A new Government Accountability Office (GAO) report has found that while the Department of Health and Human Services (HHS) has made substantial efforts to share cyber security threat intel with the wider health care sector, it could do more to develop its collaboration and coordination within the department and the sector.
The recently published report said the GAO was tasked to review HHS’s organizational approach to address cyber security. It looked at documentation describing HHS’s cyber security roles and responsibilities, assessed those responsibilities for fragmentation, duplication and overlap, and evaluated the department’s collaborative efforts against GAO’s leading practices for collaboration.
The report found that the recent coronavirus pandemic has “highlighted the need for HHS to pay continuous attention to cyber threats, which pose a serious challenge to national security, economic well-being, and public health and safety. “
“Since the start of the nation’s response to COVID-19 in March 2020, HHS and the HPH sector organizations have been targets for malicious cyber activity,” the report stated.
The report said HHS had clearly described roles and responsibilities for implementing its cyber security program, including the FISMA-required eight elements of the program. The department had also developed or contributed to developing policies, procedures, and plans that described the department’s roles and responsibilities for providing cyber security support to the healthcare and public health care (HPH) sector.
Owning your own access security
The key to building strong cloud security and avoiding the risk of vendor lock-in
However, the report said that procedures and plans did not describe coordination among two entities critical to the department’s cyber security information sharing with the HPH sector — the Health Sector Cybersecurity Coordination Center (HC3) and the Healthcare Threat Operations Center (HTOC).
“Without coordinating the responsibilities for sharing cyber security information to the HPH sector, HHS is missing an opportunity to strengthen those efforts for their intended audience,” the report warned.
The GAO said there were areas where HHS could improve, such as actionable threat sharing and better support for industry partnerships.
“Until HC3 and HTOC formalize coordination of their cyber security information sharing responsibilities, sector partners will likely be without important threat information,” said the report’s authors.
The GAO said that the secretary of HHS should direct its chief information officer to coordinate cyber security information sharing between the Health Sector Cybersecurity Coordination Center and Healthcare Threat Operations Center.
It should also direct its CIO to monitor, evaluate, and report on the progress and performance of the HHS Chief Information Security Officer Council, Continuous Monitoring and Risk Scoring Working Group, and Cloud Security Working Group.
The report said the HHS stated it is currently addressing the six recommendations it agreed with, but it did not agree with the GAO findings on cyber security coordination. HHS said there was “close coordination between HC3 and HTOC that takes into consideration the stakeholders and agreements between relevant partners and stakeholders.”
Get the ITPro. daily newsletter
Receive our latest news, industry updates, featured resources and more. Sign up today to receive our FREE report on AI cyber crime & security - newly updated for 2023.
Rene Millman is a freelance writer and broadcaster who covers cybersecurity, AI, IoT, and the cloud. He also works as a contributing analyst at GigaOm and has previously worked as an analyst for Gartner covering the infrastructure market. He has made numerous television appearances to give his views and expertise on technology trends and companies that affect and shape our lives. You can follow Rene Millman on Twitter.