ChaptersCircleEventsBlog

Download Publication

Medical Devices in A Zero Trust Architecture
Medical Devices in A Zero Trust Architecture

Medical Devices in A Zero Trust Architecture

Release Date: 05/08/2023

Today’s medical devices often connect to the cloud, which increases the risk by expanding the attack surface. This presents the Healthcare Delivery Organizations (HDOs) with threats and vulnerabilities, technology issues, software risks, and human factors. As a result, security architects are forced to re-examine the concept of identity. Essentially, every connected medical device has an identity and must be under consideration within the Zero Trust Framework. 
Download this Resource

Bookmark
Share
View translations
Related resources
State of SaaS Security Report 2025
State of SaaS Security Report 2025
Zero Trust Guidance For Critical Infrastructure - Korean Translation
Zero Trust Guidance For Critical Infrastructure...
Zero Trust Privacy Assessment and Guidance - Japanese Translation
Zero Trust Privacy Assessment and Guidance - Ja...
Getting Started with Kubernetes Security: A Practical Guide for New Teams
Getting Started with Kubernetes Security: A Practical Guide for New...
Published: 04/25/2025
Phishing Tests: What Your Provider Should Be Telling You
Phishing Tests: What Your Provider Should Be Telling You
Published: 04/24/2025
Understanding Zero Trust Security Models - A Beginners Guide
Understanding Zero Trust Security Models - A Beginners Guide
Published: 04/24/2025
Forging Robust Cloud Defenses for Modern Businesses
Forging Robust Cloud Defenses for Modern Businesses
Published: 04/23/2025

Acknowledgements

Dr. Jim Angle
Dr. Jim Angle

Dr. Jim Angle

Jim has dedicated hundreds of hours to CSA and was instrumental in reviving CSA’s Health Information Management working group. In doing so, he drafted the group’s first charter and went on to become its co-chair. In this role, he authored three papers — Managing the Risk for Medical Devices Connected to the Cloud, Telehealth in the ...

Read more

Michael Roza
Michael Roza
Risk, Audit, Control and Compliance Professional at EVC

Michael Roza

Risk, Audit, Control and Compliance Professional at EVC

Since 2012, Michael Roza has been a pivotal member of the Cloud Security Alliance (CSA) family. He has contributed to over 125 projects, as a Lead Author or Author/Contributor and many more as a Reviewer/Editor.
Michael's extensive contributions encompass critical areas including Artificial Intelligence, Zero Trust/Software Defined Perimeter, Internet of Things, Top Threats, Cloud Control Matrix, DevSecOps, and Key Management. H...

Read more

Wayne Anderson Headshot Missing
Wayne Anderson

Wayne Anderson

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training