Our website uses cookies to give you the most optimal experience online by: measuring our audience, understanding how our webpages are viewed and improving consequently the way our website works, providing you with relevant and personalized marketing content.
You have full control over what you want to activate. You can accept the cookies by clicking on the “Accept all cookies” button or customize your choices by selecting the cookies you want to activate. You can also decline all non-necessary cookies by clicking on the “Decline all cookies” button. Please find more information on our use of cookies and how to withdraw at any time your consent on our privacy policy.

Managing your cookies

Our website uses cookies. You have full control over what you want to activate. You can accept the cookies by clicking on the “Accept all cookies” button or customize your choices by selecting the cookies you want to activate. You can also decline all non-necessary cookies by clicking on the “Decline all cookies” button.

Necessary cookies

These are essential for the user navigation and allow to give access to certain functionalities such as secured zones accesses. Without these cookies, it won’t be possible to provide the service.
Matomo on premise

Marketing cookies

These cookies are used to deliver advertisements more relevant for you, limit the number of times you see an advertisement; help measure the effectiveness of the advertising campaign; and understand people’s behavior after they view an advertisement.
Adobe Privacy policy | Marketo Privacy Policy | MRP Privacy Policy | AccountInsight Privacy Policy | Triblio Privacy Policy

Social media cookies

These cookies are used to measure the effectiveness of social media campaigns.
LinkedIn Policy

Our website uses cookies to give you the most optimal experience online by: measuring our audience, understanding how our webpages are viewed and improving consequently the way our website works, providing you with relevant and personalized marketing content. You can also decline all non-necessary cookies by clicking on the “Decline all cookies” button. Please find more information on our use of cookies and how to withdraw at any time your consent on our privacy policy.

Skip to main content

Cloud security in healthcare

Hospitals have been moving into the cloud to improve patient, employee and staff experience. However, moving from traditional on-premise infrastructure to a cloud based system comes with some challenges. As a matter of fact, it is estimated that cloud security incidents rose by 127% In pharma and life sciences companies during the pandemic[1].

A lack of trust in cloud based technology stems from incidents or breaches where the cloud has not been used securely or configured correctly. Cloud security is essential in any industry and critical in healthcare to secure, encrypt and manage access to sensitive patient data.

[1] Cloud Threat Report 1H 2021, Palo Alto Networks

IAM Cloud

On average, organizations have 2,6 public cloud and 2,7 private cloud[1]. This multi-cloud complexity means that healthcare organizations can have an incomplete control over who has access to data. Identity and access management (IAM) can enable the implementation of various access levels for data, software, and systems over multi-cloud and on-premises environments.

Large networks with many members of staff, such as hospitals require robust, secure, and flexible cloud IAM systems. Cloud identity and access management makes accessing vital data and systems quicker and easier for healthcare employees and staff. Identity federation and user’s identity lifecycle management helps to streamline entitlements effectively across all environments.

A key part of cloud IAM is the use of single sign on (SSO) and multi-factor authentication. This enables users to login once and access multiple systems securely and seamlessly, for instance to view patient records and book appointments without needing to enter several passwords.

[1] State of the Cloud Report 2021, Flexera

Cloud Encryption

Cloud encryption works by changing data to an unreadable format, which can only be read with the correct decryption key. Data encryption is often referred to as the last line of defense. This process ensures that only authorized users have access to the data and that it is protected from unintended disclosure.

Depending on the sensitivity of the information, different key management models can be applied to maintain sovereignty and control over data by ensuring the healthcare provider’s ownership on encryption keys.

Cloud Access Security Broker (CASB)

A cloud access security broker (CASB) is used to boost threat detection and data security by monitoring cloud applications, restricting data access from the cloud and enforcing security policies (extra-territorial, national or internal). In the case of healthcare, a CASB can support organizations in their compliance journey with specific regulations including HIPAA in the US and GDPR in the UK. These regulations require the protection of PHI or protected healthcare information.

CASB systems:

  • review all third-party cloud applications,
  • determines the risk levels of each application,
  • identify potential risks where data loss or a breach could occur,
  • can automatically adapt policies and user access levels.

Concretely, if a doctor attempts to view patient data from a different country than their usual location, CASB would automatically identify this as a potential threat. It will ask for additional authentication methods for verification before the doctor is permitted to access the patient’s data.

Cloud Security Posture Management (CSPM) :

Cloud security posture management or CSPM is a key part of cloud security in detecting potential vulnerabilities within a system’s infrastructure. CSPM works by continuously reviewing the cloud environment to identify potential configuration vulnerabilities and compliance risks.

Many of the issues identified stem from human error and misconfiguration: a CSPM can help to mitigate these risks. Examples of a potential vulnerability a CSPM system may find is an improperly configured S3 bucket that contains sensitive patient data. S3 buckets have been the cause of many data leaks including in the case of Patient Home Monitoring in 2017 when data from 150,000 patients were left unsecured in an Amazon S3 bucket[i].

[i] https://www.healthcareitnews.com/news/data-150000-patients-exposed-another-misconfigured-aws-bucket

Cloud Service Provider Security

Cloud environments fall into three categories: public, private, and hybrid. Most healthcare organisations use a hybrid cloud model which combines public and private cloud infrastructures. Cloud often contains sensitive information such as patient data and electronic heath records. Additional security measures must be put in place to ensure its protection.

In addition to their role in securing the cloud infrastructure, cloud service providers (CSP) often provide native security tools for an improved security posture. In this case, managed security services can help reduce the operational complexity by leveraging these native capabilities to continuously identify and remove potential threats.

At Atos, we have a comprehensive cloud security offering to help keep sensitive healthcare data safe.

For more information on how Atos can help with cloud security including Cloud IAM, Cloud Encryption, CASB, CSPM and Cloud Service Provider Security along with a full end to end cybersecurity solution for healthcare companies, contact our healthcare team.

Related resources

Webinar

Making the Shift to the Cloud in Healthcare

Experts from IDC, VMware, and Atos are discussing how the cloud is accelerating digital transformation efforts of healthcare providers.

Offering

Atos Cloud Security

Prevent, Protect, Preserve: Learn what are Atos’ 3 steps to unified cloud security.

White Paper

Cybersecurity: Building trust in hybrid cloud

Understand how to implement a cloud strategy that can deliver comprehensive security while stimulating business and digital innovation.