设计和制造医疗设备的原始设备制造商和嵌入式开发商面临着不断变化的挑战。安全威胁与日俱增,这意味着嵌入式安全设计方法必须考虑到已知和不可预见的威胁,并满足高度严格的合规要求。但这些威胁是什么,在设计、构建、制造、部署和最终使用的哪个环节才是安全问题?

请花一点时间填写下面的表格,并立即获得本次网络研讨会的录音。
 封面页

网络研讨会录音

医疗设备必须安全

Sep 24, 2021 | Length: 01:00:18

设计和制造医疗设备的原始设备制造商和嵌入式开发商面临着不断变化的挑战。安全威胁与日俱增,这意味着嵌入式安全设计方法必须考虑到已知和不可预见的威胁,并满足高度严格的合规要求。但这些威胁是什么,在设计、构建、制造、部署和最终使用的哪个环节才是安全问题?

Watch the portion of a panel presentation on medical device security featuring an expert from Digi International who addresses those questions, and provides critical insights on how to ensure your designs are built to withstand attacks at every phase of the pipeline – not just in the final application. You’ll learn how the highly secure, robust Digi ConnectCore® SOM platform supports your goals for security and compliance in medical devices.

与 Digi 联系

想进一步了解 Digi 如何为您提供帮助?以下是接下来的一些步骤:

网络研讨会后续问答

Thank you again for attending our session on Medical Device Security. Here are the questions that followed the presentation and their answers. If you have additional questions, be sure to reach out.

Can we provide software security updates to devices at hospitals without violating our FDA device certification?

The FDA states that MDMs (Medical Device Manufacturers) can always update a medical device to strengthen cybersecurity, and the FDA typically doesn’t need to review the update. You should provide instructions to the team responsible for updating your device, implement a secure update procedure with public/private key structure, and build in fail safe code so the device is not in operation when you update.

Won’t a password and a hospital firewall protect my device from hacking?

Yes, in one way, but I think Robert made a great point that there's just a wide range of things that need to be implemented. A password can prevent somebody getting to it, but they can buy one of your devices and start working on it outside of a hospital environment, or steal it, or whatever. So you can't count on your users and put the onus on them to say, "You have to keep our product secure." You have to build security into your devices. I think Robert did a great job talking about the procedure for updating products and maintaining security in the environment where the product is deployed.

Does the FDA test for cybersecurity?

That's a great question, Rich. And the fact is that the FDA does not do specific testing for any kind of malware infection or cybersecurity. They're issuing constantly evolving recommendations, but there's no specific testing, and they state explicitly that it's the responsibility of the medical device manufacturer.

Given some differing philosophies on security, whether it’s hardware or software based, which solution is truly the best?

I would say that, for truly best-in-class security, you actually need a combination of both hardware and software. Hardware brings some of the things that we've discussed, such as anti-tamper capabilities into the mix. Software starts to give you logical source of attacks. So, if you think of the anti-tampering as a physical countermeasure, when you combine both hardware and software together, you get the best of both when it comes to logical and physical attack vectors, as far as what you can protect against. The other thing to consider, though, of course, is the nature of the information you're trying to protect. So, you may need different functionalities from a hardware or a software perspective, depending on what protection profiles you're targeting with your device.

Robert: Yeah. And I'll just step in. I mean, just to extend that, that's why I spent time on my part of the presentation talking about taking advantage of the hardware. There are many things that the hardware is capable of doing or capable of helping with the software, but the software needs to be there to take advantage of all of that, you know. And it's only with the two working in concert that the device can actually become more secure.

If what you are saying is that everyone should use some levels of hardware and software security but every application is different, how do I know what security is right for me?

In cases where you're not sure where to start, or what level of security is necessary for your application, we get this question often of, you know, "I'm not a security expert. How do I get started?" The easiest thing to do, of course, is to find the standard that's most applicable for what your device class is, and use that as a starting point. And ultimately, if you're not sure even what standard to start with, NIST is always a good place to start, for example, National Institute of Standards and Technology. They have a cybersecurity framework that they've actually published, and that can be used as a guide for novices as well as veterans alike in the security arena. So, that would be one place that I would definitely recommend to at least start taking a look at if you're not familiar with security, or if you're new to security.

And then, some of these other standards that have been discussed throughout the webinar as well. So, for example, Bob had mentioned FIPS. It's another NIST standard, if you will, that we see a lot of people targeting or looking to design towards. The other thing that you can do is you can also consult with partners who are experts in security, such as the people that are on the call today, myself, Robert, and Bob. Or, if you have your own in-house expertise, of course, utilize that as well.

What is specific to the medical market when it comes to security vs. the general market?

Well, I can do the one-word answer for that, which is nothing. You know, the techniques that I think all three of us talked about today aren't really specific to the medical market at all. They are more general things to think about if you're doing autonomous drive, right? The security requirements and techniques are essentially the same.

The difference really is in emphasis, you know. If I'm doing a consumer device, and my consumer device gets compromised, and personal data gets transmitted to the bad guys, or a web application, or whatever, that's embarrassing, and it's costly. But the laws are entirely different.

The scrutiny done by regulators is entirely different. Most other industries look at security as basically what happens when the barn door gets open and the horses have all escaped. Whereas the medical regulators are really trying to make sure that you lock the barn door before the horses escape. And that's where all of that emphasis is. It's not just you, and then how do you deal with it after it happens. It is the regulators saying, "Hey, how are you going to prevent this from happening?" And so, even though it would be right to consider all of these things up front for any kind of device, the medical industry requires it.

Patrick: Robert, one more thing that I would add to that as well. I often get the comparison, people saying security is a little bit like insurance. And it is. But when you talk about the medical industry, in particular, I would say, yes, it's like insurance, and the liability is a lot higher as well in medical applications.

How do the things we've discussed help with the kinds of medical attacks that show up in the news (hospital networks being compromised, ransomware, etc.)?

Well, like I said in my presentation, nothing's perfect. But the kinds of steps that we've all talked about in our individual presentations really do help. If it is difficult or impossible for a hacker to get a device so that they can probe it and figure out its weaknesses, or the device becomes somehow invalidated when that happens, then it makes it a lot more difficult for them to figure out how to attack the device.

If your software is developed using preventative techniques, and is using high-quality security best practices, then even if they get access to the device, it will be much more difficult for them to inject, say, malware into the device, which is where the ransomware and other attacks on the hospital network come from. And so, at least you can protect the device to the greatest extent possible, and then you hope that the other providers of the hospital network are doing the same, and therefore, the hospital network will at least be more secure.

Rich: And I know you said it makes it more difficult, but not impossible.

Robert: Yeah, it goes all the way back to, you know, the armed guards and the concrete-encased device.

What are the security issues of using open source hardware, like BeagleBone and Raspberry Pi, in medical device products? Bob, do you want to try that one?

Sure. We get that from our customers, too. And the challenge is the trade-off in time. I mean, the things that Siemens has implemented, and Digi has implemented, and Infineon had implemented and/or will make available to our customers, can all be done using open source software. But it's a huge amount of work, and time, and essentially you're on your own, collecting your own tools, your own pieces, and integrating them on top of the open source hardware. And you have to get it right! So, it's a lot of time, and then you have the issue of certification, going through the different global certifications and showing what you've done, when, again, you just won't have any support from your vendors for that. So, I guess the shorter answer is, yes, it's possible, but really, extremely difficult.

How you detect malware infection?

It is important to design detection features into a connected device. This can include logging attack attempts and examining the logs for unexpected activity on a device. It is also possible to detect network activity to unexpected IP addresses or activity by a device. If a device fails or begins to malfunction, you should remove it from the network and test for malware or code that does not belong on the device. There are companies and labs that can test devices for the presence of malware.

观看我们的嵌入式设计视频
了解如何以正确的方式应对嵌入式设计挑战

相关内容

为您的下一个医疗设备添加语音控制功能 为您的下一个医疗设备添加语音控制功能 语音控制为医疗设备提供了独特的优势--操作方便、卫生条件比触摸屏或... 录制的网络研讨会 嵌入式系统中的电源管理技术 嵌入式系统中的电源管理技术 在嵌入式系统设计中利用关键的电源管理技术可以带来巨大的好处,从电池寿命、电源管理和电源管理技术的应用等方面都是如此。 阅读博客 DeGIV DeGIV 医疗终端满足患者隐私和医疗数据 GDPR 要求 为了帮助控制敏感的医疗保健信息,DeGIV 创建了一个带有专门接入点的隐私平台,名为 "The... 阅读故事 利用Digi ConnectCore 嵌入式 SOM 解决方案加速开发(德语) 利用Digi ConnectCore 嵌入式 SOM 解决方案加速开发(德语) 要将IoT 应用程序推向市场,需要嵌入式系统具备快速开发、灵活性和扩展性,同时... 录制的网络研讨会 Digi ConnectCore 8 个家庭 Digi ConnectCore 8 个家庭 模块选择、兼容性和易扩展性 查看 PDF 无论您的设计多么优秀,如果不安全,您都可能面临风险 无论您的设计多么优秀,如果不安全,您都可能面临风险 嵌入式设计:从第一天起就建立安全性

开发人员在构建安全产品时面临的挑战...
录制的网络研讨会
Digi ConnectCore SOM 解决方案 Digi ConnectCore SOM 解决方案 完全基于 NXP i.MX 应用处理器的嵌入式系统模块--专为工业IoT 应用中的长寿命和可扩展性而设计 查看 PDF 谁对IoT 设备安全负责? 谁对IoT 设备安全负责? 许多人认为,设备制造商可以完全实现安全性,或者可以安装... 阅读博客 Digi ConnectCore 8M Nano:开发人员资源、安全性、可扩展性 Digi ConnectCore 8M Nano:开发人员资源、安全性、可扩展性 Digi International 最近宣布推出Digi ConnectCore 8M Nano 开发套件。Digi ConnectCore® 8M... 阅读博客 IoT 医疗保健领域:应用和使用案例 IoT 医疗保健领域:应用和使用案例 IoT 医疗保健是一个快速增长的领域,原因有很多,其中包括联网设备收集数据的能力... 阅读博客 可靠的互联健康 可靠的互联健康 行业领先的 Digi 解决方案专为当今的联网医疗设备而设计。 查看 PDF

有问题?立即联系 Digi 团队成员!