Prepared statement for the Subcommittee on Privacy and Confidentiality of the National Committee on Vital and Health Statistics (NCVHS) http://www.ncvhs.hhs.gov/
Presented November 19th, 2004 by:
John F. Murray Jr.
Software Compliance Expert
Office of Compliance
Center for Devices & Radiological Health
United States Food & Drug Administration
My name is John F. Murray Jr. I am the software and electronic record compliance expert in the Office of Compliance, Center for Devices and Radiological Health (CDRH), Food and Drug Administration (FDA).
I am here with my colleague, Mr. Alford R. Taylor, Jr. He is the Director of the Division of Electrical and Software Engineering, Office of Science and Engineering Laboratories, Center for Devices and Radiological Health (CDRH), Food and Drug Administration (FDA).
The mission of CDRH is to promote and protect the health of the public by ensuring the safety and effectiveness of medical devices and the safety of radiological products. We can talk about the radiological health part of our mission some other time, but today, we are pleased to be here to talk about cybersecurity as it relates to medical devices.
Medical Device Networks in Historical Context
It may be beneficial to start on a historical note to give context to the discussion. In the not-too-distant past, most medical devices were exceedingly dumb. A ventilator, for example, was networked only to a patients airway, and the network interface was a piece of plastic tubing. In the fully automatic mode, the ventilator was programmed to deliver a breath at set intervals. Alternatively, in the patient assist mode, a breath would be delivered when a negative pressure was detected in the airway, indicating that the patient was initiating a breath. In either case, the ventilator didnt knowor care aboutthe time of day, the patients name, or her medical condition.
The majority of medical devices are still like that. They live only in the present, either delivering therapy or providing timely diagnostic information to a clinician. In some instances, they may record past performance for archival purposes, but that historical data is limited to what the device measured and how it responded, and may only be associated with a given patient by the clinician who makes use of the data.
Increasingly, however, medical devices are being connected into networks. While a variety of communications media and protocols are available to medical system developers, the standard network interface, ubiquitous in the personal computer world, affords an economical and capable choice that capitalizes on the existing infrastructure in the healthcare facility and beyond, and easily bridges different hardware platforms, operating systems, and medical device software applications.
At present, network connectivity has made the greatest inroads in two domains: in-vitro diagnostic devices in the medical laboratory setting, and image processing, storage, and display systems in the radiology department. But devices at the patient bedside and in the operating room suite are increasingly being attached to the network.
Network Connectivity: Benefits and Risks
The connectivity made possible by modern networks is both a blessing and a curse. On the positive side, the network connection affords a variety of possible benefits to users and patients, such as enhanced ability to:
Along with these benefits have come new risks which must be addressed by manufacturers. When medical devices are connected in a closed network, or joined via dedicated point-to-point links, threats to the security of information, and corresponding risk control measures, are limited and well-defined.
The threat multiplies when medical devices are connected to a corporate intranet or the world-wide Internet. In this situation, medical devices are potentially exposed to a large number of network users, and data flowing over the network may be intercepted and/or manipulated at various access points. Because the technology is evolving rapidly, new threats emerge periodically and require a sustained effort to maintain the integrity of information.
Cyber-attacks may have many different goals, motivations, and consequences. Some examples include:
We think a targeted attack on a specific medical device would be an exceedingly rare circumstance, albeit one that cannot be discounted. In the vast majority of instances, the medical device will either be the innocent victim of a denial-of-service attack, or if inadequately protected, a portal of opportunity for a cyber-attacker seeking to disrupt other resources on the network.
Computer viruses and worms are the most visible forms of cyber-attack, but malwaremalicious softwarecan also be incorporated into a commercial software product or network infrastructure component, or introduced as a stand-alone program by any person who has access to a computer on the network.
Most malware targets commercial off-the-shelf (COTS) software. Because COTS software, in general, is not designed with high-risk applications in mind, it falls upon medical device manufacturers to be very cautious when applying COTS software to their products. For example, in some devices, the network connection supports ancillary functions of the device, and safe use of the device may not be compromised if the network connection is disrupted. However, even in such cases, the healthcare organization will want reasonable assurance that the device cannot become infected with malware that impairs network performance for other users. It is worth noting that network outages, in addition to their economic impact, may indirectly contribute to patient injuriesfor example, by impeding delivery of prescriptions.
The Challenge for FDA
The challenge for FDA is to ensure that network-connected medical devices are adequately safeguarded, working within the regulatory framework under which we are required to operate. FDAs principal concern is risk to health, but healthcare organizations and other stakeholders are also concerned with protecting the privacy of information as well as minimizing economic risk. These risks must be balanced against the cost of cybersecurity and the benefits afforded by healthcare computer networks.
It is generally recognized that some risk must be accepted in order to reap the benefits, but the responsible parties have a responsibility to actively manage risk on an ongoing basis, responding to emergent threats by developing and applying reasonable technological and administrative control measures.
From FDAs perspective, responsibility for cybersecurity is shared by three key stakeholders:
FDAs focus is on how to properly lead and motivate the technical and scientific experts to create solutions that are appropriate for the needs of all of the stakeholders. It is important to appreciate that the software engineering community, not the FDA, will dictate the solutions to cybersecurity threats. FDA has rarely suggested specific design elements, but there are well-accepted methods, practices and techniques currently used in the information technology community to mitigate cybersecurity threats. Medical device manufacturers and other responsible parties must avail themselves of the software engineering body of knowledge and make reasonable judgments in applying this knowledge to their products, services, and systems.
Current FDA Efforts in Cybersecurity
Our current effort is to clarify how the existing FDA rules and regulations apply to breaches in cybersecurity, and in particular to the maintenance of commercial off-the-shelf software to address cybersecurity concerns.
We are developing a formal policy statement on cybersecurity patches that will be issued as guidance to the medical device industry. This guidance has been drafted and is currently being vetted in accordance with our established good guidance practices, so it would be premature to share it with you at this point. But the key points are as follows:
When the software patch affects either a function or performance of the medical device having significant implications for safety or effectiveness, the correction should be reported to FDA, even if a software maintenance plan is in effect.
Our Vision for the Future
In addition to developing the guidance on cybersecurity patches just described, our staff of software engineers is meeting routinely with members of the healthcare IT community, medical device manufacturers and their trade associations, standards developing organizations, and other stakeholders. We seek to develop a shared understanding of the problem, which we believe will ultimately lead to consensus solutions.
We see no need for burdensome new FDA regulations concerning cybersecurity. The established principles of quality management and risk management, which are already part of our regulatory structure, provide an adequate roadmap for responding to cybersecurity threats.
We view the HIPAA Security Rule as simply one more element in the environment that medical device manufacturers operate in. Fortunately, the measures that safeguard privacy are in many cases also important to assure the safety and effectiveness of medical devices.
We recognize that other parts of the Department of Health and Human Services have overlapping concerns regarding cybersecurity in medical devices, and we regret that resource limitations have impeded our outreach to other operating divisions in the HHS family. For that reason, we appreciate the opportunity to participate in this hearing today. We hope that you have found this presentation to be informative and pertinent to your needs, and we would be glad to answer any questions you might have.
This communication is consistent with 21 CFR 10.85(k) and constitutes an informal communication that represents my best judgment at this time but does not constitute an advisory opinion, does not necessarily represent the formal position of FDA, and does not bind or otherwise obligate or commit the agency to the view expressed.