Health-ISAC Framework for CISOs to Manage Identity
Outlines a comprehensive Framework that health CISOs can use to architect, build and deploy a modern identity system that will protect against modern attacks and also support key business drivers.
Our first paper “Identity for the CISO Not Yet Paying Attention to Identity” detailed why healthcare CISOs need to embrace an identity-centric approach to cybersecurity – including where and how to get started. If you’ve read it, perhaps you’ve been convinced that identity should be a priority. But what does that mean, and how should you get started? This paper was written to address those questions. It outlines a comprehensive Framework that health CISOs can use to architect, build and deploy a modern identity system that will protect against modern attacks and also support key business drivers.
You already use some Identity and Access Management (IAM) tools today.
Authentication, provisioning, authorization, and access control – these are all important technologies on their own. When treated as point solutions and deployed in isolation, they fail to deliver a holistic approach to identity that can protect against identity-centric attacks. Identity is not just about internal workforce; it’s about an organization’s entire ecosystem including customers and external partners. CISOs should use an identity-centric approach to cybersecurity. Identity should be owned and operated by an organizational function motivated by risk (e.g., the CISO), not one motivated by service levels and speed (e.g., the Service Desk or HR).
Identity Framework
When integrated as part of a more holistic Framework, however, these solutions and others enable an enterprise to manage the full identity lifecycle of employees, practitioners, patients, and business partners in a way that guards against common attacks on identity, materially lowers risk, and increases operational efficiencies. The Identity Framework in this whitepaper details the different components needed for a modern identity-centric approach to cybersecurity, and outlines how these different components should integrate and inter-relate to secure the enterprise.
An H ISAC Framework For CISOs To Manage Identity April 2020
Size : 8.4 MB Format : PDF
- Related Resources & News
- 2024 Newsletter – November
- How Healthcare Facilities Can Prepare for All Types of Emergencies
- Health-ISAC Hacking Healthcare 10-24-2024
- UnHack (the Podcast): Generating Cyber Resilience Through Collaboration with Errol Weiss
- Newfangled and Fastest-Growing Phishing Cyberattacks: Updated Guide for Healthcare Leaders
- Health-ISAC Hacking Healthcare 10-15-2024
- Health-ISAC Welcomes Booz Allen Hamilton to the Ambassador Program
- Health-ISAC Hacking Healthcare 10-9-2024
- Monthly Newsletter – October 2024
- Health ISAC leads effort to transform SBOM information sharing under CISA-facilitated community work