2022 FDA Premarket Cybersecurity Guidance

FDA has released a new draft of Premarket Cybersecurity in Medical Devices:  Quality System Considerations and Content of Premarket Submissions.  Per the scope, this 2022 FDA Premarket Cybersecurity Guidance “is applicable to devices that contain software (including firmware) or programmable logic, as well as software as a medical device (SaMD). The guidance is not limited to devices that are network-enabled or contain other connected capabilities.”

You can download the guidance here: Premarket-Cybersecurity-Guidance draft-April-2022

Cybersecurity in Medical Devices

Quality System Considerations and Content of Premarket Submissions

Draft Guidance for Industry and Food and Drug Administration Staff
This draft guidance document is being distributed for comment purposes only.
Document issued on April 8, 2022.

Highlights:

  1. Secure Product Development Framework (SPDF)
    FDA is using the terminology of a “secure product development framework (SPDF) which they define as “a set of processes that help reduce the number and severity of vulnerabilities in products.”  Each manufacturer should consider how security fits into the overall product development lifecycle – not just an activity prior to or close to the time of a product release to the field.  To ensure this happens, the quality management system (QMS) would likely need security related activities institutionalized into SOPs and design and development plan (DDP) templates.  As with any quality related activities, proper evidence in documentation and records would be expected to make the quality argument.
  2. Design for Security
    Obviously the QMS should have required design activities for security.  This translates into security related activities in:

    1. Risk management
    2. Product requirements and software requirements
    3. Design review and design verification
    4. Design validation
      The guidance lists these clear security objectives:

      1. Authenticity, which includes integrity
      2. Authorization
      3. Availability
      4. Confidentiality
      5. Secure and timely updatability and patchability
  3. Understanding the Risks
    A common pitfalls is to begin security activities without first understanding the role security will play based on the intended use of the  product.
  4. Transparency
    End users must be aware of any vulnerabilities and how it might affect their use of the product.  Adopt a mindset that information should not be withheld or hidden from end-users – involve them in the overall security equation.
  5. “Living” document
    The cybersecurity risk analysis is a “living” document.  One would expect the revision history (or new reports) to occur periodically as more information is gained on the threats and on the “real world” effectiveness of the cyber controls.

What actions do we recommend?

In response to this FDA Premarket Cybersecurity Guidance, we would recommend that you evaluate your design controls process and software development lifecycle process against this guidance document.  Do you have the expected activities?  Do you have the proper documents and records to perform adequate accident or breach incident investigation?

We can help.  We can review your procedures and provide recommendations for a more robust SPDF.

About the author

Partner and General Manager, Brian Pate is ISO 1385:2016 Lead Auditor certified for Medical Device Quality Management Systems (MD), and ISO 19011:2018 Management Systems Auditing (AU) and Leading Management Systems Audit Teams (TL). Brian started his medical device career in anesthesia clinical research in 1985 and has since worked both academia and industry including many years with Johnson & Johnson, Baxter Healthcare, and GE Medical. Brian’s roles have included software engineering, systems engineering, quality assurance, and regulatory affairs. Brian has served on multiple AAMI TIR working groups, including TIR32-2008 (Application of ISO 14971 Risk Management to Software; now IEC 80002-1) and TIR45-2012 (Guidance on the use of Agile practices in the development of medical device software) and served as a reviewer for the 2nd edition of TIR45. Brian serves on the AAMI Software Committee and as an AAMI instructor for the software, design controls, and agile methods courses. Brian also is a member of the Underwriters’ Laboratories (UL) Standards Technical Panel for UL1998 (Software in Programmable Components) and or UL5500 (Remote Software Updates).

SoftwareCPR Training Courses

ISO13485:2016 ISO 13485 Internal Audit(or) Training Course (Live, 3-day)

IEC 62304 and other Emerging Standards Impacting Medical Device Software (Live, 3-day)

Being Agile & Yet CompliantISO 14971 SaMD Risk Management

Software Risk Management

Medical Device Cybersecurity

Software Verification

IEC 62366 Usability Process and Documentation

Or just email training@softwarecpr.com for more info.

Corporate Office

15148 Springview St.
Tampa, FL 33624
USA
+1-781-721-2921
Partners located in the US (CA, FL, MA, MN, TX) and Canada.