ChaptersEventsBlog

Download Publication

Managing the Risk for Medical Devices Connected to the Cloud
Managing the Risk for Medical Devices Connected to the Cloud

Managing the Risk for Medical Devices Connected to the Cloud

Release Date: 03/16/2020

With the increased number of Internet of Things devices, Healthcare Delivery Organizations are experiencing a digital transformation bigger than anything in the past. The new breed of connected medical devices brings the promise of improved patient care, better clinical data, improved efficiency, and reduced costs; however, they also bring increased security risks. The goal of this paper is to present the concept of managing medical devices based on their proximity to the patient and introduce practices to secure the use of cloud computing for medical devices.


  • Medical device security lifecycle
    • Pre and post purchase deployment
    • Network
    • Web application interface
    • Wireless communications
    • Secure communications channels
  • Deployment/operations management based on degrees of separation from the patient
  • Decommission/Disposal
  • Recommendations and further reading
Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
Related resources
AI Consensus Assessments Initiative Questionnaire (AI-CAIQ) v1.0.2
AI Consensus Assessments Initiative Questionnai...
Analyzing Log Data with AI Models to Meet Zero Trust Principles
Analyzing Log Data with AI Models to Meet Zero ...
Agentic AI Identity and Access Management: A New Approach
Agentic AI Identity and Access Management: A Ne...
From Chatbots to Agents: The Evolution Toward Agentic AI
From Chatbots to Agents: The Evolution Toward Agentic AI
Published: 11/13/2025
The Difference Between HITRUST and the National Institute of Standards and Technology (NIST)
The Difference Between HITRUST and the National Institute of Standa...
Published: 11/12/2025
Streamlining Cloud Compliance Audits Using AI and Automation
Streamlining Cloud Compliance Audits Using AI and Automation
Published: 11/05/2025
Beyond Generative AI – My Journey to Expert-Guided AI
Beyond Generative AI – My Journey to Expert-Guided AI
Published: 10/31/2025

Acknowledgements

Michael Roza
Michael Roza
Risk, Audit, Control and Compliance Professional at EVC

Michael Roza

Risk, Audit, Control and Compliance Professional at EVC

Michael Roza is a seasoned risk, audit, control and compliance, and cybersecurity professional with over 20 years of experience across multinational enterprises and startups. As a Cloud Security Alliance (CSA) Research member for over 10 years, he has led and contributed to more than 140 CSA projects spanning Zero Trust, AI, IoT, Top Threats, DecSecOps, Cloud Key Management, Cloud Control Matrix, and many others.

He has co-chaired...

Read more

Shamun Mahmud
Shamun Mahmud
Senior Research Analyst, CSA

Shamun Mahmud

Senior Research Analyst, CSA

Vincent Campitelli
Vincent Campitelli

Vincent Campitelli

After retiring from McKesson Corporation in 2016, Vince joined the Office of the President within the Cloud Security Alliance (CSA). Serving as an Enterprise Security Specialist, Vince supports the vast membership base of CSA in consuming and leveraging the numerous services, tools and expanding scope of research devoted to Cloud Computing. With his background in both the healthcare and financial service industries, Vince actively works wit...

Read more

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training