Cloud 101CircleEventsBlog
Help shape the future of cloud security! Take our quick survey on SaaS Security and AI.

Download Publication

Medical Devices in A Zero Trust Architecture - Chinese Translation
Medical Devices in A Zero Trust Architecture - Chinese Translation

Medical Devices in A Zero Trust Architecture - Chinese Translation

Release Date: 11/13/2023

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translated content falls outside of the CSA Research Lifecycle. For any questions and feedback, contact [email protected].


Today’s medical devices often connect to the cloud, which increases the risk by expanding the attack surface. This presents the Healthcare Delivery Organizations (HDOs) with threats and vulnerabilities, technology issues, software risks, and human factors. As a result, security architects are forced to re-examine the concept of identity. Essentially, every connected medical device has an identity and must be under consideration within the Zero Trust Framework. 

Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
View translations
Related resources
Zero Trust Guiding Principles v1.1
Zero Trust Guiding Principles v1.1
Information Technology Governance, Risk, and Compliance in Healthcare v2
Information Technology Governance, Risk, and Co...
Confronting Shadow Access Risks: Considerations for Zero Trust and Artificial Intelligence Deployments
Confronting Shadow Access Risks: Considerations...
An IT Veteran’s Guiding Principles for Successfully Implementing Zero Trust
An IT Veteran’s Guiding Principles for Successfully Implementing Ze...
Published: 09/09/2024
Building Secure and Compliant SaaS Apps – Identity Security Best Practices
Building Secure and Compliant SaaS Apps – Identity Security Best Pr...
Published: 09/05/2024
Zero Trust and SASE: A Synergistic Approach to Security
Zero Trust and SASE: A Synergistic Approach to Security
Published: 08/29/2024
Safeguarding AWS AI Services: Protecting Sensitive Permissions
Safeguarding AWS AI Services: Protecting Sensitive Permissions
Published: 08/29/2024
Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training