SlideShare a Scribd company logo
1 of 26
Download to read offline
Secure Your Medical Devices
From the Ground Up
February 9, 2023
ICS
Geoff Pollard
RTI
Darren Porras
PARTNER WEBINAR
© Copyright t 2023
About ICS
Established in 1987, Integrated Computer Solutions,
Inc. (ICS) delivers innovative software solutions with a
full suite of services to accelerate development of
successful next-gen products.
ICS is headquartered outside Boston in Waltham,
Mass. with offices in California, Canada and Europe.
Currently 160 people.
Boston UX is ICS’ design studio,
specializing in intuitive touchscreen
and multimodal interfaces for
high-impact embedded and connected
devices.
Delivering a
Full Suite of
Medtech Services
● Human Factors Engineering
● IEC 62366-UX/UI Design
● Custom Frontend and Backend Software
Development
● Development with IEC 62304-Compliant Platform
● Low-code Tools that Convert UX Prototype to
Product
● Medical Device Cybersecurity
● AWS and Azure Cloud Services and Analytics
● ISO 14971-Compliant Hazard Analysis
● Software Verification Testing
● Complimentary Software Technology Assessment
©2022 Real-Time Innovations, Inc. Confidential.
Cybersecurity in Medical Devices - Why?
Business Risks
HIPAA violations : up to $10,000 each patient
GDPR : $10-$20M or 2-4% of revenue
FDA : [Draft] April 2022 Guidance for Premarket submissions
December 2022 Omnibus Appropriations Bill
EU : Harmonizing ISO 81001-5-1 in 2024
SDLC (Secure Product Development Lifecycle) QMS
Cybersecurity Architecture Design
Threat Modeling Design
Hazards / Risk Assessment Design
Static Analysis Development
SCA/BCA -> SBOM* Development
Penetration Testing Release Candidate
Labeling Additions User Manual (IFU)
Vulnerability Management Plan* QMS
Periodic Vulnerability Analysis* Post Release
Annual Cybersecurity Report Post Release
Deliverables in FDA’s Latest Guidance
* Included in December 2022 Omnibus Appropriations Bill
What about EU? ISO 81001-5-1;2022
SPDF (Secure Product Development Framework) 5.1.1
Cybersecurity Architecture 5.3.1
Threat Modeling 7.2
Risk Assessment 7.4
Static Analysis A.4 (c) Part of secure coding practices
SCA/BCA -> SBOM 5.7.3 (d)
Penetration Testing 5.7.4
Labeling Additions 5.8.2
Vulnerability Management Plan 6.1
Periodic Vulnerability Analysis 4.1.8
Annual Cybersecurity Report 4.1
How everything fits together
Architecture and Design
Security Architecture
Threat Modeling
STRIDE Threat Modeling output
Hazards / Mitigations
Summary
Complex design exponentially increases the cybersecurity requirements
More potential points of failure = more mitigations = more requirements = more tests
Comprehensive Assessment required
Increasing regulatory requirements
Starting to see specialized cybersecurity legislation (post market / pre-market / IoT)
—-------
Next: How secure connectivity can be used to address these challenges
©2023 Real-Time Innovations, Inc.
Intelligent and Connected Devices
•Applications:
– Surgical Robotics
– Digital OR
– Imaging
– Critical Care
– Radiation Therapy
•Technology ecosystem:
– Sensors, Robotics, Imaging,
Real-Time Intelligence
Source: Advanced Intelligent Systems, Volume: 2, Issue: 8, First published: 11 June 2020, DOI: (10.1002/aisy.201900138)
©2023 Real-Time Innovations, Inc.
Example: Surgical
Robotics
• Surgeon Console
• Vision Tower
• Patient Cart
• Robotic Arm
• Instruments
Liu, HH., Li, LJ., Shi, B. et al. Robotic surgical systems in maxillofacial surgery: a review.Int J Oral Sci 9,
63–73 (2017). https://doi.org/10.1038/ijos.2017.24
©2023 Real-Time Innovations, Inc.
Data Connectivity Challenge
•Complexity
•Performance
•Reliability
•Scalability
•Cybersecurity
Md. Rashid Al Asif, Khondokar Fida Hasan, Md Zahidul Islam, Rahamatullah Khondoker, "STRIDE-based Cyber Security Threat Modeling for IoT-enabled Precision Agriculture Systems", Sustainable Technologies for Industry 4.0 (STI) 2021 3rd International Conference on, pp. 1-6, 2021
Surgical Robotics Communications
©2023 Real-Time Innovations, Inc.
Solution: A Data-Centric Approach
Databus (Shared Data Model)
Robotic
Control
Sensors/
Actuato
rs
Algorith
ms
Device
Apps
Imaging Control
Device
Data
HMI
System
Control
Events
Alarms
©2023 Real-Time Innovations, Inc.
Data Distribution Service (DDS)
•Data Flow:
– Defined by the Data
– Producers and Consumers
– Data is the interface
– Configurable
•Benefits:
– Distributed, modular
– Performance
– Scalable
– Reliable, resilient
– Secure
Monitor
Data
Fusion
HMI
Command
Data
Sensor
Data
State
Data
Databus
©2023 Real-Time Innovations, Inc.
How does Data-Centricity
enable secure data flow?
©2023 Real-Time Innovations, Inc.
Secure Communications By Design
• Limits data access to
authorized applications
• Configurable to
application and use case
• Independent of network
location
• Data segmentation
• Least Privilege
Databus
Monitor
Data
Fusion
HMI
Command
Data
Sensor
Data
State
Data
Service
Patient
Data
©2023 Real-Time Innovations, Inc.
Framework Security Features
•Built-in plugins
•Fine-grained and configurable
– No change to Application
•Enables regulatory guidance:
– Secure by design
– Secure interfaces, least privilege
– Independent of network
location
DDS Secure
Authentication
Access Control
Encryption
Data Tagging
Logging
Application
Any Transport*
(e.g., TCP, UDP, multicast,
shared memory, more…)
©2023 Real-Time Innovations, Inc.
Data-Centric Framework
©2023 Real-Time Innovations, Inc.
Data-Centric Framework
Analytics Databus Network Stack
Socket Programming
Encryption and Authentication
Reliability
Serialization / Marshaling
Quality of Service
Node and Service Discovery
Addressing
Caching and Persistence
Message Filtering
Application Logic
RTI
Connext
DDS
Produce
r
Routing
Service
Connext
App
Connext
App
Connext
App App
Connext
Sensor Databus
©2021 Real-Time Innovations, Inc.
Consume
r
Producer and
Consumer
Monito
r
©2023 Real-Time Innovations, Inc.
Benefits of Data-Centric Connectivity Framework
RTI Connext
• Decentralized, low-latency data connectivity
• Standards-based, cross-industry
• Resilient communication
Reliability and
performance
• Interoperable and flexible architectures
• Data flow management
• Scalable/upgradeable systems
Flexible and efficient
development
• Fine-grained and configurable
• Secure data interfaces- least privilege
• Built-in plugins
Cybersecurity by
design
©2023 Real-Time Innovations, Inc.
Data-Centric Software Connectivity
RTI Connext
Questions?

More Related Content

What's hot

Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
PECB
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
PECB
 
How To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete DeckHow To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete Deck
SlideTeam
 

What's hot (20)

Setting up a secure development life cycle with OWASP - seba deleersnyder
Setting up a secure development life cycle with OWASP - seba deleersnyderSetting up a secure development life cycle with OWASP - seba deleersnyder
Setting up a secure development life cycle with OWASP - seba deleersnyder
 
ISO 27005:2022 Overview 221028.pdf
ISO 27005:2022 Overview 221028.pdfISO 27005:2022 Overview 221028.pdf
ISO 27005:2022 Overview 221028.pdf
 
ISA/IEC 62443: Intro and How To
ISA/IEC 62443: Intro and How ToISA/IEC 62443: Intro and How To
ISA/IEC 62443: Intro and How To
 
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
Information Security vs. Data Governance vs. Data Protection: What Is the Rea...
 
Understanding Cybersecurity in Medical Devices and Applications
Understanding Cybersecurity in Medical Devices and ApplicationsUnderstanding Cybersecurity in Medical Devices and Applications
Understanding Cybersecurity in Medical Devices and Applications
 
Cybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your OrganizationCybersecurity Risk Management Program and Your Organization
Cybersecurity Risk Management Program and Your Organization
 
Vulnerability Assessment Report
Vulnerability Assessment ReportVulnerability Assessment Report
Vulnerability Assessment Report
 
Dressing up the ICS Kill Chain
Dressing up the ICS Kill ChainDressing up the ICS Kill Chain
Dressing up the ICS Kill Chain
 
ISO 27002-2022.pdf
ISO 27002-2022.pdfISO 27002-2022.pdf
ISO 27002-2022.pdf
 
cybersecurity- A.Abutaleb
cybersecurity- A.Abutalebcybersecurity- A.Abutaleb
cybersecurity- A.Abutaleb
 
Improve Cybersecurity posture by using ISO/IEC 27032
Improve Cybersecurity posture by using ISO/IEC 27032Improve Cybersecurity posture by using ISO/IEC 27032
Improve Cybersecurity posture by using ISO/IEC 27032
 
Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023Cybersecurity trends - What to expect in 2023
Cybersecurity trends - What to expect in 2023
 
ISO 27001 2013 isms final overview
ISO 27001 2013 isms final overviewISO 27001 2013 isms final overview
ISO 27001 2013 isms final overview
 
Medical Device Threat Modeling with Templates
Medical Device Threat Modeling with TemplatesMedical Device Threat Modeling with Templates
Medical Device Threat Modeling with Templates
 
Vulnerability Assesment
Vulnerability AssesmentVulnerability Assesment
Vulnerability Assesment
 
ISO 27001_2022 Standard_Presentation.pdf
ISO 27001_2022 Standard_Presentation.pdfISO 27001_2022 Standard_Presentation.pdf
ISO 27001_2022 Standard_Presentation.pdf
 
Cybersecurity in Industrial Control Systems (ICS)
Cybersecurity in Industrial Control Systems (ICS)Cybersecurity in Industrial Control Systems (ICS)
Cybersecurity in Industrial Control Systems (ICS)
 
How To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete DeckHow To Present Cyber Security To Senior Management Complete Deck
How To Present Cyber Security To Senior Management Complete Deck
 
Industrial_Cyber_Security
Industrial_Cyber_SecurityIndustrial_Cyber_Security
Industrial_Cyber_Security
 
Security architecture
Security architectureSecurity architecture
Security architecture
 

Similar to Secure Your Medical Devices From the Ground Up

The Tools of Industry 4.0
The Tools of Industry 4.0The Tools of Industry 4.0
The Tools of Industry 4.0
Osama Shahumi
 
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonSCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
Patricia M Watson
 

Similar to Secure Your Medical Devices From the Ground Up (20)

An Insight on Testing the IoT Applications
An Insight on Testing the IoT ApplicationsAn Insight on Testing the IoT Applications
An Insight on Testing the IoT Applications
 
国际物联网安全标准与认证大解析
国际物联网安全标准与认证大解析国际物联网安全标准与认证大解析
国际物联网安全标准与认证大解析
 
Safeguard Your Medical Devices from Cyber Threats
Safeguard Your Medical Devices from Cyber ThreatsSafeguard Your Medical Devices from Cyber Threats
Safeguard Your Medical Devices from Cyber Threats
 
MongoDB IoT City Tour EINDHOVEN: IoT in Healthcare: by, Microsoft & Barco
MongoDB IoT City Tour EINDHOVEN: IoT in Healthcare: by, Microsoft & BarcoMongoDB IoT City Tour EINDHOVEN: IoT in Healthcare: by, Microsoft & Barco
MongoDB IoT City Tour EINDHOVEN: IoT in Healthcare: by, Microsoft & Barco
 
The Tools of Industry 4.0
The Tools of Industry 4.0The Tools of Industry 4.0
The Tools of Industry 4.0
 
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonSCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
 
The Present and Future of IoT Cybersecurity
The Present and Future of IoT CybersecurityThe Present and Future of IoT Cybersecurity
The Present and Future of IoT Cybersecurity
 
Are you ready for Microsoft Azure Sphere?
Are you ready for Microsoft Azure Sphere?Are you ready for Microsoft Azure Sphere?
Are you ready for Microsoft Azure Sphere?
 
Introduction to ibm internet of things foundation
Introduction to ibm internet of things foundationIntroduction to ibm internet of things foundation
Introduction to ibm internet of things foundation
 
Learn how to make your IoT pilot projects and POCs successful
Learn how to make your IoT pilot projects and POCs successfulLearn how to make your IoT pilot projects and POCs successful
Learn how to make your IoT pilot projects and POCs successful
 
IBM in Surveillance: Solutions that Deliver Innovation
IBM in Surveillance: Solutions that Deliver InnovationIBM in Surveillance: Solutions that Deliver Innovation
IBM in Surveillance: Solutions that Deliver Innovation
 
IoT Day 2019 Naples - Microsoft Azure Shpere
IoT Day 2019 Naples - Microsoft Azure ShpereIoT Day 2019 Naples - Microsoft Azure Shpere
IoT Day 2019 Naples - Microsoft Azure Shpere
 
How to bootstrap your IoT project
How to bootstrap  your IoT projectHow to bootstrap  your IoT project
How to bootstrap your IoT project
 
Safeguarding the Internet of Things
Safeguarding the Internet of ThingsSafeguarding the Internet of Things
Safeguarding the Internet of Things
 
Cruatech Services Intro
Cruatech Services IntroCruatech Services Intro
Cruatech Services Intro
 
Infinity_Architecture_June_Webinar__Final_Wiki.pptx
Infinity_Architecture_June_Webinar__Final_Wiki.pptxInfinity_Architecture_June_Webinar__Final_Wiki.pptx
Infinity_Architecture_June_Webinar__Final_Wiki.pptx
 
Cybridge Secure Content Filter for SCADA Networks
Cybridge Secure Content Filter for SCADA NetworksCybridge Secure Content Filter for SCADA Networks
Cybridge Secure Content Filter for SCADA Networks
 
5 Key Considerations at the Start of SaMD Development
5 Key Considerations at the Start of SaMD Development5 Key Considerations at the Start of SaMD Development
5 Key Considerations at the Start of SaMD Development
 
PSOIOT-1151.pdf
PSOIOT-1151.pdfPSOIOT-1151.pdf
PSOIOT-1151.pdf
 
Trends in Cybersecurity - DNUG Stammtisch Wien
Trends in Cybersecurity - DNUG Stammtisch Wien Trends in Cybersecurity - DNUG Stammtisch Wien
Trends in Cybersecurity - DNUG Stammtisch Wien
 

More from ICS

Software Update Mechanisms: Selecting the Best Solutin for Your Embedded Linu...
Software Update Mechanisms: Selecting the Best Solutin for Your Embedded Linu...Software Update Mechanisms: Selecting the Best Solutin for Your Embedded Linu...
Software Update Mechanisms: Selecting the Best Solutin for Your Embedded Linu...
ICS
 

More from ICS (20)

The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Practical Advice for FDA’s 510(k) Requirements.pdf
Practical Advice for FDA’s 510(k) Requirements.pdfPractical Advice for FDA’s 510(k) Requirements.pdf
Practical Advice for FDA’s 510(k) Requirements.pdf
 
Accelerating Development of a Safety-Critical Cobot Welding System with Qt/QM...
Accelerating Development of a Safety-Critical Cobot Welding System with Qt/QM...Accelerating Development of a Safety-Critical Cobot Welding System with Qt/QM...
Accelerating Development of a Safety-Critical Cobot Welding System with Qt/QM...
 
Overcoming CMake Configuration Issues Webinar
Overcoming CMake Configuration Issues WebinarOvercoming CMake Configuration Issues Webinar
Overcoming CMake Configuration Issues Webinar
 
Enhancing Quality and Test in Medical Device Design - Part 2.pdf
Enhancing Quality and Test in Medical Device Design - Part 2.pdfEnhancing Quality and Test in Medical Device Design - Part 2.pdf
Enhancing Quality and Test in Medical Device Design - Part 2.pdf
 
Designing and Managing IoT Devices for Rapid Deployment - Webinar.pdf
Designing and Managing IoT Devices for Rapid Deployment - Webinar.pdfDesigning and Managing IoT Devices for Rapid Deployment - Webinar.pdf
Designing and Managing IoT Devices for Rapid Deployment - Webinar.pdf
 
Quality and Test in Medical Device Design - Part 1.pdf
Quality and Test in Medical Device Design - Part 1.pdfQuality and Test in Medical Device Design - Part 1.pdf
Quality and Test in Medical Device Design - Part 1.pdf
 
Creating Digital Twins Using Rapid Development Techniques.pdf
Creating Digital Twins Using Rapid Development Techniques.pdfCreating Digital Twins Using Rapid Development Techniques.pdf
Creating Digital Twins Using Rapid Development Techniques.pdf
 
MDG Panel - Creating Expert Level GUIs for Complex Medical Devices
MDG Panel - Creating Expert Level GUIs for Complex Medical DevicesMDG Panel - Creating Expert Level GUIs for Complex Medical Devices
MDG Panel - Creating Expert Level GUIs for Complex Medical Devices
 
How to Craft a Winning IOT Device Management Solution
How to Craft a Winning IOT Device Management SolutionHow to Craft a Winning IOT Device Management Solution
How to Craft a Winning IOT Device Management Solution
 
Bridging the Gap Between Development and Regulatory Teams
Bridging the Gap Between Development and Regulatory TeamsBridging the Gap Between Development and Regulatory Teams
Bridging the Gap Between Development and Regulatory Teams
 
IoT Device Fleet Management: Create a Robust Solution with Azure
IoT Device Fleet Management: Create a Robust Solution with AzureIoT Device Fleet Management: Create a Robust Solution with Azure
IoT Device Fleet Management: Create a Robust Solution with Azure
 
Basic Cmake for Qt Users
Basic Cmake for Qt UsersBasic Cmake for Qt Users
Basic Cmake for Qt Users
 
Software Update Mechanisms: Selecting the Best Solutin for Your Embedded Linu...
Software Update Mechanisms: Selecting the Best Solutin for Your Embedded Linu...Software Update Mechanisms: Selecting the Best Solutin for Your Embedded Linu...
Software Update Mechanisms: Selecting the Best Solutin for Your Embedded Linu...
 
Qt Installer Framework
Qt Installer FrameworkQt Installer Framework
Qt Installer Framework
 
Bridging the Gap Between Development and Regulatory Teams
Bridging the Gap Between Development and Regulatory TeamsBridging the Gap Between Development and Regulatory Teams
Bridging the Gap Between Development and Regulatory Teams
 
Overcome Hardware And Software Challenges - Medical Device Case Study
Overcome Hardware And Software Challenges - Medical Device Case StudyOvercome Hardware And Software Challenges - Medical Device Case Study
Overcome Hardware And Software Challenges - Medical Device Case Study
 
User Experience Design for IoT
User Experience Design for IoTUser Experience Design for IoT
User Experience Design for IoT
 
Software Bill of Materials - Accelerating Your Secure Embedded Development.pdf
Software Bill of Materials - Accelerating Your Secure Embedded Development.pdfSoftware Bill of Materials - Accelerating Your Secure Embedded Development.pdf
Software Bill of Materials - Accelerating Your Secure Embedded Development.pdf
 
An In-Depth Look Into Microcontrollers
An In-Depth Look Into MicrocontrollersAn In-Depth Look Into Microcontrollers
An In-Depth Look Into Microcontrollers
 

Recently uploaded

Recently uploaded (20)

OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
 
WSO2Con2024 - Software Delivery in Hybrid Environments
WSO2Con2024 - Software Delivery in Hybrid EnvironmentsWSO2Con2024 - Software Delivery in Hybrid Environments
WSO2Con2024 - Software Delivery in Hybrid Environments
 
WSO2CON 2024 - Unlocking the Identity: Embracing CIAM 2.0 for a Competitive A...
WSO2CON 2024 - Unlocking the Identity: Embracing CIAM 2.0 for a Competitive A...WSO2CON 2024 - Unlocking the Identity: Embracing CIAM 2.0 for a Competitive A...
WSO2CON 2024 - Unlocking the Identity: Embracing CIAM 2.0 for a Competitive A...
 
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
 
WSO2CON 2024 - Building a Digital Government in Uganda
WSO2CON 2024 - Building a Digital Government in UgandaWSO2CON 2024 - Building a Digital Government in Uganda
WSO2CON 2024 - Building a Digital Government in Uganda
 
WSO2Con2024 - Organization Management: The Revolution in B2B CIAM
WSO2Con2024 - Organization Management: The Revolution in B2B CIAMWSO2Con2024 - Organization Management: The Revolution in B2B CIAM
WSO2Con2024 - Organization Management: The Revolution in B2B CIAM
 
WSO2Con2024 - From Blueprint to Brilliance: WSO2's Guide to API-First Enginee...
WSO2Con2024 - From Blueprint to Brilliance: WSO2's Guide to API-First Enginee...WSO2Con2024 - From Blueprint to Brilliance: WSO2's Guide to API-First Enginee...
WSO2Con2024 - From Blueprint to Brilliance: WSO2's Guide to API-First Enginee...
 
WSO2Con2024 - GitOps in Action: Navigating Application Deployment in the Plat...
WSO2Con2024 - GitOps in Action: Navigating Application Deployment in the Plat...WSO2Con2024 - GitOps in Action: Navigating Application Deployment in the Plat...
WSO2Con2024 - GitOps in Action: Navigating Application Deployment in the Plat...
 
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
 
WSO2Con2024 - Facilitating Broadband Switching Services for UK Telecoms Provi...
WSO2Con2024 - Facilitating Broadband Switching Services for UK Telecoms Provi...WSO2Con2024 - Facilitating Broadband Switching Services for UK Telecoms Provi...
WSO2Con2024 - Facilitating Broadband Switching Services for UK Telecoms Provi...
 
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?WSO2CON 2024 - Does Open Source Still Matter?
WSO2CON 2024 - Does Open Source Still Matter?
 
WSO2CON 2024 - Architecting AI in the Enterprise: APIs and Applications
WSO2CON 2024 - Architecting AI in the Enterprise: APIs and ApplicationsWSO2CON 2024 - Architecting AI in the Enterprise: APIs and Applications
WSO2CON 2024 - Architecting AI in the Enterprise: APIs and Applications
 
WSO2CON 2024 Slides - Unlocking Value with AI
WSO2CON 2024 Slides - Unlocking Value with AIWSO2CON 2024 Slides - Unlocking Value with AI
WSO2CON 2024 Slides - Unlocking Value with AI
 
Architecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the pastArchitecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the past
 
WSO2CON 2024 - Not Just Microservices: Rightsize Your Services!
WSO2CON 2024 - Not Just Microservices: Rightsize Your Services!WSO2CON 2024 - Not Just Microservices: Rightsize Your Services!
WSO2CON 2024 - Not Just Microservices: Rightsize Your Services!
 
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
 
WSO2CON 2024 - Designing Event-Driven Enterprises: Stories of Transformation
WSO2CON 2024 - Designing Event-Driven Enterprises: Stories of TransformationWSO2CON 2024 - Designing Event-Driven Enterprises: Stories of Transformation
WSO2CON 2024 - Designing Event-Driven Enterprises: Stories of Transformation
 
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open SourceWSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
 
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
 

Secure Your Medical Devices From the Ground Up

  • 1. Secure Your Medical Devices From the Ground Up February 9, 2023 ICS Geoff Pollard RTI Darren Porras PARTNER WEBINAR © Copyright t 2023
  • 2. About ICS Established in 1987, Integrated Computer Solutions, Inc. (ICS) delivers innovative software solutions with a full suite of services to accelerate development of successful next-gen products. ICS is headquartered outside Boston in Waltham, Mass. with offices in California, Canada and Europe. Currently 160 people. Boston UX is ICS’ design studio, specializing in intuitive touchscreen and multimodal interfaces for high-impact embedded and connected devices.
  • 3. Delivering a Full Suite of Medtech Services ● Human Factors Engineering ● IEC 62366-UX/UI Design ● Custom Frontend and Backend Software Development ● Development with IEC 62304-Compliant Platform ● Low-code Tools that Convert UX Prototype to Product ● Medical Device Cybersecurity ● AWS and Azure Cloud Services and Analytics ● ISO 14971-Compliant Hazard Analysis ● Software Verification Testing ● Complimentary Software Technology Assessment
  • 4. ©2022 Real-Time Innovations, Inc. Confidential.
  • 5. Cybersecurity in Medical Devices - Why? Business Risks HIPAA violations : up to $10,000 each patient GDPR : $10-$20M or 2-4% of revenue FDA : [Draft] April 2022 Guidance for Premarket submissions December 2022 Omnibus Appropriations Bill EU : Harmonizing ISO 81001-5-1 in 2024
  • 6. SDLC (Secure Product Development Lifecycle) QMS Cybersecurity Architecture Design Threat Modeling Design Hazards / Risk Assessment Design Static Analysis Development SCA/BCA -> SBOM* Development Penetration Testing Release Candidate Labeling Additions User Manual (IFU) Vulnerability Management Plan* QMS Periodic Vulnerability Analysis* Post Release Annual Cybersecurity Report Post Release Deliverables in FDA’s Latest Guidance * Included in December 2022 Omnibus Appropriations Bill
  • 7. What about EU? ISO 81001-5-1;2022 SPDF (Secure Product Development Framework) 5.1.1 Cybersecurity Architecture 5.3.1 Threat Modeling 7.2 Risk Assessment 7.4 Static Analysis A.4 (c) Part of secure coding practices SCA/BCA -> SBOM 5.7.3 (d) Penetration Testing 5.7.4 Labeling Additions 5.8.2 Vulnerability Management Plan 6.1 Periodic Vulnerability Analysis 4.1.8 Annual Cybersecurity Report 4.1
  • 11. Threat Modeling STRIDE Threat Modeling output
  • 13. Summary Complex design exponentially increases the cybersecurity requirements More potential points of failure = more mitigations = more requirements = more tests Comprehensive Assessment required Increasing regulatory requirements Starting to see specialized cybersecurity legislation (post market / pre-market / IoT) —------- Next: How secure connectivity can be used to address these challenges
  • 14. ©2023 Real-Time Innovations, Inc. Intelligent and Connected Devices •Applications: – Surgical Robotics – Digital OR – Imaging – Critical Care – Radiation Therapy •Technology ecosystem: – Sensors, Robotics, Imaging, Real-Time Intelligence Source: Advanced Intelligent Systems, Volume: 2, Issue: 8, First published: 11 June 2020, DOI: (10.1002/aisy.201900138)
  • 15. ©2023 Real-Time Innovations, Inc. Example: Surgical Robotics • Surgeon Console • Vision Tower • Patient Cart • Robotic Arm • Instruments Liu, HH., Li, LJ., Shi, B. et al. Robotic surgical systems in maxillofacial surgery: a review.Int J Oral Sci 9, 63–73 (2017). https://doi.org/10.1038/ijos.2017.24
  • 16. ©2023 Real-Time Innovations, Inc. Data Connectivity Challenge •Complexity •Performance •Reliability •Scalability •Cybersecurity Md. Rashid Al Asif, Khondokar Fida Hasan, Md Zahidul Islam, Rahamatullah Khondoker, "STRIDE-based Cyber Security Threat Modeling for IoT-enabled Precision Agriculture Systems", Sustainable Technologies for Industry 4.0 (STI) 2021 3rd International Conference on, pp. 1-6, 2021 Surgical Robotics Communications
  • 17. ©2023 Real-Time Innovations, Inc. Solution: A Data-Centric Approach Databus (Shared Data Model) Robotic Control Sensors/ Actuato rs Algorith ms Device Apps Imaging Control Device Data HMI System Control Events Alarms
  • 18. ©2023 Real-Time Innovations, Inc. Data Distribution Service (DDS) •Data Flow: – Defined by the Data – Producers and Consumers – Data is the interface – Configurable •Benefits: – Distributed, modular – Performance – Scalable – Reliable, resilient – Secure Monitor Data Fusion HMI Command Data Sensor Data State Data Databus
  • 19. ©2023 Real-Time Innovations, Inc. How does Data-Centricity enable secure data flow?
  • 20. ©2023 Real-Time Innovations, Inc. Secure Communications By Design • Limits data access to authorized applications • Configurable to application and use case • Independent of network location • Data segmentation • Least Privilege Databus Monitor Data Fusion HMI Command Data Sensor Data State Data Service Patient Data
  • 21. ©2023 Real-Time Innovations, Inc. Framework Security Features •Built-in plugins •Fine-grained and configurable – No change to Application •Enables regulatory guidance: – Secure by design – Secure interfaces, least privilege – Independent of network location DDS Secure Authentication Access Control Encryption Data Tagging Logging Application Any Transport* (e.g., TCP, UDP, multicast, shared memory, more…)
  • 22. ©2023 Real-Time Innovations, Inc. Data-Centric Framework
  • 23. ©2023 Real-Time Innovations, Inc. Data-Centric Framework Analytics Databus Network Stack Socket Programming Encryption and Authentication Reliability Serialization / Marshaling Quality of Service Node and Service Discovery Addressing Caching and Persistence Message Filtering Application Logic RTI Connext DDS Produce r Routing Service Connext App Connext App Connext App App Connext Sensor Databus ©2021 Real-Time Innovations, Inc. Consume r Producer and Consumer Monito r
  • 24. ©2023 Real-Time Innovations, Inc. Benefits of Data-Centric Connectivity Framework RTI Connext • Decentralized, low-latency data connectivity • Standards-based, cross-industry • Resilient communication Reliability and performance • Interoperable and flexible architectures • Data flow management • Scalable/upgradeable systems Flexible and efficient development • Fine-grained and configurable • Secure data interfaces- least privilege • Built-in plugins Cybersecurity by design
  • 25. ©2023 Real-Time Innovations, Inc. Data-Centric Software Connectivity RTI Connext