Alpine Security Introduces Evolutions for Medical Device Cybersecurity Assessment and Penetration Testing

Share Article

Alpine Security ("Alpine") developed and introduced its "Evolution" methodology for medical device cybersecurity assessments and testing to help medical device manufacturers mature the cybersecurity of their devices. Alpine's Evolution approach is based on the US Navy SEAL's training regiment. The Evolution process is designed to ensure cybersecurity matures and evolves for each medical device to an acceptable level of risk.

Alpine Security's Medical Device Cybersecurity Assessment and Penetration Testing Evolutions

Alpine Security's Medical Device Cybersecurity Assessment and Penetration Testing Evolutions Secure Medical Devices from Cyberattacks

"Attacks against medical devices are often high risk and may harm or kill a patient. Our goal is to assist medical device manufacturers with cybersecurity so they can fulfill their mission of improving medicine and healthcare." - Christian Espinosa, Alpine Security CEO

St. Louis-based firm Alpine Security ("Alpine") aims to secure the healthcare industry from cyberattacks. One way Alpine is securing healthcare is by working with medical device manufacturers to help ensure their devices are safe from cybercriminals. Medical devices range from external systems, such as drug infusion pumps or patient monitoring systems to implantable (internal) devices, like pacemakers. Cybercriminals go after medical devices for four main reasons:

1. To steal Protected Health Information (PHI) (Motive: Financial Gain)
2. Ransomware (Motive: Financial Gain)
3. To harm or kill a patient (Motive: Terrorism or Assassination)
4. To use the medical device as a beachhead for enemy advancement (Motive: Foothold to Expand Operations)

Alpine developed and introduced its "Evolution" methodology for medical device cybersecurity assessments and testing to help medical device manufacturers mature the cybersecurity of their devices. Alpine's Evolution approach is based on Navy SEAL Evolutions. The SEALs use Evolutions to describe each progressive event in a training schedule. The general idea is that as you progress through each Evolution you mature and evolve. Alpine assists medical device manufacturers to evolve the cybersecurity of their medical devices using a structured, phased approach.

Alpine's medical device cybersecurity assessment and penetration testing methodology has two main Evolutions and can include as many as necessary. During each Evolution, the medical device is thoroughly assessed and tested. The first Evolution establishes a cybersecurity baseline for the medical device. This baseline includes all the ways an attacker could gain entry to and compromise the device, as well as the risk associated with each method of compromise. Higher rated risks typically affect patient safety or privacy. After the first Evolution, the medical device manufacturer works to fix the vulnerabilities identified by Alpine Security. The next Evolution validates the vulnerabilities were fixed and checks for any new vulnerabilities that may have been introduced. This process, the Evolution, repeats as many times as necessary to get the medical device to an acceptable risk level.

Alpine's Evolutions include the following activities, in addition to a technical "white box" penetration test:
-- Identification and prioritization of risk pertaining to confidentiality, integrity, and availability
-- Identification and assessment of all entry points into the device (system)
-- Assessment of existing cybersecurity controls
-- Identification and assessment of data flows
-- Identification and assessment of use case risk
-- Threat (Attack) Tree development
-- Assessment of the cybersecurity Traceability Matrix
-- Assessment of medical device standard operating procedures
-- Assessment of software cybersecurity architecture

For more information on Alpine Security's medical device cybersecurity assessment and testing, contact Alpine Security at 844-925-7463 / info@alpinesecurity.com or visit their website at http://www.alpinesecurity.com.

Share article on social media or email:

View article via:

Pdf Print

Contact Author

Public Relations
@alpinesec
Follow >
Alpine Security
Like >
Visit website