This fragmentation can lead to blind spots, and in healthcare, where protected health information (PHI) is a prime target, that’s a dangerous gap to leave unguarded.
As systems expand into the cloud, the attack surface grows, making consistent, centralized security policy enforcement essential.
“Sensitive patient data like PHI is a prime target for threats such as ransomware, phishing attacks and insider breaches,” says Gagan Gulati, senior vice president and general manager of data services at NetApp. “These risks not only jeopardize data but can lead to severe financial repercussions and damage to patient trust.”
As organizations deploy hybrid and multicloud infrastructure, they encounter another layer of complexity: inconsistent security tools, multiple administrative consoles and varied access models.
Connors notes that public cloud providers offer native security tools, but they often lack the healthcare-specific visibility or integration required for enterprisewide oversight. In multicloud configurations, these disparities multiply.
“Security challenges in healthcare vary significantly across public cloud, hybrid cloud and multicloud environments,” Connors explains. “Cloud providers’ native security tools often don’t offer the necessary visibility or control.”
To address this, IT teams are turning to unified security platforms that span infrastructure types and provide a consistent policy layer.
EXPLORE: How are health systems managing security in the cloud?
Oversight Across Healthcare Infrastructure Environments
Connors emphasizes the importance of centralized oversight, particularly when healthcare organizations are managing sensitive workloads across multiple environments.
“Leveraging platforms that unify security policies and provide centralized management — a ‘single pane of glass’ — is critical,” he says.
For Gulati, visibility and governance are just as important as encryption.
“Hybrid and multicloud environments add another layer of complexity with multiple control levels and the challenge of managing data sprawl,” he says.
A key concern with modernization is not only internal misconfiguration but the increased exposure to third-party risk.
Open-source libraries and external vendors become part of the attack surface. Without adequate controls, a weak link in the supply chain can expose critical systems.
“Modernizing workloads often involves using third-party or open-source libraries, which may come with their own vulnerabilities,” Connors says. “Organizations must secure their applications as well as the surrounding environment.”
Gulati recommends beginning any infrastructure modernization effort with a comprehensive security assessment, explaining that alignment with standards such as HIPAA and encrypting data in transit and at rest are baseline practices.
“It’s critical to choose a HIPAA-compliant cloud provider and encrypt data using the latest industry-standard protocols,” he says.