What You Need to Know: FDA Updates to Medical Device Cybersecurity
Secureworks
Cybersecurity by security experts for security experts. We are in the fight with you!
In March, the FDA announced that a new policy rolling out could cause acceptance issues for Medical Device manufacturers and their creations.
The policy requires that all new medical device applicants must now submit a plan on how to “monitor, identify, and address
The new security requirements came into effect as part of the sweeping?$1.7 trillion federal omnibus spending bill?signed by President Joe Biden in December. As part of the new law, the FDA must also update its medical device cybersecurity guidance at least every two years.
So, what does this mean for Medical Device manufacturers? It says a lot, but the underlying message is this: If there are cybersecurity flaws in medical devices
领英推荐
For companies that follow the FDA’s recommended UL2900 series of recommended cybersecurity controls for connected medical devices, most of the paperwork portions including the software bill of materials should already be generated as artifacts in a form that should be presentable to the FDA.
If not, these documents would need to be generated at record speed before the device is presented for a 510(k) submission to the FDA. According to the FDA website, “A 510(k) is a premarket submission made to FDA to demonstrate that the device to be marketed is as safe and effective, that is, substantially equivalent, to a legally marketed device (section 513(i)(1)(A) FD&C Act). Submitters must compare their device to one or more similar legally marketed devices and make and support their substantial equivalence claims.”[1]
That brings us to more interesting artifacts better aligned with my expertise: penetration test artifacts