Exploits based on malicious data can only be successful if the data can actually reach a vulnerable product. If untrusted data is prevented from reaching a system, then the likelihood of malicious content reaching the vulnerable system is lowered, and so the risk from malicious content is reduced.
Routes by which malicious data could reach unpatched software include email, web browsing, file shares, network ports, and removable media. We recommend that these routes be reduced for all medical devices. Devices should not be used for end-user activities (such as email or web browsing), and data flows to medical servers should be carefully considered and constrained wherever possible.
Data and files sourced from the Internet should be treated as untrusted even if originating from a known third party. Data retrieved from enterprise storage services should also be treated as untrusted if its source was originally external.
3.1 Prevent access to untrusted services
Implement technical controls to prevent access to external untrusted services from medical devices and associated workstations. This should include preventing access to external email and preventing the device from browsing the internet unless absolutely necessary. These controls will not be effective if they are not technically enforced.
By preventing access via email and the web browser to untrusted content and services, two of the most likely attack vectors for client systems are removed.
3.2 Prevent or reduce access to removable media
Access to removable media should be prevented as it can be used to transport untrusted content. It is also important to consider devices such as smartphones and tablets, which can be used to transfer data, and, if compromised, can also launch attacks against devices they are connected to. Access to removable media and any connected devices can be controlled through numerous mechanisms.
When considering mobile devices, it may be useful to see what the NCSC considered whilst choosing a product to manage all of theirs.
3.3 Constrain network access
When a medical device is connected to untrusted networks via its network interfaces, for example, to allow access by remote workers, it is directly exposed to external network-borne attacks. The only technical mitigation available would be to disable/remove all network access from the device, effectively making them stand-alone devices. This is clearly only possible if the applications on this device do not require access to network services.
Hence, the device could be connected to a physically or logically separate network which only has similar medical applications and their required services on it, which has no direct external connectivity through which malware could get in.
3.4 Remove unnecessary services
Devices should be checked to ensure that they only offer the services required. Those services which are not required to support the business function of the server should be removed or disabled permanently.
3.5 Constrain Remote Access
To reduce the attack surface, medical devices should not be exposed to the wider network. Intrusion prevention systems and application firewalls can be used to help defend against attacks, as can the use of reverse proxy servers.
3.6. User management
User accounts need to be managed appropriately. This means they need to be available for every user with a need to use the system they concern, and they need to allow the user to do their job. Past this, they need to restrict the user’s permissions so that they can’t do anything they shouldn’t.
Accounts need to be managed throughout their lifecycle too. For example, it’s important to delete them as staff leave the business or change jobs.