Cloud 101CircleEventsBlog
Join us for Cybersecurity Awareness Month! Strengthen your cyber resilience with essential security tips and resources for everyone.

Download Publication

Medical Devices in A Zero Trust Architecture - Chinese Translation
Medical Devices in A Zero Trust Architecture - Chinese Translation

Medical Devices in A Zero Trust Architecture - Chinese Translation

Release Date: 11/13/2023

This localized version of this publication was produced from the original source material through the efforts of chapters and volunteers but the translated content falls outside of the CSA Research Lifecycle. For any questions and feedback, contact [email protected].


Today’s medical devices often connect to the cloud, which increases the risk by expanding the attack surface. This presents the Healthcare Delivery Organizations (HDOs) with threats and vulnerabilities, technology issues, software risks, and human factors. As a result, security architects are forced to re-examine the concept of identity. Essentially, every connected medical device has an identity and must be under consideration within the Zero Trust Framework. 

Download this Resource

Prefer to access this resource without an account? Download it now.

Bookmark
Share
View translations
Related resources
AI in Medical Research: Applications & Considerations
AI in Medical Research: Applications & Consider...
Zero Trust Guiding Principles v1.1
Zero Trust Guiding Principles v1.1
Information Technology Governance, Risk, and Compliance in Healthcare v2
Information Technology Governance, Risk, and Co...
Secure by Design: Implementing Zero Trust Principles in Cloud-Native Architectures
Secure by Design: Implementing Zero Trust Principles in Cloud-Nativ...
Published: 10/03/2024
What ‘Passwordless’ Really Means for Privileged Access Management
What ‘Passwordless’ Really Means for Privileged Access Management
Published: 10/03/2024
Is Your Production Data Secure? That’s a Hard NO.
Is Your Production Data Secure? That’s a Hard NO.
Published: 09/23/2024
Building a Resilient Manufacturing Environment Through Zero Trust OT Cybersecurity Controls
Building a Resilient Manufacturing Environment Through Zero Trust O...
Published: 09/23/2024
Defending Against the Cloud Adversary: Detection and Response in the Cloud
Defending Against the Cloud Adversary: Detection and Response in th...
October 24 | Online
Achieve Zero Trust Identity with the new 7 A’s of IAM
Achieve Zero Trust Identity with the new 7 A’s of IAM
November 7 | Online
Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training