
Cybersecurity Risks in Medical Devices & Predetermined Change Control Plans (PCCP) for AI/ML
Connected devices and software-driven care improve outcomes—but expand the attack surface. This audit-ready guide explains key cybersecurity risks for medical devices (including SaMD) and how to implement a compliant, defensible program that integrates risk management, secure development, post-market vigilance, and a practical PCCP for AI/ML-enabled functions.
Why Cybersecurity Matters
- Patient safety: Attacks can alter therapy, suppress alarms, or corrupt data—causing clinical harm.
- Data protection: Breaches expose PHI/PII and erode trust.
- Regulatory compliance: EU and US frameworks expect security-by-design, updateability, and robust post-market processes.
- Business continuity: Ransomware and DoS can halt operations and trigger costly recalls or field actions.
Common Threats & Vulnerabilities
- Weak authentication/authorization; default or shared credentials.
- Unencrypted data in transit/at rest; poor key management.
- Unvalidated inputs; insecure update channels; unsigned firmware.
- Legacy OS/components; third-party libraries with known CVEs; no SBOM.
- Inadequate logging/monitoring; inability to detect/contain incidents.
- Network exposure (flat networks, open services) enabling lateral movement.
- AI/ML specifics: data poisoning, model drift, adversarial inputs, silent performance degradation.
Regulatory Expectations at a Glance
- EU MDR/IVDR: Safety/performance include protection against software/electrical risks; security-by-design, updateability, and information for safety are expected (Annex I).
- US FDA: Quality system expectations include secure SDLC, threat modeling, logging, vulnerability handling, and patching; submissions should include cybersecurity documentation and update plans.
- Standards baseline: Apply ISO 14971 for risk, IEC 81001-5-1 for health software security controls, plus usability and software lifecycle standards.
Integrate Cybersecurity into ISO 14971 Risk Management
- Plan: Security objectives, roles, acceptability criteria; define assets and trust boundaries.
- Threat modeling: Identify attack paths (e.g., STRIDE/LINDDUN); document assumptions and misuse cases.
- Risk estimation: Tie threats to hazardous situations and clinical harms; rate severity/probability.
- Controls (priority 1→2→3): Inherent secure design → protective measures → information for safety.
- Verification: Security testing (static/dynamic analysis, fuzzing, pen-test), code signing tests, update validation.
- Residual risk & disclosure: Justify, communicate in IFU, and monitor post-market.
- Lifecycle monitoring: Feed complaints/CVEs/telemetry into CAPA and updates.
Core Security Controls (Build These In)
| Domain | Control | Audit Evidence |
|---|---|---|
| Access | Unique credentials, MFA where feasible, least privilege, secure boot | Config baseline, test logs, access review |
| Crypto | TLS for data in transit, strong encryption at rest, key rotation | Cipher suites list, key mgmt SOP, test results |
| Updates | Digitally signed updates, anti-rollback, secure channels, timely patch SLAs | Update protocol spec, signature verification report |
| SBOM | SBOM (e.g., SPDX/CycloneDX), CVE scanning and remediation process | SBOM snapshot, CVE triage records |
| Logging | Security-relevant logging, time sync, tamper resistance, retention | Log catalog, SIEM extracts, integrity checks |
| Network | Port/service hardening, segmentation, default-deny inbound | Hardening guide, port scan reports |
| Usability | Security-critical UI flows tested to reduce use error | Summative usability results tied to security tasks |
PCCP for AI/ML-Enabled Device Software Functions
A Predetermined Change Control Plan allows clearly scoped, future modifications to AI/ML functions without a new full submission—when you define them up front and validate rigorously.
- Scope & Intent: Describe the AI/ML component, current indications, and the types of model/data updates you plan to make.
- Planned Modifications: Define specific change categories (e.g., re-training on incremental data, recalibration, threshold updates) and explicit guardrails (what is out of scope).
- Modification Protocol: Data management (quality/representativeness/bias), training pipeline controls, validation datasets, performance metrics and acceptance criteria, statistical methods, fail-safes.
- Cyber-Safety Controls: Model versioning, cryptographic signing, rollback procedures, runtime monitoring for drift/anomalies, adversarial robustness checks.
- Deployment Process: Secure update delivery, environment checks, canary/gradual rollout, operator communications.
- Impact Assessment & Triggers: Criteria that determine when a change stays within the PCCP or requires a new submission; document decision logic.
- Post-Market Monitoring: Real-world performance surveillance, bias monitoring, incident capture, and rapid rollback criteria.
- Documentation Package: Clear mapping to risk files, verification/validation reports, release notes for the PRRC/NB or FDA reviewers.
Suppliers, SBOM, and Third-Party Risk
- Qualify suppliers; require vulnerability disclosure timelines and signed update deliveries.
- Maintain an SBOM; monitor CVEs; document risk decisions and patches.
- Validate third-party components (crypto libraries, OS images, AI frameworks) and pin versions.
Logging, Monitoring, and Incident Response
- Define security events; ensure device logs capture authentication, configuration, update, and safety-critical actions.
- Centralize or export logs securely; protect log integrity; time-sync.
- Run tabletop exercises; keep contact points and response playbooks current; support coordinated vulnerability disclosure (CVD).
PRRC Oversight & Release Gate
- PRRC reviews cybersecurity risk analysis, SBOM status, update/patch policy, and PCCP bundle.
- PRRC confirms residual cyber-risks are acceptable and reflected in IFU and operator guidance.
- PRRC can block release if required controls, testing, or monitoring are incomplete.
Evidence Pack — What Reviewers Expect
| Evidence Type | Description / Purpose | Preparation Notes |
|---|---|---|
| Cybersecurity Risk Analysis | Threat model, hazardous situations, controls, verification | Tie to ISO 14971; include pen-test/fuzz results |
| Secure SDLC Artifacts | Code reviews, SAST/DAST, dependency scans | Show coverage and closure of findings |
| SBOM & CVE Triage | Component list and vulnerability management | Evidence of timely remediation and rationale |
| Update & Patch Policy | Signed updates, patch SLAs, rollback | Demonstrate tests of signature/rollback |
| Logging & IR Plan | Event catalog, retention, incident playbooks | Provide example log extracts/redactions |
| PCCP Bundle (AI/ML) | Scope, planned changes, protocol, metrics, triggers | Link to datasets, model cards, monitoring plan |
| Labeling/IFU | Security requirements, admin guidance, residual risks | Align with residual risk eval and RM Report |
Common Pitfalls (and How to Avoid Them)
- No SBOM or CVE process: You can’t patch what you don’t track.
- Unsigned updates: Risk of malicious firmware—enforce signing and anti-rollback.
- Generic PCCP: Vague change descriptions or no triggers lead to reviewer pushback.
- No runtime monitoring: Especially for AI/ML drift and anomaly detection.
- Labeling mismatch: Operator guidance doesn’t reflect residual cyber-risks.
Audit-Ready Checklist
- Threat model, cyber risk analysis, and verification evidence approved.
- SBOM current; CVE triage and remediation documented.
- Signed update mechanism validated; patch SLAs defined and met.
- Logging/monitoring live; IR playbooks tested; CVD process in place.
- PCCP bundle complete with metrics, triggers, and monitoring plan.
- PRRC release sign-off captured; labeling updated with security info.
Bottom Line
Build cybersecurity into design, validation, and post-market monitoring—and package a concrete PCCP for AI/ML changes. With SBOM discipline, signed updates, strong logging, and PRRC oversight, you’ll be safer, faster through review, and truly audit-ready.
AI Act, GDPR & Related Frameworks — What This Means for Your SaMD
EU AI Act (AIA) — High-Risk AI for Medical Devices
- Scope: AI that is a medical device or a safety component of one is high-risk.
- Obligations: AI QMS, risk management, data & model governance, logging, transparency, post-market monitoring.
- Timing (headline): In force; staged application—focus your plan on the high-risk obligations window.
GDPR — Privacy by Design for Health Data
- Lawful basis + Art. 9 condition for special-category data (health/biometric).
- Art. 25 Data Protection by Design/Default; Art. 32 security of processing.
- Art. 35 DPIA typically required for large-scale health data or impactful automated processing.
NIS2 — Organizational Cybersecurity & Reporting
- Check if you are an essential/important entity in your Member State; implement risk management and incident reporting.
Cyber Resilience Act (CRA) — When MDR Doesn’t Cover It
- Medical devices are generally outside CRA; however, non-MD companion apps/IT may fall in—assess your portfolio.
EU Data Act — Connected Product Data Access
- Data-access and sharing duties for connected products/related services; align with GDPR and contract terms.
European Health Data Space (EHDS)
- Phased obligations for EHR systems & secondary-use data; plan for export formats, access rights, and governance.
US Privacy/Security Complements
- HIPAA Security Rule for ePHI (covered entities/business associates); FTC HBNR catches health apps outside HIPAA.
- AI Act mapping: high-risk determination, AI QMS scope, technical doc + logs, PMS plan (tie to RMF).
- GDPR: ROPA entry, DPIA report, Art. 25 design controls, Art. 32 TOMs, data minimization & purpose limits in IFU/admin guides.
- NIS2: designation check, incident thresholds, contact points, tabletop exercises.
- CRA/Data Act/EHDS: scope check, gap analysis, and if in scope—policies for vulnerability handling, data access/export, governance.
Legal & Standards References — Cybersecurity & PCCP
European Union
- MDR 2017/745 — Annex I §17 (electronic programmable systems and software), §23 (information supplied by the manufacturer).
- IVDR 2017/746 — Annex I §16/§23 (software and information supplied by the manufacturer).
- MDCG 2019-16 — Guidance on cybersecurity for medical devices (expectations for security-by-design and PMS).
United States
- FD&C Act §524B — Cybersecurity requirements for cyber devices (submission content, patching, VEX/plan expectations).
- FDA — Cybersecurity in Medical Devices: Quality System Considerations — Final guidance (secure SDLC, threat modeling, testing, logging, vulnerability handling).
- FDA — Predetermined Change Control Plan (PCCP) for AI/ML-Enabled Device Software Functions — Marketing submission recommendations (description of planned modifications, modification protocol, impact/trigger criteria, monitoring).
Standards & Technical Reports
- ISO 14971:2019 — Application of risk management to medical devices.
- IEC 81001-5-1:2021 — Health software and health IT systems cybersecurity — activities and controls.
- IEC 62304 — Medical device software lifecycle processes.
- IEC 62366-1 — Usability engineering (security-relevant use errors).
- AAMI TIR57 — Principles for medical device security risk management.
- AAMI TIR97 — SBOM considerations for device security.
Provided without hyperlinks for audit-friendly documentation; verify applicability to your device class and submission route.
Legal References — Additional
EU
- EU Artificial Intelligence Act — high-risk AI for medical devices/safety components; staged application dates.
- GDPR — Art. 9 (special-category data), Art. 25 (privacy by design/default), Art. 32 (security), Art. 35 (DPIA).
- NIS2 (Directive (EU) 2022/2555) — cybersecurity obligations for essential/important entities.
- Cyber Resilience Act — horizontal cybersecurity for products with digital elements; med devices generally excluded.
- EU Data Act (Reg. 2023/2854) — data access/share duties for connected products/related services.
- European Health Data Space (Reg. 2025/327) — primary/secondary use of health data; phased obligations.
United States
- HIPAA Security Rule (45 CFR 164 Subpart C) — administrative/physical/technical safeguards for ePHI.
- FTC Health Breach Notification Rule (as amended 2024) — notifications for non-HIPAA health apps/devices.
Provided without hyperlinks for audit-friendly documentation; verify device-specific applicability and transition dates.