Form cover
Page 1 of 4

MDR/IVDR Cybersecurity Compliance Self-Assessment πŸ›‘οΈ

Cybersecurity is not optional under EU MDR and IVDR

If you’re building or maintaining medical or diagnostic devices β€” including Software as a Medical Device (SaMD) β€” your product must be secure by design and remain secure throughout its lifecycle.
This self-assessment checklist is your practical implementation guide, built from MDCG 2019-16 Rev. 1, and tailored for health-tech teams preparing for MDR/IVDR certification.
It covers the regulator’s expectations around:
- πŸ” Built-in security from the earliest design stages
- πŸ“‹ Integrated risk management across the lifecycle
- βœ… Verification and validation of security controls
- πŸ“ Comprehensive technical documentation
- πŸ‘₯ User guidance on roles and responsibilities
- πŸ”„ Ongoing maintenance (monitoring, patching, vulnerability handling)-
⚠️ Note: Some sections are iterative (e.g., Secure-by-Design + Risk Management), while others (e.g., Technical File, IFU, Maintenance) are living artefacts that must be continuously updated.

How to use this checklist
https://storage.tally.so/6db6c4e6-ffa7-435b-bb1d-5fee5437279e/Screenshot-2025-06-02-at-13.20.11.png
https://storage.tally.so/8a5881a3-41ca-42e6-ac6b-da65ad094f19/MDR-cybersecurity-checklist-steps.png

βœ… SECTION 1: Secure-by-Design

Overview: Build security into the architecture from day one; the device must stay secure on hostile networks. Design controls should eliminate or reduce risk by design and never compromise essential performance.

1.1 Do you maintain a dedicated cybersecurity requirements specification that defines security objectives (CIA), auth levels, cryptographic strength, logging needs, and update mechanisms?

1.1 Do you maintain a dedicated cybersecurity requirements specification that defines security objectives (CIA), auth levels, cryptographic strength, logging needs, and update mechanisms?
A
B
C

1.2 Have you drafted system architecture and data-flow diagrams that mark trust boundaries, encryption points, identity providers, and the secure-boot chain?

1.2 Have you drafted system architecture and data-flow diagrams that mark trust boundaries, encryption points, identity providers, and the secure-boot chain?
A
B
C

1.3 Do you implement secure-by-default configurations, runtime least privilege, separation of safety-critical modules, and secure key storage?

1.3 Do you implement secure-by-default configurations, runtime least privilege, separation of safety-critical modules, and secure key storage?
A
B
C

1.4 Does your system include a cryptographically signed update mechanism with rollback capability and atomic integrity checks?

1.4 Does your system include a cryptographically signed update mechanism with rollback capability and atomic integrity checks?
A
B
C

1.5 Have you validated safety-cybersecurity interplay β€” such as what happens if a security control interferes with clinical access or emergency functionality?

1.5 Have you validated safety-cybersecurity interplay β€” such as what happens if a security control interferes with clinical access or emergency functionality?
A
B
C

πŸ” SECTION 2: Security Risk Management

Overview: Extend the ISO 14971 risk file to cover cyber threats. Identify, score, mitigate and justify cyber risks within the overall benefit-risk analysis.

2.1 Have you extended your Risk Management Plan to include cybersecurity threats, roles, and acceptance criteria (e.g., β€œno unmitigated path to catastrophic harm”)?

2.1 Have you extended your Risk Management Plan to include cybersecurity threats, roles, and acceptance criteria (e.g., β€œno unmitigated path to catastrophic harm”)?
A
B
C

2.2 Do you perform structured threat modeling that includes assets, attacker profiles, attack paths, and misuse scenarios?

2.2 Do you perform structured threat modeling that includes assets, attacker profiles, attack paths, and misuse scenarios?
A
B
C

2.3 Are risks scored using both CVSS and a clinical impact scale to reflect technical and patient safety severity?

2.3 Are risks scored using both CVSS and a clinical impact scale to reflect technical and patient safety severity?
A
B
C

2.4 Do you use layered controls (design > protective > user info) and feed gaps back into earlier design phases?

2.4 Do you use layered controls (design > protective > user info) and feed gaps back into earlier design phases?
A
B
C

2.5 Are residual risks re-scored and justified in the benefit-risk analysis, with disclosures tagged for IFU (Instructions for Use)?

2.5 Are residual risks re-scored and justified in the benefit-risk analysis, with disclosures tagged for IFU (Instructions for Use)?
A
B
C

2.6 Do you maintain bidirectional traceability between the risk file and your design/testing changes?

2.6 Do you maintain bidirectional traceability between the risk file and your design/testing changes?
A
B
C

🌐 SECTION 3: Minimum IT Requirements & Operating Environment

Overview: Specify only the essential external IT/network conditions. Everything else should be embedded in the product itself.

3.1 Have you listed all intended operating environments (e.g., hospital LAN, clinic PC, patient home Wi-Fi, cloud infrastructure)?

Have you evaluated each identified threat for potential impact, likelihood of exploitation, and preconditions β€” and documented the rationale behind risk scoring?
3.1 Have you listed all intended operating environments (e.g., hospital LAN, clinic PC, patient home Wi-Fi, cloud infrastructure)?
A
B
C

3.2 Have you defined minimum IT specifications such as OS version, patch level, processor/RAM, browser requirements, and time sync dependencies?

3.2 Have you defined minimum IT specifications such as OS version, patch level, processor/RAM, browser requirements, and time sync dependencies?
A
B
C

3.3 Have you mapped required external IT security controls (e.g., antivirus, firewall, VPN) to the specific residual risks identified in your cybersecurity risk file?

3.3 Have you mapped required external IT security controls (e.g., antivirus, firewall, VPN) to the specific residual risks identified in your cybersecurity risk file?
A
B
C

3.4 Have you drafted a "Minimum IT Requirements" section for your IFU or Admin Deployment Guide?

3.4 Have you drafted a "Minimum IT Requirements" section for your IFU or Admin Deployment Guide?
A
B
C

3.5 Do you validate the product in its lowest-spec environment and re-test after major OS/platform changes?

3.5 Do you validate the product in its lowest-spec environment and re-test after major OS/platform changes?
A
B
C

πŸ§ͺ SECTION 4: Security Verification & Validation

Overview: Demonstrate that security controls are effective β€” and uncover unknown vulnerabilities β€” through continuous, structured testing.

4.1 Do you run static code analysis (SAST) and software composition analysis (SCA) during development (CI), with full scans before release?

4.1 Do you run static code analysis (SAST) and software composition analysis (SCA) during development (CI), with full scans before release?
A
B
C

4.2 Have you created and executed a formal Security Test Plan that includes feature tests (auth, crypto, logging, update), fuzzing, dynamic scanning, and penetration testing?

4.2 Have you created and executed a formal Security Test Plan that includes feature tests (auth, crypto, logging, update), fuzzing, dynamic scanning, and penetration testing?
A
B
C

4.3 Have you performed at least one penetration test of the integrated system using qualified testers?

4.3 Have you performed at least one penetration test of the integrated system using qualified testers?
A
B
C

4.4 Do you handle findings with either fixes or documented risk acceptance, and update your cybersecurity risk file accordingly?

4.4 Do you handle findings with either fixes or documented risk acceptance, and update your cybersecurity risk file accordingly?
A
B
C

4.5 Do you re-run regression tests after fixes and archive the results in your Technical Documentation?

4.5 Do you re-run regression tests after fixes and archive the results in your Technical Documentation?
A
B
C

πŸ“ SECTION 5: Technical Documentation (Living)

Overview: Assemble all cybersecurity artifacts in your Annex II Technical File for Notified Body review and audits.

5.1 Have you created a structured Technical File index that includes: device description, cyber design, risk management, verification & validation, labeling, and PMS/PSIRT plans?

5.1 Have you created a structured Technical File index that includes: device description, cyber design, risk management, verification & validation, labeling, and PMS/PSIRT plans?
A
B
C

5.2 Have you inserted your cybersecurity risk file, SBOM, system architecture, security test evidence, and an MDR/IVDR compliance matrix into the Technical File?

5.2 Have you inserted your cybersecurity risk file, SBOM, system architecture, security test evidence, and an MDR/IVDR compliance matrix into the Technical File?
A
B
C

5.3 Do you maintain a revision log for the cybersecurity documentation, updating it after patches, security incidents, or design changes?

5.3 Do you maintain a revision log for the cybersecurity documentation, updating it after patches, security incidents, or design changes?
A
B
C

πŸ“„ SECTION 6: Instructions for Use (IFU) & User Info (Living)

Overview: Equip users with cybersecurity responsibilities, IT requirements, and clear residual-risk warnings.

6.1 Does your IFU include clear cybersecurity-related warnings and precautions (e.g. residual risks, known limitations, or misuse scenarios)?

6.1 Does your IFU include clear cybersecurity-related warnings and precautions (e.g. residual risks, known limitations, or misuse scenarios)?
A
B
C

6.2 Have you embedded the Minimum IT Requirements from Section 3 (e.g. OS, specs, browser, network controls) into the IFU or Admin Manual?

6.2 Have you embedded the Minimum IT Requirements from Section 3 (e.g. OS, specs, browser, network controls) into the IFU or Admin Manual?
A
B
C

6.3 Does your documentation provide practical operational guidance (e.g., change default credentials, user management, update procedures, backup/restore, incident response contact)?

6.3 Does your documentation provide practical operational guidance (e.g., change default credentials, user management, update procedures, backup/restore, incident response contact)?
A
B
C

6.4 Do you reference the Admin Manual for deeper technical guidance (e.g., SBOM, open ports, logging behavior, hardening tips)?

6.4 Do you reference the Admin Manual for deeper technical guidance (e.g., SBOM, open ports, logging behavior, hardening tips)?
A
B
C

πŸ”„ SECTION 7: Post-Market Maintenance (Living)

Overview: Operate one integrated system that monitors, triages, patches, and fulfils EU vigilance duties across the entire product lifecycle. (PMS β€’ Vigilance β€’ PSIRT β€’ Updates)

πŸ” 7.1.1 Prepare & Monitor

7.1.1 Does your PMS Plan include cyber elements (CERT feeds, SBOM monitoring, telemetry, cyber complaint fields)?

7.1.1 Does your PMS Plan include cyber elements (CERT feeds, SBOM monitoring, telemetry, cyber complaint fields)?
A
B
C

7.1.2 Have you published the product’s support lifetime and patch SLA (e.g. critical issues patched within 60 days)?

7.1.2 Have you published the product’s support lifetime and patch SLA (e.g. critical issues patched within 60 days)?
A
B
C

7.1.3 Is there a public vulnerability-disclosure channel (PSIRT email or web form)?

7.1.3 Is there a public vulnerability-disclosure channel (PSIRT email or web form)?
A
B
C

πŸ›‘ 7.2 Intake & Triage

7.2.1 Do you log every vulnerability or incident and score them using CVSS Γ— clinical impact?

7.2.1 Do you log every vulnerability or incident and score them using CVSS Γ— clinical impact?
A
B
C

7.2.2 Do you submit vigilance reports within 15 days and issue FSCA where applicable?

7.2.2 Do you submit vigilance reports within 15 days and issue FSCA where applicable?
A
B
C

πŸ› οΈ 7.3 Remediate & Release

7.3.1 Are patches or mitigations validated and cryptographically signed before delivery?

7.3.1 Are patches or mitigations validated and cryptographically signed before delivery?
A
B
C

7.3.2 Do you issue advisories or FSCA with risk explanations and update instructions?

7.3.2 Do you issue advisories or FSCA with risk explanations and update instructions?
A
B
C

7.3.3 Do you monitor how many customers adopt the update or patch?

7.3.3 Do you monitor how many customers adopt the update or patch?
A
B
C

πŸ” 7.4 Feedback & Documentation

7.4.1 Do you update the Risk Table, Technical File, IFU, and SBOM after patches or incidents?

7.4.1 Do you update the Risk Table, Technical File, IFU, and SBOM after patches or incidents?
A
B
C

7.4.2 Are cyber incident trends summarized in PSUR/PMS reports and used in future design?

7.4.2 Are cyber incident trends summarized in PSUR/PMS reports and used in future design?
A
B
C