Healthcare IT managers are getting more support in their efforts to protect valuable patient data from cyber attacks.
The U.S. Department of Health and Human Services Cybersecurity and Infrastructure Security Agency recently unveiled the CISA Hunt and Incident Response Program (CHIRP) tool, which is designed to support entities detect threat activity within on-premises environments, according to Health IT Security.
CHIRP is a forensic collection tool that will help network defenders find indicators of compromise with two key threat areas: advanced persistent threat actor attacks tied to the SolarWind compromise and threat activity in Microsoft Cloud environments.
CISA previously launched an IOC tool to help detect compromises within the cloud. The latest provided tool is specifically meant for on-premises networks. By default, CHIRP scans for signs of compromise within an on-premises environment, particularly IOCs associated with the malicious activity around SolarWinds threat activities that have spilled into an on-premises enterprise environment.