Shifting Sands of SaMD Cybersecurity Regulations

Episode Thumbnail
00:00
00:00
1x
  • 0.5
  • 1
  • 1.25
  • 1.5
  • 1.75
  • 2
This is a podcast episode titled, Shifting Sands of SaMD Cybersecurity Regulations. The summary for this episode is: <p>FDA has issued new draft guidance on cybersecurity for software as a medical device (SaMD). If the FDA releases that draft guidance ‘as is,’ it will massively and negatively impact the SaMD industry and it’s imperative that manufacturers understand how to prepare.&nbsp;</p><p>In this episode of the Global Medical Device Podcast, Etienne Nichols talks to Chris Gates, director of product security at Velentium, about the shifting sands of medical device cybersecurity regulations for SaMD.&nbsp;</p><h3>Some of the highlights of this episode include:</h3><ul><li>Chris views the FDA’s recent activity around cybersecurity requirements, regulations, and laws for SaMD as a necessity because manufacturers cannot seem to self-regulate.&nbsp;</li><li>The Protecting and Transforming Cyber Health Care Act (PATCH) will give the FDA a direct mandate to manage the cybersecurity of medical devices.</li><li>However, a clause in the PATCH Act allows for cybersecurity to extend to all existing legacy medical devices—not just new devices entering the market.</li><li>As medical device manufacturers (MDMs) become aware of the clause, it’ll have a huge impact. MDMs will likely end support for device lines due to high costs.&nbsp;</li><li>The biggest issue with the new guidance consensus vs. regulatory standards is alignment with software bill of materials (SBOM) tools.</li><li>The most effort-intensive part of the new draft guidance is ongoing testing of anomalies to determine if they can be turned into vulnerabilities. The industry will be unable to keep up with additional testing because of resources and demand.</li><li>All this added burden will be placed on MDMs at the cost of marginal improvements in cybersecurity. So, there’s no real benefit to the manufacturer.</li><li>Structure a standard by not creating something brand new that is ill/undefined but align best practices to create secure medical devices.</li></ul><h3>Memorable quotes from Chris Gates:</h3><p><em>“Legally-backed cybersecurity requirements by a regulatory agency are necessary to ensure secure devices are entering the marketplace and hopefully replacing the insecure legacy devices.”</em></p><p><em>“This clause is going to have a huge impact on medical device manufacturers (MDMs) and I find it amazing how many MDMs are completely unaware of this.”</em></p><p><em>“An SBOM is a software bill of materials. It’s an ingredients list for your application.”</em></p><p><em>“This isn’t just one-and-done testing in your life cycle.”</em></p><p><em>“You’re going to have a lot of extra work coming your way.”</em></p><h3>Links:</h3><p><a href="https://www.amazon.com/Medical-Device-Cybersecurity-Engineers-Manufacturers/dp/1630818151" rel="noopener noreferrer" target="_blank">Medical Device Cybersecurity for Engineers and Manufacturers</a></p><p><a href="https://www.regulations.gov/docket/FDA-2021-D-1158/comments" rel="noopener noreferrer" target="_blank">Regulations (Submit comments to the FDA)</a></p><p><a href="https://www.fda.gov/regulatory-information/search-fda-guidance-documents/cybersecurity-medical-devices-quality-system-considerations-and-content-premarket-submissions" rel="noopener noreferrer" target="_blank">Cybersecurity in Medical Devices: Quality System Considerations and Content of Premarket Submissions</a></p><p><a href="https://www.jdsupra.com/legalnews/the-patch-act-protecting-medical-2842175/" rel="noopener noreferrer" target="_blank">PATCH Act</a></p><p><a href="https://www.iec.ch/" rel="noopener noreferrer" target="_blank">International Electrotechnical Commission (IEC)</a></p><p><a href="https://www.iso.org/home.html" rel="noopener noreferrer" target="_blank">ISO (International Organization for Standardization)</a></p><p><a href="https://www.imdrf.org/" rel="noopener noreferrer" target="_blank">International Medical Device Regulators Forum (IMDRF)</a></p><p><a href="https://www.linkedin.com/in/christopher-gates-8912a81a/" rel="noopener noreferrer" target="_blank">Chris Gates on LinkedIn</a></p><p><a href="mailto:chris.gates@velentium.com" rel="noopener noreferrer" target="_blank">Chris Gates Email</a></p><p><a href="https://www.youtube.com/channel/UCYfQsPqHW8H8mZ4xpM4gn1Q" rel="noopener noreferrer" target="_blank">Greenlight Guru YouTube Channel</a></p><p><a href="https://www.greenlight.guru/podcast-mtqs" rel="noopener noreferrer" target="_blank">MedTech True Quality Stories Podcast</a></p><p><a href="https://www.greenlight.guru/academy" rel="noopener noreferrer" target="_blank">Greenlight Guru Academy</a></p><p><a href="https://www.greenlight.guru/medical-device-community" rel="noopener noreferrer" target="_blank">Greenlight Guru Community</a></p><p><a href="https://www.greenlight.guru/" rel="noopener noreferrer" target="_blank">Greenlight Guru</a></p>

DESCRIPTION

FDA has issued new draft guidance on cybersecurity for software as a medical device (SaMD). If the FDA releases that draft guidance ‘as is,’ it will massively and negatively impact the SaMD industry and it’s imperative that manufacturers understand how to prepare. 

In this episode of the Global Medical Device Podcast, Etienne Nichols talks to Chris Gates, director of product security at Velentium, about the shifting sands of medical device cybersecurity regulations for SaMD. 

Some of the highlights of this episode include:

  • Chris views the FDA’s recent activity around cybersecurity requirements, regulations, and laws for SaMD as a necessity because manufacturers cannot seem to self-regulate. 
  • The Protecting and Transforming Cyber Health Care Act (PATCH) will give the FDA a direct mandate to manage the cybersecurity of medical devices.
  • However, a clause in the PATCH Act allows for cybersecurity to extend to all existing legacy medical devices—not just new devices entering the market.
  • As medical device manufacturers (MDMs) become aware of the clause, it’ll have a huge impact. MDMs will likely end support for device lines due to high costs. 
  • The biggest issue with the new guidance consensus vs. regulatory standards is alignment with software bill of materials (SBOM) tools.
  • The most effort-intensive part of the new draft guidance is ongoing testing of anomalies to determine if they can be turned into vulnerabilities. The industry will be unable to keep up with additional testing because of resources and demand.
  • All this added burden will be placed on MDMs at the cost of marginal improvements in cybersecurity. So, there’s no real benefit to the manufacturer.
  • Structure a standard by not creating something brand new that is ill/undefined but align best practices to create secure medical devices.

Memorable quotes from Chris Gates:

“Legally-backed cybersecurity requirements by a regulatory agency are necessary to ensure secure devices are entering the marketplace and hopefully replacing the insecure legacy devices.”

“This clause is going to have a huge impact on medical device manufacturers (MDMs) and I find it amazing how many MDMs are completely unaware of this.”

“An SBOM is a software bill of materials. It’s an ingredients list for your application.”

“This isn’t just one-and-done testing in your life cycle.”

“You’re going to have a lot of extra work coming your way.”

Links:

Medical Device Cybersecurity for Engineers and Manufacturers

Regulations (Submit comments to the FDA)

Cybersecurity in Medical Devices: Quality System Considerations and Content of Premarket Submissions

PATCH Act

International Electrotechnical Commission (IEC)

ISO (International Organization for Standardization)

International Medical Device Regulators Forum (IMDRF)

Chris Gates on LinkedIn

Chris Gates Email

Greenlight Guru YouTube Channel

MedTech True Quality Stories Podcast

Greenlight Guru Academy

Greenlight Guru Community

Greenlight Guru