Beyond Patching: Securing Medical Devices Postmarket

The following is a guest article by Joseph M. Saunders, Founder and CEO at RunSafe Security

Modern healthcare settings are full of devices that use software to manage and improve patient care, from MRI machines to CT scanners to infusion pumps. Healthcare providers rely on medical device manufacturers to deliver secure and effective software upfront, but securing software once these devices are already in the field is another challenge altogether.

Just last year, the FDA released new guidance on cybersecurity for medical devices, including requirements for securing medical devices postmarket. The FDA’s primary guidance is that manufacturers have a plan for the “rapid testing, evaluation, and patching of devices deployed in the field.”

Patching, however, takes significant time and resources and is difficult to accomplish for Class II and Class III medical devices. With the risk of a cyberattack on the medical device software supply chain so high, both healthcare providers and medical device manufacturers are taking a closer look at opportunities to better address cybersecurity vulnerabilities throughout the device lifecycle.

The Challenges of Patching Medical Devices

Patching medical devices is challenging for many reasons. Vulnerability research and analysis, patch creation, and testing require significant engineering resources. Once a patch is developed medical device manufacturers then need to work with healthcare providers to manage the logistics of pushing updates to devices, including those that may not be easily accessible. Different healthcare environments also have complex deployment scenarios and manufacturers need to be able to maintain support for multiple software versions.

The most stressful scenario for manufacturers and healthcare providers is dealing with zero-day vulnerabilities in deployed devices. These situations create crisis conditions where manufacturers need to respond quickly, develop and test patches under extreme time pressure, coordinate emergency updates with healthcare providers, and manage potential risks to patient care. 

The longer the gap between when a vulnerability is identified and a patch is available, the bigger the window for attackers to successfully exploit a device.

Exploit Prevention in Medical Device Software

Though patching is an essential part of medical device security, healthcare systems need more proactive security solutions that give defenders a leg up over attackers. One promising solution is runtime exploit prevention, a technology that acts as a self-defense mechanism built directly into a device’s software.

Runtime protections allow fielded devices to defend against sophisticated malware, unauthorized code execution, hidden backdoors, unknown vulnerabilities, and attacks targeting system memory.

If an attacker were to target a vulnerability in a medical device with runtime exploit prevention deployed, the device would be able to defend itself and prevent the attack, even before a patch becomes available.

Although this technology doesn’t eliminate the fundamental need for security patches, it serves as a crucial safeguard in the medical environment where immediate updates aren’t always feasible. Runtime protections significantly decrease the risk posed by vulnerabilities to critical medical devices, effectively buying valuable time until a comprehensive update can be safely deployed.

What’s Next?

In addition to making devices more resilient against attack, proactive security solutions also make it easier to meet FDA guidance and make patching more efficient.

FDA guidance requires manufacturers to submit a cybersecurity management plan as part of their premarket submission, including how they will address postmarket security vulnerabilities. By deploying solutions like runtime exploit prevention, manufacturers can strengthen their premarket submissions by demonstrating how they are lowering risk and the future exploitation of vulnerabilities.

Proactive security measures also help to transform the typical patch management process, bridging the security gap between vulnerability discovery and patch deployment. Because devices are already protected, manufacturers can assess vulnerabilities more strategically and coordinate updates based on actual risk levels rather than rushing emergency fixes.

An attack against a medical device can quickly spread to affect entire healthcare systems. Prioritizing proactive security measures rather than relying on reactive patching alone will go a long way toward building the resilience of critical systems while protecting patients.

Beyond Patching: Securing Medical Devices PostmarketAbout Joseph M. Saunders

Joseph M. Saunders is the Founder and CEO at RunSafe Security, a pioneer of cyberhardening technology for embedded systems deployed across critical infrastructure. He leads a team of former U.S. government cybersecurity specialists who know how attackers think about problems, how they weaponize attacks and how they choose targets.

A 25-year veteran of many leadership roles, Joe is on a personal mission to transform cybersecurity by challenging outdated assumptions and disrupting the economics that motivate hackers to attack.

发布者:Dr.Durant,转转请注明出处:https://robotalks.cn/beyond-patching-securing-medical-devices-postmarket/

(0)
上一篇 21 1 月, 2025 2:58 下午
下一篇 21 1 月, 2025 3:06 下午

相关推荐

发表回复

您的电子邮箱地址不会被公开。 必填项已用 * 标注

联系我们

400-800-8888

在线咨询: QQ交谈

邮件:admin@example.com

工作时间:周一至周五,9:30-18:30,节假日休息

关注微信
社群的价值在于通过分享与互动,让想法产生更多想法,创新激发更多创新。