+ All Categories
Home > Documents > Security on FHIR - FHIR DevDays€¦ · Hospital system with a web-based EHR Patient-facing FHIR...

Security on FHIR - FHIR DevDays€¦ · Hospital system with a web-based EHR Patient-facing FHIR...

Date post: 27-Sep-2020
Category:
Upload: others
View: 5 times
Download: 0 times
Share this document with a friend
72
Security on FHIR Andrew Marcus Healthcare Technologist, Asymmetrik Ltd Redmond, 10-12 June | @HL7 @Asymmetrik | #fhirdevdays | asymmetrik.com/healthcare HL7®, FHIR® and the flame Design mark are registered trademarks of Health Level Seven International and are used w ith permission.
Transcript
Page 1: Security on FHIR - FHIR DevDays€¦ · Hospital system with a web-based EHR Patient-facing FHIR app Poorly-implemented SMART- on -FHIR Server RECON ... Open-Source reconnaissance

Security on FHIR

Andrew Marcus

Healthcare Technologist, Asymmetrik Ltd

Redmond, 10-12 June | @HL7 @Asymmetrik | #fhirdevdays | asymmetrik.com/healthcare

HL7®, FHIR® and the f lame Design mark are registered trademarks of Health Level Seven International and are used w ith permiss ion.

Page 2: Security on FHIR - FHIR DevDays€¦ · Hospital system with a web-based EHR Patient-facing FHIR app Poorly-implemented SMART- on -FHIR Server RECON ... Open-Source reconnaissance

Globally, in 2018:

● 41K+ reported incidents, 2,013 confirmed breaches

● Most common: stolen credentials, unpatched vulnerabilities

● Social engineering and denial of service are on the rise

● On average, it took 197 days to detect a breach

Sources: Verizon Data Breach Investigation Report 2019 and IBM Ponemon Institute Cost of Data Breach Study 2018

Page 3: Security on FHIR - FHIR DevDays€¦ · Hospital system with a web-based EHR Patient-facing FHIR app Poorly-implemented SMART- on -FHIR Server RECON ... Open-Source reconnaissance

How does healthcare compare?

Source: Verizon Data Breach Investigation

Report 2019

2 out of 3 incidents

resulted in breaches

15% of all breaches,

2nd-highest industry

after public sector

Page 4: Security on FHIR - FHIR DevDays€¦ · Hospital system with a web-based EHR Patient-facing FHIR app Poorly-implemented SMART- on -FHIR Server RECON ... Open-Source reconnaissance

We can do better

Page 5: Security on FHIR - FHIR DevDays€¦ · Hospital system with a web-based EHR Patient-facing FHIR app Poorly-implemented SMART- on -FHIR Server RECON ... Open-Source reconnaissance

Let’s hack FHIR!

1. We will walk through a theoretical scenario

2. Live demo at Let’s Build! session this afternoon

3. Try it yourself at the

security table in McKinley

Page 6: Security on FHIR - FHIR DevDays€¦ · Hospital system with a web-based EHR Patient-facing FHIR app Poorly-implemented SMART- on -FHIR Server RECON ... Open-Source reconnaissance

* apologies to South Park

Cyber-Criminal Business Plan

Phase 1 Phase 2 Phase 3

Download hacker tools Profit!

Page 7: Security on FHIR - FHIR DevDays€¦ · Hospital system with a web-based EHR Patient-facing FHIR app Poorly-implemented SMART- on -FHIR Server RECON ... Open-Source reconnaissance

Cyber Kill Chain

RECON

LURE

LATERAL MOVEMENT

ESCALATION

DOMAIN COMPROMISE

DATA THEFT

COMPROMISE

Each attack is unique,

but follows a pattern

Page 8: Security on FHIR - FHIR DevDays€¦ · Hospital system with a web-based EHR Patient-facing FHIR app Poorly-implemented SMART- on -FHIR Server RECON ... Open-Source reconnaissance

FHIR is just like the rest of the internet

● Same technologies

● Same vulnerabilities

● Same hacking techniques

Page 9: Security on FHIR - FHIR DevDays€¦ · Hospital system with a web-based EHR Patient-facing FHIR app Poorly-implemented SMART- on -FHIR Server RECON ... Open-Source reconnaissance

Before:

● Everything inside the hospital

● Secure the perimeter

Now:

● Open on the internet

● Secure everything

Out of the walled garden

Page 10: Security on FHIR - FHIR DevDays€¦ · Hospital system with a web-based EHR Patient-facing FHIR app Poorly-implemented SMART- on -FHIR Server RECON ... Open-Source reconnaissance

Defense is both deep and broad

Defense in Depth:

● Build security at every layer

Limit the Blast Radius:

● Ensure a breach in one system can’t spread

Page 11: Security on FHIR - FHIR DevDays€¦ · Hospital system with a web-based EHR Patient-facing FHIR app Poorly-implemented SMART- on -FHIR Server RECON ... Open-Source reconnaissance

Set the stage

Hospital system with a web-based EHR

Patient-facing FHIR app

Poorly-implemented SMART-on-FHIR Server

RECON

Page 12: Security on FHIR - FHIR DevDays€¦ · Hospital system with a web-based EHR Patient-facing FHIR app Poorly-implemented SMART- on -FHIR Server RECON ... Open-Source reconnaissance

• Closed ports

• Security patches

• Logging and monitoring

• Encryption

• Micro-segmentation

• Fine-grained permissions

Let’s assume basic network security

Page 13: Security on FHIR - FHIR DevDays€¦ · Hospital system with a web-based EHR Patient-facing FHIR app Poorly-implemented SMART- on -FHIR Server RECON ... Open-Source reconnaissance

To our knowledge, the attack

you are about to see hasn’t actually happened

But parts of it probably have

Disclaimers

Don’t do anything illegal

Page 14: Security on FHIR - FHIR DevDays€¦ · Hospital system with a web-based EHR Patient-facing FHIR app Poorly-implemented SMART- on -FHIR Server RECON ... Open-Source reconnaissance

Let’s Begin!

Login to a FHIR app as a patient

Source: Prince of Persia (1989) on Wikimedia Commons

LURE

Page 15: Security on FHIR - FHIR DevDays€¦ · Hospital system with a web-based EHR Patient-facing FHIR app Poorly-implemented SMART- on -FHIR Server RECON ... Open-Source reconnaissance

Download a breach list

14 million stolen usernames and

passwords available on GitHub

Many more on the dark web

Humans are predictable

Source: https://wpengine.com/unmasked

Page 16: Security on FHIR - FHIR DevDays€¦ · Hospital system with a web-based EHR Patient-facing FHIR app Poorly-implemented SMART- on -FHIR Server RECON ... Open-Source reconnaissance

Open-Source reconnaissance

Identify a user in the breach list who is a patient at the hospital

Use social media

● Where do they live?

● Have they ever “checked in” at the hospital?

Whose account can

we exploit?

Page 17: Security on FHIR - FHIR DevDays€¦ · Hospital system with a web-based EHR Patient-facing FHIR app Poorly-implemented SMART- on -FHIR Server RECON ... Open-Source reconnaissance

A defender needs to be right every time

A hacker needs to be right only once

Page 18: Security on FHIR - FHIR DevDays€¦ · Hospital system with a web-based EHR Patient-facing FHIR app Poorly-implemented SMART- on -FHIR Server RECON ... Open-Source reconnaissance

Attack!

Try usernames and passwords until you find one that works

COMPROMISE Source: Prince of Persia (1989) on Wikimedia Commons

Page 19: Security on FHIR - FHIR DevDays€¦ · Hospital system with a web-based EHR Patient-facing FHIR app Poorly-implemented SMART- on -FHIR Server RECON ... Open-Source reconnaissance

The hospital should:

● See many failed login attempts

● Temporarily lock account

But competent cyber-criminals

will move low and slow

Won’t they notice?

Page 20: Security on FHIR - FHIR DevDays€¦ · Hospital system with a web-based EHR Patient-facing FHIR app Poorly-implemented SMART- on -FHIR Server RECON ... Open-Source reconnaissance

You can’t prevent password reuse

You can prevent username reuse

● Auto-generate usernames

○ Patient ID, MRN, random…

● Don’t use email addresses as usernames

Prevent reuse

Stolen credentials are often the easiest way to get in

How can this be prevented?

Page 21: Security on FHIR - FHIR DevDays€¦ · Hospital system with a web-based EHR Patient-facing FHIR app Poorly-implemented SMART- on -FHIR Server RECON ... Open-Source reconnaissance

Slow them down

● Force 2FA everywhere

● Limit failed login attempts

by username, IP address,

HTTP headers...

How can this be prevented?

2FA can be cracked too, but it is much harder

Page 22: Security on FHIR - FHIR DevDays€¦ · Hospital system with a web-based EHR Patient-facing FHIR app Poorly-implemented SMART- on -FHIR Server RECON ... Open-Source reconnaissance

Level 1 Complete

Congratulations!

You’ve logged into a healthcare app as a patient

Single record breach Fine: up to $50,000

Source: Prince of Persia (1989) on Wikimedia Commons

COMPROMISE

Page 23: Security on FHIR - FHIR DevDays€¦ · Hospital system with a web-based EHR Patient-facing FHIR app Poorly-implemented SMART- on -FHIR Server RECON ... Open-Source reconnaissance

Examine FHIR network requests

Now that you’re logged in, watch the FHIR payloads

Grab the OAuth2 token

Can you create your own requests?

Page 24: Security on FHIR - FHIR DevDays€¦ · Hospital system with a web-based EHR Patient-facing FHIR app Poorly-implemented SMART- on -FHIR Server RECON ... Open-Source reconnaissance

Suppose the app needs:

● Patient narrative

● Blood pressure observations

Scopes:

● patient/Patient.*

● patient/Observation.read

What data can the app see?

What else can it see?

● Patient contact info

● Patient demographics

● Weight/BMI

● HIV test results

● Pregnancy test results

● Any other observation...

Page 25: Security on FHIR - FHIR DevDays€¦ · Hospital system with a web-based EHR Patient-facing FHIR app Poorly-implemented SMART- on -FHIR Server RECON ... Open-Source reconnaissance

A server may trust how an app protects data

A hacker can see anything the app can see

But what if the app is compromised?

Page 26: Security on FHIR - FHIR DevDays€¦ · Hospital system with a web-based EHR Patient-facing FHIR app Poorly-implemented SMART- on -FHIR Server RECON ... Open-Source reconnaissance

Attack!

Request every FHIR resource your token gives you access to

COMPROMISE Source: Prince of Persia (1989) on Wikimedia Commons

Page 27: Security on FHIR - FHIR DevDays€¦ · Hospital system with a web-based EHR Patient-facing FHIR app Poorly-implemented SMART- on -FHIR Server RECON ... Open-Source reconnaissance

● An app should precisely

state what it needs

● A server should strictly

enforce app access rules

Ideas for refining scope:

● Category filter

● Query parameters

● Security labels

● JSON-based scope doc

● Allow/deny syntax

Limit scopes further

How can this be prevented?

FHIR doesn’t define a standard way to do this yet

Page 28: Security on FHIR - FHIR DevDays€¦ · Hospital system with a web-based EHR Patient-facing FHIR app Poorly-implemented SMART- on -FHIR Server RECON ... Open-Source reconnaissance

Congratulations!

You’ve accessed more of a patient’s record than you were supposed to

We didn’t even break any rules

Level 2 Complete

Source: Prince of Persia (1989) on Wikimedia Commons

Page 29: Security on FHIR - FHIR DevDays€¦ · Hospital system with a web-based EHR Patient-facing FHIR app Poorly-implemented SMART- on -FHIR Server RECON ... Open-Source reconnaissance

Cross-Site Scripting (XSS)

Inject malicious javascript onto a webpage, attack each visitor

Option 1: Manipulate a URL

● Not persistent

● Requires sharing a URL

Option 2: Persistent storage

● Inject into the database ● Upload into the file system

Inject malicious code

onto a webpage

Page 30: Security on FHIR - FHIR DevDays€¦ · Hospital system with a web-based EHR Patient-facing FHIR app Poorly-implemented SMART- on -FHIR Server RECON ... Open-Source reconnaissance

What can you do with XSS? All kinds of bad things!

● Steal session cookies

● Steal auth tokens

● Log key presses

● Steal any data the user sees

● Install a remote web shell

● ...

Page 31: Security on FHIR - FHIR DevDays€¦ · Hospital system with a web-based EHR Patient-facing FHIR app Poorly-implemented SMART- on -FHIR Server RECON ... Open-Source reconnaissance

Attack!

Our scope allows us to write to

the Patient’s record

Post malicious javascript to the Narrative field

ESCALATION Source: Prince of Persia (1989) on Wikimedia Commons

Page 32: Security on FHIR - FHIR DevDays€¦ · Hospital system with a web-based EHR Patient-facing FHIR app Poorly-implemented SMART- on -FHIR Server RECON ... Open-Source reconnaissance

If you must allow writes:

● Use an XSS validator library to scrub out all active elements

● http://hl7.org/fhir/narrative.html

Better:

● Auto-generate narrative

Clean the Narrative

Don’t write your own regex: use a trusted library

How can this be prevented?

Page 33: Security on FHIR - FHIR DevDays€¦ · Hospital system with a web-based EHR Patient-facing FHIR app Poorly-implemented SMART- on -FHIR Server RECON ... Open-Source reconnaissance

Congratulations!

You’ve altered a patient record

You’ve injected malicious code into the health system

Now wait patiently...

Level 3 Complete

Source: Prince of Persia (1989) on Wikimedia Commons

Page 34: Security on FHIR - FHIR DevDays€¦ · Hospital system with a web-based EHR Patient-facing FHIR app Poorly-implemented SMART- on -FHIR Server RECON ... Open-Source reconnaissance

Password Cracking

Brute force passwords by

computing all possibilities offline

At 500 billion guesses per second:

● 8 characters in 5 minutes

● 9 characters in 10 minutes...

Specialized GPU hardware: 500 GHz

Easy to parallelize

GPUs are available in the cloud

Not as hard as before

Quantum is not required

Page 35: Security on FHIR - FHIR DevDays€¦ · Hospital system with a web-based EHR Patient-facing FHIR app Poorly-implemented SMART- on -FHIR Server RECON ... Open-Source reconnaissance

Attack!

Attempt to brute-force the

patient’s OAuth2 token

Figure out the client secret

COMPROMISE Source: Prince of Persia (1989) on Wikimedia Commons

Page 36: Security on FHIR - FHIR DevDays€¦ · Hospital system with a web-based EHR Patient-facing FHIR app Poorly-implemented SMART- on -FHIR Server RECON ... Open-Source reconnaissance

● Use really long secrets

or PEM certificates as secrets

● Protect client secrets

behind a server

● Scrub secrets from logs

● Encrypt every payload

Protect your secrets

Never expose client secrets in web or mobile apps

How can this be prevented?

Page 37: Security on FHIR - FHIR DevDays€¦ · Hospital system with a web-based EHR Patient-facing FHIR app Poorly-implemented SMART- on -FHIR Server RECON ... Open-Source reconnaissance

● Force 2FA everywhere

● Require long passwords

● Encourage the use of

Password Managers

● Store passwords with salting

and strong encryption

Protect credentials

Humans can’t remember hundreds of passwords

How can this be prevented?

Page 38: Security on FHIR - FHIR DevDays€¦ · Hospital system with a web-based EHR Patient-facing FHIR app Poorly-implemented SMART- on -FHIR Server RECON ... Open-Source reconnaissance

Congratulations!

You’ve cracked the OAuth2 client secret

Now you may be able to alter OAuth2 tokens...

Level 4 Complete

Source: Prince of Persia (1989) on Wikimedia Commons

Page 39: Security on FHIR - FHIR DevDays€¦ · Hospital system with a web-based EHR Patient-facing FHIR app Poorly-implemented SMART- on -FHIR Server RECON ... Open-Source reconnaissance

A doctor views patient’s record

Web-based EHR application

Malicious javascript code runs

Send doctor’s OAuth2 token back to your server

Test the cracked client secret

against this token

ESCALATION

Page 40: Security on FHIR - FHIR DevDays€¦ · Hospital system with a web-based EHR Patient-facing FHIR app Poorly-implemented SMART- on -FHIR Server RECON ... Open-Source reconnaissance

Token spoofing

From scratch:

● Try the “none” algorithm

● Attempt to forge a token

With a stolen token:

● Attempt a token refresh

● Attempt to increase scope

● Attempt to increase TTL

Can you forge a token

that the server accepts?

Page 41: Security on FHIR - FHIR DevDays€¦ · Hospital system with a web-based EHR Patient-facing FHIR app Poorly-implemented SMART- on -FHIR Server RECON ... Open-Source reconnaissance

Attack!

Create a valid token with

● doctor’s username

● increased scope

● long TTL

DOMAIN COMPROMISE Source: Prince of Persia (1989) on Wikimedia

Commons

Page 42: Security on FHIR - FHIR DevDays€¦ · Hospital system with a web-based EHR Patient-facing FHIR app Poorly-implemented SMART- on -FHIR Server RECON ... Open-Source reconnaissance

● Always validate tokens against authorization server

● Keep track of all issued tokens

● Use short expiration times

and state parameters

● Only allow secure algorithms

○ (i.e. RSA2048, HMAC256)

Stop token forgery

Don’t trust tokens without verifying them

How can this be prevented?

Page 43: Security on FHIR - FHIR DevDays€¦ · Hospital system with a web-based EHR Patient-facing FHIR app Poorly-implemented SMART- on -FHIR Server RECON ... Open-Source reconnaissance

Congratulations!

You’ve forged an OAuth2 token the server will accept

You now have persistent access as this doctor

Level 5 Complete

Source: Prince of Persia (1989) on Wikimedia Commons

Page 44: Security on FHIR - FHIR DevDays€¦ · Hospital system with a web-based EHR Patient-facing FHIR app Poorly-implemented SMART- on -FHIR Server RECON ... Open-Source reconnaissance

You may trust your employees...

A hacker can see anything the doctor can see

But what if their account is compromised?

Page 45: Security on FHIR - FHIR DevDays€¦ · Hospital system with a web-based EHR Patient-facing FHIR app Poorly-implemented SMART- on -FHIR Server RECON ... Open-Source reconnaissance

Attack!

Query the /patients/_search

endpoint

See which patient records the doctor has access to

COMPROMISE Source: Prince of Persia (1989) on Wikimedia Commons

Page 46: Security on FHIR - FHIR DevDays€¦ · Hospital system with a web-based EHR Patient-facing FHIR app Poorly-implemented SMART- on -FHIR Server RECON ... Open-Source reconnaissance

Some records include security labels

Some records include blank values

We found some interesting things

The results bundle includes

placeholders for results this

user is not allowed to see

Page 47: Security on FHIR - FHIR DevDays€¦ · Hospital system with a web-based EHR Patient-facing FHIR app Poorly-implemented SMART- on -FHIR Server RECON ... Open-Source reconnaissance

● Record-level and field-level

● Strip out any data and labels a user is not allowed to see

● If a posted FHIR document has

security labels, honor them

● http://hl7.org/fhir/security-labels.html

Classify your data

Don’t trust client to hide restricted data

How can this be prevented?

Page 48: Security on FHIR - FHIR DevDays€¦ · Hospital system with a web-based EHR Patient-facing FHIR app Poorly-implemented SMART- on -FHIR Server RECON ... Open-Source reconnaissance

Redaction indicates that escalated privileges are possible

You can use precise filters to find

a particular record Redacting Records Can a user deduce that

records exist?

Page 49: Security on FHIR - FHIR DevDays€¦ · Hospital system with a web-based EHR Patient-facing FHIR app Poorly-implemented SMART- on -FHIR Server RECON ... Open-Source reconnaissance

If you:

● remove a required field, FHIR resource is invalid

● use a default value,

FHIR resource is inaccurate

● mark a field as redacted, a hacker knows there’s something there

What is the correct approach?

Redacting Partial Records Is a partial FHIR resource

still valid?

Page 50: Security on FHIR - FHIR DevDays€¦ · Hospital system with a web-based EHR Patient-facing FHIR app Poorly-implemented SMART- on -FHIR Server RECON ... Open-Source reconnaissance

● Should be indistinguishable:

○ 404 Not Found

○ 403 Unauthorized

● http://hl7.org/fhir/security.html #AccessDenied

Plug leaky queries

Don’t reveal more that the user needs to know

How can this be prevented?

Page 51: Security on FHIR - FHIR DevDays€¦ · Hospital system with a web-based EHR Patient-facing FHIR app Poorly-implemented SMART- on -FHIR Server RECON ... Open-Source reconnaissance

There’s a difference between:

● a patient asking for their

own data

● an app asking for data on behalf of a patient

● a hacker gaining access

US regulations:

● Give a patient any

data they ask for

● Or else fines

What about Data Blocking?

Page 52: Security on FHIR - FHIR DevDays€¦ · Hospital system with a web-based EHR Patient-facing FHIR app Poorly-implemented SMART- on -FHIR Server RECON ... Open-Source reconnaissance

Level 6 Complete

Congratulations!

You’ve retrieved a list of all of the doctor’s patients

You also know there is more data

this doctor isn’t allowed to see

Source: Prince of Persia (1989) on Wikimedia Commons

Page 53: Security on FHIR - FHIR DevDays€¦ · Hospital system with a web-based EHR Patient-facing FHIR app Poorly-implemented SMART- on -FHIR Server RECON ... Open-Source reconnaissance

Escalate!

Post malicious javascript to the narrative field of every patient

Grab the OAuth2 tokens of every doctor who accesses one

LATERAL MOVEMENT Source: Prince of Persia (1989) on Wikimedia Commons

Page 54: Security on FHIR - FHIR DevDays€¦ · Hospital system with a web-based EHR Patient-facing FHIR app Poorly-implemented SMART- on -FHIR Server RECON ... Open-Source reconnaissance

Won’t they notice?

The hospital should see:

● Abnormal network traffic

● Suspicious logins

● Suspicious queries

● Abnormal logs

But on average, companies take

6 months to detect a breach* * IBM Ponemon Institute Cost of Data Breach Study 2017

Page 55: Security on FHIR - FHIR DevDays€¦ · Hospital system with a web-based EHR Patient-facing FHIR app Poorly-implemented SMART- on -FHIR Server RECON ... Open-Source reconnaissance

Low and Slow

● Login as a random doctor

● Download a few records

● Come back later

Exfiltrate!

DATA THEFT

Page 56: Security on FHIR - FHIR DevDays€¦ · Hospital system with a web-based EHR Patient-facing FHIR app Poorly-implemented SMART- on -FHIR Server RECON ... Open-Source reconnaissance

GAME OVER! From a single patient’s login, we compromised the hospital

We can:

● Login as any doctor

● Pull any PHI we want

● Change health data

● Sell health data

Multi-Record Breach! Fine: up to $50K per record

Page 57: Security on FHIR - FHIR DevDays€¦ · Hospital system with a web-based EHR Patient-facing FHIR app Poorly-implemented SMART- on -FHIR Server RECON ... Open-Source reconnaissance

Why might a cyber-criminal want to do this?

Page 58: Security on FHIR - FHIR DevDays€¦ · Hospital system with a web-based EHR Patient-facing FHIR app Poorly-implemented SMART- on -FHIR Server RECON ... Open-Source reconnaissance

Selling Bulk Personal Data

Hacking for profit

Identity Theft, Benefits Fraud Ransomware

76% of all attacks are financially motivated

Source: Verizon Data Breach Investigation Report 2018

Page 59: Security on FHIR - FHIR DevDays€¦ · Hospital system with a web-based EHR Patient-facing FHIR app Poorly-implemented SMART- on -FHIR Server RECON ... Open-Source reconnaissance

Graffiti

Making a statement

Espionage DDoS

Post a statement

Steal secrets Deny access to critical systems

Page 60: Security on FHIR - FHIR DevDays€¦ · Hospital system with a web-based EHR Patient-facing FHIR app Poorly-implemented SMART- on -FHIR Server RECON ... Open-Source reconnaissance

Targeted personal attack

Get pain meds

Alter drug

tests

Change health records

Attack medical devices

Obtain health records

Revenge

Blackmail

Kill patients

Page 61: Security on FHIR - FHIR DevDays€¦ · Hospital system with a web-based EHR Patient-facing FHIR app Poorly-implemented SMART- on -FHIR Server RECON ... Open-Source reconnaissance

What can I do to protect my system?

Page 62: Security on FHIR - FHIR DevDays€¦ · Hospital system with a web-based EHR Patient-facing FHIR app Poorly-implemented SMART- on -FHIR Server RECON ... Open-Source reconnaissance

Compliance ≠ Security

An insecure app can still be FHIR-compliant

● Implement all best practices: http://hl7.org/fhir/security.html

HIPAA laws are descriptive, not prescriptive

● Nobody enforces them until you are breached

Page 63: Security on FHIR - FHIR DevDays€¦ · Hospital system with a web-based EHR Patient-facing FHIR app Poorly-implemented SMART- on -FHIR Server RECON ... Open-Source reconnaissance

DevSecOps Development Security Operations

Security is everyone’s responsibility

As a developer, it’s your responsibility to secure your code

Page 64: Security on FHIR - FHIR DevDays€¦ · Hospital system with a web-based EHR Patient-facing FHIR app Poorly-implemented SMART- on -FHIR Server RECON ... Open-Source reconnaissance

Prioritize your vulnerabilities

My system has so many vulnerabilities!

Which should I fix first?

Page 65: Security on FHIR - FHIR DevDays€¦ · Hospital system with a web-based EHR Patient-facing FHIR app Poorly-implemented SMART- on -FHIR Server RECON ... Open-Source reconnaissance

For each vulnerability, determine:

1. How could an attacker exploit it?

2. What else could the attacker do after exploiting it?

3. How much damage could be caused as a result?

Am I willing to accept the risk?

Composite Risk Management

Page 66: Security on FHIR - FHIR DevDays€¦ · Hospital system with a web-based EHR Patient-facing FHIR app Poorly-implemented SMART- on -FHIR Server RECON ... Open-Source reconnaissance

There is no silver bullet for security

● Protect as much as you can

● Implement all best practices

● Keep your systems patched

● Conduct penetration testing on your own systems

● Offer bug bounties

● Expect the unexpected

Page 67: Security on FHIR - FHIR DevDays€¦ · Hospital system with a web-based EHR Patient-facing FHIR app Poorly-implemented SMART- on -FHIR Server RECON ... Open-Source reconnaissance

Cyber Kill Chain The earlier you can interrupt an attack,

the less damage the attacker can do

RECON

LURE

COMPROMISE

LATERAL MOVEMENT

ESCALATION

DATA THEFT

DOMAIN COMPROMISE

Page 68: Security on FHIR - FHIR DevDays€¦ · Hospital system with a web-based EHR Patient-facing FHIR app Poorly-implemented SMART- on -FHIR Server RECON ... Open-Source reconnaissance

Healthcare is critical infrastructure

What is the impact of a breach on patients?

Page 69: Security on FHIR - FHIR DevDays€¦ · Hospital system with a web-based EHR Patient-facing FHIR app Poorly-implemented SMART- on -FHIR Server RECON ... Open-Source reconnaissance

You can hack FHIR!

1. Live in-depth demo at the Let’s Build! session today

2. Try it yourself at the

security table in McKinley

Page 70: Security on FHIR - FHIR DevDays€¦ · Hospital system with a web-based EHR Patient-facing FHIR app Poorly-implemented SMART- on -FHIR Server RECON ... Open-Source reconnaissance

General Security Resources

OWASP Top-Ten Project

Verizon Data Breach Report

Ponemon Institute Study

WPEngine Password Analysis

MITRE Kill Chain

https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project

https://enterprise.verizon.com/resources/reports/dbir/

https://www.ibm.com/security/data-breach

https://wpengine.com/unmasked

https://attack.mitre.org/

Page 72: Security on FHIR - FHIR DevDays€¦ · Hospital system with a web-based EHR Patient-facing FHIR app Poorly-implemented SMART- on -FHIR Server RECON ... Open-Source reconnaissance

Andrew Marcus

[email protected]

Thank You! https://asymmetrik.com/healthcare


Recommended