Professional Documents
Culture Documents
Cybersecurity Rev
Cybersecurity Rev
Expertise
Process requirements
Authentication and
authorization
Data, communication
Other
System and software
architecture
Implementation and
development of the
software
Evaluation of software
units
Product release
Production, distribution,
installation
Post-market surveillance
Authentication
Communication and
storage
Patches
Requirement Level
The manufacturer has created a list of all roles that are directly or indirectly involved
1
with IT security
The manufacturer has provided evidence of the IT-security expertise for each role. 1
The manufacturer has appropriate records of education, training and skills that lead to
1
the conclusion that the people in question actually have this expertise.
The manufacturer has created a list of roles (people, neighboring systems) that may
0
interact with the product.
The manufacturer has identified all markets and all the regulatory requirements that
0
are relevant in these markets.
The manufacturer has identified the intended primary and secondary users with their
1
IT expertise
The manufacturer has analyzed the potential risks (hazards) that result if the system is 1
not used by specified users or in the specified use environment
The manufacturer has described in the risk management documentation what the IT
security threats are and what the consequences would be for patients, users and third 1
parties.
The manufacturer has traceably generated the risk acceptance criteria based on the
1
product's use and the state-of-the-art
The manufacturer has specified the protocols and standards used for each data
1
interface.
For each data interface, the manufacturer has specified the functions offered via the
0
interface.
The manufacturer has analyzed each function's security relevance (in terms of
0
hazards).
The manufacturer has documented the effects of the safety-relevant (in terms of
0
hazards) functions in the risk management documentation.
The manufacturer has tested all usage scenarios in which risks are generated due to a
display of information that has not been specified (e.g. no display, incorrect display or 1
display of information is delayed).
For each role and neighboring system, the manufacturer has defined the product
1
functions that they may have access to via the corresponding interface.
The manufacturer has justified its choice of authentication procedure (e.g.
username/password, biometric procedure, token, card) for all roles and all 1
neighboring systems.
Where necessary, the manufacturer has requested additional mechanisms to
2
minimize the probability of unauthorized access.
The manufacturer has analyzed in the context of risk management process the
impacts on patient safety, if a person cannot access patient or device data (e.g. no 1
authorization, they forget their password), and defined appropriate measures.
1
The manufacturer has created a list of all data managed by the system.
The manufacturer has assessed how worthy of protection these data are in relation to
1
confidentiality and their impact on patient safety.
The manufacturer has evaluated, in the context of risk management process, the
1
impact if particularly sensitive data is no longer protected.
The manufacturer has investigated, in the context of risk management, the
consequences of overloading the system with too many requests (e.g. DoS (Denial of
2
Service)) or requests with volumes that are too large and has defined actions if
necessary
The manufacturer has analyzed, in the context of risk management, the consequences
of the network no longer being available or no longer being available in the expected 2
quality.
The manufacturer has analyzed, in the context of risk management, the consequences
of the loss of data and established actions (e.g. data backup and disaster recovery), if 2
necessary.
The manufacturer has established, in general or for specific products, the criteria for
2
the checking of external data before they are processed further
The manufacturer has a documented plan of how patches are applied and removed
again. This plan includes the development, distribution, installation and review of 1
patches.
The manufacturer has a list of all SOUP/OTS components included in the product. 1
The manufacturer has assessed how often patches are required and how they should
2
be installed.
The manufacturer has established how the medical device informs the users in the
2
event that IT security is compromised.
The manufacturer has assessed what functionality the medical device must guarantee
2
in the event that IT security is compromised.
The manufacturer has documented all SOUP/OTS components (incl. version,
1
manufacturer, reference to information on updates, release notes).
The manufacturer has analyzed the specific risks resulting from the choice of
technologies (in particular programming language, SOUP/OTS components such as 2
operating systems).
The manufacturer has taken measures to ensure that the tools used (e.g.,
development environment, compiler) as well as the platforms and SOUP/OTS 2
components are free of malicious code.[^C-1c01]
The manufacturer has created a list of all services that the product offers or uses
1
"externally" (e.g. through its operating system).
For each service, the manufacturer has justified why it has to be visible externally (no
2
time limitation).
If the product provides an interface, the manufacturer has described how attacks via
1
this interface are controlled in the context of risk management process.
The manufacturer has identified the process offering/running this service for each
2
externally visible service.
For each process, the manufacturer has identified the user
(at the operating system level) and, if this user does not run 2
with minimal rights ("worst case" as root), justified this.
The manufacturer has systematically identified the risks that would be caused by
2
deficient IT security using threat modeling.
The manufacturer has analyzed the risks that result from the (auto-)update of anti-
1
malware software.
The manufacturer has established how the product detects compromised IT security,
1
documents (logs) this and reacts to it quickly.
With regard to the audit log, the manufacturer has determined where its data is
2
stored, how it is protected and updated and how this can be automatically analyzed.
For all software components , services and processes, and data and software
components, the manufacturer has analyzed which risks arise if they do not behave in 1
accordance with the specifications due to a problem with IT security.
The manufacturer has taken the software requirements into account in the software
1
architecture
The manufacturer has created coding guidelines that establish specific requirements
1
for IT security
The manufacturer only installs code in which reverse engineering and RAM readout
3
cannot lead to unacceptable risks
The manufacturer either tests the software (source code and binaries) for malicious
code before delivery and/or has protected all computers involved in the development 0
and "production" of the software against malware
The manufacturer has defined measures that can find and eliminate buffer overflows. 2
The manufacturer has defined at least one method that is used to check compliance
1
with the coding guidelines
The manufacturer requires code reviews for all components that map safety-relevant
1
functions.
The manufacturer has described how all SOUP and OTS components have to be
1
verified.
The manufacturer includes port scans at all relevant network interfaces in the test
1
plan and also performs them.
The manufacturer includes penetration tests at all relevant data interfaces and/or for
all known vulnerabilities of the OTS components used in the test plan and also 2
performs them.
The manufacturer includes the use of "vulnerability scanners" in the test plan. 2
The manufacturer includes fuzz tests at all relevant data interfaces with at least one
2
tool in the test plan and also performs them.
The manufacturer includes a security check against the usual attack vectors in the test
2
plan.
The manufacturer includes the testing of robustness and performance in the test plan 2
The manufacturer also has its software checked by IT security experts with regard to
3
the above measures.
The manufacturer includes third-party test reports (e.g. from SOUP manufacturers) in
3
the system test (if available).
The manufacturer has addressed the most common vulnerabilities and the resulting
1
hazards in the risk analysis or can at least explain how these risks are controlled.
The manufacturer discusses the risks posed by all relevant attack vectors (see above)
1
in the risk analysis and shows how these risks are controlled.
The manufacturer has created a traceability matrix it uses to document that there are
2
measures that control all identified risks related to IT security.
The manufacturer has prepared the risk management report and the IT security
2
report.
The manufacturer has drawn up the necessary plans for the postdevelopment phase
1
(e.g. post-market surveillance and incident response plan).
The manufacturer has evaluated the completeness of the tests using a traceability
2
matrix that links the tests to the requirements.
The manufacturer has described how it ensures that only the exact intended artifacts
1
(files) in exactly the intended version are delivered in the product or as a product
The manufacturer has described how the people responsible for the installation know
2
which is the latest version and how confusion during installation can be prevented
The manufacturer has described how it ensures during the installation that the
1
requirements specified in the support materials (see above) are actually met.
The manufacturer has described which relevant data and -information is collected
1
from the post-production phase
The manufacturer has described how and through which channels information is
1
collected from the post-production phase.
For each OTS component, the manufacturer has defined at least one source through
which it is informed of IT security problems and how often it is monitored and 2
described the role this analysis performs with which tools
The manufacturer has described how it monitors that the technologies and
2
procedures used (e.g. cryptology) are still secure
The incident response plan governs the criteria the manufacturer uses to evaluate
2
information from the market and when it implements the emergency plan
Who develops and releases the patches and how and within what deadlines. 2
How the manufacturer ensures that the patches are also installed. 2
Who informs the customers, how and within what deadlines 2
The manufacturer has created a plan how to develop and distribute patches and how
2
to verify the effective distribution.
2. System/software requirements
The product only allows users to use it if they have authenticated themselves to the
0
product
The product allows the neighboring systems (e.g. other medical devices, IT
systems,cloud) connected at each data interface to exchange data only if they have 0
been authenticated by the product
The product allows password authentication only if this has a defined minimum length
of which at least one is a non-alphanumeric character and it contains at least one 1
uppercase and one lowercase character
The product does not have a default password or requires that a password is changed
0
during the first use
The product blocks users and neighboring systems for m minutes after n attempts,
with the manufacturer being able to define the n and m values or their lower limits.
1
The manufacturer has analyzed the "safety-related" risks resulting from such a
blocking and, if necessary, has implemented measures to minimize these risks.
In the event of an unsuccessful login, the product only displays information that does
not allow the user to identify the exact cause of the blocking (e.g. incorrect user name 2
and/or password).
The product terminates user and neighboring system sessions after n minutes of
2
inactivity, with the manufacturer setting the value for n or its upper limit.
On authentication the product assigns a role to each user and each neighboring
1
system
The product allows each role to access only the functions it is authorized for. This
1
applies in particular for product updates/upgrades.
The product allows authorized users to block other users and neighboring systems. 1
The product allows authorized users to reset the authentication of any required
elements (e.g. passwords, cryptographic keys, certificates) of other users and 1
neighboring systems.
The product allows authorized users to delete other users and neighboring systems. 1
The product does not allow users to change their own permissions. 2
The product allows users to permanently delete all patient-specific data. The product
2
allows you to restrict permissions to do this (e.g. roles).
The product only transmits data (or at least securityrelated data) via its data interfaces
1
in encrypted form. This also applies to storage on external data carrier
The product protects the integrity of the data against unwanted modification, e.g.
2
through cryptographic procedures.
By default, the product rejects all incoming connections (e.g. USB, TCP, Bluetooth). 2
The product checks all user inputs and all incoming data on the basis of verification
1
criteria defined by the manufacturer (see above) before further processing.
The product does not use wireless transmission for the transmission of time-critical
2
data relevant to patient safety.
The product stores characteristics that could be used to identify a person in encrypted
2
form only
The product protects critical data against accidental change and loss. 2
Every time the program is restarted, it checks whether the mechanisms used to
2
protect the data against loss and modification are in sync.
The product allows users to deactivate data interfaces (e.g. USB, remote access). 2
The product checks the integrity of the program code every time it is restarted. 2
In the event of compromised IT security, the product provides an emergency mode for
2
functions that have an impact on patient safety.
The product limits the ability to apply or remove patches to users with the
2
corresponding permissions (authenticated and authorized).
The product checks changed program code (patches) for integrity before first use and
2
when restarted
The product logs all essential actions on/in the system in an audit log, including day
2
and time and actor (user, system).
The product ensures that it has the correct system time. 3
The product implements mechanisms that can detect penetration or an attack and
3
react to them
3. System/software architecture
The software only uses tried and tested libraries/components (no self-
1
implementation) for all cryptographic functions (e.g. encryption, signing)
The software uses different technologies or keys for different functions (e.g.
3
encryption of communication, encryption of data).
The software is protected against malware (viruses, worms etc.) as far as is technically
1
possible
The software is based on versions of the SOUP/OTS components that do not contain
1
any known security vulnerabilities. Exceptions are justified
4. Accompanying materials
The instructions for use establish the intended IT environment for operation. 1
The instructions for use specify which activities the operator must perform, as well as
1
how and how often they should be performed.
The installation and service instructions establish which other roles (operator, service
technician) are responsible for which activities and how often they have to be 1
performed.
The support materials describe how to deal with lost or stolen authentication
1
elements (e.g. cards, certificates, cryptographic keys) and forgotten passwords.
The support materials describe how users can recognize an IT security problem with
2
the product and what to do in this case.
The support materials describe which anti-malware software has been approved for
the product and where (e.g. link) it can be obtained and who is responsible for 2
updating it.
The support materials contain the manufacturer's contact details, which can be used
1
to contact the manufacturer, for example, in the event of IT security problems.
ok
ok
ok
ok
ok
ok
ok
ok
ok
x*
Ask for the list of data interfaces (wired, WLAN, USB, etc.). ok
ok
ok
ok
ok
x*
x*
x*
x*
x*
This plan can be part of the incident response plan (see below). x*
x*
x*
Ask for the list/table to be shown. The FDA requires a
ok
"Cybersecurity Bill of Materials (CBOM)".
ok
ok
x*
ok
Have the model show that at least the external actors and/or
ok
threats and the threatened objects have been identified.
ok
ok
For example, for the above software requirements, ask for the
component(s) or technologies in the architecture that ok
implement the requirements to be shown.
Ask the manufacturer to show the coding guidelines and
x*
corresponding requirements.
ok
The manufacturer will achieve this if it uses tools for static code
analysis and/or establishes evaluation criteria for the code ok
reviews
ok
ok
ok
ok
ok
ok
x*
x*
x*
x*
x*
In Europe but not in the USA, the IT security report can be part
x
of the risk management report.
Details below. ok
x*
ok
ok
ok
x*
ok
ok
ok
ok
ok
ok
ok
ok
x*
Ditto. ?
ok
?
?
FDA requirement ?
E.g. ask about the hash procedure and, if necessary, ask for it to
?
be shown.
Ask for an explanation as to what the manufacturer defines as
characteristics that could be used to identify a person and which ?
encryption mechanism it uses.
x*
ok
Have the mechanism explained. And how it is ensured that the
ok
user cannot unintentionally change the time without noticing
Have the manufacturer explain how the protection is ensured
and how a change to the audit log is identified by the system. If
ok
necessary, even ask for the responsible software components to
be shown
ok
ok
ok
ok
ok
ok
ok
ok
ok
İletişim Protokolleri
SVN
Dropbox
SVN
Yazılım mimarisi
Yazılım mimarisi
Detay ve Risk
Yazılım Mimarisi
Yazılım Mimarisi
Doğrulama
Doğrulama
Doğrulama
Risk, doğrulama
The standards can be divided into the structural interoperability level (e.g. TCP/IP, HTTPS, SFTP, CAN, RS232, USB),
nomenclatures and coding systems such as LOINC (laboratory values), ATC (drugs), ICD (diagnose
Eğitimler, kullanma kılavuzu
B0120, B0611
Ürün ayrıntılı şema içinde seçilen ram memory vb. donanımları ihtiyaçlarımızı karşılayacak düzeyde seçip belirtiyoruz.
yok
yok
Doğrulama
Risk içinde 120 için 54-63---- 610 için 15-27-38 maddeler sayılır mı? Ekleme yapmalıyız.
Riskten gereksinim oluşturup doğrulamayı bunlardan çekiyoruz. Traceability matrix kullanımı buna dahilse ok değilse yok
yok
yok
yok
yok
yok
Gereksinimde belirtilmiş
Gereksinimde belirtilmiş
yukardakilerle aynı
yok
ip ve porta ulaşılırsa bağlantı kurulur mesajlar özelleştirilmiş olduğu için mesaj atsa da cevap gelmez. O yüzden test etmelik
doğrulama
gereksinim doğrulama
db gereksinim
yok
gereksinim
db gereksinim
yok
Servis gereksinim
Hata varsa çalışmaz. RG için pc içinde bir uygulama olduğu için restart
sonrası değil yazılım çalışınca bakar
svn denebilir
update patch olarak yapmıyoruz. Tüm yazılım baştan atılıyor. O yüzden yok
update patch olarak yapmıyoruz. Tüm yazılım baştan atılıyor. O
yüzden yok
yok
HTTPS, SFTP, CAN, RS232, USB), the syntactic level (e.g. CSV, JSON, XML, HL7), the semantic level (e.g.
ues), ATC (drugs), ICD (diagnoses), UCUM (units) and the organizational level (IHE))
düzeyde seçip belirtiyoruz.
mı buna dahilse ok değilse yok
p gelmez. O yüzden test etmelik bir durum yok
Compliance_Check
ok uygun
ok* uygun ama ekleme yapılması gerek
x doküman var uygun değil
x* doküman yok uygun değil