unterliegen ebenfalls der genannten Creative Commons Lizenz, sofern sich aus der Abbildungslegende nichts anderes ergibt. Sofern das betreffende Material nicht unter der genannten Creative Commons Lizenz steht und die betreffende Handlung nicht nach gesetzlichen Vorschriften erlaubt ist, ist für die oben aufgeführten Weiterverwendungen des Materials die Einwilligung des jeweiligen Rechteinhabers einzuholen. Weitere Details zur Lizenz entnehmen Sie bitte der Lizenzinformation auf http://creativecommons.org/licenses/by/4.0/deed.de (https://creativecommons.org/licenses/by/4.0/) . |
spellingShingle | Originalien Pfenninger, E. G. Schmidt, S. A. Rohland, C. Peters, S. McNutt, D. Kaisers, U. X. Königsdorfer, M. Resilienz gegen IT-Angriffe an Kliniken: Ergebnisse einer Stabsrahmenübung an einem Universitätsklinikum |
title | Resilienz gegen IT-Angriffe an Kliniken: Ergebnisse einer Stabsrahmenübung an einem Universitätsklinikum |
title_full | Resilienz gegen IT-Angriffe an Kliniken: Ergebnisse einer Stabsrahmenübung an einem Universitätsklinikum |
title_fullStr | Resilienz gegen IT-Angriffe an Kliniken: Ergebnisse einer Stabsrahmenübung an einem Universitätsklinikum |
title_full_unstemmed | Resilienz gegen IT-Angriffe an Kliniken: Ergebnisse einer Stabsrahmenübung an einem Universitätsklinikum |
title_short | Resilienz gegen IT-Angriffe an Kliniken: Ergebnisse einer Stabsrahmenübung an einem Universitätsklinikum |
title_sort | resilienz gegen it-angriffe an kliniken: ergebnisse einer stabsrahmenübung an einem universitätsklinikum |
topic | Originalien |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10691995/ https://www.ncbi.nlm.nih.gov/pubmed/37725142 http://dx.doi.org/10.1007/s00101-023-01331-y |
work_keys_str_mv | AT pfenningereg resilienzgegenitangriffeanklinikenergebnisseeinerstabsrahmenubunganeinemuniversitatsklinikum AT schmidtsa resilienzgegenitangriffeanklinikenergebnisseeinerstabsrahmenubunganeinemuniversitatsklinikum AT rohlandc resilienzgegenitangriffeanklinikenergebnisseeinerstabsrahmenubunganeinemuniversitatsklinikum AT peterss resilienzgegenitangriffeanklinikenergebnisseeinerstabsrahmenubunganeinemuniversitatsklinikum AT mcnuttd resilienzgegenitangriffeanklinikenergebnisseeinerstabsrahmenubunganeinemuniversitatsklinikum AT kaisersux resilienzgegenitangriffeanklinikenergebnisseeinerstabsrahmenubunganeinemuniversitatsklinikum AT konigsdorferm resilienzgegenitangriffeanklinikenergebnisseeinerstabsrahmenubunganeinemuniversitatsklinikum |