Computer Security Resource Center

Computer Security Resource Center

Computer Security
Resource Center

SP 1800-24 (DRAFT)

Securing Picture Archiving and Communication System (PACS)

Date Published: September 2019
Comments Due: November 18, 2019
Email Comments to: hit_nccoe@nist.gov

Author(s)

Jennifer Cawthra (NIST), Bronwyn Hodges (MITRE), Jason Kuruvilla (MITRE), Kevin Littlefield (MITRE), Robert Niemeyer (MITRE), Chris Peloquin (MITRE), Sue Wang (MITRE), Ryan Williams (MITRE), Kangmin Zheng (MITRE)

Announcement

Medical imaging plays an important role in diagnosing and treating patients. The system that that manages medical images is known as the Picture Archiving Communications System (PACS) and is nearly ubiquitous in healthcare environments. PACS fits within a highly complex healthcare delivery organization (HDO) environment that involves interfacing with a range of interconnected systems. This complexity may introduce or expose opportunities that allow for malicious actors to compromise the confidentiality, integrity and availability of the PACS ecosystem.

The NCCoE at NIST analyzed risk factors regarding the PACS ecosystem by using a risk assessment based on the NIST Cybersecurity Framework and other relevant standards. The NCCoE developed an example implementation that demonstrates how HDOs can use standards-based, commercially available cybersecurity technologies to better protect the PACS ecosystem.

The NCCoE's practice guide NIST SP 1800-24, Securing Picture Archiving Communications System, will help HDOs implement current cybersecurity standards and best practices to reduce their cybersecurity risk, while maintaining the performance and usability of PACS.

Abstract

Keywords

access control; auditing; authentication; authorization; behavioral analytics; DICOM; encryption microsegmentation; multifactor authentication; PACS; picture archiving and communication system; PAM; privileged account management; vendor neutral archive; VNA
Control Families

Access Control; Configuration Management; Contingency Planning; Identification and Authentication; Risk Assessment; System and Communications Protection; System and Information Integrity;