This project investigates the vulnerabilities and risks associated with Internet of Medical Things (IoMT) devices in healthcare delivery organisations (HDOs). The focus is on implementing robust Governance, Risk, and Compliance (GRC) frameworks and adhering to international standards for security and risk management. The project also proposes practical controls to mitigate risks while ensuring compliance with regulatory requirements.
The complete project is available at the following secure link: Access Complete Project. The document is password-protected. To request access, please email the author, Yashas Javali, stating your purpose. A secure password will be shared upon approval.
-
IEC 80001-1:2021
- Focus: Lifecycle risk management for IT networks integrating medical devices.
- Emphasises identifying hazards, evaluating associated risks, and implementing controls.
- Designates a Medical IT Network Risk Manager responsible for stakeholder collaboration.
-
ISO/IEC 27001:2022
- Focus: Establishing and maintaining an Information Security Management System (ISMS).
- Includes 93 controls across 14 domains, covering access management, cryptographic controls, and incident management.
- Requires continuous monitoring and periodic audits.
-
NIST Cybersecurity Framework (CSF)
- Focus: Providing a flexible framework for managing cybersecurity risks.
- Five core functions: Identify, Protect, Detect, Respond, Recover.
- Encourages a risk-based approach tailored to IoMT-specific needs.
-
GDPR and Data Protection Act (DPA)
- Focus: Ensuring data privacy and security for personal health information (PHI).
- Article 32 mandates encryption and pseudonymisation for data protection.
-
OWASP Secure Medical Device Deployment Standard v2.0
- Focus: Secure configuration and deployment of IoMT devices.
- Recommends vulnerability scanning, segmentation, and encrypted communication.
Device | Version | CVE | Vulnerability | Impact | Mitigation Strategies |
---|---|---|---|---|---|
Welch Allyn Connex Central Station (CS) | v1.1 | CVE-2021-27410 | Out-of-bounds Write | Critical (C-I-A) | Implement DEP, VLAN segmentation, VPN access, and proactive monitoring. |
MiniMed Paradigm Veo 554/754 Pumps | v2.6A | CVE-2019-10964 | Improper Authentication | High (C-I-A) | Apply physical controls, data obfuscation, and disconnect unused connections. |
Medtronic MyCareLink (MCL) Smart Model 25000 | v2.0 | CVE-2020-25187 | Heap Overflow | Critical (C-I-A) | Regular patching, physical security, and proactive monitoring. |
Natus EEG with NeuroWorks | v8 | CVE-2017-2853 | Stack Buffer Overflow | High (C-I-A) | Limit network exposure, use segmentation, and ensure VPN-only connections. |
Dickinson BD Alaris Plus Medical Syringe Pumps | v2.3.6 | CVE-2018-14786 | Improper Authentication | Critical (C-I-A) | VLAN segmentation, VPN access, and strict firewall controls. |
-
Policy Framework:
- Develop IoMT-specific cybersecurity policies, ensuring they cover onboarding, maintenance, and decommissioning of devices (IEC 80001-1).
- Enforce regular policy updates to align with evolving compliance standards (ISO/IEC 27001).
-
Audit and Monitoring:
- Conduct quarterly compliance audits against GDPR Article 32 and ISO/IEC 27001 controls.
- Use risk assessment templates to evaluate vulnerabilities before deployment.
-
Roles and Responsibilities:
- Assign a dedicated Medical IT Network Risk Manager to oversee risk management and stakeholder coordination (IEC 80001-1).
-
RBAC Implementation:
- Define granular roles for device users and administrators based on device functionality (ISO/IEC 27001 A.9).
- Enforce strict access rights to prevent privilege escalation attacks (NIST CSF Protect).
-
Multi-Factor Authentication (MFA):
- Implement MFA for all administrative accounts, with biometric options for critical actions (GDPR Article 32).
-
Credential Security:
- Remove all default credentials from devices before deployment.
- Use strong, unique passwords managed through an enterprise-grade password manager (OWASP Recommendations).
-
Segmentation and Isolation:
- Use VLANs to isolate IoMT devices from other critical systems, minimising lateral movement of attackers (NIST CSF Protect).
- Implement firewall rules to restrict communication between devices and untrusted networks.
-
Secure Remote Access:
- Require VPNs for all remote management sessions.
- Configure VPN access with device whitelisting to ensure only authorised endpoints can connect.
-
IDS and IPS Deployment:
- Deploy Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) tailored to monitor IoMT-specific traffic patterns (ISO/IEC 27001 A.12).
-
Data Encryption:
- Use AES-256 for encrypting sensitive patient data at rest (ISO/IEC 27001 A.18).
- Apply TLS 1.3 for all data transmitted between devices and backend systems (NIST CSF Protect).
-
Integrity Validation:
- Use HMAC-SHA256 to validate the integrity of firmware and configuration files during updates (IEC 80001-1).
-
Key Management:
- Store cryptographic keys in a hardware security module (HSM).
- Rotate encryption keys periodically to limit the impact of potential compromise (ISO/IEC 27001 A.10).
-
Secure Boot:
- Enable secure boot processes to ensure only trusted firmware and configurations are loaded (OWASP).
-
Firmware Updates:
- Implement digitally signed firmware updates to prevent tampering (ISO/IEC 27001 A.14).
- Use automated tools to push updates and confirm their application.
-
Lifecycle Management:
- Apply secure decommissioning practices, ensuring all sensitive data is wiped from devices before disposal (IEC 80001-1).
-
Incident Response Planning:
- Develop a detailed incident response plan aligned with ISO/IEC 27035, incorporating detection, containment, recovery, and root cause analysis.
-
Mock Incident Drills:
- Conduct bi-annual simulations to test the organisation’s readiness for IoMT-specific attacks.
-
SIEM Integration:
- Centralise monitoring through Security Information and Event Management (SIEM) systems for improved visibility and faster response times (ISO/IEC 27001 A.16).
- Strengthened understanding of governance frameworks (IEC 80001, ISO/IEC 27001) and their practical application to IoMT devices.
- Gained expertise in developing standards-based controls to address IoMT risks.
- Enhanced skills in integrating monitoring, incident management, and regulatory compliance for healthcare environments.
- Improved proficiency in cryptographic controls and secure device configuration.
The project underscores the critical importance of standards-based governance and technical controls in mitigating IoMT device risks. Implementing compliance-driven frameworks ensures both security and operational efficiency.
-
AI-Driven Monitoring:
Develop advanced anomaly detection systems using AI to enhance real-time threat detection. -
Post-Quantum Security:
Prepare IoMT devices for quantum-resilient cryptographic standards. -
IoMT Device Certification Programs:
Promote certification standards for IoMT devices, ensuring secure development and deployment practices.