When the Ambulance Is the Endpoint: Zero Trust for the Rig
An ambulance is a mobile data center with a siren. The cellular modem is the gateway. The tablet runs the ePCR. The cardiac monitor streams vitals. The in-cab camera records the scene. Each of these is a network endpoint, and they are all riding on shift change.
Traditional perimeter security assumes the network is inside a building. An ambulance has no perimeter. It connects to FirstNet at highway speeds and parks next to public Wi-Fi in hospital lots. The trust boundary moves with the truck. Zero trust is the only model that works.
Ambulance Network Security Best Practices
The attack surface of a modern rig includes the cellular router, the Wi-Fi hotspot, the telemetry monitor, and the in-cab camera. Each device has its own IP address and its own vulnerabilities. If any one of them is compromised, the attacker has a foothold inside the vehicle's network.
The first step is to treat the truck as its own secure island. You cannot trust the network it connects to, even FirstNet. You can only trust the encryption and identity you control.
Zero Trust Architecture for Public Safety Vehicles
Zero trust means no device is trusted by default. Every connection must be authenticated and authorized, regardless of where it originates. For an ambulance, this requires four things.
Device identity. Move away from shared Wi-Fi passwords. Use certificate-based authentication where the device itself is the identity. If a tablet is stolen, revoke its certificate. The device becomes dead to the network instantly.
Micro-segmentation. Separate the clinical devices from everything else. The cardiac monitor and ePCR tablet should be on a clinical VLAN with no access to the internet. The CAD terminal goes on an operational VLAN. Crew personal devices go on a guest VLAN that cannot reach clinical data.
Encrypted tunnels. All traffic from the rig to the agency must go through an encrypted tunnel with AES-256. The router should maintain a permanent VPN to the agency gateway. Data is never naked on the public network.
Least privilege. The ePCR tablet should only talk to the ePCR server. It should not talk to the agency's HR system or the engine control module.
> The agency shall develop and implement security controls for mobile devices that process, store, or transmit electronic protected health information. These controls shall include device authentication, encryption, and remote wipe capabilities.
>
> HIPAA Security Rule, 45 CFR § 164.312
Securing EMS ePCR Tablets on Cellular Networks
Security measures that interrupt clinical workflow are dangerous. If a medic has to enter a password while performing a chest compression, the security is a liability, not a protection. Authentication must happen in the background through certificates and automatic VPN connections. The medic should never notice the security is there.
But connectivity is not guaranteed. When the network drops, the ePCR must function offline and sync later without data loss. Every rig needs a pre-built downtime procedure that includes a physical paper packet and a clear protocol for offline documentation.
This connects to Scaling 100 Trucks: Automation Strategies for Fire and EMS IT, which covers the deployment side of the same architecture.
How to Segment Wi-Fi on Emergency Medical Services Rigs
The most critical downtime failure is the silent failure. The crew assumes the ePCR is syncing to the cloud but it is failing silently. A solid downtime procedure includes a clear sync status indicator and a mandatory transition to paper records when the network is unstable.
Validating these procedures requires tabletop exercises. Run three scenarios with your crew.
Dead router during a high-acuity call. Test whether the crew knows the paper backup and whether the ePCR handles the offline-to-online transition without duplicating records.
Rogue device on the truck Wi-Fi. Introduce a non-authorized device to see if the micro-segmentation prevents it from reaching clinical data.
Stolen tablet. Test the speed of the MDM wipe and certificate revocation to ensure a lost device cannot be used as a backdoor into the agency network.
EMS IT Downtime Procedures for Electronic Patient Records
Fail-closed security blocks all access during a glitch. In a clinical environment, fail-closed can be life-threatening. The architecture must allow emergency local-only functionality when the cloud is unreachable. Security should never prevent patient care.
The goal is not a hack-proof truck. Hardware fails and people forget passwords. The goal is a resilient truck that fails gracefully. Zero trust is the architecture. The paper packet is the backup. The tabletop exercise is what makes both of them stick.
Frequently Asked Questions
Will zero trust slow down the tablet's connection to the ePCR?
When implemented with certificates and hardware-accelerated VPNs, the security happens at the network layer and is transparent to the user. There is no perceptible lag.
Why is micro-segmentation needed if the Wi-Fi has a password?
Passwords can be shared or leaked. Micro-segmentation ensures that even if a guest device gets onto the network, it cannot see or communicate with clinical systems.
What is the most critical downtime failure point?
The most critical failure is silent sync failure. A reliable downtime procedure includes a clear sync status indicator and a mandatory transition to paper records when the network is unstable.
How does an MDM tool fit into the rig's security?
The MDM acts as a remote kill switch. If a tablet is lost or stolen, the admin can remotely wipe the device and revoke its network certificates.
Closing
An ambulance is not a vehicle with a radio. It is a network endpoint that moves at highway speed. Treat it like one. Certificates, not passwords. Encrypted tunnels, not open connections. Segment the clinical traffic from everything else. Test the downtime procedures before the network drops. Security should not break the workflow. But it should be there, running in the background, every shift.
-- Steven
Need help with your agency’s cybersecurity? Get in touch