SlideShare a Scribd company logo
Cybersecurity and Software
Updates in Medical Devices
Justin Noel, ICS
Daniel Lang, Toradex
1
January 25, 2023
About ICS
Established in 1987, Integrated Computer
Solutions, Inc. (ICS) delivers innovative software
solutions with a full suite of services to accelerate
development of successful next-gen products.
ICS is headquartered outside Boston in Waltham,
Mass. with offices in California, Canada and
Europe. Currently 160 people.
Boston UX is ICS’ design studio, specializing in
intuitive touchscreen and multimodal interfaces
for high-impact embedded and connected
devices.
2
www.ics.com
Delivering a
Full Suite of
Medtech
Services
3
● Human Factors Engineering
● IEC 62366-UX/UI Design
● Custom Frontend and Backend Software
Development
● Development with IEC 62304-Compliant Platform
● Low-code Tools that Convert UX Prototype to
Product
● Medical Device Cybersecurity
● AWS and Azure Cloud Services and Analytics
● ISO 14971-Compliant Hazard Analysis
● Software Verification Testing
● Complimentary Software Technology Assessment
Toradex - What We Do
Make Embedded Computing Easy
Reliable Arm System-on-Modules
Torizon - Linux IoT Platform
Lowest Cost of Ownership
Industry-leading Support
4
Focus Verticals
• Industrial Automation
• Healthcare
• Transportation
• Test & Measurement
• Smart City
Typical Annual Volumes
100 to 50k Pcs Per Customer Project
Typical Applications
5
Toradex - Numbers
FOUNDED
2003
ACTIVE CUSTOMERS
3000+
EMPLOYEES
150+ 8
GLOBAL OFFICES
70+
PROVEN PARTNERS
6
Toradex Survey 2020
7
Toradex Survey 2020
8
PSA Certified 2022 Security Report
9
Global Trend In New Regulations
10
Europa Télécommunications Standards Institute (ETSI) EN 303 645
California State Law SB-327
Oregon IoT Law (House Bill 2395)
NIST 8259A
ISO/SAE 21434 – THE CYBERSECURITY STANDARD
IEC 62443
CYBERSECURITY MATURITY MODEL CERTIFICATION CMMC 2.0 – DoD
White House - Executive Order on Improving the Nation’s Cybersecurity
Many More………..
Global Trend In New Regulations
11
Global Trend In New Regulations
12
Some Common Requirements
• No Default Passwords
• Way to Timely Patch Vulnerability
• Log Access
• Software Bill of Material
Poll - How do you do Software Updates
13
• Remote Updates Regular
• Remote Updates When Needed
• Offline Updates Regular
• Offline Updates When Needed
• No Updates ?
Example: Electric Vehicles Charger
14
Example: Medical Devices for Hospitals
15
Poll - What drives your Security Requirements ?
16
• Company Policy / Best Practices
• Customers
• Government Regulations
• Other Regulations / Standards
• None of the above ?
• Example is a Swiss Company
• Medical Devices traditionally
avoided changes to SW or HW
• The Situation is changing
• Devices are connected
› Example: Control Centers in
Hospitals or even for Home
Care with Remote Monitoring
RWJBarnabas Health Community Medical Center
Example: Medical Devices for Hospitals
17
IT security requirements for third - party systems
Example: Medical Devices for Hospitals
18
Example: Medical Devices for Hospitals
19
Example: Medical Devices for Hospitals
20
Recent FDA Guidance Regarding Software Updates
Cybersecurity in Medical Devices (Latest Draft April 2022)
https://www.fda.gov/media/119933/download
FDA Guidance is a slow process, but PATCH Act 2022 may make this US law.
When to Submit a 510(k) for a Software Change to an Existing Device (2017)
https://www.fda.gov/media/99785/download
Clarification of 510(k) re-submission criteria
21
Reasons For New Guidance and Clarifications
Once upon a time system level updates for medical devices were rare
COTS processes and re-validation for OS/Library updates were burdensome
Resulted in base libraries and OS’s sometimes not being updated at all
Wait until next major device revision (next 510(k) submission)
Security issues were mitigated by air gapping and physical access
In a connected world, air gaps are no longer possible
Results were a cybersecurity nightmare
We have run into devices running ancient versions of WinCE wo/SP
22
Clarification on 510(k) Submissions
510(k) NOT Required
Strengthen cyber security wo / changes to app / controls SW (OS Patch)
Return device to specifications of cleared device (Bug Fixes)
510(k) Required
Updates change the safety or effectiveness of the device
Risk based assessment needs to be performed to determine significance of
changes both individual and cumulative changes.
23
510(k) Decision Flow Chart
24
Cybersecurity Communication and Patchability
Design software for patchability
Isolated software components are easier to test and manage risk
Patching Capability
Rate at which updates can be fielded.
Communication of software vulnerabilities and update availability
Ability to re-execute V&V Testing
If V&V takes several months your patching capability will be low.
25
Cybersecurity Considerations for Updates
FDA requires that updates are verified to be authentic and unadulterated
Signed
Update was created by the manufacturer for this medical device.
Secure chain of custody
Ensure that updates cannot be corrupted or compromised
Resilient to failure
Controlled combination of system components
Only allow software combinations that have been tested
26
Projects Over the Last 15 years
ICS developed many in house solutions for customers
OS Build (Yocto, BuildRoot, Windows Embedded)
Update packaging (Encryption, signing)
Secure bootloader (modified u-boot for applying updates)
Error resistant partitioning schemes (A/B Updates)
Portals / webservices / middleware for update notification and distributions
Off the shelf products, frameworks and hardware are now available
Much easier to write and maintain
27
Popular SW Update Solutions
● Torizon
● Mender
● Balena
● SwUpdate
● OSTree
● Aktualizr
● Uptane
● Torizon
28
A/B Upgrades
● Dual A/B identical rootfs partitions
● Data partition for storing any persistent data which is left unchanged during
the update process
● Typically a client application runs on the embedded device and periodically
connects to a server to check for updates
● If a new software update is available, the client downloads and installs it on
the other partition
● Fallback in case of update failure
29
Delta Updates
● Only the binary delta between the difference is sent to the embedded device
● Works in a Git-like model for filesystem trees
● Saves storage space and connection bandwidth
● Rollback of the system to a previous state
30
A/B vs Delta Updates
31
Update strategy Storage space Update size Rollback to a
previous stage
Fallback to a
back-up image
on a separate
partition
A/B
Updates
Large Large Yes Yes
Delta
Updates
Small Small Yes No
Container-based Updates
● Container technology has changed the way application developers interact
with the cloud and some of the good practices are nowadays applied to the
development workflow for embedded Linux devices and Internet of Things
● Containers make applications faster to deploy, easier to update and more
secure through isolation
● Yocto/OE layer meta-virtualization provides support for building Xen, KVM,
Libvirt, docker and associated packages necessary for constructing OE-based
virtualized solutions
32
Leveraging Hardware Encryption Support
HSM: Hardware Security Module.
TPM: Trusted Platform Module (also known as ISO/IEC 11889).
CAAM: Cryptographic Accelerator and Assurance Module (NXP i.MX processors).
33
CAAM (Cryptographic Accelerator and Assurance Module)
CAAM on the Freescale i.MX platform supports the following:
● Secure memory feature with hardware-enforced access control
● Cryptographic authentication
● Authenticated encryption algorithms
● Symmetric key block ciphers
● Symmetric key stream ciphers
● Random-number generation
34
Hosting Solutions
Microsoft Azure IoT
Excellent framework for general IoT and update distribution
ICS has written in house C++ wrappers around Azure IoT
Distribution of updates amount other things
Torizon OTA
Turnkey solution for fleet management
35
Torizon - Be Faster - Be Secure - Be Reliable
36
Torizon
37
Based on Uptane Framework
• Used by major Automotive OEM
• Designed with State Actors Attackers in mind
• JDF/Linux Foundation Project
• Independent Security Audits
• Expands on The Update Framework (TUF)
● Cloud Native Computing Foundation
Torizon
38
Key Technology: OSTree
OpenSource
Git - Like
Space savings
● Including automatic de-duplication
Minimal update size
● Diff updates of per-file changes
Integrity can be verified
Atomic updates
Immutability & Revision Control
Torizon - Supported Hardware
39
https://www.torizon.io/supported-hardware
Torizon
40
www.torizon.io
Questions?
41
www.toradex.com
developer.toradex.com
community.toradex.com
labs.toradex.com
www.ics.com.com
info@ics.com

More Related Content

What's hot

Medical Devices Regulation (MDR) 2017/745 - Part I Purpose, Scope, Definitions
Medical Devices Regulation (MDR)  2017/745 - Part I Purpose, Scope, DefinitionsMedical Devices Regulation (MDR)  2017/745 - Part I Purpose, Scope, Definitions
Medical Devices Regulation (MDR) 2017/745 - Part I Purpose, Scope, Definitions
Arete-Zoe, LLC
 
IEC 62304: SDLC Conformance and Management
IEC 62304: SDLC Conformance and Management IEC 62304: SDLC Conformance and Management
IEC 62304: SDLC Conformance and Management
MethodSense, Inc.
 
FDA UDI vs EU UDI
FDA UDI vs EU UDIFDA UDI vs EU UDI
FDA UDI vs EU UDI
mitchellrobertss
 
Bi-dimensional risk analysis - safety&security -software medical device
 Bi-dimensional risk analysis - safety&security -software medical device Bi-dimensional risk analysis - safety&security -software medical device
Bi-dimensional risk analysis - safety&security -software medical device
Antonio Bartolozzi
 
FDA Unique Device Identification (UDI) Overview
FDA Unique Device Identification (UDI) OverviewFDA Unique Device Identification (UDI) Overview
FDA Unique Device Identification (UDI) Overview
Caroline Bloemker, M.S., RAC
 
Iso 14971 2019
Iso 14971 2019Iso 14971 2019
Iso 14971 2019
Suhas R
 
Medical Device Software
Medical Device SoftwareMedical Device Software
Medical Device Software
heilbrigdisidnadurinn
 
Security for Healthcare Devices – Will Your Device Be Good Enough?
Security for Healthcare Devices – Will Your Device Be Good Enough?Security for Healthcare Devices – Will Your Device Be Good Enough?
Security for Healthcare Devices – Will Your Device Be Good Enough?
Walt Maclay
 
bsi-md-symbols-and-information-to-be-provided-by-the-manufacturer-webinar.pdf
bsi-md-symbols-and-information-to-be-provided-by-the-manufacturer-webinar.pdfbsi-md-symbols-and-information-to-be-provided-by-the-manufacturer-webinar.pdf
bsi-md-symbols-and-information-to-be-provided-by-the-manufacturer-webinar.pdf
Nash229987
 
EU MDR
EU MDR EU MDR
EU MDR
RohitParkale
 
Webinar: Europe's new Medical Device Regulations (MDR)
Webinar: Europe's new Medical Device Regulations (MDR)Webinar: Europe's new Medical Device Regulations (MDR)
Webinar: Europe's new Medical Device Regulations (MDR)
EMERGO
 
Regulation of software as medical devices
Regulation of software as medical devicesRegulation of software as medical devices
Regulation of software as medical devices
TGA Australia
 
Electrical Equipment in Medical Practice
Electrical Equipment in Medical PracticeElectrical Equipment in Medical Practice
Electrical Equipment in Medical Practice
Northwest EMC
 
FDA regulation for medical devices
FDA regulation for medical devicesFDA regulation for medical devices
FDA regulation for medical devices
Simrana Fathima
 
ISO: 14971 Quality risk management of medical devices
ISO: 14971 Quality risk management  of medical devicesISO: 14971 Quality risk management  of medical devices
ISO: 14971 Quality risk management of medical devices
Atul Bhombe
 
Utilization of Medical Devices Standards to Demonstrate Safety
Utilization of Medical Devices Standards to Demonstrate SafetyUtilization of Medical Devices Standards to Demonstrate Safety
Utilization of Medical Devices Standards to Demonstrate Safety
UN SPHS
 
Postmarket Surveillance Medical Devices
Postmarket Surveillance   Medical DevicesPostmarket Surveillance   Medical Devices
Postmarket Surveillance Medical Devices
Jacobe2008
 
How to Prepare for the New EU Medical Device Regulations (MDR)
How to Prepare for the New EU Medical Device Regulations (MDR)How to Prepare for the New EU Medical Device Regulations (MDR)
How to Prepare for the New EU Medical Device Regulations (MDR)
Greenlight Guru
 
What You Need to Know About Medical Electrical Standards Updates (and how the...
What You Need to Know About Medical Electrical Standards Updates (and how the...What You Need to Know About Medical Electrical Standards Updates (and how the...
What You Need to Know About Medical Electrical Standards Updates (and how the...
Greenlight Guru
 
Getting Your Medical Device FDA Approved
Getting Your Medical Device FDA ApprovedGetting Your Medical Device FDA Approved
Getting Your Medical Device FDA Approved
mentoresd
 

What's hot (20)

Medical Devices Regulation (MDR) 2017/745 - Part I Purpose, Scope, Definitions
Medical Devices Regulation (MDR)  2017/745 - Part I Purpose, Scope, DefinitionsMedical Devices Regulation (MDR)  2017/745 - Part I Purpose, Scope, Definitions
Medical Devices Regulation (MDR) 2017/745 - Part I Purpose, Scope, Definitions
 
IEC 62304: SDLC Conformance and Management
IEC 62304: SDLC Conformance and Management IEC 62304: SDLC Conformance and Management
IEC 62304: SDLC Conformance and Management
 
FDA UDI vs EU UDI
FDA UDI vs EU UDIFDA UDI vs EU UDI
FDA UDI vs EU UDI
 
Bi-dimensional risk analysis - safety&security -software medical device
 Bi-dimensional risk analysis - safety&security -software medical device Bi-dimensional risk analysis - safety&security -software medical device
Bi-dimensional risk analysis - safety&security -software medical device
 
FDA Unique Device Identification (UDI) Overview
FDA Unique Device Identification (UDI) OverviewFDA Unique Device Identification (UDI) Overview
FDA Unique Device Identification (UDI) Overview
 
Iso 14971 2019
Iso 14971 2019Iso 14971 2019
Iso 14971 2019
 
Medical Device Software
Medical Device SoftwareMedical Device Software
Medical Device Software
 
Security for Healthcare Devices – Will Your Device Be Good Enough?
Security for Healthcare Devices – Will Your Device Be Good Enough?Security for Healthcare Devices – Will Your Device Be Good Enough?
Security for Healthcare Devices – Will Your Device Be Good Enough?
 
bsi-md-symbols-and-information-to-be-provided-by-the-manufacturer-webinar.pdf
bsi-md-symbols-and-information-to-be-provided-by-the-manufacturer-webinar.pdfbsi-md-symbols-and-information-to-be-provided-by-the-manufacturer-webinar.pdf
bsi-md-symbols-and-information-to-be-provided-by-the-manufacturer-webinar.pdf
 
EU MDR
EU MDR EU MDR
EU MDR
 
Webinar: Europe's new Medical Device Regulations (MDR)
Webinar: Europe's new Medical Device Regulations (MDR)Webinar: Europe's new Medical Device Regulations (MDR)
Webinar: Europe's new Medical Device Regulations (MDR)
 
Regulation of software as medical devices
Regulation of software as medical devicesRegulation of software as medical devices
Regulation of software as medical devices
 
Electrical Equipment in Medical Practice
Electrical Equipment in Medical PracticeElectrical Equipment in Medical Practice
Electrical Equipment in Medical Practice
 
FDA regulation for medical devices
FDA regulation for medical devicesFDA regulation for medical devices
FDA regulation for medical devices
 
ISO: 14971 Quality risk management of medical devices
ISO: 14971 Quality risk management  of medical devicesISO: 14971 Quality risk management  of medical devices
ISO: 14971 Quality risk management of medical devices
 
Utilization of Medical Devices Standards to Demonstrate Safety
Utilization of Medical Devices Standards to Demonstrate SafetyUtilization of Medical Devices Standards to Demonstrate Safety
Utilization of Medical Devices Standards to Demonstrate Safety
 
Postmarket Surveillance Medical Devices
Postmarket Surveillance   Medical DevicesPostmarket Surveillance   Medical Devices
Postmarket Surveillance Medical Devices
 
How to Prepare for the New EU Medical Device Regulations (MDR)
How to Prepare for the New EU Medical Device Regulations (MDR)How to Prepare for the New EU Medical Device Regulations (MDR)
How to Prepare for the New EU Medical Device Regulations (MDR)
 
What You Need to Know About Medical Electrical Standards Updates (and how the...
What You Need to Know About Medical Electrical Standards Updates (and how the...What You Need to Know About Medical Electrical Standards Updates (and how the...
What You Need to Know About Medical Electrical Standards Updates (and how the...
 
Getting Your Medical Device FDA Approved
Getting Your Medical Device FDA ApprovedGetting Your Medical Device FDA Approved
Getting Your Medical Device FDA Approved
 

Similar to Cybersecurity and Software Updates in Medical Devices.pdf

5 Key Considerations at the Start of SaMD Development
5 Key Considerations at the Start of SaMD Development5 Key Considerations at the Start of SaMD Development
5 Key Considerations at the Start of SaMD Development
ICS
 
Overcome Hardware And Software Challenges - Medical Device Case Study
Overcome Hardware And Software Challenges - Medical Device Case StudyOvercome Hardware And Software Challenges - Medical Device Case Study
Overcome Hardware And Software Challenges - Medical Device Case Study
ICS
 
IoT and M2M Safety and Security
IoT and M2M Safety and Security 	IoT and M2M Safety and Security
IoT and M2M Safety and Security
Real-Time Innovations (RTI)
 
Cruatech Services Intro
Cruatech Services IntroCruatech Services Intro
Cruatech Services Intro
Cruatech
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
ICS
 
Maintaining Continuous Compliance with HCL BigFix
Maintaining Continuous Compliance with HCL BigFixMaintaining Continuous Compliance with HCL BigFix
Maintaining Continuous Compliance with HCL BigFix
HCLSoftware
 
Learn how to make your IoT pilot projects and POCs successful
Learn how to make your IoT pilot projects and POCs successfulLearn how to make your IoT pilot projects and POCs successful
Learn how to make your IoT pilot projects and POCs successful
Kellton Tech Solutions Ltd
 
Safeguard Your Medical Devices from Cyber Threats
Safeguard Your Medical Devices from Cyber ThreatsSafeguard Your Medical Devices from Cyber Threats
Safeguard Your Medical Devices from Cyber Threats
ICS
 
Optimizing Healthcare with Sphere3D VDI and Containerization
Optimizing Healthcare with Sphere3D VDI and Containerization Optimizing Healthcare with Sphere3D VDI and Containerization
Optimizing Healthcare with Sphere3D VDI and Containerization
Mark A Watts
 
[Webinar] Software: The Lifeblood of any Medical Device
[Webinar] Software: The Lifeblood of any Medical Device[Webinar] Software: The Lifeblood of any Medical Device
[Webinar] Software: The Lifeblood of any Medical Device
ICS
 
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonSCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonPatricia M Watson
 
VMworld 2013: Get on with Business - VMware Reference Architectures Help Stre...
VMworld 2013: Get on with Business - VMware Reference Architectures Help Stre...VMworld 2013: Get on with Business - VMware Reference Architectures Help Stre...
VMworld 2013: Get on with Business - VMware Reference Architectures Help Stre...
VMworld
 
MongoDB IoT City Tour EINDHOVEN: IoT in Healthcare: by, Microsoft & Barco
MongoDB IoT City Tour EINDHOVEN: IoT in Healthcare: by, Microsoft & BarcoMongoDB IoT City Tour EINDHOVEN: IoT in Healthcare: by, Microsoft & Barco
MongoDB IoT City Tour EINDHOVEN: IoT in Healthcare: by, Microsoft & Barco
MongoDB
 
What's new in System Recovery 22.pptx
What's new in System Recovery 22.pptxWhat's new in System Recovery 22.pptx
What's new in System Recovery 22.pptx
pbtest
 
VMworld 2014: Virtualization 101
VMworld 2014: Virtualization 101VMworld 2014: Virtualization 101
VMworld 2014: Virtualization 101
VMworld
 
2017-07-12 GovLoop: New Era of Digital Security
2017-07-12 GovLoop: New Era of Digital Security2017-07-12 GovLoop: New Era of Digital Security
2017-07-12 GovLoop: New Era of Digital Security
Shawn Wells
 
VMworld 2013: Incredible Partner Solutions for End User Computing
VMworld 2013: Incredible Partner Solutions for End User Computing VMworld 2013: Incredible Partner Solutions for End User Computing
VMworld 2013: Incredible Partner Solutions for End User Computing
VMworld
 
IIoT Endpoint Security – The Model in Practice
IIoT Endpoint Security – The Model in PracticeIIoT Endpoint Security – The Model in Practice
IIoT Endpoint Security – The Model in Practice
team-WIBU
 
Continuous Integration and Continuous Delivery on Azure
Continuous Integration and Continuous Delivery on AzureContinuous Integration and Continuous Delivery on Azure
Continuous Integration and Continuous Delivery on Azure
CitiusTech
 
Secure architecture-industrial-control-systems-36327
Secure architecture-industrial-control-systems-36327Secure architecture-industrial-control-systems-36327
Secure architecture-industrial-control-systems-36327
vimal Kumar Gupta
 

Similar to Cybersecurity and Software Updates in Medical Devices.pdf (20)

5 Key Considerations at the Start of SaMD Development
5 Key Considerations at the Start of SaMD Development5 Key Considerations at the Start of SaMD Development
5 Key Considerations at the Start of SaMD Development
 
Overcome Hardware And Software Challenges - Medical Device Case Study
Overcome Hardware And Software Challenges - Medical Device Case StudyOvercome Hardware And Software Challenges - Medical Device Case Study
Overcome Hardware And Software Challenges - Medical Device Case Study
 
IoT and M2M Safety and Security
IoT and M2M Safety and Security 	IoT and M2M Safety and Security
IoT and M2M Safety and Security
 
Cruatech Services Intro
Cruatech Services IntroCruatech Services Intro
Cruatech Services Intro
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Maintaining Continuous Compliance with HCL BigFix
Maintaining Continuous Compliance with HCL BigFixMaintaining Continuous Compliance with HCL BigFix
Maintaining Continuous Compliance with HCL BigFix
 
Learn how to make your IoT pilot projects and POCs successful
Learn how to make your IoT pilot projects and POCs successfulLearn how to make your IoT pilot projects and POCs successful
Learn how to make your IoT pilot projects and POCs successful
 
Safeguard Your Medical Devices from Cyber Threats
Safeguard Your Medical Devices from Cyber ThreatsSafeguard Your Medical Devices from Cyber Threats
Safeguard Your Medical Devices from Cyber Threats
 
Optimizing Healthcare with Sphere3D VDI and Containerization
Optimizing Healthcare with Sphere3D VDI and Containerization Optimizing Healthcare with Sphere3D VDI and Containerization
Optimizing Healthcare with Sphere3D VDI and Containerization
 
[Webinar] Software: The Lifeblood of any Medical Device
[Webinar] Software: The Lifeblood of any Medical Device[Webinar] Software: The Lifeblood of any Medical Device
[Webinar] Software: The Lifeblood of any Medical Device
 
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonSCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
 
VMworld 2013: Get on with Business - VMware Reference Architectures Help Stre...
VMworld 2013: Get on with Business - VMware Reference Architectures Help Stre...VMworld 2013: Get on with Business - VMware Reference Architectures Help Stre...
VMworld 2013: Get on with Business - VMware Reference Architectures Help Stre...
 
MongoDB IoT City Tour EINDHOVEN: IoT in Healthcare: by, Microsoft & Barco
MongoDB IoT City Tour EINDHOVEN: IoT in Healthcare: by, Microsoft & BarcoMongoDB IoT City Tour EINDHOVEN: IoT in Healthcare: by, Microsoft & Barco
MongoDB IoT City Tour EINDHOVEN: IoT in Healthcare: by, Microsoft & Barco
 
What's new in System Recovery 22.pptx
What's new in System Recovery 22.pptxWhat's new in System Recovery 22.pptx
What's new in System Recovery 22.pptx
 
VMworld 2014: Virtualization 101
VMworld 2014: Virtualization 101VMworld 2014: Virtualization 101
VMworld 2014: Virtualization 101
 
2017-07-12 GovLoop: New Era of Digital Security
2017-07-12 GovLoop: New Era of Digital Security2017-07-12 GovLoop: New Era of Digital Security
2017-07-12 GovLoop: New Era of Digital Security
 
VMworld 2013: Incredible Partner Solutions for End User Computing
VMworld 2013: Incredible Partner Solutions for End User Computing VMworld 2013: Incredible Partner Solutions for End User Computing
VMworld 2013: Incredible Partner Solutions for End User Computing
 
IIoT Endpoint Security – The Model in Practice
IIoT Endpoint Security – The Model in PracticeIIoT Endpoint Security – The Model in Practice
IIoT Endpoint Security – The Model in Practice
 
Continuous Integration and Continuous Delivery on Azure
Continuous Integration and Continuous Delivery on AzureContinuous Integration and Continuous Delivery on Azure
Continuous Integration and Continuous Delivery on Azure
 
Secure architecture-industrial-control-systems-36327
Secure architecture-industrial-control-systems-36327Secure architecture-industrial-control-systems-36327
Secure architecture-industrial-control-systems-36327
 

More from ICS

A Deep Dive into Secure Product Development Frameworks.pdf
A Deep Dive into Secure Product Development Frameworks.pdfA Deep Dive into Secure Product Development Frameworks.pdf
A Deep Dive into Secure Product Development Frameworks.pdf
ICS
 
Practical Advice for FDA’s 510(k) Requirements.pdf
Practical Advice for FDA’s 510(k) Requirements.pdfPractical Advice for FDA’s 510(k) Requirements.pdf
Practical Advice for FDA’s 510(k) Requirements.pdf
ICS
 
Accelerating Development of a Safety-Critical Cobot Welding System with Qt/QM...
Accelerating Development of a Safety-Critical Cobot Welding System with Qt/QM...Accelerating Development of a Safety-Critical Cobot Welding System with Qt/QM...
Accelerating Development of a Safety-Critical Cobot Welding System with Qt/QM...
ICS
 
Overcoming CMake Configuration Issues Webinar
Overcoming CMake Configuration Issues WebinarOvercoming CMake Configuration Issues Webinar
Overcoming CMake Configuration Issues Webinar
ICS
 
Enhancing Quality and Test in Medical Device Design - Part 2.pdf
Enhancing Quality and Test in Medical Device Design - Part 2.pdfEnhancing Quality and Test in Medical Device Design - Part 2.pdf
Enhancing Quality and Test in Medical Device Design - Part 2.pdf
ICS
 
Designing and Managing IoT Devices for Rapid Deployment - Webinar.pdf
Designing and Managing IoT Devices for Rapid Deployment - Webinar.pdfDesigning and Managing IoT Devices for Rapid Deployment - Webinar.pdf
Designing and Managing IoT Devices for Rapid Deployment - Webinar.pdf
ICS
 
Quality and Test in Medical Device Design - Part 1.pdf
Quality and Test in Medical Device Design - Part 1.pdfQuality and Test in Medical Device Design - Part 1.pdf
Quality and Test in Medical Device Design - Part 1.pdf
ICS
 
Creating Digital Twins Using Rapid Development Techniques.pdf
Creating Digital Twins Using Rapid Development Techniques.pdfCreating Digital Twins Using Rapid Development Techniques.pdf
Creating Digital Twins Using Rapid Development Techniques.pdf
ICS
 
MDG Panel - Creating Expert Level GUIs for Complex Medical Devices
MDG Panel - Creating Expert Level GUIs for Complex Medical DevicesMDG Panel - Creating Expert Level GUIs for Complex Medical Devices
MDG Panel - Creating Expert Level GUIs for Complex Medical Devices
ICS
 
How to Craft a Winning IOT Device Management Solution
How to Craft a Winning IOT Device Management SolutionHow to Craft a Winning IOT Device Management Solution
How to Craft a Winning IOT Device Management Solution
ICS
 
Bridging the Gap Between Development and Regulatory Teams
Bridging the Gap Between Development and Regulatory TeamsBridging the Gap Between Development and Regulatory Teams
Bridging the Gap Between Development and Regulatory Teams
ICS
 
IoT Device Fleet Management: Create a Robust Solution with Azure
IoT Device Fleet Management: Create a Robust Solution with AzureIoT Device Fleet Management: Create a Robust Solution with Azure
IoT Device Fleet Management: Create a Robust Solution with Azure
ICS
 
Basic Cmake for Qt Users
Basic Cmake for Qt UsersBasic Cmake for Qt Users
Basic Cmake for Qt Users
ICS
 
Software Update Mechanisms: Selecting the Best Solutin for Your Embedded Linu...
Software Update Mechanisms: Selecting the Best Solutin for Your Embedded Linu...Software Update Mechanisms: Selecting the Best Solutin for Your Embedded Linu...
Software Update Mechanisms: Selecting the Best Solutin for Your Embedded Linu...
ICS
 
Qt Installer Framework
Qt Installer FrameworkQt Installer Framework
Qt Installer Framework
ICS
 
Bridging the Gap Between Development and Regulatory Teams
Bridging the Gap Between Development and Regulatory TeamsBridging the Gap Between Development and Regulatory Teams
Bridging the Gap Between Development and Regulatory Teams
ICS
 
User Experience Design for IoT
User Experience Design for IoTUser Experience Design for IoT
User Experience Design for IoT
ICS
 
Software Bill of Materials - Accelerating Your Secure Embedded Development.pdf
Software Bill of Materials - Accelerating Your Secure Embedded Development.pdfSoftware Bill of Materials - Accelerating Your Secure Embedded Development.pdf
Software Bill of Materials - Accelerating Your Secure Embedded Development.pdf
ICS
 
An In-Depth Look Into Microcontrollers
An In-Depth Look Into MicrocontrollersAn In-Depth Look Into Microcontrollers
An In-Depth Look Into Microcontrollers
ICS
 
Introduction to the Qt State Machine Framework using Qt 6
Introduction to the Qt State Machine Framework using Qt 6Introduction to the Qt State Machine Framework using Qt 6
Introduction to the Qt State Machine Framework using Qt 6
ICS
 

More from ICS (20)

A Deep Dive into Secure Product Development Frameworks.pdf
A Deep Dive into Secure Product Development Frameworks.pdfA Deep Dive into Secure Product Development Frameworks.pdf
A Deep Dive into Secure Product Development Frameworks.pdf
 
Practical Advice for FDA’s 510(k) Requirements.pdf
Practical Advice for FDA’s 510(k) Requirements.pdfPractical Advice for FDA’s 510(k) Requirements.pdf
Practical Advice for FDA’s 510(k) Requirements.pdf
 
Accelerating Development of a Safety-Critical Cobot Welding System with Qt/QM...
Accelerating Development of a Safety-Critical Cobot Welding System with Qt/QM...Accelerating Development of a Safety-Critical Cobot Welding System with Qt/QM...
Accelerating Development of a Safety-Critical Cobot Welding System with Qt/QM...
 
Overcoming CMake Configuration Issues Webinar
Overcoming CMake Configuration Issues WebinarOvercoming CMake Configuration Issues Webinar
Overcoming CMake Configuration Issues Webinar
 
Enhancing Quality and Test in Medical Device Design - Part 2.pdf
Enhancing Quality and Test in Medical Device Design - Part 2.pdfEnhancing Quality and Test in Medical Device Design - Part 2.pdf
Enhancing Quality and Test in Medical Device Design - Part 2.pdf
 
Designing and Managing IoT Devices for Rapid Deployment - Webinar.pdf
Designing and Managing IoT Devices for Rapid Deployment - Webinar.pdfDesigning and Managing IoT Devices for Rapid Deployment - Webinar.pdf
Designing and Managing IoT Devices for Rapid Deployment - Webinar.pdf
 
Quality and Test in Medical Device Design - Part 1.pdf
Quality and Test in Medical Device Design - Part 1.pdfQuality and Test in Medical Device Design - Part 1.pdf
Quality and Test in Medical Device Design - Part 1.pdf
 
Creating Digital Twins Using Rapid Development Techniques.pdf
Creating Digital Twins Using Rapid Development Techniques.pdfCreating Digital Twins Using Rapid Development Techniques.pdf
Creating Digital Twins Using Rapid Development Techniques.pdf
 
MDG Panel - Creating Expert Level GUIs for Complex Medical Devices
MDG Panel - Creating Expert Level GUIs for Complex Medical DevicesMDG Panel - Creating Expert Level GUIs for Complex Medical Devices
MDG Panel - Creating Expert Level GUIs for Complex Medical Devices
 
How to Craft a Winning IOT Device Management Solution
How to Craft a Winning IOT Device Management SolutionHow to Craft a Winning IOT Device Management Solution
How to Craft a Winning IOT Device Management Solution
 
Bridging the Gap Between Development and Regulatory Teams
Bridging the Gap Between Development and Regulatory TeamsBridging the Gap Between Development and Regulatory Teams
Bridging the Gap Between Development and Regulatory Teams
 
IoT Device Fleet Management: Create a Robust Solution with Azure
IoT Device Fleet Management: Create a Robust Solution with AzureIoT Device Fleet Management: Create a Robust Solution with Azure
IoT Device Fleet Management: Create a Robust Solution with Azure
 
Basic Cmake for Qt Users
Basic Cmake for Qt UsersBasic Cmake for Qt Users
Basic Cmake for Qt Users
 
Software Update Mechanisms: Selecting the Best Solutin for Your Embedded Linu...
Software Update Mechanisms: Selecting the Best Solutin for Your Embedded Linu...Software Update Mechanisms: Selecting the Best Solutin for Your Embedded Linu...
Software Update Mechanisms: Selecting the Best Solutin for Your Embedded Linu...
 
Qt Installer Framework
Qt Installer FrameworkQt Installer Framework
Qt Installer Framework
 
Bridging the Gap Between Development and Regulatory Teams
Bridging the Gap Between Development and Regulatory TeamsBridging the Gap Between Development and Regulatory Teams
Bridging the Gap Between Development and Regulatory Teams
 
User Experience Design for IoT
User Experience Design for IoTUser Experience Design for IoT
User Experience Design for IoT
 
Software Bill of Materials - Accelerating Your Secure Embedded Development.pdf
Software Bill of Materials - Accelerating Your Secure Embedded Development.pdfSoftware Bill of Materials - Accelerating Your Secure Embedded Development.pdf
Software Bill of Materials - Accelerating Your Secure Embedded Development.pdf
 
An In-Depth Look Into Microcontrollers
An In-Depth Look Into MicrocontrollersAn In-Depth Look Into Microcontrollers
An In-Depth Look Into Microcontrollers
 
Introduction to the Qt State Machine Framework using Qt 6
Introduction to the Qt State Machine Framework using Qt 6Introduction to the Qt State Machine Framework using Qt 6
Introduction to the Qt State Machine Framework using Qt 6
 

Recently uploaded

Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...
Globus
 
BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024
Ortus Solutions, Corp
 
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
XfilesPro
 
Advanced Flow Concepts Every Developer Should Know
Advanced Flow Concepts Every Developer Should KnowAdvanced Flow Concepts Every Developer Should Know
Advanced Flow Concepts Every Developer Should Know
Peter Caitens
 
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
Tier1 app
 
A Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdfA Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdf
kalichargn70th171
 
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Hivelance Technology
 
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Globus
 
Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
Max Andersen
 
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology SolutionsProsigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns
 
top nidhi software solution freedownload
top nidhi software solution freedownloadtop nidhi software solution freedownload
top nidhi software solution freedownload
vrstrong314
 
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.ILBeyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Natan Silnitsky
 
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus
 
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Shahin Sheidaei
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2
 
Understanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSageUnderstanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSage
Globus
 
Software Testing Exam imp Ques Notes.pdf
Software Testing Exam imp Ques Notes.pdfSoftware Testing Exam imp Ques Notes.pdf
Software Testing Exam imp Ques Notes.pdf
MayankTawar1
 
Explore Modern SharePoint Templates for 2024
Explore Modern SharePoint Templates for 2024Explore Modern SharePoint Templates for 2024
Explore Modern SharePoint Templates for 2024
Sharepoint Designs
 
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoamOpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
takuyayamamoto1800
 
Designing for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web ServicesDesigning for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web Services
KrzysztofKkol1
 

Recently uploaded (20)

Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...Developing Distributed High-performance Computing Capabilities of an Open Sci...
Developing Distributed High-performance Computing Capabilities of an Open Sci...
 
BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024BoxLang: Review our Visionary Licenses of 2024
BoxLang: Review our Visionary Licenses of 2024
 
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
How Does XfilesPro Ensure Security While Sharing Documents in Salesforce?
 
Advanced Flow Concepts Every Developer Should Know
Advanced Flow Concepts Every Developer Should KnowAdvanced Flow Concepts Every Developer Should Know
Advanced Flow Concepts Every Developer Should Know
 
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERRORTROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
TROUBLESHOOTING 9 TYPES OF OUTOFMEMORYERROR
 
A Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdfA Comprehensive Look at Generative AI in Retail App Testing.pdf
A Comprehensive Look at Generative AI in Retail App Testing.pdf
 
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
Multiple Your Crypto Portfolio with the Innovative Features of Advanced Crypt...
 
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
Climate Science Flows: Enabling Petabyte-Scale Climate Analysis with the Eart...
 
Quarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden ExtensionsQuarkus Hidden and Forbidden Extensions
Quarkus Hidden and Forbidden Extensions
 
Prosigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology SolutionsProsigns: Transforming Business with Tailored Technology Solutions
Prosigns: Transforming Business with Tailored Technology Solutions
 
top nidhi software solution freedownload
top nidhi software solution freedownloadtop nidhi software solution freedownload
top nidhi software solution freedownload
 
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.ILBeyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
Beyond Event Sourcing - Embracing CRUD for Wix Platform - Java.IL
 
Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024Globus Connect Server Deep Dive - GlobusWorld 2024
Globus Connect Server Deep Dive - GlobusWorld 2024
 
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
Gamify Your Mind; The Secret Sauce to Delivering Success, Continuously Improv...
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
 
Understanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSageUnderstanding Globus Data Transfers with NetSage
Understanding Globus Data Transfers with NetSage
 
Software Testing Exam imp Ques Notes.pdf
Software Testing Exam imp Ques Notes.pdfSoftware Testing Exam imp Ques Notes.pdf
Software Testing Exam imp Ques Notes.pdf
 
Explore Modern SharePoint Templates for 2024
Explore Modern SharePoint Templates for 2024Explore Modern SharePoint Templates for 2024
Explore Modern SharePoint Templates for 2024
 
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoamOpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
OpenFOAM solver for Helmholtz equation, helmholtzFoam / helmholtzBubbleFoam
 
Designing for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web ServicesDesigning for Privacy in Amazon Web Services
Designing for Privacy in Amazon Web Services
 

Cybersecurity and Software Updates in Medical Devices.pdf

  • 1. Cybersecurity and Software Updates in Medical Devices Justin Noel, ICS Daniel Lang, Toradex 1 January 25, 2023
  • 2. About ICS Established in 1987, Integrated Computer Solutions, Inc. (ICS) delivers innovative software solutions with a full suite of services to accelerate development of successful next-gen products. ICS is headquartered outside Boston in Waltham, Mass. with offices in California, Canada and Europe. Currently 160 people. Boston UX is ICS’ design studio, specializing in intuitive touchscreen and multimodal interfaces for high-impact embedded and connected devices. 2
  • 3. www.ics.com Delivering a Full Suite of Medtech Services 3 ● Human Factors Engineering ● IEC 62366-UX/UI Design ● Custom Frontend and Backend Software Development ● Development with IEC 62304-Compliant Platform ● Low-code Tools that Convert UX Prototype to Product ● Medical Device Cybersecurity ● AWS and Azure Cloud Services and Analytics ● ISO 14971-Compliant Hazard Analysis ● Software Verification Testing ● Complimentary Software Technology Assessment
  • 4. Toradex - What We Do Make Embedded Computing Easy Reliable Arm System-on-Modules Torizon - Linux IoT Platform Lowest Cost of Ownership Industry-leading Support 4
  • 5. Focus Verticals • Industrial Automation • Healthcare • Transportation • Test & Measurement • Smart City Typical Annual Volumes 100 to 50k Pcs Per Customer Project Typical Applications 5
  • 6. Toradex - Numbers FOUNDED 2003 ACTIVE CUSTOMERS 3000+ EMPLOYEES 150+ 8 GLOBAL OFFICES 70+ PROVEN PARTNERS 6
  • 9. PSA Certified 2022 Security Report 9
  • 10. Global Trend In New Regulations 10
  • 11. Europa Télécommunications Standards Institute (ETSI) EN 303 645 California State Law SB-327 Oregon IoT Law (House Bill 2395) NIST 8259A ISO/SAE 21434 – THE CYBERSECURITY STANDARD IEC 62443 CYBERSECURITY MATURITY MODEL CERTIFICATION CMMC 2.0 – DoD White House - Executive Order on Improving the Nation’s Cybersecurity Many More……….. Global Trend In New Regulations 11
  • 12. Global Trend In New Regulations 12 Some Common Requirements • No Default Passwords • Way to Timely Patch Vulnerability • Log Access • Software Bill of Material
  • 13. Poll - How do you do Software Updates 13 • Remote Updates Regular • Remote Updates When Needed • Offline Updates Regular • Offline Updates When Needed • No Updates ?
  • 15. Example: Medical Devices for Hospitals 15
  • 16. Poll - What drives your Security Requirements ? 16 • Company Policy / Best Practices • Customers • Government Regulations • Other Regulations / Standards • None of the above ?
  • 17. • Example is a Swiss Company • Medical Devices traditionally avoided changes to SW or HW • The Situation is changing • Devices are connected › Example: Control Centers in Hospitals or even for Home Care with Remote Monitoring RWJBarnabas Health Community Medical Center Example: Medical Devices for Hospitals 17
  • 18. IT security requirements for third - party systems Example: Medical Devices for Hospitals 18
  • 19. Example: Medical Devices for Hospitals 19
  • 20. Example: Medical Devices for Hospitals 20
  • 21. Recent FDA Guidance Regarding Software Updates Cybersecurity in Medical Devices (Latest Draft April 2022) https://www.fda.gov/media/119933/download FDA Guidance is a slow process, but PATCH Act 2022 may make this US law. When to Submit a 510(k) for a Software Change to an Existing Device (2017) https://www.fda.gov/media/99785/download Clarification of 510(k) re-submission criteria 21
  • 22. Reasons For New Guidance and Clarifications Once upon a time system level updates for medical devices were rare COTS processes and re-validation for OS/Library updates were burdensome Resulted in base libraries and OS’s sometimes not being updated at all Wait until next major device revision (next 510(k) submission) Security issues were mitigated by air gapping and physical access In a connected world, air gaps are no longer possible Results were a cybersecurity nightmare We have run into devices running ancient versions of WinCE wo/SP 22
  • 23. Clarification on 510(k) Submissions 510(k) NOT Required Strengthen cyber security wo / changes to app / controls SW (OS Patch) Return device to specifications of cleared device (Bug Fixes) 510(k) Required Updates change the safety or effectiveness of the device Risk based assessment needs to be performed to determine significance of changes both individual and cumulative changes. 23
  • 25. Cybersecurity Communication and Patchability Design software for patchability Isolated software components are easier to test and manage risk Patching Capability Rate at which updates can be fielded. Communication of software vulnerabilities and update availability Ability to re-execute V&V Testing If V&V takes several months your patching capability will be low. 25
  • 26. Cybersecurity Considerations for Updates FDA requires that updates are verified to be authentic and unadulterated Signed Update was created by the manufacturer for this medical device. Secure chain of custody Ensure that updates cannot be corrupted or compromised Resilient to failure Controlled combination of system components Only allow software combinations that have been tested 26
  • 27. Projects Over the Last 15 years ICS developed many in house solutions for customers OS Build (Yocto, BuildRoot, Windows Embedded) Update packaging (Encryption, signing) Secure bootloader (modified u-boot for applying updates) Error resistant partitioning schemes (A/B Updates) Portals / webservices / middleware for update notification and distributions Off the shelf products, frameworks and hardware are now available Much easier to write and maintain 27
  • 28. Popular SW Update Solutions ● Torizon ● Mender ● Balena ● SwUpdate ● OSTree ● Aktualizr ● Uptane ● Torizon 28
  • 29. A/B Upgrades ● Dual A/B identical rootfs partitions ● Data partition for storing any persistent data which is left unchanged during the update process ● Typically a client application runs on the embedded device and periodically connects to a server to check for updates ● If a new software update is available, the client downloads and installs it on the other partition ● Fallback in case of update failure 29
  • 30. Delta Updates ● Only the binary delta between the difference is sent to the embedded device ● Works in a Git-like model for filesystem trees ● Saves storage space and connection bandwidth ● Rollback of the system to a previous state 30
  • 31. A/B vs Delta Updates 31 Update strategy Storage space Update size Rollback to a previous stage Fallback to a back-up image on a separate partition A/B Updates Large Large Yes Yes Delta Updates Small Small Yes No
  • 32. Container-based Updates ● Container technology has changed the way application developers interact with the cloud and some of the good practices are nowadays applied to the development workflow for embedded Linux devices and Internet of Things ● Containers make applications faster to deploy, easier to update and more secure through isolation ● Yocto/OE layer meta-virtualization provides support for building Xen, KVM, Libvirt, docker and associated packages necessary for constructing OE-based virtualized solutions 32
  • 33. Leveraging Hardware Encryption Support HSM: Hardware Security Module. TPM: Trusted Platform Module (also known as ISO/IEC 11889). CAAM: Cryptographic Accelerator and Assurance Module (NXP i.MX processors). 33
  • 34. CAAM (Cryptographic Accelerator and Assurance Module) CAAM on the Freescale i.MX platform supports the following: ● Secure memory feature with hardware-enforced access control ● Cryptographic authentication ● Authenticated encryption algorithms ● Symmetric key block ciphers ● Symmetric key stream ciphers ● Random-number generation 34
  • 35. Hosting Solutions Microsoft Azure IoT Excellent framework for general IoT and update distribution ICS has written in house C++ wrappers around Azure IoT Distribution of updates amount other things Torizon OTA Turnkey solution for fleet management 35
  • 36. Torizon - Be Faster - Be Secure - Be Reliable 36
  • 37. Torizon 37 Based on Uptane Framework • Used by major Automotive OEM • Designed with State Actors Attackers in mind • JDF/Linux Foundation Project • Independent Security Audits • Expands on The Update Framework (TUF) ● Cloud Native Computing Foundation
  • 38. Torizon 38 Key Technology: OSTree OpenSource Git - Like Space savings ● Including automatic de-duplication Minimal update size ● Diff updates of per-file changes Integrity can be verified Atomic updates Immutability & Revision Control
  • 39. Torizon - Supported Hardware 39 https://www.torizon.io/supported-hardware