the current state of cybersecurity in medical devices
play

The Current State of Cybersecurity in Medical Devices Medmarcs - PowerPoint PPT Presentation

The Current State of Cybersecurity in Medical Devices Medmarcs Webinar Series August 22, 2019 Vulnerable Devices Pacemakers / implantable defibrillators Insulin pumps Infusion pumps Mobile health technologies (mHealth


  1. The Current State of Cybersecurity in Medical Devices Medmarc’s Webinar Series August 22, 2019

  2. Vulnerable Devices • Pacemakers / implantable defibrillators • Insulin pumps • Infusion pumps • Mobile health technologies (mHealth Technology) • Patient monitors • Patient portals • Telemedicine • Ventilators / Life supporting devices • Imaging modalities • Hearing aids LORANCE CE THOM OMPSON ON A PROFESSIONAL CORPORATION

  3. Potential Loss Scenarios • Malware attacks • Software vulnerabilities • Faulty networks • Computer technology (IT services) • Hacking • Steal patient data • Commandeer medical devices for denial of service • Distributed denial of service • Cyber Extortion • Medical device vulnerabilities LORANCE CE THOM OMPSON ON A PROFESSIONAL CORPORATION

  4. Fundamental challenges • New features take priority over security • More commoditized hardware/software • Remote interface • Regulators are always playing catch up LORANCE CE THOM OMPSON ON A PROFESSIONAL CORPORATION

  5. Cyber security is • Confidentiality • Integrity • Availability LORANCE CE THOM OMPSON ON A PROFESSIONAL CORPORATION

  6. LORANCE CE THOM OMPSON ON A PROFESSIONAL CORPORATION

  7. Medical device risks • Software defect • Incorrect network configuration • Security and privacy issues • Lack of data protection • Disposal or loss of the device • Malware, criminals LORANCE CE THOM OMPSON ON A PROFESSIONAL CORPORATION

  8. Cyber related design considerations • System testing • Secure IT systems • Regulatory compliance • Account for upgrades and unknowns • Design security into the product --Make products as updatable and adaptable as the internet itself. LORANCE CE THOM OMPSON ON A PROFESSIONAL CORPORATION

  9. Malicious tampering What: Add or remove cancers from CT and MRI Why: Ransom in exchange for correction Create chaos and mistrust Missed diagnosis, failure to treat Insurance fraud LORANCE CE THOM OMPSON ON A PROFESSIONAL CORPORATION

  10. LORANCE CE THOM OMPSON ON A PROFESSIONAL CORPORATION

  11. How is this possible? • PACS not encrypted • Health care industry focused on privacy rather than security • Physical or network access • Direct connection to internet or to hospital network LORANCE CE THOM OMPSON ON A PROFESSIONAL CORPORATION

  12. Prevention • End to end encryption • Digital signatures LORANCE CE THOM OMPSON ON A PROFESSIONAL CORPORATION

  13. Medtronic Implantable Cardiac Devices • FDA safety communication re wireless telemetry technology • Conexus uses wireless RF without encryption LORANCE CE THOM OMPSON ON A PROFESSIONAL CORPORATION

  14. Safety features as designed • Can only be activated by a health care provider at a clinic • Activation times vary • Hacker would have to be nearby when active -Replacement is not recommended at this time. LORANCE CE THOM OMPSON ON A PROFESSIONAL CORPORATION

  15. Review the data lifecycle • Where is the data stored? • How is the data protected? • Who processes the data? • Who is responsible? • Who can access? LORANCE CE THOM OMPSON ON A PROFESSIONAL CORPORATION

  16. California Consumer Privacy Act Who? • Doing business in CA; revenue over $25 million; buy, sell, receive personal information of 50,000 or more devices or consumers or 50% plus revenue selling personal information What? • Right to access data, have data deleted, prevent data from being sold LORANCE CE THOM OMPSON ON A PROFESSIONAL CORPORATION

  17. California IoT Statute Reasonable security features appropriate to the nature and function of the device and information it collects, stores, or transmits. LORANCE CE THOM OMPSON ON A PROFESSIONAL CORPORATION

  18. Man anufac acturer O Obli ligatio ions Premarket and Postmarket Reporting LORANCE CE THOM OMPSON ON A PROFESSIONAL CORPORATION

  19. Manufacturers: Premarket Reporting • FDA Guidance – Guidance for the Content of Premarket Submissions for Software Contained in Medical Devices • http://www.fda.gov/MedicalDevices/DeviceRegulationandGuidance/GuidanceDocument s/u cm089543.htm • FDA Guidance to Industry - Cybersecurity for Networked Medical Devices Containing Off-the-Shelf (OTS) Software • http://www.fda.gov/MedicalDevices/DeviceRegulationandGuidance/GuidanceDocument s/u cm077812.htm • FDA Guidance for Industry and Food & Drug Administration Staff – Content of Premarket Submissions for Management of Cybersecurity in Medical Devices • http://www.fda.gov/BiologicsBloodVaccines/GuidanceComplianceRegulatoryInform ation/default.htm LORANCE CE THOM OMPSON ON A PROFESSIONAL CORPORATION

  20. Manufacturers – Premarket Reporting • Effective cybersecurity management in premarket submissions • To reduce risk to patients • From compromise of device functionality by inadequate cybersecurity • Guidance covers premarket submissions for devices that contain software (including firmware) or programmable logic as well as software that is a medical device LORANCE CE THOM OMPSON ON A PROFESSIONAL CORPORATION

  21. Manufacturers – Premarket Obligations • Manufacturers should: • develop a set of cybersecurity controls to assure medical device cybersecurity and maintain medical device functionality and safety. • address cybersecurity during the design and development of the medical device, as this can result in more robust and efficient mitigation of patient risks. • establish design inputs for their device related to cybersecurity, and establish a cybersecurity vulnerability and management approach as part of the software validation and risk analysis that is required by 21 CFR 820.30(g). LORANCE CE THOM OMPSON ON A PROFESSIONAL CORPORATION

  22. Manufacturers – Premarket Obligations • Identify • Protect • Detect • Respond • Recover LORANCE CE THOM OMPSON ON A PROFESSIONAL CORPORATION

  23. Manufacturers – Postmarket Obligations • Formal and informal reporting obligations • 21 CFR § 806.1: requires manufacturers to report to FDA certain product corrections and removals • Risk-based framework for determining when a reportable change to a medical device for cybersecurity vulnerability has occurred • Routine updates and patches versus • Correction of cybersecurity vulnerability that poses risk to health LORANCE CE THOM OMPSON ON A PROFESSIONAL CORPORATION

  24. Manufacturers – Postmarket Obligations • Reporting requirements (continued) • 21 CFR § 803.10 (1) Reports of individual adverse events – 30 calendar days after becoming aware of a reportable death, serious injury, or malfunction (2) Reports of individual adverse events - 5 work days after becoming aware of: (i) Reportable event that requires remedial action to prevent an unreasonable risk of substantial harm to the public health, or (ii) A reportable event for which FDA made a written request. LORANCE CE THOM OMPSON ON A PROFESSIONAL CORPORATION

  25. Manufacturers – Postmarket Obligations • FDA encourages: • The use and adoption of “Framework for Improving Critical Infrastructure Cybersecurity” https://www.nist.gov/sites/default/files/documents/cyberframework/cybersecurit y-framework021214.pdf • Information Sharing Executive Order 13691 – Promoting Private Sector Cybersecurity Information Sharing • Information Sharing Analysis Organizations • EO 13691; https://www.whitehouse.gov/the-press-office/2015/02/13/executive-order- promoting 7 - private-sector-cybersecurity-information-sharing) LORANCE CE THOM OMPSON ON A PROFESSIONAL CORPORATION

  26. FDA’s Role • Works with DHS, manufacturers, health care providers, and end users • QSRs • Pre- and post-market cybersecurity guidance LORANCE CE THOM OMPSON ON A PROFESSIONAL CORPORATION

  27. MEDICAL DEVICE CYBERSECURITY Regional Incident Preparedness and Response Playbook LORANCE CE THOM OMPSON ON A PROFESSIONAL CORPORATION

  28. Playbook - Stakeholders • FDA • Medical Device Manufacturers • Health Delivery Organizations (HDO’s) • Large and small hospitals, hospital systems, providers LORANCE CE THOM OMPSON ON A PROFESSIONAL CORPORATION

  29. Purpose of Medical Device Cybersecurity Playbook • Provide baseline medical device cybersecurity information that can be incorporated into an HDO’s emergency preparedness and response framework; • Outline roles and responsibilities for responders internal and external to the HDO to clarify lines of communication and concept of operations (CONOPs) across HDOs, medical device manufacturers (MDMs), state and local governments, and the federal government; • Describe a standardized approach to response efforts that would enable a unified response within HDOs and across regions as appropriate; LORANCE CE THOM OMPSON ON A PROFESSIONAL CORPORATION

  30. Purpose of Medical Device Cybersecurity Playbook • Serve as a basis for enhanced coordination activities among medical device cybersecurity stakeholders, including mutual aid across HDOs; • Inform decision making and the need to escalate response; • Identify resources HDOs may leverage as a part of preparedness and response activities; and • Serve as a customizable regional preparedness and response tool for medical device cyber resiliency that could be broadly implemented. LORANCE CE THOM OMPSON ON A PROFESSIONAL CORPORATION

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend