Health systems face a challenge in protecting a variety of workloads, explains Itai Greenberg, chief strategy officer at Check Point Software Technologies. Types of workloads include containers and serverless computing, an execution model of cloud computing in which machine resources are available on demand with third-party vendors managing the servers. Weak security in the supply chain for healthcare applications threatens workloads, Greenberg says.
In healthcare, workloads process patient data so doctors can access it and provide proper care for patients, he adds.
“Without zero-trust security, the application and data can be easily compromised, which could impact the healthcare provided to their patients,” says Greenberg.
CDW Healthcare Strategist Mike Gregory says that the more critical and sensitive the workload, the more it requires security controls. IT leaders must conduct a thorough analysis of workloads to gauge which warrant access permissions.
“Because autonomous requests can originate from devices, users or other workloads, multiple layers of security may be necessary to achieve zero trust for the application layer,” Gregory says.