The technology expansion is pushing the options for medical device connectivity. The options and configurations used to be relatively limited. Connectivity continues to grow in its different forms. While this is great for the industry, doctors, and patients, applied cybersecurity also needs to be addressed in every step of the way.
These connected devices connect to the network using Bluetooth,
BLE, or WIFI for communications. If configured correctly and cybersecurity
being incorporated throughout the process, generally this should work well. To
assist with this and provide guidance there are standards for medical devices
(e.g., IEC 62304, ISO 14971, and FDA guidance). These provide directed
guidance. The key though is documentation. The documents need to show not only
you have secured these standards but have implemented them. Part of the plan
and implementation includes the product’s risk analysis. I mention this
specifically is the risk analysis or TARA is the bedrock for risk analysis. When
thorough this will show the vulnerabilities, which need to be addressed. This
system’s review will build a solid cybersecurity plan and product for your
customers.
Enterprise and Embedded System Cybersecurity Engineering & Architecture
Red Team Product Pentesting | HW & SW BoMs | CBoM |
Vulnerability Management | Tabletop Exercises (TTX) |
Embedded Systems Architecture | Threat Intelligence |
TARA (Threat Assessment and Remediation Analysis) |
Supply Chain Cybersecurity Review
Reverse Engineering
charles.parker@mielcybersecurity.net 810-701-5511
No comments:
Post a Comment