Platform

Solutions

Resources

More

Genesis platform logo

Platform

Platform

Platform

Understanding Abu Dhabi’s Healthcare Cybersecurity Strategy and ADHICS Controls.

Understanding Abu Dhabi’s Healthcare Cybersecurity Strategy and ADHICS Controls.

Understanding Abu Dhabi’s Healthcare Cybersecurity Strategy and ADHICS Controls.

Jul 25, 2025

Khalifa Al Shehhi

Understanding Abu Dhabi’s Healthcare Cybersecurity Strategy and ADHICS Controls. logo
Understanding Abu Dhabi’s Healthcare Cybersecurity Strategy and ADHICS Controls. logo

The digitalization of Abu Dhabi's healthcare is transforming care, but it also introduces significant cybersecurity risks as more data and devices connect. Safeguarding sensitive health data is now essential.

To address these risks, the Department of Health Abu Dhabi (DoH) launched a comprehensive Healthcare Information and Cybersecurity Strategy aligned with national and global benchmarks. This document sets a vision for governance, resilience, capabilities, and innovation in healthcare cybersecurity.

To implement this strategy, DoH requires adoption of the Abu Dhabi Healthcare Information and Cyber Security Standard (ADHICS), which outlines technical and procedural controls for compliance, risk mitigation, and cyber resilience across healthcare entities.

Together, these frameworks establish a clear, unified defense strategy, positioning Abu Dhabi as a leader in healthcare cybersecurity.

DoH Cybersecurity Strategy Overview

Purpose and Scope of the Strategy

The Abu Dhabi Healthcare Cybersecurity Strategy, issued by the Department of Health (DoH), defines a top-down strategic framework to guide the Emirate’s healthcare sector in mitigating cyber risks and ensuring secure digital transformation. Its scope encompasses all healthcare entities licensed by DoH, including hospitals, clinics, insurers, vendors, and third-party service providers that handle or process health information within Abu Dhabi.

The strategy emphasizes the need for uniform cybersecurity governance, secure infrastructure, skilled personnel, and continuous sector-wide collaboration. It aligns closely with the UAE National Cybersecurity Strategy and supports Abu Dhabi’s broader digital health objectives, including the use of artificial intelligence (AI), electronic medical records, and Health Information Exchange (HIE) platforms such as Malaffi.

Vision Statement

“To enable the cyber-secure digital transformation of the healthcare services and to provide adequate assurance on information security, while enhancing the consumer experience in healthcare delivery.”

This vision emphasizes resilience, assurance, and user-centricity, establishing cybersecurity as a critical enabler of health sector innovation.

Mission Statement

The mission focuses on delivering safe, secure, and sustainable digital healthcare services by:

  • Establishing sector-wide leadership and oversight

  • Building resilient infrastructure for rapid response and recovery

  • Developing cybersecurity competencies across the healthcare workforce

  • Defining standardized risk management methodologies

  • Enhancing policies, procedures, and technical standards

  • Fostering collaboration, innovation, and threat intelligence sharing

The Six Strategic Pillars

The DoH strategy is structured around six interdependent pillars. Each pillar defines a strategic objective area and provides a set of targeted initiatives to achieve it.

Pillar

Focus Area

Strategic Objective

1. Cybersecurity Governance

Sector-wide leadership and accountability

Establishing clear roles, governance structures, and decision-making authority

2. Cybersecurity Resilience

Incident response and recovery

Enabling continuity and containment capabilities in the face of cyber incidents

3. Cybersecurity Capabilities

Workforce and process maturity

Enhancing sector-wide awareness, skills, and secure system development practices

4. Cybersecurity Partnerships

Multilateral collaboration

Facilitating information sharing and joint threat mitigation among entities

5. Cybersecurity Maturity

Measurement and control assurance

Institutionalizing audits, assessments, and policy enforcement

6. Cybersecurity Innovation

Secure technology adoption

Encouraging secure deployment of AI, IoT, and cloud platforms in care delivery

Table 1. The Six Strategic Pillars

These pillars serve as the foundation for all cybersecurity activities across Abu Dhabi’s healthcare sector and are reflected operationally through the ADHICS standard.

Role of ADHICS

What is ADHICS?

The Abu Dhabi Healthcare Information and Cyber Security Standard (ADHICS) is the official cybersecurity implementation framework issued by the Department of Health – Abu Dhabi. It translates the strategic vision outlined in the DoH Cybersecurity Strategy into a comprehensive set of technical controls, governance models, and procedural policies.

ADHICS is mandatory for all DoH-licensed healthcare entities operating within the Emirate and applies to both digital and physical health information systems, including shared platforms such as Malaffi, Shafafiya, and other third-party infrastructure.

Purpose and Legal Foundation

The standard was developed in support of:

  • UAE Federal Law No. (2) of 2019, governing the use of ICT in healthcare.

  • The UAE National Cybersecurity Strategy identifies healthcare as one of the country's nine critical sectors.

  • TRA/TDRA guidance and NCEMA 7000 continuity regulations.

ADHICS complements these mandates by providing sector-specific cybersecurity guidance that aligns with international standards such as ISO/IEC 27001 and NIST, but tailors them to the realities of healthcare operations.

The Role of ADHICS in Strategy Implementation

Where the DoH strategy defines the “what” (e.g., build sector resilience), ADHICS specifies the “how” by:

  • Standardizing control requirements across healthcare entities

  • Establishing baseline policies for 20+ critical security domains

  • Defining roles, responsibilities, and governance structures

  • Setting performance expectations through maturity models and audits

ADHICS acts as the enforcement and measurement mechanism of the strategy.

The Three-Layer Governance Model

To comply with ADHICS a three-tier cybersecurity governance structure for all entities:

Layer

Role

Description

ISGC (Information Security Governance Committee)

Executive Oversight

Entity-level management body accountable for strategic decisions and policy endorsement

HIIP (Healthcare Information Security Implementation Planning Workgroup)

Cybersecurity Management

Interfaces with the DoH and internal departments to ensure alignment with strategic goals.

ISG (Implementation Stakeholders Group)

Technical Implementation

Executes daily operational and technical cybersecurity tasks and projects

Table 2. The Three-Layer Governance Model

This layered governance ensures that cybersecurity responsibilities are distributed, documented, and auditable, regardless of entity size or complexity.

Control Applicability and Entity Maturity

ADHICS uses a tiered control applicability model based on the entity’s:

  • Licensing type (e.g., hospital, clinic, pharmacy)

  • Operational complexity

  • Risk exposure

Entities are categorized as Basic, Transitional, or Advanced, with corresponding control requirements tailored to their size and maturity. This ensures that even small providers can comply proportionately while high-risk organizations meet more stringent standards.

Mapping Strategy to ADHICS Controls

The Department of Health's strategic pillars provide a directional blueprint for enhancing its cybersecurity posture. ADHICS serves as the operational arm, implementing specific controls, policies, and workflows that fulfill each strategic objective.

This section presents a detailed mapping of the six strategic pillars to their corresponding ADHICS implementation domains, showing how vision translates into verifiable actions.

1. Cybersecurity Governance → Role-Based Oversight and Documentation

Strategic Goal: Establish a formal governance framework with clear accountability and leadership oversight.

1. Cybersecurity Governance → Role-Based Oversight and Documentation

Strategic Goal: Establish a formal governance framework with clear accountability and leadership oversight.

ADHICS Implementation:

  • Mandatory formation of three-layer governance: ISGC, HIIP, and ISG.

  • Defined roles and responsibilities for executive sponsors, department heads, and cybersecurity implementers.

  • Governance structures must be documented, regularly reviewed, and auditable to ensure transparency and accountability.

  • Use of dedicated forums and tools for internal and external coordination.

2. Cybersecurity Resilience → Incident Response and Continuity Controls

Strategic Goal: Ensure robust sector-wide capabilities to detect, respond to, and recover from cyber threats.

Incident Response and Recovery ADHICS Incident Response Workflow

ADHICS Incident Response Workflow

ADHICS Implementation:

  • Development of Incident Response Playbooks, aligned with threat scenarios and business impact.

  • Sector-wide Business Continuity (BCM) and Disaster Recovery (DR) plans referencing NCEMA 7000.

  • Real-time threat intelligence sharing through Abu Dhabi Healthcare CERT and CTIC.

  • Implementation of network monitoring systems, patch management, and systematic lifecycle controls for legacy medical systems.

3. Cybersecurity Capabilities → Workforce Development and Secure System Design
Strategic Goal: Build a cybersecurity-aware workforce and secure application environment.

ADHICS Implementation:

  • Mandatory security awareness and training programs for all personnel, including role-based modules.

  • Integration of cybersecurity into onboarding and HR policies, including pre-employment screening and non-disclosure clauses.

  • Promotion of secure development lifecycle (SDLC) principles for software, platforms, and health applications.

  • Encouragement of automation in incident detection and orchestration to minimize response delays.

4. Cybersecurity Partnerships → Vendor Oversight and Threat Intelligence Sharing

Strategic Goal: Strengthen multilateral collaboration and promote shared security responsibility.

ADHICS Implementation:

  • Vendor risk management and third-party security policy templates.

  • Requirement for security clauses in vendor contracts and system access agreements.

  • Collaboration with biomedical teams for quality and security controls on medical devices.

  • Shared platforms for vulnerability and patch intelligence, supported by the DoH Healthcare CERT.

5. Cybersecurity Maturity → Audits, Assessments, and Continuous Improvement

Strategic Goal: Institutionalize measurement, compliance, and adaptive improvement.

ADHICS Implementation:

  • Annual risk assessments and compliance audits against ADHICS and international benchmarks.

  • Implementation of control maturity models, customized by entity type (Basic, Transitional, Advanced).

  • Requirement for maintenance of risk registers, asset inventories, and access reviews.

  • Defined lifecycle for policy review and updates based on emerging threats and operational gaps.

6. Cybersecurity innovation → Safe Adoption of New Technologies

Strategic Goal: Encourage secure deployment of emerging healthcare technologies and innovation.

ADHICS Implementation:

  • Change management procedures to accommodate new technologies without exposing vulnerabilities.

  • Governance around the secure deployment of AI, IoT, and cloud platforms.

  • Controls for secure information exchange, including encryption standards and interoperability safeguards, are in place.

  • Cybersecurity evaluation criteria are embedded into procurement and vendor onboarding workflows.

Strategy-to-Control Mapping

DoH Cybersecurity Pillars Mapped to ADHICS Controls

Strategic Pillar

ADHICS Implementation Focus

Governance

Three-tier governance (ISGC, HIIP, ISG), accountability, audit trails

Resilience

Incident response plans, threat intelligence feeds, BCM/DR testing

Capabilities

Workforce training, HR security controls, secure design practices

Partnerships

Vendor access controls, consortiums, device quality collaboration

Maturity

Risk assessments, audit readiness, policy lifecycle management

Innovation

Secure adoption of emerging technologies and interoperability standards

Table 3. Strategy-to-Control Mapping

Legal & Regulatory Alignment

The effectiveness of Abu Dhabi’s healthcare cybersecurity model lies not only in its internal structure but also in its alignment with national laws, sectoral mandates, and global cybersecurity practices. The DoH Cybersecurity Strategy and ADHICS Standard are both firmly grounded in the UAE’s legal and regulatory framework, ensuring enforceability and interoperability across government and healthcare entities.

1. UAE Federal Law No. (2) of 2019 – ICT in Healthcare

This federal law mandates that all healthcare providers:

  • Ensure security and confidentiality of patient health information

  • Use approved ICT systems for clinical and administrative purposes

  • Implement necessary technical and organizational measures to prevent unauthorized access, alteration, or loss of data

ADHICS directly supports compliance with this law by:

ADHICS Data Classification Levels

  • Establishing mandatory information security governance structures

  • Providing control sets for data classification, access control, and auditability

  • Enforcing breach notification procedures and disciplinary protocols

2. UAE National Cybersecurity Strategy

The UAE National Cybersecurity Strategy, spearheaded by the Telecommunications and Digital Government Regulatory Authority (TDRA), recognizes healthcare as one of the nine critical national sectors. Its objectives include:

  • Protecting critical infrastructure

  • Reducing systemic cyber risk

  • Promoting cybersecurity awareness and skills

The DoH strategy aligns with this national vision by:

  • Creating a sector-specific cybersecurity maturity model

  • Promoting partnerships through Healthcare CERT and intelligence platforms

  • Enabling innovation while maintaining acceptable risk thresholds

3. NCEMA 7000 – Business Continuity Management Standard

The National Emergency Crisis and Disaster Management Authority (NCEMA) BCM standard (7000:2021) serves as the regulatory benchmark for business continuity and disaster recovery in the UAE.

ADHICS enforces NCEMA compliance by requiring:

  • Development and testing of business continuity plans (BCPs)

  • Documentation of failover mechanisms for critical IT systems

  • Entity-wide incident response frameworks aligned with BCM requirements

4. TRA/TDRA Guidance and Integration with National CERT

While the DoH manages the sector-specific Abu Dhabi Healthcare CERT, ADHICS entities must also integrate with the national cybersecurity infrastructure, including:

  • UAE National CERT (aeCERT)

  • National threat intelligence sharing platforms

  • Secure-by-design principles embedded in public-private partnerships

5. Global Framework Compatibility

Though tailored for Abu Dhabi’s healthcare environment, ADHICS is broadly aligned with:

  • ISO/IEC 27001 – Information Security Management

  • ISO 27799 – Health Informatics Security

  • NIST CSF – Cybersecurity Framework for Critical Infrastructure

  • GDPR principles – Where applicable to international partnerships and data handling

This ensures that ADHICS-compliant organizations can more easily align with international partners, investors, and regulators.

What Healthcare Entities Must Do

For healthcare providers, insurers, and service partners operating under the Department of Health – Abu Dhabi, the combination of the DoH Cybersecurity Strategy and ADHICS is not advisory it is a compliance requirement. Entities must translate these frameworks into measurable internal action across people, process, and technology.

This section outlines the key responsibilities and actions that entities must take to meet regulatory expectations.

ADHICS Compliance Journey for Healthcare Entities

1. Understand Your Classification and Applicability Level

ADHICS applies to all DoH-licensed entities but differentiates control requirements based on:

  • Entity size and complexity

  • Risk exposure

  • Operational maturity

Entities are classified as:

  • Basic: Low-complexity clinics, pharmacies, etc.

  • Transitional: Medium-sized or multi-specialty centers

  • Advanced: Hospitals, insurers, or facilities with interconnected systems and third-party dependencies

Entities must identify their control category and apply the corresponding baseline policies, governance structures, and reporting obligations.

2. Establish the Required Governance Structure

Every healthcare organization must formally constitute:

  • An Information Security Governance Committee (ISGC) for executive oversight

  • A HIIP Workgroup for coordination with DoH and internal alignment

  • An Implementation Stakeholder Group (ISG) for day-to-day operational control

All three groups must have documented mandates, regular meeting schedules, and defined responsibilities. Smaller entities can scale down the structure, but all roles must be addressed.

3. Implement and Customize Baseline Policies

ADHICS provides 20+ baseline policy templates, including:

  • Information Security Policy

  • access Control Policy

  • Asset Classification and Management

  • Physical and Environmental Security

  • HR Security, Remote access, and Password Management

  • Third-Party Security and Incident Response

Entities must customize, approve, and enforce these policies while ensuring all users (staff and vendors) are trained on them.

4. Conduct a Risk Assessment and Maintain an Asset Register
  • Maintain an up-to-date asset inventory (hardware, software, data, personnel, infrastructure)

  • Perform a formal cyber risk assessment at least annually

  • Develop a risk register based on threat likelihood and impact

  • Apply classification labels (Secret, Confidential, Restricted, Public) to data and systems

These activities must be documented and reviewed by the governance committee.

5. Prepare for Continuous Monitoring, Reporting, and Audits
  • Conduct internal assessments against ADHICS control domains

  • Submit compliance status reports to DoH as required

  • Implement continuous monitoring systems and alerting mechanisms

  • Engage with Abu Dhabi Healthcare CERT for incident response coordination and threat intelligence feeds

Non-compliance or failure to report may result in penalties, reputational damage, or regulatory suspension.

6. Train the Workforce and Manage access
  • Enforce pre-employment screening

  • Conduct role-based cybersecurity awareness training

  • Enable multi-factor authentication, least privilege access, and privileged access monitoring

  • Review all logical and physical access regularly and revoke unused credentials

Human factors remain a major vulnerability To comply with ADHICS organizations to reduce this risk systematically.

7. Engage with Vendors Under a Cybersecurity Compliance Lens
  • Include cybersecurity clauses in all third-party contracts

  • Restrict access to sensitive systems and require an NDA and compliance verification

  • Review security posture of connected medical devices, software, and cloud platforms

Vendors are treated as extensions of the attack surface their controls must align with ADHICS.

Summary of Immediate Action Items

Task

Responsibility

Determine control level (Basic, Transitional, Advanced)

Compliance Lead / CIO

Form governance committees (ISGC, HIIP, ISG)

Executive Management

Implement baseline policies

IT / Risk / HR / Operations

Conduct asset and risk assessments

Information Security Officer

Train staff and restrict Access

HR and IT

Audit third parties and enforce secure contracts

Procurement / IT Security

Report incidents and compliance with DoH

HIIP and CERT Liaison

Table 4. Summary of Immediate Action Items

When implemented fully, these measures help organizations achieve both regulatory compliance and operational resilience, ensuring that cyber threats do not compromise patient safety or trust.

Key Takeaways.

As Abu Dhabi continues its efforts to digitalize healthcare, cybersecurity is no longer a supporting function it is a core operational requirement. The synergy between the Department of Health’s Cybersecurity Strategy and the ADHICS Implementation Guidelines offers a powerful model for healthcare entities to secure sensitive information, ensure regulatory compliance, and build long-term resilience.

Here are the key takeaways:

1. Cybersecurity is Mandatory

ADHICS is a DoH-mandated standard, enforceable under UAE Federal Law. Healthcare entities must implement the defined controls and governance frameworks within specified timelines or face regulatory consequences.

2. Strategy Provides the Direction, ADHICS Enables the Execution

The six pillars of the DoH Cybersecurity Strategy offer a clear vision: governance, resilience, capabilities, partnerships, maturity, and innovation. ADHICS operationalizes these pillars through detailed controls, roles, policies, and technical requirements.

3. Governance Is a Shared Responsibility

Cybersecurity is not the sole responsibility of the IT department. Under ADHICS, entities must the active involvement of leadership (ISGC), mid-management (HIIP), and technical teams (ISG). Cross-functional coordination is critical to success.

4. Risk Management Must Be Continuous and Evidence-Based

ADHICS Risk Scoring Matrix

Entities must maintain:

  • A risk register

  • An asset inventory

  • Role-based access logs

  • Documentation of training, audits, and incidents

Compliance is not just about configuration it is about traceable, repeatable processes.

5. Third-Party Risk Is a First-Class Concern

Third-Party Security Checklist (ADHICS)

Vendors, service providers, and connected platforms are part of your cyber risk surface. To comply with ADHICS specific controls for third-party access, agreements, and medical device security.
6. Alignment with National and Global Standards
ADHICS ensures consistency with:
  • UAE Federal ICT Law No. 2 (2019)

  • UAE National Cybersecurity Strategy

  • NCEMA 7000

  • ISO/IEC 27001 and NIST CSF

This alignment allows healthcare entities to build security programs that are both locally compliant and internationally credible.

7. Resilience and innovation Can Coexist

The framework encourages innovation such as AI adoption, telemedicine, and health data exchange but not at the expense of security. Secure-by-design principles are embedded into every phase of digital transformation.

Together, these insights reinforce a critical message: Cybersecurity is a strategic enabler of trust, continuity, and care delivery in the digital health age.

Book a demo with Genesis

See yourself how Genesis Platform Eliminated manual TPRM with AI

Book a demo with Genesis

See yourself how Genesis Platform Eliminated manual TPRM with AI

Genesis assists businesses in identifying and reducing their attack surface while also managing and collaborating with third parties.

Registered Office Address: Hamdan

Innovation Incubator, Dubai, UAE

Product

Resources

Whitepapers

© Copyright Genesis Platform 2024, All Rights Reserved

© Copyright Genesis Platform 2024, All Rights Reserved

Genesis assists businesses in identifying and reducing their attack surface while also managing and collaborating with third parties.

Registered Office Address: Hamdan

Innovation Incubator, Dubai, UAE

Product

Resources

Whitepapers

© Copyright Genesis Platform 2024, All Rights Reserved

© Copyright Genesis Platform 2024, All Rights Reserved

Book a demo with Genesis

See yourself how Genesis Platform Eliminates manual TPRM with AI

Book a demo with Genesis

See yourself how Genesis Platform Eliminates manual TPRM with AI

Genesis Platform Logo

Genesis assists businesses in identifying and reducing their attack surface while also managing and collaborating with third parties.

Dubai, UAE

Genesis platform location marker

© Copyright Genesis Platform 2025, All Rights Reserved

Genesis Platform Logo

Genesis assists businesses in identifying and reducing their attack surface while also managing and collaborating with third parties.

Dubai, UAE

Genesis platform location marker

© Copyright Genesis Platform 2025, All Rights Reserved

Book a demo with Genesis

See yourself how Genesis Platform Eliminates manual TPRM with AI

Book a demo with Genesis

See yourself how Genesis Platform Eliminates manual TPRM with AI

Genesis Platform Logo

Genesis assists businesses in identifying and reducing their attack surface while also managing and collaborating with third parties.

Dubai, UAE

Genesis platform location marker

© Copyright Genesis Platform 2025, All Rights Reserved

Genesis Platform Logo

Genesis assists businesses in identifying and reducing their attack surface while also managing and collaborating with third parties.

Dubai, UAE

Genesis platform location marker

© Copyright Genesis Platform 2025, All Rights Reserved