-
Meeting cyber security requirements and compliance with regulatory requirements made simple.
Our consultants are assisting clients like you to meet cyber security requirements and also comply with the ADHICS standard.
ADHICS Consulting Service
ADHICS GAP Assessment
An assessment is conducted to determine the current state against the ADHICS standard.
Cyber Risk Assessment
Risks to healthcare data security and privacy are assessed using the ADHICS framework
Risk Management Plan
Risk management plans are developed to remediate the gaps and risks at acceptable levels.
Technology Implementation
Advisory on remediation of technology gaps and implementation of technical controls is given.
Implementation Review
Performance of periodic reviews to assess the compliance levels and remediate any deviations.
Policies & Procedures
Policies and procedures are developed for privacy and security to achieve ADHICS Compliance
Security Testing
Performance of ongoing security assessments and penetration testing to ensure continuous compliance with ADHICS.
Security Awareness
Providing security awareness trainings for employees, suppliers and other interested parties.
Internal Audits
Timely identification of deviations and recommendations given for corrective action.
Phase 1: Assessment
The first phase of in ADHICS Compliance service assessing the current state of the client’s system and it consists of the below steps.
Information Gathering
- Project Initiation
- Information Gathering
- Context of the organization
- Identify critical business services
- Identify information infrastructure
Gap & Risk Assessment
- Assessment of current state and mapping it to ADHICS Standard
- Identification of threats and vulnerabilities exploiting the gaps resulting in risk.
Phase 2: Controls Selection
In the second phase, controls are selected to manage the identified risks. A risk management plan is prepared and that sets the objectives for the implementation phase.
ADHICS Controls Identification
- Identify cyber security controls that can mitigate the risks and thereby result in ADHICS Compliance.
Policies & Procedures
- Current policies are reviewed, refined or replaced with new ones.
- New polices are prepared for the organization to be compliant with ADHICS standards.
- Standard operating procedures are prepared on the basis of the policies.
Phase 3: Implementation
In the third phase, controls are applied as per the risk management plan.
Controls Application
- Apply cyber security controls that mitigate the risks and thereby result in ADHICS Compliance.
-
Technology Controls
- Security Architecture
- Technology gaps
- Configuration advisor
-
Management Controls
- Operational controls
- Physical Security
- Managerial / Administrative Controls
-
Phase 4: Review
In the final phase, applied controls are verified and reviewed.
Confirmatory Check
- Checks are conducted to verify if the cyber security controls that mitigate the risks and comply with ADHICS Standard.
Audits
- Post implementation audits to assess the compliance status.
Periodic Security Testing
This includes conducting testing activities on pre-approved time intervals. The activities include:
- Vulnerability Assessments
- Penetration Testing
- Security configuration reviews
Incident Response Assessment
Assisting customers assess their incidence response readiness and threat monitoring
- Red-Team activities
- Blue-Team activities
- Purple-Team activities
Internal Audit
Performance of periodic IS audits to assess compliance levels to the defined policies and procedures. This may include:
- Mock ADHICS audit
- Regular IS audit