The 17 requirements for secure connected medical devices

by

Stacie Hoffmann, digital policy and cyber security consultant at Oxford Information Labs and the lead author of the IoT Security Foundation’s healthcare white paper, writes about the security requirements needed for medical devices.

The use of connectivity in healthcare devices to collect and disseminate real-time data for faster, more accurate analysis, or tailored treatment has undoubtedly created a significant opportunity for medical professionals to improve diagnoses and treatment, and for healthcare providers to reduce operating costs and enable remote monitoring.

However, these devices also bring significant risks if security is not managed properly. These not only include risks to sensitive patient data, but to the patient themselves.

Possibly the highest profile security issue has been Medtronic’s implantable defibrillator, which allowed hackers to interfere with the RF communications and to place malware on the device - thereby shutting down the device or delivering jolts to a patient (see 2008, and 2018). However, many medical devices have not adopted good security practices, for instance using hard-coded passwords, giving the potential for mass hacks.

Added to this is the introduction of consumer technologies - such as fitness trackers - where sharing data with a social network is a value-add feature that also adds another level of risk. For example, last year’s data breach by Polar not only revealed a user’s location, but in some cases their names and addresses - including those of military personnel.

Analysts forecast significant growth (3.3 X between 2019 and 2024) for the connected medical device market, with the market predicted to be worth up to $63 billion in 5 years (source - Mordor Intelligence, 2019).

Yet in the US alone during Q4 2018, 45 million medical devices were recalled due to software / security issues. To put it another way, software and security issues accounted for more than a quarter (28.2%) of all US medical device recalls. And software / security errors have topped the list of recalls for 11 quarters in a row (source - Stericyle Recall Index, 2019).

The reason for this is simple: until recently connectivity has not been at the heart of the device makers’ strategies; and hospital IT departments have not needed to worry about such devices. Therefore best security practices simply aren’t known by the industry. But this creates an easily exploitable situation for hackers.

When developing a device - or assessing the risks associated with using a device - OEMs, medical professionals and hospital IT departments should consider 17 criteria. These are true for all of the four major classes of equipment used in patient treatment and monitoring, be they fixed location devices (eg an MRI scanner); portable on-site devices (eg a vital signs monitor); portable loaned systems (eg a blood pressure monitor); or patient owned electronics (eg a hearing aid / fitness watch). While patient owned devices will likely be out of the hands of medical professionals and hospital IT departments, this highlights the importance of considering the 17 criteria to protect local systems and patient data.

The 17 requirements of secure medical devices:

The 17 high-level requirements is an excerpt from an IoT Security Foundation white paper created to help medical professionals / IT departments assess the risks of IoT enabled medical devices; and to help device developers create more secure devices.

The white paper can be downloaded here.

Back to topbutton