ChaptersCircleEventsBlog
Align cybersecurity controls with evolving regulations and make a real impact in the industry. Join CSA's Regulatory Analysis and Compliance Engineering Working Group!

Download Publication

Managing the Risk for Medical Devices Connected to the Cloud
Managing the Risk for Medical Devices Connected to the Cloud

Managing the Risk for Medical Devices Connected to the Cloud

Release Date: 03/16/2020

With the increased number of Internet of Things devices, Healthcare Delivery Organizations are experiencing a digital transformation bigger than anything in the past. The new breed of connected medical devices brings the promise of improved patient care, better clinical data, improved efficiency, and reduced costs; however, they also bring increased security risks. The goal of this paper is to present the concept of managing medical devices based on their proximity to the patient and introduce practices to secure the use of cloud computing for medical devices.


  • Medical device security lifecycle
    • Pre and post purchase deployment
    • Network
    • Web application interface
    • Wireless communications
    • Secure communications channels
  • Deployment/operations management based on degrees of separation from the patient
  • Decommission/Disposal
  • Recommendations and further reading
Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
Related resources
Dynamic Process Landscape: A Strategic Guide to Successful AI Implementation
Dynamic Process Landscape: A Strategic Guide to...
Agentic AI Red Teaming Guide
Agentic AI Red Teaming Guide
Shadow Access and AI
Shadow Access and AI
AI Agents vs. AI Chatbots: Understanding the Difference
AI Agents vs. AI Chatbots: Understanding the Difference
Published: 06/16/2025
Runtime Integrity Measurement Overview
Runtime Integrity Measurement Overview
Published: 06/13/2025
The AI Trust Imperative: Why the CSA AI Trustworthy Pledge Matters Now More Than Ever
The AI Trust Imperative: Why the CSA AI Trustworthy Pledge Matters ...
Published: 06/12/2025
LLMs Writing Code? Cool. LLMs Executing It? Dangerous.
LLMs Writing Code? Cool. LLMs Executing It? Dangerous.
Published: 06/03/2025

Acknowledgements

Michael Roza
Michael Roza
Risk, Audit, Control and Compliance Professional at EVC

Michael Roza

Risk, Audit, Control and Compliance Professional at EVC

Michael Roza is a seasoned risk, audit, control and compliance, and cybersecurity professional with over 20 years of experience across multinational enterprises and startups. As a Cloud Security Alliance (CSA) Research member for over 10 years, he has led and contributed to more than 140 CSA projects spanning Zero Trust, AI, IoT, Top Threats, DecSecOps, Cloud Key Management, Cloud Control Matrix, and many others.

He has co-chaired...

Read more

Shamun Mahmud
Shamun Mahmud
Senior Research Analyst, CSA

Shamun Mahmud

Senior Research Analyst, CSA

Vincent Campitelli
Vincent Campitelli

Vincent Campitelli

After retiring from McKesson Corporation in 2016, Vince joined the Office of the President within the Cloud Security Alliance (CSA). Serving as an Enterprise Security Specialist, Vince supports the vast membership base of CSA in consuming and leveraging the numerous services, tools and expanding scope of research devoted to Cloud Computing. With his background in both the healthcare and financial service industries, Vince actively works wit...

Read more

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training