Csess
Csess
Adapted from:
“Healthcare Cybersecurity Essentials”
(developed by Ministry of Health in consultation with the
Cyber Security Agency of Singapore)
Version 1.1
CONTENTS
1. Introduction ................................................................................................................................................ 2
2. Scope ........................................................................................................................................................... 3
3. Step 1: Create IT asset inventory .......................................................................................................... 4
4. Step 2: Secure data, detect, respond to, and recover from breaches ......................................... 5
4.1 Technical ................................................................................................................................................... 5
4.2 Process.................................................................................................................................................... 11
4.3 People ...................................................................................................................................................... 13
5. Step 3: Implement by putting measures into practice .................................................................. 14
6. Contact Information .................................................................................................................................... 15
Page 1 of 15
1. INTRODUCTION
1.1 Protecting client’s personal data and maintaining its confidentiality, integrity and
availability is an important part of managing risk, enabling charities and social service
professionals to deliver accurate and appropriate care, and to uphold clients’ safety.
As social service agencies (“SSAs”) and charities (collectively referred to as “service
providers”) embark on their digitalisation journey and continue to rely on technology to
run their day-to-day operations, it is important to put in place measures to protect
personal data within electronic records.
1.2 Cyber-attacks are particularly threatening to the social service and charities
sector as service providers handle and store patients’ private information (such as
contact information, financial and social status details) that may be of value to data
thieves in abusing such information for financial gain. Moreover, if records or systems
parameters are maliciously altered, this may disrupt service providers’ ability to deliver
appropriate services. Hence, cybersecurity is critical to the provision of quality and
safe social services in ensuring client security and welfare.
1.3 The rise in cyber incidents gives rise to a need to establish a set of baseline
security standards for the social service and charities sector. This document
(‘Cybersecurity Essentials’) aims to strengthen cybersecurity awareness by sensitising
service providers to and signaling the importance of cybersecurity as a critical part of
their operations.
Page 2 of 15
2. OBJECTIVE AND SCOPE
3.1 The recommendations under CSE are broadly structured into three sub-
sections: (i) “Why is this important?”, which explains the rationale and importance for
the recommendations which are contextualised to the social services and charities
sector; (ii) “What should service providers do?”, which sets out concrete actions
service providers can take; and (iii) Tips”, which suggest additional actions the service
providers can do to further improve their cybersecurity posture.
Page 3 of 15
4. STEP 1: CREATE IT ASSET INVENTORY
4.1.1 Creating and maintaining an updated inventory of all IT assets enables service
providers to identify what they need to protect and detect unauthorised hardware or
software in their network. Non-corporate devices (e.g., personal laptops or devices)
may have security bugs which could be exploited or malware which may compromise
them. Having only software which is needed for social service and charity operations
means that the providers may be exposed to fewer security bugs which could be
exploited and have fewer software which needs to be kept up to date.
4.2.1 For a start, service providers should physically count and list all assets
connected to the corporate IT network. This includes:
Hardware such as PCs, laptops, printers, modems, and network routers;
Software such as client management and electronic case records systems,
accounting, and HR software, Word, and Excel; and
Devices with network connectivity.
Page 4 of 15
5. STEP 2: SECURE DATA, DETECT, RESPOND TO, AND
RECOVER FROM BREACHES
The recommendations under Step 2 covers areas ranging from technical, process
and people aspects (“TPP”).
5.1 TECHNICAL
Page 5 of 15
Investigate any suspicious use of dormant accounts.
Tips!
Grant user account privileges according to what each staff requires to carry
out his/her work. For example:
o An administration staff should not require access to clients’’ case notes
and should not need to edit the case notes.
o A network administrator should not require access to client and
corporate data.
Monitor all administrator accounts and ensure that their actions are verified
or authorised.
b) Multi-Factor Authentication
(2) Requiring multiple factors makes it more difficult for an attacker to gain
access. If one factor is compromised, the attacker still has at least one more
barrier to breach before successfully breaking into the target.
Tips!
Ensure the second factor of authentication is performed through a separate
communication channel e.g., using PC for first factor and mobile device for
second factor.
Manage and audit the use of each authentication factor.
Page 6 of 15
c) Security Patches
(2) Users should update their software regularly, otherwise attackers can
use such flaws to break into corporate networks and steal data, or even
cause malfunction of IT systems and devices and compromise client care.
Tips!
Standardise the software used in the organisation to make updating more
manageable, thereby reducing operating costs.
Manage the updating process centrally and consider using automated patch
management solutions so that they can easily identify all the updated
software, as well as outdated applications or operating systems.
Proactively prepare their organisation to use a new software from a vendor
that offers support and service to inform customers when one of their
software is about to or has reached the end of its lifespan.
Page 7 of 15
d) Malware Protection
(2) One type of malware that is particularly common in the social service
and charities sector is ransomware. Ransomware prevents access to
important data or causes malfunction of systems – case, personnel and
financial information systems, databases containing client records, and
devices – until the victim makes a payment. Depending on the access
obtained, an attacker might also be able to read, modify, export and even
publicly release digital client records.
(3) There are various ways in which malware can find its way onto a
computer. A user may open an infected email attachment, browse a
malicious website, or use a removable storage drive, such as a USB
memory stick, which is carrying malware.
Page 8 of 15
Tips!
Install an application control solution that is integrated with antivirus software
that uses both whitelisting and blacklisting approaches to prevent
unauthorised applications including malware from running. The whitelist
takes reference from the list of organisation’s authorised assets.
Review the list of block applications from the application control solution and
remove all unnecessary applications.
Deploy additional anti-malware protection measures depending on the set-
up (e.g., anti-virus and spam filters for email servers, web content filtering
and whitelisting of web domains for web proxy servers).
f) Audit Logs
Page 9 of 15
5.1.12 What should service providers do?
(1) Service providers should:
Ensure that users’ audit trails and security logging is enabled on all
IT systems and devices or keep a manual log if this is not possible.
Maintain log-in rules properly and review them periodically.
Ensure that only authorised individuals have access to the security
logs.
Constantly monitor and review audit trails and security logs to
determine if systems have been breached, flag out possible
inappropriate access or suspicious behavior to the heads of
organisations.
Tips!
If service providers want to do more, they can roll out a centralised audit trail so
that all security logs are consolidated in a separate location for easier monitoring
and security.
g) Backups
Page 10 of 15
5.2 PROCESS
(3) If service providers are using cloud services, they should ensure the
division of responsibilities for setting security configurations is clearly
defined and understood.
Page 11 of 15
b) Incident Reporting
(2) The service providers are strongly encouraged to report cyber incidents
to SingCERT at https://www.csa.gov.sg/singcert/reporting. This includes
Phishing, extortion, scam emails
Phishing websites
Ransomware attacks
Website defacements
Malware hosting/Command and Control Servers
Unauthorised attempts (either failed or successful) to disrupt or
gain access to a network, system, or its data
(3) If the service providers suspect that they may have been a victim of
cybercrime, they should also lodge a police report at
https://eservices.police.gov.sg/.
Page 12 of 15
Tips!
Form a dedicated incident response team (with trained personnel) to be the main
point of contact for dealing with cybersecurity incidents in the organisation,
including detection and mitigation of cybersecurity incidents and restoration of
organisation’s functions.
5.3 PEOPLE
a) Cybersecurity Awareness
(2) It has been reported that users are responsible for detecting up to 95%
of cyber incidents 1 .There are many reasons why users may not always
follow security practices. These include a lack of knowledge, perceived
inconvenience, forgetfulness and not understanding the link between
individual security behaviours and personal and organisational
consequences. Cybersecurity awareness programmes could help to
address these areas.
(3) One of the most prevalent types of cybercrime is phishing which targets
the users’ behaviour. It is a practice where attackers disguise themselves
as a legitimate individual or reputable organisation in email, instant
messaging and other communication channels to fraudulently obtain
personal details and user credentials to gain access to networks or install
malicious files to distribute trojan malware in the systems.
Page 14 of 15
7. OTHER RESOURCES
(2) For more details on NCSS's initiatives that will support your digitalisation efforts,
please visit our Tech-and-GO! website
(3) In collaboration with DBS Singapore, SSAs and Charities are able to tap on DBS’
#Cyberwellness e-learning platform to uplift their agency’s cyber hygiene practices.
Get in touch with us at Tech-and-GO@ncss.gov.sg to find out more.
Page 15 of 15