ChaptersCircleEventsBlog
Share how your organization adapts IAM practices to AI. Take the AI Identify Risk & Readiness Survey today!
You need to be logged in to access this resource.
×

Download Publication

Medical Devices in A Zero Trust Architecture
Medical Devices in A Zero Trust Architecture

Medical Devices in A Zero Trust Architecture

Release Date: 05/08/2023

Today’s medical devices often connect to the cloud, which increases the risk by expanding the attack surface. This presents the Healthcare Delivery Organizations (HDOs) with threats and vulnerabilities, technology issues, software risks, and human factors. As a result, security architects are forced to re-examine the concept of identity. Essentially, every connected medical device has an identity and must be under consideration within the Zero Trust Framework. 
Download this Resource

Bookmark
Share
View translations
Related resources
Healthcare Confidential Computing and the Trusted Execution Environment
Healthcare Confidential Computing and the Trust...
Zero Trust Automation & Orchestration and Visibility & Analytics Overview
Zero Trust Automation & Orchestration and Visib...
Zero Trust Guidance for IoT
Zero Trust Guidance for IoT
Reflections from Gartner IAM London: Visibility Leads to Observability
Reflections from Gartner IAM London: Visibility Leads to Observability
Published: 07/22/2025
What is SOC 1? — A Complete Guide to SOC 1 Reports
What is SOC 1? — A Complete Guide to SOC 1 Reports
Published: 07/18/2025
7 Email Security Metrics That Matter: How to Measure and Improve Your Protection
7 Email Security Metrics That Matter: How to Measure and Improve Yo...
Published: 07/15/2025
Zero Trust Lessons from a Real-World 5G Cloud Core Security Assessment
Zero Trust Lessons from a Real-World 5G Cloud Core Security Assessment
Published: 07/14/2025

Acknowledgements

Dr. Jim Angle
Dr. Jim Angle

Dr. Jim Angle

Jim has dedicated hundreds of hours to CSA and was instrumental in reviving CSA’s Health Information Management working group. In doing so, he drafted the group’s first charter and went on to become its co-chair. In this role, he authored three papers — Managing the Risk for Medical Devices Connected to the Cloud, Telehealth in the ...

Read more

Michael Roza
Michael Roza
Risk, Audit, Control and Compliance Professional at EVC

Michael Roza

Risk, Audit, Control and Compliance Professional at EVC

Michael Roza is a seasoned risk, audit, control and compliance, and cybersecurity professional with over 20 years of experience across multinational enterprises and startups. As a Cloud Security Alliance (CSA) Research member for over 10 years, he has led and contributed to more than 140 CSA projects spanning Zero Trust, AI, IoT, Top Threats, DecSecOps, Cloud Key Management, Cloud Control Matrix, and many others.

He has co-chaired...

Read more

Wayne Anderson Headshot Missing
Wayne Anderson

Wayne Anderson

Are you a research volunteer? Request to have your profile displayed on the website here.

Interested in helping develop research with CSA?

Related Certificates & Training