Australian Health Audit Finds Clinicians Routinely Bypass Security Controls

NSW Health Audit Uncovers "Normalisation of Non-Compliance" with Cybersecurity Controls

MEDIUM
December 21, 2025
5m read
Policy and ComplianceSecurity OperationsThreat Intelligence

Related Entities

Organizations

NSW Health

Full Report

Executive Summary

An audit of the New South Wales (NSW) Health system in Australia has exposed a deeply rooted cultural issue that undermines its cybersecurity posture. The report reveals a "normalisation of non-compliance" among clinical staff, who routinely bypass fundamental security controls. Practices such as password sharing and using personal devices for work are reportedly commonplace, driven by a desire to save time in high-pressure clinical settings. These findings are particularly alarming given the sensitive nature of patient data and the fact that the Australian healthcare sector is under constant attack from cybercriminals, as evidenced by the recent ransomware attack on the Genea fertility clinic. The audit underscores that technical security investments are being negated by human factors and a lack of security culture.

Incident Overview

This is not a singular incident but a systemic finding from a security audit. The core issue is the widespread and accepted practice of circumventing security policies by clinical staff at NSW Health. Key findings include:

  • Password Sharing: Clinicians regularly share login credentials to access systems, completely breaking the principle of individual accountability.
  • Use of Personal Devices: Staff use personal mobile devices and applications for work-related tasks, moving sensitive patient data outside the secure, managed environment.
  • Intentional Bypassing: The non-compliance is not accidental but intentional, with clinicians making a conscious trade-off between security and perceived efficiency.

This behavior creates a massive, uncontrolled attack surface and renders many technical security controls, such as access logging and multi-factor authentication, ineffective.

Technical Findings & Analysis

The root cause is not a technical vulnerability but a failure of process, culture, and user experience. The insecure behaviors directly enable several MITRE ATT&CK techniques:

  • Initial Access: T1078 - Valid Accounts: If one clinician's password is stolen (e.g., via phishing), the attacker effectively gains access to the accounts of every person they shared it with. This multiplies the impact of a single credential compromise.
  • Defense Evasion: By using personal devices, staff are evading corporate security monitoring, logging, and endpoint protection that would be present on managed devices.
  • Collection: Sensitive patient data is collected and stored on unmanaged, potentially insecure personal devices, making it an easy target for theft or loss.

The audit highlights a critical lesson: if security controls are too cumbersome and impede critical workflows, users will find a way to bypass them. Security must be designed to be as seamless as possible, especially in high-stakes environments like healthcare.

Lessons Learned

  • Security Culture is Paramount: Technical controls alone are not enough. A strong security culture, where every employee understands their role in protecting data, is essential.
  • Usability vs. Security: There is a direct conflict between usability and security in the NSW Health environment. When security measures are too intrusive, staff will prioritize patient care and efficiency over compliance.
  • Insider Risk: While the intent is not malicious, these practices create a significant insider risk. A negligent insider can cause as much damage as a malicious one.
  • Accountability is Broken: Password sharing makes it impossible to perform accurate incident investigation or hold individuals accountable, as logs will show the legitimate account owner performing actions they did not take.

Mitigation Recommendations

Addressing this issue requires a multi-pronged approach that focuses on people, processes, and technology.

  1. Improve Usability and Workflows (Technology):
    • Implement modern authentication solutions like tap-and-go badges (NFC) or biometric logins that are both secure and fast for clinicians.
    • Deploy a secure, enterprise-grade messaging and collaboration platform to eliminate the need for staff to use personal apps like WhatsApp for work.
  2. Mandatory and Continuous Training (People):
    • Implement role-based security awareness training that explains the why behind security policies, using real-world examples from healthcare breaches.
    • Move beyond annual tick-box training to continuous reinforcement and phishing simulations. This aligns with M1017 - User Training.
  3. Enforce Policies and Accountability (Process):
    • Establish a zero-tolerance policy for password sharing. Leadership must champion and enforce this from the top down.
    • Implement technical controls to detect password sharing, such as monitoring for concurrent logins from geographically distant locations.
    • Strengthen password policies and enforce the use of Multi-factor Authentication (MFA) wherever possible, as recommended by M1032 - Multi-factor Authentication.
  4. Secure Managed Devices: Provide clinicians with fast, secure, and easy-to-use corporate-managed mobile devices (e.g., tablets) that give them the tools they need to do their jobs efficiently without resorting to personal devices.

Timeline of Events

1
December 21, 2025
This article was published

MITRE ATT&CK Mitigations

Developing a security culture through continuous, role-specific training is essential to address the root cause of this non-compliance.

Enforcing strong password policies and, more importantly, implementing technical solutions that reduce the need for password entry can mitigate risks.

Mapped D3FEND Techniques:

MFA makes password sharing much more difficult and less effective, as a second factor is required for login.

Mapped D3FEND Techniques:

D3FEND Defensive Countermeasures

To combat the rampant password sharing at NSW Health, the organization must implement a form of Multi-Factor Authentication that is both secure and clinician-friendly. Traditional app-based MFA may be too slow in a fast-paced hospital environment. Instead, NSW Health should deploy physical, proximity-based authentication methods. This could involve issuing staff ID badges with NFC or Bluetooth capabilities that allow them to 'tap-to-log-in' at workstations. This method is fast, intuitive, and physically ties the authentication event to the person present, making password sharing impractical. This directly mitigates the risk of compromised shared credentials being used by attackers and enforces individual accountability for all system access.

NSW Health's security operations team needs to actively hunt for account sharing behavior. By implementing Domain Account Monitoring, they can analyze authentication logs in their SIEM to detect anomalies indicative of sharing. Key detection rules should include: 1) Alerting on concurrent logins for a single user account from multiple, physically separate locations (e.g., different hospital floors or buildings). 2) Correlating login times with employee shift schedules to flag account activity that occurs when the legitimate user is off-duty. 3) Baselining normal user behavior and alerting on significant deviations. These analytics provide concrete evidence of non-compliance, allowing management to address the issue with specific individuals and departments, thereby breaking the 'normalisation' of this risky behavior.

Sources & References

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

HealthcareComplianceInsider RiskPassword SharingSecurity CultureAustralia

📢 Share This Article

Help others stay informed about cybersecurity threats

Continue Reading