Question
stringlengths
13
1.05k
Answer
stringlengths
2
801
What should be considered when possible?
Hardware-based security solutions
What should the device and the server mutually authenticate and limit?
the connection is initiated over one or more existing trusted channels
What can be done with the use o Answer: Strengthen password protections?
null
What is the use of the acronym CADe for computer-assisted detection known as?
CADe
What is the name of the clinician who makes the reference standard determination?
clinical truther(s)
What is the definition of security strength in Appendix 5?
Terminology
What do cyclic redundancy checks do not provide?
integrity or authentication protections
What is an authorization scheme used for?
as a defensive measure
What should be applied to users, system functions, and others?
the principle of least privileges71
What is the preferred authentication scheme?
cryptographically proven designs
What is a medical device programmer capable of?
Near-Field Communications (NFC)
What is the principle that a security architecture should be designed so that each entity (e.g., user, asset) is granted the minimum system resources and authorizations that the entity needs to perform its function?
least privilege
What is the name of the device that is not expres?
devices to “deny by default”
What is one form of denying authorization?
Ignoring requests
What are the recommendations specifically related to?
selection and implementation of the underlying cryptographic scheme used by a device and the larger system in which it operates
What do you provide for truthing that relies on the interpretation by a reviewing clinician?
the instructions conveyed to them prior to participating in the truthing process
What is the expected to be considered cryptographically strong throughout the service life of the device?
cryptographically strong
What should design a system architecture and implement security controls to prevent?
a situation where the full compromise of any single device can result in the ability to reveal keys for other devices
What is the NIST FIPS 140-2 Suite B available at?
https://csrc.nist.gov/CSRC/media/projects/cryptographic-module- validation-program/documents/security-policies/140sp2851.pdf
What can be employed to help meet this objective?
public- key cryptography
What are many cybersecurity incidents caused, at their root, by the violation of some form of device integrity?
the violation of stored code, stored and operational data, or execution state
What should be used to Authenticate firmware and software?
signatures, message authentication codes (MACs)
What is the name of the authentication that is absent or fails in d software updates?
cryptographic authentication
What is the name of the FDA webpage that provides information regarding UDI?
FDA’s webpage
What is the definition of “whitelist” in NIST SP 800-128?
NIST SP 800-128
What should be verified to ensure that data is not modified in transit or at rest?
integrity of all incoming data
What is any specific criteria used as part of the truthing process?
any specific criteria
What is HIDS/HIPS?
Host-based Intrusion Detection/Prevention Systems
What could lead to patient harm?
disclosure
What could lead to unauthorized use/abuse of device functionality?
disclosure
What are these critical capabilities?
Event detection and logging
What should logs include if possible?
storage capabilities
What is an example of a security event?
sending requests to unknown entities
What may secure configurations include?
endpoint protections
What is recommended to qualify multiple options to support user preferences for different options?
Manufacturers
What is the NIST SP 800-86 available at?
https:
What should not be the same as those who participate in the core clinical performance assessment of the CADe device?
ians participating in the truthing process
What does digital forensics mean?
The application of science to the identification, collection, examination, and analysis, of data while preserving the integrity of the information and maintaining a strict chain of custody for the data
What should be designed to facilitate the performance of variant analyses such that the same vulnerabilities can be identified across device models and product lines?
Design devices to notify users when malfunctions or anomalous device behavior, including those potentially related to a cybersecurity breach, are detected
What are cyber-resiliency capabilities important for?
medical devices
What is the name of the dware-backed trusted execution environments?
dware-backed
What should be resilient to possible cyber incident scenarios?
network outages, Denial of Service,80 excessive bandwidth usage by other products, disrupted quality of service (QoS),81 and/or excessive jitter82
What is the HCIC TF?
null
What is the HCIC TF Report on Improving Cybersecurity in the Health Care Industry?
Improving Cybersecurity in the Health Care Industry
What does CNSSI stand for?
Committee on National Security Systems
What can design devices to anticipate the need for?
software and firmware patches and updates to address future cybersecurity vulnerabilities
What should consider cybersecurity patches and updates that are independent of regular feature update cycles?
cybersecurity patches and updates
What should be considered such that third-party company goes out of business or stops supporting a licensed product?
contingency plans
What is an example of a potential source of Bias in a Ret Submission?
scanned films
What is the FDA's recommendation for manufacturers to provide detailed information for in Section V.B.2?
views identified in Section V.B.2
What is another method used to describe the architecture of a medical device?
call-flow views
What should architecture views provide specific protocol details of?
communication pathways between parts of the medical device system
What is the most important asset that gineers and reviewers should be able to cross?
intermediate assets
What is a security-relevant analysis?
the ability to construct and follow a detailed trace for important communication paths
What should be included in Detailed diagrams and supporting explanatory text that identify all medical device system assets?
Device hardware
What are some nonbinding recommendations for nonbinding recommendations?
Applications, hardware, and/or other supporting assets that directly interact with the targeted device
What is an example of a communication path when there is at least one intermediate asset?
an app
What is the name of the access control model for every asset?
privileges
What is the purpose of an “handoff” sequence?
how is their integrity/authenticity assured
What can often be minimized or at least mitigated through good study design?
sources of statistical bias
What is the name of the strength indicators in a cryptographic method?
key bit length
What are some examples of verification credentials?
certificates, asymmetric keys, or shared keys
What is generated, stored, configured, transferred, and maintained?
password, key
What is another assurance of security properties?
verification of session identifiers
What is the need to balance innovation and security in designs especially during clinical trials?
FDA
What does 21 CFR 812.25 require manufacturers to provide as a part of their IDE application?
an investigational plan
What is included in the 21 CFR 812.25(c), (d)?
updateability/patchability views
What does not preclude the possibility of future cybersecurity questions or concerns being raised during review of a subsequent marketing application?
approval of an IDE based on the documentation recommended above
What is the term for the time when a device is submitted for marketing authorization?
Cybersecurity improvements will likely be needed between the time of clinical trials and when the device is submitted for marketing authorization
What is recommended for all premarket submissions for devices with potential cybersecurity risks?
each type of documentation identified throughout the guidance
What is Statistical analysis of diagnostic performance based on?
subjects verified for presence or absence of the condition of interest by the reference standard
What is the purpose of the table?
to summarize the specific documentation elements identified throughout the guidance for premarket submissions
What is the table in the table that represents one possible way to organize the recommended information?
This table
What is the only view that a SaMD product will likely need to have for each of the global system?
multi-patient harm
What is the most common use of a premarket document?
clinical use cases
What is the type of Premarket Guidance Section(s) IDE Submission* Submission Documentation?
null
What is not specifically recommended Assessment?
Unresolved Section V.A.5
What is the name of the section that could be helpful to submit?
Architecture Views Section V.B.
What is the name of the section that is not specifically recommended Labeling Section VI.A.?
Section V.C.
What does “recommended” refer to?
the elements of an IDE submission FDA discusses in Appendix 3 of this document
What process should a manufacturer use to make a recommendation?
FDA Q-submission process
What is introduced when subjects selected for study are not representative of the intended use population?
Selection bias
What is anything that has value to an individual or an organization?
Asset
What is the right or a permission that is granted to a system entity to access a system resource?
Authorization
What defines the security boundary for an information system?
Boundary Analysis
What is the 89 definition adapted from?
CNSSI 4009-2015 Committee on National Security Systems (CNSS) Glossary
What is a safeguard or countermeasure deployed, in lieu of, or in the absence of controls designed in by a device manufacturer?
Nonbinding Recommendations Compensating Controls
What is Configuration?
the possible conditions, parameters, and specifications with which a device or system component can be described or arranged
What is the process of preventing unauthorized access, modification, misuse or denial of use?
Cybersecurity
What is the process that includes proper identification, authorization for disposition, and sanitization of the equipment, as well as removal of Patient Health Information (PHI) or software, or both?
null
What is the purpose of a system asset?
a specified intended use
What is the NIST guide for Security-Focused Configuration Management of Information Systems called?
NIST SP 800-128 Rev. 4
What may eliminate or mitigate selection bias?
Random or consecutive sampling of subjects
What is the form called that conceals the data’s original meaning?
ciphertext
What is the software program or set of instructions programmed on the flash read-only memory of a hardware device?
Firmware
What is the practice of reducing a system's vulnerability by reducing its attack surface?
Hardening
What is the lifecycle of a medical device?
all phases in the life of a medical device
What is a “repair job” for a piece of programming also known as?
a “fix”
What is provided to manage and track the installation of patches?
a special program
What is the term for use of a product or system in a way not intended by the manufacturer, but which can result from readily predictable human behavior?
Reasonably foreseeable misuse