Member Discussion

Anyone Experimenting Installed PACS Controllers Being Disconnected From IT Federal Networks?

We are experimenting that our controllers are being disconnected and or removed from IT Federal Networks, we notice that this issue after IT staff scans for vulnerabilities on their Federal IT systems.

We know of this issue is not only in one Federal entity, typically the Federal agency uses strict rules to meet FISMA, DISA, SP800-53, etc... standards; which is impacting the operation's of the PACS.

Please let me know, may be we can share experiences from both ends.

Login to read this IPVM discussion.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

** *** **** * point ** ******* **** 'Federal **' *** ** disconnecting *** ***********?

***** ****** ****** **** this ******* **?

** ***** ******* **** them, *** ** ******* and ** *** *** allow ** ******** **. We **** **** **** use ** ***** ** scan, *** ***** ** tools ** *** **** how ** *********** ********* Technologies ** ** ************. Are *** ****** *** same ******?

*** **** ********* *** panels ******** *** ***** until *** **** ****?

********* **** ***** **** reboot ***** ****, *** this ***** ** **** IT ***** ***** ****** systems (**, */*, *******, Switches, ***.), ** **** the ********** *** ****.

***** *** * ***** defense ********** ******* ******* used *** **** **** scans ***** ***** ****** the *******. **** ****** it ***** ** **** able ** ******* ** using * ********* **.

** ****** ***** **** our ***** ****** ********* over *** *******. ******** a ********* *****, *** it *** ****** ** hell.

*** **** ** ***** are ***** *********** *****, meeting **** ********* (**: SP800-53, *****-***, ***.); *** we ** *** *** that *** ******** ** actively ******* **** ***** institution.

*** **** *******, *** anyone *** ******* ********* information/network ******** *** ******* attached ** ***** ******* and **** ** *********.

** ** ******* ****** scans **** ***** ***** Panels *** ****** *********** off **** *** *** even ***** **** **/*** Devices. **** **** *** scan ** ********** ******** and *** **/****/***** *** Services **** *** *** white ****** ** *** ports *** *** **** down *************.

** * **** **** many **/*** ******* **** security *********** ******* ** improper ************* ** *** scanning **** ** *** folks *** *** *** familiar **** **/*** *******. Most ********* ************ **** IT ******** ********* ****** that **** *** *** of *** *****, ******** etc *** *** *** hand **** **** ** EIS ** ***** ****.

*****, ***** *** ********* systems; *** **** *** in **** ********** **** FICAM, *** ***** ** the **** ******* ******** are ** ****** ** FISMA, ****, ***. *********. And **** **** *** their *** ******** (*******, etc.) ****** **** ** agencies.

**** **** ******* **** issued ** *** ***** the *** ******* **********. FIACAM **** *** ************ deal **** *** ***** end ** *** ******** but **** *** **** assurance ********** **********. ***** the *** *** **** learn *** ******* ******** and *** ********** ******* allowed ** ******* ***** excluded **** *** *******.

*******. **** *** ***** testing ** ****, **** filters *** **** ** issued * *************. *** - ******* & ******* is * ***** ********* story.

*** *** ******, *** we *** ******** ***** it ***** **** ******** to *** ***** ********, and **** ********* ******. We *** ********** **** the ***** ** **** the ***** **** *** using ** **** (**: Tenable, ***.) *** ***************.

***, ***** **** ********* Hardening ******, ****** *** process *** **** *********, etc.