Cerner
Healthcare Applications
Cerner - Healthcare IT solutions for EHR management and patient care.
Detection Rules for Cerner
These detection rules will focus on various aspects of Cerner such as healthcare IT solutions for EHR management & patient care.
Provider: Cerner
App : Cerner | MITRE Tactic | MITRE Technique | Criticality | ||||||
---|---|---|---|---|---|---|---|---|---|
Unauthorized Access to EHR Records | Credential Access | T1078: Valid Accounts | High | ||||||
|
|||||||||
Suspicious Login Attempts | Initial Access | T1071: Application Layer Protocol | High | ||||||
|
|||||||||
Unusual Access Outside Working Hours | Persistence | T1078.003: Local Accounts | Medium | ||||||
|
|||||||||
Large Volume Data Exports | Exfiltration | T1041: Exfiltration Over C2 Channel | Critical | ||||||
|
|||||||||
Modifications to Critical EHR Records | Impact | T1485: Data Destruction | High | ||||||
|
|||||||||
Unusual Activity in Privileged Accounts | Privilege Escalation | T1078.004: Cloud Accounts | High | ||||||
|
|||||||||
Patient Data Access by Non-Treating Physicians | Collection | T1056.004: Credential API Hooking | High | ||||||
|
|||||||||
Unauthorized Device Access | Persistence | T1136.003: Create Cloud Account | Medium | ||||||
|
|||||||||
High Frequency of Role Changes | Persistence | T1098: Account Manipulation | Medium | ||||||
|
|||||||||
Unauthorized API Usage | Command and Control | T1071.001: Web Protocols | High | ||||||
|
APIs and Their Scopes
App : Cerner | Required API | Scopes Required | Usage |
---|---|---|---|
Unauthorized Access to EHR Records | EHR Access API | read:ehr_access_logs | Retrieves logs to monitor access patterns and identify unauthorized access to patient records. |
Suspicious Login Attempts | Login Events API | read:login_events | Captures login attempt details, including geo-location and timestamps, to identify suspicious login behavior. |
Unusual Access Outside Working Hours | User Activity API | read:user_activity | Provides user access patterns, enabling the identification of access events outside normal working hours. |
Large Volume Data Exports | File Export Logs API | read:export_logs | Tracks data export events to monitor for large volumes or unusual frequency in data transfers. |
Modifications to Critical EHR Records | EHR Modification API | read:modification_logs | Accesses modification history of EHR records to monitor for unauthorized or critical changes. |
Unusual Activity in Privileged Accounts | Account Activity API | read:privileged_activity | Monitors privileged accounts, highlighting unusual actions or deviations from typical account usage. |
Patient Data Access by Non-Treating Physicians | EHR Access Logs API | read:patient_access_logs | Verifies physician-patient relationships and validates that only treating physicians access patient records. |
Unauthorized Device Access | Device Activity API | read:device_activity | Tracks device access events, enabling detection of access from unauthorized or unusual devices. |
High Frequency of Role Changes | Role Modification API | read:role_modifications | Captures details of role modifications to identify frequency and patterns in role changes across the platform. |
Unauthorized API Usage | API Usage Logs API | read:api_usage | Analyzes API call patterns, ensuring calls align with expected usage and don’t access unauthorized endpoints or data. |
Reports and Widgets for CISO
Report Name | Widgets | Description |
---|---|---|
Access & Authentication Report | Login Events by Geo-location | Summarizes user login events, failed attempts, and unauthorized access attempts. |
Failed Login Attempt Counts Unusual Device Access |
||
EHR Access Audit | Top Users Accessing EHR Records | Tracks user access to EHR records to ensure only authorized users access sensitive data. |
Access by User Role Access Outside Working Hours |
||
Data Export and Transfer Report | High Volume Exports by Department | Monitors large or frequent data exports, with a focus on potential data exfiltration. |
Export Events Timeline Top Exporting Users |
||
Modification History Report | Modification Counts by User | Details changes to critical patient records and key platform settings. |
Modified Record Types Critical Modifications Overview |
||
Privileged Account Activity | Actions by Privileged Accounts | Tracks activity from privileged accounts for signs of abuse or unauthorized actions. |
Role Changes Over Time Suspicious Actions Summary |
||
Patient Record Access Report | Patient Access by Physician | Ensures compliance by verifying that only treating physicians access patient records. |
Non-Treating Physician Access Unauthorized Record Access |
||
API Usage Monitoring | API Calls by Endpoint | Highlights usage patterns and potential misuse of APIs within the platform. |
Unauthorized API Usage Instances High Usage API Accounts |
||
Device Access Report | Access by Device Type | Tracks access to Cerner data from authorized and unauthorized devices. |
Unauthorized Device Usage Device Access Trends Over Time |
||
Role Change Frequency Report | Role Changes by Department | Monitors role changes to identify any unusual frequency that could suggest security issues. |
High Frequency Changes Recent Critical Role Changes |