Navigating FDA Cybersecurity Requirements for Medical Devices – A Case Study
Marion Lepmets, Dr.
CEO & Co-Founder of SoftComply | Atlassian Gold Partner | Automating Compliance on Jira and Confluence
This case study describes the experience of a multinational medical device manufacturer meeting the FDA cybersecurity requirements. The company is operating in the MedTech sector developing a class 2/IIb device consisting of hardware and software.
The company spent about 2 years working on the security risk management of the device. In addition, they also embarked in the journey of being UL 2900 certified, which meant adding new QMS process for cybersecurity. Penetration tests were done regularly after every major development update.
Here's their story of navigating the cybersecurity requirements:
We decided to use a hybrid NIST/OWASP model with 3 parameters:
With the overall likelihood as a combination of the former two (similar to the classic SxP1xP2 for safety).
Each risk was assessed for potential safety impact; if it had one, a new risk item was entered in the software safety risk analysis, to ensure it was acceptable for both security and safety. Traces between the two were in place.
We had a SBOM (Software Bill of Materials) in place which also included firmware embedded in off-the-shelf components (e.g. smart batteries, wireless modules), although the details of this code were rarely available. We selected critical components (e.g. Operating systems) that were IEC 62304 compliant and had good track records, published bug list and vulnerabilities reported in the NVD. The software team went through the list of vulnerabilities for an initial screening (there were hundreds, all documented), selecting only the ones applicable to our specific version. These were entered in our risk analysis document and assessed accordingly.
领英推荐
All traces were duly documented in a separate, endless excel file.
At 510k submission time, we felt more than ready.
A few months later we were abruptly awaken by the FDA response. We realized that our documentation was created “for filing” rather than “for reviewing”, so the FDA got lost in it and pushed back.
This is a list of the main learnings:
With the SoftComply Risk Manager Plus app on Jira Cloud we can track the risks in a familiar table format, link applicable data to build traceability, and keep central list of software components in one place. It is easy to assess new vulnerabilities and apply the CVSS score for each of them and handle them based on the criticality.
???Try out the Risk Manager Plus for free for 30 days?–?https://marketplace.atlassian.com/apps/1219692/softcomply-risk-manager-plus-top-risk-management-in-jira?hosting=cloud&tab=overview
???Schedule a product demo?to learn more about managing information security risks in Jira –?https://calendly.com/softcomply/softcomply-risk-manager-demo