What is ADHICS

ADHICS stands for Abu Dhabi Healthcare Information and Cyber Security Standard, established by the Abu Dhabi Department of Health (DoH), the primary regulatory body for healthcare in Abu Dhabi. On February 3, 2019, the DoH released the ADHICS Standards with the aim of safeguarding the confidentiality and security of health information. The ADHICS Standard seeks to elevate healthcare cybersecurity in the UAE to international standards, aligning with best practices in healthcare cyber security and privacy. Additionally, ADHICS assists the healthcare sector in achieving compliance with the UAE Information Assurance Standards.

Safecare, a prominent provider of Risk & Compliance services in the UAE, specializes in assisting companies in attaining ADHICS Compliance through comprehensive ADHICS Audits. With a demonstrated track record, we have successfully guided numerous healthcare sector companies to achieve compliance with ADHICS standards. Our team of experts provides personalized support to ensure your successful attainment of ADHICS Compliance in the UAE. Uphold healthcare compliance by aligning with ADHICS standards and policies.

Our ADHICS Consultancy Services

  • ADHICS Gap Assessment

  • Cyber Risk Assessment

  • Risk Treatment Plan

  • ADHICS Policies & Procedures

  • Security Testing

  • Security Awareness

  • Technology Implementation

  • ADHICS Implementation Review

  • ADHICS Internal Audits

check-list

ADHICS GAP Assessment

As part of the ADHICS Audit, Safecare Analysts conduct Gap Assessments to appraise the existing state, employing the ADHICS standard for evaluation.

data-protection

Cyber Risk Assessment

Our team identifies and evaluates all risks associated with healthcare data security and privacy utilizing the ADHICS framework.

warning

Risk Treatment Plan

Create a plan for Risk Treatment to address and mitigate gaps and risks, bringing them to acceptable levels.

message

ADHICS Policies & Procedures

Sets the privacy and security policies & procedures for you to achieve ADHICS Compliance.

security

Security Testing

Perform continuous security assessments and penetration testing helping you maintain compliance with the ADHICS Standard..

training

Security Awareness

Provides Security Awareness Training for all employees so that your weakest link in security is not people.

implementation

Technology Implementations

Deliver advisory on remediation of technology gaps and implementation of technical controls.

review

ADHICS Implementation Reviews

Conduct periodical ADHICS Implementation progress reviews to evaluate the compliance levels and remediate any deviations.

audit

ADHICS Internal Audits

Internal Audits help you identify deviations from the defined ISMS policies and procedures and make course corrections.

Phase 1 – Assessment

The first phase of an ADHICS Audit & Compliance project is to assess the current state of compliance

Identify Critical Assets

  • Project Initiation

  • Understand the organization

  • Identify critical business services

  • Identify information infrastructure

01

02

ADHICS Controls Identification

  • Identify cyber security controls that can mitigate the risks in line with ADHICS Compliance requirements.

  • Define ADHICS Risk Treatment Plan

Gap & Risk Assessment

  • Inspection of current risk state using ADHICS Standard

  • Discovering threats & vulnerabilities by exploiting the gaps

  • Identify critical business services

  • Identify information infrastructure

03

Phase 2 – Control Development

This second phase of the ADHICS Audit is to develop the controls to treat the risks identified. ISMS Risk Treatment Plan provides the directions for this phase of the implementation.

NESA Policies & Procedures

  • Policies and procedures provide the base for executing cyber security best practices within the organization.

01

02

Security Awareness

  • Humans are often considered the most vulnerable connection in cyber security. Security Awareness & Training provides them with adequate learning on cyber security.

Technology Controls

  • Security Architecture

  • Technology Gaps

  • Configuration Advisory

03

04

Management Controls

  • Operational Controls

  • Physical Security

  • Managerial Controls

Phase 3 – Security Services

This phase of the Engagement executes cyber security best practices for the organization. Some of the key services performed by the Safecare Team are:

Periodic Security Testing

  • Vulnerability Assessments

  • Penetration Testing

  • Security Configuration Reviews

01

02

SIEM & Incident Response

  • SIEM Solution Deployment.

  • 24×7 Security Monitoring

  • Security Device Management

Managed Network Security

  • Next Gen Firewalls, UTMs

  • URL Filter, Web Security

  • Wi-Fi Security

  • VPN and Remote Access Security

03

04

Data & Endpoint Security

  • DLP Solutions

  • Patch Management

  • Endpoint Security

  • Mobile Device Management

Phase 4 – Compliance Review

A periodic review of the ISMS Compliance status is critical for the success of the Information Security Management System.

ISMS Performance Review

  • Assess the performance of the ISMS against the defined metrics. It is a significant measure towards the continual improvement of the ISMS.

01

02

ISMS Internal Audits

  • Perform periodic ISMS Audits to assess compliance with the defined policies and procedures

Mock Compliance Audit

  • Perform Mock Compliance Audits that help you identify the weak areas of ISMS implementation.

03

04

External Audit Support

  • Assist the customer during the Compliance Audit to meet the required ISMS requirements.

Scroll to Top