10 Properties of Secure Embedded Medical Systems

October 13, 2021

When attacking an intelligent edge medical system, it takes only one vulnerability to put patient health at risk.

Security requirements for medical software present a growing challenge as devices move from stand-alone systems or private networks into cloud operations. Intelligent systems offer rewards, but they also introduce risks. Among these risks are the increasing efforts of outside actors to exploit medical devices as entry points for ransomware and other attacks. Worse yet, an attacker may try to use a compromised device to go further, pivoting from one exploited subsystem to another and jeopardizing patient health while causing further damage to the device company’s network, mission, and reputation.

This white paper covers the most important security design principles that, if adhered to, give you a fighting chance against any attacker who seeks to gain unauthorized access, reverse engineer, steal sensitive information, or otherwise tamper with your embedded medical system.

No Previous Resource

Next
Ask the Expert: Medical Device Cybersecurity Simulation Testing
Ask the Expert: Medical Device Cybersecurity Simulation Testing

Expert discusses cybersecurity for medical devices: reducing risk with pen testing.

×



Discuss your organization’s cybersecurity needs with a Wind River expert

First Name
Last Name
Company
Industry
Job Title - optional
Phone - optional
Country
State
Province/Territory
Province
Prefecture
County
Comments - optional
I agree to receive marketing materials and other information about Wind River’s products & services.
Thank you for your interest.
Error - something went wrong!