Cargando…

Resilienz gegen IT-Angriffe an Kliniken: Ergebnisse einer Stabsrahmenübung an einem Universitätsklinikum

BACKGROUND: According to the legal definition healthcare systems and their components (e.g., hospitals) are part of the critical infrastructure of modern industrial nations. During the last few years hospitals increasingly became targets of cyber attacks causing severe impairment of their operabilit...

Descripción completa

Detalles Bibliográficos
Autores principales: Pfenninger, E. G., Schmidt, S. A., Rohland, C., Peters, S., McNutt, D., Kaisers, U. X., Königsdorfer, M.
Formato: Online Artículo Texto
Lenguaje:English
Publicado: Springer Medizin 2023
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10691995/
https://www.ncbi.nlm.nih.gov/pubmed/37725142
http://dx.doi.org/10.1007/s00101-023-01331-y
_version_ 1785152846230978560
author Pfenninger, E. G.
Schmidt, S. A.
Rohland, C.
Peters, S.
McNutt, D.
Kaisers, U. X.
Königsdorfer, M.
author_facet Pfenninger, E. G.
Schmidt, S. A.
Rohland, C.
Peters, S.
McNutt, D.
Kaisers, U. X.
Königsdorfer, M.
author_sort Pfenninger, E. G.
collection PubMed
description BACKGROUND: According to the legal definition healthcare systems and their components (e.g., hospitals) are part of the critical infrastructure of modern industrial nations. During the last few years hospitals increasingly became targets of cyber attacks causing severe impairment of their operability for weeks or even months. According to the German federal strategy for protection of critical infrastructures (KRITIS strategy), hospitals are obligated to take precautions against potential cyber attacks or other IT incidents. OBJECTIVE: This article describes the process of planning, execution and results of an advanced table-top exercise which took place in a university hospital in Germany and simulated the first 3 days after a cyber attack causing a total failure of highly critical IT systems. MATERIAL AND METHODS: During a first stage lasting about 8 months IT-dependent processes within the clinical routine were identified and analyzed. Then paper-based and off-line back-up processes and workarounds were developed and department-specific emergency plans were defined. Finally, selected central facilities such as pharmacy, laboratory, radiology, IT and the hospitals crisis management team took part in the actual disaster exercise. Afterwards the participants were asked to evaluate the exercise and the hospitals cyber security using a questionnaire. On this basis the authors visualized the hospitalʼs resilience against cyber incidents and defined short-term, medium-term and long-term needs for action. RESULTS: Of the participants 85% assessed the exercise as beneficial, 97% indicated that they received adequate support during the preparations and 75% had received sufficient information; however, only 34% had the opinion that the hospitalʼs and their own preparedness against critical IT failures were sufficient. Before the exercise took place, IT-specific emergency plans were present only in 1.7% of the hospital facilities but after the exercise in 86.7% of the clinical and technical departments. The highest resilience against cyber attacks was not surprisingly reported by facilities that still work routinely with paper-based or off-line processes, the IT department showed the lowest resilience as it would come to a complete shutdown in cases of a total IT failure. CONCLUSION: The authors concluded that the planning phase is the most important stage of developing the whole exercise, giving the best opportunity for working out fallback levels and workarounds and through this strengthen the hospitals resilience against cyber attacks and comparable incidents. A meticulous preparedness can minimize the severe effects a total IT failure can cause on patient care, staff and the hospital as a whole.
format Online
Article
Text
id pubmed-10691995
institution National Center for Biotechnology Information
language English
publishDate 2023
publisher Springer Medizin
record_format MEDLINE/PubMed
spelling pubmed-106919952023-12-03 Resilienz gegen IT-Angriffe an Kliniken: Ergebnisse einer Stabsrahmenübung an einem Universitätsklinikum Pfenninger, E. G. Schmidt, S. A. Rohland, C. Peters, S. McNutt, D. Kaisers, U. X. Königsdorfer, M. Anaesthesiologie Originalien BACKGROUND: According to the legal definition healthcare systems and their components (e.g., hospitals) are part of the critical infrastructure of modern industrial nations. During the last few years hospitals increasingly became targets of cyber attacks causing severe impairment of their operability for weeks or even months. According to the German federal strategy for protection of critical infrastructures (KRITIS strategy), hospitals are obligated to take precautions against potential cyber attacks or other IT incidents. OBJECTIVE: This article describes the process of planning, execution and results of an advanced table-top exercise which took place in a university hospital in Germany and simulated the first 3 days after a cyber attack causing a total failure of highly critical IT systems. MATERIAL AND METHODS: During a first stage lasting about 8 months IT-dependent processes within the clinical routine were identified and analyzed. Then paper-based and off-line back-up processes and workarounds were developed and department-specific emergency plans were defined. Finally, selected central facilities such as pharmacy, laboratory, radiology, IT and the hospitals crisis management team took part in the actual disaster exercise. Afterwards the participants were asked to evaluate the exercise and the hospitals cyber security using a questionnaire. On this basis the authors visualized the hospitalʼs resilience against cyber incidents and defined short-term, medium-term and long-term needs for action. RESULTS: Of the participants 85% assessed the exercise as beneficial, 97% indicated that they received adequate support during the preparations and 75% had received sufficient information; however, only 34% had the opinion that the hospitalʼs and their own preparedness against critical IT failures were sufficient. Before the exercise took place, IT-specific emergency plans were present only in 1.7% of the hospital facilities but after the exercise in 86.7% of the clinical and technical departments. The highest resilience against cyber attacks was not surprisingly reported by facilities that still work routinely with paper-based or off-line processes, the IT department showed the lowest resilience as it would come to a complete shutdown in cases of a total IT failure. CONCLUSION: The authors concluded that the planning phase is the most important stage of developing the whole exercise, giving the best opportunity for working out fallback levels and workarounds and through this strengthen the hospitals resilience against cyber attacks and comparable incidents. A meticulous preparedness can minimize the severe effects a total IT failure can cause on patient care, staff and the hospital as a whole. Springer Medizin 2023-09-19 2023 /pmc/articles/PMC10691995/ /pubmed/37725142 http://dx.doi.org/10.1007/s00101-023-01331-y Text en © The Author(s) 2023 https://creativecommons.org/licenses/by/4.0/Open Access Dieser Artikel wird unter der Creative Commons Namensnennung 4.0 International Lizenz veröffentlicht, welche die Nutzung, Vervielfältigung, Bearbeitung, Verbreitung und Wiedergabe in jeglichem Medium und Format erlaubt, sofern Sie den/die ursprünglichen Autor(en) und die Quelle ordnungsgemäß nennen, einen Link zur Creative Commons Lizenz beifügen und angeben, ob Änderungen vorgenommen wurden. Die in diesem Artikel enthaltenen Bilder und sonstiges Drittmaterial unterliegen ebenfalls der genannten Creative Commons Lizenz, sofern sich aus der Abbildungslegende nichts anderes ergibt. Sofern das betreffende Material nicht unter der genannten Creative Commons Lizenz steht und die betreffende Handlung nicht nach gesetzlichen Vorschriften erlaubt ist, ist für die oben aufgeführten Weiterverwendungen des Materials die Einwilligung des jeweiligen Rechteinhabers einzuholen. Weitere Details zur Lizenz entnehmen Sie bitte der Lizenzinformation auf http://creativecommons.org/licenses/by/4.0/deed.de (https://creativecommons.org/licenses/by/4.0/) .
spellingShingle Originalien
Pfenninger, E. G.
Schmidt, S. A.
Rohland, C.
Peters, S.
McNutt, D.
Kaisers, U. X.
Königsdorfer, M.
Resilienz gegen IT-Angriffe an Kliniken: Ergebnisse einer Stabsrahmenübung an einem Universitätsklinikum
title Resilienz gegen IT-Angriffe an Kliniken: Ergebnisse einer Stabsrahmenübung an einem Universitätsklinikum
title_full Resilienz gegen IT-Angriffe an Kliniken: Ergebnisse einer Stabsrahmenübung an einem Universitätsklinikum
title_fullStr Resilienz gegen IT-Angriffe an Kliniken: Ergebnisse einer Stabsrahmenübung an einem Universitätsklinikum
title_full_unstemmed Resilienz gegen IT-Angriffe an Kliniken: Ergebnisse einer Stabsrahmenübung an einem Universitätsklinikum
title_short Resilienz gegen IT-Angriffe an Kliniken: Ergebnisse einer Stabsrahmenübung an einem Universitätsklinikum
title_sort resilienz gegen it-angriffe an kliniken: ergebnisse einer stabsrahmenübung an einem universitätsklinikum
topic Originalien
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10691995/
https://www.ncbi.nlm.nih.gov/pubmed/37725142
http://dx.doi.org/10.1007/s00101-023-01331-y
work_keys_str_mv AT pfenningereg resilienzgegenitangriffeanklinikenergebnisseeinerstabsrahmenubunganeinemuniversitatsklinikum
AT schmidtsa resilienzgegenitangriffeanklinikenergebnisseeinerstabsrahmenubunganeinemuniversitatsklinikum
AT rohlandc resilienzgegenitangriffeanklinikenergebnisseeinerstabsrahmenubunganeinemuniversitatsklinikum
AT peterss resilienzgegenitangriffeanklinikenergebnisseeinerstabsrahmenubunganeinemuniversitatsklinikum
AT mcnuttd resilienzgegenitangriffeanklinikenergebnisseeinerstabsrahmenubunganeinemuniversitatsklinikum
AT kaisersux resilienzgegenitangriffeanklinikenergebnisseeinerstabsrahmenubunganeinemuniversitatsklinikum
AT konigsdorferm resilienzgegenitangriffeanklinikenergebnisseeinerstabsrahmenubunganeinemuniversitatsklinikum