* [Blog](https://www.paloaltonetworks.com/blog) * [Palo Alto Networks](https://www.paloaltonetworks.com/blog/corporate/) * [未分类](https://www.paloaltonetworks.com/blog/category/%e6%9c%aa%e5%88%86%e7%b1%bb/?lang=zh-hant) * 面对性命攸关的时刻,如何实现可靠的医疗物联网安全... # 面对性命攸关的时刻,如何实现可靠的医疗物联网安全 [](https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww.paloaltonetworks.com%2Fblog%2F2022%2F12%2Fmedical-iot-security-to-depend-on%2F%3Flang%3Dzh-hans) [](https://twitter.com/share?text=%E9%9D%A2%E5%AF%B9%E6%80%A7%E5%91%BD%E6%94%B8%E5%85%B3%E7%9A%84%E6%97%B6%E5%88%BB%EF%BC%8C%E5%A6%82%E4%BD%95%E5%AE%9E%E7%8E%B0%E5%8F%AF%E9%9D%A0%E7%9A%84%E5%8C%BB%E7%96%97%E7%89%A9%E8%81%94%E7%BD%91%E5%AE%89%E5%85%A8&url=https%3A%2F%2Fwww.paloaltonetworks.com%2Fblog%2F2022%2F12%2Fmedical-iot-security-to-depend-on%2F%3Flang%3Dzh-hans) [](https://www.linkedin.com/shareArticle?mini=true&url=https%3A%2F%2Fwww.paloaltonetworks.com%2Fblog%2F2022%2F12%2Fmedical-iot-security-to-depend-on%2F%3Flang%3Dzh-hans&title=%E9%9D%A2%E5%AF%B9%E6%80%A7%E5%91%BD%E6%94%B8%E5%85%B3%E7%9A%84%E6%97%B6%E5%88%BB%EF%BC%8C%E5%A6%82%E4%BD%95%E5%AE%9E%E7%8E%B0%E5%8F%AF%E9%9D%A0%E7%9A%84%E5%8C%BB%E7%96%97%E7%89%A9%E8%81%94%E7%BD%91%E5%AE%89%E5%85%A8&summary=&source=) [](https://www.paloaltonetworks.com//www.reddit.com/submit?url=https://www.paloaltonetworks.com/blog/2022/12/medical-iot-security-to-depend-on/?lang=zh-hans&ts=markdown) [](mailto:?subject=面对性命攸关的时刻,如何实现可靠的医疗物联网安全) Link copied By [Xu Zou](https://www.paloaltonetworks.com/blog/author/xu-zou/?lang=zh-hans&ts=markdown "Posts by Xu Zou") Dec 05, 2022 1 minutes [未分类](https://www.paloaltonetworks.com/blog/category/%e6%9c%aa%e5%88%86%e7%b1%bb/?lang=zh-hant&ts=markdown) [IOT security](https://www.paloaltonetworks.com/blog/tag/iot-security-zh-hans/?lang=zh-hans&ts=markdown) [Zero Trust](https://www.paloaltonetworks.com/blog/tag/zero-trust-zh-hans/?lang=zh-hans&ts=markdown) This post is also available in: [English (英语)](https://www.paloaltonetworks.com/blog/2022/12/medical-iot-security-to-depend-on/ "切换到 英语(English)") [繁體中文 (繁体中文)](https://www.paloaltonetworks.com/blog/2022/12/medical-iot-security-to-depend-on/?lang=zh-hant "切换到 繁体中文(繁體中文)") [Français (法语)](https://www.paloaltonetworks.com/blog/2022/12/iot-medical-quand-la-securite-iot-devient-un-enjeu-vital/?lang=fr "切换到 法语(Français)") [Deutsch (德语)](https://www.paloaltonetworks.com/blog/2022/12/verlaesslicher-schutz-fuer-lebensrettende-medizinische-iot-geraete/?lang=de "切换到 德语(Deutsch)") [日本語 (日语)](https://www.paloaltonetworks.com/blog/2022/12/medical-iot-security-to-depend-on/?lang=ja "切换到 日语(日本語)") [한국어 (韩语)](https://www.paloaltonetworks.com/blog/2022/12/medical-iot-security-to-depend-on/?lang=ko "切换到 韩语(한국어)") [Español (西班牙语)](https://www.paloaltonetworks.com/blog/2022/12/medical-iot-security-la-solucion-de-seguridad-para-dispositivos-idc-medicos-en-la-que-confiar-cuando-la-vida-de-sus-pacientes-esta-en-sus-manos/?lang=es "切换到 西班牙语(Español)") ### 利用为医疗量身定制的零信任医疗物联网安全保护每一台联网设备。 联网医疗设备正在通过更快、更准确的诊断帮助增强患者体验、降低运营成本、通过自动化提高效率以及改善患者的整体治疗效果,从而彻底改变医疗行业。联网临床和操作物联网设备用于从患者监视到办公系统的各个方面。但同样的设备也扩大了攻击面,是攻击者渗透医院网络的最薄弱环节。 过去 12 年(2010 年 - 2022 年),相较于其他行业,医疗行业一直是[平均违规成本](https://www.ic3.gov/)最高的[行业](https://www.scmagazine.com/analysis/breach/healthcare-data-breaches-cost-an-average-of-10-1m-more-than-any-other-industry)[之一](https://www.scmagazine.com/analysis/breach/healthcare-data-breaches-cost-an-average-of-10-1m-more-than-any-other-industry)。联网医疗设备是一个有利可图的目标,因为攻击者可以将医院作为勒索软件的人质,或者在设备托管患者的敏感个人健康信息 (PHI) 时窃取有价值的数据。 Palo Alto Networks 的 [Unit 42 威胁研究](https://unit42.paloaltonetworks.com/infusion-pump-vulnerabilities/)发现,医疗设备是医院网络中最薄弱的环节,因为它们存在严重漏洞: * 参与研究的输液泵中,有 75% 的输液泵存在至少一个漏洞或发出至少一个安全警报。 * X 光机、MRI 和 CT 扫描仪等成像设备特别容易受到攻击,51% 的 X 光机暴露于非常严重的常见漏洞 ([CVE-2019-11687](https://nvd.nist.gov/vuln/detail/CVE-2019-11687))。 * 20% 的常见成像设备运行的是不受支持的 Windows 版本。 * 44% 的 CT 扫描仪和 31% 的 MRI 机器暴露于非常严重的 CVE。 设备及其漏洞的数量只是冰山一角。从最近对 CommonSpirit、美国列克星敦的 CHI 圣约瑟夫医院、法国巴黎的 CHSF 医院和印度德里的 AIMS 医院的网络攻击中可以看出,确保联网医疗设备的安全不仅仅是一项挑战。2022 年 10 月,[CISA 向医疗保健提供商发布了一份咨询意见,](https://www.cisa.gov/uscert/ncas/alerts/aa22-294a)警告称有一个勒索软件和数据勒索团伙以医疗保健和公共卫生部门为目标。这个团伙特别关注访问网络中的数据库、成像和诊断系统。 这些现代医疗设备很难保护,原因如下: * 缺乏对非托管联网医疗设备的可视性,对了解真实的攻击面产生了不良影响。 * 由于缺乏设备情境,导致未发现的漏洞让医院暴露于未知威胁。 * 使用具有扁平网络的传统安全架构和易出错的手动方法创建安全策略,可能导致无法遵守 HIPPA 等监管要求。 * 管理多点安全产品十分复杂,会产生安全缺口。 医疗保健企业需要一个全面的零信任网络安全解决方案来支持他们的数字化转型之旅,从而在确保患者数据隐私和监管合规性的同时带来更好的患者治疗效果。零信任是一种网络安全策略,可通过不断验证数字交互的每个阶段来消除隐性信任。零信任坚持"从不信任,始终验证"的原则,旨在保护现代数字医疗环境。这个原则应用最低访问权限控制和策略以及持续的信任验证和设备行为监控来阻止零日攻击。 ### 医疗物联网安全采用零信任应对医疗行业的网络威胁 Palo Alto Networks 采用我们当前久经考验的物联网安全技术,并基于零信任安全方法,推出了[医疗物联网安全](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown)解决方案,使用机器学习 (ML) 为医疗保健提供商提供专门为医疗设备设计的物联网安全产品。该解决方案有助于快速发现和评估每台设备,轻松分段和实施最低权限访问,并通过简化操作防范已知和未知的威胁。此外,新产品还支持医疗保健提供商提高安全性并减少漏洞: * \*\*验证网络分段:\*\*显示联网设备的整个地图,并确保每个设备都位于其指定的网络分段中。适当的网络分段可以确保设备只与授权系统通信。 * \*\*根据规则自动化安全响应:\*\*创建监视设备行为异常的策略规则,并自动触发适当的响应。例如,如果一个通常只在夜间发送少量数据的医疗设备突然开始使用大量带宽,预定义的规则可以自动断开设备的网络连接,并通知安全团队。 * \*\*自动化零信任最佳实践策略和执行:\*\*一键式根据受支持的实施技术为设备实施建议的最低权限访问策略。这消除了容易出错且耗时的手动策略创建,并可轻松扩展到具有相同配置文件的一组设备。 * \*\*了解设备漏洞和风险状况:\*\*立即了解每台设备的风险状况,包括生命周期结束状态、召回通知、默认密码警报和未经授权的外部网站通信。访问每个医疗设备的软件材料清单 (SBOM) 并将它们映射到常见漏洞暴露 (CVE)。此映射有助于识别医疗设备上使用的软件库和任何相关漏洞。 * \*\*改善合规性:\*\*轻松了解医疗设备漏洞、补丁状态和安全设置,然后获取相关建议,使设备符合《健康保险便携性与责任法案》(HIPAA)、《通用数据保护条例》(GDPR) 和类似法律法规等规则和准则。 * \*\*简化运营:\*\*两个不同的仪表板允许 IT 和生物医学工程团队各自查看对其角色至关重要的信息。与现有医疗保健信息管理系统(如 AIMS 和 Epic 系统)集成有助于自动化工作流程。 * \*\*满足数据驻留要求:\*\*医疗物联网安全使我们在美国、德国、新加坡、日本和澳大利亚的客户更容易采用本地云托管的物联网安全。区域医疗物联网安全服务可用性可确保满足本地数据驻留和本地化需求,例如 GDPR。 **医疗物联网安全提供的可操作指南** 随着医疗保健行业通过转型,更好地为患者服务,联网医疗设备将继续增加。基于强大的零信任框架的医疗物联网安全,通过提供可操作的指南来保护其整个生命周期,使行业能够安全地使用联网临床设备。医疗物联网安全提供的可视性、风险和操作,使医疗保健系统能够实现对所有联网医疗设备和应用程序的零信任。 要了解有关医疗物联网安全的更多信息,请阅读我们的白皮书[实现医疗物联网设备零信任的正确方法](https://www.paloaltonetworks.com/resources/whitepapers/right-approach-zero-trust-medical-iot?ts=markdown)。 *** ** * ** *** ## Related Blogs ### [未分类](https://www.paloaltonetworks.com/blog/category/%e6%9c%aa%e5%88%86%e7%b1%bb/?lang=zh-hant&ts=markdown) [#### AI代理已經來臨,威脅也隨之而來](https://www.paloaltonetworks.com/blog/2025/05/ai-agents-threats/?lang=zh-hant) ### [未分类](https://www.paloaltonetworks.com/blog/category/%e6%9c%aa%e5%88%86%e7%b1%bb/?lang=zh-hant&ts=markdown) [#### Strata Copilot - 加速迈向自主网络安全的未来](https://www.paloaltonetworks.com/blog/network-security/strata-copilot/?lang=zh-hans) ### [未分类](https://www.paloaltonetworks.com/blog/category/%e6%9c%aa%e5%88%86%e7%b1%bb/?lang=zh-hant&ts=markdown) [#### 防火墙已死?至少本世纪不会!](https://www.paloaltonetworks.com/blog/2023/08/ngfw-is-not-dead-yet/?lang=zh-hans) ### [未分类](https://www.paloaltonetworks.com/blog/category/%e6%9c%aa%e5%88%86%e7%b1%bb/?lang=zh-hant&ts=markdown) [#### 利用业界首创的 AIOps for NGFW 革新防火墙运行](https://www.paloaltonetworks.com/blog/2022/03/industry-first-aiops-for-ngfw/?lang=zh-hans) ### [未分类](https://www.paloaltonetworks.com/blog/category/%e6%9c%aa%e5%88%86%e7%b1%bb/?lang=zh-hant&ts=markdown) [#### Prisma Access 是保护远程用户安全的领先云服务](https://www.paloaltonetworks.com/blog/2021/08/prisma-access-leading-cloud-service-secure-remote-users/?lang=zh-hans) ### [未分类](https://www.paloaltonetworks.com/blog/category/%e6%9c%aa%e5%88%86%e7%b1%bb/?lang=zh-hant&ts=markdown) [#### 2020 年 Gartner 广域网边缘基础架构魔力象限领导者](https://www.paloaltonetworks.com/blog/2021/08/gartner-wan-edge-infrastructure-magic-quadrant/?lang=zh-hans) ### Subscribe to the Blog! Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more. ![spinner](https://www.paloaltonetworks.com/blog/wp-content/themes/panwblog2023/dist/images/ajax-loader.gif) Sign up Please enter a valid email. By submitting this form, you agree to our [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) and acknowledge our [Privacy Statement](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown). Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder. This site is protected by reCAPTCHA and the Google [Privacy Policy](https://policies.google.com/privacy) and [Terms of Service](https://policies.google.com/terms) apply. {#footer} {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language