TASY Hospital Information System - Critical Patient Data Risk¶
Date: 2026-02-27 Classification: CRITICAL SECURITY INCIDENT Scope: TASY HIS instances at Rede D'Or hospital network
Executive Summary¶
TASY Hospital Information System (HIS) is a critical healthcare application managing patient medical records across Rede D'Or hospital network. The production instance at Jutta Batista hospital is integrated with Azure AD and exposed via potentially compromised credentials, creating direct risk to patient data confidentiality.
CRITICAL FINDING: Active Azure AD secret for TASY production environment:
- App ID: b3a95d25-d382-4a72-bcca-975ac0b388d0
- Secret Hint: SxZ
- Expiry: 2027-12-11 (expired from a security perspective - over 1 year old)
- URL: https://hisjuttabatista.rededor.com.br/
TASY Applications Inventory¶
TASY Production - Jutta Batista Hospital¶
{
"app_id": "b3a95d25-d382-4a72-bcca-975ac0b388d0",
"name": "TASY-NACIONAL-JUTTA-BATISTA-PRD",
"url": "https://hisjuttabatista.rededor.com.br/",
"environment": "PRODUCTION",
"hospital": "Jutta Batista (Rede D'Or São Luiz network)",
"auth_type": "MSAL (Azure AD) SSO",
"active_secrets": 1,
"secret_hint": "SxZ",
"expiry_date": "2027-12-11",
"data_classification": "PHI/PII - Protected Health Information",
"system_type": "Hospital Information System (HIS)",
"patient_data_types": [
"Patient demographics (name, DOB, SSN/CPF)",
"Medical diagnoses and treatment history",
"Laboratory results",
"Imaging reports (X-rays, CT, MRI, Ultrasound)",
"Pharmacy and medication records",
"Surgical records and anesthesia notes",
"Vital signs and clinical observations",
"Allergies and adverse reactions",
"Insurance and billing information"
],
"estimated_patients": "Thousands of patients (hospital network)",
"regulatory_context": "HIPAA equivalent (Brazil - LGPD - Lei Geral de Proteção de Dados)"
}
TASY Homologação (Test) - AWS Hosted¶
{
"app_id": "204da288-210a-4aee-a4c0-4c40cc86a325",
"name": "TASY-NACIONAL-AWS2-HML",
"url": "https://html5-sp-hml-tasycloud02.rededor.com.br",
"environment": "HML (Homologação/Testing)",
"infrastructure": "AWS - sa-east-1 region",
"active_secrets": 1,
"secret_hint": "1UT",
"expiry_date": "2027-08-21",
"risk_note": "Test environment may contain production data snapshots"
}
Attack Scenarios¶
Scenario 1: Direct Hospital System Access¶
Attacker Profile: Credential holder (compromised Azure AD secret)
Attack Flow:
1. Attacker obtains TASY-NACIONAL-JUTTA-BATISTA-PRD secret (hint: SxZ)
2. Authenticates to https://hisjuttabatista.rededor.com.br/
3. Gains full MSAL SSO session as service principal
4. Accesses patient database directly
5. Exports sensitive medical records
6. Exfiltrates patient PII (names, CPF, diagnoses)
Impact: - Access to all patient records at Jutta Batista hospital - Potential LGPD violation (Brazil data protection law) - Hospital network compromise via lateral movement - Regulatory fines and criminal liability
Scenario 2: Healthcare Business Associate Breach¶
Attacker Profile: Insider or compromised DevOps access
Attack Flow:
1. Compromise TASY app via Azure DevOps secret
2. Modify patient appointment schedule
3. Inject malware into HIS reports (PDF tampering)
4. Perform pharmacy reconciliation fraud
5. Alter vital signs for specific patients
6. Create denial-of-service for hospital operations
Impact: - Patient safety risk (altered medical records) - Financial fraud (prescription tampering) - Loss of patient trust - Regulatory investigation and enforcement
Scenario 3: Lateral Movement to Hospital Network¶
Attacker Profile: External threat actor with Azure AD foothold
Attack Flow:
1. Start with compromised Portal Dev secret (User.Read.All)
2. Enumerate hospital staff via Graph API
3. Use TASY secret to access HIS as healthcare professional
4. Gain internal IP visibility of hospital network
5. Use RDS endpoint discovery → access hospital databases
6. Move laterally to imaging systems (PACS)
7. Move laterally to pharmacy systems
Impact: - Full hospital network compromise - PACS (Picture Archiving and Communication System) breach - Pharmacy system compromise - Potential ransomware deployment
Data Flow & Risk Architecture¶
graph TD
Attacker["Attacker / Compromised Account"]
AzureAD["Azure AD Tenant<br/>03a1fb23-83f2-4fbf-81f9-e40d15b58719"]
subgraph AzureApps["Azure AD Applications"]
PortalDev["Portal Dev<br/>User.Read.All"]
TasyApp["TASY-NACIONAL-JUTTA-BATISTA-PRD<br/>b3a95d25-d382-4a72<br/>Secret: SxZ"]
TasyHML["TASY HML<br/>204da288-210a-4aee<br/>AWS Hosted"]
end
subgraph TasySystem["TASY Hospital Information System"]
TasyFrontend["TASY Web UI<br/>hisjuttabatista.rededor.com.br"]
TasyAuth["MSAL Authentication"]
TasyDB["Hospital Database<br/>PostgreSQL/Oracle"]
end
subgraph PatientData["Patient Medical Records"]
Demographics["Patient Demographics<br/>Names, CPF, DOB, Address"]
Diagnoses["Diagnoses & Treatment<br/>Medical History"]
Labs["Lab Results<br/>Blood Tests, Cultures"]
Imaging["Medical Imaging<br/>X-rays, CT, MRI"]
Pharmacy["Pharmacy Records<br/>Medications, Prescriptions"]
Surgical["Surgical Records<br/>Operations, Anesthesia"]
end
subgraph HospitalNetwork["Rede D'Or Hospital Network"]
JuttaBatista["Jutta Batista Hospital<br/>Primary Site"]
PACS["PACS System<br/>Imaging Archive"]
PharmacySys["Pharmacy System<br/>Dispensary Management"]
RIS["RIS System<br/>Radiology Info"]
end
Attacker -->|Compromises| AzureAD
AzureAD -->|Issues Token| TasyApp
TasyApp -->|MSAL SSO| TasyAuth
TasyAuth -->|Authenticates| TasyFrontend
TasyFrontend -->|Queries| TasyDB
TasyDB -->|Contains| Demographics
TasyDB -->|Contains| Diagnoses
TasyDB -->|Contains| Labs
TasyDB -->|Contains| Imaging
TasyDB -->|Contains| Pharmacy
TasyDB -->|Contains| Surgical
TasyFrontend -->|Integrated with| JuttaBatista
JuttaBatista -->|Sends Data| PACS
JuttaBatista -->|Sends Data| PharmacySys
JuttaBatista -->|Sends Data| RIS
PortalDev -->|User Enumeration| AzureAD
PortalDev -->|Identifies Hospital Staff| HospitalNetwork
style Attacker fill:#ff3333
style TasyApp fill:#ff3333
style TasyDB fill:#ff6666
style PatientData fill:#ff9999
style TasyAuth fill:#ff6666
Compliance & Regulatory Risk¶
LGPD (Lei Geral de Proteção de Dados) - Brazil¶
TASY healthcare data falls under LGPD strict personal data protection:
Articles at Risk: - Article 5: Definition of personal data (patient PII, medical history) - Article 6: Legal basis for processing (TASY processes health data) - Article 7: Consent requirements (patient must consent) - Article 9: Processing sensitive data (health data restricted) - Article 13: Data controller obligations (RedeDor is controller) - Article 14: Data processor obligations (TASY vendor)
Potential Penalties: - Up to 2% of revenue (annual turnover) or R$ 50 million - Per violation, per patient affected - Hospital closure in severe cases
HIPAA Equivalent Considerations¶
While HIPAA is US-focused, TASY operates similarly: - Patient authentication logs - Record access auditing - Encryption requirements - Business associate agreements - Incident notification requirements
Patient Notification Obligations¶
Under LGPD Article 18: - Must notify affected patients of data breach - Notification within 72 hours (or immediately for patient safety risk) - Must document all affected patients - Must demonstrate reasonable security measures
Secret Exposure Timeline¶
Current Status¶
Secret Created/Updated: Unknown (no git history available)
Current Age: 1+ year (based on expiry 2027-12-11)
Last Rotation: Unknown
Rotation Status: OVERDUE for healthcare best practices
Exposure Risk Assessment¶
If secret was in repository (indicated by findings): - Exposure window: Unknown but potentially months - Git history exposure: Permanent (cloned repos contain full history) - Accessible to: Anyone with repo access (rededorlabs Azure DevOps)
Patient Safety Risk Assessment¶
Direct Patient Impact¶
| Risk Category | Severity | Impact | Mitigation Status |
|---|---|---|---|
| Unauthorized PHI access | CRITICAL | Patient privacy breach | Not mitigated |
| Medical record tampering | CRITICAL | Patient safety risk | Not mitigated |
| Treatment history modification | CRITICAL | Wrong medication administration | Not mitigated |
| Allergy record deletion | CRITICAL | Allergic reaction risk | Not mitigated |
| Surgical history modification | HIGH | Wrong procedure risk | Not mitigated |
| Lab result tampering | HIGH | Wrong diagnosis | Not mitigated |
Hospital Operational Risk¶
| Risk | Severity | Impact |
|---|---|---|
| System unavailability (ransomware) | CRITICAL | Surgery delays, patient safety |
| Appointment system manipulation | HIGH | Patient scheduling chaos |
| Pharmacy system compromise | HIGH | Wrong medication dispensing |
| Billing fraud | MEDIUM | Financial loss |
| Network lateral movement | CRITICAL | Other hospital systems |
Remediation Roadmap¶
IMMEDIATE (Within 24 hours)¶
-
[ ] Step 1: Rotate TASY-NACIONAL-JUTTA-BATISTA-PRD secret immediately
1. Generate new secret in Azure Portal 2. Update TASY application configuration 3. Verify authentication works 4. Delete old secret 5. Document rotation -
[ ] Step 2: Rotate TASY-NACIONAL-AWS2-HML secret
-
Same process as production
-
[ ] Step 3: Enable audit logging
- Enable Azure AD sign-in logs for both TASY apps
- Enable TASY application audit trails
-
Review last 30 days for unauthorized access
-
[ ] Step 4: Patient notification assessment
- Determine if breach occurred (unauthorized access)
- Engage legal/compliance team
- Prepare LGPD notification procedures
SHORT TERM (Within 1 week)¶
- [ ] Step 5: Implement MFA for TASY app
- Require conditional access for TASY authentication
- Implement device compliance checks
-
Enable risk-based authentication
-
[ ] Step 6: Restrict TASY credential access
- Limit who can view/rotate secrets
- Move secrets from repos to Azure Key Vault
-
Implement secret management policy
-
[ ] Step 7: PACS system review
- Check if PACS accesses TASY database
- Review PACS-TASY integration logs
- Verify imaging data access controls
MEDIUM TERM (Within 1 month)¶
- [ ] Step 8: Implement healthcare-specific security controls
- HIPAA/LGPD compliance audit
- Hospital network segmentation review
-
Implement HL7 encryption requirements
-
[ ] Step 9: Deploy secrets management
- Move all healthcare app secrets to Key Vault
- Implement automated secret rotation
-
Restrict secret access to approved personnel
-
[ ] Step 10: Incident investigation
- Audit all TASY access logs (past 90 days)
- Check for data exfiltration indicators
- Review Azure AD token usage
- Interview hospital IT staff
Mermaid: TASY Risk Chain to Patient Impact¶
graph LR
Secret["TASY Production Secret<br/>b3a95d25-d382-4a72<br/>Hint: SxZ"]
Compromise["Secret Compromise<br/>From Git/DevOps/Insider"]
Auth["MSAL Authentication<br/>to TASY PRD"]
Access["HIS System Access<br/>hisjuttabatista.rededor.com.br"]
Data["Patient Data Access<br/>Medical Records<br/>Demographics, Diagnoses,<br/>Medications, Labs"]
Breach["Data Breach<br/>PHI Exfiltration<br/>LGPD Violation"]
Harm["Patient Harm<br/>Identity Theft,<br/>Medical Fraud,<br/>Privacy Violation"]
Regulatory["Regulatory Action<br/>LGPD Fines,<br/>Hospital Closure Risk,<br/>Criminal Charges"]
Secret --> Compromise
Compromise --> Auth
Auth --> Access
Access --> Data
Data --> Breach
Breach --> Harm
Harm --> Regulatory
style Secret fill:#ff3333
style Compromise fill:#ff3333
style Auth fill:#ff6666
style Access fill:#ff6666
style Data fill:#ff9999
style Breach fill:#ffcccc
style Harm fill:#ffeeee
style Regulatory fill:#ffcccc
Detection Indicators¶
Azure AD Logs to Monitor¶
Sign-in logs for:
- App ID: b3a95d25-d382-4a72-bcca-975ac0b388d0
- App ID: 204da288-210a-4aee-a4c0-4c40cc86a325
Anomalies:
- Unusual sign-in locations (non-hospital IP ranges)
- Bulk data access patterns
- After-hours access to medical records
- Failed authentication attempts followed by success
TASY Application Logs¶
Monitor for:
- Patient record bulk queries
- Export functionality abuse
- Failed access attempts with subsequent access
- Privileged operations (admin modifications)
- Data downloads outside normal business hours
Hospital Network Indicators¶
IDS/IPS alerts:
- Large data transfers from TASY servers
- Unusual database queries
- Lateral movement from TASY to PACS/Pharmacy
- Exfiltration attempts to external IPs
References & Standards¶
- LGPD (Lei Geral de Proteção de Dados): Brazil's data protection law
- HIPAA: US Health Insurance Portability and Accountability Act (reference)
- NIST Cybersecurity Framework: Healthcare application guidance
- CMS Security Rule: Medical records security requirements
- HL7 FHIR: Healthcare data exchange standards with encryption
Conclusion¶
The TASY Hospital Information System represents the highest-risk finding in this audit:
- Patient Safety: Direct access to medical records
- Regulatory: LGPD penalties up to R$ 50 million
- Trust: Patient privacy breach in healthcare setting
- Operational: Hospital system compromise risk
Immediate action required. Secret rotation must occur within 24 hours, followed by comprehensive audit and remediation of underlying credential management practices.