1-888-310-4540 (main) / 1-888-707-6150 (support) info@spkaa.com
Select Page

What’s in the MITRE/FDA Playbook?

What’s in the MITREFDA Playbook
Written by SPK Blog Post
Published on December 17, 2018

On October 2018, the MITRE Corporation and the Food and Drug Administration released their joint document, Medical Device Cybersecurity Regional Incident Preparedness and Response Playbook. This is the new Bible for organizations designing and manufacturing connected medical devices.

The document is the product of a four-year partnership between MITRE and the FDA. The document was developed in response to real-world cybersecurity breaches such as WannaCry and Petya/NotPetya. It focuses primarily on these types of potential large-scale threats.

MITRE and the FDA recommend regional collaboration. Individual organizations have necessarily limited resources that might not be up to the task of addressing emergent cybersecurity vulnerabilities. Trusted partnerships, however, established on a regional basis, can pool resources and become greater than the sum of their parts. These pooled resources can assist not only preparedness for existing threats, but fast response to zero day and other emerging threats.

MITRE and the FDA provide a number of concrete suggestions for collaboration in the document including:

  • Joint exercises and simulations
  • Sharing policies, plans and best practices
  • Development of mutual aid response plans
  • Sharing advisories and alerts
  • Ensuring access to shared advisories and alerts
  • Formal and informal methods of real-time information sharing
  • Secondary channels of communication
  • Creation of regional command centers
  • Incident tracking procedures
  • Mutual aid agreements such as diverting patients or sharing devices
  • Mutual technical assistance

Regional groups need not be limited to manufacturers and designers. Stakeholders from the initial design team all the way to patient advocacy groups can and should come together. Cybersecurity for connected medical devices is decidedly an area where there is strength in numbers.

Once regional groups of organizations are established and follow these guidelines, it’s only a logical next step that these regional organizations will begin communicating with one another. This opens the opportunity for unified response across regions as appropriate. Even when cybersecurity breaches occur they can be dealt with swiftly. Contingency plans mean less inconvenience for end users, which in turn provides another layer of safety.

None of this will eliminate cybersecurity threats. What it will do, however, is make organizations more resilient when it comes to vulnerabilities to connected devices. What’s more, the guidelines are very open. This allows organizations and groups of organizations to adapt them in ways that make sense for their specific situation rather than a one-size-fits-all template that might not actually fit all.

Next Steps

Latest White Papers

DevOps Visibility and Metrics for Driving Business Value eBook

DevOps Visibility and Metrics for Driving Business Value eBook

To reliably measure the business value of the software developmentprocess, organizations need better visibility across the softwaresupply chain. How do businesses improve DevOps visibility, and how does this drive business value? Find the answer to these questions and...

Related Resources

ISO 9001: Quality Management in Medical Device Manufacturing

ISO 9001: Quality Management in Medical Device Manufacturing

Ensuring medical device quality is critical. So, you’ll need to understand and meet ISO requirements to appeal to potential buyers and streamline management. In this blog, we discuss ISO 9001 as it relates to medical device manufacturing, what your business can do to...