spk-logo-tm-2023
0%
1-888-310-4540 (main) / 1-888-707-6150 (support) info@spkaa.com
Select Page

What’s in the MITRE/FDA Playbook?

windchill features best plm software
Written by SPK Blog Post
Published on December 17, 2018

On October 2018, the MITRE Corporation and the Food and Drug Administration released their joint document, Medical Device Cybersecurity Regional Incident Preparedness and Response Playbook. This is the new Bible for organizations designing and manufacturing connected medical devices.

The document is the product of a four-year partnership between MITRE and the FDA. The document was developed in response to real-world cybersecurity breaches such as WannaCry and Petya/NotPetya. It focuses primarily on these types of potential large-scale threats.

MITRE and the FDA recommend regional collaboration. Individual organizations have necessarily limited resources that might not be up to the task of addressing emergent cybersecurity vulnerabilities. Trusted partnerships, however, established on a regional basis, can pool resources and become greater than the sum of their parts. These pooled resources can assist not only preparedness for existing threats, but fast response to zero day and other emerging threats.

MITRE and the FDA provide a number of concrete suggestions for collaboration in the document including:

  • Joint exercises and simulations
  • Sharing policies, plans and best practices
  • Development of mutual aid response plans
  • Sharing advisories and alerts
  • Ensuring access to shared advisories and alerts
  • Formal and informal methods of real-time information sharing
  • Secondary channels of communication
  • Creation of regional command centers
  • Incident tracking procedures
  • Mutual aid agreements such as diverting patients or sharing devices
  • Mutual technical assistance

Regional groups need not be limited to manufacturers and designers. Stakeholders from the initial design team all the way to patient advocacy groups can and should come together. Cybersecurity for connected medical devices is decidedly an area where there is strength in numbers.

Once regional groups of organizations are established and follow these guidelines, it’s only a logical next step that these regional organizations will begin communicating with one another. This opens the opportunity for unified response across regions as appropriate. Even when cybersecurity breaches occur they can be dealt with swiftly. Contingency plans mean less inconvenience for end users, which in turn provides another layer of safety.

None of this will eliminate cybersecurity threats. What it will do, however, is make organizations more resilient when it comes to vulnerabilities to connected devices. What’s more, the guidelines are very open. This allows organizations and groups of organizations to adapt them in ways that make sense for their specific situation rather than a one-size-fits-all template that might not actually fit all.

Next Steps

Latest White Papers

A Guide to Ensuring CAD Success in Virtual Environments

A Guide to Ensuring CAD Success in Virtual Environments

As the shift to cloud-based CAD increases, businesses are searching for the perfect virtual CAD tool. Discover all about SPK vCAD as well as other virtual CAD options for collaborative design on this eBook.What You Will Learn In this eBook, you will discover: Future...

Related Resources

Top Microsoft Add-Ons That Maximize Microsoft 365 ROI

Top Microsoft Add-Ons That Maximize Microsoft 365 ROI

Microsoft 365 is the backbone of productivity for many modern businesses. The suite offers essential tools for communication, collaboration, and security. However, many businesses don’t realize that they can unlock even greater value from their investment by...

Fast Answers, Fewer Meetings: Building a Smart Knowledge Culture

Fast Answers, Fewer Meetings: Building a Smart Knowledge Culture

If your day feels like a relay race between status calls and Slack pings, you’re not alone.  Most teams still default to “let’s meet” when they can’t find an answer quickly.  However, the cost of this is real. Slow decisions, fragmented knowledge, and “do-overs”...

Speed, Scale, or Security? What gets prioritized first?

Speed, Scale, or Security? What gets prioritized first?

In this episode of All About Accelerating Products, we chat with Vish Reddy, co-founder of Revyz, a secure backup and data audit solution built for Atlassian cloud products. Vish walks us through the moment that sparked it all and how that frustrating experience led...