ChaptersCircleEventsBlog
Share how your organization manages AI securely. Take the CSA and Google enterprise AI Survey today!

Download Publication

Medical Devices in A Zero Trust Architecture - Chinese Translation
Medical Devices in A Zero Trust Architecture - Chinese Translation

Medical Devices in A Zero Trust Architecture - Chinese Translation

Release Date: 11/13/2023

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translated content falls outside of the CSA Research Lifecycle. For any questions and feedback, contact research@cloudsecurityalliance.org.


Today’s medical devices often connect to the cloud, which increases the risk by expanding the attack surface. This presents the Healthcare Delivery Organizations (HDOs) with threats and vulnerabilities, technology issues, software risks, and human factors. As a result, security architects are forced to re-examine the concept of identity. Essentially, every connected medical device has an identity and must be under consideration within the Zero Trust Framework. 

Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
View translations
Related resources
Zero Trust Automation & Orchestration and Visibility & Analytics Overview
Zero Trust Automation & Orchestration and Visib...
Zero Trust Guidance for IoT
Zero Trust Guidance for IoT
Zero Trust Privacy Assessment and Guidance
Zero Trust Privacy Assessment and Guidance
How Your Zero Trust Environment Affects Your Compliance Assessment
How Your Zero Trust Environment Affects Your Compliance Assessment
Published: 07/10/2025
MFA Made Easy: 8 Best Practices for Seamless Authentication Journeys
MFA Made Easy: 8 Best Practices for Seamless Authentication Journeys
Published: 07/02/2025
Navigating the Cybersecurity Imperative in India’s Manufacturing Ascent
Navigating the Cybersecurity Imperative in India’s Manufacturing As...
Published: 06/27/2025
CIEM and Secure Cloud Access Best Practices
CIEM and Secure Cloud Access Best Practices
Published: 06/24/2025
Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training