SlideShare a Scribd company logo
1 of 19
Download to read offline
Cybersecurity in
Medical Devices
Practical Advice
for FDA’s 510(k)
Requirements
About Us
2
Trustonic Secure Platform provides a certified solution for the storage and management
of security or privacy sensitive data. This can be used to protect cryptographic keys and
patient information ensuring devices use best in class security. It can also be used to
provide defense in depth to protect other systems, such as secure communications or
intrusion detection, and enable secure manufacture and tracking of devices throughout
their lifecycle.
BG Networks equips embedded engineers and penetration testers with easy-to-use software
automation tools to streamline cybersecurity tasks including hardening, detection, and
testing. BG Networks automation tools are designed to help with adherence to regulations
from the FDA, NIST, ISO, and the EU.
ICS supports our customers with software development, User experience design,
platform and regulatory support to build next generation products. We provide a
number of services focused on the medtech space including human factors
engineering with a 62366 compliant process, hazard and risk analysis, 62304
compliant software development, and platform support including cybersecurity.
Speaker Introductions
3
Chief Strategy and
Innovations Officer for
Secure Platform
Founder & CEO
Director of Medical
Programs &
Cybersecurity
Agenda
• Why is the FDA requiring cybersecurity - How did we get here?
• Secure Product Development Framework (SPDF) – What is it?
• Threat Modeling and Risk Assessment – Consider Likelihood and Impact.
• Security Controls FDA Will Be Looking For – From Authentication to Updateability
• Cybersecurity Testing – What is the FDA asking for?
• Standards, Standards, Standards – Overview of the many to choose from
• SBOMs – What are they?
• Pulling it All Together – A single page view of the process and evidence created
• Deliverable for the FDA – What do you need to submit for cybersecurity.
4
Why The FDA Asked for Cybersecurity Statutory Authority
5
5
Cyber threats can, have, and do pose patient safety risks to the healthcare sector
A Slide from Jessica Wilkerson of the FDA
FDA Has Legal Mandate to Enforce Cybersecurity
How Did We Get Here
6
Oct 2014 April 2022 Dec 2022 March 2023 September 2023 Today
October 2014
Cybersecurity in Medical Devices
1) FDA’s first guidance for cybersecurity in
medical devices
December 29 - 2022
Protecting & Transforming Cyber Healthcare Act
(PATCH) – Part of Omnibus Bill
Section 524b added to FD&C Act
4) FDA given statutory power to enforce
cybersecurity in med devices
April 2022 (draft)
Cybersecurity in Medical Devices:
Premarket Submissions
3) Basis for 2023 Final Version
March 2023
FDA releases: Refuse to Accept
Policy for Cyber
5) Industry put on notice that the
FDA is serious
September 2023 (Final)
From the FDA: Cybersecurity in Medical
Devices
6) Final version in preparation for
enforcement in October
Today
7) Enforced!
FDA is sending
rejection letters!
December 2016
Postmarket Management
of Cybersecurity in Medical
Device
2) Vulnerability Monitoring
and Remediation
Dec
2016
Requirements
Management SBOM
Features Dev. Code Quality
CI / CD Pre-Production
Testing Post-Production Supporting End of Life
Competence
Development
Threat Modeling
Risk Assessment
Implement
cybersecurity features
Static analysis, MISRA
C, etc..
Generation
CWE/CVE check
Validation
Pentesting
Code Signing
Release / Delivery
Key Management
Locking Hardware
Vulnerability
Monitoring
Incident Response
Software Updates
Diagnostic Tools
Secure
Decommissioning
Software Development Lifecycle
Security Development Lifecycle
Legend
7
Secure Product Development Framework (SPDF)
Based on IEC 81001-5-1
Architecture
System
Item Definition
Risk Management
Threat Modeling
SW HW
Requirements
Designs
Network Diagrams
Create DFD
Perform STRIDE
Create Threat Models
List
of
Threats
List of
Mitigations
QA / V&V
Validate Mitigations, Threat Model, and
Mitigations against Threat Model
8
Threat Assessment and Risk Analysis
Feasibility and Impact
Attack
Feasibility
Rating
Prioritize
Threats
(Risk
Assessment)
Impact
Rating
Address
Risk
Accept
Risk
Transfer
Risk
Ignore
Risk
Mitigate
Risk
Manage
Risk
Illegal!
Fix It!
Needs a Claim
Needs a Sharing
Claim
Security by Design & Defense in Depth
“Security by design”
9
security.gov.uk
“Defend in Depth”
Create layered controls across a service
so it’s harder for attackers to fully
compromise the system if a single control
fails or is overcome.
• Process orientated approach to security, seen across
regions and industries
• Written from the perspective of organizations sourcing and
applying security technologies (not building them)
• Regulators are expecting a professional approach to
security needs
• Secure data transfer to/from the device
• Use encryption when appropriate
• Limit access to trusted users
• Differentiate privileges based on role
• Use secure authentication methods
Authentication
Authorization
Confidentiality
Cryptography
Cryptography
Event Detection
and Logging
Resiliency and
Recovery
Updatability
Patchability
(& SBOMs)
FDA CONTROL CATEGORIES
Appendix-1 of the Guidance
10
• Restrict updates to authenticated code
• Generate SBOMs and provide version
identification for firmware
• Protect critical functionality, even when
security has been affected
• Recovery of device configuration by
authorized user
• Authenticate firmware before execution
• Restrict firmware updates to
authenticated code
• Detect and log security events
• Provide notifications of security events to
enable mitigation
Code, Data
Execution
Integrity
Example: Risk Mitigation Using FDA Controls
11
Device
Software Updates
Command/Control Patient Data?
Performance/Logs
App
OS/Platform
TEE
Anomoly
Detection
Secure Boot
VPN
Attacks on Cloud Infrastructure
Social Attack on Operator
…
Network sniffing
Insecure Networks
WiFi Password Loss
Attacks on application code
Attacks on common OS code
Unpatched CVEs
Active Risk Mitigation
Software Update
Secure Boot
Threat
Modelling
Passive Risk Mitigation
Reduce Scope
Do you need to record/send PII?
Can you remove unnecessary features?
Defence in depth:
E.g. TLS over VPN over Secure WiFI
Network protection? (E.g. VPN)
Monitoring (E.g. AnCyR)
TEE (Secure storage/crypto)
VERIFY DEVICE DESIGN
21 CFR 820.30(f), a manufacturer must establish and maintain procedures for
verifying the device design.
VALIDATE DEVICE DESIGN (a.k.a Threat Mitigation)
CFR 820.30(g), a manufacturer must establish and maintain procedures for
validating its device design.
VULNERABILITY TESTING
Testing against know vulnerabilities. Techniques often used include fuzzing,
scanning, robustness across the attack surface
TEST
TEST
TEST
(*) Cybersecurity in Medical Devices: Quality System
Considerations and Content of Premarket Submissions
PENETRATION TESTING
Performed by independent testers (i.e., not involved in the design) using
approaches that adversaries (i.e., hackers) would use.
TEST
What the FDA Says About Testing
A Mix of Quality and Security Requirements
12
Cybersecurity testing is needed
along with functional testing
“Certification” is not yet a requirement,
but may be the easiest way to prove
testing is sufficient
SESIP is an upcoming approach
for cybersecurity certification & testing
PERSPECTIVE: Regulations, Guidance, Standards
21 CFR 820
Quality System Regulation
ISO 13485
Quality Management System
IEC 62304 Software
Development Lifecycle Process
FDA Sept. 2023
Cybersecurity
Guidance
ISO 81001 5-1 Health Software IT Security
ISA 62443 Security for industrial automation and
control systems
ISO 14971 Application of risk
management to medical devices
TIR57 Principles for medical device security - Risk
management
NIST Cybersecurity Framework NIST CSF - NIST800-
30 Risk assessment
UL 2900 1-1 UL Standard for Safety Software
Cybersecurity for Network-Connectable Products
TIR97 Principles for medical device security – Post-
market risk management for device manufacturers
PATCH Act (524b)
MEDICAL DEVICE PILLARS CYBERSECURITY RECENT
AAMI SW96
13
PERSPECTIVE: SBOMs
What’s in my product?
14
xkcd.com
SOFTWARE BILL OF MATERIALS
A list of all open source and
third-party components
in your product
Intent:
Awareness
Vulnerabilities
Remediation
Application:
Standardized format
Automated scanning
NVD -National databases
**BUT, (very) Incomplete
- Packages
- Vulnerabilities
- Mitigations
M
Cybersecurity Process
Secure Product Development Framework (SPDF)
15
Design Controls
Design Inputs
1. Req1
2. Req2
3. Req3
Design outputs
1. Spec1
2. Spec2
3. Spec3
Binaries
Verification Tests
1. Test1
2. Test2
3. Test3
Mitigations
1. Mitigation1
2. Mitigation2
3. Mitigation3
Threat Assessment
1. Threat1
2. Threat2
3. Threat3
Security
Architecture
Architecture Diagrams
Component Analysis
Connectivity
definitions Use Case
Views
Code
Known
Abnormalities
(test failures)
Static
Software
Code
Analysis
Source
SCA
Binary
SCA
SBOM
Triage &
Justifications
Vulnerability
Report
Penetration
Testing
Post Market
Vulnerability
Management Plan
Customer
Transparency Plan
Additional Cyber Testing
- Malformed Input
- Fuzz testing
- Vulnerability chaining
Cybersecurity
Assessment
Security Risk
Management
Report
(Annual)
Security Risk
Management Plan
Security Risk Test
Plan
SPDF
composition
Mitigations
Published
Vulnerabilities
Cybersecurity Deliverables
16
Deliverables
Security Risk System Description
Plans
Risk Management Plan
Risk Test Plan
Vulnerability Management Plan
Customer Transparency Plan
Assessment
Threat Model
Asset List
Risk Assessment
Security Architecture
Architecture views
Global, Multi-Patient, Updatability, Use Case
Post Production file
SBOM (Software Bill of Materials)
CVE Assessment
Security Risk Management Report
Security Requirements
Security Specifications
SCA Analysis
Additional efforts
Field Monitoring
Incident Reporting
SBOM updates
Design History File
Verification &
Validation
Security Risk Management File
Security Risk
Management Plan
Security Testing Results
• Security Requirements Testing
• Threat Mitigation Testing
• Vulnerability testing
• Penetration testing
Security Risk
System Description
Vulnerability
Management Plan
Security Risk
Test Plan
Post Production Information File
• CVEAssessment
• Field Monitoring
• Cybersecurity Metrics
• Incident Reporting
Design Inputs
Design Outputs
Source Code
Binaries
Security Requirements
Security Specifications
Code Analysis
( SCA / BCA)
Security Risk
Assessment
• Analysis
• Evaluation
• Control
• Residual Risk
Security Risk
Management Report
Summarizes:
• Threat model
• Third party software components
• Security assessment of unresolved anomalies
• Testing summary
Security
Architecture
• GlobalSystem View
• Multi-Patient Harm View
• Updatability View
• Security Use case View(s)
Asset List
Threat Model
SBOM
Customer
Transparency Plan
Attempts to Simplify
17
Design History File
Verification &
Validation
Security Risk Management File
Security Risk
Management Plan
Security Testing Results
• Security Requirements Testing
• Threat Mitigation Testing
• Vulnerability testing
• Penetration testing
Security Risk
System Description
Vulnerability
Management Plan
Security Risk
Test Plan
Post Production Information File
• CVEAssessment
• Field Monitoring
• Cybersecurity Metrics
• Incident Reporting
Design Inputs
Design Outputs
Source Code
Binaries
Security Requirements
Security Specifications
Code Analysis
( SCA / BCA)
Security Risk
Assessment
• Analysis
• Evaluation
• Control
• Residual Risk
Security Risk
Management Report
Summarizes:
• Threat model
• Third party software components
• Security assessment of unresolved anomalies
• Testing summary
Security
Architecture
• GlobalSystem View
• Multi-Patient Harm View
• Updatability View
• Security Use case View(s)
Asset List
Threat Model
SBOM
Customer
Transparency Plan
Can we reduce cybersecurity to a couple of
standards and a static process?
Can't we just lock all the
doors and call it a day?
But the FDA wants,..
• Manufacturer vigilance
• Responsible parties
• Deep expertise
• Process transparency
• Defined plans
Encryption
- Cryptographic co-processors (HSM and TPM)
- PKI encryption/authentication
- Cryptographic key management, schemes, tunneling
- Hashes/salting
Authentication
- User accounts / management
- Role based permissions
- Two-factor authentication
Software integrity
- Software update / roll-back
- Root-of-trust (CA)
- Secure boot
Isolation
- Segmented processing zones
- Network isolation
- Distributed processing
Hardening
- I/O line hardening / processor fusing
- OS hardening (ports, processes)
- Processor protections
- Clock anomaly detection
- Memory execution restrictions
- Memory read/write/erase ranges
Services
- Firewall
- Whitelist processes
- Watchdog controlled applications
- Security logging
- Post market monitoring
User Interface
- Data validation / range checking
Protected data
- PII/PHI protections and deidentification
Vote on Future Webinars
18
1. SPDF – Follow a cybersecurity process
2. Threat modeling and risk assessment – Evaluate Risk
3. Security by design & defense in depth – FDA’s Security control
categories
4. Trusted Execution Environment and IDS – Integrity, Resiliency,
Confidentiality, Detection
5. Cyber-testing – What the FDA expects
6. Post Market Requirements – Fixing Vulnerabilities: SBOM –
Updates - Monitoring
7. Bolting On Security – Is there anything that can be done if I already
have a design
8. Cybersecurity documentation for eSTAR submission
19
Thank You
Thank You

More Related Content

What's hot

Opnieuw goed jaar voor bvba Ben Crabbé
Opnieuw goed jaar voor bvba Ben CrabbéOpnieuw goed jaar voor bvba Ben Crabbé
Opnieuw goed jaar voor bvba Ben CrabbéThierry Debels
 
Sistemas de Numeração e Conversão de Bases
Sistemas de Numeração e Conversão de BasesSistemas de Numeração e Conversão de Bases
Sistemas de Numeração e Conversão de BasesLeandro Costa
 
calendario-mensal-2023-02.pdf
calendario-mensal-2023-02.pdfcalendario-mensal-2023-02.pdf
calendario-mensal-2023-02.pdfWalissonSousa6
 
Revista Grupo Águia Branca 70 anos
Revista Grupo Águia Branca 70 anos Revista Grupo Águia Branca 70 anos
Revista Grupo Águia Branca 70 anos Grupo Águia Branca
 
Ocean front resort gafisa
Ocean front resort   gafisaOcean front resort   gafisa
Ocean front resort gafisaMad Mary
 
Portfolio de Campanha Política de Roberto Boca
Portfolio de Campanha Política de Roberto BocaPortfolio de Campanha Política de Roberto Boca
Portfolio de Campanha Política de Roberto BocaRoberto Boca
 
Tutorial circuit maker
Tutorial circuit makerTutorial circuit maker
Tutorial circuit makerIsvaldo Souza
 
Conteúdo programático senai
Conteúdo programático senaiConteúdo programático senai
Conteúdo programático senaiClécio Bubela
 
2019-2 - Algoritmos - Aula 06 A - Tomada de Decisão
2019-2 - Algoritmos - Aula 06 A - Tomada de Decisão2019-2 - Algoritmos - Aula 06 A - Tomada de Decisão
2019-2 - Algoritmos - Aula 06 A - Tomada de DecisãoRodrigo Kiyoshi Saito
 
Lógica de programação pascal
Lógica de programação   pascalLógica de programação   pascal
Lógica de programação pascalJocelma Rios
 

What's hot (11)

Opnieuw goed jaar voor bvba Ben Crabbé
Opnieuw goed jaar voor bvba Ben CrabbéOpnieuw goed jaar voor bvba Ben Crabbé
Opnieuw goed jaar voor bvba Ben Crabbé
 
Sistemas de Numeração e Conversão de Bases
Sistemas de Numeração e Conversão de BasesSistemas de Numeração e Conversão de Bases
Sistemas de Numeração e Conversão de Bases
 
calendario-mensal-2023-02.pdf
calendario-mensal-2023-02.pdfcalendario-mensal-2023-02.pdf
calendario-mensal-2023-02.pdf
 
Revista Grupo Águia Branca 70 anos
Revista Grupo Águia Branca 70 anos Revista Grupo Águia Branca 70 anos
Revista Grupo Águia Branca 70 anos
 
Inglês Técnico Instrumental: Aula 2
Inglês Técnico Instrumental: Aula 2Inglês Técnico Instrumental: Aula 2
Inglês Técnico Instrumental: Aula 2
 
Ocean front resort gafisa
Ocean front resort   gafisaOcean front resort   gafisa
Ocean front resort gafisa
 
Portfolio de Campanha Política de Roberto Boca
Portfolio de Campanha Política de Roberto BocaPortfolio de Campanha Política de Roberto Boca
Portfolio de Campanha Política de Roberto Boca
 
Tutorial circuit maker
Tutorial circuit makerTutorial circuit maker
Tutorial circuit maker
 
Conteúdo programático senai
Conteúdo programático senaiConteúdo programático senai
Conteúdo programático senai
 
2019-2 - Algoritmos - Aula 06 A - Tomada de Decisão
2019-2 - Algoritmos - Aula 06 A - Tomada de Decisão2019-2 - Algoritmos - Aula 06 A - Tomada de Decisão
2019-2 - Algoritmos - Aula 06 A - Tomada de Decisão
 
Lógica de programação pascal
Lógica de programação   pascalLógica de programação   pascal
Lógica de programação pascal
 

Similar to Practical Advice for FDA’s 510(k) Requirements.pdf

Critical Steps in Software Development: Enhance Your Chances for a Successful...
Critical Steps in Software Development: Enhance Your Chances for a Successful...Critical Steps in Software Development: Enhance Your Chances for a Successful...
Critical Steps in Software Development: Enhance Your Chances for a Successful...Sterling Medical Devices
 
Security for Healthcare Devices - Will Your Device Be Good Enough?
Security for Healthcare Devices - Will Your Device Be Good Enough?Security for Healthcare Devices - Will Your Device Be Good Enough?
Security for Healthcare Devices - Will Your Device Be Good Enough?Rio Valdes
 
Security for Healthcare Devices – Will Your Device Be Good Enough?
Security for Healthcare Devices – Will Your Device Be Good Enough?Security for Healthcare Devices – Will Your Device Be Good Enough?
Security for Healthcare Devices – Will Your Device Be Good Enough?Walt Maclay
 
Health apps regulation and quality control case studies and session 2 present...
Health apps regulation and quality control case studies and session 2 present...Health apps regulation and quality control case studies and session 2 present...
Health apps regulation and quality control case studies and session 2 present...3GDR
 
Health apps regulation and quality control case studies and session 2 present...
Health apps regulation and quality control case studies and session 2 present...Health apps regulation and quality control case studies and session 2 present...
Health apps regulation and quality control case studies and session 2 present...3GDR
 
Network Connected Medical Devices - A Case Study
Network Connected Medical Devices - A Case StudyNetwork Connected Medical Devices - A Case Study
Network Connected Medical Devices - A Case StudySophiaPalmira
 
Patient Centric Cyber Monitoring with DocBox and Evolver
Patient Centric Cyber Monitoring with DocBox and EvolverPatient Centric Cyber Monitoring with DocBox and Evolver
Patient Centric Cyber Monitoring with DocBox and EvolverThe Security of Things Forum
 
OmniNet MDS HIPPA Compliance Info
OmniNet MDS HIPPA Compliance InfoOmniNet MDS HIPPA Compliance Info
OmniNet MDS HIPPA Compliance InfoJonathan Eubanks
 
CyberSecurity Medical Devices
CyberSecurity Medical DevicesCyberSecurity Medical Devices
CyberSecurity Medical DevicesSuresh Mandava
 
Endpoint Security for Mobile Devices
Endpoint Security for Mobile DevicesEndpoint Security for Mobile Devices
Endpoint Security for Mobile DevicesDavid Shepherd
 
Computer Software Assurance (CSA): Understanding the FDA’s New Draft Guidance
Computer Software Assurance (CSA): Understanding the FDA’s New Draft GuidanceComputer Software Assurance (CSA): Understanding the FDA’s New Draft Guidance
Computer Software Assurance (CSA): Understanding the FDA’s New Draft GuidanceGreenlight Guru
 
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonSCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonPatricia M Watson
 
Secure Your Medical Devices From the Ground Up
Secure Your Medical Devices From the Ground Up Secure Your Medical Devices From the Ground Up
Secure Your Medical Devices From the Ground Up ICS
 
Building a Product Security Practice in a DevOps World
Building a Product Security Practice in a DevOps WorldBuilding a Product Security Practice in a DevOps World
Building a Product Security Practice in a DevOps WorldArun Prabhakar
 
第7回VEC制御システムサイバーセキュリティカンファレンス
第7回VEC制御システムサイバーセキュリティカンファレンス第7回VEC制御システムサイバーセキュリティカンファレンス
第7回VEC制御システムサイバーセキュリティカンファレンスchomchana trevai
 
Secure Software Development Life Cycle
Secure Software Development Life CycleSecure Software Development Life Cycle
Secure Software Development Life CycleMaurice Dawson
 
Standards based security for energy utilities
Standards based security for energy utilitiesStandards based security for energy utilities
Standards based security for energy utilitiesNirmal Thaliyil
 
Data Security and Confidentiality in eCTD Publishing Tools Safeguarding Sensi...
Data Security and Confidentiality in eCTD Publishing Tools Safeguarding Sensi...Data Security and Confidentiality in eCTD Publishing Tools Safeguarding Sensi...
Data Security and Confidentiality in eCTD Publishing Tools Safeguarding Sensi...JustinFinch11
 
Medical Device Cybersecurity : A Regulatory Perspective
Medical Device Cybersecurity : A Regulatory PerspectiveMedical Device Cybersecurity : A Regulatory Perspective
Medical Device Cybersecurity : A Regulatory PerspectiveJon Lendrum
 
How to Secure Medical Devices presentation.pptx
How to Secure Medical Devices presentation.pptxHow to Secure Medical Devices presentation.pptx
How to Secure Medical Devices presentation.pptxShandevinda
 

Similar to Practical Advice for FDA’s 510(k) Requirements.pdf (20)

Critical Steps in Software Development: Enhance Your Chances for a Successful...
Critical Steps in Software Development: Enhance Your Chances for a Successful...Critical Steps in Software Development: Enhance Your Chances for a Successful...
Critical Steps in Software Development: Enhance Your Chances for a Successful...
 
Security for Healthcare Devices - Will Your Device Be Good Enough?
Security for Healthcare Devices - Will Your Device Be Good Enough?Security for Healthcare Devices - Will Your Device Be Good Enough?
Security for Healthcare Devices - Will Your Device Be Good Enough?
 
Security for Healthcare Devices – Will Your Device Be Good Enough?
Security for Healthcare Devices – Will Your Device Be Good Enough?Security for Healthcare Devices – Will Your Device Be Good Enough?
Security for Healthcare Devices – Will Your Device Be Good Enough?
 
Health apps regulation and quality control case studies and session 2 present...
Health apps regulation and quality control case studies and session 2 present...Health apps regulation and quality control case studies and session 2 present...
Health apps regulation and quality control case studies and session 2 present...
 
Health apps regulation and quality control case studies and session 2 present...
Health apps regulation and quality control case studies and session 2 present...Health apps regulation and quality control case studies and session 2 present...
Health apps regulation and quality control case studies and session 2 present...
 
Network Connected Medical Devices - A Case Study
Network Connected Medical Devices - A Case StudyNetwork Connected Medical Devices - A Case Study
Network Connected Medical Devices - A Case Study
 
Patient Centric Cyber Monitoring with DocBox and Evolver
Patient Centric Cyber Monitoring with DocBox and EvolverPatient Centric Cyber Monitoring with DocBox and Evolver
Patient Centric Cyber Monitoring with DocBox and Evolver
 
OmniNet MDS HIPPA Compliance Info
OmniNet MDS HIPPA Compliance InfoOmniNet MDS HIPPA Compliance Info
OmniNet MDS HIPPA Compliance Info
 
CyberSecurity Medical Devices
CyberSecurity Medical DevicesCyberSecurity Medical Devices
CyberSecurity Medical Devices
 
Endpoint Security for Mobile Devices
Endpoint Security for Mobile DevicesEndpoint Security for Mobile Devices
Endpoint Security for Mobile Devices
 
Computer Software Assurance (CSA): Understanding the FDA’s New Draft Guidance
Computer Software Assurance (CSA): Understanding the FDA’s New Draft GuidanceComputer Software Assurance (CSA): Understanding the FDA’s New Draft Guidance
Computer Software Assurance (CSA): Understanding the FDA’s New Draft Guidance
 
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonSCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
 
Secure Your Medical Devices From the Ground Up
Secure Your Medical Devices From the Ground Up Secure Your Medical Devices From the Ground Up
Secure Your Medical Devices From the Ground Up
 
Building a Product Security Practice in a DevOps World
Building a Product Security Practice in a DevOps WorldBuilding a Product Security Practice in a DevOps World
Building a Product Security Practice in a DevOps World
 
第7回VEC制御システムサイバーセキュリティカンファレンス
第7回VEC制御システムサイバーセキュリティカンファレンス第7回VEC制御システムサイバーセキュリティカンファレンス
第7回VEC制御システムサイバーセキュリティカンファレンス
 
Secure Software Development Life Cycle
Secure Software Development Life CycleSecure Software Development Life Cycle
Secure Software Development Life Cycle
 
Standards based security for energy utilities
Standards based security for energy utilitiesStandards based security for energy utilities
Standards based security for energy utilities
 
Data Security and Confidentiality in eCTD Publishing Tools Safeguarding Sensi...
Data Security and Confidentiality in eCTD Publishing Tools Safeguarding Sensi...Data Security and Confidentiality in eCTD Publishing Tools Safeguarding Sensi...
Data Security and Confidentiality in eCTD Publishing Tools Safeguarding Sensi...
 
Medical Device Cybersecurity : A Regulatory Perspective
Medical Device Cybersecurity : A Regulatory PerspectiveMedical Device Cybersecurity : A Regulatory Perspective
Medical Device Cybersecurity : A Regulatory Perspective
 
How to Secure Medical Devices presentation.pptx
How to Secure Medical Devices presentation.pptxHow to Secure Medical Devices presentation.pptx
How to Secure Medical Devices presentation.pptx
 

More from ICS

Accelerating Development of a Safety-Critical Cobot Welding System with Qt/QM...
Accelerating Development of a Safety-Critical Cobot Welding System with Qt/QM...Accelerating Development of a Safety-Critical Cobot Welding System with Qt/QM...
Accelerating Development of a Safety-Critical Cobot Welding System with Qt/QM...ICS
 
Overcoming CMake Configuration Issues Webinar
Overcoming CMake Configuration Issues WebinarOvercoming CMake Configuration Issues Webinar
Overcoming CMake Configuration Issues WebinarICS
 
Enhancing Quality and Test in Medical Device Design - Part 2.pdf
Enhancing Quality and Test in Medical Device Design - Part 2.pdfEnhancing Quality and Test in Medical Device Design - Part 2.pdf
Enhancing Quality and Test in Medical Device Design - Part 2.pdfICS
 
Designing and Managing IoT Devices for Rapid Deployment - Webinar.pdf
Designing and Managing IoT Devices for Rapid Deployment - Webinar.pdfDesigning and Managing IoT Devices for Rapid Deployment - Webinar.pdf
Designing and Managing IoT Devices for Rapid Deployment - Webinar.pdfICS
 
Quality and Test in Medical Device Design - Part 1.pdf
Quality and Test in Medical Device Design - Part 1.pdfQuality and Test in Medical Device Design - Part 1.pdf
Quality and Test in Medical Device Design - Part 1.pdfICS
 
Creating Digital Twins Using Rapid Development Techniques.pdf
Creating Digital Twins Using Rapid Development Techniques.pdfCreating Digital Twins Using Rapid Development Techniques.pdf
Creating Digital Twins Using Rapid Development Techniques.pdfICS
 
Cybersecurity and Software Updates in Medical Devices.pdf
Cybersecurity and Software Updates in Medical Devices.pdfCybersecurity and Software Updates in Medical Devices.pdf
Cybersecurity and Software Updates in Medical Devices.pdfICS
 
MDG Panel - Creating Expert Level GUIs for Complex Medical Devices
MDG Panel - Creating Expert Level GUIs for Complex Medical DevicesMDG Panel - Creating Expert Level GUIs for Complex Medical Devices
MDG Panel - Creating Expert Level GUIs for Complex Medical DevicesICS
 
How to Craft a Winning IOT Device Management Solution
How to Craft a Winning IOT Device Management SolutionHow to Craft a Winning IOT Device Management Solution
How to Craft a Winning IOT Device Management SolutionICS
 
Bridging the Gap Between Development and Regulatory Teams
Bridging the Gap Between Development and Regulatory TeamsBridging the Gap Between Development and Regulatory Teams
Bridging the Gap Between Development and Regulatory TeamsICS
 
IoT Device Fleet Management: Create a Robust Solution with Azure
IoT Device Fleet Management: Create a Robust Solution with AzureIoT Device Fleet Management: Create a Robust Solution with Azure
IoT Device Fleet Management: Create a Robust Solution with AzureICS
 
Basic Cmake for Qt Users
Basic Cmake for Qt UsersBasic Cmake for Qt Users
Basic Cmake for Qt UsersICS
 
Software Update Mechanisms: Selecting the Best Solutin for Your Embedded Linu...
Software Update Mechanisms: Selecting the Best Solutin for Your Embedded Linu...Software Update Mechanisms: Selecting the Best Solutin for Your Embedded Linu...
Software Update Mechanisms: Selecting the Best Solutin for Your Embedded Linu...ICS
 
Qt Installer Framework
Qt Installer FrameworkQt Installer Framework
Qt Installer FrameworkICS
 
Bridging the Gap Between Development and Regulatory Teams
Bridging the Gap Between Development and Regulatory TeamsBridging the Gap Between Development and Regulatory Teams
Bridging the Gap Between Development and Regulatory TeamsICS
 
Overcome Hardware And Software Challenges - Medical Device Case Study
Overcome Hardware And Software Challenges - Medical Device Case StudyOvercome Hardware And Software Challenges - Medical Device Case Study
Overcome Hardware And Software Challenges - Medical Device Case StudyICS
 
User Experience Design for IoT
User Experience Design for IoTUser Experience Design for IoT
User Experience Design for IoTICS
 
Software Bill of Materials - Accelerating Your Secure Embedded Development.pdf
Software Bill of Materials - Accelerating Your Secure Embedded Development.pdfSoftware Bill of Materials - Accelerating Your Secure Embedded Development.pdf
Software Bill of Materials - Accelerating Your Secure Embedded Development.pdfICS
 
5 Key Considerations at the Start of SaMD Development
5 Key Considerations at the Start of SaMD Development5 Key Considerations at the Start of SaMD Development
5 Key Considerations at the Start of SaMD DevelopmentICS
 
An In-Depth Look Into Microcontrollers
An In-Depth Look Into MicrocontrollersAn In-Depth Look Into Microcontrollers
An In-Depth Look Into MicrocontrollersICS
 

More from ICS (20)

Accelerating Development of a Safety-Critical Cobot Welding System with Qt/QM...
Accelerating Development of a Safety-Critical Cobot Welding System with Qt/QM...Accelerating Development of a Safety-Critical Cobot Welding System with Qt/QM...
Accelerating Development of a Safety-Critical Cobot Welding System with Qt/QM...
 
Overcoming CMake Configuration Issues Webinar
Overcoming CMake Configuration Issues WebinarOvercoming CMake Configuration Issues Webinar
Overcoming CMake Configuration Issues Webinar
 
Enhancing Quality and Test in Medical Device Design - Part 2.pdf
Enhancing Quality and Test in Medical Device Design - Part 2.pdfEnhancing Quality and Test in Medical Device Design - Part 2.pdf
Enhancing Quality and Test in Medical Device Design - Part 2.pdf
 
Designing and Managing IoT Devices for Rapid Deployment - Webinar.pdf
Designing and Managing IoT Devices for Rapid Deployment - Webinar.pdfDesigning and Managing IoT Devices for Rapid Deployment - Webinar.pdf
Designing and Managing IoT Devices for Rapid Deployment - Webinar.pdf
 
Quality and Test in Medical Device Design - Part 1.pdf
Quality and Test in Medical Device Design - Part 1.pdfQuality and Test in Medical Device Design - Part 1.pdf
Quality and Test in Medical Device Design - Part 1.pdf
 
Creating Digital Twins Using Rapid Development Techniques.pdf
Creating Digital Twins Using Rapid Development Techniques.pdfCreating Digital Twins Using Rapid Development Techniques.pdf
Creating Digital Twins Using Rapid Development Techniques.pdf
 
Cybersecurity and Software Updates in Medical Devices.pdf
Cybersecurity and Software Updates in Medical Devices.pdfCybersecurity and Software Updates in Medical Devices.pdf
Cybersecurity and Software Updates in Medical Devices.pdf
 
MDG Panel - Creating Expert Level GUIs for Complex Medical Devices
MDG Panel - Creating Expert Level GUIs for Complex Medical DevicesMDG Panel - Creating Expert Level GUIs for Complex Medical Devices
MDG Panel - Creating Expert Level GUIs for Complex Medical Devices
 
How to Craft a Winning IOT Device Management Solution
How to Craft a Winning IOT Device Management SolutionHow to Craft a Winning IOT Device Management Solution
How to Craft a Winning IOT Device Management Solution
 
Bridging the Gap Between Development and Regulatory Teams
Bridging the Gap Between Development and Regulatory TeamsBridging the Gap Between Development and Regulatory Teams
Bridging the Gap Between Development and Regulatory Teams
 
IoT Device Fleet Management: Create a Robust Solution with Azure
IoT Device Fleet Management: Create a Robust Solution with AzureIoT Device Fleet Management: Create a Robust Solution with Azure
IoT Device Fleet Management: Create a Robust Solution with Azure
 
Basic Cmake for Qt Users
Basic Cmake for Qt UsersBasic Cmake for Qt Users
Basic Cmake for Qt Users
 
Software Update Mechanisms: Selecting the Best Solutin for Your Embedded Linu...
Software Update Mechanisms: Selecting the Best Solutin for Your Embedded Linu...Software Update Mechanisms: Selecting the Best Solutin for Your Embedded Linu...
Software Update Mechanisms: Selecting the Best Solutin for Your Embedded Linu...
 
Qt Installer Framework
Qt Installer FrameworkQt Installer Framework
Qt Installer Framework
 
Bridging the Gap Between Development and Regulatory Teams
Bridging the Gap Between Development and Regulatory TeamsBridging the Gap Between Development and Regulatory Teams
Bridging the Gap Between Development and Regulatory Teams
 
Overcome Hardware And Software Challenges - Medical Device Case Study
Overcome Hardware And Software Challenges - Medical Device Case StudyOvercome Hardware And Software Challenges - Medical Device Case Study
Overcome Hardware And Software Challenges - Medical Device Case Study
 
User Experience Design for IoT
User Experience Design for IoTUser Experience Design for IoT
User Experience Design for IoT
 
Software Bill of Materials - Accelerating Your Secure Embedded Development.pdf
Software Bill of Materials - Accelerating Your Secure Embedded Development.pdfSoftware Bill of Materials - Accelerating Your Secure Embedded Development.pdf
Software Bill of Materials - Accelerating Your Secure Embedded Development.pdf
 
5 Key Considerations at the Start of SaMD Development
5 Key Considerations at the Start of SaMD Development5 Key Considerations at the Start of SaMD Development
5 Key Considerations at the Start of SaMD Development
 
An In-Depth Look Into Microcontrollers
An In-Depth Look Into MicrocontrollersAn In-Depth Look Into Microcontrollers
An In-Depth Look Into Microcontrollers
 

Recently uploaded

What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...Technogeeks
 
How to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationHow to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationBradBedford3
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 
A healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfA healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfMarharyta Nedzelska
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfFerryKemperman
 
How to Track Employee Performance A Comprehensive Guide.pdf
How to Track Employee Performance A Comprehensive Guide.pdfHow to Track Employee Performance A Comprehensive Guide.pdf
How to Track Employee Performance A Comprehensive Guide.pdfLivetecs LLC
 
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...OnePlan Solutions
 
CRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceCRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceBrainSell Technologies
 
What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....kzayra69
 
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Matt Ray
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
Odoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 EnterpriseOdoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 Enterprisepreethippts
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Hr365.us smith
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesŁukasz Chruściel
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Cizo Technology Services
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样umasea
 
Buds n Tech IT Solutions: Top-Notch Web Services in Noida
Buds n Tech IT Solutions: Top-Notch Web Services in NoidaBuds n Tech IT Solutions: Top-Notch Web Services in Noida
Buds n Tech IT Solutions: Top-Notch Web Services in Noidabntitsolutionsrishis
 

Recently uploaded (20)

What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...
 
How to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion ApplicationHow to submit a standout Adobe Champion Application
How to submit a standout Adobe Champion Application
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 
A healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfA healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdf
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdf
 
How to Track Employee Performance A Comprehensive Guide.pdf
How to Track Employee Performance A Comprehensive Guide.pdfHow to Track Employee Performance A Comprehensive Guide.pdf
How to Track Employee Performance A Comprehensive Guide.pdf
 
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
Tech Tuesday - Mastering Time Management Unlock the Power of OnePlan's Timesh...
 
CRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceCRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. Salesforce
 
What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....What are the key points to focus on before starting to learn ETL Development....
What are the key points to focus on before starting to learn ETL Development....
 
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
Open Source Summit NA 2024: Open Source Cloud Costs - OpenCost's Impact on En...
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
Odoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 EnterpriseOdoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 Enterprise
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)Recruitment Management Software Benefits (Infographic)
Recruitment Management Software Benefits (Infographic)
 
2.pdf Ejercicios de programación competitiva
2.pdf Ejercicios de programación competitiva2.pdf Ejercicios de programación competitiva
2.pdf Ejercicios de programación competitiva
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New Features
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
 
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
办理学位证(UQ文凭证书)昆士兰大学毕业证成绩单原版一模一样
 
Buds n Tech IT Solutions: Top-Notch Web Services in Noida
Buds n Tech IT Solutions: Top-Notch Web Services in NoidaBuds n Tech IT Solutions: Top-Notch Web Services in Noida
Buds n Tech IT Solutions: Top-Notch Web Services in Noida
 

Practical Advice for FDA’s 510(k) Requirements.pdf

  • 1. Cybersecurity in Medical Devices Practical Advice for FDA’s 510(k) Requirements
  • 2. About Us 2 Trustonic Secure Platform provides a certified solution for the storage and management of security or privacy sensitive data. This can be used to protect cryptographic keys and patient information ensuring devices use best in class security. It can also be used to provide defense in depth to protect other systems, such as secure communications or intrusion detection, and enable secure manufacture and tracking of devices throughout their lifecycle. BG Networks equips embedded engineers and penetration testers with easy-to-use software automation tools to streamline cybersecurity tasks including hardening, detection, and testing. BG Networks automation tools are designed to help with adherence to regulations from the FDA, NIST, ISO, and the EU. ICS supports our customers with software development, User experience design, platform and regulatory support to build next generation products. We provide a number of services focused on the medtech space including human factors engineering with a 62366 compliant process, hazard and risk analysis, 62304 compliant software development, and platform support including cybersecurity.
  • 3. Speaker Introductions 3 Chief Strategy and Innovations Officer for Secure Platform Founder & CEO Director of Medical Programs & Cybersecurity
  • 4. Agenda • Why is the FDA requiring cybersecurity - How did we get here? • Secure Product Development Framework (SPDF) – What is it? • Threat Modeling and Risk Assessment – Consider Likelihood and Impact. • Security Controls FDA Will Be Looking For – From Authentication to Updateability • Cybersecurity Testing – What is the FDA asking for? • Standards, Standards, Standards – Overview of the many to choose from • SBOMs – What are they? • Pulling it All Together – A single page view of the process and evidence created • Deliverable for the FDA – What do you need to submit for cybersecurity. 4
  • 5. Why The FDA Asked for Cybersecurity Statutory Authority 5 5 Cyber threats can, have, and do pose patient safety risks to the healthcare sector A Slide from Jessica Wilkerson of the FDA
  • 6. FDA Has Legal Mandate to Enforce Cybersecurity How Did We Get Here 6 Oct 2014 April 2022 Dec 2022 March 2023 September 2023 Today October 2014 Cybersecurity in Medical Devices 1) FDA’s first guidance for cybersecurity in medical devices December 29 - 2022 Protecting & Transforming Cyber Healthcare Act (PATCH) – Part of Omnibus Bill Section 524b added to FD&C Act 4) FDA given statutory power to enforce cybersecurity in med devices April 2022 (draft) Cybersecurity in Medical Devices: Premarket Submissions 3) Basis for 2023 Final Version March 2023 FDA releases: Refuse to Accept Policy for Cyber 5) Industry put on notice that the FDA is serious September 2023 (Final) From the FDA: Cybersecurity in Medical Devices 6) Final version in preparation for enforcement in October Today 7) Enforced! FDA is sending rejection letters! December 2016 Postmarket Management of Cybersecurity in Medical Device 2) Vulnerability Monitoring and Remediation Dec 2016
  • 7. Requirements Management SBOM Features Dev. Code Quality CI / CD Pre-Production Testing Post-Production Supporting End of Life Competence Development Threat Modeling Risk Assessment Implement cybersecurity features Static analysis, MISRA C, etc.. Generation CWE/CVE check Validation Pentesting Code Signing Release / Delivery Key Management Locking Hardware Vulnerability Monitoring Incident Response Software Updates Diagnostic Tools Secure Decommissioning Software Development Lifecycle Security Development Lifecycle Legend 7 Secure Product Development Framework (SPDF) Based on IEC 81001-5-1
  • 8. Architecture System Item Definition Risk Management Threat Modeling SW HW Requirements Designs Network Diagrams Create DFD Perform STRIDE Create Threat Models List of Threats List of Mitigations QA / V&V Validate Mitigations, Threat Model, and Mitigations against Threat Model 8 Threat Assessment and Risk Analysis Feasibility and Impact Attack Feasibility Rating Prioritize Threats (Risk Assessment) Impact Rating Address Risk Accept Risk Transfer Risk Ignore Risk Mitigate Risk Manage Risk Illegal! Fix It! Needs a Claim Needs a Sharing Claim
  • 9. Security by Design & Defense in Depth “Security by design” 9 security.gov.uk “Defend in Depth” Create layered controls across a service so it’s harder for attackers to fully compromise the system if a single control fails or is overcome. • Process orientated approach to security, seen across regions and industries • Written from the perspective of organizations sourcing and applying security technologies (not building them) • Regulators are expecting a professional approach to security needs
  • 10. • Secure data transfer to/from the device • Use encryption when appropriate • Limit access to trusted users • Differentiate privileges based on role • Use secure authentication methods Authentication Authorization Confidentiality Cryptography Cryptography Event Detection and Logging Resiliency and Recovery Updatability Patchability (& SBOMs) FDA CONTROL CATEGORIES Appendix-1 of the Guidance 10 • Restrict updates to authenticated code • Generate SBOMs and provide version identification for firmware • Protect critical functionality, even when security has been affected • Recovery of device configuration by authorized user • Authenticate firmware before execution • Restrict firmware updates to authenticated code • Detect and log security events • Provide notifications of security events to enable mitigation Code, Data Execution Integrity
  • 11. Example: Risk Mitigation Using FDA Controls 11 Device Software Updates Command/Control Patient Data? Performance/Logs App OS/Platform TEE Anomoly Detection Secure Boot VPN Attacks on Cloud Infrastructure Social Attack on Operator … Network sniffing Insecure Networks WiFi Password Loss Attacks on application code Attacks on common OS code Unpatched CVEs Active Risk Mitigation Software Update Secure Boot Threat Modelling Passive Risk Mitigation Reduce Scope Do you need to record/send PII? Can you remove unnecessary features? Defence in depth: E.g. TLS over VPN over Secure WiFI Network protection? (E.g. VPN) Monitoring (E.g. AnCyR) TEE (Secure storage/crypto)
  • 12. VERIFY DEVICE DESIGN 21 CFR 820.30(f), a manufacturer must establish and maintain procedures for verifying the device design. VALIDATE DEVICE DESIGN (a.k.a Threat Mitigation) CFR 820.30(g), a manufacturer must establish and maintain procedures for validating its device design. VULNERABILITY TESTING Testing against know vulnerabilities. Techniques often used include fuzzing, scanning, robustness across the attack surface TEST TEST TEST (*) Cybersecurity in Medical Devices: Quality System Considerations and Content of Premarket Submissions PENETRATION TESTING Performed by independent testers (i.e., not involved in the design) using approaches that adversaries (i.e., hackers) would use. TEST What the FDA Says About Testing A Mix of Quality and Security Requirements 12 Cybersecurity testing is needed along with functional testing “Certification” is not yet a requirement, but may be the easiest way to prove testing is sufficient SESIP is an upcoming approach for cybersecurity certification & testing
  • 13. PERSPECTIVE: Regulations, Guidance, Standards 21 CFR 820 Quality System Regulation ISO 13485 Quality Management System IEC 62304 Software Development Lifecycle Process FDA Sept. 2023 Cybersecurity Guidance ISO 81001 5-1 Health Software IT Security ISA 62443 Security for industrial automation and control systems ISO 14971 Application of risk management to medical devices TIR57 Principles for medical device security - Risk management NIST Cybersecurity Framework NIST CSF - NIST800- 30 Risk assessment UL 2900 1-1 UL Standard for Safety Software Cybersecurity for Network-Connectable Products TIR97 Principles for medical device security – Post- market risk management for device manufacturers PATCH Act (524b) MEDICAL DEVICE PILLARS CYBERSECURITY RECENT AAMI SW96 13
  • 14. PERSPECTIVE: SBOMs What’s in my product? 14 xkcd.com SOFTWARE BILL OF MATERIALS A list of all open source and third-party components in your product Intent: Awareness Vulnerabilities Remediation Application: Standardized format Automated scanning NVD -National databases **BUT, (very) Incomplete - Packages - Vulnerabilities - Mitigations
  • 15. M Cybersecurity Process Secure Product Development Framework (SPDF) 15 Design Controls Design Inputs 1. Req1 2. Req2 3. Req3 Design outputs 1. Spec1 2. Spec2 3. Spec3 Binaries Verification Tests 1. Test1 2. Test2 3. Test3 Mitigations 1. Mitigation1 2. Mitigation2 3. Mitigation3 Threat Assessment 1. Threat1 2. Threat2 3. Threat3 Security Architecture Architecture Diagrams Component Analysis Connectivity definitions Use Case Views Code Known Abnormalities (test failures) Static Software Code Analysis Source SCA Binary SCA SBOM Triage & Justifications Vulnerability Report Penetration Testing Post Market Vulnerability Management Plan Customer Transparency Plan Additional Cyber Testing - Malformed Input - Fuzz testing - Vulnerability chaining Cybersecurity Assessment Security Risk Management Report (Annual) Security Risk Management Plan Security Risk Test Plan SPDF composition Mitigations Published Vulnerabilities
  • 16. Cybersecurity Deliverables 16 Deliverables Security Risk System Description Plans Risk Management Plan Risk Test Plan Vulnerability Management Plan Customer Transparency Plan Assessment Threat Model Asset List Risk Assessment Security Architecture Architecture views Global, Multi-Patient, Updatability, Use Case Post Production file SBOM (Software Bill of Materials) CVE Assessment Security Risk Management Report Security Requirements Security Specifications SCA Analysis Additional efforts Field Monitoring Incident Reporting SBOM updates Design History File Verification & Validation Security Risk Management File Security Risk Management Plan Security Testing Results • Security Requirements Testing • Threat Mitigation Testing • Vulnerability testing • Penetration testing Security Risk System Description Vulnerability Management Plan Security Risk Test Plan Post Production Information File • CVEAssessment • Field Monitoring • Cybersecurity Metrics • Incident Reporting Design Inputs Design Outputs Source Code Binaries Security Requirements Security Specifications Code Analysis ( SCA / BCA) Security Risk Assessment • Analysis • Evaluation • Control • Residual Risk Security Risk Management Report Summarizes: • Threat model • Third party software components • Security assessment of unresolved anomalies • Testing summary Security Architecture • GlobalSystem View • Multi-Patient Harm View • Updatability View • Security Use case View(s) Asset List Threat Model SBOM Customer Transparency Plan
  • 17. Attempts to Simplify 17 Design History File Verification & Validation Security Risk Management File Security Risk Management Plan Security Testing Results • Security Requirements Testing • Threat Mitigation Testing • Vulnerability testing • Penetration testing Security Risk System Description Vulnerability Management Plan Security Risk Test Plan Post Production Information File • CVEAssessment • Field Monitoring • Cybersecurity Metrics • Incident Reporting Design Inputs Design Outputs Source Code Binaries Security Requirements Security Specifications Code Analysis ( SCA / BCA) Security Risk Assessment • Analysis • Evaluation • Control • Residual Risk Security Risk Management Report Summarizes: • Threat model • Third party software components • Security assessment of unresolved anomalies • Testing summary Security Architecture • GlobalSystem View • Multi-Patient Harm View • Updatability View • Security Use case View(s) Asset List Threat Model SBOM Customer Transparency Plan Can we reduce cybersecurity to a couple of standards and a static process? Can't we just lock all the doors and call it a day? But the FDA wants,.. • Manufacturer vigilance • Responsible parties • Deep expertise • Process transparency • Defined plans Encryption - Cryptographic co-processors (HSM and TPM) - PKI encryption/authentication - Cryptographic key management, schemes, tunneling - Hashes/salting Authentication - User accounts / management - Role based permissions - Two-factor authentication Software integrity - Software update / roll-back - Root-of-trust (CA) - Secure boot Isolation - Segmented processing zones - Network isolation - Distributed processing Hardening - I/O line hardening / processor fusing - OS hardening (ports, processes) - Processor protections - Clock anomaly detection - Memory execution restrictions - Memory read/write/erase ranges Services - Firewall - Whitelist processes - Watchdog controlled applications - Security logging - Post market monitoring User Interface - Data validation / range checking Protected data - PII/PHI protections and deidentification
  • 18. Vote on Future Webinars 18 1. SPDF – Follow a cybersecurity process 2. Threat modeling and risk assessment – Evaluate Risk 3. Security by design & defense in depth – FDA’s Security control categories 4. Trusted Execution Environment and IDS – Integrity, Resiliency, Confidentiality, Detection 5. Cyber-testing – What the FDA expects 6. Post Market Requirements – Fixing Vulnerabilities: SBOM – Updates - Monitoring 7. Bolting On Security – Is there anything that can be done if I already have a design 8. Cybersecurity documentation for eSTAR submission