CJR-ID: [unique identifier, e.g., CJR-EMPump-001-MFA] Status: [Draft / Approved / Under Review / Retired] Version: 1.0
Template: replace bracketed text with device- and control-specific content. This template is suitable for direct use in HIPAA Security Rule risk analysis, ISO 14971 risk management files, AAMI TIR57 security risk records, and FDA 524B postmarket evidence packs.
| Field | Value |
|---|---|
| Device name and model | [e.g., ExampleMed Volumetric Infusion Pump v3.2] |
| Manufacturer | [e.g., ExampleMed Inc.] |
| Device class (FDA / EU MDR) | [e.g., Class II] |
| Device archetype | [Archetype 1 (general-purpose-OS legacy) / Archetype 2 (embedded RTOS legacy)] |
| MDS² reference | [Manufacturer Disclosure Statement document ID] |
| Asset inventory IDs | [list of asset tags or serial numbers, or “see linked register”] |
| Deployment count | [N units] |
| Linked STRIDE-HC threat model | [reference to threat-model document] |
| Current MDRS score and tier | [e.g., 8.175 → CRITICAL] |
[State the standard control that would normally be deployed — for example, “Multi-factor authentication for administrative access”.]
[State the specific constraint. Choose from the Playbook constraint categories or extend with device-specific constraints. Examples:]
[Describe the constraint precisely. State why the standard control cannot be applied — technical limitation, regulatory constraint, vendor policy, FDA clearance dependency, or operational impact. Cite vendor documentation, MDS² statement, or technical analysis.]
[Identify which STRIDE-HC categories this constraint exposes. Multiple categories may apply.]
[State the specific threat scenarios that the constraint exposes, drawing from the STRIDE-HC threat model and scenario library. Include both network-attacker and physical/insider-attacker scenarios where applicable.]
| Dimension | Score | Rationale |
|---|---|---|
| Likelihood | [Low / Medium / High] | [reasoning] |
| Severity | [Low / Medium / High] | [reasoning, referencing harm types per ISO 14971 cl.5] |
| Detectability | [Easy / Moderate / Difficult] | [reasoning] |
[Describe the compensating control(s) selected. Be specific: name the technology, configuration, and operational practices that constitute the control.]
[Cite the relevant entry or entries from paper Tables 2 (network exposure) or 3 (physical access).]
[Explain the mechanism by which the compensating control mitigates the identified threat scenarios. Address each scenario from §3.2 explicitly.]
[Per the Playbook design principles:]
[List the specific technical references — IPS signatures, PAM configuration, vendor part numbers, software versions, configuration files, network diagrams. This section is the operational link to actual deployment.]
| Dimension | Score | Rationale |
|---|---|---|
| Likelihood (residual) | [Low / Medium / High] | [reasoning, referencing the specific control mechanism] |
| Severity (residual) | [Low / Medium / High] | [usually unchanged unless control changes consequence space] |
| Detectability (residual) | [Easy / Moderate / Difficult] | [referencing detection capability provided by the control or by Framework V monitoring] |
[State whether residual risk is acceptable under the organisation’s risk acceptance criteria, with reasoning. If acceptable, identify the criteria reference. If not acceptable, identify additional measures required.]
[For residual risks above defined acceptance thresholds, identify the executive who has accepted the risk in writing — typically CISO, with concurrence from Chief Medical Officer for clinical-impact-relevant risks.]
[Per paper §3.5, assign a Control Effectiveness Rating:]
Validation evidence: [cite the validation method — penetration test report, harness output, design review minutes]
[Cite the standards, guidance, and regulatory provisions that justify this selection. Format as a list. Examples:]
| Field | Value |
|---|---|
| Author | [Name, role, e.g., Senior Clinical Engineer] |
| Reviewer (Clinical Engineering) | [Name, role] |
| Reviewer (InfoSec) | [Name, role] |
| Approver (CISO) | [Name] |
| Approver (Director of Clinical Engineering) | [Name] |
| Approval date | [YYYY-MM-DD] |
| Effective date | [YYYY-MM-DD] |
| Next scheduled review | [YYYY-MM-DD — annual, or earlier if triggered] |
| Trigger conditions for early review | [Vendor security advisory; new CVE for device firmware; material network architecture change; loss of compensating-control supplier; significant clinical workflow change] |
| Record type | Reference |
|---|---|
| STRIDE-HC threat model | [filename or system reference] |
| MDS² disclosure | [reference] |
| Vendor security advisories | [reference if applicable] |
| Penetration test report | [reference if applicable] |
| Test harness output | [reference if applicable] |
| Predecessor CJR (if revised) | [CJR-ID, version] |
| Related CJRs (other constraints, same device) | [list of CJR-IDs] |
| Version | Date | Author | Change summary |
|---|---|---|---|
| 1.0 | YYYY-MM-DD | [author] | Initial CJR for [constraint] on [device] |