Kyunghwan Kim
Registered
Hi, all
I have read the cybersecurity guidance ('Content of Premarket Submissions for Management of Cybersecurity in Medical Devices), and have some questions about it.
I want to ask about the following parts of this guidance that I do not clearly understand.
Q1. Page 13, (b)-(iii) of the guidance:
(Use cryptographically strong authentication resident on the device to authenticate personnel, messages, commands and as applicable, all other communication pathways)
I do not understand the word 'cryptographically strong authentication resident.' Does it mean like encryption keys or something?
Q2. Page 17, (g) of the guidance:
(The device design should provide a CBOM in a machine readable, electronic format to be consumed automatically)
2-1) Must I (manufacturer) document and maintain the CBOM (Cybersecurity BOM)?
2-2) What does 'machine-readable, electronic format' mean? Is it okay just to document and maintain those in 'Word', 'Excel', or any other commercial document format? Otherwise, other special formats should be required?
Q3. Page 16, (a) & (c)
((a): Implement design features that allow for security compromises to be detected, recognized, logged, timed, and acted upon during normal use. )
((c): Ensure the design enables forensic evidence capture. The design should include mechanisms to create and store log files for security events. Documentation should include how and where the log file is located, stored, recycled, archived, and how it could be consumed by automated analysis software (e.g. Intrusion Detection System, IDS). Examples of security events include but are not limited to configuration changes, network anomalies, login attempts, and anomalous traffic (e.g., sending requests to unknown entities).)
What is the difference between the requirement (a) & (c) exactly? If the device (or software) is designed to log some events (for example, logging the user login, time, or data export), does the design satisfy both requirements? Otherwise, does it just meet the (a) or (c)?
Q4. Page 16, (b)
(Devices should be designed to permit routine security and antivirus scanning such that the safety and essential performance of the device is not impacted. )
Should I verify that the program itself is not recognized as a malware or virus? In addition, is it necessary to verify that the operation of the device (or software) is working normally during vaccine scanning?
Many thanks for your opinions!
I have read the cybersecurity guidance ('Content of Premarket Submissions for Management of Cybersecurity in Medical Devices), and have some questions about it.
I want to ask about the following parts of this guidance that I do not clearly understand.
Q1. Page 13, (b)-(iii) of the guidance:
(Use cryptographically strong authentication resident on the device to authenticate personnel, messages, commands and as applicable, all other communication pathways)
I do not understand the word 'cryptographically strong authentication resident.' Does it mean like encryption keys or something?
Q2. Page 17, (g) of the guidance:
(The device design should provide a CBOM in a machine readable, electronic format to be consumed automatically)
2-1) Must I (manufacturer) document and maintain the CBOM (Cybersecurity BOM)?
2-2) What does 'machine-readable, electronic format' mean? Is it okay just to document and maintain those in 'Word', 'Excel', or any other commercial document format? Otherwise, other special formats should be required?
Q3. Page 16, (a) & (c)
((a): Implement design features that allow for security compromises to be detected, recognized, logged, timed, and acted upon during normal use. )
((c): Ensure the design enables forensic evidence capture. The design should include mechanisms to create and store log files for security events. Documentation should include how and where the log file is located, stored, recycled, archived, and how it could be consumed by automated analysis software (e.g. Intrusion Detection System, IDS). Examples of security events include but are not limited to configuration changes, network anomalies, login attempts, and anomalous traffic (e.g., sending requests to unknown entities).)
What is the difference between the requirement (a) & (c) exactly? If the device (or software) is designed to log some events (for example, logging the user login, time, or data export), does the design satisfy both requirements? Otherwise, does it just meet the (a) or (c)?
Q4. Page 16, (b)
(Devices should be designed to permit routine security and antivirus scanning such that the safety and essential performance of the device is not impacted. )
Should I verify that the program itself is not recognized as a malware or virus? In addition, is it necessary to verify that the operation of the device (or software) is working normally during vaccine scanning?
Many thanks for your opinions!