HIMSS26: Exploring Clinical Care Resilience as a Continuous Journey

Key Takeaways

  • Malicious actors increasingly target backup systems, complicating recovery for healthcare organizations.
  • Incident Recovery Environments (IREs) provide a temporary solution but should not replace comprehensive disaster recovery plans.
  • The implementation of a zero-trust framework is essential for a robust IRE and effective data security.

Understanding Incident Recovery Environments

The landscape of cyber threats continues to evolve, posing significant risks to healthcare organizations. Among these threats, malicious actors are specifically targeting backup systems, which complicates data recovery processes. To address these challenges, organizations are turning to Incident Recovery Environments (IREs), designed to offer a distinct, air-gapped space for data and system recovery that can facilitate quicker operational turnaround.

Despite their advantages, IREs are not a standalone solution for cyber resilience. Jeffrey Thomas, Senior VP and CTO at Sentara Health, emphasizes that IREs should not be mistaken for a replacement for high availability or effective disaster recovery strategies. He clarifies, “This environment is not a replacement for high availability. It is not a replacement for good disaster recovery,” underscoring that IREs serve as a temporary lifeboat rather than a permanent solution.

IREs function best when integrated into a broader cyber resilience strategy that adopts a holistic and multidisciplinary approach. A crucial element in this framework is the zero-trust architecture. Thomas points out the importance of designing cloud environments with a zero-trust framework to mitigate the replication of the same issues faced in physical data centers. “If you’re not building in cloud with a zero-trust framework, you probably are just replicating the same issues,” he states. This approach advocates for the principle of least privileged access and emphasizes the need to control data flow within the environment, focusing on segmentation and micro-segmentation.

Facilitating appropriate access during downtime is another critical consideration. Thomas describes his team’s strategy to allow clinicians to access critical data through mobile devices that operate on a secure system. He notes, “Our clinicians sit in those hospitals; they do not sit in that data center,” indicating the importance of real-time access for healthcare providers. A major challenge lies in ensuring that, even when an IRE is activated, clinicians can access the necessary resources without a direct network connection to the infrastructure.

Moreover, Thomas highlights that the activation of an IRE is not merely an IT decision; it involves the incident command center, integrating both business strategy and technical execution. Validation of their activation process is slated as a part of regular ransomware testing, further emphasizing the imperative for continuous improvement and adaptation of IREs over time.

“The key is that we are constantly developing our IRE,” Thomas states, adding that these are not one-time implementations but an evolving process that incorporates feedback and new capabilities. Regular partnerships with collaborative entities are essential to refine this framework continuously.

In summary, while IREs provide a valuable additional layer of security and continuity in healthcare, they must complement existing disaster recovery measures and a solid cyber resilience strategy, particularly one founded on the zero-trust concept. Organizations that adopt IREs must remain vigilant, innovative, and collaborative to fully harness their potential.

The content above is a summary. For more details, see the source article.

Leave a Comment

Your email address will not be published. Required fields are marked *

ADVERTISEMENT

Become a member

RELATED NEWS

Become a member

Scroll to Top