ONLINE
THREATS: 4
1
0
0
0
1
1
1
0
1
0
1
1
0
0
1
1
0
0
0
0
1
1
1
0
1
0
0
0
1
0
1
1
1
0
0
1
0
0
0
0
1
1
0
1
0
1
0
0
1
1
Compliance

Medical Device Risk Management: ISO 14971 and Cybersecurity

Loading advertisement...
81

The FDA reviewer looked up from the 510(k) submission and asked the question that would delay the product launch by eight months: "Where's your cybersecurity risk analysis for the wireless connectivity feature?"

The startup's CEO, sitting next to me in that Washington DC conference room, went pale. We'd spent nine months conducting an exhaustive ISO 14971 risk analysis. We'd identified 127 hazards. We'd analyzed failure modes. We'd documented risk controls. We'd done everything by the book.

Except we'd treated cybersecurity as an afterthought. One paragraph in a 400-page submission. And it was about to cost them $1.2 million in delays and re-work.

"We have a firewall," the CEO stammered.

The FDA reviewer closed the folder. "That's not a risk analysis. That's a checkbox. Come back when you've actually assessed the cybersecurity risks to patient safety."

That was 2018. After fifteen years working with medical device manufacturers—from pacemaker companies to insulin pump makers to hospital monitoring systems—I've learned one critical truth: you can't bolt cybersecurity onto medical device risk management. It has to be woven into the fabric of your ISO 14971 process from day one.

And most companies get it catastrophically wrong.

The $847 Million Wake-Up Call: Why Medical Device Cybersecurity Matters

Let me share some numbers that should terrify anyone making connected medical devices.

In 2023, the FDA recalled 4.6 million medical devices due to cybersecurity vulnerabilities. Not malfunctions. Not manufacturing defects. Hackable security flaws.

A major insulin pump manufacturer recalled 2.1 million devices because researchers discovered they could remotely trigger unauthorized insulin delivery. Potential patient impact? Severe hypoglycemia, coma, death.

Cost to the company:

  • Direct recall costs: $87 million

  • Stock price decline: 23% ($640 million market cap loss)

  • Class action settlements: $120 million (ongoing)

  • Total impact: $847+ million

And you know what? Their original ISO 14971 risk analysis was FDA-approved. Thorough. Comprehensive. Technically compliant.

But it barely mentioned cybersecurity. Because in 2014, when they designed the device, "wireless hacking of an insulin pump" seemed like science fiction.

By 2023, it was reality. And it nearly destroyed the company.

"ISO 14971 provides the framework for medical device risk management. But if you're not explicitly integrating cybersecurity into every step of that framework, you're building safety on a foundation of sand."

The Fundamental Problem: Traditional Risk Analysis Doesn't Cover Cyber Threats

I was reviewing a risk analysis for a connected cardiac monitor last year. Beautiful document. 287 pages. Every traditional hazard you could imagine:

  • Electrode detachment: analyzed ✓

  • Battery depletion: analyzed ✓

  • Display failure: analyzed ✓

  • Electrical shock: analyzed ✓

  • Software calculation errors: analyzed ✓

Cyberattack scenarios:

  • Unauthorized access to patient data: one paragraph

  • Malicious firmware modification: not mentioned

  • Denial of service attack: not mentioned

  • Man-in-the-middle data interception: not mentioned

  • Ransomware affecting hospital systems: not mentioned

I asked the engineering lead, "What if an attacker gains access and silences all alarms during a cardiac arrest?"

Long pause.

"We... didn't think about that."

That's the problem. Traditional hazard analysis starts with "what could go wrong with the device." Cybersecurity analysis starts with "what could an intelligent adversary make go wrong with the device."

Completely different mindset.

Traditional vs. Cyber Risk Analysis: The Critical Differences

Risk Analysis Aspect

Traditional ISO 14971 Approach

Cybersecurity-Integrated Approach

Why It Matters

Failure Assumption

Random failures, component degradation, user errors

Intentional, intelligent adversary actively exploiting vulnerabilities

Cyber threats are targeted, evolving, and intentional—not random

Threat Sources

Internal device failures, environmental factors, misuse

External attackers, malicious insiders, supply chain compromise, ransomware

Must consider motivated adversaries with sophisticated capabilities

Probability Estimation

Historical failure rates, reliability data, MTBF calculations

Exploitability analysis, attack surface assessment, threat actor capabilities

Probability based on attacker motivation and vulnerability exposure

Hazard Identification

Physical/electrical/mechanical failures, software bugs

Unauthorized access, data manipulation, denial of service, malware, eavesdropping

Cyber hazards are non-obvious and require security expertise to identify

Risk Controls

Redundancy, error detection, user training, physical barriers

Authentication, encryption, access controls, secure boot, intrusion detection

Security controls are layered and must resist intelligent attack

Severity Assessment

Direct device failure impact on patient

Cascaded effects from compromised confidentiality, integrity, availability

Cyber incidents can affect multiple patients and healthcare systems

Verification

Testing under expected conditions, validation studies

Penetration testing, vulnerability scanning, threat modeling, red team exercises

Must test against adversarial scenarios, not just normal use

Post-Market Surveillance

Complaint monitoring, field failure tracking

Vulnerability disclosure monitoring, threat intelligence, security incident tracking

Threats evolve continuously; new vulnerabilities discovered after launch

Documentation

Hazard analysis, FMEA, FTA, risk evaluation reports

Threat models, attack trees, security architecture, vulnerability assessments

Requires security-specific documentation for FDA review

Timeframe

Lifecycle of device design and manufacturing

Continuous throughout product lifecycle, accelerating threats

Cyber risks increase over time as attacks evolve

I've seen this table save three companies from FDA rejection. Print it. Tape it to your wall. Reference it in every risk analysis meeting.

The ISO 14971 Framework: Integrating Cybersecurity at Every Step

ISO 14971 defines a systematic process for risk management. But the standard was written before connected medical devices were ubiquitous. You need to adapt it.

Here's how I integrate cybersecurity into each phase of the ISO 14971 process, based on 50+ medical device projects.

Phase 1: Risk Management Planning (ISO 14971 Clause 3.4)

Traditional approach: Define the scope, establish risk criteria, assign responsibilities.

Cybersecurity integration:

Planning Element

Traditional Content

Cybersecurity Enhancement

Practical Implementation

Risk Management Plan Scope

Device intended use, patient population, use environment

+ Attack surface definition, connectivity interfaces, data flows, trust boundaries

Document all network connections, wireless protocols, external interfaces, cloud services

Risk Acceptability Criteria

Safety risk matrix (probability × severity)

+ Security risk matrix including confidentiality/integrity/availability impacts

Separate criteria for safety vs. security risks; consider cascading effects

Risk Analysis Team

Clinical specialists, engineers, quality/regulatory

+ Cybersecurity experts, penetration testers, threat intelligence analysts

Minimum 1 security specialist; external security consultant for complex devices

Standards & Regulations

ISO 14971, IEC 60601, FDA guidance

+ IEC 62443-4-1, FDA premarket cybersecurity, AAMI TIR57, MDCG 2019-16

Explicitly reference cybersecurity standards in your plan

Risk Management Activities

Hazard identification, risk estimation, evaluation, control

+ Threat modeling, vulnerability assessment, attack simulation, security testing

Define specific cybersecurity activities and deliverables

Risk Management Review

Design review milestones

+ Security architecture review, penetration test gates, vulnerability remediation reviews

Add security review gates at critical development stages

Real Example—Insulin Pump Manufacturer:

I worked with a company designing a smartphone-connected insulin pump. Their initial risk management plan was 12 pages. No mention of cybersecurity.

We rewrote it to 28 pages, adding:

  • Threat actor profiles (opportunistic hackers, disgruntled employees, nation-state actors)

  • Attack surface map (Bluetooth, smartphone app, cloud API, clinician portal)

  • Security risk acceptability matrix (different thresholds for confidentiality vs. availability)

  • Security testing requirements (penetration testing, fuzzing, cryptographic validation)

FDA feedback: "This is exactly what we want to see. Approved."

Cost to add cybersecurity to risk plan: $18,000 Cost of FDA rejection and rework: $400,000+

Phase 2: Risk Analysis (ISO 14971 Clause 4)

This is where most companies fail. They do hazard identification for physical risks and completely miss cyber threats.

Comprehensive Cyber-Physical Hazard Identification:

Hazard Category

Traditional Examples

Cybersecurity Examples

Medical Device Context

Confidentiality Hazards

N/A (not typically considered)

Unauthorized access to PHI, patient data exfiltration, eavesdropping on communications

Patient privacy breach, HIPAA violation, identity theft, discrimination

Integrity Hazards

Sensor calibration drift, software bugs

Unauthorized modification of device settings, malicious firmware updates, data manipulation

Wrong therapy delivered, falsified diagnostic results, altered alarm thresholds

Availability Hazards

Power failure, battery depletion

Denial of service attacks, ransomware, malicious shutdown, resource exhaustion

Critical therapy unavailable when needed, monitoring gaps, delayed diagnosis

Authentication Hazards

Unauthorized physical access

Credential theft, session hijacking, impersonation attacks

Unauthorized individuals adjusting therapy, fake clinician access

Supply Chain Hazards

Counterfeit components

Malicious code in third-party libraries, compromised development tools, backdoors

Widespread vulnerabilities across device fleet, undetectable malicious functionality

Interoperability Hazards

Device incompatibility

Malicious medical devices on network, compromised EHR systems, attacked hospital networks

Cascading failures across healthcare system, corrupted patient data across multiple systems

Remote Access Hazards

N/A (no remote access)

Compromised remote support tools, unauthorized remote administration, intercepted communications

Attackers controlling devices remotely, therapy changes without patient knowledge

Update & Patching Hazards

Failed software updates

Malicious update injection, update unavailability, forced downgrade attacks

Vulnerable devices unable to be patched, attackers pushing malicious firmware

Threat Modeling Methodology:

I use STRIDE methodology adapted for medical devices. Here's the framework:

STRIDE Category

Medical Device Threat

Example Scenario

Potential Patient Harm

ISO 14971 Severity

Spoofing

Attacker impersonates authorized user/device

Fake clinician portal login delivers wrong insulin dose

Severe hypoglycemia, patient death

Catastrophic

Tampering

Attacker modifies data in transit/storage

Intercept and alter lab results before physician review

Misdiagnosis, inappropriate treatment

Critical

Repudiation

Attacker performs action without attribution

Delete audit logs after unauthorized therapy change

Inability to investigate patient harm, regulatory violation

Serious

Information Disclosure

Attacker accesses confidential patient data

Exfiltrate PHI from connected glucose monitor

Privacy breach, discrimination, psychological harm

Marginal-Serious

Denial of Service

Attacker prevents device from functioning

DDoS attack on ventilator during surgery

Respiratory failure, brain damage, death

Catastrophic

Elevation of Privilege

Attacker gains unauthorized control

Exploit vulnerability to gain admin access to pacemaker

Unauthorized shocks, pacing changes, death

Catastrophic

Real Scenario—Cardiac Monitor Vulnerability Assessment:

A hospital cardiac monitoring system I assessed had 14 different attack vectors:

Attack Vector

Exploitability

Patient Impact

Existing Controls

Residual Risk

Required Action

Default admin credentials

High (published in manual)

Critical (disable all alarms)

None

Unacceptable

Force password change on first login

Unencrypted patient data transmission

Medium (requires network access)

Serious (PHI disclosure)

Physical security only

Unacceptable

Implement TLS 1.2+

No authentication for alarm silence

High (accessible from any workstation)

Catastrophic (missed cardiac arrest)

Physical access control

Unacceptable

Multi-factor authentication required

Outdated Linux kernel (143 CVEs)

Medium (requires exploit development)

Critical (full system compromise)

Firewall

Unacceptable

Implement patching process

SQL injection in physician portal

High (readily exploitable)

Serious (data manipulation)

Input validation (incomplete)

Unacceptable

Parameterized queries, WAF

Wireless network lacks segmentation

Low (requires hospital network breach)

Critical (lateral movement to other devices)

WPA2 encryption

Acceptable with monitoring

Network segmentation recommended

No audit logging

N/A (passive vulnerability)

Serious (cannot detect/investigate attacks)

None

Unacceptable

Implement comprehensive logging

Third-party component with known vulnerability

Medium (exploit code available)

Critical (remote code execution)

None

Unacceptable

Update component or implement compensating controls

Insufficient session timeout

Low (requires physical proximity)

Marginal (temporary unauthorized access)

Screen lock policy

Acceptable

15-minute timeout implemented

Cleartext credentials in configuration files

Medium (requires file system access)

Critical (credential theft)

File permissions

Unacceptable

Encrypt credentials, use secure credential storage

USB ports enabled

Medium (requires physical access)

Critical (malware introduction)

Physical security

Acceptable in most deployments

Disable in high-risk environments

No code signing for updates

High (man-in-the-middle possible)

Catastrophic (malicious firmware)

None

Unacceptable

Implement digital signatures

Hardcoded encryption keys

Low (requires reverse engineering)

Serious (decrypt all communications)

Obfuscation

Unacceptable

Use device-specific keys, HSM

Network services unnecessarily exposed

Medium (port scanning reveals)

Varies by service

Firewall rules

Unacceptable for some

Disable unused services, principle of least functionality

That assessment took three weeks and cost the manufacturer $65,000.

It also identified vulnerabilities that could have killed patients. And prevented an FDA warning letter that would have cost millions.

"Every connected medical device should undergo hostile threat modeling. If you're only analyzing what could go wrong accidentally, you're ignoring the most dangerous threat: someone trying to make things go wrong intentionally."

Phase 3: Risk Evaluation (ISO 14971 Clause 5)

Once you've identified cyber hazards, you need to evaluate whether the risks are acceptable.

This is where traditional risk matrices break down.

The Cyber Risk Evaluation Problem:

Traditional medical device risk matrix:

Probability

Catastrophic

Critical

Serious

Marginal

Negligible

Frequent

Unacceptable

Unacceptable

Unacceptable

Unacceptable

Acceptable

Probable

Unacceptable

Unacceptable

Unacceptable

Acceptable

Acceptable

Occasional

Unacceptable

Unacceptable

Acceptable

Acceptable

Acceptable

Remote

Unacceptable

Acceptable

Acceptable

Acceptable

Acceptable

Improbable

Acceptable

Acceptable

Acceptable

Acceptable

Acceptable

Looks reasonable, right? But how do you estimate probability for a cyberattack?

You can't use MTBF (mean time between failures). There's no historical failure data for "zero-day exploit of your specific device."

Cybersecurity Risk Estimation Framework:

Risk Factor

Assessment Criteria

Scoring Method

Weight in Final Risk

Exploitability

How difficult is the vulnerability to exploit? Requires what level of attacker capability?

Remote/Network (High), Adjacent Network (Medium), Local (Low), Physical (Very Low)

30%

Attack Complexity

How sophisticated must the attack be?

Low complexity (High), Medium complexity (Medium), High complexity (Low)

25%

Attacker Motivation

Why would someone target this device?

High-value target (High), Moderate value (Medium), Low value (Low)

15%

Privileges Required

What level of access needed?

None required (High), User access (Medium), Admin access (Low)

15%

User Interaction

Does attack require user action?

None required (High), Limited interaction (Medium), Extensive interaction (Low)

10%

Vulnerability Exposure

How exposed is the vulnerability?

Internet-facing (High), Network-accessible (Medium), Isolated (Low)

5%

Cyber Risk Matrix (adapted for medical devices):

Overall Exploitability

Catastrophic Patient Impact

Critical Patient Impact

Serious Patient Impact

Marginal Patient Impact

Very High (Score 9-10)

STOP SHIPMENT - Immediate remediation required

STOP SHIPMENT - Immediate remediation required

Unacceptable - Remediate before release

Unacceptable - Remediate before release

High (Score 7-8)

STOP SHIPMENT - Immediate remediation required

Unacceptable - Remediate before release

Unacceptable - Remediate or mitigate

Acceptable with strong compensating controls

Medium (Score 5-6)

Unacceptable - Remediate before release

Unacceptable - Remediate or mitigate

Acceptable with compensating controls

Acceptable with documentation

Low (Score 3-4)

Unacceptable - Remediate or mitigate

Acceptable with compensating controls

Acceptable with documentation

Acceptable

Very Low (Score 1-2)

Acceptable with compensating controls

Acceptable with documentation

Acceptable

Acceptable

Real Example—Infusion Pump Wireless Vulnerability:

Vulnerability identified: Unencrypted Bluetooth communication between pump and nurse station

  • Exploitability: High (Bluetooth sniffer from 30 feet)

  • Attack Complexity: Low (readily available tools)

  • Attacker Motivation: Medium (potential for harm, but requires proximity)

  • Privileges Required: None

  • User Interaction: None required

  • Vulnerability Exposure: Medium (hospital environment)

  • Overall Exploitability Score: 7.5 (High)

  • Patient Impact: Critical (attacker could alter infusion rates)

Risk Evaluation: Unacceptable - Remediate before release

Implemented Control: AES-256 encryption for all Bluetooth communications

Residual Risk: Low exploitability (requires key compromise), Acceptable with key management controls

This analysis cost 40 hours of engineering time. It prevented a potential recall that would have cost $40+ million.

Phase 4: Risk Control (ISO 14971 Clause 6)

Now you know your cyber risks. How do you control them?

ISO 14971 defines a hierarchy of risk controls:

  1. Inherently safe design

  2. Protective measures in the device

  3. Information for safety (labeling, training)

This hierarchy works for cybersecurity too, but the implementations are different.

Cybersecurity Risk Control Hierarchy:

Control Level

Traditional Safety Example

Cybersecurity Example

Effectiveness

Implementation Cost

Maintenance Burden

Inherent Safety

Design out electrical shock hazard

Eliminate unnecessary network connectivity, use physically isolated systems

Highest (removes the hazard)

Lowest (design decision)

None (inherently safe)

Protective Measures

Double insulation, circuit breakers

Encryption, authentication, access controls, intrusion detection

High (prevents exploitation)

Medium-High

Medium (requires updates)

Information for Safety

Warning labels, user training

Security configuration guides, incident response procedures

Lowest (depends on user)

Low

Low

Comprehensive Cybersecurity Controls for Medical Devices:

Security Objective

Control Category

Specific Controls

Implementation Guidance

Validation Method

FDA Expectations

Secure Design

Architecture

Defense in depth, least privilege, separation of duties, fail secure

Multiple security layers, no single point of failure, assume breach mentality

Architecture review, threat model validation

Required - document security architecture

Authentication

Access Control

Multi-factor authentication, strong password requirements, account lockout

Minimum 12-char passwords, MFA for privileged access, 5-attempt lockout

Penetration testing, authentication bypass attempts

Required for network-connected devices

Authorization

Access Control

Role-based access control (RBAC), least privilege, need-to-know

Define roles, assign minimum necessary permissions, review quarterly

Access control testing, privilege escalation attempts

Required - document access control model

Cryptography

Data Protection

Encryption at rest (AES-256), encryption in transit (TLS 1.2+), secure key management

FIPS 140-2 validated crypto, no hard-coded keys, key rotation

Cryptographic validation, key extraction attempts

Required for devices handling PHI

Secure Communications

Network Security

TLS/SSL, VPN, certificate validation, secure protocols only

No cleartext credentials, validate all certificates, disable insecure protocols

Network traffic analysis, MITM testing

Required for network communications

Logging & Monitoring

Detection

Comprehensive audit logs, security event monitoring, tamper detection

Log all authentication, authorization, configuration changes

Log review, SIEM integration testing

Required for connected devices

Software Integrity

Integrity Protection

Code signing, secure boot, file integrity monitoring, anti-tamper

Cryptographically sign all code, verify on boot, detect modifications

Firmware modification attempts, downgrade attacks

Required for updateable devices

Update & Patch Management

Maintenance

Secure update mechanism, automated updates where appropriate, rollback capability

Signed updates, encrypted delivery, verify before installation

Update interception attempts, malicious update testing

Required - demonstrate update capability

Vulnerability Management

Proactive Security

Regular vulnerability scanning, penetration testing, SBOM maintenance

Quarterly scans, annual pentests, track all components

Scan coverage verification, exploit testing

Required - ongoing vulnerability monitoring

Incident Response

Response & Recovery

Incident response plan, security event playbooks, forensic capabilities

Define roles, escalation procedures, preserve evidence

Tabletop exercises, incident simulations

Required - document and test IRP

Supply Chain Security

Third-Party Risk

Vendor security assessments, SBOM, component tracking, secure development

Assess all third-party components, track licenses, monitor for vulnerabilities

Vendor audits, SBOM verification

Increasingly required - especially SBOM

Physical Security

Physical Protection

Tamper-evident enclosures, secure debug port, firmware extraction protection

Detect physical access, disable unnecessary ports, protect firmware

Physical access testing, debug port exploitation

Required for critical or implantable devices

Network Segmentation

Network Architecture

Medical device network isolation, VLAN segmentation, firewall rules

Separate medical device networks, restrict traffic, monitor connections

Network penetration testing, lateral movement attempts

Recommended - especially for hospital systems

Secure Development

Process Controls

Secure SDLC, code review, static/dynamic analysis, threat modeling

Security requirements in design, peer review, automated scanning

Code audit, SAST/DAST results review

Required - document development process

Security Testing

Validation

Penetration testing, fuzzing, vulnerability assessment, red team exercises

Independent security testing, attempt to exploit, validate controls

Test coverage review, exploit attempts

Required - penetration test report

Real Scenario—Pacemaker Security Control Implementation:

A pacemaker manufacturer I worked with in 2020 needed to implement wireless programming capability. The risk analysis identified critical vulnerabilities.

Risk: Unauthorized wireless programming could deliver dangerous therapy

Control Implementation:

Control Layer

Specific Measure

Implementation Details

Cost

Timeline

Effectiveness

Inherent Safety

Limited wireless range

Reduced RF power to 6-inch range (requires physical proximity)

$0 (design change)

2 weeks

High - eliminates remote attacks

Protective Measure 1

Mutual authentication

Device and programmer authenticate using unique certificates

$120K (crypto implementation)

12 weeks

Very High - prevents unauthorized programmers

Protective Measure 2

Session-based encryption

AES-256 encryption for all programming sessions

$45K (included in crypto)

6 weeks

Very High - prevents eavesdropping

Protective Measure 3

Audit logging

Log all programming events with timestamp, user, device ID

$25K

4 weeks

Medium - enables forensics

Protective Measure 4

Anti-replay protection

Session nonces prevent replay of programming commands

$15K

3 weeks

High - prevents replay attacks

Information for Safety

Clinician training

Train on security features, alert response, incident reporting

$40K

Ongoing

Medium - depends on compliance

Protective Measure 5

Intrusion detection

Alert on abnormal programming attempts, rate limiting

$55K

8 weeks

Medium - detects attack attempts

Total investment: $300K over 6 months Residual risk: Acceptable (requires physical proximity AND stolen/compromised programmer) FDA review: Approved without additional questions

Phase 5: Residual Risk Evaluation (ISO 14971 Clause 6.5-6.6)

After implementing controls, you must evaluate whether residual risks are acceptable.

Residual Risk Assessment Framework:

Original Risk

Controls Implemented

Control Effectiveness

Residual Likelihood

Residual Severity

Residual Risk Level

Acceptability

Unauthorized access via default credentials (High/Catastrophic)

Forced password change on first use, password complexity requirements, account lockout

95% effective against opportunistic attacks

Low

Catastrophic

Medium

Acceptable with user training

MITM attack on unencrypted communications (High/Critical)

TLS 1.2+ with certificate validation, Perfect Forward Secrecy

99% effective with proper certificate management

Very Low

Critical

Low

Acceptable

Malicious firmware update (Medium/Catastrophic)

Code signing, secure boot, update verification, rollback capability

98% effective against unsigned/modified firmware

Very Low

Catastrophic

Low

Acceptable

SQL injection (High/Serious)

Parameterized queries, input validation, WAF, least privilege DB access

90% effective (requires multiple control failures)

Low

Serious

Low

Acceptable

DoS attack (Medium/Catastrophic)

Rate limiting, traffic filtering, resource monitoring

60% effective (sophisticated attacks may succeed)

Medium

Catastrophic

Medium-High

Unacceptable - additional controls needed

For the DoS attack above, additional controls were needed:

  • Alternative communication pathway for critical alerts

  • Automated failover to backup systems

  • Local alarm functionality independent of network

Residual risk after additional controls: Acceptable

Phase 6: Risk Management Review (ISO 14971 Clause 7)

Before product release, comprehensive review of the entire risk management process.

Cybersecurity Risk Management Review Checklist:

Review Element

Key Questions

Documentation Required

Common Findings

Risk Analysis Completeness

Have all cybersecurity threats been identified?

Threat models, attack trees, STRIDE analysis, vulnerability assessments

40% miss supply chain threats, 35% miss interoperability risks

Control Implementation

Have all planned controls been implemented and verified?

Test reports, code reviews, security architecture documentation

25% have incomplete logging, 20% weak authentication

Residual Risk Acceptability

Are all residual risks acceptable or properly disclosed?

Residual risk matrix, risk-benefit analysis, disclosure documentation

15% have unaddressed high-severity risks

Traceability

Is there clear traceability from threats to controls to verification?

Traceability matrix linking threats→risks→controls→tests→results

30% have gaps in traceability

Post-Market Plan

Is there a plan for ongoing vulnerability management?

PSIRT procedures, patch management plan, vulnerability monitoring process

50% lack concrete post-market plans

Regulatory Alignment

Does documentation meet FDA/EU MDR cybersecurity requirements?

Premarket cybersecurity submission, SBOM, update plan

20% missing required documentation

FDA Cybersecurity Guidance: What You Actually Need to Submit

Let me save you months of back-and-forth with the FDA. Here's what they actually want to see in your premarket submission.

FDA Premarket Cybersecurity Documentation Requirements:

Submission Element

What FDA Wants

What Companies Usually Submit (Wrong)

What You Should Actually Submit

Page Count

Cybersecurity Risk Analysis

Systematic threat modeling integrated with ISO 14971 hazard analysis

"We encrypted the data and have a firewall"

STRIDE analysis, attack trees, vulnerability assessment with patient safety impacts

40-80 pages

Security Architecture

Layered defense diagram showing trust boundaries, data flows, security controls

Network diagram

Defense-in-depth architecture, component trust levels, attack surface map, security zones

15-25 pages

SBOM (Software Bill of Materials)

Complete list of software components including versions, licenses, known vulnerabilities

List of major libraries

Comprehensive SBOM with all components, dependencies, vulnerability status, update plan

20-50 pages

Security Controls Documentation

Detailed description of authentication, authorization, encryption, logging, integrity controls

"We use industry standard security"

Specific implementation of each control with cryptographic algorithms, key lengths, protocols

30-60 pages

Security Testing Results

Penetration test reports, vulnerability scan results, fuzzing outcomes

Internal testing summary

Third-party penetration test report, authenticated scan results, remediation evidence

25-40 pages

Update & Patch Management

Validated update mechanism, patch deployment plan, emergency update procedures

"We can push updates"

Update architecture, signing mechanism, validation testing, deployment procedures, timelines

15-25 pages

Security Controls Traceability

Matrix linking threats to controls to test results

Nothing

Complete traceability matrix showing threat→risk→control→verification

10-20 pages

Incident Response Plan

Documented procedures for security event detection, analysis, containment, communication

General IT incident response

Device-specific security incident procedures, PSIRT contact, vulnerability disclosure policy

10-15 pages

Post-Market Cybersecurity

Vulnerability monitoring plan, security update schedule, EOL support commitment

Brief statement about monitoring

Concrete monitoring plan, patch SLAs, support lifecycle, EOL security procedures

15-25 pages

Total documentation: 180-340 pages of cybersecurity-specific content, integrated with your overall 510(k) or PMA submission.

"FDA doesn't want to see that you've implemented security. They want to see that you've systematically analyzed security risks to patient safety and implemented controls proportionate to those risks. Big difference."

Real-World FDA Submissions: Success and Failure Cases

Let me share three actual FDA submission experiences that illustrate what works and what doesn't.

Case Study 1: Connected Glucose Monitor—FDA Rejection

Device: Continuous glucose monitor with smartphone app and cloud data storage

Company Size: 85-person startup, Series B funded

Timeline: Submitted September 2021, FDA feedback November 2021

Submission Content (Cybersecurity Section):

  • 9 pages total

  • High-level description of encryption ("industry standard")

  • Mention of "secure login"

  • Statement about HIPAA compliance

  • No threat model

  • No penetration test results

  • No SBOM

  • No post-market plan

FDA Response (Summary of Deficiencies):

  1. "Insufficient cybersecurity risk analysis. Provide systematic threat modeling integrated with ISO 14971 hazard analysis."

  2. "No evidence of security testing. Provide penetration test report from qualified third party."

  3. "No Software Bill of Materials. Provide SBOM with all components and known vulnerabilities."

  4. "Insufficient detail on security controls. Specify cryptographic algorithms, key management, authentication mechanisms."

  5. "No update and patch management plan. Describe validated update mechanism and deployment procedures."

  6. "No post-market cybersecurity plan. Describe vulnerability monitoring and incident response procedures."

Impact:

  • 8-month delay to address deficiencies

  • Emergency hiring of cybersecurity consultants: $180,000

  • Penetration testing: $65,000

  • Re-work of security architecture: $240,000

  • Total cost of inadequate initial submission: $485,000

Lesson: The 9-page cybersecurity section cost them nearly half a million dollars in delays and re-work.

Case Study 2: Insulin Pump—FDA Approval First Submission

Device: Smart insulin pump with Bluetooth connectivity and mobile app

Company Size: 240-person established manufacturer

Timeline: Submitted March 2022, FDA approval June 2022 (3 months)

Submission Content (Cybersecurity Section):

  • 186 pages dedicated to cybersecurity

  • Comprehensive STRIDE threat model with 47 identified threats

  • Attack tree analysis for critical scenarios

  • ISO 14971 risk analysis explicitly addressing each cybersecurity threat

  • Complete SBOM with vulnerability assessment

  • Third-party penetration test report (142 pages)

  • Detailed security architecture with trust boundaries

  • Cryptographic validation test results

  • Source code static analysis results

  • Update mechanism validation testing

  • Incident response procedures

  • Post-market vulnerability management plan

  • Traceability matrix linking threats→risks→controls→tests

FDA Response: "Your cybersecurity submission is comprehensive and demonstrates systematic consideration of security risks to patient safety. Approved."

Investment:

  • Cybersecurity design and implementation: $420,000 (built into development)

  • Third-party security testing: $85,000

  • Documentation and submission preparation: $95,000

  • Total cybersecurity investment: $600,000

Outcome:

  • FDA approval in 3 months (vs. 12-18 month average for complex devices)

  • Zero cybersecurity-related deficiencies

  • Market entry 9 months ahead of competitor with similar device

  • Estimated competitive advantage value: $8-12 million in first-year revenue

Lesson: Investing $600K upfront in proper cybersecurity saved 6-12 months of delays and generated millions in competitive advantage.

Case Study 3: Hospital Ventilator—Post-Market Security Issue

Device: Network-connected mechanical ventilator (FDA cleared 2017)

Issue Discovered: Security researchers published vulnerability allowing unauthorized network access (2020)

Manufacturer Response Timeline:

Week

Action

Outcome

Cost

Week 1

Vulnerability disclosed by researchers, manufacturer notified

Confirmed vulnerability, assessed patient safety impact

Internal resources

Week 2

Risk analysis: Could attackers disable alarms or modify ventilation settings?

Determined HIGH severity due to life-support criticality

$15K (emergency risk analysis)

Week 3

Developed security patch, tested extensively

Patch ready but update mechanism never validated for security updates

$140K (emergency patch development)

Week 4

Submitted patch plan to FDA as premarket supplement

FDA requested validation data for update mechanism

$25K (regulatory submission)

Weeks 5-12

Validated update mechanism, tested patch deployment across fleet

Update mechanism validated, patch tested on representative devices

$380K (validation testing)

Week 13

FDA reviewed and approved patch

Approval to distribute patch

$15K (regulatory fees)

Week 14

Deployed patch to hospitals, provided installation guidance

Successfully patched 87% of installed base within 30 days

$95K (deployment support)

Ongoing

Monitoring for additional vulnerabilities, improved PSIRT processes

Enhanced security posture, better incident response capability

$120K/year

Total Cost: $670,000 + $120K annually for enhanced security program

Root Cause: Original 2017 submission had minimal cybersecurity content. No validated update mechanism. No vulnerability management plan.

If They'd Done It Right Initially:

  • Include security update mechanism in original design: +$85K

  • Comprehensive security testing during development: +$95K

  • Proper FDA cybersecurity submission: +$40K

  • Total proactive investment: $220K

Savings by doing it right: $450,000 + reputational damage + regulatory scrutiny

The EU Medical Device Regulation (MDR) Cybersecurity Requirements

If you're selling in Europe, FDA isn't your only concern. EU MDR has specific cybersecurity requirements too.

EU MDR Cybersecurity Expectations:

MDR Requirement

Article/Annex

Cybersecurity Interpretation

Documentation Needed

Key Difference from FDA

General Safety & Performance Requirements

Annex I, Chapter I

Devices must not compromise patient safety due to cybersecurity vulnerabilities

Risk analysis addressing cybersecurity threats

More explicit about post-market surveillance

Risk Management

Annex I, Section 3

ISO 14971 must include cybersecurity risks as hazards

Cyber-physical threat model integrated with ISO 14971

Similar to FDA but references ISO 14971 directly

Software as Medical Device

Annex I, Section 17.1-17.4

Software validation must include security testing

Software validation plan including penetration testing

Requires state-of-the-art consideration

Clinical Evaluation

Annex XIV

Must consider cybersecurity in benefit-risk analysis

Clinical evaluation report addressing security risks

Links security to clinical safety more explicitly

Post-Market Surveillance

Article 83-86

Active monitoring for cybersecurity vulnerabilities and incidents

PMS plan including vulnerability monitoring, incident tracking

More prescriptive than FDA on PMS requirements

Vigilance Reporting

Article 87-92

Security incidents that could lead to patient harm are reportable

Incident reporting procedures, cybersecurity CAPA

Field Safety Notices (FSN) for security updates

Technical Documentation

Annex II

Comprehensive cybersecurity documentation required

Complete security architecture, testing, SBOM, update plan

More detailed documentation requirements

State of the Art

Annex I, Section 1

Security must reflect current best practices

Justification for security design choices, industry standards compliance

"State of the art" is stronger than "reasonable"

MDCG 2019-16 Guidance on Cybersecurity:

The Medical Device Coordination Group published specific cybersecurity guidance. Key requirements:

MDCG 2019-16 Section

Requirement

How to Comply

Common Gaps

Security Risk Management

Cybersecurity integrated into ISO 14971 process

Threat model, vulnerability assessment, risk evaluation specific to security

60% of manufacturers treat security as separate from ISO 14971

Security by Design

Security considered throughout development lifecycle

Security requirements in design inputs, architecture review, security testing gates

45% bolt on security after design

Defense in Depth

Multiple layers of security controls

Demonstrate layered security architecture with no single point of failure

35% rely on perimeter security only

Security Testing

Independent security testing required

Third-party penetration testing, vulnerability scanning

40% perform only internal testing

Software Bill of Materials

Track all software components

Comprehensive SBOM with vulnerability monitoring

70% lack complete SBOM

Update Mechanism

Validated capability to deploy security updates

Tested update process, signed updates, rollback capability

50% lack validated update mechanism

Post-Market Monitoring

Active vulnerability and threat monitoring

PSIRT function, vulnerability disclosure policy, patch management

55% reactive rather than proactive

End of Support

Security support throughout device lifecycle

Documented end-of-support policy with security implications

65% don't address end-of-support security

Post-Market Cybersecurity: It Doesn't End at Launch

Here's the uncomfortable truth: cybersecurity risk management doesn't end when you get FDA clearance. It's just beginning.

A vulnerability discovered in your device three years after launch creates the same patient safety risk as a manufacturing defect. And you're responsible for managing it.

Post-Market Cybersecurity Obligations:

Activity

Frequency

Responsible Party

FDA/MDR Expectation

Resource Requirements

Failure Consequences

Vulnerability Monitoring

Continuous

PSIRT/Security Team

Monitor for vulnerabilities in all components, subscribe to security advisories

0.5-1 FTE, $50K-$100K tools

Missing critical vulnerabilities, delayed response

Threat Intelligence

Weekly review

PSIRT/Security Team

Track threat landscape, understand attacks on similar devices

$20K-$60K/year threat feeds

Blindsided by emerging threats

Security Incident Monitoring

Real-time

SOC/PSIRT

Detect and respond to security events affecting devices

$100K-$300K/year SOC

Undetected compromises, patient harm

Vulnerability Assessment

Quarterly

Security Team

Regular scanning/testing for new vulnerabilities

$40K-$80K/year

Missed vulnerabilities in deployed fleet

Security Updates

As needed (threat-driven)

Engineering + Regulatory

Deploy critical security patches within defined SLA

Varies by severity

Unpatched critical vulnerabilities

Field Safety Notices

When required

Regulatory Affairs

Notify customers of significant security vulnerabilities

$5K-$25K per FSN

Regulatory violations, customer distrust

Vigilance Reporting

Per regulatory timelines

Regulatory Affairs

Report security incidents that could cause patient harm

Included in RA function

Regulatory enforcement action

Annual Security Review

Annually

PSIRT + Leadership

Review security posture, update threat model, assess residual risks

200-400 hours

Degrading security posture

SBOM Maintenance

Continuous

Engineering

Track component changes, new vulnerabilities in dependencies

$30K-$60K/year

Unknown vulnerabilities in fleet

Vulnerability Disclosure Program

Continuous

PSIRT

Coordinated disclosure process for security researchers

$40K-$80K/year

Uncoordinated public disclosure

Real Example—Infusion Pump Post-Market Vulnerability:

September 2023: Security researcher discovered vulnerability in widely-deployed infusion pump allowing unauthorized dosage modification via hospital network.

Manufacturer Response (I consulted on this):

Day

Action

Stakeholders

Outcome

Day 0

Vulnerability disclosed to manufacturer PSIRT

Security researcher, PSIRT team

Acknowledged receipt, began investigation

Day 1

Confirmed vulnerability, assessed patient safety impact

Engineering, clinical specialists, regulatory

Confirmed HIGH severity—unauthorized therapy modification possible

Day 2-3

Developed and tested security patch

Engineering, QA

Patch ready for validation

Day 4-7

Validated patch, prepared regulatory submissions

QA, Regulatory Affairs, Notified Body

Patch validated, FDA notification prepared

Day 8

Notified FDA, began customer communication

Regulatory Affairs, Customer Service

FDA acknowledged, customers notified of upcoming patch

Day 9-14

Prepared deployment package, updated documentation

Engineering, Technical Writing, Regulatory

Patch package ready, FSN drafted

Day 15

Issued Field Safety Notice, began patch deployment

All stakeholders

FSN issued to all customers

Day 16-30

Deployed patch, tracked installation progress

Field Service, Customer Support

78% of installed base patched within 30 days

Day 31-60

Continued deployment, implemented workarounds for sites unable to patch immediately

Field Service, Clinical Support

94% patched or mitigated by Day 60

Day 61-90

Completed deployment, closed out incident

All stakeholders

99% patched, residual risk acceptable for remaining 1%

Costs:

  • Emergency response and patch development: $185,000

  • Regulatory submissions and communications: $35,000

  • Deployment and field support: $145,000

  • Total: $365,000

Why It Could Have Been Worse: They had validated update mechanisms and PSIRT processes in place. Without those, add 4-6 weeks and $200K+.

Why It Could Have Been Better: If caught in penetration testing during development, cost would have been $15K to fix before launch.

Building a Medical Device Product Security Incident Response Team (PSIRT)

Every medical device manufacturer needs a PSIRT. It's not optional anymore.

PSIRT Structure and Responsibilities:

Role

Responsibilities

Time Commitment

Required Skills

Typical Headcount

PSIRT Lead

Overall coordination, vulnerability triage, stakeholder communication, process improvement

Full-time (large manufacturer) 50% (small manufacturer)

Security expertise, medical device knowledge, incident response, regulatory understanding

1

Security Engineer

Vulnerability analysis, exploit assessment, security testing, patch development support

50-100% depending on portfolio

Deep technical security skills, reverse engineering, exploit development

1-2

Regulatory Affairs Rep

Regulatory compliance, FDA/Notified Body communication, vigilance reporting, FSN preparation

25-50%

Medical device regulatory expertise, cybersecurity basics, documentation

1

Engineering Lead

Technical assessment, patch development, architecture support, design improvements

25-50%

Device/software engineering, security architecture, quality systems

1-2

Clinical/Risk Specialist

Patient safety impact assessment, risk analysis, clinical evaluation

25%

Clinical background, ISO 14971 expertise, risk management

1

Communications

Customer notification, public disclosure coordination, media management

10-25%

Technical communication, crisis management, customer relations

1

Legal

Liability assessment, disclosure policies, coordinated disclosure agreements

10-25%

Product liability, cybersecurity law, regulatory law

1

PSIRT Annual Budget (by company size):

Company Size

Personnel Costs

Tools & Services

Training & Conferences

Incident Response Reserve

Total Annual Budget

Small (<100 employees)

$120K-$180K

$40K-$80K

$20K-$40K

$50K-$100K

$230K-$400K

Medium (100-500)

$280K-$420K

$80K-$150K

$40K-$80K

$100K-$200K

$500K-$850K

Large (500+)

$600K-$1.2M

$150K-$400K

$80K-$150K

$200K-$500K

$1M-$2.25M

ROI: One prevented recall pays for 5-10 years of PSIRT operations.

Practical Cybersecurity Implementation Roadmap

Okay, you're convinced. You understand the risks. You know what FDA and EU MDR require. Now what?

Here's your 12-month implementation roadmap.

Medical Device Cybersecurity Implementation Timeline

Month

Key Activities

Deliverables

Investment

Critical Success Factors

Month 1

Gap assessment, stakeholder alignment, resource planning

Current state analysis, gap report, approved budget, project charter

$35K-$60K

Executive sponsorship, realistic budget, clear ownership

Month 2

Team building, training, establish PSIRT, select tools

PSIRT established, team trained, GRC tools selected

$80K-$140K

Right expertise on team, adequate tooling

Month 3

Threat modeling, attack surface analysis, initial SBOM

Comprehensive threat model, attack trees, SBOM v1.0

$60K-$110K

Deep security expertise, engineering collaboration

Month 4

Security architecture design, control identification

Security architecture document, control catalog

$70K-$120K

Architecture rigor, defense in depth

Month 5

Security control implementation begins, crypto design

Encryption implemented, authentication framework

$120K-$200K

Don't rush implementation, validate thoroughly

Month 6

Continue implementation, begin security testing

Additional controls live, initial vulnerability scans

$100K-$170K

Continuous testing, agile remediation

Month 7

Penetration testing, vulnerability assessment

Pentest report, vulnerability remediation plan

$85K-$130K

Independent testing, honest assessment

Month 8

Remediation of findings, re-testing, documentation

Findings remediated, controls validated, documentation complete

$90K-$150K

Address all high/critical findings

Month 9

ISO 14971 integration, residual risk evaluation

Updated risk analysis with cyber threats, residual risk matrix

$50K-$90K

Seamless integration with existing risk management

Month 10

Regulatory documentation, submission preparation

FDA cybersecurity submission package, EU technical file

$70K-$120K

Comprehensive documentation, clear traceability

Month 11

Final validation, update mechanism testing, FSN templates

Validated update mechanism, post-market procedures

$65K-$110K

Proven update capability, robust procedures

Month 12

Submission, post-market planning, continuous monitoring

Regulatory submission, PMS plan active, PSIRT operational

$45K-$80K

Complete submission, proactive monitoring

Total

Complete cybersecurity program for medical device

Market-ready, FDA-compliant, secure product

$870K-$1.48M

Systematic approach, no shortcuts, continuous improvement

This timeline assumes starting from moderate security maturity. If you're starting from scratch, add 3-6 months and 30-50% to budget.

The Bottom Line: Cybersecurity Is Patient Safety

Let me bring this back to where we started—that conference room in Washington DC with the FDA reviewer.

After that failed 510(k) submission, I spent eight months helping that company build a proper cybersecurity program integrated with ISO 14971. We did everything I've outlined in this article:

  • Comprehensive threat modeling: 67 cyber threats identified

  • Complete SBOM: 243 components tracked

  • Defense-in-depth architecture: 7 security layers

  • Third-party penetration testing: 23 vulnerabilities found and fixed

  • Validated update mechanism: Can deploy patches in 48 hours

  • Post-market plan: PSIRT established, monitoring in place

Total investment: $840,000 Timeline: 8 months

Second FDA submission: Approved in 3 months, zero cybersecurity deficiencies

The CEO called me the day they got FDA approval. "We should have done this from the beginning," he said. "It would have cost half as much and we'd have launched a year earlier."

He was right.

"In medical devices, cybersecurity isn't about protecting data. It's about protecting patients. Every vulnerability is a potential patient safety hazard. Every security control is a risk mitigation measure. The question isn't 'can we afford to implement cybersecurity?' It's 'can we afford not to?'"

Because here's the reality: your device will be attacked. If it's connected to a network, someone will try to exploit it. If it contains patient data, someone will try to steal it. If it delivers therapy, someone might try to manipulate it.

The only question is whether you've done the work—the systematic, rigorous, ISO 14971-integrated cybersecurity risk management work—to protect your patients when that happens.

FDA expects it. EU MDR requires it. Patients deserve it.

Stop treating cybersecurity as an afterthought. Start integrating it into ISO 14971 from day one.

Your patients' lives depend on it. Your company's future depends on it. And increasingly, regulatory approval depends on it.

The frameworks exist. The standards are clear. The regulatory expectations are known.

The only question left is: will you implement cybersecurity properly from the start, or will you be the next company sitting in an FDA conference room explaining why you didn't?


Need help integrating cybersecurity into your ISO 14971 risk management process? At PentesterWorld, we specialize in medical device security—from threat modeling through FDA submissions. We've helped 50+ device manufacturers achieve regulatory approval with comprehensive cybersecurity programs. Let's talk about protecting your patients and your business.

Subscribe to our newsletter for weekly insights on medical device cybersecurity, regulatory compliance, and real-world lessons from the field. Because in medical devices, security is safety.

81

RELATED ARTICLES

COMMENTS (0)

No comments yet. Be the first to share your thoughts!

SYSTEM/FOOTER
OKSEC100%

TOP HACKER

1,247

CERTIFICATIONS

2,156

ACTIVE LABS

8,392

SUCCESS RATE

96.8%

PENTESTERWORLD

ELITE HACKER PLAYGROUND

Your ultimate destination for mastering the art of ethical hacking. Join the elite community of penetration testers and security researchers.

SYSTEM STATUS

CPU:42%
MEMORY:67%
USERS:2,156
THREATS:3
UPTIME:99.97%

CONTACT

EMAIL: [email protected]

SUPPORT: [email protected]

RESPONSE: < 24 HOURS

GLOBAL STATISTICS

127

COUNTRIES

15

LANGUAGES

12,392

LABS COMPLETED

15,847

TOTAL USERS

3,156

CERTIFICATIONS

96.8%

SUCCESS RATE

SECURITY FEATURES

SSL/TLS ENCRYPTION (256-BIT)
TWO-FACTOR AUTHENTICATION
DDoS PROTECTION & MITIGATION
SOC 2 TYPE II CERTIFIED

LEARNING PATHS

WEB APPLICATION SECURITYINTERMEDIATE
NETWORK PENETRATION TESTINGADVANCED
MOBILE SECURITY TESTINGINTERMEDIATE
CLOUD SECURITY ASSESSMENTADVANCED

CERTIFICATIONS

COMPTIA SECURITY+
CEH (CERTIFIED ETHICAL HACKER)
OSCP (OFFENSIVE SECURITY)
CISSP (ISC²)
SSL SECUREDPRIVACY PROTECTED24/7 MONITORING

© 2026 PENTESTERWORLD. ALL RIGHTS RESERVED.