Cybersecurity Checklist Meddevice ICS
Cybersecurity Checklist Meddevice ICS
Heightened Cybersecurity Compliance Now The latest guidance has nearly doubled in size from the previous version
and includes a suite of standards, processes, plans, analyses, and
Required for New Medical Devices reports. This document endeavors to itemize them and demonstrate the
relationship between them.
New federal regulation applied in March 2023 as part of the PATCH Act Broadly speaking, the FDA's expectations have expanded to consider the
(Protecting and Transforming Cyber Health Care) mandates elevated life cycle of cybersecurity design, urging manufacturers to implement
levels of cybersecurity compliance for new medical devices. The processes before, during and after the development process.
mandate applies to medical devices that have software or that are
The common strategy of "air-gapping" the device (eliminating network
designed to be connected to the internet.
connectivity) in an attempt to avoid cybersecurity requirements is no
The regulations are based on the FDA's guidance from April 2022 entitled longer a viable approach. Per the PATCH Act, if the device includes
Cybersecurity in Medical Devices: Quality System Considerations and software/firmware it is considered a cyber-device and needs to comply
Content of Premarket Submissions, which represents the third attempt with the new guidance.
at crafting guidance to keep up with the rapidly evolving cyber-threats
Further, some of the requirements extend to the RTA (Refuse to Accept)
that result in ransomware and stolen consumer data. The FDA has been
phase of the submission process, meaning the FDA won't even consider
granted new authority to regulate cybersecurity in these medical
applications that don't include the initial planning elements. This
devices and has been rapidly evolving guidance to this effect.
criterion is effective as of October 2023.
As medical devices grow increasingly connected, so too does the risk posed by
cybersecurity breaches – risk that could impact patient safety. The FDA’s
guidance on cybersecurity is intended to ensure the safety and performance of
medical devices without hindering innovation.
02 | Checklist for Cybersecurity Documentation
- 21 CFR 820.30
04. Federal Regulations, Quality System Regulation
www.ics.com/medical
By 2028, the global Internet of Medical Things (IoMT) market is expected to reach $187.60
billion, up from $41.17 billion in 2020. According to a 2022 report, 53% of digital medical
devices and other internet-connected products used in hospitals had known critical
vulnerabilities caused by issues including unpatched and outdated software.
www.ics.com/medical
04 | Checklist for Cybersecurity Documentation
www.ics.com/medical
The new cybersecurity requirements do not apply to a submission to the
FDA before March 29, 2023. However, if a cyber device was previously
authorized and the manufacturer is now making a change to the device
that requires premarket review by the agency, the law applies to the
new premarket submission.
Security Risk System Description: Description of the device, Security Architecture: A documented network architecture with
intended use, security operating environment, reasonably supporting architecture views: Global System View, Multi-patient
foreseeable misuse, qualitative and quantitative characteristics of Harm View, Updatability View, Security Use Case Views.
the system that could affect the security of the medical device.
Security Risk Test Plan: All forms of anticipated testing, including
Security Risk Management Plan: Central document that lays out security requirements testing, threat mitigation testing,
all intended activities for identifying and mitigating security risks, vulnerability testing and penetration testing.
including plans for a security risk assessment and mitigating
controls. Vulnerability Management Plan: A plan for how device
manufacturers will identify and communicate vulnerabilities
Security Risk Assessment: Risk analysis, boundaries of discovered throughout the product life cycle. The plan should
assessment threat modeling, scoring system, risk model, and specify: personnel responsible for executing the plan, frequency
analysis approach (asset, threat, vulnerability). of monitoring for threats, timeline for remediation, update
processes, and Coordinated Vulnerability Disclosure (CVD).
Threat Model: This is a diagrammatic approach to representing
the attack surface in a system, and systematically compiling Customer Transparency Plan: Communicates relevant security
threats identified in the model. information about the device to its users. This is typically
conveyed as product labeling but contains information about the
Asset List: This list encompasses every element in the system cybersecurity characteristics in the intended use environment. It
that could be co-opted or exploited. also contains a spectrum of information from Software Bill of
Materials (SBOM) to decommissioning information. See section
VI.A in the FDA guidance for detailed information.
www.ics.com/medical
08 | Checklist for Cybersecurity Documentation
Cybersecurity Metrics: Capturing and tracking key cybersecurity Code Analysis: Source Code Analysis and Binary Code Analysis
performance indicators, such as length of time to patch leads to creation of the SBOM.
cybersecurity issues, and frequency and severity of issues for
SBOM components.
www.ics.com/medical
Summary
The FDA's 2022 cybersecurity guidance is comprehensive and
strongly emphasizes the importance of early-stage integration of
security measures during medical device development and the
necessity of post-market vigilance.
However, the actual implementation of this guidance presents
challenges for manufacturers, as the specifics need to be drawn
from several standards and reports with overlapping but subtly
different content. A representative and coherent set of
documentation has been presented that meets the main set of
requirements, but a selective approach is still warranted to size
this to a specific product and achieve the best balance of effort
and value.
www.ics.com/medical
Developing a Medical Device?
For assistance complying with the FDA’s guidance on medical device
cybersecurity, reach out to our experienced regulatory team.
617.621.0060
ICS’ device cybersecurity experts can help you safeguard your medical device and streamline compliance with FDA guidance. We offer:
▪ Gap analysis for FDA’s April 2022 guidance ▪ Secure Product Development Framework (SPDF) compliance
▪ Threat modeling assessments ▪ Manufacturer’s Disclosure Statement for Medical Device
▪ Monitoring & annual cybersecurity report Security (MDS)
▪ Software Bill of Materials (SBOM) generation ▪ Static analysis compliance & report
▪ Submission or pre-submission documentation ▪ UL 2900 assessment
Integrated Computer Solutions, Inc. (ICS) | 230 Second Avenue. Waltham, MA 02451 | 617.621.0060 | www.ics.com/medical
©2023 Integrated Computer Solutions, Inc. All trademarks and registered trademarks are the property of their respective owners | ICS Terms of Service (www.ics.com/tos)
091823
www.ics.com/medical