Questionnaire Cybersecurity for Medical Devices - Audit - Version 1
Questionnaire Cybersecurity for Medical Devices - Audit - Version 1
(Version 1, 21.03.2023)
Preliminary remarks
1
conformity assessment(s) of cybersecurity aspects as efficient as possible without
compromising quality.
The terminology used in this document is derived from the terms and definitions within the
referenced sources. E.g. cybersecurity as defined in ISO 81001-1:2021-12, cl. 3.30.
Included in this document are references to paragraphs from the standards IEC 62034
and IEC 81001-5-1. These standards have different scopes (medical device software (IEC
62304) and healthcare software (IEC 81001-5-1)) and use different terms for similar
subjects and processes. Specific terms and their use in the context of the respective
standard are defined in clause 3 "Terms and Definitions" of the respective standard.
The document makes no claim to completeness or mandatory application.
References
In this document, the term medical device is frequently used. Whenever the term medical
device is mentioned, both types are meant, medical devices and in vitro diagnostic
medical devices.
2
1 General
3
Note 3: Auditing penetration testing laboratories seems to be
not necessary. Other means for rating performance and
ability of penetration-testing suppliers (e.g. penetration test
report reviews, questionnaires) seem more plausible.
4
2 Research and Development
5
Source Requirements Questions / Comments
MDCG 2019-16 ‘The security risk management process has the same Is a dedicated and plausible security risk
chapter 3.2 elements as safety risk management process, all assessment available for all MDR / IVDR
documented in a security risk management plan. The certified devices?
process elements are security risk analysis, security
risk evaluation, security risk control, evaluation of
residual security risk and reporting. When a security
risk or control measure could have a possible impact
on safety and effectiveness, then it should be included
in the safety risk assessment. Similarly, any safety risk
control or consideration that might have an impact on
security should be included in the security risk analysis.’
2. MDCG 2019-16 chapter 3.4 ‘Threat Modelling techniques are a systematic Note 1: Threat modelling (e.g. STRIDE)
approach for analyzing the security of an item in a should be used in security risk assessment.
structural way such that vulnerabilities can be identified,
enumerated, and prioritized, all from a hypothetical Note 2: Security risk assessment is assessed
attacker’s point of view. Risks related to data and in depth during the Technical Documentation
systems security are specifically mentioned within the Assessment (TDA). During audit, it should be
scope of the risk management process, to avoid any focused on identifying if non-sampled devices
misunderstanding that a separate process would be also have security risk management including
needed to manage security risks related to medical threat modelling.
devices. Specific methods (and requirements) are
however used for security risks.’
IEC 81001-5-1 – establish process for managing risks associated with
cl. 4.2 security
– use threat modelling for identifying vulnerabilities
– estimate, evaluate and control associated threats
– monitor effectiveness of (security) risk control
measures
– intended use and use environment
6
Source Requirements Questions / Comments
3. MDCG 2019-16 ‘The primary means of security verification and validation Do all MDR / IVDR devices of the auditee
chapter 3.7 is testing. Methods can include security feature testing, have a recent penetration test?
fuzz testing, vulnerability scanning and penetration
testing.’ Note 1: Vulnerability scanning and
penetration testing should be done for all
medical devices.
IEC 81001-5-1 – establish activities to identify and characterize
cl. 5.7.4 weaknesses Note 2: Security test reports (including
– Establish tests that focus on discovering and penetration test reports) are assessed in
exploiting security vulnerabilities depth during Technical Documentation
Assessment (TDA). During audit, it should be
focused on identifying if non-sampled devices
also have penetration test reports.
7
3 Post Market Activities
8
Source Requirements Questions / Comments
Note 2: The Vulnerability Disclosure Program can be
governed by the feedback process.
9
Source Requirements Questions / Comments
The measures should be implemented at the operator risk and implemented in a timely manner. Rationales for not
site in a time appropriate to the security and safety risk conducting actions should be appropriate.
determined by the manufacturer and operator.’
IEC 81001-5-1 - establish activities that enable investigation of
cl. 9.3 vulnerabilities in a timely manner to determine
applicability
- verifiability, related threats
IEC 81001-5-1 - establish activities for analysing vulnerabilities
cl. 9.4 - identifying root cause of the issue
- identifying impact on safety and effectiveness
IEC 81001-5-1 - establish activities to address security-related issues
cl. 9.5
5. IEC 81001-5-1 – establish activities for conducting periodic reviews of Does the auditee conduct at minimum an annual review of
cl. 4.1.8 the software problem resolution process the security patch management process?
– periodic reviews of activities
– examine (minimum) security-related issues managed Note 1: In case periodic review shows lack of performance of
through process (since last periodic review) the software problem resolution process working
– determine if management process was complete, appropriately, corrective measures need to be implemented.
efficient, led to resolution of security-related issues
– periodic reviews at least annually or as part of Note 2: An efficient measure to verify effectiveness of security
monitoring, measurement, analysis patches implemented can be penetration testing.
10
4 Vigilance Reporting
11
Source Requirements Questions / Comments
MDCG 2019- ‘Incidents that have cybersecurity related incident
16 root causes are subject to Trend Reporting under
chapter 5.8 the Medical Devices Regulations.’
‘Using IMDRF codes to index the cybersecurity
medical root causes related to non-serious incidents is
desirable and may be implemented into the Trend
Report’:
o C1007 — Software Security Vulnerability
12