Questionnaire Cybersecurity For Medical Devices Technical Documentation
Questionnaire Cybersecurity For Medical Devices Technical Documentation
Documentation”
Version 1, dated 21st of March, 2023
1. Preliminary remarks
• This document was compiled by the German Notified Bodies Alliance
(“Interessengemeinschaft der Benannten Stellen für Medizinprodukte in
Deutschland”, IG-NB) and is intended to serve as orientation for Notified Bodies,
manufacturers and interested parties. It makes no claim to completeness or
mandatory application.
• This document covers assessments of Technical Documentation for MDR / IVDR.
Not all requirements of MDR, IVDR and MDCG 2019-16 are covered in this
document.
• Created by Jan Küfner (TÜV SÜD), Dr. Abtin Rad (TÜV SÜD), Dr. Andreas Schwab
(TÜV Rheinland), Volker Sudmann (mdc medical device certification), Markus
Bianchi (DNV Medcert), Martin Tettke (Berlin Cert), Michael Bothe (DQS Med), Mark
Küller (TÜV-Verband / IG-NB). It replaces the previous version “IT Security for
Medical Devices“ (Version 5, 09.06.2022).
• Questions regarding the security risks of artificial intelligence can be found in latest
version of IG-NB’s “Questionnaire Artificial Intelligence (AI) in Medical Devices”.
• Compliance to IEC 81001-5-1 is not expected, however recommended, prior to the
end of its transition period. Compliance to IEC 81001-5-1 prior its transition period
is however recommended. In the following tables IEC 81001-5-1 is mentioned only
for complementary purposes. Questions for manufacturers are solely based on the
current requirements (MDR, IVDR, MDCG 2019-16)
• Since cybersecurity evolves on a regulatory and technological level, this document is
intended to reflect the current state of the art at the time of creation only.
References:
• Regulation (EU) 2017/745 (MDR), dated 5 April 2017
• MDCG 2019-16 - Guidance on Cybersecurity for medical devices, Rev. 1, 2020-07
• IEC 62304:2006-05 Medical device software - Software life cycle processes
• IEC 81001-5-1:2021-12 Health software and health IT systems safety, effectiveness
and security — Part 5-1: Security — Activities in the product life cycle
2. System Description
It
e Sour Requirement( IG-NB
m ce s) Commentary Manufacturer Reference for Compliance
2. Stat An Is an Yes, see:- Software development plan-
1 e of appropriate appropriate Software architecture
It
e Sour Requirement( IG-NB
m ce s) Commentary Manufacturer Reference for Compliance
the system system diagram
Art diagram must available?
(SOT be available.
A)
2. IEC ‘All products Note: a complete Potential cyber security risks and IT-
2 810 have a threat system diagram security concerns have been taken into
01- model specific should include account within the framework of the
5-1 to the current the following:1. existing FMEA risk analysis, following the
cl. development All medical ISO 14971 standard for risk management
7.2 scope. devices incl. in medical devices.
Characteristic their interfaces
s (where (e.g. bluetooth,
applicable): wifi, ethernet),
correct flow utilized
of categorized protocols (e.g.
information HL7, DICOM,
throughout HTTPS, MQTTS,
the system, custom) on
trust those interfaces
boundaries, and their
data stores, implemented
internal/exter technical
nal specification
communicatio (e.g.
n protocols implemented
etc.’ protocol
version) incl. the
type of data
being
transferred (e.g.
personal health
information,
therapeutic
commands,
updates, remote
access) on those
interfaces.2. All
human machine
interfaces
within the
system (e.g.
screens,
It
e Sour Requirement( IG-NB
m ce s) Commentary Manufacturer Reference for Compliance
keyboards).
4. Accompanying Documentation
It
e Sour Requirement( IG-NB
m ce s) Commentary Manufacturer Reference for Compliance
4. MDC ‘While the Are the Yes, see:- Instructions for use / user
1 G MDR and the responsibilities manual
201 IVDR provide of manufacturer,
9-16 legal integrator and
cpt. obligations users correctly
2.6a only with reflected in the
ndM regard to IFU?Note: in
DR manufacturer cases where the
Ann s, however it medical device
ex I should be relies on the
(23. noted that for operating
4.ab the provision environment to
)/ of secured provide
IVD healthcare essential IT
It
e Sour Requirement( IG-NB
m ce s) Commentary Manufacturer Reference for Compliance
R services, it is security
Ann important to controls, this is
ex I recognize the appropriately
(20. roles and stated in the
4.1.a expectations accompanying
h) of all technical
stakeholders, documentation.
such as
manufacturer
s, suppliers,
healthcare
providers,
patients,
integrators,
operators and
regulators. All
of these
actors share
responsibilitie
s for ensuring
a secured
environment
for the benefit
of patients’
safety.’ANDTh
e instructions
for use shall
contain all of
the following
particulars:
‘for devices
that
incorporate
electronic
programmabl
e systems,
including
software, or
software that
are devices in
themselves,
minimum
It
e Sour Requirement( IG-NB
m ce s) Commentary Manufacturer Reference for Compliance
requirements
concerning
hardware, IT
networks
characteristic
s and IT
security
measures,
including
protection
against
unauthorised
access,
necessary to
run the
software as
intended.’
4. MDC ‘The Does the Yes, see:- Instructions for use / user
2 G requirements accompanying manual- User training
201 regarding the documentation
9-16 instructions appropriately
cpt. for use are contain the
4.2 outlined in following (if
the following applicable):-
articles of Any residual
Annex I’ cybersecurity
risk
communicated
as limitation,
contraindication
, precaution or
warning-
Information
about product
installation such
as configuration
of security
features (CNFS).
Note: this does
NOT mean the
documentation /
or provisioning
It
e Sour Requirement( IG-NB
m ce s) Commentary Manufacturer Reference for Compliance
of passwords for
assessment in
the
accompanying
documents. Also
include required
information
about any
necessary 3rd
party software
such as anti-
virus software,
firewall,
malware
detection/prote
ction (MLDP)
and minimum
requirements
for OS,
workstation,
peripherals.-
Procedures for
using the
medical device
in fail-safe mode
/ action plan for
users to follow
in case of alert
messages-
Information
about user
requirements in
terms of training
/ required
skills-
Instruction on
installing
(cybersecurity)
updates &
patches (CSUP)-
The
environment of
It
e Sour Requirement( IG-NB
m ce s) Commentary Manufacturer Reference for Compliance
use (home
environment,
healthcare
facility, etc.)- A
description of
data backup
(DTBK) and
restore features-
User roles incl.
privileges-
Information
about logging