The Journal of mHealth Vol 2 issue 5 (Oct) | Page 21
Does Device Interoperability Sacrifice Security?
At the device level, medical device manufacturers must address three critical
aspects of cybersecurity during design:
»» Create a security plan (similar to a
safety risk management plan) early
in the process. Make sure the plan
addresses launch and post-market
security protocols.
»» Conduct a device-specific threat
assessment and revisit it throughout
the design process. Threat assessment should include characterizing,
modeling and measuring existing
threats. Thinking about the ways that
devices send and receive data gives us
important clues to the ways they may
be vulnerable to either intentional
attacks or software glitches.
»» Design with security in mind by baking cybersecurity into hardware and
software development from the start.
Once the device is on the market, medical device manufacturers of connected
devices need to continue to be diligent
and more proactive:
»» Schedule periodic reviews of the
threat assessment once the device is
deployed.
»» Be ready to act fast when an issue is
identified, as time is critical to containment. Make sure your CAPA process
has swift time tables for a response.
»» Define a responsible disclosure policy and link it to your CAPA process.
»» Be open and work with your customers right away when a security issue
is identified.
Lastly, don’t be afraid to connect! The
more data, the better the data, and the
better correlated the data, the more
insights we gain into individual health
and healthcare quality. As medicine
evolves towards more connection in the
future, there is the potential for exponential improvement in our overall wellbeing.
To learn more about DeviceSecure from
Battelle, visit battelle.org/our-work/pharmaceutical-medical-devices/medical-devices/
battelle-devicesecure-services
About the authors
Melissa
Masters, RAC, (B.S.,
Electrical
&
Computer Engineering)
Ms.
Masters
is
Director
of
Electrical,
Software
and
Systems Engineering at Battelle and heads Battelle’s DeviceSecure
Services. Ms. Masters has more than 14
years of experience in product development as a project manager, systems engineer and design engineer, serving as the
project manager and lead systems engineer on medical device development and
sustaining engineering programs. Ms.
Masters is a voting member of the Association for the Advancement of Medical
Instrumentation (AAMI) working group
on cybersecurity for medical devices and
contributed to the vulnerability model
Continued from page 5
"While standards are in place, individual country standards need
to be subject to international standards."
8) Who should be leading the drive to mandate these
changes (e.g. industry alliances/initiatives, regulatory
bodies, government policy)?
"It is in everyone's interest for this to work and healthcare
organisations can play a key role through the procurement process. There may well also be a role for government at some level
to encourage or even mandate those standards in procurement
when it relates to public money – not just for healthcare but also
other sectors which would benefit from wider interoperability.
"In the UK we are seeing healthcare community of vendors and
providers engaging to create the interoperability charter.
"In economies where health and social care is not primarily gov-
for AAMI’s TIR 57. She has been published and widely quoted on a variety of
medical cybersecurity topics in AAMI
Horizons, Mass Device, ExecutiveGov.
com, and Fierce Medical Devices. In
addition, Ms. Masters holds a Regulatory Affairs Certification (RAC) and has
a working knowledge of domestic and
international regulatory requirements for
medical devices.
Stephanie Preston, EIT, GIAC,
CEH,
(B.S.,
Computer and
Electrical Engineering)
Ms. Preston is on
Battelle’s Cyber
Innovations
team, where she
focuses on firmware reverse engineering (x86, x86_64,
MIPS, 8051), as well as application development (C/C++). She also serves as
the team’s intellectual property steward.
Ms. Preston contributed to the IEEE
guidelines for security in medical device
software development and production, a
step toward industry standards that will
systematically secure medical devices.
Ms. Preston is a registered engineer
in training (EIT) in the state of Ohio,
holds a (GSEC) Global Information
Assurance Certification (GIAC) Security
Essentials certification, and a Certified
Ethical Hacker (CEH) certification. She
also serves as an adjunct faculty member
at the Ohio State University College of
Computer Engineering. n
ernment controlled, such as the US, it can still be incentivised,
although in developing markets it is more difficult."
9) What would be your top tips for managing digital
deployments in healthcare, in terms of ensuring effective
integration?
"Concentrate on stakeholder engagement. When users, vendors,
and executives co-operate and collaborate to build a shared
understanding of a successful project, they’ll have a great chance
of achieving that success."
Steve Rudland is Customer Advocacy & Consulting Lead for Hyland, creator of OnBase in EMEA. He has more than 20 years' enterprise content
management experience, gained in some of the world's leading technology companies. With particular expertise in systems integration, collaboration and
multi-agency information sharing across the healthcare, social housing and
local government sectors, Steve is currently advising clients on strategic healthcare business transformation projects in the UK and Denmark. n
The Journal of mHealth
19