MedCrypt
Published in

MedCrypt

Medical Device Manufacturer Secure Development Lifecycle

Managing the software supply chain (including commercial, open source, and contracted components) within the Secure Software Development Lifecycle requires pre- and post-market management of cybersecurity starting with supplier candidate evaluation and selection, software and documentation delivery, to ongoing management during the device’s lifecycle.

A mature Secure Software Development Lifecycle program requires consideration and consistent management from premarket through postmarket.

Premarket activities include: defining security requirements, inclusion in architecture and design, implementation, and throughout testing and release for sale, all supported by the appropriate set of security documentation.

Postmarket activities include monitoring, vulnerability mitigation and management, software and documentation maintenance, and lifecycle-related customer communication.

During the postmarket phase, device owners and operators, typically a healthcare delivery organization (HDO), will require security-specific communication and support. They will define their security requirements during procurement and expect continual security maintenance (e.g., vulnerability disclosure, patching) during the device’s useful life until final decommission.

A mature Secure Software Development Lifecycle requires tight integration between engineering and release processes with supply chain and customer (HDO) needs, all supported by the appropriate security tools, technologies, processes, and training.

Want to learn more about developing medical devices that are secure by design? Reach out to us at info@medcrypt.com and discover how we help build devices that are secure by design.

--

--

--

Proactive Healthcare Security in a Few Lines of Code

Recommended from Medium

Next-Generation Security Practices: Why Use the Best Multi-Factor Authentication Solutions?

Next-Generation Security Practices: Why Use the Best Multi-Factor Authentication Solutions

Come to Claim the Medal of Senior Token Holder!

VDR 101: Everything You Need to Know About Virtual Data Rooms

Buffer Overflow Prep — TryHackMe

Perks of Holding $KSW

Giveaway of $10,000 worth of SuperBull Finance Token ($SBULL) Airdrop sbullfinance sbullfinance

The Different Types of Cryptocurrency Scams

Bcrypt gem on Rails

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
MedCrypt

MedCrypt

More from Medium

Security Countermeasures in risk management

ife in DevOps from DevOps Live Europe 2022 — (2) Sustainability

13 Strategies To Make Your Cybersecurity Failproof — Just Gilbey IT Solutions Ltd

eCXD Exam Review