Skip to Main Content
Device Security
device security

Planning Ahead for Med Device Software Updates

Posted by Battelle Insider on Aug 15, 2018

If your medical device has software, someday that software will need to be updated. Do you have a plan in place to ensure that updates can be made safely and securely

Software updates are a fact of modern life. On the consumer side, we're all used to our phones, computers and smart gadgets nagging us to download the latest patch and, occasionally, deciding to shut down of their own accord — usually at an inconvenient moment — to perform a critical update.

In the medical device world, the stakes can be much higher. A device that doesn't get a critical update when it is needed may be left with a security vulnerability that puts patient safety or data at risk. At the same time, the update process itself can introduce new security vulnerabilities.

While no medical device containing code is ever 100 percent secure, the industry has made significant improvements in device security over the last decade. However, once devices are released into the market, they are part of an evolving software and security ecosystem in which new vulnerabilities are discovered or introduced all the time. 

The FDA's postmarket guidance for medical device manufacturers recommends that the latter have a plan for patching software and firmware to address new vulnerabilities as they emerge; the 2018 Medical Device Safety Action Plan outlines the FDA’s intent to make this a requirement for device developers moving forward.  

Medical device developers may want to send software or firmware updates for other reasons, as well. These include:

  • Introducing new features or functions (for the user or the device company)
  • Making improvements to the user experience, or patching bugs identified after market release
  • Maintaining compatibility with other devices, software and operating systems that the device must interact with

Considerations for Secure Medical Devices Updates

Regardless of the reason for the updates, device manufacturers must ensure that the update process itself is secure and does not introduce new vulnerabilities to the device. The best way to do this is proactively, by building into the device, from the very beginning stages of design, a secure update process.

Manufacturers should look at several critical questions:
  • How will emerging security risks and critical flaws, which would necessitate a software update, be identified and prioritized?
  • How will the device be updated — manually on site (e.g., thumb drives), remotely through a network connection, remotely through a cellular connection, etc.?
  • Does the device have enough processing power and memory to support the update process? Does the device need a dedicated processor to securely and safely handle updates?
  • What is the authentication process? How will the device verify that the update is genuine and coming from the manufacturer?
  • How has the patch been tested to ensure that it will not increase the risk of device failure or malfunction?
  • What fail-safes are in place, in the device, to reduce the risk of failure or malfunction during or after a patch? What if the download or update process is interrupted?
  • Can critical software updates be safely automated to ensure that all users receive the update? Or could the update process put patient safety at risk if not carefully coordinated?

Proactive Steps Toward Secure Medical Device Software Updates

A secure medical device update plan encompasses several elements, including these steps medical device manufacturers should be taking already:

Start with secure design — First, make sure you are following up-to-date cybersecurity guidelines as you develop your device. These guidelines evolve quickly as new vulnerabilities emerge; if you don't have cybersecurity expertise on staff, it is usually prudent to contract with a medical device cybersecurity expert to evaluate your design plans.

Build or select hardware with updates in mind — When daily operation of the device requires minimal memory and processing power, device manufacturers may opt for hardware geared only towards those needs. However, updating the device may require more memory and processing power than is needed for standard operation of the device.

Make sure your device has enough memory and processing power to handle a secure update that includes modern cryptographic functions. This includes memory for secure key storage and processing power to handle cryptographic functions, such as digital signature creation/verification and data encryption.

Create a secure delivery mechanism for software updates — There are six key aspects to consider in developing a secure delivery mechanism for software updates:
  • Authentication
  • Authorization
  • Availability
  • Confidentiality
  • Integrity
  • Nonrepudiation
Build fault tolerance into your update mechanism — A robust, fault-tolerant design must consider how it handles and recovers from typical faults that may occur during the update process, such as the loss of communication or loss of power during an update. Devices with critical functions, or devices with low bandwidth connections, must consider how to expedite the update process and minimize downtime.

Consider how updates are triggered and timed — Automatic updates from the manufacturer’s website may be ideal to ensure prompt updates for some types of medical devices. However, for life-sustaining devices, applying a software update at an incorrect time can put patients at risk. The design must consider when it is authorized to install an update and who it has been authorized by.

A proactive approach to secure software updates will help medical device manufacturers avoid substantial headaches after the device is released. Incorporating secure design elements will ensure that medical devices can receive the updates they need to improve functionality, protect patient safety and data security and maintain compatibility with other devices and systems.

About the Authors
Rick Brooks is the Director of Systems, Software and Electrical Engineering, and DeviceSecure Services at Battelle. Josh Branch is a software engineer at Battelle. 

The full version of this article was originally posted on Med Device Online.
 

Search