Category
Supplementary Resource
Organisation
Type
Standard
Version
1.1
Access
Open
Status
Active
Created
October 2015
This white paper takes a comprehensive approach to medical device cyber security. It explores:
- how today's medical devices are used and incorporated in IT environments
- what type of cyber threats they are exposed to and how these threats can affect the medical device ecosystem
- a review of best practices to design security into medical devices and how to build a reliable medical device network, ranging from asset and configuration management, access control, to actual cyber security protective measures.
Main sections:
- Introduction and background
- Objective
- Stakeholder roles and contributions
- Cybersecurity introduction
- Generic device architecture
- General security and vulnerability considerations
- Vulnerability management and security best practices
- Configuration management
- Conclusion
- Appendix A Secure application development practices
- Appendix B Abbreviations
- Appendix C Reference literature and further reading
- how today's medical devices are used and incorporated in IT environments
- what type of cyber threats they are exposed to and how these threats can affect the medical device ecosystem
- a review of best practices to design security into medical devices and how to build a reliable medical device network, ranging from asset and configuration management, access control, to actual cyber security protective measures.
Main sections:
- Introduction and background
- Objective
- Stakeholder roles and contributions
- Cybersecurity introduction
- Generic device architecture
- General security and vulnerability considerations
- Vulnerability management and security best practices
- Configuration management
- Conclusion
- Appendix A Secure application development practices
- Appendix B Abbreviations
- Appendix C Reference literature and further reading