SlideShare a Scribd company logo
1 of 32
UNDERSTANDING RISK MANAGEMENT IN MEDICAL
DEVICES
Covers Principles and RM Mindset to tackle Risk Management while staying compliant to FDA
requirements
Excerpt from ASQ 2019 MN Quality Conference presentation by Keerthi Gunasekaran.
NOTE: The content and views are solely provided by the author, and its made available for
educational purposes . The content is their interpretation, opinions on Risk Management, FDA
regulations and cybersecurity guidance originating from years practicing RM and work
experience. It does not reflect, represent any entities or organizations’ involvement or
inputs.
LEARNING OBJECTIVES
- RISK MANAGEMENT THINKING
- UNDERSTAND CYBERSECURITY AND
HOW TO INTEGRATE CYBERSECURITY
INTO RISK MANAGEMENT
ENTROPY
• Physics: a thermodynamic quantity
representing the unavailability of a
system's thermal energy for
conversion into mechanical work,
often described as the degree of
disorder or randomness in the
system.
• Lack of order or predictability;
gradual decline into disorder.
RISK MANAGEMENT IS ABOUT COMBATING
ENTROPY
……………..THROUGH OUR ASSESSMENT OF
FACTS, REALITY AND PREDICTIONS TO DRIVE A
SET OF ACTIONS
UNIVERSAL LAWS OF RISK MANAGEMENT
• Risk should be objective
• Risk assessment process has to be
definitive
• Risk acceptability can be subjective
Example: A external Ventricular Assist
Device (VAD) can be an acceptable risk
for treatment of end-stage heart
failure versus chronic care heart
diseases.
SYSTEM ENVIRONMENT
/ CONDITIONS
OUTCOME
ACCEPTABILITY
/ CRITICALITY
FAILURE MODES CAN OCCUR ANYWHERE…
FAILURE MODES RISK MANAGEMENT
RISK MANAGEMENT?
Risk Management is the systematic application of management policies, procedures and
practices to the tasks of analyzing, evaluating, controlling and monitoring risk
[Risk Assessment in this context is: Combination of probability of occurrence and severity of harm ]
— Application of Risk Management to Medical Devices Risk Management Process- ISO 14971.7
(OPSCon)2 METHODOLOGY
• Outcomes
• Objectives
• Process
• Performance (IFU, Optimization, etc)
• Scenarios (Use Conditions, Experience)
• Safety
• Controls
• Contingencies
COPYRIGHTED – MAY 2019 PROPERTY OF KEERTHI GUNASEKARAN
X
Outcomes
Process
Scenarios
Controls
MANAGEMENT OVERSIGHT (COMPLIANCE)
Risk Management Plan
Preliminary Health
hazard Analysis
(PHA)
DFMEA
PFMEA
Clinical Evidence
Reports
Field Events:
Product Impact
Assessment
Periodic Risk
Management
Reporting
Periodic Post-
Market Safety
Reporting
Periodic Product
Quality (Risk)
Reviews
DHF
DMR
DHR
Serv Rec
Complaint
Handling
FCA, HHA
Post-Market Risk Management
Field Events
/ Complaints/
Regulations/
Service & Repairs
Filter & Trend Monthly
Report
Review Periodic Reports
Post -Market Trending SOP
and WI
ONGOING POST-MARKET RISK SURVEILLANCE
Improvements
CYBERSECURITY RISK MANAGEMENT
ADDITIONAL TOPPINGS ON THE
FAVORITE PIZZA
SOUNDS FAMILIAR ?
“AN EFFECTIVE CYBERSECURITY RISK MANAGEMENT PROGRAM
SHOULD INCORPORATE BOTH PREMARKET AND POST-MARKET
LIFECYCLE PHASES AND ADDRESS CYBERSECURITY FROM DEVICE
CONCEPTION TO OBSOLESCENCE.” – FDA CYBERSECURITY POST
MARKET GUIDANCE
CYBER ENTROPY
• Lack of order or predictability;
gradual acute decline into disorder
sourced by different bodies with
different intentions
GROWING CYBER STAKEHOLDERS LANDSCAPE
Traditional
Stakeholders
Stakeholders
Patients
Media
Security
Researchers
ICS-CERT
Hospital
IT
Customers
Business
FDA
New / Emerging
Stakeholders
“Ethical Hacking”
15
CYBERSECURITY ADVISORIES
• Their mission is to improve the cybersecurity
posture of 16 critical infrastructure sectors –
which includes medical devices (Healthcare
and Public Health)
• ICS-CERT advisories are public disclosures of
security vulnerabilities to critical
infrastructure to inform on risks and
mitigations
CYBERSECURITY EXPECTATION
POST-MARKET CYBER SECURITY PROGRAM INTENT
• Evidence of an ongoing structured and systematic approach in risk management and
quality management systems that entails:
• Methods to analyze, detect, and assess threat sources,
• Methods to identify, characterize, assess and mitigate or recover from a cybersecurity
vulnerability.
• Includes Design Expectations: Maintaining robust software lifecycle processes,
• Using threat modeling for safety and essential performance & communication
- excerpt from post market guidance page 13
CYBERSECURITY ESSENTIALS
Confidentiality
• Prevent unauthorized disclosure
Integrity
• Prevent unauthorized modification
Availability
• Functions when needed
Key Design Considerations:
1) Accessibility:
 External Interfaces: analyze & protect
 Communication Technology: key
interface, remotely available
2) Authentication: validating with whom you are
communicating
3) Encryption: protect data
4) Availability: how can this be constrained yet
still meet System design needs?
5) Updates: security updates will be needed,
ensure upgradability is built-in
POST-MARKET CYBERSECURITY
ELEMENTS OF AN EFFECTIVE POST-MARKET CYBERSECURITY RISK
MANAGEMENT PROGRAM
Post-market risk management program should contain steps to:
1. Identify,
2. Protect,
3. Detect,
4. Respond,
5. Recover.
Maintain safety and essential performance- Evidence in: FMEA
process, RM reports, Complaint SOPs. Identify cyber security
signals,
Vulnerability Characterization, Risk Analysis & Threat Modeling,
Sources, and Impact Assessment
Compensating Controls Assessment, Risk Mitigation and deploying
mitigations that address cybersecurity risk early and prior to
exploitation
https://www.nist.gov/sites/default/files/documents/cyberframework/cybersecurity-framework-021214.pdf
SECURITY RISK: MANAGE WITH PRODUCT RISKS
Key compliance consideration where
security risks feeds into the overall
product risk analysis:
- Patient Safety Documentation
(Design)
- Hazard / Harm Analysis
- Safety / System Characterization
- Use- Error Analysis
- Complaint Reporting (coding)
- Service and Repairs
AUDIT CS QUICK CHECKLIST
 Evidence of cybersecurity in risk management plan,
 Threat or signal sources defined and monitored
 Software lifecycle evaluation contains cybersecurity assessments
 Evidence of Vulnerability Characterization and Assessment
 Threat modeling; Patient harm,
 Risk acceptance criteria.
 Use of “Common Vulnerability Scoring System,” Version 3.0 (page13)
 Post-Market Triage vulnerabilities for remediation
 Post-Market Risk Analysis and Remediation
KEY TAKEAWAYS
1. Risk is objective, Risk assessment process has to be definitive but Risk
acceptability can be subjective
2. Risk Management is the systematic oversight of analyzing, evaluating,
controlling and monitoring risk
3. Cybersecurity requires evidence of an ongoing structured and systematic
approach in risk management and quality management systems that
entails: methods to analyze, detect, assess and mitigate threat sources.
4. Cybersecurity is about protecting confidentiality, integrity and availability.
5. Key compliance consideration include patient safety, risk characterization,
user error analysis and complaints and servicing.
END.
Increasingly, companies are turning to artificial
intelligence for their products and services.
AI
Pic Credit: Inc
APPENDIX
DEFINITIONS PER ISO 14971
Important to ensure there is common understanding
of terms and definitions
24
MEDICAL DEVICE CYBERSECURITY -FDA GUIDANCE FIRST
RELEASE
• Pre-market oct, 2014
• Post-market dec,2016
POST-MARKET
PRE-MARKET NOT DISCUSSED
This guidance applies to any marketed and distributed medical device (+“legacy
devices”) including:
1) medical devices that contain software (including firmware) or programmable logic;
2) software that is a medical device, including mobile medical applications.
3) devices that are considered part of an interoperable system
CYBERSECURITY – RM PROCESS ENHANCEMENTS
• Threat Assessment
• STRIDE Methodology
• Attack-Tree Methodology
• Vulnerability Assessment
• CVSS
• FDA-MITRE Healthcare Rubric
• Risk Assessment
• Security Risk Assessment
• Safety Assessment
• Management Oversight
Vulnerability
Threat
Risk
Management
STRIDE
STRIDE is a model of threats developed at Microsoft for identifying computer security threats. It provides a
way to screen for security threats in six categories.
• Spoofing of user identity
• Tampering
• Repudiation
• Information disclosure (privacy breach or data leak)
• Denial of service (D.o.S)
• Elevation of privilege
CVSS
• The Common Vulnerability Scoring System (CVSS) is an open standard designed to convey vulnerability
severity and help determine the urgency and priority of response. When vulnerabilities are discovered
in medical devices, medical device manufacturers, typically working with the Department of Homeland
Security (DHS) National Cybersecurity and Communications Integration Center (NCCIC), use CVSS to
provide a consistent and standardized way to communicate the severity of a vulnerability between
multiple parties, including the medical device manufacturer, hospitals, clinicians, patients, NCCIC, and
vulnerability researchers.
• CVSS and its associated rubric were developed for enterprise information technology systems and do
not adequately reflect the clinical environment and potential patient safety impacts. To address this
challenges, the MITRE Corporation, under contract to FDA, developed a rubric that provides guidance
for how an analyst can utilize CVSS as part of a risk assessment for a medical device.
• This rubric was developed by MITRE in collaboration with a working group of subject matter experts
across the medical device ecosystem, including FDA, medical device manufacturers, healthcare delivery
organizations, security experts, and safety/risk assessment experts.
CYBERSECURTIY QMS AND RA AREAS
Areas within QMS in addition to the risk management program:
Quality System areas:
1. FCA (21 CFR 806)
2. Complaint handling (21 CFR 820.198, 803),
3. Quality audit (21 CFR 820.22),
4. Corrective and preventive action (21 CFR 820.100),
5. Software validation and risk analysis (21 CFR 820.30(g))
6. Servicing (21 CFR 820.200).
7. Supplier quality
Regulatory areas:
1. PMA Periodic reports (21 CFR 814.84)
REFERENCED IN FDA CYBERSECURITY GUIDANCE
 21 CFR Part 820 Quality Systems Regulations
 820.30 Subpart C – Design Controls of the Quality System
Regulation
 806.10 – Reports of corrections and removals
 807.81 (a)(3)
 806.10(f)
 820.100 Corrective action and preventative action
 7.42 Recall Strategy for elements of a remediation plan
 7 (b)(3) Effectiveness checks
 814.39
 814.84
 820.30(g)
• ANSI/AAMI ES60601-1:2005/(R)2012 and A1:2012, C1:2009/(R)2012
and A2:2010/(R)2012 (Consolidated Text) Medical electrical
equipment— Part 1: General requirements for basic safety and
essential performance (IEC 60601-1:2005, MOD), section 3.27 defines
“Essential Performance” as performance of a clinical function, other
than that related to basic safety, where loss or degradation beyond the
limits specified by the manufacturer results in an unacceptable risk.”
• ISO/IEC 30111:2013: Information Technology – Security Techniques –
Vulnerability Handling Processes (recognized standard)
• ISO/IEC 29147:2014: Information Technology – Security Techniques –
Vulnerability Disclosure
• AAMI TIR57: Principles for medical device security—Risk management
• IEC/TR 80001-2-1:2012 Application of risk management for IT-networks
incorporating medical devices
Questions ?
Keerthi Gunasekaran – Email: keerthi@mindwatts.com
.

More Related Content

What's hot

NIST 800-30 Intro to Conducting Risk Assessments - Part 1
NIST 800-30 Intro to Conducting Risk Assessments - Part 1NIST 800-30 Intro to Conducting Risk Assessments - Part 1
NIST 800-30 Intro to Conducting Risk Assessments - Part 1Denise Tawwab
 
Clinical Risk Management
Clinical Risk Management Clinical Risk Management
Clinical Risk Management Medigate
 
Application of Q methodology in critical success factors of information secur...
Application of Q methodology in critical success factors of information secur...Application of Q methodology in critical success factors of information secur...
Application of Q methodology in critical success factors of information secur...stuimrozsm
 
Risk Assessment Process NIST 800-30
Risk Assessment Process NIST 800-30Risk Assessment Process NIST 800-30
Risk Assessment Process NIST 800-30timmcguinness
 
ISO 27005 Risk Assessment
ISO 27005 Risk AssessmentISO 27005 Risk Assessment
ISO 27005 Risk AssessmentSmart Assessment
 
INFOSECFORCE Risk Management Framework Transition Plan
INFOSECFORCE Risk Management Framework Transition PlanINFOSECFORCE Risk Management Framework Transition Plan
INFOSECFORCE Risk Management Framework Transition PlanBill Ross
 
Ir s 1_2_1_kovacs
Ir s 1_2_1_kovacsIr s 1_2_1_kovacs
Ir s 1_2_1_kovacsStefan Kovacs
 
Example of fisma compliance analysis.1
Example of fisma compliance analysis.1Example of fisma compliance analysis.1
Example of fisma compliance analysis.1Sal Velasco
 
Concept to risk management ( In context to Q9)
Concept to risk management ( In context to Q9)Concept to risk management ( In context to Q9)
Concept to risk management ( In context to Q9)Subhakanta Dhal
 
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAMINFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAMChristopher Nanchengwa
 
Risk assessment techniques a critical success factor
Risk assessment techniques a critical success factorRisk assessment techniques a critical success factor
Risk assessment techniques a critical success factorPECB
 
Risk Assessment Famework
Risk Assessment FameworkRisk Assessment Famework
Risk Assessment Fameworklneut03
 
Risk Presentation
Risk Presentation Risk Presentation
Risk Presentation lneut03
 
Bearing solutions healthcare security ver 0.1
Bearing solutions healthcare security ver 0.1Bearing solutions healthcare security ver 0.1
Bearing solutions healthcare security ver 0.1Lennart Bredberg
 
Risk management osh
Risk management oshRisk management osh
Risk management oshjaycatubig
 
Cyb 690 cybersecurity program template directions the foll
Cyb 690 cybersecurity program template directions the follCyb 690 cybersecurity program template directions the foll
Cyb 690 cybersecurity program template directions the follAISHA232980
 
Session 05_Risk Assessment Program for YSP_Risk Analysis II
Session 05_Risk Assessment Program for YSP_Risk Analysis IISession 05_Risk Assessment Program for YSP_Risk Analysis II
Session 05_Risk Assessment Program for YSP_Risk Analysis IIMuizz Anibire
 
HITRUST CSF in the Cloud
HITRUST CSF in the CloudHITRUST CSF in the Cloud
HITRUST CSF in the CloudOnRamp
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 11: Monitor
Understanding the Risk Management Framework & (ISC)2 CAP Module 11: MonitorUnderstanding the Risk Management Framework & (ISC)2 CAP Module 11: Monitor
Understanding the Risk Management Framework & (ISC)2 CAP Module 11: MonitorDonald E. Hester
 

What's hot (20)

NIST 800-30 Intro to Conducting Risk Assessments - Part 1
NIST 800-30 Intro to Conducting Risk Assessments - Part 1NIST 800-30 Intro to Conducting Risk Assessments - Part 1
NIST 800-30 Intro to Conducting Risk Assessments - Part 1
 
Clinical Risk Management
Clinical Risk Management Clinical Risk Management
Clinical Risk Management
 
Application of Q methodology in critical success factors of information secur...
Application of Q methodology in critical success factors of information secur...Application of Q methodology in critical success factors of information secur...
Application of Q methodology in critical success factors of information secur...
 
Risk Assessment Process NIST 800-30
Risk Assessment Process NIST 800-30Risk Assessment Process NIST 800-30
Risk Assessment Process NIST 800-30
 
ISO 27005 Risk Assessment
ISO 27005 Risk AssessmentISO 27005 Risk Assessment
ISO 27005 Risk Assessment
 
INFOSECFORCE Risk Management Framework Transition Plan
INFOSECFORCE Risk Management Framework Transition PlanINFOSECFORCE Risk Management Framework Transition Plan
INFOSECFORCE Risk Management Framework Transition Plan
 
Ir s 1_2_1_kovacs
Ir s 1_2_1_kovacsIr s 1_2_1_kovacs
Ir s 1_2_1_kovacs
 
Example of fisma compliance analysis.1
Example of fisma compliance analysis.1Example of fisma compliance analysis.1
Example of fisma compliance analysis.1
 
Concept to risk management ( In context to Q9)
Concept to risk management ( In context to Q9)Concept to risk management ( In context to Q9)
Concept to risk management ( In context to Q9)
 
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAMINFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
INFORMATION AND COMMUNICATIONS TECHNOLOGY PROGRAM
 
Risk assessment techniques a critical success factor
Risk assessment techniques a critical success factorRisk assessment techniques a critical success factor
Risk assessment techniques a critical success factor
 
Risk Assessment Famework
Risk Assessment FameworkRisk Assessment Famework
Risk Assessment Famework
 
Risk Presentation
Risk Presentation Risk Presentation
Risk Presentation
 
Bearing solutions healthcare security ver 0.1
Bearing solutions healthcare security ver 0.1Bearing solutions healthcare security ver 0.1
Bearing solutions healthcare security ver 0.1
 
Risk management osh
Risk management oshRisk management osh
Risk management osh
 
Cyb 690 cybersecurity program template directions the foll
Cyb 690 cybersecurity program template directions the follCyb 690 cybersecurity program template directions the foll
Cyb 690 cybersecurity program template directions the foll
 
Session 05_Risk Assessment Program for YSP_Risk Analysis II
Session 05_Risk Assessment Program for YSP_Risk Analysis IISession 05_Risk Assessment Program for YSP_Risk Analysis II
Session 05_Risk Assessment Program for YSP_Risk Analysis II
 
HITRUST CSF in the Cloud
HITRUST CSF in the CloudHITRUST CSF in the Cloud
HITRUST CSF in the Cloud
 
Insurance
InsuranceInsurance
Insurance
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 11: Monitor
Understanding the Risk Management Framework & (ISC)2 CAP Module 11: MonitorUnderstanding the Risk Management Framework & (ISC)2 CAP Module 11: Monitor
Understanding the Risk Management Framework & (ISC)2 CAP Module 11: Monitor
 

Similar to Understanding Risk Management & Cyber security Principles in Medical Devices

Accelerating the Development of Medical Devices: The Value of Proactive Risk ...
Accelerating the Development of Medical Devices: The Value of Proactive Risk ...Accelerating the Development of Medical Devices: The Value of Proactive Risk ...
Accelerating the Development of Medical Devices: The Value of Proactive Risk ...Cognizant
 
Network Connected Medical Devices - A Case Study
Network Connected Medical Devices - A Case StudyNetwork Connected Medical Devices - A Case Study
Network Connected Medical Devices - A Case StudySophiaPalmira
 
How to handle Cyber Risk Management in Healthcare.docx.pdf
How to handle Cyber Risk Management in Healthcare.docx.pdfHow to handle Cyber Risk Management in Healthcare.docx.pdf
How to handle Cyber Risk Management in Healthcare.docx.pdfSecureCurve
 
Quality risk management
Quality risk managementQuality risk management
Quality risk managementKarunaMane1
 
Ich guidelines on risk assessment and risk mangment
Ich guidelines on risk assessment and risk mangmentIch guidelines on risk assessment and risk mangment
Ich guidelines on risk assessment and risk mangmentAshvin Bhoge
 
Risk Management Approach to Cyber Security
Risk Management  Approach to Cyber Security Risk Management  Approach to Cyber Security
Risk Management Approach to Cyber Security Ernest Staats
 
Risk management in development of life critical systems
Risk management in development of life critical systemsRisk management in development of life critical systems
Risk management in development of life critical systemsScott Althouse
 
ICH Q9 QUALITY RISK MANAGEMENT(QRM)
ICH Q9 QUALITY RISK MANAGEMENT(QRM)ICH Q9 QUALITY RISK MANAGEMENT(QRM)
ICH Q9 QUALITY RISK MANAGEMENT(QRM)saimsoleja
 
RiskWatch for Financial Institutions™
RiskWatch for Financial Institutions™RiskWatch for Financial Institutions™
RiskWatch for Financial Institutions™CPaschal
 
Step by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniStep by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniyaseraljohani
 
Step by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniStep by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniYaser Alrefai
 
Data Breaches and Security: Ditching Data Disasters-Michael McNeil, Philips H...
Data Breaches and Security: Ditching Data Disasters-Michael McNeil, Philips H...Data Breaches and Security: Ditching Data Disasters-Michael McNeil, Philips H...
Data Breaches and Security: Ditching Data Disasters-Michael McNeil, Philips H...IT Network marcus evans
 
Risk Assessment: Approach to enhance Network Security
Risk Assessment: Approach to enhance Network SecurityRisk Assessment: Approach to enhance Network Security
Risk Assessment: Approach to enhance Network SecurityIJCSIS Research Publications
 
Risk Management (1) (1).ppt
Risk Management (1) (1).pptRisk Management (1) (1).ppt
Risk Management (1) (1).pptAjjuSingh2
 
201512 - Vulnerability Management -PCI Best Practices - stepbystep
201512 - Vulnerability Management -PCI Best Practices - stepbystep201512 - Vulnerability Management -PCI Best Practices - stepbystep
201512 - Vulnerability Management -PCI Best Practices - stepbystepAllan Crowe PCIP
 
INFORMATION SECURITY MANAGEMENT
INFORMATION SECURITY MANAGEMENTINFORMATION SECURITY MANAGEMENT
INFORMATION SECURITY MANAGEMENTNi
 

Similar to Understanding Risk Management & Cyber security Principles in Medical Devices (20)

Accelerating the Development of Medical Devices: The Value of Proactive Risk ...
Accelerating the Development of Medical Devices: The Value of Proactive Risk ...Accelerating the Development of Medical Devices: The Value of Proactive Risk ...
Accelerating the Development of Medical Devices: The Value of Proactive Risk ...
 
Network Connected Medical Devices - A Case Study
Network Connected Medical Devices - A Case StudyNetwork Connected Medical Devices - A Case Study
Network Connected Medical Devices - A Case Study
 
How to handle Cyber Risk Management in Healthcare.docx.pdf
How to handle Cyber Risk Management in Healthcare.docx.pdfHow to handle Cyber Risk Management in Healthcare.docx.pdf
How to handle Cyber Risk Management in Healthcare.docx.pdf
 
Cybersecurity in Medical Devices
Cybersecurity in Medical DevicesCybersecurity in Medical Devices
Cybersecurity in Medical Devices
 
Quality risk management
Quality risk managementQuality risk management
Quality risk management
 
Ich guidelines on risk assessment and risk mangment
Ich guidelines on risk assessment and risk mangmentIch guidelines on risk assessment and risk mangment
Ich guidelines on risk assessment and risk mangment
 
Risk Management Approach to Cyber Security
Risk Management  Approach to Cyber Security Risk Management  Approach to Cyber Security
Risk Management Approach to Cyber Security
 
Risk management in development of life critical systems
Risk management in development of life critical systemsRisk management in development of life critical systems
Risk management in development of life critical systems
 
Quality Risk Management
Quality Risk ManagementQuality Risk Management
Quality Risk Management
 
ICH Q9 QUALITY RISK MANAGEMENT(QRM)
ICH Q9 QUALITY RISK MANAGEMENT(QRM)ICH Q9 QUALITY RISK MANAGEMENT(QRM)
ICH Q9 QUALITY RISK MANAGEMENT(QRM)
 
RiskWatch for Financial Institutions™
RiskWatch for Financial Institutions™RiskWatch for Financial Institutions™
RiskWatch for Financial Institutions™
 
Step by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniStep by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohani
 
Step by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohaniStep by-step for risk analysis and management-yaser aljohani
Step by-step for risk analysis and management-yaser aljohani
 
Data Breaches and Security: Ditching Data Disasters-Michael McNeil, Philips H...
Data Breaches and Security: Ditching Data Disasters-Michael McNeil, Philips H...Data Breaches and Security: Ditching Data Disasters-Michael McNeil, Philips H...
Data Breaches and Security: Ditching Data Disasters-Michael McNeil, Philips H...
 
Risk Assessment: Approach to enhance Network Security
Risk Assessment: Approach to enhance Network SecurityRisk Assessment: Approach to enhance Network Security
Risk Assessment: Approach to enhance Network Security
 
Risk Management (1) (1).ppt
Risk Management (1) (1).pptRisk Management (1) (1).ppt
Risk Management (1) (1).ppt
 
201512 - Vulnerability Management -PCI Best Practices - stepbystep
201512 - Vulnerability Management -PCI Best Practices - stepbystep201512 - Vulnerability Management -PCI Best Practices - stepbystep
201512 - Vulnerability Management -PCI Best Practices - stepbystep
 
Post Marketing Surveillance - RSI
Post Marketing Surveillance - RSIPost Marketing Surveillance - RSI
Post Marketing Surveillance - RSI
 
HIRA Manual
HIRA ManualHIRA Manual
HIRA Manual
 
INFORMATION SECURITY MANAGEMENT
INFORMATION SECURITY MANAGEMENTINFORMATION SECURITY MANAGEMENT
INFORMATION SECURITY MANAGEMENT
 

Recently uploaded

ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationAadityaSharma884161
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........LeaCamillePacle
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
Planning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxPlanning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxLigayaBacuel1
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for BeginnersSabitha Banu
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxsqpmdrvczh
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 

Recently uploaded (20)

TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
ROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint PresentationROOT CAUSE ANALYSIS PowerPoint Presentation
ROOT CAUSE ANALYSIS PowerPoint Presentation
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........Atmosphere science 7 quarter 4 .........
Atmosphere science 7 quarter 4 .........
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
Planning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptxPlanning a health career 4th Quarter.pptx
Planning a health career 4th Quarter.pptx
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Full Stack Web Development Course for Beginners
Full Stack Web Development Course  for BeginnersFull Stack Web Development Course  for Beginners
Full Stack Web Development Course for Beginners
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 

Understanding Risk Management & Cyber security Principles in Medical Devices

  • 1. UNDERSTANDING RISK MANAGEMENT IN MEDICAL DEVICES Covers Principles and RM Mindset to tackle Risk Management while staying compliant to FDA requirements Excerpt from ASQ 2019 MN Quality Conference presentation by Keerthi Gunasekaran. NOTE: The content and views are solely provided by the author, and its made available for educational purposes . The content is their interpretation, opinions on Risk Management, FDA regulations and cybersecurity guidance originating from years practicing RM and work experience. It does not reflect, represent any entities or organizations’ involvement or inputs.
  • 2. LEARNING OBJECTIVES - RISK MANAGEMENT THINKING - UNDERSTAND CYBERSECURITY AND HOW TO INTEGRATE CYBERSECURITY INTO RISK MANAGEMENT
  • 3. ENTROPY • Physics: a thermodynamic quantity representing the unavailability of a system's thermal energy for conversion into mechanical work, often described as the degree of disorder or randomness in the system. • Lack of order or predictability; gradual decline into disorder.
  • 4. RISK MANAGEMENT IS ABOUT COMBATING ENTROPY ……………..THROUGH OUR ASSESSMENT OF FACTS, REALITY AND PREDICTIONS TO DRIVE A SET OF ACTIONS
  • 5. UNIVERSAL LAWS OF RISK MANAGEMENT • Risk should be objective • Risk assessment process has to be definitive • Risk acceptability can be subjective Example: A external Ventricular Assist Device (VAD) can be an acceptable risk for treatment of end-stage heart failure versus chronic care heart diseases.
  • 6. SYSTEM ENVIRONMENT / CONDITIONS OUTCOME ACCEPTABILITY / CRITICALITY FAILURE MODES CAN OCCUR ANYWHERE… FAILURE MODES RISK MANAGEMENT
  • 7. RISK MANAGEMENT? Risk Management is the systematic application of management policies, procedures and practices to the tasks of analyzing, evaluating, controlling and monitoring risk [Risk Assessment in this context is: Combination of probability of occurrence and severity of harm ] — Application of Risk Management to Medical Devices Risk Management Process- ISO 14971.7
  • 8. (OPSCon)2 METHODOLOGY • Outcomes • Objectives • Process • Performance (IFU, Optimization, etc) • Scenarios (Use Conditions, Experience) • Safety • Controls • Contingencies COPYRIGHTED – MAY 2019 PROPERTY OF KEERTHI GUNASEKARAN X Outcomes Process Scenarios Controls
  • 9. MANAGEMENT OVERSIGHT (COMPLIANCE) Risk Management Plan Preliminary Health hazard Analysis (PHA) DFMEA PFMEA Clinical Evidence Reports Field Events: Product Impact Assessment Periodic Risk Management Reporting Periodic Post- Market Safety Reporting Periodic Product Quality (Risk) Reviews DHF DMR DHR Serv Rec Complaint Handling FCA, HHA Post-Market Risk Management
  • 10. Field Events / Complaints/ Regulations/ Service & Repairs Filter & Trend Monthly Report Review Periodic Reports Post -Market Trending SOP and WI ONGOING POST-MARKET RISK SURVEILLANCE Improvements
  • 11. CYBERSECURITY RISK MANAGEMENT ADDITIONAL TOPPINGS ON THE FAVORITE PIZZA
  • 12. SOUNDS FAMILIAR ? “AN EFFECTIVE CYBERSECURITY RISK MANAGEMENT PROGRAM SHOULD INCORPORATE BOTH PREMARKET AND POST-MARKET LIFECYCLE PHASES AND ADDRESS CYBERSECURITY FROM DEVICE CONCEPTION TO OBSOLESCENCE.” – FDA CYBERSECURITY POST MARKET GUIDANCE
  • 13. CYBER ENTROPY • Lack of order or predictability; gradual acute decline into disorder sourced by different bodies with different intentions
  • 14. GROWING CYBER STAKEHOLDERS LANDSCAPE Traditional Stakeholders Stakeholders Patients Media Security Researchers ICS-CERT Hospital IT Customers Business FDA New / Emerging Stakeholders “Ethical Hacking”
  • 15. 15 CYBERSECURITY ADVISORIES • Their mission is to improve the cybersecurity posture of 16 critical infrastructure sectors – which includes medical devices (Healthcare and Public Health) • ICS-CERT advisories are public disclosures of security vulnerabilities to critical infrastructure to inform on risks and mitigations
  • 16. CYBERSECURITY EXPECTATION POST-MARKET CYBER SECURITY PROGRAM INTENT • Evidence of an ongoing structured and systematic approach in risk management and quality management systems that entails: • Methods to analyze, detect, and assess threat sources, • Methods to identify, characterize, assess and mitigate or recover from a cybersecurity vulnerability. • Includes Design Expectations: Maintaining robust software lifecycle processes, • Using threat modeling for safety and essential performance & communication - excerpt from post market guidance page 13
  • 17. CYBERSECURITY ESSENTIALS Confidentiality • Prevent unauthorized disclosure Integrity • Prevent unauthorized modification Availability • Functions when needed Key Design Considerations: 1) Accessibility:  External Interfaces: analyze & protect  Communication Technology: key interface, remotely available 2) Authentication: validating with whom you are communicating 3) Encryption: protect data 4) Availability: how can this be constrained yet still meet System design needs? 5) Updates: security updates will be needed, ensure upgradability is built-in
  • 18. POST-MARKET CYBERSECURITY ELEMENTS OF AN EFFECTIVE POST-MARKET CYBERSECURITY RISK MANAGEMENT PROGRAM Post-market risk management program should contain steps to: 1. Identify, 2. Protect, 3. Detect, 4. Respond, 5. Recover. Maintain safety and essential performance- Evidence in: FMEA process, RM reports, Complaint SOPs. Identify cyber security signals, Vulnerability Characterization, Risk Analysis & Threat Modeling, Sources, and Impact Assessment Compensating Controls Assessment, Risk Mitigation and deploying mitigations that address cybersecurity risk early and prior to exploitation https://www.nist.gov/sites/default/files/documents/cyberframework/cybersecurity-framework-021214.pdf
  • 19. SECURITY RISK: MANAGE WITH PRODUCT RISKS Key compliance consideration where security risks feeds into the overall product risk analysis: - Patient Safety Documentation (Design) - Hazard / Harm Analysis - Safety / System Characterization - Use- Error Analysis - Complaint Reporting (coding) - Service and Repairs
  • 20. AUDIT CS QUICK CHECKLIST  Evidence of cybersecurity in risk management plan,  Threat or signal sources defined and monitored  Software lifecycle evaluation contains cybersecurity assessments  Evidence of Vulnerability Characterization and Assessment  Threat modeling; Patient harm,  Risk acceptance criteria.  Use of “Common Vulnerability Scoring System,” Version 3.0 (page13)  Post-Market Triage vulnerabilities for remediation  Post-Market Risk Analysis and Remediation
  • 21. KEY TAKEAWAYS 1. Risk is objective, Risk assessment process has to be definitive but Risk acceptability can be subjective 2. Risk Management is the systematic oversight of analyzing, evaluating, controlling and monitoring risk 3. Cybersecurity requires evidence of an ongoing structured and systematic approach in risk management and quality management systems that entails: methods to analyze, detect, assess and mitigate threat sources. 4. Cybersecurity is about protecting confidentiality, integrity and availability. 5. Key compliance consideration include patient safety, risk characterization, user error analysis and complaints and servicing.
  • 22. END. Increasingly, companies are turning to artificial intelligence for their products and services. AI Pic Credit: Inc
  • 24. DEFINITIONS PER ISO 14971 Important to ensure there is common understanding of terms and definitions 24
  • 25. MEDICAL DEVICE CYBERSECURITY -FDA GUIDANCE FIRST RELEASE • Pre-market oct, 2014 • Post-market dec,2016
  • 26. POST-MARKET PRE-MARKET NOT DISCUSSED This guidance applies to any marketed and distributed medical device (+“legacy devices”) including: 1) medical devices that contain software (including firmware) or programmable logic; 2) software that is a medical device, including mobile medical applications. 3) devices that are considered part of an interoperable system
  • 27. CYBERSECURITY – RM PROCESS ENHANCEMENTS • Threat Assessment • STRIDE Methodology • Attack-Tree Methodology • Vulnerability Assessment • CVSS • FDA-MITRE Healthcare Rubric • Risk Assessment • Security Risk Assessment • Safety Assessment • Management Oversight Vulnerability Threat Risk Management
  • 28. STRIDE STRIDE is a model of threats developed at Microsoft for identifying computer security threats. It provides a way to screen for security threats in six categories. • Spoofing of user identity • Tampering • Repudiation • Information disclosure (privacy breach or data leak) • Denial of service (D.o.S) • Elevation of privilege
  • 29. CVSS • The Common Vulnerability Scoring System (CVSS) is an open standard designed to convey vulnerability severity and help determine the urgency and priority of response. When vulnerabilities are discovered in medical devices, medical device manufacturers, typically working with the Department of Homeland Security (DHS) National Cybersecurity and Communications Integration Center (NCCIC), use CVSS to provide a consistent and standardized way to communicate the severity of a vulnerability between multiple parties, including the medical device manufacturer, hospitals, clinicians, patients, NCCIC, and vulnerability researchers. • CVSS and its associated rubric were developed for enterprise information technology systems and do not adequately reflect the clinical environment and potential patient safety impacts. To address this challenges, the MITRE Corporation, under contract to FDA, developed a rubric that provides guidance for how an analyst can utilize CVSS as part of a risk assessment for a medical device. • This rubric was developed by MITRE in collaboration with a working group of subject matter experts across the medical device ecosystem, including FDA, medical device manufacturers, healthcare delivery organizations, security experts, and safety/risk assessment experts.
  • 30. CYBERSECURTIY QMS AND RA AREAS Areas within QMS in addition to the risk management program: Quality System areas: 1. FCA (21 CFR 806) 2. Complaint handling (21 CFR 820.198, 803), 3. Quality audit (21 CFR 820.22), 4. Corrective and preventive action (21 CFR 820.100), 5. Software validation and risk analysis (21 CFR 820.30(g)) 6. Servicing (21 CFR 820.200). 7. Supplier quality Regulatory areas: 1. PMA Periodic reports (21 CFR 814.84)
  • 31. REFERENCED IN FDA CYBERSECURITY GUIDANCE  21 CFR Part 820 Quality Systems Regulations  820.30 Subpart C – Design Controls of the Quality System Regulation  806.10 – Reports of corrections and removals  807.81 (a)(3)  806.10(f)  820.100 Corrective action and preventative action  7.42 Recall Strategy for elements of a remediation plan  7 (b)(3) Effectiveness checks  814.39  814.84  820.30(g) • ANSI/AAMI ES60601-1:2005/(R)2012 and A1:2012, C1:2009/(R)2012 and A2:2010/(R)2012 (Consolidated Text) Medical electrical equipment— Part 1: General requirements for basic safety and essential performance (IEC 60601-1:2005, MOD), section 3.27 defines “Essential Performance” as performance of a clinical function, other than that related to basic safety, where loss or degradation beyond the limits specified by the manufacturer results in an unacceptable risk.” • ISO/IEC 30111:2013: Information Technology – Security Techniques – Vulnerability Handling Processes (recognized standard) • ISO/IEC 29147:2014: Information Technology – Security Techniques – Vulnerability Disclosure • AAMI TIR57: Principles for medical device security—Risk management • IEC/TR 80001-2-1:2012 Application of risk management for IT-networks incorporating medical devices
  • 32. Questions ? Keerthi Gunasekaran – Email: keerthi@mindwatts.com .

Editor's Notes

  1. What Why, not the how, a tleast not in a satisfactory detail
  2. Security Risk Analysis feeds into Hazard Analysis for risks with safety impact. Difference: security risk assessment also considers business and data (PHI) risks that may require mitigation Security Risk Analysis feeds security-related hazardous situations and associated likelihood ratings (p1 = probability of hazardous situation) into the Hazard Analysis for probability of patient harm determination. I am going to give an example of how this flow works from security risk analysis to hazard analysis as well as flowing to requirements identification.