Philips HealthSuite Imaging

Delivering secure cloud computing to protect data and enhance operations

Executive Summary

Philips is committed to delivering secure, private, and reliable imaging solutions that enable clinicians and radiologists to provide timely and confident diagnoses.

HealthSuite Imaging (HSI) embodies this commitment through its secure-by-design approach, leveraging the power of cloud computing to streamline image management, collaboration, and reporting. HealthSuite Imaging, our radiology cloud-based services, delivered as a SaaS solution, shifts the operational burden from healthcare providers to trusted partners—Philips and Amazon Web Services (AWS)—who ensure the platform is always up to date, monitored and compliant.

This document outlines the security principles, controls, and technologies embedded within the HSI cloud architecture to protect sensitive healthcare data and ensure operational integrity. It is intended to provide healthcare organizations, IT professionals, and decision-makers with a comprehensive view of how HSI safeguards patient and system information in a cloud environment.

Cloud computing brings new challenges and safeguards: Radiology departments face a demanding dynamic cybersecurity landscape due to their reliance on interconnected systems, constant availability, and high data throughput. Cloud-based platforms add new challenges that demand advanced safeguards—robust identity management, encrypted data storage, audit trails, and compliance controls—to ensure they don't become new entry points for attackers. Yet cloud-based solutions also bring significant improvements in security posture, simplifying upgrades and patching and centralizing and consolidating points of entry.

Introducing HealthSuite Imaging

Delivered as a Software as a Service (SaaS) solution, Philips HealthSuite Imaging (HSI) delivers a modular portfolio of Philips RIS and PACS services, ranging from exam scheduling, through patient registration, documentation, image processing and diagnostic interpretation to result distribution.

HSI provides a security-first architecture designed to mitigate the threats to data in the cloud. It shifts the operational burden from healthcare providers to trusted partners—Philips and Amazon Web Services (AWS)—who ensure the platform is always up to date, monitored and compliant. Security is embedded into every layer, from data encryption and access controls to vulnerability management and real-time threat detection. This enables healthcare IT teams to stay ahead of evolving threats without compromising system performance or clinical availability.

Advanced Security in the Cloud

HealthSuite Imaging benefits from a modern, robust cloud security framework that enhances protection well beyond the capabilities of traditional on-premises environments.

Each HSI instance is deployed in an AWS region selected by Philips based on its proximity to the healthcare provider, ensuring low latency and optimal performance. This architecture promotes fast access to imaging studies while maintaining compliance with local data residency and performance requirements. HSI utilizes the full range of AWS services to secure its infrastructure, including Amazon EC2, S3, ELB, VPC, IAM, KMS, CloudWatch, AppStream, Route53, WAF, and CloudTrail.

The cloud infrastructure is architected with strong network segmentation, isolating public-facing services (e.g., diagnostic viewers and enterprise portals) from backend services (e.g., databases and storage). Virtual Private Cloud (VPC) constructs, security groups and network access control lists (NACLs) are used to strictly control inbound and outbound network flows, ensuring secure and controlled access to all resources.

Deployment Modes

Full Cloud RIS and PACS Services

A HealthSuite Imaging Full Cloud Deployment is a setup where all medical imaging services are hosted entirely in the cloud. This means that the data and applications are stored and managed on remote servers, specifically on Amazon Web Services (AWS).

Hybrid Cloud PACS Services

A HealthSuite Imaging Hybrid Cloud Deployment combines both on-premises and cloud-based components. This setup is well-suited for smaller healthcare providers or environments with lower network performance. It includes an on-premises device called Cloud Connect, which handles local data storage and quick access to images, while synchronizing data with a shared, multi-tenant environment in AWS.

Diagram: Hybrid Cloud Deployment

Diagram illustrating Hybrid Cloud Deployment. It shows an 'Imaging department' with 'Imaging modalities' and 'Reading services' connected to a 'Cloud gateway' containing 'Cloud connect'. This gateway connects via a secure transfer protocol over the internet to the 'AWS Cloud' region. The AWS Cloud features 'Availability Zones' with EC2 servers, databases (APP, DB), and S3 Image Storage. Remote access is provided for 'Reading services' and 'Enterprise Viewing services' via a secure transfer protocol over the internet, connecting to the home network.

Diagram: Full Cloud Deployment

Diagram illustrating Full Cloud Deployment. It shows an 'Imaging department' with 'Imaging modalities' and 'Reading services' connecting via DICOM S&F and AWS Direct Connect to the 'AWS Cloud' region. The AWS Cloud includes 'Availability Zones' with EC2 servers (including Analytics, Rendering, EIS), databases (APP, DB), WIM servers, WIM DB, and S3 Image Storage. Remote access is provided for 'Workflow and Viewing services' via a secure transfer protocol over the internet, connecting to the home network.

Key Security Features

Web Application Firewall (WAF)

HSI implements AWS Web Application Firewall (WAF) directly in front of the RIS and PACS web interfaces, such as the Enterprise Viewer and Diagnostic Client Gateway. WAF acts as a real-time defense layer against malicious traffic, shielding the system from common web exploits, bot activity, denial-of-service attempts, bad reputation IPs, cross-site scripting, and SQL injections. By inspecting HTTP/S traffic before it reaches the application layer, AWS WAF preserves the availability and integrity of the system while ensuring only legitimate users can access critical clinical interfaces.

Virtual Private Cloud (VPC)

The AWS Virtual Private Cloud (VPC) architecture adopted for each HSI customer strictly segments public-facing services and internal components. Access to user-facing systems such as the diagnostic viewer is isolated, while backend systems—including databases and archives—are confined to private subnets inaccessible from the internet. This layered approach ensures sensitive data remains protected, reducing exposure and enabling fine-grained control over internal network flows.

Security from the Start: Product and Service Development

Philips integrates cybersecurity into every phase of product and service development using a comprehensive Product Security Framework aligned with global security standards. This framework, applied across all Philips software products, encompasses structured activities such as Product Security Risk Assessments (PSRA), secure architecture and design, vulnerability and penetration testing, and security training across the organization.

Beyond Technological Threats: Philips applies a mature Information Security Management System (ISMS) to protect the business of customers, meeting objectives for confidentiality, integrity, and availability (the "CIA triad") of data and service. The ISMS uses a holistic approach, covering organizational, people, physical, and technological controls. Its adequacy is assessed annually through internal and external audits.

Diagram: Product Development Lifecycle

Diagram illustrating the product development lifecycle as a loop: Plan, Code, Build, Test, Release, Deploy, Operate, Monitor. Each phase lists associated security activities:

Encryption in Transit

All communication across the HSI platform is encrypted using modern protocols that align with healthcare industry standards. Within the cloud environment, internal services communicate using proprietary protocols secured with Transport Layer Security (TLS), preventing unauthorized interception or manipulation of data.

In HSI Full Cloud Implementation: Communication with medical imaging devices uses DICOM TLS for encrypted and authenticated data exchange. Web-based interfaces and applications use HTTPS secured with TLS 1.2 or above. When connecting on-premises environments to the cloud, the system leverages AWS Direct Connect (DX) enhanced with MACSec encryption, providing confidentiality and integrity at the network level (Layer 2).

In HSI Hybrid Cloud Implementation: The connection is secured using a VPN tunnel established by an SSL appliance device, employing AES-256-CBC cipher for encryption and SHA256 message hash for HMAC authentication. This encrypted channel leverages Transport Layer Security (TLS) for data confidentiality and integrity.

Encryption at Rest

HSI applies strong encryption to all stored data, including metadata and imaging content, to protect it from unauthorized access. Database credentials, certificates, and encryption keys are managed securely through Oracle Wallets, with access restricted to the Philips service team.

AWS native storage services (S3, EBS, FSx) provide built-in encryption capabilities for imaging data. These services use AWS Key Management Service (KMS) with customer-managed keys (CMK) controlled by Philips, ensuring strong separation and confidentiality for each customer's data. Locally attached storage on EC2 instances, FSx for Windows file systems, and Amazon S3 buckets are encrypted using AES-256 keys managed through AWS KMS. Access to these keys is tightly controlled with granular policies, preventing AWS from accessing encrypted content. Credentials and private keys are managed by Philips. Additional safeguards include automated key rotation, comprehensive audit logging via AWS CloudTrail, and strict access control policies enforced through AWS IAM.

Protection in Use

HSI protects data while it is being processed through the AWS Nitro System, the foundational security layer behind Amazon EC2 instances. Nitro prevents even AWS personnel from accessing customer data inside virtual machines. This system was designed to eliminate operator access, meaning there is no backdoor or administrative override. This model was validated by an NCC Group audit in 2023, confirming no mechanism for AWS employees to access data on Nitro-based hosts. This shields customer data from external, internal, and cloud provider threats.

Security Scan

To proactively identify and mitigate vulnerabilities, HSI integrates security scanning tools. These services regularly assess the environment for misconfigurations, compliance drift, and potential security threats. Alerts are prioritized and aggregated to support timely remediation. These automated assessments complement manual reviews and contribute to a continuously monitored security posture.

Endpoint Detection Response (EDR)

Trend Micro's Endpoint Detection and Response (EDR) solution fortifies endpoint security on EC2 instances. EDR provides real-time monitoring, threat detection, and rapid response capabilities for all compute endpoints, ensuring systems hosting PACS components are continuously checked for abnormal behavior. The Philips Security Operations Center (SOC) monitors the install base on a 24/7 basis.

Data Resiliency

Amazon S3 enables the recovery of previous object states, preventing data loss due to accidental deletions or overwrites. Object Lock enforces a Write Once Read Many (WORM) policy, ensuring medical imaging data cannot be altered or removed for a defined retention period. These safeguards are enabled by default for all archived imaging data, supporting a reliable and immutable archive strategy.

Data Durability

HSI leverages the 99.999999999% (11 nines) durability of Amazon S3 for long-term data preservation. S3 stores data redundantly across multiple Availability Zones within an AWS region. The PACS software intelligently selects the most appropriate storage tier based on access patterns, optimizing cost-efficiency while ensuring rapid availability for both recent and historical studies.

General Product Security

All services within the HealthSuite Imaging portfolio are developed following the comprehensive security framework for Philips Radiology Informatics solutions. For more information on the Philips security framework, reference the white paper, "Cybersecurity in Radiology Informatics," available at https://www.usa.philips.com/healthcare/white-paper/cybersecurity-for-radiology-informatics or by contacting a Philips radiology informatics representative. This white paper provides in-depth explanations of Philips security in terms of:

Operational Security

The Philips service and operations team, adhering to ITIL (Information Technology Infrastructure Library) framework, continually evaluates security risks, privacy risks, and controls during HealthSuite Imaging operation and maintenance to minimize risks and maximize availability.

Event Logging, Auditing, and Monitoring

Regulations require organizations to log all activities concerning Protected Health Information (PHI). Each logged event can include warnings, failures, operation performed, user, location (including client IP), and affected information (study instance unique identifier). An audit is an event log that collects important actions and events for tracking and investigating past actions. It is a write/read-only table, meaning Philips can only write to it and read information afterwards; once created, it is never edited or deleted.

Log and audit trails are crucial in cybersecurity for providing a detailed record of system activities, allowing for detection of security incidents, investigation of suspicious events, compliance with regulatory requirements, and analysis of historical data to improve security posture and response strategies. Philips can provide detailed audit trail logs that are IHE ATNA compliant, covering logging, reading, and modifying clinical information.

Audit trail logs are stored locally (encrypted) or transferred to a central Syslog server. Hospital administrators can monitor logged events and identify unusual system activity or suspicious user behavior using the Audit Log Viewer, filtering records and exporting as necessary.

Responding to Cyber Security Threats

The top priority of the 24/7 Philips Security Operations Center (SOC) is safeguarding vital assets like the Vue PACS and Image Management Software. Their multifaceted strategy integrates proactive measures such as continuous monitoring and threat detection, leveraging state-of-the-art technologies.

In the event of an incident, the Philips Imaging Informatics SOC uses rapid triage and containment procedures to isolate affected systems, mitigate harm, and prevent threat spread. Analysts examine forensic evidence, log data, and network traffic to understand attacker tactics, techniques, and objectives. This granular analysis informs response strategies and enhances threat detection capabilities, enabling anticipation and thwarting of future threats.

Philips maintains open dialogue with internal stakeholders, external partners, and regulatory bodies to keep all parties informed throughout the incident response process. Remediation efforts focus on restoring affected systems to a secure state, including patching vulnerabilities, deploying security updates, resetting compromised credentials, and restoring data from backups. The focus remains on safeguarding critical assets and maintaining operational continuity.

Post-incident analysis provides insights for improvement. Assessments identify gaps in security controls, weaknesses in incident response procedures, and opportunities for enhancement. Philips' commitment to continuous improvement includes investment in training and skill development to ensure analysts remain at the forefront of cybersecurity best practices.

Conclusion

HealthSuite Imaging is purpose-built to support secure, scalable, and high-performance diagnostic imaging in the cloud. Its architecture integrates advanced security technologies, strong governance, and a secure-by-design approach to protect patient data, meet regulatory expectations, and enable clinical efficiency. From identity management and encryption to continuous threat detection and structured incident response, every aspect of the platform is engineered with security as a foundational principle.

Philips maintains a proactive approach to security, incorporating regular updates, independent assessments, and third-party certifications to ensure HealthSuite Imaging continues to evolve alongside the dynamic threat landscape. The security controls are continuously tested and validated against industry benchmarks and healthcare-specific cybersecurity standards.

As cybersecurity challenges grow in complexity, Philips remains committed to maintaining the trust of healthcare providers and patients by delivering secure, resilient, and compliant solutions.

PDF preview unavailable. Download the PDF instead.

d4a5466184334cd78dd2b352008b086b Adobe PDF Library 17.0 Adobe InDesign 20.5 (Macintosh)

Related Documents

Preview Philips IntraSight (SW v5.3.0) IHE Integration Statement
This document details the Integrating the Healthcare Enterprise (IHE) Integration Statement for Philips IntraSight software version 5.3.0, outlining supported integration profiles, actors, and options for enhanced healthcare system interoperability.
Preview IntelliSpace PACS Anywhere 1 : Instructions d'utilisation
Guide complet des instructions d'utilisation pour IntelliSpace PACS Anywhere 1 de Philips, détaillant l'accès aux informations médicales, images et rapports pour les professionnels de santé.
Preview Philips Ultrasound and Diagnostic Imaging: Advancing Patient Outcomes
Philips presentation on Ultrasound and Diagnostic Imaging, highlighting advancements in precise and predictive imaging, market leadership, AI capabilities, and enterprise informatics to improve patient outcomes and hospital productivity.
Preview Philips Ultrasound Workspace 6.0 Technical Specification
This document provides the technical specifications, hardware, and software requirements for the Philips Ultrasound Workspace 6.0 software, covering single-seat and server-client installations, data compatibility, security considerations, and system scaling.
Preview North Star's Blueprint for Scaling Imaging with Remote Scanning Using Philips ROCC
A customer story detailing how North Star Diagnostic Imaging improved imaging efficiency, consistency, and staff satisfaction by implementing Philips Radiology Operations Command Center (ROCC) for remote scanning operations.
Preview Notes de livraison IntelliSpace PACS Anywhere 1.4
Ce document détaille les nouvelles fonctionnalités, les problèmes résolus et les limites du système pour IntelliSpace PACS Anywhere 1.4, la solution logicielle d'imagerie médicale de Philips.
Preview Notes de livraison IntelliSpace Universal Data Manager 3
Ce document détaille les mises à jour, nouvelles fonctionnalités et problèmes résolus pour IntelliSpace Universal Data Manager 3, version R3.2. Il fournit des informations essentielles pour les utilisateurs et administrateurs du système de gestion de données d'imagerie médicale de Philips.
Preview Philips IntelliSpace Cardiovascular 8.1 DICOM Conformance Statement
Detailed DICOM conformance statement for Philips IntelliSpace Cardiovascular 8.1, outlining supported DICOM services, network protocols, and implementation details for cardiology imaging systems.