FDA's postmarket cybersecurity in medical devices guidance: what you need to know

Are you up-to-speed on the FDA's postmarket guidance for cybersecurity in medical devices? CSA Group explains everything you need to know.

Major advances in medical technologies over the last few decades have contributed to early diagnosis of diseases, more efficient delivery of treatment, and longer, healthier lives. Network-connected medical devices in particular are redefining 21st century healthcare. With many life-sustaining and life-supporting medical devices residing on hospital networks – and many more connected wirelessly – the risk for cyber-attack is high, and this could compromise a device’s functionality, personal information, and patients’ health and safety. Implementing cybersecurity measures for devices and the networks to which they connect is critical. That is why the Food and Drug Administration’s (FDA) Guidance on Postmarket Management of Cybersecurity in Medical Devices makes it very clear that manufacturers should monitor, identify, and address cybersecurity vulnerabilities and exploits as part of their postmarket management plans.  

Here are some main things you should know about FDA’s Postmarket Guidance:

It applies to any marketed and distributed medical device

These include:

It provides a risk management framework to detect, assess, report, and mitigate cyber threats

The FDA takes a holistic approach to cybersecurity by providing recommended measures across the entire product lifecycle, including when it’s in use. Since introducing postmarket guidance, medical device vendors have reported 400% more vulnerabilities per quarter – a sign of growing compliance, as identifying these vulnerabilities is the first step in managing the risk of an attack.[1] Manufacturers have also begun to patch some of the flaws.

Specific postmarket recommendations for manufacturers include:

It identifies federal regulations for postmarket management

Effective cybersecurity risk management incorporates both premarket and postmarket life cycle phases to address cybersecurity needs from medical device conception to obsolenscence. Covering the entire product lifecyle will involve adhering to the following from the Code of Federal Regulations:

There are specific methods for applying the risk management framework

The exploitability of the cybersecurity vulnerability and the severity of patient harm are two critical factors in how the risk management framework is to be applied. The Common Vulnerability Scoring System (see image below) helps manufacturers evaluate the severity and potential impact of cybersecurity vulnerabilities and threats. The resulting score then informs the actions that need to be taken with respect to reporting and remediating the risks.

If there is no risk of patient harm or the risk can be controlled, then routine updates, patches, and enhancements will suffice. A Report of Corrections and Removals may be required for an uncontrolled vulnerability. However, if there are no adverse events, the vulnerability is remediated within the specified timeline, and the manufacturer is an active participant in an ISAO, then the report is not required.

Additional requirements and definitions for risk management of medical devices for manufacturers are found in the following standards:

It recommends following the NIST Cybersecurity Framework

One of the FDA’s recommendations to manufacturers is that they apply the National Institute of Standards and Technology’s (NIST) core principles for improving critical infrastructure cybersecurity, which are already in use by over 30% of U.S. organisations.[2] 

Managing the risk of a cyber-attack on a medical device can be challenging, even as more guidance documents and best practice frameworks emerge. A manufacturer’s strategy to assure the security of their medical device post-launch should include the services of an accredited third party that can verify compliance with key standards and regulations. CSA Group offers security testing verification, training, and security assurance certification and attestation for medical device manufacturers.


[1] Jessica Davis (January 24, 2019). “Improving Medical Device Security Beyond Patching, Traditional Tools”. Online:  Health IT Security <www.healthitsecurity.com/news/improving-medical-device-security-beyond-patching-traditional-tools>

[2] Nantional Institute of Standards and Technology. Industry Impacts: Cybersecurity Framework. Online:   <www.nist.gov/industry-impacts/cybersecurity>

Back to topbutton