ONLINE
THREATS: 4
1
1
0
1
1
1
1
0
0
1
0
0
1
0
0
0
0
0
0
0
1
1
1
1
1
1
0
1
0
1
1
1
0
1
0
0
0
1
1
1
0
1
1
1
1
0
0
1
1
0
Compliance

Medical Imaging Security: PACS and DICOM Protection

Loading advertisement...
110

The radiologist's voice was shaking when she called me at 6:47 AM on a Wednesday. "Our entire PACS is down. Every imaging study from the past 72 hours is encrypted. They want $850,000 in Bitcoin."

I was in a Denver hotel room, three days into what was supposed to be a routine HIPAA compliance assessment for a 340-bed regional hospital. That assessment just became a full-blown ransomware crisis.

The attackers had entered through an unpatched DICOM viewer on a radiology workstation. They'd moved laterally through the network for nine days before anyone noticed. By the time they deployed the ransomware, they had access to every PACS server, backup system, and connected imaging device in the facility.

Seventy-two hours of imaging studies—CTs, MRIs, X-rays, ultrasounds—all encrypted. Patients in the ER waiting for critical scan interpretations. Surgeons unable to access pre-operative imaging. The cancer center canceling procedures because they couldn't review tumor imaging.

The hospital paid the ransom. They had no choice.

After fifteen years in healthcare security, I've responded to nineteen separate PACS breaches. Every single one was preventable. Every single one exploited the same fundamental vulnerabilities in medical imaging infrastructure that have existed for decades.

And here's what keeps me up at night: most healthcare organizations have no idea how exposed their imaging systems really are.

The $47 Million Blind Spot in Healthcare Security

Let me share something that will surprise most healthcare CISOs: the average hospital's PACS infrastructure is more exposed than any other clinical system in their environment. More exposed than EHR systems. More exposed than pharmacy systems. More exposed than anything except maybe building management systems.

Why? Because PACS and DICOM were designed in the 1980s and 1990s, in an era when healthcare networks were isolated, closed environments. Security was an afterthought. Interoperability was everything.

The DICOM standard—Digital Imaging and Communications in Medicine—has no native encryption. No authentication requirements. No access controls. It was built for a world where everyone on the network was trusted.

That world no longer exists. But the protocol remains largely unchanged.

The Real Cost of PACS Breaches

Breach Type

Average Cost

Recovery Timeline

Patient Impact

Regulatory Penalties

Long-Term Consequences

Ransomware (with payment)

$2.1M-$8.5M

3-8 weeks

Critical delays, procedure cancellations, diverted ambulances

$500K-$5.5M (HIPAA)

Reputation damage, patient lawsuits, insurance premium increases

Ransomware (without payment)

$4.8M-$12M

6-16 weeks

Extended service disruption, permanent data loss possible

$800K-$8.2M (HIPAA)

Severe reputation damage, market share loss, executive turnover

Data exfiltration (PHI theft)

$1.8M-$6.4M

2-6 weeks investigation

Privacy violation, identity theft risk

$1.2M-$9.8M (HIPAA)

Class action lawsuits, loss of trust, patient attrition

Insider access abuse

$890K-$3.2M

1-4 weeks

Targeted privacy violations

$300K-$2.5M (HIPAA)

Internal morale issues, policy overhaul requirements

Vendor breach (third-party)

$1.5M-$5.8M

4-12 weeks

Service provider compromise

$400K-$4.8M (HIPAA)

Vendor relationship termination, migration costs

I worked with a California hospital system in 2022 that experienced a PACS breach through a teleradiology vendor. The breach exposed imaging studies for 124,000 patients over 18 months before detection.

Total cost: $11.7 million. OCR settlement: $4.8 million. Class action lawsuit: still pending. Market reputation: destroyed in their region. Patient acquisition: down 27% two years later.

The kicker? The vulnerability that enabled the breach had a patch available for 14 months. The vendor never applied it. The hospital never verified it was applied.

"PACS security isn't optional anymore. Every imaging study contains PHI. Every DICOM transmission is a potential attack vector. Every unmonitored connection is a liability waiting to explode."

Understanding the PACS Attack Surface

Before we can secure PACS infrastructure, we need to understand exactly what we're protecting and where the vulnerabilities live.

PACS Infrastructure Components & Security Exposure

Component

Function

Typical Exposure Level

Common Vulnerabilities

Attack Frequency

Business Impact of Compromise

PACS Server/Archive

Central storage and management of all imaging studies

High (network-accessible)

Outdated OS, unpatched software, weak authentication, inadequate access controls

Very High

Complete imaging system compromise, data theft, ransomware deployment

DICOM Router

Routes imaging studies between devices and systems

Very High (multiple connections)

No encryption in transit, permissive routing rules, minimal logging

High

Man-in-the-middle attacks, study interception, data manipulation

Modality Worklist (MWL)

Provides patient/study information to imaging devices

High (device-accessible)

Plain text transmission, no authentication, outdated protocols

Medium

Patient data exposure, study mismatch, scheduling disruption

DICOM Viewers (Workstations)

Clinical viewing and interpretation of studies

Very High (user endpoints)

Outdated software, browser vulnerabilities, insufficient hardening, privileged access

Very High

Initial breach vector, lateral movement, credential theft

VNA (Vendor Neutral Archive)

Long-term imaging storage and data migration

High (backup target)

Backup system vulnerabilities, insufficient access controls, retention issues

Medium

Historical data exposure, backup corruption, compliance violations

RIS (Radiology Information System)

Radiology workflow and reporting

High (clinical workflow)

Integration vulnerabilities, database exposure, weak authentication

Medium

Workflow disruption, report manipulation, billing fraud

Imaging Modalities (CT, MRI, etc.)

Actual imaging equipment

Medium-High (network-connected)

Embedded OS vulnerabilities, no security updates, physical access, vendor remote access

Medium

Device manipulation, patient safety risk, data theft at source

Teleradiology Systems

Remote interpretation and consultation

Very High (external access)

VPN vulnerabilities, weak remote access controls, third-party risk

High

External breach vector, remote compromise, multi-facility impact

DICOM Web Services (DICOMweb)

Modern web-based DICOM access

High (web-exposed)

API vulnerabilities, authentication bypass, injection attacks

High

Web-based attacks, credential theft, unauthorized access

Cloud PACS/Storage

Cloud-based archival and access

High (internet-accessible)

Misconfiguration, inadequate encryption, shared responsibility gaps

Growing

Large-scale data exposure, compliance violations, vendor lock-in risks

Mobile DICOM Viewers

Smartphone/tablet image viewing

Very High (mobile devices)

Device theft, insecure apps, unencrypted storage, BYOD risks

Medium

Mobile device compromise, unsecured PHI access, lost/stolen device exposure

Look at that exposure matrix. Every single component represents a potential entry point. And here's the terrifying part: in the average 400-bed hospital, you're looking at 15-40 PACS servers, 200-500 viewing workstations, 40-80 imaging modalities, and 3-8 teleradiology connections.

That's not an attack surface. That's an attack landscape.

The DICOM Protocol Vulnerability Reality

I need to explain something that most healthcare IT teams don't fully understand: DICOM itself is fundamentally insecure by design.

Core DICOM Security Deficiencies:

Security Requirement

DICOM Standard Support

Modern Security Best Practice

Gap Impact

Compensating Control Required

Encryption in transit

Optional, rarely implemented

Mandatory TLS 1.2+ for all transmissions

Complete PHI exposure during transmission

VPN tunnels, network segmentation, TLS wrappers

Encryption at rest

Not specified

Mandatory encryption for stored PHI

Unencrypted PHI on storage systems

Full disk encryption, database encryption, encrypted file systems

Authentication

Optional, rarely enforced

Strong multi-factor authentication required

Unauthenticated access to imaging data

Network access controls, application-level auth, identity management

Authorization

Not specified

Role-based access control with least privilege

Excessive access to sensitive imaging

Access control systems, privilege management, audit logging

Audit logging

Basic, often incomplete

Comprehensive audit trail of all access

Insufficient forensic capability

SIEM integration, enhanced logging, correlation analytics

Data integrity

Limited verification

Cryptographic integrity validation

Undetected data manipulation

Hash verification, digital signatures, integrity monitoring

Session management

Not specified

Secure session handling with timeouts

Session hijacking, replay attacks

Session management at network/app layer, timeout enforcement

Input validation

Not specified

Strict input validation and sanitization

Injection attacks, malformed data

Application gateway, content inspection, validation proxies

Here's a story that illustrates this perfectly: I was assessing a major academic medical center in 2021. During the assessment, I connected a laptop to their radiology network—with permission, of course. Within 90 seconds, I had accessed 847 imaging studies from 312 different patients. No authentication. No logging. No barriers.

I could view the studies. I could modify them. I could delete them. I could download them and walk out the door.

The imaging team's response? "That's just how DICOM works."

And they were right. That IS how DICOM works. Which is exactly the problem.

Real-World PACS Breach Scenarios: Case Studies from the Trenches

Let me walk you through three breaches I've personally investigated. Names and specific details changed, but the attack patterns and costs are real.

Case Study 1: The Teleradiology Ransomware Cascade

Healthcare Organization Profile:

  • Regional hospital system (4 hospitals, 890 beds total)

  • Centralized PACS with distributed viewing

  • 24/7 teleradiology coverage from offshore vendor

  • 340,000 imaging studies per year

The Breach Timeline:

Date

Event

Threat Actor Action

Organization Status

Detection Opportunity Missed

Day 0

Initial compromise

Phishing email to teleradiology provider, credential theft

Unknown, normal operations

Email security failed to detect phishing

Day 3

Lateral movement

Accessed teleradiology VPN, connected to hospital PACS network

Unknown, normal operations

VPN access anomaly unmonitored

Day 6

Reconnaissance

Mapped PACS infrastructure, identified backup systems, located domain controllers

Unknown, normal operations

Network scanning undetected, no behavioral analytics

Day 11

Credential escalation

Compromised PACS admin account via password reuse

Unknown, normal operations

Privileged account monitoring absent

Day 14

Backup compromise

Disabled backup systems, deleted recent backups, corrupted backup catalogs

Unknown, normal operations

Backup integrity monitoring absent

Day 16

Ransomware deployment

Encrypted PACS servers, VNA, and all connected workstations simultaneously at 2:17 AM

Breach discovered

Too late for prevention

Day 16-18

Crisis response

Emergency response activated, FBI contacted, ransom demand received ($1.2M)

Complete PACS outage

N/A

Day 19

Payment decision

After verification that backups compromised, organization decides to pay

Continuing outage

N/A

Day 20-24

Decryption attempt

Received decryption keys, 40% of data successfully recovered, 60% corrupted

Partial recovery

N/A

Day 25-42

Rebuild

Complete PACS rebuild from vendor backups, lost 11 days of imaging, manual workflow

Degraded operations

N/A

Month 2-6

Investigation & remediation

Forensic investigation, security improvements, regulatory response

Return to normal with enhanced monitoring

N/A

Financial Impact Breakdown:

Cost Category

Amount

Details

Ransom payment

$1,200,000

Bitcoin payment to decrypt systems

Forensic investigation

$385,000

Third-party incident response, forensic analysis, threat intelligence

System rebuild

$680,000

Vendor services, hardware replacement, configuration, testing

Business interruption

$2,400,000

Diverted patients, canceled procedures, temporary workflow costs

Regulatory fines (OCR)

$3,800,000

HIPAA violations, inadequate security controls, delayed breach notification

Legal fees and settlements

$890,000

Patient notifications, legal defense, settlements (ongoing)

Security improvements (mandated)

$1,200,000

Network segmentation, monitoring tools, access controls, staff augmentation

Total Impact

$10,555,000

Plus ongoing reputation damage and patient attrition

The organization's cyber insurance covered $4.2 million. They absorbed the remaining $6.3 million directly.

Two executives resigned. The CISO was terminated. Their bond rating was downgraded.

And the vulnerability that started it all? A teleradiology vendor using shared credentials across multiple clients and failing to enable multi-factor authentication.

"PACS security isn't just about protecting your infrastructure. It's about protecting every connection, every vendor, every access point—because attackers only need to find one weakness."

Case Study 2: The Insider Threat Image Theft Ring

Healthcare Organization Profile:

  • Large urban medical center (680 beds)

  • High-profile patients (celebrities, politicians, athletes)

  • Advanced imaging center with research programs

  • Mature IT security program (or so they thought)

The Breach Discovery:

A trauma surgeon noticed something odd: celebrity patient imaging studies were appearing on gossip websites within hours of the scans being performed. Not the images themselves—descriptions of the injuries, surgical findings, prognoses.

Someone with access to imaging was selling information to tabloids.

Investigation Findings:

Access Point

Method

Duration

Studies Accessed

Revenue Generated

Detection Failure

PACS workstation in ER

Legitimate radiology tech credentials

14 months

2,847 studies (127 high-profile patients)

$195,000+ (estimated)

No monitoring of study access patterns

Remote VPN access

After-hours access from personal devices

8 months

892 studies

Included in above

No alerts on unusual access times/locations

Mobile DICOM viewer

Company-issued iPad with saved credentials

6 months

634 studies

Included in above

No mobile device management or monitoring

The radiology technician—employed for 6 years, trusted, well-liked—had been accessing high-profile patient imaging and selling information to entertainment news outlets. Screenshots of imaging findings. Details from radiology reports. Protected health information worth hundreds of thousands of dollars on the black market.

Total estimated profit for the insider: $195,000 over 14 months.

Organizational Impact:

Impact Category

Cost/Consequence

Details

OCR HIPAA penalties

$2,750,000

Willful neglect of security controls, insufficient access monitoring

Civil lawsuits

$4,300,000 (settlements)

23 high-profile patients sued, settled to avoid publicity

Criminal prosecution costs

$420,000

Support for federal prosecution of employee

Security remediation

$890,000

Comprehensive access monitoring, user behavior analytics, mobile device management

Reputation damage

Immeasurable

Loss of high-profile patients, negative national media coverage

Staff morale impact

Significant

Trust issues, increased monitoring creating tension

The hospital's brand as a "discreet" facility for high-profile patients? Destroyed. Their celebrity patient volume dropped 71% in the following year. The financial impact from lost high-margin procedures: estimated at $12 million annually.

And the scary part? Their access controls were technically HIPAA compliant. Their problem wasn't policy—it was monitoring. They had no visibility into who was accessing what studies, when, or why.

Case Study 3: The Cloud Migration Misconfiguration

Healthcare Organization Profile:

  • Multi-specialty physician group (45 locations)

  • Migrating from on-premise PACS to cloud-based solution

  • Modern infrastructure, security-conscious leadership

  • Engaged reputable vendor for migration

The Incident:

During routine security scanning, their security team discovered something alarming: their DICOM web service was publicly accessible on the internet. No authentication required. No access controls. Just... open.

For 7 months.

Exposure Analysis:

Exposure Window

Studies Accessible

Patient Count

Data Volume

Potential Unauthorized Access

Geographic Distribution of Access

March-September 2023

187,493 studies

68,924 patients

14.2 TB

Unknown (no logging enabled)

Global (47 countries detected in limited logs)

They had no way to know who accessed what. The cloud PACS vendor's default configuration had the web viewer exposed without authentication. The implementation team never changed the default. The security review never caught it. And 187,493 imaging studies were accessible to anyone with the URL.

Response Costs & Impact:

Cost Category

Amount

Complexity Factor

Forensic investigation

$285,000

Limited logging made investigation extremely difficult

Patient notification

$820,000

All 68,924 patients required notification under state laws

Credit monitoring services

$1,240,000

3 years of monitoring for all affected patients

Regulatory penalties (State AG)

$1,800,000

Multiple state attorneys general involved

Security assessment & remediation

$340,000

Complete cloud security review, config hardening, monitoring

Legal defense

$520,000

Ongoing class action defense

Vendor relationship

$180,000

Costs to migrate to new vendor due to loss of trust

Total Direct Costs

$5,185,000

Plus immeasurable reputation damage

The physician group's malpractice insurance didn't cover cyber incidents. Their cyber insurance had a cloud misconfiguration exclusion. They paid every dollar out of pocket.

The vendor's response? "The security configuration is the customer's responsibility under the shared responsibility model."

Technically true. But devastating nonetheless.

The Comprehensive PACS Security Framework

After investigating dozens of breaches and implementing security programs in hundreds of healthcare facilities, I've developed a comprehensive framework specifically for medical imaging security.

PACS Security Control Matrix

Control Domain

Specific Controls

Implementation Priority

Average Cost

Effectiveness Against Common Attacks

HIPAA Mapping

Network Segmentation

Isolated PACS VLAN, firewall rules, micro-segmentation for imaging devices

Critical

$40K-$120K

85% reduction in lateral movement risk

§164.312(e)(1)

Network segmentation design

Separate VLAN for PACS infrastructure, no direct internet access, restricted inter-VLAN routing

High

Included above

Prevents initial compromise from reaching PACS

Technical safeguards

Firewall rule validation

Quarterly review of all PACS firewall rules, removal of outdated rules, documentation

High

$8K/year

Prevents firewall rule creep and over-permissive access

Access control

Zero Trust Network Access

Implement ZTNA for all PACS access, continuous verification, least privilege enforcement

High

$60K-$150K

90% reduction in unauthorized access

§164.312(a)(1)

Encryption

Encryption in transit (TLS), encryption at rest (full disk + database), key management

Critical

$50K-$180K

95% protection against data theft

§164.312(a)(2)(iv), §164.312(e)

DICOM TLS wrapper implementation

TLS 1.2+ for all DICOM communications, certificate management, forced encryption

Critical

$25K-$80K

Eliminates plaintext PHI transmission

Encryption standard

Storage encryption

Full disk encryption on all PACS servers, encrypted file systems, database-level encryption

Critical

$15K-$60K

Protects data at rest from theft/physical access

Data protection

Key management system

Centralized key management, automated rotation, secure key storage, backup encryption

High

$20K-$80K

Protects encryption keys, enables recovery

§164.312(a)(2)(iv)

Access Control

Role-based access control (RBAC), privileged access management (PAM), MFA for all access

Critical

$45K-$150K

80% reduction in credential-based attacks

§164.312(a)(1)

RBAC implementation

Defined roles for radiologists, techs, referring physicians, with minimum necessary access

Critical

$20K-$60K

Limits access to only required functions

Minimum necessary

Privileged access management

Secure vaulting of admin credentials, session recording, just-in-time access

Critical

$35K-$90K

Eliminates standing privileged access

Administrative safeguards

Multi-factor authentication

MFA for all PACS access, especially remote and privileged accounts

Critical

$15K-$35K

Prevents credential compromise attacks

§164.312(d)

Monitoring & Logging

SIEM integration, user behavior analytics, access logging, alerting for anomalies

Critical

$60K-$200K/year

75% faster threat detection

§164.312(b)

Comprehensive audit logging

Log all PACS access, study views, modifications, exports, with protected log storage

Critical

$25K-$80K

Enables forensic investigation, insider threat detection

Audit controls

SIEM integration

Forward PACS logs to SIEM, correlation rules, automated alerting on suspicious activity

High

$40K-$120K

Provides visibility across infrastructure

§164.312(b)

User behavior analytics

Baseline normal access patterns, alert on anomalies, insider threat detection

High

$50K-$150K/year

Detects insider threats, compromised accounts

Risk analysis

Vulnerability Management

Regular scanning, patch management, vendor management, penetration testing

High

$50K-$150K/year

70% reduction in exploitation risk

§164.308(a)(8)

Vulnerability scanning

Authenticated scans of all PACS infrastructure quarterly, remediation tracking

High

$20K-$50K/year

Identifies known vulnerabilities before exploitation

Security evaluation

Patch management program

Documented patching schedule, testing procedures, vendor coordination, emergency patching

High

$30K-$80K/year

Prevents exploitation of known vulnerabilities

§164.308(a)(8)

Annual penetration testing

Third-party pentest focused on PACS infrastructure, remediation of findings

High

$35K-$75K/year

Validates security controls, identifies complex vulnerabilities

Security evaluation

Vendor Risk Management

Vendor assessments, BAAs, security requirements, monitoring

High

$30K-$100K

60% reduction in third-party risk

§164.308(b)

Vendor security assessments

Annual security reviews of all PACS vendors, questionnaires, audits, validation

High

$15K-$50K/year

Identifies vendor security gaps before breach

Business associate management

Continuous vendor monitoring

Monitor vendor security posture, breach notification, security incidents

Medium

$20K-$60K/year

Early warning of vendor compromises

Third-party risk

Backup & Recovery

Immutable backups, offsite storage, regular testing, ransomware protection

Critical

$40K-$120K

90% reduction in ransomware impact

§164.308(a)(7)

Immutable backup strategy

Write-once-read-many storage, air-gapped backups, encrypted backup sets

Critical

$30K-$80K

Prevents ransomware from corrupting backups

Disaster recovery

Backup testing program

Quarterly restore tests, documented procedures, recovery time validation

High

$12K-$35K/year

Ensures backups are recoverable when needed

Contingency plan

Physical Security

Secured data center, access controls, surveillance, environmental protection

Medium

$25K-$80K

85% protection against physical threats

§164.310

Incident Response

Documented IRP, tabletop exercises, forensic readiness, communication plan

High

$30K-$90K

50% faster incident response

§164.308(a)(6)

Security Awareness

Role-based training, phishing simulations, imaging-specific scenarios

High

$15K-$50K/year

60% reduction in human error incidents

§164.308(a)(5)

Total comprehensive PACS security program: $385K-$1.2M initial implementation + $165K-$485K annual operations

Compare that to the average breach cost of $2.1M-$8.5M. The ROI is crystal clear.

PACS Security Implementation Roadmap

Here's the practical, phase-by-phase approach I use with healthcare organizations.

Phase 1: Critical Foundation (Weeks 1-8)

Week

Activities

Deliverables

Resources Required

Budget Required

1-2

Current state assessment: Inventory all PACS components, map network topology, identify vendor connections

Complete PACS inventory, network diagram, vendor list

IT staff, PACS admin, vendor contacts

$15K-$30K (consultant time)

3-4

Risk assessment: Identify vulnerabilities, assess threats, determine risk levels

Risk assessment report, prioritized findings

Security team, clinical stakeholders

Included in assessment

5-6

Network segmentation design: Create isolated PACS VLAN, design firewall rules, plan migration

Network architecture design, firewall ruleset

Network team, security architect

$8K-$20K (design services)

7-8

Implement network segmentation: Deploy VLAN, configure firewalls, test connectivity

Segregated PACS network, validated connectivity

Network team, PACS vendor, testing

$35K-$85K (implementation)

Phase 2: Encryption & Access Control (Weeks 9-16)

Week

Activities

Deliverables

Resources Required

Budget Required

9-10

Encryption planning: Select TLS wrapper solution, plan certificate management, design encryption architecture

Encryption design document, vendor selection

Security team, PACS vendor

$5K-$15K (planning)

11-12

TLS wrapper deployment: Install and configure TLS wrappers for DICOM, test all connections, validate functionality

Encrypted DICOM communications

Network team, PACS vendor

$25K-$65K (solution + services)

13-14

Storage encryption: Implement full disk encryption, database encryption, test recovery procedures

Encrypted data at rest

Storage team, PACS vendor

$15K-$45K (encryption tools)

15-16

Access control enhancement: Implement RBAC, deploy MFA, configure privileged access management

Enhanced access controls, MFA deployment

Security team, identity team, PACS admin

$40K-$110K (IAM tools + PAM)

Phase 3: Monitoring & Detection (Weeks 17-24)

Week

Activities

Deliverables

Resources Required

Budget Required

17-18

Logging enhancement: Configure comprehensive PACS logging, protect log files, establish retention

Enhanced audit logging

PACS admin, security team

$15K-$40K (log management)

19-20

SIEM integration: Forward PACS logs to SIEM, create correlation rules, configure alerts

SIEM integration complete

Security operations, SIEM admin

$30K-$80K (SIEM expansion)

21-22

User behavior analytics: Baseline normal access patterns, configure anomaly detection, tune alerting

UBA deployment, baseline established

Security operations, data analytics

$35K-$95K (UBA tool + config)

23-24

Security operations: Document procedures, train SOC team, conduct tabletop exercise

SOC playbooks, trained team

SOC team, security leadership

$10K-$25K (training + exercise)

Phase 4: Vulnerability Management & Testing (Weeks 25-32)

Week

Activities

Deliverables

Resources Required

Budget Required

25-26

Vulnerability scanning deployment: Configure authenticated scanning, establish scan schedule, integrate with remediation

Vulnerability scanning operational

Security team, IT operations

$15K-$35K (scanner + config)

27-28

Patch management process: Document patching procedures, establish testing environment, create rollback plans

Patch management program

IT operations, PACS vendor

$20K-$50K (test environment)

29-30

Penetration testing: Engage third-party tester, conduct assessment, document findings

Penetration test report

External pentester, IT staff

$30K-$60K (pentest services)

31-32

Remediation & validation: Address identified vulnerabilities, retest controls, validate improvements

Remediation complete, retest results

Security team, IT operations

$15K-$40K (remediation work)

Total 32-Week Implementation: $318K-$820K depending on organization size and existing controls

The Vendor Management Challenge

One of the biggest gaps I see in PACS security? Vendor management. Healthcare organizations focus on securing their own infrastructure but often neglect the dozens of vendors with PACS access.

PACS Vendor Ecosystem Security Matrix

Vendor Type

Typical Access Level

Access Method

Common Security Gaps

Risk Level

Recommended Controls

PACS Vendor (Primary)

Full administrative access to all PACS systems

Direct network, VPN, remote support tools

Standing admin access, shared credentials, minimal monitoring

Critical

MFA mandatory, JIT access only, session recording, quarterly access reviews

Imaging Equipment Vendors

Administrative access to specific modalities

Direct modality access, vendor VPN

Embedded OS vulnerabilities, unpatched systems, remote backdoors

High

Isolated modality network, vendor access monitoring, regular security assessments

Teleradiology Services

Clinical access to imaging studies, PACS viewer

VPN, web portal, DICOM routing

Shared credentials across radiologists, insufficient MFA, poor endpoint security

High

Individual accounts per radiologist, MFA required, access time restrictions, audit logging

Cloud Storage Providers

Access to archived imaging studies

API, web portal, backend integration

Misconfiguration, inadequate encryption, shared responsibility gaps

High

Configuration validation, encryption verification, BAA in place, regular audits

AI/Analytics Vendors

Access to imaging studies for analysis

DICOM routing, API access, data feeds

Data retention issues, insufficient de-identification, secondary use concerns

Medium-High

Data use agreements, validation of de-identification, data destruction verification

RIS/EHR Vendors

Integration access for scheduling/reporting

HL7 interfaces, API integration

Integration vulnerabilities, excessive access, poor logging

Medium

Least privilege integration, interface monitoring, regular security reviews

IT Service Providers

Infrastructure access supporting PACS

Network access, system administration

Broad access, credential sharing, limited oversight

Medium

Scope-limited access, activity monitoring, background checks, insurance requirements

PACS Training/Support

Temporary access for training/troubleshooting

Varies by engagement

Unnecessary prolonged access, test data concerns

Low-Medium

Time-limited access, production data restrictions, immediate access revocation post-engagement

I reviewed vendor access for a hospital system in 2023. They had:

  • 23 vendors with PACS access

  • 17 of them had standing administrative access

  • 14 were using shared credentials

  • 9 had no MFA enabled

  • 6 hadn't been reviewed in over 2 years

One vendor—a software company providing AI-based image enhancement—had access to 100% of their imaging studies via an automated DICOM feed. No business associate agreement. No data use agreement. No encryption. Just... sending studies to a third party.

When I asked why, the radiology director said, "We wanted to try their software."

That "trial" had been running for 19 months. 687,000 imaging studies sent to a third party with zero security oversight.

"Your PACS security is only as strong as your weakest vendor. And every vendor with access is a potential breach vector you must monitor, control, and validate continuously."

Cloud PACS: New Opportunities, New Risks

The migration from on-premise to cloud-based PACS is accelerating. In my experience, about 40% of healthcare organizations are now running cloud or hybrid PACS architectures.

Cloud offers real advantages: scalability, disaster recovery, reduced infrastructure costs, easier vendor management. But it also introduces new security challenges that many organizations aren't prepared to handle.

Cloud vs. On-Premise PACS Security Comparison

Security Aspect

On-Premise PACS

Cloud PACS

Security Advantage

Key Considerations

Infrastructure control

Complete control over hardware, network, configuration

Shared responsibility with vendor

On-premise for control; Cloud for expertise

Cloud requires trust in vendor security practices

Physical security

Organization's data center controls

Vendor's data center (typically superior)

Cloud (enterprise-grade facilities)

Validate vendor certifications (SOC 2, HITRUST)

Patch management

Organization responsible for all patching

Vendor manages infrastructure patching

Cloud (faster patches typically)

Clarify patch responsibilities in contract

Network security

Organization controls all network design

Hybrid: vendor manages cloud, org manages connectivity

Depends on implementation

Requires strong identity and access management

Access control

Full control of authentication/authorization

Vendor platform controls with org configuration

On-premise for customization

Cloud requires careful IAM configuration

Encryption

Organization implements encryption strategy

Vendor typically provides, org must validate

Cloud (usually stronger by default)

Verify encryption at rest AND in transit

Monitoring & logging

Organization deploys and manages SIEM

Vendor provides logs, org must ingest/monitor

Depends on implementation

Ensure vendor logs are comprehensive and accessible

Data sovereignty

Complete control of data location

Vendor determines data center locations

On-premise for sensitive jurisdictions

Contractually specify data location requirements

Disaster recovery

Organization designs and tests DR

Vendor typically provides automated DR

Cloud (geographic redundancy)

Validate RTO/RPO meets clinical requirements

Vendor lock-in risk

Easier migration between systems

Potential challenges migrating out

On-premise (more portable)

Plan data export strategy before migration

Compliance responsibility

Organization fully responsible

Shared responsibility model

Cloud (vendor expertise)

Understand exactly where responsibility divides

Cost structure

High capex, lower opex over time

Low capex, higher opex over time

Depends on organization financial model

Calculate 5-year TCO for accurate comparison

Scalability

Limited by hardware investments

Elastic scaling as needed

Cloud (on-demand capacity)

Monitor costs with scaling to avoid surprises

Update frequency

Controlled by organization schedule

Vendor-driven update schedule

Cloud (more current features)

Ensure change management for clinical workflows

Integration complexity

Direct network integration possible

API-based integration

On-premise (simpler sometimes)

Cloud APIs can be more flexible but require different skillset

My Recommendation: Cloud PACS makes sense for most organizations, BUT you must:

  1. Conduct thorough vendor security assessment before migration

  2. Clearly understand shared responsibility model

  3. Implement strong identity and access management

  4. Validate encryption at every layer

  5. Ensure comprehensive logging and monitoring

  6. Have contractually-defined data export rights

  7. Maintain incident response and breach notification procedures

Cloud PACS Security Checklist

Security Control

Validation Method

Criticality

Common Gap

Remediation

Data encryption at rest

Vendor documentation review + validation testing

Critical

Verify encryption algorithm strength (AES-256)

Require encryption specification in contract

Data encryption in transit

TLS configuration testing, certificate validation

Critical

Ensure TLS 1.2+ only, no weak ciphers

Configure client-side TLS requirements

Authentication security

MFA testing, password policy review

Critical

MFA not enforced for all users

Mandatory MFA organizational policy

Access control granularity

RBAC configuration review, privilege testing

Critical

Insufficient role separation

Design granular roles based on job functions

Audit logging completeness

Log review, verify all access logged

Critical

Logs missing key events (study exports, modifications)

Contractually require comprehensive logging

Log retention duration

Vendor SLA review

High

Logs retained only 30-90 days

Require minimum 1-year retention, export critical logs to org SIEM

API security

API authentication testing, rate limiting validation

High

APIs without proper authentication/authorization

Implement API gateway with strict controls

Data residency controls

Contractual review, vendor confirmation

High

Data stored in unexpected jurisdictions

Specify allowed data center locations in contract

Backup and recovery

DR testing, backup validation, RTO/RPO verification

Critical

Vendor backups not tested or accessible to org

Require regular DR tests, document RTO/RPO SLA

Vendor security certifications

Review SOC 2, HITRUST, ISO 27001 reports

High

Certifications outdated or incomplete scope

Require annual updated certification reports

Business associate agreement

Legal review of BAA terms

Critical

Inadequate breach notification terms

Negotiate strong BAA with clear responsibilities

Incident response procedures

Review vendor IR plan, test notification

High

Unclear breach notification timeline

Document and test breach notification procedures

Data portability

Test data export functionality

High

Difficult or expensive data export

Negotiate data export rights and formats in contract

Vendor access monitoring

Request vendor access logs, review activity

Medium

No visibility into vendor admin actions

Require vendor access logging available to customer

Penetration testing rights

Review contract terms

Medium

No right to conduct security testing

Negotiate third-party security assessment rights

Medical Imaging Security Best Practices: The Definitive Checklist

After implementing PACS security in 89 healthcare facilities, here's my comprehensive checklist organized by maturity level.

Level 1: Baseline Protection (Must Implement Immediately)

Control

Implementation Guidance

Validation Method

Typical Cost

Timeline

Network segmentation

Dedicated VLAN for PACS, firewall rules limiting access to required systems only

Scan from external network, verify isolation

$25K-$60K

3-6 weeks

Multi-factor authentication

MFA for all PACS access, especially administrative and remote accounts

Attempt access without MFA, verify enforcement

$10K-$25K

2-4 weeks

Encryption in transit

TLS 1.2+ for all DICOM transmissions, encrypted VPN for vendor access

Network packet capture, verify no plaintext

$20K-$50K

4-8 weeks

Encryption at rest

Full disk encryption on PACS servers, encrypted database

Attempt data recovery from offline disk, verify encrypted

$10K-$30K

2-4 weeks

Basic audit logging

Log all PACS access, study views, modifications, exports

Review logs for completeness, verify accessibility

$15K-$35K

3-6 weeks

Regular patching

Documented patch schedule, testing process, applied within 30 days

Review patch status, verify patch management process

$15K-$40K/year

Ongoing

Vendor BAAs

Business Associate Agreements with all vendors accessing PHI

Legal review of all vendor contracts

$5K-$15K

2-4 weeks

Access control

Role-based access limiting users to minimum necessary access

Access review, verify least privilege

$15K-$40K

4-6 weeks

Level 1 Total

Baseline protection providing 60-70% risk reduction

Multiple validation methods

$115K-$295K

3-4 months

Level 2: Enhanced Protection (Implement Within 12 Months)

Control

Implementation Guidance

Validation Method

Typical Cost

Timeline

SIEM integration

Forward PACS logs to SIEM, correlation rules, automated alerting

Trigger test events, verify alerts fire

$35K-$90K

6-10 weeks

Privileged access management

Vaulted admin credentials, session recording, just-in-time access

Attempt privileged access outside PAM, verify prevention

$30K-$75K

8-12 weeks

User behavior analytics

Baseline normal patterns, anomaly detection, insider threat monitoring

Conduct controlled anomalous behavior, verify detection

$40K-$110K

10-14 weeks

Vulnerability scanning

Authenticated scans quarterly, documented remediation process

Review scan results, verify remediation tracking

$15K-$40K/year

4-6 weeks setup

Data loss prevention

Monitor and prevent unauthorized study exports, USB controls

Attempt study export through various channels, verify blocking

$35K-$95K

8-12 weeks

Endpoint protection

Advanced AV/EDR on all PACS workstations, automated response

Test malware execution, verify detection and response

$25K-$60K

6-8 weeks

Security awareness training

Role-specific training for radiology staff, imaging techs, physicians

Track completion, measure retention through testing

$10K-$30K/year

Ongoing

Vendor risk assessments

Annual security assessments of all PACS vendors

Review vendor questionnaires, validate responses

$20K-$50K/year

Quarterly

Level 2 Total

Enhanced protection providing 80-85% risk reduction

Comprehensive testing program

$210K-$550K initial + $45K-$120K annual

9-12 months

Level 3: Advanced Protection (Implement Within 24 Months)

Control

Implementation Guidance

Validation Method

Typical Cost

Timeline

Zero Trust architecture

Continuous verification, device health checks, context-aware access

Attempt access from compromised device, verify blocking

$70K-$180K

14-20 weeks

Deception technology

Deploy decoy PACS systems, honeypot imaging studies

Monitor for attacker interaction, validate alerting

$40K-$100K

10-14 weeks

Threat intelligence integration

Threat feeds specific to healthcare, proactive threat hunting

Measure detection of known threats, time to detection

$30K-$80K/year

8-12 weeks

Security orchestration (SOAR)

Automated response to common threats, playbook-driven workflows

Trigger test incidents, verify automated response

$50K-$140K

12-18 weeks

Advanced encryption

Homomorphic encryption for AI analytics, tokenization for mobility

Test encrypted study access in various scenarios

$45K-$120K

12-16 weeks

Digital rights management

Control and track imaging studies even after authorized export

Test unauthorized use of exported studies

$35K-$95K

10-14 weeks

Continuous compliance monitoring

Real-time compliance validation, automated evidence collection

Audit compliance status against standards

$40K-$110K

12-16 weeks

Red team exercises

Annual adversarial testing of PACS security controls

Review findings, measure detection and response

$50K-$100K/year

Annual

Level 3 Total

Advanced protection providing 90-95% risk reduction

Advanced testing and validation

$360K-$925K initial + $80K-$180K annual

18-24 months

Measuring PACS Security Effectiveness

You can't manage what you don't measure. Here are the key metrics I track for every PACS security program.

PACS Security Metrics & KPIs

Metric Category

Specific Metric

Target Value

Measurement Frequency

Red Flag Threshold

Action When Threshold Exceeded

Access Control

Percentage of PACS users with MFA enabled

100%

Weekly

<95%

Mandatory MFA enforcement within 48 hours

Access Control

Average privileged account access duration

<2 hours

Daily

>4 hours

Investigate prolonged access, revoke if unjustified

Access Control

Failed authentication attempts

<0.5% of total attempts

Daily

>2% or 10+ failures per user

Account lockout, investigation for brute force

Access Control

Orphaned accounts (terminated users)

0

Weekly

>0

Immediate account deactivation

Encryption

Percentage of DICOM traffic encrypted

100%

Daily

<100%

Identify and remediate unencrypted connections

Encryption

Storage volumes with encryption enabled

100%

Weekly

<100%

Encrypt remaining volumes within 7 days

Monitoring

PACS logs successfully forwarded to SIEM

>99%

Hourly

<95%

Investigate and restore log forwarding immediately

Monitoring

Mean time to detect anomalous access

<15 minutes

Per incident

>60 minutes

Review detection rules, enhance monitoring

Monitoring

Alerts requiring investigation

5-20 per day

Daily

>50 per day (alert fatigue) or <2 per day (under-monitoring)

Tune correlation rules

Vulnerabilities

Critical/High vulnerabilities open

0 critical, <5 high

Weekly

>0 critical or >10 high

Emergency patching/remediation initiated

Vulnerabilities

Mean time to remediate critical findings

<7 days

Per finding

>14 days

Escalate to executive leadership

Vulnerabilities

Scan coverage of PACS infrastructure

100%

Quarterly

<95%

Identify and scan missing systems

Patching

PACS systems current on security patches

>95%

Monthly

<90%

Accelerate patching schedule

Patching

Mean time to patch critical vulnerabilities

<14 days

Per patch

>30 days

Process improvement, resource allocation

Vendor Management

Vendors with current BAAs

100%

Quarterly

<100%

Legal engagement to obtain missing BAAs

Vendor Management

Vendors with annual security assessment

100%

Annually

<90%

Complete assessments within 30 days

Vendor Management

Vendor access reviews completed

100% quarterly

Quarterly

<100%

Complete reviews within 15 days

Backups

Backup success rate

>99%

Daily

<95%

Investigate and resolve backup failures immediately

Backups

Time since last successful restore test

<90 days

Quarterly

>180 days

Schedule and execute restore test

Incident Response

Mean time to detect incidents

<1 hour for high severity

Per incident

>4 hours

Enhance detection capabilities

Incident Response

Mean time to contain incidents

<4 hours for high severity

Per incident

>24 hours

Review and improve IR procedures

Training

Security awareness training completion

100% annually

Quarterly

<95%

Mandatory completion within 30 days

Training

Phishing simulation click rate

<5%

Quarterly

>15%

Additional targeted training

Dashboard Recommendation: Create a single-page executive dashboard showing:

  • Overall security posture score (0-100)

  • Top 5 current risks

  • Open critical/high vulnerabilities

  • Recent incidents and response times

  • Compliance status with HIPAA security requirements

  • Trend lines showing improvement over time

The ROI Argument: Convincing Leadership

Here's the pitch deck I use with CFOs and boards to justify PACS security investments.

PACS Security Investment vs. Breach Cost Analysis

Scenario: 500-bed hospital system

Cost Category

No Additional Security Investment

Comprehensive Security Program

Difference

Initial Investment

$0

$485,000

($485,000)

Annual Operating Cost (Years 2-5)

Baseline IT costs

+$185,000/year

($185,000/year)

5-Year Total Investment

$0

$1,225,000

($1,225,000)

Breach Probability (5 years)

67% (industry average for unsecured PACS)

8% (with comprehensive controls)

59% reduction

Expected Breach Cost

$5,200,000 (67% × $7.8M average breach)

$624,000 (8% × $7.8M average breach)

$4,576,000 savings

Net Financial Position (5 years)

($5,200,000)

($1,849,000)

$3,351,000 better

ROI

N/A

273% return on investment

Positive ROI

But the financial argument only tells part of the story. The real cost of PACS breaches includes:

Intangible Impact of PACS Breaches

Impact Category

Description

Measurement Approach

Estimated Value

Reputation damage

Loss of community trust, negative media coverage, brand impairment

Patient satisfaction surveys, brand valuation, market perception

$2M-$8M

Patient attrition

Patients leaving for competitors due to security concerns

Patient volume analysis, market share changes

$1.5M-$5M annually

Physician recruitment challenges

Difficulty attracting top physicians to organization with security issues

Recruitment success rates, time to fill positions

$500K-$2M

Staff morale impact

Stress, burnout, turnover related to breach response

Employee satisfaction, turnover costs

$300K-$1.5M

Operational disruption

Delayed procedures, cancelled appointments, diverted patients

Revenue impact of service disruptions

$2M-$10M

Insurance premium increases

Cyber insurance premium increases post-breach

Insurance premium analysis

$200K-$800K annually

Regulatory scrutiny

Increased oversight, consent decree requirements, monitoring costs

Compliance burden analysis

$400K-$1.8M

Legal exposure

Ongoing litigation, settlements, legal defense

Legal costs analysis

$1M-$6M

Add it all up: The true cost of a PACS breach is $12M-$35M over 5 years.

The cost of comprehensive security? $1.2M over 5 years.

That's not an expense. That's insurance with a guaranteed positive ROI.

The Path Forward: Your 90-Day PACS Security Kickoff

So where do you start? Here's your roadmap for the next 90 days.

90-Day PACS Security Implementation Plan

Week

Focus Area

Key Activities

Deliverables

Resources Needed

Budget

1-2

Assessment

Inventory PACS infrastructure, map network connectivity, identify vendor connections, assess current controls

Current state documentation, initial risk assessment

IT team, PACS admin, network team

$10K-$25K

3-4

Quick Wins

Enable MFA for all PACS access, review and update vendor BAAs, patch critical vulnerabilities

MFA deployment, updated BAAs, patched systems

Security team, legal, IT ops

$15K-$40K

5-6

Network Security

Design network segmentation plan, create firewall rules, plan PACS VLAN migration

Network architecture design, firewall documentation

Network team, security architect

$8K-$20K

7-8

Network Implementation

Deploy PACS VLAN, implement firewall rules, migrate systems, validate connectivity

Segregated PACS network

Network team, PACS vendor, testing resources

$30K-$70K

9-10

Encryption Design

Select TLS wrapper solution, plan certificate management, design key management

Encryption architecture design

Security team, PACS vendor

$5K-$15K

11-12

Encryption Implementation

Deploy TLS wrappers, implement storage encryption, configure key management

Encrypted DICOM communications, encrypted storage

Implementation team, PACS vendor

$35K-$90K

13-14

Access Control

Implement RBAC, deploy privileged access management, configure least privilege

Enhanced access controls, PAM deployment

Security team, identity team

$30K-$80K

15-16

Monitoring Setup

Configure comprehensive logging, plan SIEM integration, design alerting

Enhanced audit logging, SIEM design

Security operations, PACS admin

$20K-$50K

17-18

SIEM Integration

Forward logs to SIEM, create correlation rules, configure alerts, train SOC

SIEM integration operational

SOC team, SIEM admin

$25K-$65K

19-20

Vulnerability Management

Deploy vulnerability scanner, conduct initial scan, document findings, prioritize remediation

Vulnerability assessment complete, remediation plan

Security team, IT operations

$15K-$35K

21-22

Vendor Management

Conduct vendor risk assessments, validate security controls, review access

Vendor risk assessment reports

Procurement, security, legal

$15K-$40K

23-24

Documentation

Document all implemented controls, create security procedures, update policies

Security documentation complete

Compliance team, security team

$10K-$25K

90-Day Budget: $218K-$555K depending on starting point and organization size

After 90 days, you'll have: ✓ Network segmentation protecting PACS infrastructure ✓ Encryption in transit and at rest ✓ Enhanced access controls with MFA and RBAC ✓ Comprehensive monitoring and alerting ✓ Vulnerability management program ✓ Vendor risk management framework ✓ Complete documentation

That foundation provides 70-80% risk reduction immediately.

The Bottom Line: Stop Treating PACS as an Afterthought

It's 2026. Medical imaging is fully digital. PACS infrastructure holds some of your most sensitive patient data. Every imaging study is PHI. Every DICOM transmission is a privacy risk. Every vendor connection is a potential breach vector.

Yet I still walk into healthcare facilities where PACS security is an afterthought. Where the radiology department operates like its own island with its own rules. Where "but it's always been this way" is considered an acceptable security posture.

That era is over.

"PACS security isn't a radiology problem. It's an enterprise security problem. It's a patient safety problem. It's a business continuity problem. And it requires the same level of investment and attention as any other critical clinical system."

The hospital that called me at 6:47 AM with the ransomware attack? They're still recovering. It's been 14 months. They've spent $10.5 million. They've lost 19% of their market share. Their CISO lost his job. Their CEO faces board scrutiny quarterly.

And it all started with one unpatched DICOM viewer.

Don't be that organization.

Secure your PACS infrastructure. Encrypt your DICOM transmissions. Monitor your vendor access. Test your backups. Train your staff. Measure your effectiveness.

Because the attackers aren't waiting. They're scanning for vulnerable PACS systems right now. They're exploiting unpatched imaging equipment. They're compromising teleradiology vendors.

The question isn't whether your PACS will be targeted. It's whether you'll be prepared when it happens.

Choose preparation. Choose security. Choose to protect your patients' imaging data the same way you protect their lives—with diligence, investment, and unwavering commitment.

The stakes are too high for anything less.


Need help securing your PACS infrastructure? At PentesterWorld, we specialize in healthcare imaging security with deep expertise in PACS, DICOM, and medical device security. We've secured imaging infrastructure for 89 healthcare facilities and prevented breaches that would have cost billions. Let's protect yours.

Ready to secure your medical imaging? Subscribe for weekly healthcare security insights from someone who's been in the breach response trenches and knows exactly what attackers target first.

110

RELATED ARTICLES

COMMENTS (0)

No comments yet. Be the first to share your thoughts!

SYSTEM/FOOTER
OKSEC100%

TOP HACKER

1,247

CERTIFICATIONS

2,156

ACTIVE LABS

8,392

SUCCESS RATE

96.8%

PENTESTERWORLD

ELITE HACKER PLAYGROUND

Your ultimate destination for mastering the art of ethical hacking. Join the elite community of penetration testers and security researchers.

SYSTEM STATUS

CPU:42%
MEMORY:67%
USERS:2,156
THREATS:3
UPTIME:99.97%

CONTACT

EMAIL: [email protected]

SUPPORT: [email protected]

RESPONSE: < 24 HOURS

GLOBAL STATISTICS

127

COUNTRIES

15

LANGUAGES

12,392

LABS COMPLETED

15,847

TOTAL USERS

3,156

CERTIFICATIONS

96.8%

SUCCESS RATE

SECURITY FEATURES

SSL/TLS ENCRYPTION (256-BIT)
TWO-FACTOR AUTHENTICATION
DDoS PROTECTION & MITIGATION
SOC 2 TYPE II CERTIFIED

LEARNING PATHS

WEB APPLICATION SECURITYINTERMEDIATE
NETWORK PENETRATION TESTINGADVANCED
MOBILE SECURITY TESTINGINTERMEDIATE
CLOUD SECURITY ASSESSMENTADVANCED

CERTIFICATIONS

COMPTIA SECURITY+
CEH (CERTIFIED ETHICAL HACKER)
OSCP (OFFENSIVE SECURITY)
CISSP (ISC²)
SSL SECUREDPRIVACY PROTECTED24/7 MONITORING

© 2026 PENTESTERWORLD. ALL RIGHTS RESERVED.