Open Web Application Security Project (OWASP) has released a set of best practices for the secure deployment of those devices. Credit: Thinkstock In the wake of the Food and Drug Administration (FDA) issuing both “premarket” (2014) and “postmarket” (2016) guidance for improving security in the development and manufacture of connected medical devices, the Open Web Application Security Project (OWASP) has released a set of best practices for the secure deployment of those devices.As the report’s author and project leader, Christopher Frenz, puts it, “a medical device with all the security features in the world will not stand up to an attack if it is deployed in an insecure manner.”Frenz, also director of IT infrastructure at Interfaith Medical Center, said the “OWASP Medical Device Deployment Standard,” released last month, was not coordinated with the FDA, but is designed to be “complementary” to its guidance.The document includes 32 recommendations grouped into seven categories: Purchasing controlsPerimeter defensesNetwork security controlsDevice security controlsInterface and central station securitySecurity testingIncident responseThe first category includes recommendations for rigorous evaluation of security and privacy standards built into any device before it is purchased.That could make improving security a long process, since obviously many organizations could have dozens to hundreds of legacy devices, designed to last a decade or more, that don’t meet modern best-practice standards. Indeed, as the report’s introduction states: “Many medical devices were engineered with patient safety and life saving as the sole functions of the device, and little attention was traditionally paid to the security of these devices.”The result, as widely reported, is that, “many medical devices (are) rife with security vulnerabilities.”But Frenz said the deployment standard, “can serve as compensating controls for such devices. One example is the use of network isolation of a potentially insecure device, which lessens the chance of compromise and helps to mitigate the damage a successful compromise can cause,” he said.The report also acknowledges that while it would be ideal for all devices to be, “fully denied access to anything external,” the reality is that in many cases those devices need external access for updates, to transmit data to cloud-hosted medical records systems, and to transmit data to third-party services, such as radiology reading, for assessments.So, among perimeter defenses, the report calls for firewalls, a network intrusion detection system and a proxy server/web filter.+ RELATED: Hospital devices left vulnerable, leave patients at risk + Under network security controls, it calls for limiting communications as much as possible. “All medical devices should be on an isolated network segment that restricts communication … to just the systems required for the device to function,” it said.The network should also have the capability to detect anomalous activity. “For example, a high occurrence of failed login attempts on a device or even a high occurrence of successful logins across a large number of devices (outside of scheduled maintenance) may be indicative of an attack from IoT malware like Mirai,” the report said.And when it comes to the devices themselves, organizations should do the obvious – make sure they are configured properly and that all available patches and updates are installed.Frenz said he knows not all organizations will have the time or money to comply with every item on the list, but said OWASP’s overall goal is to raise awareness. He said organizations can start with risk assessments of their current device deployments, “and identify the controls in the standard that would best help mitigate the most serious risks they identified.” Related content news UK government plans 2,500 new tech recruits by 2025 with focus on cybersecurity New apprenticeships and talent programmes will support recruitment for in-demand roles such as cybersecurity technologists and software developers By Michael Hill Sep 29, 2023 4 mins Education Industry Education Industry Education Industry news UK data regulator orders end to spreadsheet FOI requests after serious data breaches The Information Commissioner’s Office says alternative approaches should be used to publish freedom of information data to mitigate risks to personal information By Michael Hill Sep 29, 2023 3 mins Government Cybercrime Data and Information Security feature Cybersecurity startups to watch for in 2023 These startups are jumping in where most established security vendors have yet to go. By CSO Staff Sep 29, 2023 19 mins CSO and CISO Security news analysis Companies are already feeling the pressure from upcoming US SEC cyber rules New Securities and Exchange Commission cyber incident reporting rules don't kick in until December, but experts say they highlight the need for greater collaboration between CISOs and the C-suite By Cynthia Brumfield Sep 28, 2023 6 mins Regulation Data Breach Financial Services Industry Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe