Certifications

iso9001
iso14001
icas
Delivery
security
warranty
roiginal
RoHS
UL
數百萬庫存的電子零件。 接受缺貨訂單。 24小時內的價格和交貨時間報價。

Secure design of embedded IoMT devices

九月 4 2023 2023-09 Power Microchip Technology
Article Cover
The healthcare industry's growing reliance on connected devices makes it vulnerable to cyberattacks, ranking second only to small businesses. To prevent potential disasters, the U.S. Food and Drug Administration (FDA) has developed embedded device safety implementation guidelines for medical device manufacturers to follow. This guide covers all stages of design, development, product launch, after-sales support, and discontinuation.

The healthcare industry's growing reliance on connected devices makes it vulnerable to cyberattacks, ranking second only to small businesses. To prevent potential disasters, the U.S. Food and Drug Administration (FDA) has developed embedded device safety implementation guidelines for medical device manufacturers to follow. This guide covers all stages of design, development, product launch, after-sales support, and discontinuation. Although the information in the FDA guidance is required reading for designers, it is often written at a high level, most often stating what features should be implemented, rather than how. To help medical device designers delve deeper, this article provides some missing details.

The FDA has been issuing recommendations on cybersecurity for the medical industry since 2014, each updating previous requirements to address the rapidly evolving threat landscape. The updated guidance is contained in "Cybersecurity in Medical Devices: Quality System Considerations and Pre-Sale Submissions: Draft Guidance for Industry and FDA Staff," published in April 2022. It has three main parts:

General principles:

How and why cybersecurity should be part of device security, quality system regulations, how to design for security, why providing transparency is critical, and submission documentation.

Security product development framework:

How to manage and assess security risks, and the need for updates and patches, using threat models and security architectures that incorporate security controls, global systems, and multimodal harm views. This section also provides detailed information on network security testing.

Cybersecurity transparency:

Communicated by labeling and establishing a vulnerability management plan, it acknowledges that users have different mitigation capabilities and that solutions should be suitable for everyone.

However, the most useful information for embedded system designers is in Appendix 1 at the end, including information on authentication, authorization, encryption techniques, execution integrity, event detection, logging resiliency, firmware, and software updates.

It is necessary to cover each topic individually to fill in the missing details in the FDA's extensive guidance.

First, authentication is essential to the security model. Public/private key pairs and associated certificate chains connect medical devices to the network. The private key needs to be isolated from device firmware that may contain vulnerabilities and make the key easily accessible. The FDA recommends placing the encryption key in a tamper-proof security key store similar to Microchip's CryptoAuthentication™ security IC.

The connection to the cloud server must be verified by trusting each other's devices and the cloud. While it is possible to verify every session, this can consume a lot of power in battery-powered Internet of Things (IoT) devices. The combination of hardware crypto accelerators and secure key storage significantly alleviates this problem, as it maintains extremely low current at the nanoamp level in sleep mode.

User authentication allows administrators, technicians, and others to have privileged device access, which introduces the concept of key authentication. This class of use cases is provided through predefined CryptoAuthentication integrated circuit (IC) configurations utilizing the Trust Platform Design Suite (TPDS) development tools.

Information authenticity is essential for signing messages and verifying their trustworthiness in embedded systems. While cryptographic authentication ics essentially handle encrypted or unencrypted message authentication, it is also possible to use message authentication codes (MACs) that employ symmetric related encryption accelerators.

Authorization is another important contribution of the FDA guidance because it establishes the principle of least privilege, which sets permissions and permissions between the trusted execution area and the application area to manage critical code. Each module can access only the information and resources it needs to fulfill its purpose.

Encryption is clearly another key factor in ensuring security. The FDA wisely recommends the use of standard encryption algorithms because they are constantly tested and updated by public organizations with the help of a large number of community user input. Encryption keys will verify the integrity of the data, but not validity, so designers must verify that all data from an external source is well-structured and conforms to the appropriate specification or protocol.

Confidentiality is related to authentication and authorization, and if the encryption key is not kept secret in the hardware, unauthorized use can occur. Manufacturers should ensure that confidentiality is supported for all data that could be exploited by hackers to cause harm to patients. Confidentiality must be ensured when handling and storing encryption keys used for authentication, as disclosure can lead to unauthorized use or abuse of device functionality.

FDA documentation provides information on the proper implementation of authorization and authentication schemes that typically ensure confidentiality. However, designers should assess whether this is the case during threat modeling and make the necessary changes to the system to ensure appropriate controls are in place.

In addition, the FDA describes event testing and recording, while recommending that they be stored for forensic discovery. This involves preserving and restoring trusted default device configurations, and designers must determine how to achieve this using secure key storage.

It is reasonable to assume that all Internet of Things (IoT) devices today allow over-the-air (OTA) firmware and software updates, but the truth is that many of these devices do not have this capability. Without proper firmware, system updates cannot be quickly deployed to address the latest threats. Code updates should also conform to established user permissions, as the person with the public key can control OTA updates and inject harmful code.

Fortunately, CryptoAuthentication IC makes this process both easy and automated, and ensures that updates are performed. A single CryptoAuthentication IC can securely store encryption keys for most, if not all, of the use cases mentioned by the FDA.

Conclusion

For medical device manufacturers, the FDA's new guidance is comprehensive and aims to advance the field of healthcare system cybersecurity. These guidelines are written in a form that can be incorporated into legislation, rather than as an "operational guide" for embedded system designers, which is why benchmarking level discussions are only included in appendices.

Microchip has spent years developing a trusted ecosystem of security devices and tools, and it's a good place to start before starting to develop systems that will be included in the next generation of medical products.

您可能感興趣的產品

474 474 SWITCH PUSHBUTTON SPST-NO YELLOW 8208

More on Order

166 166 ROUND FORCE-SENSITIVE RESISTOR 4320

More on Order

1137 1137 MAXBOTIX WEATHER-RESISTANT ULTRA 7794

More on Order

675 675 PIPING EL WIRE SEWABLE 5M AQUA 5814

More on Order

445 445 ELECTROLUMINESCN STRIP RED 100CM 6660

More on Order

2837 2837 ADDRESS LED STRIP SERIAL RGBW 4M 2052

More on Order

2536 2536 NEOPIXEL DIGITAL RGB LED STRIP - 6804

More on Order

2035 2035 ADDRESS LED MATRIX I2C GREEN 5688

More on Order

2037 2037 ADDRESS LED MATRIX I2C RED 5220

More on Order

2863 2863 ADDRESS LED RING SERIAL RGBW 2142

More on Order

2762 2762 ADDRESS LED DISCR SER RGBW 1=10 8460

More on Order

872 872 ADDRESS LED MATRIX I2C GREEN 5274

More on Order

880 880 ADDRESS LED 7 SEG I2C GREEN 7578

More on Order

878 878 ADDRESS LED 7 SEG I2C RED 6516

More on Order

2239 2239 ADDRESS LED STRIP SERIAL RGB 4M 5544

More on Order

3917 3917 CONVEX PLASTIC LENS WITH EDGE - 8982

More on Order

2397 2397 7"" TFT DISPLAY 1024 X 600 2484

More on Order

912 912 2.5"" TFT DISPLAY 320 X 240 5526

More on Order

1743 1743 3.2"" TFT LCD WITH TOUCHSCREEN BR 6408

More on Order

1431 1431 BREAKOUT BD OLED 16BIT CLR 1.5"" 7974

More on Order

848 848 DIFFUSED RGB (TRI-COLOR) 10MM LE 5454

More on Order

1855 1855 SMALL 1.2 8X8 ULTRA BRIGHT SQUAR 5094

More on Order

1818 1818 LED MATRIX 8X8 SQUARE AMBER 4608

More on Order

2972 2972 LED CHARLIEPLEXED MATRIX - 9X16 4698

More on Order