Attivo Networks Blogs

How deception technology can boost security for medical devices

health-data-management- logo

Explosive growth in smart medical devices has created a new set of challenges for the healthcare industry. To adapt to these changes, health IT risk management experts are seeking new ways to better balance integrated services and security.

While medical devices are regulated in many ways for functionality, with rules or laws put forth by regulatory agencies, these same regulators have fallen short when it comes to prescribing enforceable security standards that sufficiently address today’s interconnected healthcare systems—an issue made particularly complex by the lack of agreement over whether providers or device manufactures should bear the liability burden.

Several regulatory bodies are all working towards improving the situation. Currently, the rules that apply to each medical device depend on how the product is classified by regulatory agencies. Each agency has defined classifications for medical devices and established core risk management standards.

The National Institute of Standards and Technology (NIST) in particular prescribes a number of key risk management standards of which those in the medical device industry must be aware. These standards include both technology-based recommendations for taking stock of and implementing security controls and people-focused guidelines centered around access control. While these standards are not strictly enforceable, they represent a step in the right direction toward a more comprehensive understanding of IT risk.

The Food and Drug Administration (FDA) regulatory efforts are based upon shared responsibility models between healthcare sector stakeholders. It has increased industry transparency around medical device cybersecurity threats and other issues, and it soon plans to publish a significant update to modernize its 2014 pre-market medical device cybersecurity guidelines to address this quickly evolving space. This update is expected to provide customers and users with a “cybersecurity bill of materials,” and will include a list of software and hardware components within medical devices that could be susceptible to vulnerabilities. It will be an important resource to help device users respond quickly to potential threats.

Additionally, the FDA released a pair of cybersecurity-focused playbooks. One looks internally, aiming to help its staff address cybersecurity threats, vulnerabilities and incidents. The other was developed with MITRE and focuses on medical device cybersecurity. It outlines recommendations for preparedness and response so that healthcare delivery organizations are better positioned to build and maintain a more secure environment. It also directly addresses the responsibilities borne by device manufacturers. The playbook describes the types of readiness activities that will better prepare healthcare delivery organizations for cybersecurity incidents. Steps include:

  • Developing a medical device inventory and conducting training exercises. Some organizations create viable policies and processes, but don’t test them in practice. Training exercises are critical as it is incredibly risky to build an incident response process and test it for the first time in the middle of an incident.
  • Defining leadership roles for decisive action. Who’s in charge? Whom do you call when an incident happens, and in what order? A proper crisis protocol must be established and clearly communicated.
  • Weighing the potential impact of product vulnerabilities earlier in the development process. Give product developers more opportunity to understand and address the potential for large-scale, multi-patient impact that may raise patient safety or care concerns.

The MITRE playbook is a step in the right direction, and it will ideally create a culture of awareness and preparedness. Organizations must also recognize that standards are good, but in order to be effective, security procedures and practices must be proactively and continually tested. Sharing of information on medical devices and cyberattacks across a region or the industry before, during, and after a medical device cybersecurity incident will also help the industry be better prepared for attackers that seek to apply the same attack methods across other similar healthcare providers.

As an organization develops an incident response preparedness plan, it is critical to have a firm understanding of the players who built, designed, and tested it, in order to know in advance what actions to take and where to turn for support. Who must be notified and in what order? Who should handle external public affairs in the event of a breach? Who is the right law enforcement representative, should reporting become necessary? Who are your regulatory authorities, and who has the authority to speak to them during an incident? What must be complied with in accordance with breach insurance. These are important questions to ask of your general counsel or legal team as you build out a plan.

Organizations that operate under the assumption that a breach is inevitable will be better prepared in the event one occurs. Building processes designed to respond to and identify the extent of a breach quickly will be critical in not only mitigating the impact of the breach but also in addressing obligations related to breach disclosure. A fast and confident response can prevent an attacker from destroying your environment, stealing medical records, harming patients or misusing your resources to further infiltrate the infrastructure of a partner or customer.


Share on:

Free Active Directory Assessment

Get Visibility Into Privilege And Service Account Exposure

For a limited time, Attivo Networks is providing free Active Directory Security Assessments to demonstrate how ADAssessor provides unprecedented and continuous visibility to AD vulnerabilities.

Try Our Endpoint Detection Net (EDN) for Free


Free use offer of our Award-winning security solution to prevent attackers from lateral movement, credential theft, and privilege escalation, fast and easy.

Newsletter Signup

    Yes, please opt me in to receive your quarterly newsletter, event invitations, and product updates.

    I understand that I can opt out at any time, and can refer to Attivo Networks Privacy Policy for more information.
  • This field is for validation purposes and should be left unchanged.

ADSecure 90-Day Free Trial


  • Hide and deny access to AD objects
  • Get alerted on unauthorized queries
  • Attack details easily viewable in dashboard
  • Your data remains on-premise


Leave a Comment

Your email address will not be published.

1 × two =

Ready to find out what’s lurking in your network?

Scroll to Top