SlideShare a Scribd company logo
1 of 24
Introduction to
Medical Device Security
Daniel Heppner
MEDICAL DEVICES
Medical Devices
“A medical device is an instrument, apparatus,
implement, machine, contrivance, implant, in vitro
reagent, or other similar or related article, including
a component part, or accessory which is intended
for use in the diagnosis of disease or other
conditions, or in the cure, mitigation, treatment, or
prevention of disease, in man or other animals.”
Source: https://www.fda.gov/aboutfda/transparency/basics/ucm211822.htm
Examples
• Implantable medical devices
– Pulse generator (pacemaker)
• In Vitro Diagnostics devices
– Blood coagulation analyzer
• Diagnostic Imaging systems
– Computed tomography
• …
• When is a device a medical device?
• Can medical devices be software-only?
Intended Use
• When is a device a medical device?
 Depends on the intended use!
• The intended use is not what the device is
designed to be used for or what the device
could be used for.
• It is just what’s on the label – what the device
is meant to be used for.
Software as a Medical Device (SaMD)
• Can medical devices be software-only?  YES!
• When is your app considered medical device software?
– When it meets the definition of a medical device.
– When it is used specifically for diagnostic and/or
therapeutic purposes.
– When it has a medical purpose.
• Depends on the intended use
– Example: menstrual cycle (period) tracking vs.
contraception (prevention of pregnancy)
DIRECTIVES, REGULATIONS,
STANDARDS
Directives and Regulations
• A regulation is a binding legislative act
• A directive is a legislative act that sets out a goal that must
be achieved somehow
– European Union
• Medical Devices Directive (MDD)
• In Vitro Diagnostics Directive (IVDD)
• In the healthcare industry everything is regulated by
governments, which is good and bad
• Different regulations apply in different countries
• Implement a set of standards to meet the regulatory
requirements
Standards
• The good thing about standards is that there
are so many of them :)
• IEC 62443 is one of the more important
cybersecurity standards for industrial IT
security
• FDA releases guidelines (recommendations,
not standards) to help implementing security
MEDICAL DEVICE CYBERSECURITY
Old World Meets the New World
• Increase in interconnectivity between medical
devices and other clinical systems
• Increasing concern that the connectivity of
these medical devices will directly affect
patient safety
Security Goals
• Confidentiality
– Protection of personal and sensitive data
– Patient data gets stolen and/or disclosed: Mostly financial impact or
loss of reputation for companies.
– High impact for the patients, for example: App for Hemophilia on an
App Store
• Such a patient costs about 15.000.000€ per year
• Company that owns the store platform has your health data and is allowed to
process all user data
• What happens if the fact that you suffer from that disease is disclosed?
– Example: What if your next employer already knows that you have
unusually high blood pressure and you may not be that resilient?
Security Goals
• Integrity
– Patient/personal data and measurement and
diagnosis results need to be protected from tampering
– Indirect safety risk: False results can lead to incorrect
treatment or wrong decisions
– Direct safety risk: Patients could be harmed by the
device (e.g. movement of mechanical components, X-
Ray overdose, malfunction of life-sustaining functions)
– Both direct and indirect safety risks could potentially
lead to patient harm or even death
Security Goals
• Availability
– ​Device is not accessible: results not available or no
measurement possible
– Device not working: Patient death if device is life-
sustaining
• Impact on Integrity and Availability can directly
lead to patient harm (Safety Risk)
• Confidentiality “only” impacts personal life
Priorities
1. Safety
2. Reliability
3. Usability
4. Security
• These priorities can not and will not change in the future.
• It is way more important that the device is safe than that it
is secure. It is acceptable to implement safety risk control
measures that decrease the overall level security, if the
newly introduced security risk is assessed.
• Most security vulnerabilities also introduce safety risks.
Risk Assessments
• How can we determine the actual risk of a vulnerability in a
medical device?
• Industry has been performing safety risk assessments for decades,
but the current methods do not work for security risks.
• Vulnerability scoring (e.g. CVSS) does not work well either, because
it leaves out potential safety risks. It also assigns C, I and A equal
scores, which is not correct.
• New hybrid methods have to be developed!
Common Vulnerabilities
Common Vulnerabilities
• ​Unpatched operating systems
• Firewall disabled
• Hardcoded credentials
• Weak default credentials
• Insecure user management
• Insecure protocols (FTP, VNC, …)
• Insecure WCF endpoints
• Software runs with high privileges
Legacy Systems
• How to deal with legacy systems that have been
in use for more than 20 years?
• Those devices are usually not upgradable to
modern software versions, because of
unsupported hardware.
• Hardware upgrades are expensive. Who pays for
that?
• Imagine IoT would have been around for about
20 years
Recent Events
• Vulnerabilities in Miele disinfection machines
– Vulnerabilities were reported but Miele apparently did not
know how to handle notifications, which resulted in full
disclosure. Now they are hiring security professionals :)
• Abbott Warning Letter
– First time ever the FDA published a warning letter complaining
about security vulnerabilities
• WannaCry Ransomware
– Kept medical device manufacturers (including myself) very busy
during the last weeks
Next Actions
• Medical device manufacturers must…
– understand that security risks are potential safety risks.
– integrate secure development activities into their
development processes.
– design security into the product.
– educate their engineers and service personnel.
– do security testing.
– review the security concept regularly.
– handle incidents and vulnerabilities.
– patch all the things!
How to Fix the Insecure World?
• Don’t teach people how to write code – teach
them how to write secure code
• Teach secure development practices in schools
and at universities
• Educate people by doing security awareness
trainings and campaigns
• Clean up the internetz from tutorials that
contain security vulnerabilities
References
• https://www.fda.gov/aboutfda/transparency/basics/ucm211822.htm
• http://www.mddionline.com/blog/devicetalk/why-you-must-know-difference-between-intended-
use-and-indications-use-04-25-17
• https://en.wikipedia.org/wiki/Medical_software
• https://www.whitecase.com/publications/article/mobile-health-apps-are-they-regulated-medical-
device
• https://en.wikipedia.org/wiki/Cyber_security_standards
• https://www.fda.gov/iceci/enforcementactions/warningletters/2017/ucm552687.htm
• https://www.wired.com/2017/03/medical-devices-next-security-nightmare/
• https://www.microsoft.com/en-us/SDL
• https://www.fda.gov/downloads/medicaldevices/deviceregulationandguidance/guidancedocument
s/ucm482022.pdf
• http://www.himss.org/file/1317711/download?token=pCH3RABX
• https://www.heise.de/newsticker/meldung/Miele-verspricht-Sicherheits-Update-fuer-
Desinfektionsautomaten-3669611.html

More Related Content

What's hot

Telemedicine software platform for hospitals & healthcare providers an ul...
Telemedicine software platform for hospitals & healthcare providers an ul...Telemedicine software platform for hospitals & healthcare providers an ul...
Telemedicine software platform for hospitals & healthcare providers an ul...AndrewSebastian17
 
Understanding Cybersecurity in Medical Devices and Applications
Understanding Cybersecurity in Medical Devices and ApplicationsUnderstanding Cybersecurity in Medical Devices and Applications
Understanding Cybersecurity in Medical Devices and ApplicationsEMMAIntl
 
Health care analytics
Health care analyticsHealth care analytics
Health care analyticsRohit Bisht
 
Killed by code - mobile medical devices
Killed by code - mobile medical devicesKilled by code - mobile medical devices
Killed by code - mobile medical devicesFlaskdata.io
 
Acus intel medical_devices
Acus intel medical_devicesAcus intel medical_devices
Acus intel medical_devicesatlanticcouncil
 
Internet of things & healthcare
Internet of things & healthcareInternet of things & healthcare
Internet of things & healthcarekhalidhassan105
 
Cybersécurité des dispositifs médicaux
Cybersécurité des dispositifs médicauxCybersécurité des dispositifs médicaux
Cybersécurité des dispositifs médicauxMarket iT
 
Patient Health Monitoring System using IOT
Patient Health Monitoring System using IOTPatient Health Monitoring System using IOT
Patient Health Monitoring System using IOTIRJET Journal
 
Medical device security_anirudh
Medical device security_anirudhMedical device security_anirudh
Medical device security_anirudhanirudh duggal
 
IoT Healthcare/Medical Devices Insights from Patents
IoT Healthcare/Medical Devices Insights from PatentsIoT Healthcare/Medical Devices Insights from Patents
IoT Healthcare/Medical Devices Insights from PatentsAlex G. Lee, Ph.D. Esq. CLP
 
Killed by code 2015
Killed by code 2015Killed by code 2015
Killed by code 2015Flaskdata.io
 
Security Requirements, Counterattacks and Projects in Healthcare Applications...
Security Requirements, Counterattacks and Projects in Healthcare Applications...Security Requirements, Counterattacks and Projects in Healthcare Applications...
Security Requirements, Counterattacks and Projects in Healthcare Applications...arpublication
 
IRJET- Hiding Sensitive Medical Data using Encryption
IRJET- Hiding Sensitive Medical Data using EncryptionIRJET- Hiding Sensitive Medical Data using Encryption
IRJET- Hiding Sensitive Medical Data using EncryptionIRJET Journal
 
IoT as enabler(future) of Smart Hospital Technology
IoT as enabler(future) of Smart Hospital TechnologyIoT as enabler(future) of Smart Hospital Technology
IoT as enabler(future) of Smart Hospital TechnologyVolodymyr Nazarenko
 
Avaali-IOT HealthCare Applications
Avaali-IOT HealthCare ApplicationsAvaali-IOT HealthCare Applications
Avaali-IOT HealthCare ApplicationsAvaali Solutions
 

What's hot (20)

The Harsh Reality of Slow Movers
The Harsh Reality of Slow MoversThe Harsh Reality of Slow Movers
The Harsh Reality of Slow Movers
 
Medical applications using io t
Medical applications using io tMedical applications using io t
Medical applications using io t
 
Telemedicine software platform for hospitals & healthcare providers an ul...
Telemedicine software platform for hospitals & healthcare providers an ul...Telemedicine software platform for hospitals & healthcare providers an ul...
Telemedicine software platform for hospitals & healthcare providers an ul...
 
Understanding Cybersecurity in Medical Devices and Applications
Understanding Cybersecurity in Medical Devices and ApplicationsUnderstanding Cybersecurity in Medical Devices and Applications
Understanding Cybersecurity in Medical Devices and Applications
 
Health care analytics
Health care analyticsHealth care analytics
Health care analytics
 
Killed by code - mobile medical devices
Killed by code - mobile medical devicesKilled by code - mobile medical devices
Killed by code - mobile medical devices
 
Acus intel medical_devices
Acus intel medical_devicesAcus intel medical_devices
Acus intel medical_devices
 
Internet of things & healthcare
Internet of things & healthcareInternet of things & healthcare
Internet of things & healthcare
 
Cybersécurité des dispositifs médicaux
Cybersécurité des dispositifs médicauxCybersécurité des dispositifs médicaux
Cybersécurité des dispositifs médicaux
 
Patient Health Monitoring System using IOT
Patient Health Monitoring System using IOTPatient Health Monitoring System using IOT
Patient Health Monitoring System using IOT
 
Medical device security_anirudh
Medical device security_anirudhMedical device security_anirudh
Medical device security_anirudh
 
IoT in Healthcare
IoT in HealthcareIoT in Healthcare
IoT in Healthcare
 
IoT Healthcare/Medical Devices Insights from Patents
IoT Healthcare/Medical Devices Insights from PatentsIoT Healthcare/Medical Devices Insights from Patents
IoT Healthcare/Medical Devices Insights from Patents
 
Killed by code 2015
Killed by code 2015Killed by code 2015
Killed by code 2015
 
Security Requirements, Counterattacks and Projects in Healthcare Applications...
Security Requirements, Counterattacks and Projects in Healthcare Applications...Security Requirements, Counterattacks and Projects in Healthcare Applications...
Security Requirements, Counterattacks and Projects in Healthcare Applications...
 
Philips Implementing Wireless in the Hospital Enterprise: Medical Device Cons...
Philips Implementing Wireless in the Hospital Enterprise: Medical Device Cons...Philips Implementing Wireless in the Hospital Enterprise: Medical Device Cons...
Philips Implementing Wireless in the Hospital Enterprise: Medical Device Cons...
 
IRJET- Hiding Sensitive Medical Data using Encryption
IRJET- Hiding Sensitive Medical Data using EncryptionIRJET- Hiding Sensitive Medical Data using Encryption
IRJET- Hiding Sensitive Medical Data using Encryption
 
IoT as enabler(future) of Smart Hospital Technology
IoT as enabler(future) of Smart Hospital TechnologyIoT as enabler(future) of Smart Hospital Technology
IoT as enabler(future) of Smart Hospital Technology
 
Avaali-IOT HealthCare Applications
Avaali-IOT HealthCare ApplicationsAvaali-IOT HealthCare Applications
Avaali-IOT HealthCare Applications
 
E0512535
E0512535E0512535
E0512535
 

Similar to [Wroclaw #6] Medical device security

Cybersecurity in medical devices
Cybersecurity in medical devicesCybersecurity in medical devices
Cybersecurity in medical devicesSafisSolutions
 
Cybersecurity in medical devices
Cybersecurity in medical devicesCybersecurity in medical devices
Cybersecurity in medical devicesSafisSolutions
 
Breakout Session: Cybersecurity in Medical Devices
Breakout Session: Cybersecurity in Medical DevicesBreakout Session: Cybersecurity in Medical Devices
Breakout Session: Cybersecurity in Medical DevicesHealthegy
 
How to Secure Your Medical Devices
How to Secure Your Medical DevicesHow to Secure Your Medical Devices
How to Secure Your Medical DevicesSecurityMetrics
 
Medical Product Development cycle
Medical Product Development cycleMedical Product Development cycle
Medical Product Development cyclemax hanafi
 
Health apps regulation and quality control case studies and session 2 present...
Health apps regulation and quality control case studies and session 2 present...Health apps regulation and quality control case studies and session 2 present...
Health apps regulation and quality control case studies and session 2 present...3GDR
 
Health apps regulation and quality control case studies and session 2 present...
Health apps regulation and quality control case studies and session 2 present...Health apps regulation and quality control case studies and session 2 present...
Health apps regulation and quality control case studies and session 2 present...3GDR
 
medical devices for the safety standards and codes
medical devices for the safety standards and codesmedical devices for the safety standards and codes
medical devices for the safety standards and codesRGCE
 
Regulation of software as medical devices
Regulation of software as medical devicesRegulation of software as medical devices
Regulation of software as medical devicesTGA Australia
 
The regulation of software: Medicines, biologicals, blood, tissues and devices
The regulation of software: Medicines, biologicals, blood, tissues and devicesThe regulation of software: Medicines, biologicals, blood, tissues and devices
The regulation of software: Medicines, biologicals, blood, tissues and devicesTGA Australia
 
MHRA - 18th March 2014
MHRA - 18th March 2014MHRA - 18th March 2014
MHRA - 18th March 2014Anthony A Hill
 
Presentation: Increasing post-market vigilance requirements for medical devices
Presentation: Increasing post-market vigilance requirements for medical devicesPresentation: Increasing post-market vigilance requirements for medical devices
Presentation: Increasing post-market vigilance requirements for medical devicesTGA Australia
 
Embedded systems in biomedical applications
Embedded systems in biomedical applicationsEmbedded systems in biomedical applications
Embedded systems in biomedical applicationsSeminar Links
 
Usability Validation Testing of Medical Devices and Software
Usability Validation Testing of Medical Devices and SoftwareUsability Validation Testing of Medical Devices and Software
Usability Validation Testing of Medical Devices and SoftwareUXPA Boston
 
Data Breaches and Security: Ditching Data Disasters-Michael McNeil, Philips H...
Data Breaches and Security: Ditching Data Disasters-Michael McNeil, Philips H...Data Breaches and Security: Ditching Data Disasters-Michael McNeil, Philips H...
Data Breaches and Security: Ditching Data Disasters-Michael McNeil, Philips H...IT Network marcus evans
 
Killed by code 2015
Killed by code 2015Killed by code 2015
Killed by code 2015Flaskdata.io
 
Medical device design guidlines
Medical device design guidlinesMedical device design guidlines
Medical device design guidlinesSuhas R
 
How to Secure Medical Devices presentation.pptx
How to Secure Medical Devices presentation.pptxHow to Secure Medical Devices presentation.pptx
How to Secure Medical Devices presentation.pptxShandevinda
 
HXR 2017: Bakul Patel: How the FDA Is Promoting Innovation and Protecting the...
HXR 2017: Bakul Patel: How the FDA Is Promoting Innovation and Protecting the...HXR 2017: Bakul Patel: How the FDA Is Promoting Innovation and Protecting the...
HXR 2017: Bakul Patel: How the FDA Is Promoting Innovation and Protecting the...HxRefactored
 

Similar to [Wroclaw #6] Medical device security (20)

Cybersecurity in medical devices
Cybersecurity in medical devicesCybersecurity in medical devices
Cybersecurity in medical devices
 
Cybersecurity in medical devices
Cybersecurity in medical devicesCybersecurity in medical devices
Cybersecurity in medical devices
 
Breakout Session: Cybersecurity in Medical Devices
Breakout Session: Cybersecurity in Medical DevicesBreakout Session: Cybersecurity in Medical Devices
Breakout Session: Cybersecurity in Medical Devices
 
How to Secure Your Medical Devices
How to Secure Your Medical DevicesHow to Secure Your Medical Devices
How to Secure Your Medical Devices
 
Medical Product Development cycle
Medical Product Development cycleMedical Product Development cycle
Medical Product Development cycle
 
Health apps regulation and quality control case studies and session 2 present...
Health apps regulation and quality control case studies and session 2 present...Health apps regulation and quality control case studies and session 2 present...
Health apps regulation and quality control case studies and session 2 present...
 
Health apps regulation and quality control case studies and session 2 present...
Health apps regulation and quality control case studies and session 2 present...Health apps regulation and quality control case studies and session 2 present...
Health apps regulation and quality control case studies and session 2 present...
 
medical devices for the safety standards and codes
medical devices for the safety standards and codesmedical devices for the safety standards and codes
medical devices for the safety standards and codes
 
Regulation of software as medical devices
Regulation of software as medical devicesRegulation of software as medical devices
Regulation of software as medical devices
 
Cybersecurity in Medical Devices
Cybersecurity in Medical DevicesCybersecurity in Medical Devices
Cybersecurity in Medical Devices
 
The regulation of software: Medicines, biologicals, blood, tissues and devices
The regulation of software: Medicines, biologicals, blood, tissues and devicesThe regulation of software: Medicines, biologicals, blood, tissues and devices
The regulation of software: Medicines, biologicals, blood, tissues and devices
 
MHRA - 18th March 2014
MHRA - 18th March 2014MHRA - 18th March 2014
MHRA - 18th March 2014
 
Presentation: Increasing post-market vigilance requirements for medical devices
Presentation: Increasing post-market vigilance requirements for medical devicesPresentation: Increasing post-market vigilance requirements for medical devices
Presentation: Increasing post-market vigilance requirements for medical devices
 
Embedded systems in biomedical applications
Embedded systems in biomedical applicationsEmbedded systems in biomedical applications
Embedded systems in biomedical applications
 
Usability Validation Testing of Medical Devices and Software
Usability Validation Testing of Medical Devices and SoftwareUsability Validation Testing of Medical Devices and Software
Usability Validation Testing of Medical Devices and Software
 
Data Breaches and Security: Ditching Data Disasters-Michael McNeil, Philips H...
Data Breaches and Security: Ditching Data Disasters-Michael McNeil, Philips H...Data Breaches and Security: Ditching Data Disasters-Michael McNeil, Philips H...
Data Breaches and Security: Ditching Data Disasters-Michael McNeil, Philips H...
 
Killed by code 2015
Killed by code 2015Killed by code 2015
Killed by code 2015
 
Medical device design guidlines
Medical device design guidlinesMedical device design guidlines
Medical device design guidlines
 
How to Secure Medical Devices presentation.pptx
How to Secure Medical Devices presentation.pptxHow to Secure Medical Devices presentation.pptx
How to Secure Medical Devices presentation.pptx
 
HXR 2017: Bakul Patel: How the FDA Is Promoting Innovation and Protecting the...
HXR 2017: Bakul Patel: How the FDA Is Promoting Innovation and Protecting the...HXR 2017: Bakul Patel: How the FDA Is Promoting Innovation and Protecting the...
HXR 2017: Bakul Patel: How the FDA Is Promoting Innovation and Protecting the...
 

More from OWASP

[OPD 2019] Web Apps vs Blockchain dApps
[OPD 2019] Web Apps vs Blockchain dApps[OPD 2019] Web Apps vs Blockchain dApps
[OPD 2019] Web Apps vs Blockchain dAppsOWASP
 
[OPD 2019] Threat modeling at scale
[OPD 2019] Threat modeling at scale[OPD 2019] Threat modeling at scale
[OPD 2019] Threat modeling at scaleOWASP
 
[OPD 2019] Life after pentest
[OPD 2019] Life after pentest[OPD 2019] Life after pentest
[OPD 2019] Life after pentestOWASP
 
[OPD 2019] .NET Core Security
[OPD 2019] .NET Core Security[OPD 2019] .NET Core Security
[OPD 2019] .NET Core SecurityOWASP
 
[OPD 2019] Top 10 Security Facts of 2020
[OPD 2019] Top 10 Security Facts of 2020[OPD 2019] Top 10 Security Facts of 2020
[OPD 2019] Top 10 Security Facts of 2020OWASP
 
[OPD 2019] Governance as a missing part of IT security architecture
[OPD 2019] Governance as a missing part of IT security architecture[OPD 2019] Governance as a missing part of IT security architecture
[OPD 2019] Governance as a missing part of IT security architectureOWASP
 
[OPD 2019] Storm Busters: Auditing & Securing AWS Infrastructure
[OPD 2019] Storm Busters: Auditing & Securing AWS Infrastructure[OPD 2019] Storm Busters: Auditing & Securing AWS Infrastructure
[OPD 2019] Storm Busters: Auditing & Securing AWS InfrastructureOWASP
 
[OPD 2019] Side-Channels on the Web:
Attacks and Defenses
[OPD 2019] Side-Channels on the Web:
Attacks and Defenses[OPD 2019] Side-Channels on the Web:
Attacks and Defenses
[OPD 2019] Side-Channels on the Web:
Attacks and DefensesOWASP
 
[OPD 2019] AST Platform and the importance of multi-layered application secu...
[OPD 2019]  AST Platform and the importance of multi-layered application secu...[OPD 2019]  AST Platform and the importance of multi-layered application secu...
[OPD 2019] AST Platform and the importance of multi-layered application secu...OWASP
 
[OPD 2019] Inter-application vulnerabilities
[OPD 2019] Inter-application vulnerabilities[OPD 2019] Inter-application vulnerabilities
[OPD 2019] Inter-application vulnerabilitiesOWASP
 
[OPD 2019] Automated Defense with Serverless computing
[OPD 2019] Automated Defense with Serverless computing[OPD 2019] Automated Defense with Serverless computing
[OPD 2019] Automated Defense with Serverless computingOWASP
 
[OPD 2019] Advanced Data Analysis in RegSOC
[OPD 2019] Advanced Data Analysis in RegSOC[OPD 2019] Advanced Data Analysis in RegSOC
[OPD 2019] Advanced Data Analysis in RegSOCOWASP
 
[OPD 2019] Attacking JWT tokens
[OPD 2019] Attacking JWT tokens[OPD 2019] Attacking JWT tokens
[OPD 2019] Attacking JWT tokensOWASP
 
[OPD 2019] Rumpkernels meet fuzzing
[OPD 2019] Rumpkernels meet fuzzing[OPD 2019] Rumpkernels meet fuzzing
[OPD 2019] Rumpkernels meet fuzzingOWASP
 
[OPD 2019] Trusted types and the end of DOM XSS
[OPD 2019] Trusted types and the end of DOM XSS[OPD 2019] Trusted types and the end of DOM XSS
[OPD 2019] Trusted types and the end of DOM XSSOWASP
 
[Wroclaw #9] The purge - dealing with secrets in Opera Software
[Wroclaw #9] The purge - dealing with secrets in Opera Software[Wroclaw #9] The purge - dealing with secrets in Opera Software
[Wroclaw #9] The purge - dealing with secrets in Opera SoftwareOWASP
 
[Wroclaw #9] To be or Not To Be - Threat Modeling in Security World
[Wroclaw #9] To be or Not To Be - Threat Modeling in Security World[Wroclaw #9] To be or Not To Be - Threat Modeling in Security World
[Wroclaw #9] To be or Not To Be - Threat Modeling in Security WorldOWASP
 
OWASP Poland 13 November 2018 - Martin Knobloch - Building Secure Software
OWASP Poland 13 November 2018 - Martin Knobloch - Building Secure SoftwareOWASP Poland 13 November 2018 - Martin Knobloch - Building Secure Software
OWASP Poland 13 November 2018 - Martin Knobloch - Building Secure SoftwareOWASP
 
OWASP Poland Day 2018 - Amir Shladovsky - Crypto-mining
OWASP Poland Day 2018 - Amir Shladovsky - Crypto-miningOWASP Poland Day 2018 - Amir Shladovsky - Crypto-mining
OWASP Poland Day 2018 - Amir Shladovsky - Crypto-miningOWASP
 
OWASP Poland Day 2018 - Damian Rusinek - Outsmarting smart contracts
OWASP Poland Day 2018 - Damian Rusinek - Outsmarting smart contractsOWASP Poland Day 2018 - Damian Rusinek - Outsmarting smart contracts
OWASP Poland Day 2018 - Damian Rusinek - Outsmarting smart contractsOWASP
 

More from OWASP (20)

[OPD 2019] Web Apps vs Blockchain dApps
[OPD 2019] Web Apps vs Blockchain dApps[OPD 2019] Web Apps vs Blockchain dApps
[OPD 2019] Web Apps vs Blockchain dApps
 
[OPD 2019] Threat modeling at scale
[OPD 2019] Threat modeling at scale[OPD 2019] Threat modeling at scale
[OPD 2019] Threat modeling at scale
 
[OPD 2019] Life after pentest
[OPD 2019] Life after pentest[OPD 2019] Life after pentest
[OPD 2019] Life after pentest
 
[OPD 2019] .NET Core Security
[OPD 2019] .NET Core Security[OPD 2019] .NET Core Security
[OPD 2019] .NET Core Security
 
[OPD 2019] Top 10 Security Facts of 2020
[OPD 2019] Top 10 Security Facts of 2020[OPD 2019] Top 10 Security Facts of 2020
[OPD 2019] Top 10 Security Facts of 2020
 
[OPD 2019] Governance as a missing part of IT security architecture
[OPD 2019] Governance as a missing part of IT security architecture[OPD 2019] Governance as a missing part of IT security architecture
[OPD 2019] Governance as a missing part of IT security architecture
 
[OPD 2019] Storm Busters: Auditing & Securing AWS Infrastructure
[OPD 2019] Storm Busters: Auditing & Securing AWS Infrastructure[OPD 2019] Storm Busters: Auditing & Securing AWS Infrastructure
[OPD 2019] Storm Busters: Auditing & Securing AWS Infrastructure
 
[OPD 2019] Side-Channels on the Web:
Attacks and Defenses
[OPD 2019] Side-Channels on the Web:
Attacks and Defenses[OPD 2019] Side-Channels on the Web:
Attacks and Defenses
[OPD 2019] Side-Channels on the Web:
Attacks and Defenses
 
[OPD 2019] AST Platform and the importance of multi-layered application secu...
[OPD 2019]  AST Platform and the importance of multi-layered application secu...[OPD 2019]  AST Platform and the importance of multi-layered application secu...
[OPD 2019] AST Platform and the importance of multi-layered application secu...
 
[OPD 2019] Inter-application vulnerabilities
[OPD 2019] Inter-application vulnerabilities[OPD 2019] Inter-application vulnerabilities
[OPD 2019] Inter-application vulnerabilities
 
[OPD 2019] Automated Defense with Serverless computing
[OPD 2019] Automated Defense with Serverless computing[OPD 2019] Automated Defense with Serverless computing
[OPD 2019] Automated Defense with Serverless computing
 
[OPD 2019] Advanced Data Analysis in RegSOC
[OPD 2019] Advanced Data Analysis in RegSOC[OPD 2019] Advanced Data Analysis in RegSOC
[OPD 2019] Advanced Data Analysis in RegSOC
 
[OPD 2019] Attacking JWT tokens
[OPD 2019] Attacking JWT tokens[OPD 2019] Attacking JWT tokens
[OPD 2019] Attacking JWT tokens
 
[OPD 2019] Rumpkernels meet fuzzing
[OPD 2019] Rumpkernels meet fuzzing[OPD 2019] Rumpkernels meet fuzzing
[OPD 2019] Rumpkernels meet fuzzing
 
[OPD 2019] Trusted types and the end of DOM XSS
[OPD 2019] Trusted types and the end of DOM XSS[OPD 2019] Trusted types and the end of DOM XSS
[OPD 2019] Trusted types and the end of DOM XSS
 
[Wroclaw #9] The purge - dealing with secrets in Opera Software
[Wroclaw #9] The purge - dealing with secrets in Opera Software[Wroclaw #9] The purge - dealing with secrets in Opera Software
[Wroclaw #9] The purge - dealing with secrets in Opera Software
 
[Wroclaw #9] To be or Not To Be - Threat Modeling in Security World
[Wroclaw #9] To be or Not To Be - Threat Modeling in Security World[Wroclaw #9] To be or Not To Be - Threat Modeling in Security World
[Wroclaw #9] To be or Not To Be - Threat Modeling in Security World
 
OWASP Poland 13 November 2018 - Martin Knobloch - Building Secure Software
OWASP Poland 13 November 2018 - Martin Knobloch - Building Secure SoftwareOWASP Poland 13 November 2018 - Martin Knobloch - Building Secure Software
OWASP Poland 13 November 2018 - Martin Knobloch - Building Secure Software
 
OWASP Poland Day 2018 - Amir Shladovsky - Crypto-mining
OWASP Poland Day 2018 - Amir Shladovsky - Crypto-miningOWASP Poland Day 2018 - Amir Shladovsky - Crypto-mining
OWASP Poland Day 2018 - Amir Shladovsky - Crypto-mining
 
OWASP Poland Day 2018 - Damian Rusinek - Outsmarting smart contracts
OWASP Poland Day 2018 - Damian Rusinek - Outsmarting smart contractsOWASP Poland Day 2018 - Damian Rusinek - Outsmarting smart contracts
OWASP Poland Day 2018 - Damian Rusinek - Outsmarting smart contracts
 

Recently uploaded

Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Deliverybabeytanya
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一Fs
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN ☁
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一Fs
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Roomgirls4nights
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...aditipandeya
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一3sw2qly1
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITMgdsc13
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Roomishabajaj13
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts servicevipmodelshub1
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...akbard9823
 

Recently uploaded (20)

Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girls
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
 
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in  Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Jamuna Vihar Delhi reach out to us at 🔝9953056974🔝
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
 
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICECall Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
 
Git and Github workshop GDSC MLRITM
Git and Github  workshop GDSC MLRITMGit and Github  workshop GDSC MLRITM
Git and Github workshop GDSC MLRITM
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
 
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
 

[Wroclaw #6] Medical device security

  • 1. Introduction to Medical Device Security Daniel Heppner
  • 3. Medical Devices “A medical device is an instrument, apparatus, implement, machine, contrivance, implant, in vitro reagent, or other similar or related article, including a component part, or accessory which is intended for use in the diagnosis of disease or other conditions, or in the cure, mitigation, treatment, or prevention of disease, in man or other animals.” Source: https://www.fda.gov/aboutfda/transparency/basics/ucm211822.htm
  • 4. Examples • Implantable medical devices – Pulse generator (pacemaker) • In Vitro Diagnostics devices – Blood coagulation analyzer • Diagnostic Imaging systems – Computed tomography • … • When is a device a medical device? • Can medical devices be software-only?
  • 5. Intended Use • When is a device a medical device?  Depends on the intended use! • The intended use is not what the device is designed to be used for or what the device could be used for. • It is just what’s on the label – what the device is meant to be used for.
  • 6. Software as a Medical Device (SaMD) • Can medical devices be software-only?  YES! • When is your app considered medical device software? – When it meets the definition of a medical device. – When it is used specifically for diagnostic and/or therapeutic purposes. – When it has a medical purpose. • Depends on the intended use – Example: menstrual cycle (period) tracking vs. contraception (prevention of pregnancy)
  • 8. Directives and Regulations • A regulation is a binding legislative act • A directive is a legislative act that sets out a goal that must be achieved somehow – European Union • Medical Devices Directive (MDD) • In Vitro Diagnostics Directive (IVDD) • In the healthcare industry everything is regulated by governments, which is good and bad • Different regulations apply in different countries • Implement a set of standards to meet the regulatory requirements
  • 9. Standards • The good thing about standards is that there are so many of them :) • IEC 62443 is one of the more important cybersecurity standards for industrial IT security • FDA releases guidelines (recommendations, not standards) to help implementing security
  • 11.
  • 12. Old World Meets the New World • Increase in interconnectivity between medical devices and other clinical systems • Increasing concern that the connectivity of these medical devices will directly affect patient safety
  • 13. Security Goals • Confidentiality – Protection of personal and sensitive data – Patient data gets stolen and/or disclosed: Mostly financial impact or loss of reputation for companies. – High impact for the patients, for example: App for Hemophilia on an App Store • Such a patient costs about 15.000.000€ per year • Company that owns the store platform has your health data and is allowed to process all user data • What happens if the fact that you suffer from that disease is disclosed? – Example: What if your next employer already knows that you have unusually high blood pressure and you may not be that resilient?
  • 14. Security Goals • Integrity – Patient/personal data and measurement and diagnosis results need to be protected from tampering – Indirect safety risk: False results can lead to incorrect treatment or wrong decisions – Direct safety risk: Patients could be harmed by the device (e.g. movement of mechanical components, X- Ray overdose, malfunction of life-sustaining functions) – Both direct and indirect safety risks could potentially lead to patient harm or even death
  • 15. Security Goals • Availability – ​Device is not accessible: results not available or no measurement possible – Device not working: Patient death if device is life- sustaining • Impact on Integrity and Availability can directly lead to patient harm (Safety Risk) • Confidentiality “only” impacts personal life
  • 16. Priorities 1. Safety 2. Reliability 3. Usability 4. Security • These priorities can not and will not change in the future. • It is way more important that the device is safe than that it is secure. It is acceptable to implement safety risk control measures that decrease the overall level security, if the newly introduced security risk is assessed. • Most security vulnerabilities also introduce safety risks.
  • 17. Risk Assessments • How can we determine the actual risk of a vulnerability in a medical device? • Industry has been performing safety risk assessments for decades, but the current methods do not work for security risks. • Vulnerability scoring (e.g. CVSS) does not work well either, because it leaves out potential safety risks. It also assigns C, I and A equal scores, which is not correct. • New hybrid methods have to be developed!
  • 19. Common Vulnerabilities • ​Unpatched operating systems • Firewall disabled • Hardcoded credentials • Weak default credentials • Insecure user management • Insecure protocols (FTP, VNC, …) • Insecure WCF endpoints • Software runs with high privileges
  • 20. Legacy Systems • How to deal with legacy systems that have been in use for more than 20 years? • Those devices are usually not upgradable to modern software versions, because of unsupported hardware. • Hardware upgrades are expensive. Who pays for that? • Imagine IoT would have been around for about 20 years
  • 21. Recent Events • Vulnerabilities in Miele disinfection machines – Vulnerabilities were reported but Miele apparently did not know how to handle notifications, which resulted in full disclosure. Now they are hiring security professionals :) • Abbott Warning Letter – First time ever the FDA published a warning letter complaining about security vulnerabilities • WannaCry Ransomware – Kept medical device manufacturers (including myself) very busy during the last weeks
  • 22. Next Actions • Medical device manufacturers must… – understand that security risks are potential safety risks. – integrate secure development activities into their development processes. – design security into the product. – educate their engineers and service personnel. – do security testing. – review the security concept regularly. – handle incidents and vulnerabilities. – patch all the things!
  • 23. How to Fix the Insecure World? • Don’t teach people how to write code – teach them how to write secure code • Teach secure development practices in schools and at universities • Educate people by doing security awareness trainings and campaigns • Clean up the internetz from tutorials that contain security vulnerabilities
  • 24. References • https://www.fda.gov/aboutfda/transparency/basics/ucm211822.htm • http://www.mddionline.com/blog/devicetalk/why-you-must-know-difference-between-intended- use-and-indications-use-04-25-17 • https://en.wikipedia.org/wiki/Medical_software • https://www.whitecase.com/publications/article/mobile-health-apps-are-they-regulated-medical- device • https://en.wikipedia.org/wiki/Cyber_security_standards • https://www.fda.gov/iceci/enforcementactions/warningletters/2017/ucm552687.htm • https://www.wired.com/2017/03/medical-devices-next-security-nightmare/ • https://www.microsoft.com/en-us/SDL • https://www.fda.gov/downloads/medicaldevices/deviceregulationandguidance/guidancedocument s/ucm482022.pdf • http://www.himss.org/file/1317711/download?token=pCH3RABX • https://www.heise.de/newsticker/meldung/Miele-verspricht-Sicherheits-Update-fuer- Desinfektionsautomaten-3669611.html

Editor's Notes

  1. http://www.bbc.com/news/technology-40042584 Pacemakers, insulin pumps and other devices in hospitals harbour security problems that leave them vulnerable to attack, two separate studies warn. One study solely on pacemakers found more than 8,000 known vulnerabilities in code inside the cardiac devices. The other study of the broader device market found only 17% of manufacturers had taken steps to secure gadgets. The reports come soon after more than 60 health organisations in the UK fell victim to a cyber-attack. Bugs in code, lack of knowledge about how to write secure code and time pressures made many devices vulnerable to attack, suggested the study.
  2. ​Environment 20 years ago: no network, just serial connections (still the case in many labs) The old protocols are still used. Just the communication medium has changed. Who needs checksums on the application layer when TCP is used?
  3. Security requirements often contradict with Safety, Reliability, and Usability Requirements Security vs. Reliability Anti-Malware: Is AV on a medical device a good idea? What if pattern updates have an impact on the reliability? What if the AV software blocks essential system functions? Security vs. Usability Passwords are bad, because nobody can remember secure 16 character passwords Fingerprint reader -> gloves Iris scanner -> glasses Tap'n'go Security vs. Safety How secure can you make a Medical Device? Locked device after 3x wrong password kills patients Should respiratory equipment go to sleep after 30 minutes? Do we really need that feature?? (e.g. Remote Upgrade of Cardiac implants) 100% security not reachable Safety is more important, but Security risk -> safety risk Abbott warning letter Hardcoded credential
  4. A device manufacturer receives a user complaint that a gas blood analyzer has been infected with malware and there was concern that the malware may alter the data on the device. The outcome of a manufacturer investigation and impact assessment confirms the presence of malware and finds that the malware does not result in the manipulation of unencrypted data stored and flowing through the device. The device’s safety and essential performance is not impacted by the malware and the manufacturer’s risk assessment determines that the risk of patient harm due to the vulnerability is controlled. The device manufacturer communicates to users on how to remove the malware and decides to develop a defense-in-depth strategy; these changes would be considered a cybersecurity routine update and patch, a type of device enhancement.
  5. Awareness is key. In a connected world, attacks are much more likely than ever before. Microsoft Security Development Lifecycle is a good start. It fits in most existing development processes and introduces only minor changes. Security must be designed into products. It can’t be added on top of a finished product. Education is the essential part. Engineers and developers need to know how to build secure products. It is not sufficient to have a security expert who does the security testing. A standard set of security requirements that all products must meet is very important. Specific requirements can be added per product type or per product. These requirements must be verified in security testing activities. On the source level Code Reviews and Static Code Analysis is the minimum. Fuzzing and penetration testing should also be part of the testing activities. There are new attacks and vulnerabilities every day. Products that have already been commercialized have to be assessed for new risks regularly. Provide a central contact for incident and vulnerability notifications. Respond to and handle those notifications in a timely manner. Finally, patch or provide patches for your products. This is not easy because every change to a product has to be verified and validated. Lots of documentation is required to do changes to already registered and released products.
  6. People are taught to code like 1970 in the first place and then after years someone tells them how to do it right Use of unsafe functions Blindly trust the user Use of unsanitized user input in SQL queries or system calls