ChaptersCircleEventsBlog

Download Publication

Managing the Risk for Medical Devices Connected to the Cloud
Managing the Risk for Medical Devices Connected to the Cloud

Managing the Risk for Medical Devices Connected to the Cloud

Release Date: 03/16/2020

With the increased number of Internet of Things devices, Healthcare Delivery Organizations are experiencing a digital transformation bigger than anything in the past. The new breed of connected medical devices brings the promise of improved patient care, better clinical data, improved efficiency, and reduced costs; however, they also bring increased security risks. The goal of this paper is to present the concept of managing medical devices based on their proximity to the patient and introduce practices to secure the use of cloud computing for medical devices.


  • Medical device security lifecycle
    • Pre and post purchase deployment
    • Network
    • Web application interface
    • Wireless communications
    • Secure communications channels
  • Deployment/operations management based on degrees of separation from the patient
  • Decommission/Disposal
  • Recommendations and further reading
Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
Related resources
Shadow Access and AI
Shadow Access and AI
Zero Trust Guidance for Small and Medium Size Businesses (SMBs) - Japanese Translation
Zero Trust Guidance for Small and Medium Size B...
AI Organizational Responsibilities: AI Tools and Applications
AI Organizational Responsibilities: AI Tools an...
A Guide On How AI Pilot Programs are Shaping Enterprise Adoption
A Guide On How AI Pilot Programs are Shaping Enterprise Adoption
Published: 03/28/2025
Threat Modeling OpenAI's Responses API with the MAESTRO Framework
Threat Modeling OpenAI's Responses API with the MAESTRO Framework
Published: 03/24/2025
Strengthening Cybersecurity in Healthcare: Newly Proposed HIPAA Rules to Include Pentesting
Strengthening Cybersecurity in Healthcare: Newly Proposed HIPAA Rul...
Published: 03/21/2025
Gaining the Edge (Literally!) Through Edge Computing
Gaining the Edge (Literally!) Through Edge Computing
Published: 03/19/2025

Acknowledgements

Michael Roza
Michael Roza
Risk, Audit, Control and Compliance Professional at EVC

Michael Roza

Risk, Audit, Control and Compliance Professional at EVC

Since 2012, Michael Roza has been a pivotal member of the Cloud Security Alliance (CSA) family. He has contributed to over 125 projects, as a Lead Author or Author/Contributor and many more as a Reviewer/Editor.
Michael's extensive contributions encompass critical areas including Artificial Intelligence, Zero Trust/Software Defined Perimeter, Internet of Things, Top Threats, Cloud Control Matrix, DevSecOps, and Key Management. H...

Read more

Shamun Mahmud
Shamun Mahmud
Senior Research Analyst, CSA

Shamun Mahmud

Senior Research Analyst, CSA

Vincent Campitelli
Vincent Campitelli

Vincent Campitelli

After retiring from McKesson Corporation in 2016, Vince joined the Office of the President within the Cloud Security Alliance (CSA). Serving as an Enterprise Security Specialist, Vince supports the vast membership base of CSA in consuming and leveraging the numerous services, tools and expanding scope of research devoted to Cloud Computing. With his background in both the healthcare and financial service industries, Vince actively works wit...

Read more

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training