Using Common Criteria Evaluations to Improve Healthcare Cybersecurity



Similar documents
Suzanne B. Schwartz, MD, MBA Director Emergency Preparedness/Operations & Medical Countermeasures (EMCM Program) CDRH/FDA

Build a CC assurance package dedicated to your risk assessment. Francois GUERIN Security Program Manager francois.guerin@gemalto.

Lessons learnt in writing PP/ST. Wolfgang Killmann T-Systems

Common Criteria for Information Technology Security Evaluation. Part 3: Security assurance components. September Version 3.

Common Methodology for Information Technology Security Evaluation. Evaluation methodology. September Version 3.1 Revision 4 CCMB

Certification Report StoneGate FW/VPN 5.2.5

Guidelines for Developer Documentation

MINISTERIO DE DEFENSA CENTRO NACIONAL DE INTELIGENCIA CENTRO CRIPTOLÓGICO NACIONAL ORGANISMO DE CERTIFICACIÓN

SAMSUNG SDS FIDO Server Solution V1.1 Certification Report

Cybersecurity for Medical Devices

BSI-DSZ-CC for. Oracle Database 11g Release 2 Enterprise Edition. from. Oracle Corporation

Common Criteria Evaluations for the Biometrics Industry

Technical Security in Smart Metering Devices: A German Perspective S4 SCADA Security Scientific Symposium , Miami Beach FL / USA

Joint Interpretation Library. Guidance for smartcard evaluation

Secuware Virtual System (SVS)

BSI-DSZ-CC for

AUTHORED BY: George W. Gray CTO, VP Software & Information Systems Ivenix, Inc. ADDRESSING CYBERSECURITY IN INFUSION DEVICES

22 July, 2010 IT Security Center (ISEC) Information-technology Promotion Agency (IPA) Copyright 2010 Information-Technology Promotion Agency, Japan 1

Fingerprint Spoof Detection Protection Profile

BSI-DSZ-CC for. tru/cos tacho v1.1. from. Trueb AG

MEDICAL DEVICE Cybersecurity.

Joint Interpretation Library

7 Homeland. ty Grant Program HOMELAND SECURITY GRANT PROGRAM. Fiscal Year 2008

BSI-DSZ-CC for. Microsoft SQL Server 2012 Database Engine Enterprise Edition x64 (English), Version (including Service Pack 1)

BSI-DSZ-CC for. NXP J3A081, J2A081 and J3A041 Secure Smart Card Controller Revision 3. from. NXP Semiconductors Germany GmbH

Medical Devices. Safe, but are they secure? Dan Stoker, Consultant Professional Services, Coalfire

BSI-DSZ-CC for. IBM Tivoli Access Manager for e-business version FP4 with IBM Tivoli Federated Identity Manager version 6.2.

Certificate Issuing and Management Components Protection Profile. Version 1.5

SECURITY. Risk & Compliance Services

U.S. Government Protection Profile for Database Management Systems

The Next Generation of Security Leaders

Firewall Protection Profile V

Common Criteria v3.1 Vulnerability Assessment: What is new?

Medical Device Software Standards for Safety and Regulatory Compliance

BSI-DSZ-CC for. Microsoft Forefront Threat Management Gateway 2010 Version / Build from. Microsoft Corporation

Cybersecurity: What CFO s Need to Know

BSI-DSZ-CC for. JBoss Enterprise Application Platform 5 Version and from. Red Hat

Joint Interpretation Library

BSI-DSZ-CC For. Microsoft Windows Server 2008 R2 Hyper-V, Release from. Microsoft Corporation

BSI-DSZ-CC for. Digital Tachograph EFAS-4.0, Version 02. from. intellic GmbH

Enterasys Networks, Inc. Netsight/Network Access Control v Security Target

Network Test Labs Inc Security Assessment Service Description Complementary Service Offering for New Clients

Security Target. Astaro Security Gateway V8 Packet Filter Version Assurance Level EAL4+ Common Criteria v3.1

Goals. Understanding security testing

DOD Medical Device Cybersecurity Considerations

BSI-DSZ-CC for. LANCOM Systems Operating System LCOS 8.70 CC with IPsec VPN. from. LANCOM Systems GmbH

PCI-DSS Penetration Testing

Cyber Security An Exercise in Predicting the Future

JDRF Type One Nation Research Summit Diabetes Technology: A Bridge to a Cure

Trust Technology Assessment Program. Validation Report

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

Kim Decarolis Compliance and Security Specialist (248) Mark Wayne Vice President Compliance and Security Specialist

Supporting Document Guidance. Security Architecture requirements (ADV_ARC) for smart cards and similar devices. April Version 2.

Agenda. Introduction to SCADA. Importance of SCADA security. Recommended steps

MINISTERIO DE DEFENSA CENTRO NACIONAL DE INTELIGENCIA CENTRO CRIPTOLÓGICO NACIONAL ORGANISMO DE CERTIFICACIÓN CERTIFICATION REPORT

National Cyber Security Policy -2013

Wireless and Mobile Technologies for Healthcare: Ensuring Privacy, Security, and Availability

CERTIFICATION REPORT

Compucat Research Pty Limited 14 Wales St, Belconnen ACT 2617 ABN

Start building a trusted environment now... (before it s too late) IT Decision Makers

Joint Interpretation Library. Security Evaluation and Certification of Digital Tachographs

Certification Report

BEST PRACTICES IN CYBER SUPPLY CHAIN RISK MANAGEMENT

CYBERSECURITY RISK MANAGEMENT

CA CA, Inc. Identity Manager 12.5 Identity Manager r12.1 Security Target

Trustwave DbProtect Version Security Target

SOFTWARE ASSET MANAGEMENT Continuous Monitoring. September 16, 2013

Dr. Markus Braendle, Head of Cyber Security, ABB Group 10 Steps on the Road to a Successful Cyber Security Program Asia Pacific ICS Security SUMMIT

gateprotect Firewall Packet-Filtering-Core v10.3 Security Target Version:

CERTIFICATION REPORT

Bellevue University Cybersecurity Programs & Courses

Mobile Billing System Security Target

DVLA ELISE GSi Closed User Group Code of Connection

BSI-CC-PP for. Cryptographic Modules, Security Level "Enhanced", Version from. Bundesamt für Sicherheit in der Informationstechnik

IoT & SCADA Cyber Security Services

Attachment A. Identification of Risks/Cybersecurity Governance

8/27/2015. Brad Schuette IT Manager City of Punta Gorda (941) Don t Wait Another Day

CERTIFICATION REPORT

Supporting Document Guidance. Smartcard Evaluation. February Version 2.0 CCDB

IT Security & Compliance. On Time. On Budget. On Demand.

April 8, Ms. Diane Honeycutt National Institute of Standards and Technology 100 Bureau Drive, Stop 8930 Gaithersburg, MD 20899

U.S. Office of Personnel Management. Actions to Strengthen Cybersecurity and Protect Critical IT Systems

PCI Solution for Retail: Addressing Compliance and Security Best Practices

FDA Releases Final Cybersecurity Guidance for Medical Devices

Logging In: Auditing Cybersecurity in an Unsecure World

LOGIIC Remote Access. Final Public Report. June LOGIIC - APPROVED FOR PUBLIC DISTRIBUTION

Secure Content Automation Protocol (SCAP): How it is increasingly used to automate enterprise security management activities

Transcription:

Approved for Public Release; Distribution Unlimited. 15-2807 2015 The MITRE Corporation. ALL RIGHTS RESERVED. Using Common Criteria Evaluations to Improve Healthcare Cybersecurity David Kleidermacher Blackberry Dr. David Klonoff Diabetes Technology Society Margie Zuk - MITRE

Background Healthcare is an attractive target for sophisticated adversaries: organized crime, nation states, hacktivists Medical devices may be an attacker s entry point, or incidentally compromised during an attack because of vulnerabilities Medical Devices Contain configurable embedded computer systems Increasingly interconnected Wirelessly connected Legacy devices Use Environment Varied responsibilities for purchase, installation and maintenance of medical devices, often siloed Variable control over what is placed on the network Inconsistent training and education on security risks

FDA Public Workshop: Collaborative Approaches for Medical Device and Healthcare Cybersecurity October 21-22, 2014 Co-sponsored with HHS and DHS 1300 total participants included onsite and remote Broad range of stakeholders Goals: Catalyze collaboration among all HPH stakeholders Identify barriers that impede efforts towards promoting cybersecurity Advance the discussion on innovative approaches for building securable medical devices

MITRE Handshake Site: Medical Device and Healthcare Cybersecurity Virtual collaboration space for HPH sector to continue discussion from public workshop Over 170 participants FAQ with rules of engagement cybermed@mitre.org Individual requests account MITRE sends invitation Individual responds and creates account Individual joins Handshake

Medical Device Ecosystem Researchers Industry Venture Capitalists Patients Medical Device Ecosystem Professional Societies Regulators Health Care Providers Payers

Collaborating with the Medical Device Cybersecurity Ecosystem MITRE conducting stakeholder study as a follow-on to the FDA workshop Meeting with over 70 stakeholders across the medical device ecosystem Understand stakeholder perspectives Understand cybersecurity gaps and challenges Establishing collaborative models for information sharing and a shared risk framework Participating in emerging industry efforts

Diabetes Technology Society Cybersecurity Standard for Connected Diabetes Devices (DTSec) Developing a cybersecurity standard and evaluation process Focus on 4 device classes Blood Glucose Monitors (BGM) Continuous Glucose Monitors (CGM) Insulin pumps (IP) Artificial Pancreas (AP) Establishing a technical community composed of clinicians, manufacturers, cybersecurity experts, academia, and government members Sub groups including Scope of Work, Protection Profile, and Assurance

Goals of DTSec Assurance Program Scientific approach to security evaluation Supports life-critical systems Efficient (cost and time) Enable continuous improvement Open and international

Medical Device Assurance 9

DTSec Security Functional Requirements Work in progress PP covers meters Firmware/software authenticity User data (e.g. BG readings) authenticity Secure local channel (auth+encrypt) e.g. BTLE security mode 1, level 3 User authentication to device (OPTIONAL) Information flow policy to enable safe 1-way reading from GMs to smartphone (no control allowed)

DTSec Security Assurance Requirements Human Life Sophisticated, Motivated Attacker Attack Threat Potential Asset Value Low Medium High High Low Medium High Medium Low Medium Medium Low Low Low Low IEC 62304 Class A: No injury or damage to health is possible Class B: Non-serious injury is possible Class C: Death or serious injury is possible Independent assurance packages can be applied to any PP

DTSec Security Assurance Requirements ASSURANCE PACKAGE Lifecycle Requirements TOE-independent common to manufacturer s TOEs Product Requirements TOE-dependent

DTSec Security Assurance Requirements ASSURANCE PACKAGE Lifecycle Requirements CM plans and process Arch, design, specification Development tool standards Flaw remediation process Product Requirements Arch, design, specification Testing of requirements Vulnerability assessment

DTSec: Evaluation Efficiency DTSec Class C ASSURANCE PACKAGE IEC 62304 ISO 14971 ISO 13485 Target ISO 15408 family and component IEC 62304 coverage ADV_ARC.1 5.3 ADV_FSP.5 5.2 ADV_IMP.1 B.5.5 ADV_INT.2 5.5.3 ADV_TDS.3 5.4 AGD_OPE.1 5.2.2 AGD_PRE.1 5.2.2 ALC_CMC.5 8 ALC_CMS.5 8 ATE_COV.2 5.6.4 and 5.7 ATE_DPT.2 5.7 ATE_FUN.1 5.6.4 and 5.7 ATE_IND.2 5.7 AVA_VAN.4 not covered Product Requirements Arch, design, specification Testing of requirements Vulnerability assessment

DTSec: Evaluation Efficiency DTSec Class C ASSURANCE PACKAGE Arch, design, specification Testing of requirements Vulnerability assessment

DTSec: Evaluation Efficiency Delta certification / assurance continuity Vendor documents delta Patch set, version increment, etc. Depending on scope of modifications Minor: accept and publish addendum to certificate Major: re-evaluation Gray: audit https://www.niapccevs.org/documents_and_guidance/ccevs/scheme-pub-6.pdf

DTSec Scope Near Term Publish standard Leverages ISO 15408, 18045, 17025 Defines the assurance program Accreditation of labs, certification of results, assurance maintenance Create PP(s) for important product families BGM, CGM, IP, AP Initial vendor(s) write ST(s) for initial product(s) Select and accredit initial lab(s) Lab evaluates initial product(s) against ST(s) Certify lab results Flock to the streets in rapture

Summary and Onward DTSec: medical device security standard and assurance program Assurance by evaluation based on ISO 15408 Administered by international multi-stakeholder non-profit Custom assurance package, leverage IEC 62304 Life-critical wireless devices AVA_VAN.4 Future Demonstrate efficient evaluations Expand to other device types, e.g. infusion pumps Lowered cost of insurance? Regulatory recommendation and/or mandate Observe and integrate with synergistic efforts

Contact davek@blackberry.com dklonoff@diabetestechnology.org mmz@mitre.org