Undergoing tests is a critical step in the process of transforming an innovative design into a reliable and marketable product
Undergoing tests is a critical step in the process of transforming an innovative design into a reliable and marketable product
Cyberattacks against critical systems and equipment, including medical devices, are frequent in today's highly connected world. The number of cyberattacks worldwide is expected to double by 2025.1
The issue of cybersecurity is a particular concern for several industries, including the medical device industry. Quality healthcare depends on secure access to advanced medical technologies that use software and communications protocols to actively exchange vital patient information with other medical systems and devices. Cyber breaches impacting medical devices put the safety of individual patients at risk and severely compromise the quality of healthcare for people worldwide.
There are regulatory, ethical and financial reasons why cybersecurity must be considered and ensured in medical devices, IVDs and their accessories. For example:
Device manufacturers and health organizations that use unsecure technology and fail to guarantee the cyber security of their medical devices pay heavy penalties, both financially and in terms of their reputation.
For decades, TÜV SÜD has been at the forefront of efforts to comply with regulatory requirements and standards applicable to medical devices. Our testing laboratories offer a comprehensive range of testing and other services to fully assess the security of your devices and health software against cyber threats.
Our testing labs offer a comprehensive range of services to test and assess the cybersecurity of your medical devices.
These Include:
Trainings are provided to bring awareness and understanding of cybersecurity in medical devices. The objective of the training is to understand requirements defined in regulatory frameworks such as:
Furthermore, trainings can be provided to understand the implementation of Cybersecurity in medical devices according to international standards such as:
The concept evaluations aim to identify cybersecurity GAPs by assessing against international/harmonized standards, cybersecurity state-of-the art and regulatory requirements such as:
The objective of vulnerability scans is to identify and detect known weaknesses in computers, networks or applications (programs). The aim is to perform remediation activities once critical vulnerabilities are identified by the manufacturer. The benefit of this approach is to close Vulnerability Gaps and maintain strong security in medical devices
The services include:
The objective of a penetration test is to simulate a cyber attack to evaluate the security status of the medical device/software. The aim is to identify unknown weaknesses found during manual tests. Test report results can be used as an objective evidence for the effectiveness of cybersecurity in a medical device (similar to a 60601-1 report being used as an objective evidence for the safety of a medical device).
The services include:
Learn about TÜV SÜD's medical devices & IVDs security testing (Penetration Testing) services here
No, the lack of findings does not indicate that the device is secure. The device might be secure with respect of vulnerabilities that have been part of the security test at a specific point in time. Keep in mind that the security situation for software may change rapidly due to newly emerging security vulnerabilities, or due to new attack vectors.
No, there are no laws that requires it to be conducted. However, dedicated security guidance such as the FDA guidance on content of premarket submission for cybersecurity in medical devices and European MDCG 2019-16 guidance and standards such as IEC 81001-5-1 indicate that such a scan must be considered. This means that you should have good arguments in the event you decide to skip it. The same applies for penetration tests.
You must consider security related tests regarding to the change as well as regression tests which show that your change did not have a negative effect on the cybersecurity of your device. In many cases, a vulnerability scan or penetration test should be repeated; at least partly.
Yes, you can conduct these tests on your own but you need to have the appropriate competences within your organization. Nonetheless, it helps to have a second pair of eyes on your devices.
The most important argument for a 3rd party assessment is the impartiality of the 3rd party provider. Depending on the provider you choose; you may also benefit from a provider that has a broader knowledge. In case of cybersecurity testing the medical device specific knowledge and expertise of the 3rd party-provider should be ensured, preferably by accreditation according to a medical device standard such as IEC 60601-4-5. Products having tests conducted by accredited laboratories would provide a higher level of assurance for the industry in addition to ensuring the harmonization of test categories based on risks.
Protect patient data & enhance medical devices & IVDs security with professional cybersecurity testing services.
Read More
Understand the cybersecurity requirements and standards under the MDR & IVDR from a Notified Body’s perspective.
Learn More
Our expert will cover MDR Cybersecurity Risk Management and provide details on implementing IEC 81001-5-1 and 60601-4-5
Learn More
Understand the requirements of IEC 81001-5-1 standard
Learn More
The digitization of the medical sector brings with it countless opportunities.
Learn More
Site Selector
Global
Americas
Asia
Europe
Middle East and Africa