Copenhagen, Denmark
Unumed's Hospital Management System offers EHR, full financial management, telemedicine, specialist information systems, AI, real-time analytics and much more, all in one complete system. Unumed HMS is the world’s only true cloud native HMS, bringing the unprecedented performance that you have been waiting for.
Unumed needed to ensure its cloud-native hospital management system remained secure and fully compliant with ISO 27001 requirements. Their business goal was to protect patient data and guarantee uninterrupted operations across multiple regions—
including Africa, SE Asia, and Central America—while maintaining trust among healthcare providers and patients. By testing their security posture, they aimed to uphold credibility in a competitive global market and prepare for the annual ISO 27001 audit.
Role-based access controls for various users (doctors, nurses, administrators) might be insufficient, allowing unauthorized access to sensitive information.
APIs and third-party integration points, including laboratory systems and IoT devices, might contain security flaws compromising data exchange.
Insecure configurations such as overly permissive IAM roles or exposed storage buckets may leave critical cloud resources at risk.
The system might be vulnerable to denial-of-service attacks, which could disrupt critical hospital operations.
We conducted a targeted black-box test on the primary web application, focusing on the OWASP Top 10 vulnerabilities, such as SQL injections and cross-site scripting while confirming the reliability of authentication and authorization mechanisms.
We evaluated the security of associated APIs and web services, looking for misconfigurations or exposure points that could jeopardize patient data or system operations.
Findings were compiled into a comprehensive report. This included a detailed risk analysis prioritizing vulnerabilities based on exploitability and the likelihood of affecting patient data and operational uptime. We also analyzed business impact, highlighting how these issues could influence compliance and everyday activities. We provided precise remediation recommendations aligned with ISO 27001.
The engagement concluded with a final presentation to review key vulnerabilities and next steps, ensuring that all technical teams and decision-makers clearly understood the results.
Our approach was aligned with industry standards, including the Penetration Testing Execution Standard (PTES) and the OWASP Testing Guides. The testing began with a reconnaissance phase where testers collected publicly available information to simulate an attacker gaining initial knowledge about the target.
Deploying automated tools to discover common vulnerabilities.
Manual testing was crucial for deeper insights, particularly in complex authentication mechanisms and custom-built APIs.
Real-world attack scenarios were simulated to test the system's resilience against sophisticated attacks.
Each test was conducted in an isolated environment to prevent any actual impact on the client's operations. Our testers operated under strict confidentiality and integrity guidelines, ensuring that all findings were securely reported.
Our security testing arsenal is stacked with cutting-edge tools implementing in different areas like AI in cybersecurity that enable us to identify vulnerabilities in third-party dependies with static analysis tool such as Semgrep, enforce code standards, and fortify your defenses.
Our assessment confirmed the client's strong security posture and revealed no critical or high-severity vulnerabilities. We only identified low to medium-severity issues related to access controls and data validation. Addressing these concerns required straightforward updates, and we collaborated closely with the client to suggest a series of targeted improvements.
The enhanced security controls minimized the likelihood of unauthorized access and data breaches and ensured compliance with ISO 27001 and security best practices.
Furthermore, our approach emphasized a balance between security and operational efficiency. By focusing on targeted improvements and risk-based prioritization, we helped the client avoid costly system overhauls and disruptions to their everyday operations.
The implemented solutions were designed to be scalable and adaptable to the client's evolving needs, ensuring long-term effectiveness and a sustainable security posture.
With certifications PenTest+, CEH, eJPT and eWPT, our team possesses deep expertise and technical skills to identify vulnerabilities and simulate real-world attack. We provide cloud penetration testing, wireless penetration testing, social engineering testing, mobile and web application penetration testing, API penetration testing, external and internal network pen testing.