{"id":24670,"date":"2022-04-06T05:46:44","date_gmt":"2022-04-06T10:46:44","guid":{"rendered":"https:\/\/saluddigital.com\/?p=24670"},"modified":"2025-10-21T09:53:59","modified_gmt":"2025-10-21T15:53:59","slug":"el-bid-publico-guia-sobre-ciberseguridad-en-el-sector-salud","status":"publish","type":"post","link":"https:\/\/saluddigital.com\/en\/big-data\/el-bid-publico-guia-sobre-ciberseguridad-en-el-sector-salud\/","title":{"rendered":"The IDB published a guide on cybersecurity in the health sector"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"24670\" class=\"elementor elementor-24670\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-641623cd elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"641623cd\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-22f327e5\" data-id=\"22f327e5\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-64621463 elementor-widget elementor-widget-heading\" data-id=\"64621463\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">The Inter-American Development Bank (IDB) produced a guide on regulations, frameworks, standards and good practices on cybersecurity in health systems.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7af8848e elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"7af8848e\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a3b4388\" data-id=\"a3b4388\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-54f54db8 elementor-widget elementor-widget-text-editor\" data-id=\"54f54db8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>\u201cProtecting digital health \u2013 A guide to cybersecurity in the health sector\u201d, is a document produced by IDB specialists Pablo Alzuri, Florencia Cabral, Santiago Nowersztern, and Pablo Libedinsky.<\/p><p>Digitization is one of the key axes for economic and social recovery, which the IDB proposes in its Vision 2025. In this sense, it is necessary to protect the digital space and understand the important role of cybersecurity in all digital transformation processes.<\/p><p>The guide explains that &quot;cybersecurity in the health sector is particularly relevant due to the sensitivity of the information it handles.&quot; For example, solutions such as electronic medical records, medical devices or telemedicine.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7db7b489 elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"7db7b489\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-768352c8\" data-id=\"768352c8\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-4ecf1e52 elementor-widget elementor-widget-image\" data-id=\"4ecf1e52\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1200\" height=\"630\" src=\"https:\/\/saluddigital.com\/wp-content\/uploads\/2022\/04\/04-22-02.jpg\" class=\"attachment-full size-full wp-image-24671\" alt=\"\" srcset=\"https:\/\/saluddigital.com\/wp-content\/uploads\/2022\/04\/04-22-02.jpg 1200w, https:\/\/saluddigital.com\/wp-content\/uploads\/2022\/04\/04-22-02-660x347.jpg 660w, https:\/\/saluddigital.com\/wp-content\/uploads\/2022\/04\/04-22-02-840x441.jpg 840w, https:\/\/saluddigital.com\/wp-content\/uploads\/2022\/04\/04-22-02-768x403.jpg 768w, https:\/\/saluddigital.com\/wp-content\/uploads\/2022\/04\/04-22-02-18x9.jpg 18w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-top-column elementor-element elementor-element-79e7edd6\" data-id=\"79e7edd6\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-42d2585a elementor-widget elementor-widget-text-editor\" data-id=\"42d2585a\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>In this sense, the IDB guide proposes a compilation and classification of global knowledge in terms of regulations, regulatory frameworks, standards, good practices, implementation guides, among other documents aimed at the implementation of cybersecurity.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6d56535d elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"6d56535d\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-55eef833\" data-id=\"55eef833\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5d860725 elementor-widget elementor-widget-text-editor\" data-id=\"5d860725\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>The document proposes seven steps for the implementation of cybersecurity, taking into account the cybersecurity master plan as a management tool to meet the proposed objectives and goals:<\/p><ol><li>Include cybersecurity as a priority in the organization&#039;s strategic management.<\/li><li>Define the organizational structure in cybersecurity.<\/li><li>Define cybersecurity goals and objectives.<\/li><li>Carry out a diagnosis of the situation with gap analysis or GAP.<\/li><li>Develop a cybersecurity master plan.<\/li><li>Execute the master plan.<\/li><li>Evaluate the results and the remaining risk.<\/li><\/ol><p>In addition, the IDB has developed <a href=\"https:\/\/www.iadb-tools.org\/\">iadb-tools.org<\/a>, a cybersecurity self-assessment tool, for cellular breaches and to know recommendations for the preparation of the master plan. In this way, those responsible for organizations can evaluate their cybersecurity situation based on the best practices in the industry.<\/p><p>The document retrieves the most important tools within health ecosystems and classifies them into four groups: <em>frameworks<\/em>, controls, guides and regulatory framework. &quot;It is always important to emphasize that the joint use of these tools will give consistency to the system as a whole, from regulation, implementation, execution, and control and monitoring,&quot; the authors explain.<\/p><p>The <em>frameworks<\/em>, include tools such as ISO\/IEC 27001:2013, the NIST Cybersecurity Framework v1.1 software, among others. The controls contemplate the SANS \u2013 CIS Critical Security Controls, a publication on the best practices of computer security.\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0<\/p><p>On the other hand, regulatory frameworks include GDPR and HIPAA, regulatory laws in the European Union and the United States respectively. And finally, the guides include documents such as documents from the United States National Institute of Standards and Technology (NIST), among other publications.<\/p><p>In this context, the authors conclude that &quot;one of the main challenges organizations face is choosing which methodologies, standards and good practices to follow in terms of information security.&quot;<\/p><p>Check the complete guide in the following link: <a href=\"https:\/\/publications.iadb.org\/publications\/spanish\/document\/protegiendo-la-salud-digital-una-guia-de-ciberseguridad-en-el-sector-de-salud.pdf\">https:\/\/publications.iadb.org\/publications\/spanish\/document\/protegiendo-la-salud-digital-una-guia-de-ciberseguridad-en-el-sector-de-salud.pdf<\/a><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-7a52044a elementor-section-boxed elementor-section-height-default elementor-section-height-default wpr-particle-no wpr-jarallax-no wpr-parallax-no wpr-sticky-section-no wpr-equal-height-no\" data-id=\"7a52044a\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-58e3ca3\" data-id=\"58e3ca3\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1aa23cdc elementor-widget elementor-widget-toggle\" data-id=\"1aa23cdc\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"toggle.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle\">\n\t\t\t\t\t\t\t<div class=\"elementor-toggle-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-4461\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"button\" aria-controls=\"elementor-tab-content-4461\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon elementor-toggle-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-closed\"><i class=\"fas fa-caret-right\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-toggle-icon-opened\"><i class=\"elementor-toggle-icon-opened fas fa-caret-up\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-toggle-title\" tabindex=\"0\"> BIBLIOGRAPHY<\/a>\n\t\t\t\t\t<\/div>\n\n\t\t\t\t\t<div id=\"elementor-tab-content-4461\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"region\" aria-labelledby=\"elementor-tab-title-4461\"><p><strong>IDB<\/strong><\/p><p><a href=\"https:\/\/publications.iadb.org\/publications\/spanish\/document\/Descripcion-de-la-herramienta-de-autoevaluacion-para-el-sector-salud-provista-por-el-BID.pdf\">https:\/\/publications.iadb.org\/publications\/spanish\/document\/Descripcion-de-la-herramienta-de-autoevaluacion-para-el-sector-salud-provista-por-el-BID.pdf<\/a><\/p><p><a href=\"https:\/\/publications.iadb.org\/publications\/spanish\/document\/protegiendo-la-salud-digital-una-guia-de-ciberseguridad-en-el-sector-de-salud.pdf\">https:\/\/publications.iadb.org\/publications\/spanish\/document\/protegiendo-la-salud-digital-una-guia-de-ciberseguridad-en-el-sector-de-salud.pdf<\/a><\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>El Banco Interamericano de Desarrollo (BID), realiz\u00f3 una gu\u00eda sobre las normas, marcos de trabajo, est\u00e1ndares y buenas pr\u00e1cticas sobre ciberseguridad en sistemas de salud. \u201cProtegiendo la salud digital &#8211; Una gu\u00eda de ciberseguridad en el sector de salud\u201d, es un documento realizado por los especialistas del BID, Pablo Alzuri, Florencia Cabral, Santiago Nowersztern, y Pablo Libedinsky. La digitalizaci\u00f3n es uno de los ejes clave para la recuperaci\u00f3n econ\u00f3mica y social, que plantea el BID en su Visi\u00f3n 2025. En este sentido es necesario proteger el espacio digital y comprender el importante rol de la ciberseguridad en todos los procesos de transformaci\u00f3n digital. La gu\u00eda explica que la \u201cciberseguridad en el sector salud es particularmente relevante debido a la sensibilidad de la informaci\u00f3n que maneja\u201d. Por ejemplo, soluciones como la historia cl\u00ednica electr\u00f3nica, dispositivos m\u00e9dicos o la telemedicina. En este sentido, la gu\u00eda del BID plantea una recopilaci\u00f3n y clasificaci\u00f3n del conocimiento global en cuanto a normas, marcos regulatorios, est\u00e1ndares, buenas pr\u00e1cticas, gu\u00edas de implementaci\u00f3n, entre otros documentos orientados a la implementaci\u00f3n de ciberseguridad. El documento propone siete pasos para la implementaci\u00f3n de ciberseguridad, tomando en cuenta el plan director de ciberseguridad como instrumento de gesti\u00f3n para cumplir los objetivos y metas propuestas: Incluir la ciberseguridad como prioridad en la gesti\u00f3n estrat\u00e9gica de la organizaci\u00f3n. Definir la estructura organizacional en ciberseguridad. Definir los objetivos y las metas de ciberseguridad. Realizar un diagn\u00f3stico de situaci\u00f3n con an\u00e1lisis de brechas o GAP. Elaborar un plan director de ciberseguridad. Ejecutar el plan director. Evaluar los resultados y el riesgo remanente. Asimismo, el BID ha desarrollado iadb-tools.org, una herramienta de autoevaluaci\u00f3n de ciberseguridad, para celular brechas y conocer recomendaciones para la elaboraci\u00f3n del plan director. &nbsp;De esta forma los responsables de las organizaciones pueden evaluar su situaci\u00f3n de ciberseguridad bas\u00e1ndose en las mejores pr\u00e1cticas de la industria. El documento recupera las herramientas m\u00e1s importantes dentro de los ecosistemas de salud y las clasifica en cuatro grupos: frameworks, controles, gu\u00edas y marco regulatorio. &#8220;Siempre es importante destacar que el uso conjunto de estas herramientas dar\u00e1 consistencia al sistema en su totalidad, desde la regulaci\u00f3n, la implementaci\u00f3n, la ejecuci\u00f3n, y el control y monitoreo&#8221;, explican los autores. Los frameworks, incluyen, herramientas como el ISO\/IEC 27001:2013, el software NIST Cybersecurity Framework v1.1, entre otros. Los controles contemplan el SANS &#8211; CIS Critical Security Controls, una publicaci\u00f3n sobre las mejores pr\u00e1cticas de seguridad inform\u00e1tica.&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Por otra parte, los marcos regulatorios incluyen GDPR y HIPAA, leyes sobre regulaci\u00f3n en la Uni\u00f3n Europea y Estados Unidos respectivamente. Y finalmente, las gu\u00edas incluyen documentos como documentos del Instituto Nacional de Est\u00e1ndares y Tecnolog\u00eda de Estados Unidos (NIST), entre otras publicaciones. En este contexto, los autores concluyen que \u201cuno de los principales desaf\u00edos que enfrentan las organizaciones es elegir qu\u00e9 metodolog\u00edas, est\u00e1ndares y buenas pr\u00e1cticas seguir en materia de seguridad de la informaci\u00f3n\u201d. Consulta la gu\u00eda completa en el siguiente enlace: https:\/\/publications.iadb.org\/publications\/spanish\/document\/protegiendo-la-salud-digital-una-guia-de-ciberseguridad-en-el-sector-de-salud.pdf BIBLIOGRAF\u00cdA BID https:\/\/publications.iadb.org\/publications\/spanish\/document\/Descripcion-de-la-herramienta-de-autoevaluacion-para-el-sector-salud-provista-por-el-BID.pdf https:\/\/publications.iadb.org\/publications\/spanish\/document\/protegiendo-la-salud-digital-una-guia-de-ciberseguridad-en-el-sector-de-salud.pdf<\/p>","protected":false},"author":1,"featured_media":24671,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[156,160,3396],"tags":[145],"class_list":["post-24670","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-big-data","category-noticias","category-uso-de-plataformas-digitales","tag-noticias"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/saluddigital.com\/en\/wp-json\/wp\/v2\/posts\/24670","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/saluddigital.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/saluddigital.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/saluddigital.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/saluddigital.com\/en\/wp-json\/wp\/v2\/comments?post=24670"}],"version-history":[{"count":0,"href":"https:\/\/saluddigital.com\/en\/wp-json\/wp\/v2\/posts\/24670\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/saluddigital.com\/en\/wp-json\/wp\/v2\/media\/24671"}],"wp:attachment":[{"href":"https:\/\/saluddigital.com\/en\/wp-json\/wp\/v2\/media?parent=24670"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/saluddigital.com\/en\/wp-json\/wp\/v2\/categories?post=24670"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/saluddigital.com\/en\/wp-json\/wp\/v2\/tags?post=24670"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}