BSI PD IEC TR 60601-4-5:2021
$198.66
Medical electrical equipment – Guidance and interpretation. Safety-related technical security specifications
Published By | Publication Date | Number of Pages |
BSI | 2021 | 54 |
IEC TR 60601-4-5:2021 provides detailed technical specifications for SECURITY features of MEDICAL DEVICES used in MEDICAL IT-NETWORKS. MEDICAL DEVICES dealt with in this document include MEDICAL ELECTRICAL EQUIPMENT, MEDICAL ELECTRICAL SYSTEMS and MEDICAL DEVICE SOFTWARE. MEDICAL DEVICE SOFTWARE, although not in the scope of IEC 60601 (all parts), can also make use of this document. Based on the seven foundational requirements described in the state-of-the-art document IEC TS 62443 1 1:2009, this document provides specifications for different MEDICAL DEVICE capability SECURITY LEVELS (SL C). The specified SECURITY capabilities of a MEDICAL DEVICE can be used by various members of the medical community to integrate the device correctly into defined SECURITY ZONES and CONDUITS of a MEDICAL IT-NETWORK with an appropriate MEDICAL IT NETWORK’s target SECURITY LEVEL (SL T). This document is applicable to MEDICAL DEVICES with external data interface(s), for example when connected to a MEDICAL IT-NETWORK or when a human interface is used for processing – e.g. entering, capturing or viewing – CONFIDENTIAL DATA.This document does not apply to other software used on a MEDICAL IT-NETWORK which does not meet the definition of MEDICAL DEVICE SOFTWARE. This document does not apply to in-vitro diagnostic devices (IVD).
PDF Catalog
PDF Pages | PDF Title |
---|---|
2 | undefined |
4 | CONTENTS |
6 | FOREWORD |
8 | INTRODUCTION |
11 | 1 Scope 2 Normative references |
12 | 3 Terms and definitions |
17 | 4 Common security constraints 4.1 Overview 4.2 * Support of essential function |
18 | 4.3 COMPENSATING COUNTERMEASURES Figures Figure 1 – essential function |
19 | 4.4 LEAST PRIVILEGE 4.5 Data minimization 4.6 * Overarching constraints 4.6.1 Constraints referenced by the medical device specifications 4.6.2 Hardware security |
20 | 4.6.3 * Specific security features for medical devices 5 security levels for the different foundational requirements 5.1 * Application of security levels 5.2 Modified specifications for security levels |
21 | 6 Technical description |
23 | 7 Mapping of requirements to capability security levels (SL-C) |
24 | Tables Table 1 – Mapping of single requirements to capability security levels (SL-C) |
28 | Annex A (informative)General guidance and rationale A.1 The approach of this document: Type testable medical device IT security properties |
29 | Figure A.1 – Illustration with security levels |
30 | Figure A.2 – Capability – Target – Achieved |
33 | Table A.1 – Exemplary criteria for the selection of appropriate targetsecurity level SL-T in typical intended use environments |
34 | A.2 Typical network connections of medical devices covered in this document Figure A.3 – Wireless point-to-point connection between a portable device (e.g. patient programmer) and an implant Figure A.4 – Connection between a patient’s portable device and a doctor’s computer Figure A.5 – Connection between a medical device and a doctor’s computer |
35 | A.3 Inclusion of me systems Figure A.6 – it-network in a hospital |
36 | A.4 Correlation to existing regulations, standards and technical specifications |
37 | Figure A.7 – Selection of IT security related documents |
39 | A.5 Concept of zones and conduits with specified target security levels (SLT) within an it-network as specified by IEC 62443 (all parts) [3] A.6 Documentation of capability security level (SL-C) of a medical device Figure A.8 – Example of what a complex it-network can consist of |
40 | A.7 Conceptual elements of IEC 62443 (all parts) [3] used for this document Table A.2 – Exemplary vector of capability security level SL-C |
41 | Figure A.9 – Comparison of objectives between industrial automationand control systems and general it-networks |
50 | A.8 Correlation with IEC TR 80001-2-2 [9] |
52 | Bibliography |