Open-source companion artifacts for the paper “A Practical Cybersecurity Framework for Legacy Medical Devices”. Five integrated, practitioner-oriented frameworks for healthcare delivery organisations (HDOs) and medical device manufacturers operating under the constraints of legacy clinical environments.
Status. Research artifact suite. Suitable for evaluation, adaptation, and extension. Not a regulated medical device. Do not deploy in clinical production without independent validation appropriate to your environment.
A substantial fraction of clinical medical devices run end-of-life operating systems or firmware that cannot support standard cybersecurity controls. Existing frameworks (NIST, IEC 62443, FDA guidance, HSCC HIC-MaLTS, AAMI TIR57/TIR97) provide necessary scaffolding but consistently underserve two threat profiles: (1) the irreversible-consequence risk profile of life-sustaining devices, and (2) the physical and insider attacker with legitimate device proximity. This repository operationalises a five-framework response, grounded in ISO 14971:2019.
| # | Artifact | Status | Description |
|---|---|---|---|
| 1 | MDRS Calculator | Production | Reference implementation of the Medical Device Risk Score with irreversibility-driven tier floor and CCD promoter. Web-based; no build tooling. |
| 2 | STRIDE-HC Templates | Production | Threat-modelling templates for clinical legacy environments. Markdown for humans; YAML/JSON for tooling. Two worked examples covering both device archetypes. |
| 3 | CJR Templates | Production | Control Justification Record templates aligned to HIPAA Security Rule, ISO 14971 cl.7–8, AAMI TIR57, and FDA 524B postmarket cybersecurity expectations. |
| 4 | Test Harness | Functional prototype | Dockerised multi-container test environment for empirical evaluation of compensating-control effectiveness. Includes infusion pump emulator and STRIDE-mapped attack scenarios. |
| 5 | MFA Shim (Pattern C) | Functional prototype | Software reference design for the inline service-port multi-factor authentication shim addressing the physical-attacker threat surface. Linux daemon with TOTP gating, session recording, and tamper detection. |
Every artifact has an interactive page in your browser — no install required:
| Artifact | Live page |
|---|---|
| MDRS Calculator | https://analyst133.github.io/legacy-medical-device-security-frameworks/mdrs-calculator/ |
| STRIDE-HC Builder | https://analyst133.github.io/legacy-medical-device-security-frameworks/stride-hc-templates/ |
| CJR Builder | https://analyst133.github.io/legacy-medical-device-security-frameworks/cjr-templates/ |
| Test Harness Results Explorer | https://analyst133.github.io/legacy-medical-device-security-frameworks/test-harness/ |
| MFA Shim Demo (live TOTP gate) | https://analyst133.github.io/legacy-medical-device-security-frameworks/mfa-shim/ |
SETUP.md — step-by-step install for Linux, macOS, and Windows.WALKTHROUGH.md — cross-artifact tour using a worked infusion-pump example.For the full suite locally:
git clone https://github.com/analyst133/legacy-medical-device-security-frameworks.git
cd legacy-medical-device-security-frameworks
# MDRS calculator (no install required)
open mdrs-calculator/index.html # macOS
xdg-open mdrs-calculator/index.html # Linux
start mdrs-calculator/index.html # Windows
# Run the test harness
cd test-harness && docker compose up
# Run the MFA shim prototype
cd ../mfa-shim/prototype && pip install -r requirements.txt && python -m pytest
This repository is archived on Zenodo. Use the concept DOI to cite the artifact suite — it always resolves to the latest version:
@software{mohiuddin2026legacy_artifacts,
title = {Legacy Medical Device Security Frameworks: Companion Artifacts},
author = {Mohiuddin, Khaja T. and Bernia, Brad},
year = {2026},
doi = {10.5281/zenodo.20113684},
url = {https://doi.org/10.5281/zenodo.20113684},
version = {v1.0.0}
}
@article{mohiuddin2026legacy,
title = {A Practical Cybersecurity Framework for Legacy Medical Devices},
author = {Mohiuddin, Khaja T. and Bernia, Brad},
year = {2026},
note = {Submitted}
}
A CITATION.cff file is provided in the repository root for GitHub’s “Cite this repository” feature.
The frameworks are explicitly aligned to:
The frameworks are designed for both audiences:
The Manufacturer–HDO interface (paper §8) treats the artifacts as shared instruments enabling structured dialogue about residual risk and required compensating controls.
Contributions welcome. See CONTRIBUTING.md for guidance on:
This project follows the Contributor Covenant Code of Conduct.
Apache License 2.0. See LICENSE.
The patent grant in Apache-2.0 applies in particular to the Pattern C MFA shim reference design, which is published as a research artifact and is intended to remain freely usable in defensive applications.
This repository is research output. Nothing here constitutes regulatory advice. The frameworks are aligned to standards but their application in any specific clinical environment is the responsibility of the deploying organisation, in consultation with their regulatory affairs, clinical engineering, and information security functions. Specific compensating-control selections must be validated against the deploying organisation’s risk acceptance criteria and documented per applicable regulatory expectations.
The MFA shim reference design is not a cleared medical device. Inline insertion of a third-party device into a medical device’s service port may, under FDA 21 CFR 820 and the EU MDR, constitute a modification requiring clearance. See mfa-shim/FDA-CONSIDERATIONS.md.