A solid basis
Connect your device to the Internet of Medical Things
Connectivity is must-have for consumer medical devices, but the Internet can be a scary place. Jump-start connected medical device development with PROREGIA's cybersecurity concepts and architectural blueprints.

end2end Architecture

Cybersecurity Concept

Cybersecurity risk assessment and mitigation differ vastly from the processes utilised for unconnected devices. Unsuspecting manufacturers ran afoul in the past, and regulatory bodies are tightening cybersecurity requirements in response. Cybercriminals already shutdown hospitals running outdated systems, and the next years will likely see targeted attacks on connected medical devices.

A cybersecurity concept makes sure all your bases are covered:

  • Identify System Scope
  • Identify Threat Actors
  • Identify Attack Vectors
  • Define Countermeasures & Mitigations
  • Define Cybersecurity Requirements on System Level
  • Provide a Rationale and Acceptance Criteria for Cybersecurity Requirements
  • List Remaining Vulnerabilities
PROREGIA Cybersecurity concept

Cybersecurity and Secure Interface Architecture

This e2e framework block addresses advanced cybersecurity concepts such as secure offline use and 3rd party component interaction. Using a smartphone as a remote control for a medical device is an obvious choice, but fraught with security risks; online systems are much easier to secure. Integration with 3rd party components or services can pose a significant risk if done incorrectly.

The cybersecurity architecture enables your advanced usage scenarios:

  • Identify offline use cases
  • Assess the risks of offline tasks
  • Identify interaction needs
  • Assess the risks of 3rd party interactions
  • Formulate an appropriate mitigation strategy
  • Monitor offline use and interaction for irregularities and targeted attacks
PROREGIA Cybersecurity concept