MEDICAL DEVICE Cybersecurity.



Similar documents
FDA Releases Final Cybersecurity Guidance for Medical Devices

Cybersecurity for Medical Devices

Suzanne B. Schwartz, MD, MBA Director Emergency Preparedness/Operations & Medical Countermeasures (EMCM Program) CDRH/FDA

Risk Management and Cybersecurity for Devices that Contain Software. Seth D. Carmody, Ph.D. 12 th Medical Device Quality Congress March 18, 2015

Medical Devices. Safe, but are they secure? Dan Stoker, Consultant Professional Services, Coalfire

PCI Compliance for Cloud Applications

a Medical Device Privacy Consortium White Paper

The U.S. FDA s Regulation and Oversight of Mobile Medical Applications

Cybersecurity. Are you prepared?

INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Cyber- Attacks: The New Frontier for Fraudsters. Daniel Wanjohi, Technology Security Specialist

Anatomy of a Breach: A case study in how to protect your organization. Presented By Greg Sparrow

GAO MEDICAL DEVICES. FDA Should Expand Its Consideration of Information Security for Certain Types of Devices. Report to Congressional Requesters

Cybersecurity and internal audit. August 15, 2014

Attachment A. Identification of Risks/Cybersecurity Governance

Defending Against Data Beaches: Internal Controls for Cybersecurity

Assessing the Effectiveness of a Cybersecurity Program

Cyber Security An Exercise in Predicting the Future

NIST CYBERSECURITY FRAMEWORK COMPLIANCE WITH OBSERVEIT

Cybersecurity: What CFO s Need to Know

External Supplier Control Requirements

Tom Walsh, CISSP Tom Walsh Consulting, LLC Overland Park, KS. Session Objectives. Introduction Tom Walsh

Defending against modern threats Kruger National Park ICCWS 2015

U.S. Department of Energy Office of Inspector General Office of Audits & Inspections. Evaluation Report

Medical Device Software Standards for Safety and Regulatory Compliance

Payment Card Industry Data Security Standard

<COMPANY> P01 - Information Security Policy

How To Achieve Pca Compliance With Redhat Enterprise Linux

Cybersecurity: Considerations for Internal Audit. IIA Atlanta Chapter Meeting January 9, 2015

HIGH-RISK SECURITY VULNERABILITIES IDENTIFIED DURING REVIEWS OF INFORMATION TECHNOLOGY GENERAL CONTROLS

Cyber Security. John Leek Chief Strategist

CYBER SECURITY AND RISK MANAGEMENT. An Executive level responsibility

NERC CIP VERSION 5 COMPLIANCE

State Agency Cyber Security Survey v October State Agency Cybersecurity Survey v 3.4

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

Nine Steps to Smart Security for Small Businesses

CONCEPTS IN CYBER SECURITY

AUTHORED BY: George W. Gray CTO, VP Software & Information Systems Ivenix, Inc. ADDRESSING CYBERSECURITY IN INFUSION DEVICES

Cyber Security Metrics Dashboards & Analytics

Best Practices in ICS Security for System Operators. A Wurldtech White Paper

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

Internal audit of cybersecurity. Presentation to the Atlanta IIA Chapter January 2015

cyberr by e-management The Leader in Cybersecurity Risk Intelligence (RI) Cybersecurity Risk: What You Don t Know CAN Hurt You!

Managing Vulnerabilities for PCI Compliance White Paper. Christopher S. Harper Managing Director, Agio Security Services

High Level Cyber Security Assessment 2/1/2012. Assessor: J. Doe

Patching & Malicious Software Prevention CIP-007 R3 & R4

U.S. Department of Energy Office of Inspector General Office of Audits and Inspections. Evaluation Report

Data Breach Response Planning: Laying the Right Foundation

OCIE CYBERSECURITY INITIATIVE

How To Test For Security On A Network Without Being Hacked

PCI Assessments 3.0 What Will the Future Bring? Matt Halbleib, SecurityMetrics

TASK TDSP Web Portal Project Cyber Security Standards Best Practices

Best Practices in ICS Security for Device Manufacturers. A Wurldtech White Paper

PCI COMPLIANCE REQUIREMENTS COMPLIANCE CALENDAR

Small Firm Focus: A Practical Approach to Cybersecurity Friday, May 29 9:00 a.m. 10:15 a.m.

HIPAA Security & Compliance

Client Update NFA Adopts Interpretive Notice Regarding Information Systems Security Programs

CYBERSECURITY TESTING & CERTIFICATION SERVICE TERMS

Risk Management Guide for Information Technology Systems. NIST SP Overview

10 Potential Risk Facing Your IT Department: Multi-layered Security & Network Protection. September 2011

CYBERSECURITY IN FINANCIAL SERVICES POINT OF VIEW CHALLENGE 1 REGULATORY COMPLIANCE ACROSS GEOGRAPHIES

Conducting a Risk Assessment for Mobile Devices

Ed McMurray, CISA, CISSP, CTGA CoNetrix

Cybersecurity The role of Internal Audit

Case Study: Fast Food Security Breach (Multiple Locations)

IoT & SCADA Cyber Security Services

Managing cyber risks with insurance

Guide to Vulnerability Management for Small Companies

SECURITY. Risk & Compliance Services

Protecting Your Organisation from Targeted Cyber Intrusion

NIST Cybersecurity Initiatives. ARC World Industry Forum 2014

Click to edit Master title style

Department of Management Services. Request for Information

Evaluation Report. Office of Inspector General

1. For each of the 25 questions, multiply each question response risk value (1-5) by the number of times it was chosen by the survey takers.

SRA International Managed Information Systems Internal Audit Report

Certified Identity and Access Manager (CIAM) Overview & Curriculum

MEMORANDUM. Date: October 28, Federally Regulated Financial Institutions. Subject: Cyber Security Self-Assessment Guidance

LOGIIC Remote Access. Final Public Report. June LOGIIC - APPROVED FOR PUBLIC DISTRIBUTION

The Business Case for Security Information Management

Healthcare Cybersecurity Risk Management: Keys To an Effective Plan

North American Electric Reliability Corporation (NERC) Cyber Security Standard

Data Management Policies. Sage ERP Online

Transcription:

MEDICAL DEVICE Cybersecurity.

2 MEDICAL DEVICE CYBERSECURITY

Introduction Wireless technology and the software in medical devices have greatly increased healthcare providers abilities to efficiently and effectively monitor and treat patients. However, the use of wireless technology and the software in medical devices present risks unique to the healthcare industry. An added concern for the healthcare industry comes from the need to not only protect patient health data, but also the need to protect patients health. Cybersecurity vulnerabilities in medical devices can have life threatening consequences in the event of failure or intentional tampering. The threat is real as hackers have demonstrated the ability to compromise a diverse array of medical devices. Although there have been no reported patient injuries or deaths associated with cybersecurity incidents, cybersecurity specialists have identified a number of vulnerabilities with these devices. Due to the increased media focus on the identified issues, the U.S. Food and Drug Administration (FDA) is investigating numerous devices for cybersecurity issues. On October 2, 2014, the FDA issued a final guidance containing recommendations to medical device manufacturers on cybersecurity management. The guidance is applicable to all new premarket submissions containing software, programmable logic, and standalone software that is a medical device. This guidance represents the FDA s current thinking on the subject of cybersecurity as it relates to medical devices. Although the guidance is not enforceable by law, medical device manufacturers should seriously consider the recommendations presented as the healthcare technology landscape continues to get more and more digitally connected. PLANTE MORAN 3

4 MEDICAL DEVICE CYBERSECURITY

Guidance. What the Guidance Calls For The FDA has recommended that medical device manufacturers consider the following five cybersecurity framework core functions: identify, protect, detect, respond, and recover. This framework is based on the NIST Framework for Improving Critical Infrastructure Cybersecurity, a voluntary framework based on existing standards, guidelines, and practices for reducing cyberrisks to critical infrastructure. IDENTIFY AND PROTECT A proper assessment of cybersecurity vulnerabilities can help identify controls that can protect against intentional or unintentional threats. Medical devices with digital connectivity capabilities are inherently more vulnerable to cybersecurity threats than devices not in scope for this guidance. The guidance recommends that the extent of security controls present for an in-scope device should depend on the following: the device s intended use the presence and intent of its electronic data interfaces its intended environment of use (e.g., home use vs. healthcare facility use) the type of cybersecurity vulnerabilities present PLANTE MORAN 5

the likelihood the vulnerability can be exploited (either intentionally or unintentionally) the probable risk of patient harm due to a cybersecurity breach It is also important to ensure the security controls in place do not unreasonably hinder the device s intended use. Careful consideration should be made between the safety provided by security controls and the usability aspects that may be impaired in emergency situations. The guidance provides the following broad security functions for manufacturers to consider when designing controls for their in-scope devices: Limit Access to Trusted Users Only including limiting access through user authentication, automatic timed session termination, strong password parameters, and appropriate physical security Ensure Trusted Content including restricting software or firmware updates to authenticated code and ensuring secure mediums for data transfer to and from the device DETECT, RESPOND, AND RECOVER It is important for medical device users to be able to effectively detect and respond to cybersecurity breaches and then recover. For this reason, the guidance provides the following guidelines for medical device manufacturers to consider including in their product design: Implement features that allow for security compromises to be detected, recognized, logged, timed, and acted upon during normal use; Develop and provide information to the end user concerning appropriate actions to take upon detection of a cybersecurity event; Implement device features that protect critical functionality, even when the device s cybersecurity has been compromised; Provide methods for retention and recovery of device configuration by an authenticated privileged user. DOCUMENTATION The guidance also notes the following information related to cybersecurity that should be included by manufacturers during premarket submissions of their medical devices: 1. Hazard analysis, mitigations, and design considerations pertaining to intentional and unintentional cybersecurity risks associated with your device, including: A specific list of all cybersecurity risks that were considered in the design of your device with mitigations identified for each risk; 6 MEDICAL DEVICE CYBERSECURITY

A specific list and justification for all cybersecurity controls that were established for your device. 2. A traceability matrix that links your actual cybersecurity controls to the cybersecurity risks that were considered. 3. A summary describing the plan for providing validated software updates and patches as needed throughout the product lifecycle of the medical device to continue to assure its safety and effectiveness. The FDA typically will not need to review or approve medical device software changes made solely to strengthen cybersecurity. 4. A summary describing controls that are in place to assure that the medical device software will maintain its integrity (e.g., remain free of malware) from the point of origin to the point at which that device leaves the control of the manufacture. 5. Device instructions for use and product specifications related to recommended cybersecurity controls appropriate for the intended use environment (e.g., anti-virus software, use of firewall). PLANTE MORAN 7

8 MEDICAL DEVICE CYBERSECURITY

Stakeholders. What This Means for Stakeholders So what does this mean for my organization and the healthcare value chain? This varies based on your role with medical devices that are in scope for the guidance. The FDA recognizes that medical device security is a shared responsibility among stakeholders, including healthcare facilities, patients, providers, and manufacturers. The brunt of the action called for by the guidance falls under the responsibility of the medical device manufacturers. However, it is just as important that all the aforementioned stakeholders be aware of their role in the cybersecurity of medical devices. MEDICAL DEVICE MANUFACTURERS The responsibility of medical device manufacturers, as it relates to cybersecurity, is defined by the FDA as follows: Manufacturers are responsible for remaining vigilant about identifying risks and hazards associated with their medical devices, including risks related to cybersecurity, and are responsible for putting appropriate mitigations in place to address patient safety and assure proper device performance. Medical device manufactures should implement an effective framework to PLANTE MORAN 9

mitigate cybersecurity risks. It is important to remember that the guidance is not law and only represents the FDA s current thinking on the topic of cybersecurity. The NIST Framework is touted as a prioritized, flexible, repeatable, and cost-effective approach to manage cybersecurity-related risks and would be an excellent option to reduce the possible increase in research and development costs associated with mitigating new and evolving cybersecurity risks. Wireless implantable medical devices Deep Brain Neurostimulators Gastric Neurostimulators Foot Drop Implants Cochlear Implants Cardiac Defibrillators/ Pacemakers Insulin Pumps Medical device manufacturers should work to implement a process to effectively identify and protect against cybersecurity vulnerabilities that could be present in their devices. Furthermore, they should ensure devices are designed to allow end users to properly detect, respond, and recover from a cybersecurity breach. Security is an on-going process that evolves as new vulnerabilities are identified. Medical device manufacturers will need to deploy patches just like antivirus updates for desktops or app updates on mobile devices. HEALTHCARE FACILITIES The responsibility of healthcare facilities, as it relates to cybersecurity, is defined by the FDA as follows: Hospitals and health care facilities should evaluate their network security and protect the hospital system. Patients will hold healthcare facilities responsible for security breaches while being cared for at a healthcare facility. Therefore, healthcare facilities should ensure they have a solid understanding of the cybersecurity risks that are posed by the medical devices they are using. It is important that the institution implement an effective due diligence and risk management framework to identify the threats posed to medical devices with data connectivity. Healthcare facilities should expect to see an increase in the security functionality and complexity of newly released medical devices; this may require additional training for system administrators and/or end users. The 10 MEDICAL DEVICE CYBERSECURITY

additional documentation called for in the guidance may be very helpful to healthcare facilities in appropriately implementing and maintaining cybersecurity controls to support their networked medical device infrastructure. PROVIDERS Providers should employ the same due care and procedures described above for healthcare facilities. Providers should be aware of the cybersecurity aspects of the devices they use to treat or prescribe to their patients. Again, patients will hold healthcare providers responsible for security breaches with medical devices recommended by their physicians. Health care providers should ensure patients are trained on the safe use and security aspects of the devices they prescribe. PATIENTS Patients should demand a complete understanding of the functionality of the medical devices they are using. Manufacturer provided documentation should be reviewed to solidify understanding. Additional questions around the sharing of medical data from the devices should be directed to an applicable healthcare provider or device manufacturer. PLANTE MORAN 11

AUTHOR KYLE MILLER 248.223.3495 kyle.miller@plantemoran.com plantemoran.com