Risk Management and Cybersecurity for Devices that Contain Software. Seth D. Carmody, Ph.D. 12 th Medical Device Quality Congress March 18, 2015



Similar documents
Suzanne B. Schwartz, MD, MBA Director Emergency Preparedness/Operations & Medical Countermeasures (EMCM Program) CDRH/FDA

Cybersecurity for Medical Devices

MEDICAL DEVICE Cybersecurity.

FDA Releases Final Cybersecurity Guidance for Medical Devices

Risk based 12/1/2015. Digital Health Bakul Patel Associate Director for Digital Health Office of Center Director.

CONCEPTS IN CYBER SECURITY

Medical Device Software

Cyberprivacy and Cybersecurity for Health Data

GAO MEDICAL DEVICES. FDA Should Expand Its Consideration of Information Security for Certain Types of Devices. Report to Congressional Requesters

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

State Agency Cyber Security Survey v October State Agency Cybersecurity Survey v 3.4

a Medical Device Privacy Consortium White Paper

Legislative Language

NIST Cybersecurity Framework What It Means for Energy Companies

Capabilities for Cybersecurity Resilience

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015

Testimony of Dan Nutkis CEO of HITRUST Alliance. Before the Oversight and Government Reform Committee, Subcommittee on Information Technology

cyberr by e-management The Leader in Cybersecurity Risk Intelligence (RI) Cybersecurity Risk: What You Don t Know CAN Hurt You!

International standards and guidance that address Medical Device Software

7 Homeland. ty Grant Program HOMELAND SECURITY GRANT PROGRAM. Fiscal Year 2008

NIST Cybersecurity Initiatives. ARC World Industry Forum 2014

A MULTIFACETED CYBERSECURITY APPROACH TO SAFEGUARD YOUR OPERATIONS

NIST Cybersecurity Framework Sean Sweeney, Information Security Officer 5/20/2015

HIGH-RISK SECURITY VULNERABILITIES IDENTIFIED DURING REVIEWS OF INFORMATION TECHNOLOGY GENERAL CONTROLS

EVALUATION OF AUTOMATIC CLASS III DESIGNATION FOR STUDIO on the Cloud Data Management Software DECISION SUMMARY

Information Security for Managers

Small Firm Focus: A Practical Approach to Cybersecurity Friday, May 29 9:00 a.m. 10:15 a.m.

Assessing the Effectiveness of a Cybersecurity Program

Cybersecurity: What CFO s Need to Know

GEARS Cyber-Security Services

The Shifting Sands of Medical Software Regulation

How To Write Software

NIST National Institute of Standards and Technology

Office of Inspector General

Medical Product Software Development and FDA Regulations Software Development Practices and FDA Compliance

THE WHITE HOUSE. Office of the Press Secretary. For Immediate Release February 12, February 12, 2013

State Homeland Security Strategy (2012)

Using Linux in Medical Devices: What Developers and

Understanding HITRUST s Approach to Risk vs. Compliance-based Information Protection

Critical Controls for Cyber Security.

REGULATIONS FOR THE SECURITY OF INTERNET BANKING

CYBER SECURITY GUIDANCE

Cyber Incident Response

Information Technology Risk Management

Cyber Security Management

The Protection Mission a constant endeavor

SECURITY RISK MANAGEMENT

Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro)

The President issued an Executive Order Improving Critical Infrastructure Cybersecurity, on February 2013.

Information Technology

Program Overview and 2015 Outlook

April 8, Ms. Diane Honeycutt National Institute of Standards and Technology 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899

Legislative Language

DHS Cyber Security & Resilience Resources: Cyber Preparedness, Risk Mitigation, & Incident Response

CYBERSECURITY: PROTECTING YOUR ORGANIZATION AGAINST CYBER ATTACKS. Viviana Campanaro CISSP Director, Security and Compliance July 14, 2015

Cyber Risk Mitigation via Security Monitoring. Enhanced by Managed Services

REVIEW OF MEDICARE CONTRACTOR INFORMATION SECURITY PROGRAM EVALUATIONS FOR FISCAL YEAR 2013

Cybersecurity: Protecting Your Business. March 11, 2015

Implementation of ANSI/AAMI/IEC Medical Device Software Lifecycle Processes.

Medical Software Development. International standards requirements and practice

Looking at the SANS 20 Critical Security Controls

G-Cloud Definition of Services Security Penetration Testing

CDM Hardware Asset Management (HWAM) Capability

Using the HITRUST CSF to Assess Cybersecurity Preparedness 1 of 6

INFORMATION SECURITY SPECIFIC VENDOR COMPLIANCE PROGRAM (VCP) ACME Consulting Services, Inc.

How To Write A Cybersecurity Framework

ISSN: (Online) Volume 3, Issue 4, April 2015 International Journal of Advance Research in Computer Science and Management Studies

No. 33 February 19, The President

Cybersecurity for Meaningful Use FRHA Annual Summit "Setting the Health Care Table: Politics, Economics, Health" November 20-22, 2013

U.S. Department of Energy Office of Inspector General Office of Audits & Inspections. Evaluation Report

The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/

CYBERSPACE SECURITY CONTINUUM

Ten Questions Your Board Should be asking about Cyber Security. Eric M. Wright, Shareholder

Guidance on Risk Analysis Requirements under the HIPAA Security Rule

Click to edit Master title style

Cybersecurity. Cloud. and the. 4TH Annual NICE Workshop Navigating the National Cybersecurity Education InterState Highway September 2013

An Independent Member of Baker Tilly International

Security Risk Management For Health IT Systems and Networks

Executive Order 13636: The Healthcare Sector and the Cybersecurity Framework. September 23, 2014

Cybersecurity Enhancement Account. FY 2017 President s Budget

IG ISCM MATURITY MODEL FOR FY 2015 FISMA FOR OFFICIAL USE ONLY

ICBA Summary of FFIEC Cybersecurity Assessment Tool

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

Risk Assessment for Medical Devices. Linda Braddon, Ph.D. Bring your medical device to market faster 1

SCAC Annual Conference. Cybersecurity Demystified

Transcription:

Risk Management and Cybersecurity for Devices that Contain Software Seth D. Carmody, Ph.D. 12 th Medical Device Quality Congress March 18, 2015

Main Points Establish a Cybersecurity Risk Management Program Information sharing and cyber hygiene are important Software updates for cybersecurity do not require pre-market review or recall (there are exceptions) FDA will not be prescriptive with risk analyses Resources and best practices are prevalent 2

Definitions Cybersecurity - is the process of preventing unauthorized access, modification, misuse or denial of use, or the unauthorized use of information that is stored, accessed, or transferred from a medical device to an external recipient. Threat - Any circumstance or event with the potential to adversely impact organizational operations (including mission, functions, image, or reputation), organizational assets, individuals, or other organizations through an information system via unauthorized access, destruction, disclosure, modification of information, and/or denial of service. Content of Premarket Submissions for Management of Cybersecurity in Medical Devices http://www.fda.gov/downloads/medicaldevices/deviceregulationandguidance/guidancedocuments/ucm3 56190.pdf NIST SP 800-53; SP 800-53A; SP 800-27; SP 800-60; SP 800-37; CNSSI-4009. Note: The definition is Identical to NIST definition (SP 800-53) with the phrase or the Nation redacted. 3

Definitions Cyber hygiene is a state of diligent control of a device s operation, exercised in the use environment and considered best practice by the security community. This best practice is comprised of safe and proper configuration of available features, least privilege access to control functions and cybersecurity routine servicing. These practices are undertaken in order to maintain and improve cybersecurity. Additional cyber hygiene controls are identified by FDA in the cybersecurity premarket guidance. http://www.counciloncybersecurity.org/critical-controls/ 4

Healthcare Sector Challenges We re not just worried about manufacturing defects anymore! 1. Lack of Cybersecurity Culture 2. Threats 3. Perceived and Real economics 4. Procurement 5. Multiple and Diverse stakeholders 6. Technical Requirements 5

Security Is Hard Don t confuse effort with results JP Morgan Got hacked! Resources: $250 Million dollars/year, 1,000 personnel, set to double When not if: Anthem, Target, Home Depot, Community Health Systems, Sony Pictures Why: Mutually assured destruction (nation-states) and Money! Who: Anyone with a computing device and a motive Prof. Kevin Fu, AAMI Cybersecurity talk http://files.shareholder.com/downloads/one/3430314926x0x742267/e2efaf60-814f-430e-869e-6889ba3ec0ec/2013ar_chairman- CEO_letter.pdf http://www.cbsnews.com/news/why-250m-didnt-protect-jp-morgan-from-hackers/ 6

Why does FDA care about Cybersecurity? Networked medical devices facilitate care Networked medical devices introduce new risks Centers for Disease Control and Prevention (CDC) estimates of annual patient encounters 35 million hospital discharges 100 million hospital outpatient visits 900 million physician office visits Billions of prescriptions Most of these encounters likely include a networked medical device 7

Also the President said so Presidential Policy Directive 8 (PPD-8): National Preparedness Post-Katrina: federal departments and agencies to work with the whole community to develop a national preparedness goal and a series of frameworks and plans related to reaching specified goals. PPD-21: Critical Infrastructure Security and Resilience Executive Order 13636: Improving Critical Infrastructure Cybersecurity a national unity of effort to strengthen and maintain secure, functioning, and resilient critical infrastructure Executive Order 13691: Promoting Private Sector Cybersecurity Information Sharing (2/13/2015) https://www.whitehouse.gov/the-press-office/2015/02/13/executive-order-promoting-private-sectorcybersecurity-information-shari Critical infrastructure? 16 Sectors Secretary of Homeland Security Implements these directives. 8

Demonstrated Exploits VA Cath Lab temporary closure (1/10) due to malware infecting computers used during interventional cardiac procedures Hacking of implantable insulin pump, defibrillator Security researchers present CDRH with cyber vulnerabilities of medical devices 9 9

FDA Goals Meet our mission: safe and effective devices Raise cyber-security awareness Promote safety and security by design by clear regulatory expectation Promote proactive vulnerability management Minimize reactive approaches 10

Regulatory Challenges Secure design starts with a good Process Changing the device engages your established resources Software updates for cybersecurity do not require pre-market review or recall (there are exceptions) Risk management (clinical and device) engages your established resources Verification/Validation engages your established resources Cybersecurity Content for Premarket submissions are presented as a subset of your software documentation (engages your established resources) 11

What FDA Expects FDA expects that manufacturers include cybersecurity risk management program activities as part of their existing quality systems, as required by 21 CFR 820.30(g) and complaint handling, internal audit and corrective action requirements of 21 CFR 820.100, to appropriately address all identified vulnerabilities and exploits. 12

What is the scope of Risk? The Homeland Scenario (worst-case): a person s life is sustained either continuously and or periodically by a medical device (i.e. there are no mitigation(s) of risk) What is the likely scenario of a medical device hack? Collateral damage (i.e. unintended), maybe one device, maybe whole hospital. Control cyber hygiene then the homeland scenario A networked device is a device under constant threat Do not rely on compensating controls (user implemented control in the use environment (e.g. firewall)) 13

Cybersecurity Risk Management Program Step 1: Have one (adopt a Cybersecurity culture) Premarket Identification of assets, threats, and vulnerabilities; Assessment of the impact of threats and vulnerabilities on device functionality and end users/patients; Assessment of the likelihood of a threat and of a vulnerability being exploited; Determination of risk levels and suitable mitigation strategies; Assessment of residual risk Post Market Engage in post market surveillance and Information Sharing and Analysis Organizations (ISAOs) Assess the device impact and clinical impact of vulnerabilities and exploits Address the risk; actions taken should be commensurate with the risk Disseminate, Incorporate and Iterate and risk acceptance criteria. 14

Cybersecurity Risk Management Program Step 2: Produce objective evidence, show us Premarket Evidence Device design features that mitigate cybersecurity risk Subset of software documentation (Premarket Submissions for Software contained in medical devices Post Market Produce objective evidence that could include policies, procedures, CAPAs, complaints, information sharing, etc. Software description, hazards, requirements, design spec, traceability, development environment, Verification and Validation, revision history, and unresolved anomalies (vulnerabilities?) 15

What documentation is FDA looking for? Hazard analyses Evaluate both intentional and unintentional cybersecurity risk Provide information on the risk analyzed Controls established to mitigate risk Provide information on the controls put in place Provide information on the appropriateness of the controls to mitigate identified risk Matrix that links cybersecurity controls to the risk being mitigated Summary documentation on Plan to provide validated patches / updates Plan to assure device integrity Cybersecurity control instructions pertaining to use environment A systematic plan for providing patches and updates to operating systems or medical device software. 16

CDRH/FDA Activities Guidance Premarket (Final 2014) Post market (under development) Wireless Technology (Final 2013) Cybersecurity for Networked Devices with OTS Software (2005) Interoperability (under development) MDDS (Medical Device Data Systems - Final 2015) MMA (Mobile Medical Applications Final 2015) Recognized Standards Cybersecurity (2013) Interoperability (2013) Public Communication Premarket Guidance webinar (10/29/2014) FDA/DHS workshop (2014) Safety Communication to Stakeholders (2013) Cybersecurity for networked medical devices shared responsibility (2009) Organization Established CSWG of Subject Matter Experts (2013) Established Cyber Incident Response Team under EMCM (2013) Premarket Rounds Cybersecurity (11/17/2014 ) http://www.fda.gov/medicaldevices/productsandmedicalprocedures/connectedhealth/ucm3 73213.htm 17

CDRH/FDA Ongoing Activities Post market surveillance Regulatory clarity Premarket expectations Post market expectations Stake holder collaboration Device industry Healthcare organization Federal partners Researchers & experts Enable a platform for maintaining Cybersecurity Awareness 18

Best Practices and Tools Adopt a cybersecurity culture (Start with NIST): Robust Cybersecurity cultures exist across multiple economic sectors including the financial, utility, and defense sectors. Risk mitigation during total product life cycle from conception to obsolescence Information Sharing (with all stakeholders) Identify, Protect, Detect, Response, Recover Integrate and Iterate Hire/contract with, appropriate personnel Security first, implement design features as well as compensating controls Cyber hygiene (configuration, access control, etc.) http://www.counciloncybersecurity.org/critical-controls/ http://www.fda.gov/medicaldevices/productsandmedicalprocedures/connectedhealth/ucm373213. htm 19

Cyber Security Construct Identify Identify - Develop the organizational understanding to manage cybersecurity risk to systems, assets, data, and capabilities. Recover Protect Protect Develop and implement the appropriate safeguards to ensure delivery of critical infrastructure services Detect Develop and implement the appropriate activities to identify the occurrence of a cybersecurity event. Respond Develop and implement the appropriate activities to take action regarding a detected cybersecurity event. Respond Detect http://www.nist.gov/cyberframework/ Recover Develop and implement the appropriate activities to maintain plans for resilience and to restore any capabilities or services that were impaired due to a cybersecurity event. 20

Cybersecurity Relationship to 14971 Vulnerability Exploit Annex E, figure E.1. ISO 14971:2007 21

CDRH/FDA Collaborations EMCM led New partnership with Department of Homeland Security Coordinating incident response with ICS-CERT Participating in EO13636-PPD21 Integrated Task Force WGs DHS-led Cyber-Physical Functional Exercise (Cracked Domain) planners and players Enhanced communication & partnering with HHS Integrated Task Force (ITF) HHS/Critical Infrastructure Protection Cyber Threat Analysis Center (CTAC) Strengthen collaboration with NIST through standards and Cybersecurity Framework Working Group New collaboration with National Health Information Sharing and Analysis Center (NH-ISAC) Engaging proactively with diverse stakeholders Outreach/education of hospital, healthcare & medical device community (users and industry) 22

Main Points Establish a Cybersecurity Risk Management Program Information sharing and cyber hygiene are important Software updates for cybersecurity do not require pre-market review or recall (there are exceptions) FDA will not be prescriptive with risk analyses Resources and best practices are prevalent 23

CDRH Cybersecurity Contacts Office of the Center Director (OCD) Suzanne Schwartz Office of In vitro Diagnostics and Radiological Health (OIR) Seth Carmody Office of Device Evaluation (ODE) Linda Ricci Office of Compliance (OC) John Murray Office of Science and Engineering Laboratories (OSEL) Brian Fitzgerald Thank you! Questions? 24