<  All Posts

NHS DSPT: Protecting Against Cyber Attacks and Data Breaches - B4 System Security

B4.a Secure by Design

Key Point:
Your organisation must design security into your network and information systems to minimise vulnerabilities and ensure that a single point of failure cannot disrupt essential functions.

Overview:
This outcome focuses on embedding security into the design of your systems from the outset, reducing potential vulnerabilities and making recovery from any incidents quicker and easier.

How to Meet the Requirement:
Incorporate secure by design principles into the development of your systems. This involves creating strong boundary defences (e.g., firewalls and intrusion prevention systems) and ensuring that all data flows—both internal and external—are encrypted and validated. Design decisions should also support system recovery in the event of a breach or failure by implementing strategies like network segmentation and automated deployment.

Protect against content-based attacks by implementing solutions that block or filter harmful content before it can enter your network.

Evidence to Provide:

Submit documentation such as:

Ensure your evidence demonstrates how your network and systems are built to be secure by design, with protections in place for both data flows and boundary defences.

Indicators of Good Practice:

B4.b Secure Configuration

Key Point:
Your organisation must ensure that all devices and systems are securely configured to reduce vulnerabilities and limit potential attack surfaces.

Overview:
This outcome focuses on the secure configuration of your organisation’s systems and devices, ensuring they are properly set up to minimise risks from cyber threats. This includes disabling unnecessary services and implementing strong access controls.

How to Meet the Requirement:
Identify and document the assets that need secure configuration, such as network devices, firewalls, and servers. Use secure platform builds for all devices, and disable unnecessary services and features to reduce the attack surface. Regularly review and approve changes to security configurations, and ensure only authorised software can be installed on devices.

Evidence to Provide:

Provide documents like:

Ensure your evidence demonstrates robust configuration management and secure builds for devices and systems.

Indicators of Good Practice:

B4.c Secure Management

Key Point:
You must effectively manage your organisation’s networks and systems to ensure ongoing security, including administration, malware prevention, and maintaining system integrity.

Overview:
This outcome ensures that robust management practices are in place to secure your organisation’s networks and systems. This includes separating administrative activities from standard user tasks and implementing malware protection measures.

How to Meet the Requirement:
Implement administration policies where privileged operations are only performed on trusted devices, separate from standard user activities. Ensure that third-party administrators follow these protocols as well. Use technical controls to prevent, detect, and remove malware, including email filtering, file scanning, and anti-malware software.

Additionally, enforce acceptable use policies to educate staff on safe usage practices, and ensure physical security measures like port locks are in place.

Evidence to Provide:
Submit evidence such as:

Ensure your documentation shows that your networks and systems are effectively managed and secured against both internal and external threats.

Indicators of Good Practice:

B4.d Vulnerability Management

Key Point:
Your organisation must proactively identify and manage vulnerabilities in your systems to prevent potential impacts on essential functions.

Overview:
This outcome ensures that your organisation has processes in place to identify, assess, and mitigate vulnerabilities in your network and systems. This includes regularly updating systems, applying patches, and conducting vulnerability testing.

How to Meet the Requirement:
Implement a process for tracking publicly known vulnerabilities from software manufacturers and other trusted sources, including alerts from NHS England’s National Cyber Security Operations Centre (CSOC). Vulnerabilities should be prioritised based on risk, with patches applied promptly to address high-risk issues.

In areas where vulnerabilities cannot be immediately patched, apply temporary mitigations like network isolation or enhanced monitoring. Conduct regular vulnerability testing such as penetration tests to ensure a thorough understanding of your system’s weaknesses.

Evidence to Provide:
Submit documents such as:

Ensure your documentation demonstrates that vulnerabilities are regularly identified, prioritised, and mitigated in a timely manner.

Indicators of Good Practice:

Strengthen your organisation’s system security with Periculo. From secure system design and configuration to managing vulnerabilities, we can help you build a resilient cybersecurity strategy that protects your essential functions. Contact us today to secure your systems and mitigate cyber risks!

Protecting Digital Health Solutions

Contact Periculo for expert cyber security solutions tailored to the digital health industry.

Subscribe
Stay updated with our newsletter for the latest features and releases.
By subscribing, you agree to our Privacy Policy and consent to receive updates from us.
Thank you! Subscription received.
Oops! Something went wrong. Please try again.