Report identifies medical device cybersecurity shortcomings at FDA

The U.S. Department of Health and Human Services has found that the Food and Drug Administration’s (FDA) plans and processes were deficient for addressing medical device cybersecurity compromises.

The Office of Inspector General (OIG) identified several shortcomings in the organisation including:

The report did state that no evidence was found of the FDA mismanaging or responding untimely to a reported medical device cybersecurity event, but existing policies had meant efforts to address medical device cybersecurity vulnerabilities were susceptible to inefficiencies, unintentional delays, and potentially insufficient analysis.

Some shortcomings included that since the inception of the Cybersecurity Workgroup in 2013, the FDA had not developed and implemented procedures to ensure it efficiently received and shared information about cybersecurity vulnerabilities, exploits and threats that potentially affected medical devices.

This included not establishing email accounts or electronic mailboxes for the group to receive information about vulnerabilities, exploits and threats despite having a facility for receiving complaints; had not developed a resource like an application or a form to receive cybersecurity threat; not defined a method for the group to securely share sensitive information associated with cybersecurity vulnerabilities with external stakeholders; or formalised the ability to receive or share cybersecurity vulnerability information with other federal agencies.

The OIG therefore recommended that the FDA:

The FDA responded by saying it had implemented some of the recommendations which was noted by the OIG, and cited three occasions when they had “adequately tested its ability to respond to emergencies resulting from cybersecurity events in medical devices.”

The organisation also disagreed with conclusions that its pre-existing policies and procedures were insufficient regarding post-market cybersecurity.

Back to topbutton