legacy-medical-device-security-frameworks

Control Justification Record (CJR)

CJR-ID: CJR-EMPump-003-ServicePort Status: Approved Version: 1.0

1. Device identification

Field Value
Device name and model ExampleMed Volumetric Infusion Pump v3.2
Manufacturer ExampleMed Inc.
Device class (FDA) Class II
Device archetype Archetype 2 (embedded RTOS legacy)
MDS² reference ExampleMed-IP3.2-MDS2-2024
Asset inventory IDs Asset register: pump-vlan-volumetric-ip32
Deployment count 240 units
Linked STRIDE-HC threat model stride-hc-templates/examples/infusion-pump.md
Current MDRS score and tier 8.175 → CRITICAL

2. Standard control and constraint

2.1 Standard control that cannot be applied

Per-technician MFA-protected authentication for service-port (RS-232) access, with audit logging of session activity.

2.2 Constraint preventing standard control

Service-mode password disclosed in technical manual or leaked. The service-port credential for the v3.2 pump is documented in vendor manuals that have been disclosed publicly through historical product-recall correspondence and via third-party repair documentation.

2.3 Constraint detail

The RS-232 service-port credential (4-digit PIN) is documented in:

The vendor cannot rotate the credential in deployed firmware (rotation requires firmware update under FDA clearance). Vendor advisory ExampleMed-2024-04 acknowledges the disclosure and recommends “physical access control commensurate with the criticality of the device”.

The constraint is permanent in the deployed firmware and represents the highest-risk physical-access exposure on this pump fleet.

3. Threat addressed

3.1 STRIDE-HC mapping

3.2 Threat scenario summary

Physical/insider-attacker scenarios:

This is the principal residual risk scenario after CJR-EMPump-001-MFA (Pattern A upstream PAM) addresses the network-side access path. Pattern A does not protect the physical service port; this CJR documents the Pattern C compensating control that does.

3.3 Initial risk assessment (pre-control)

Dimension Score Rationale
Likelihood High Credential publicly disclosed; required attacker capability is low (physical proximity + service tool).
Severity High Service-mode access enables therapy parameter modification, configuration tampering, and reset operations.
Detectability Difficult Pump generates no service-port event log; detection depends on human observation or upstream correlation.

4. Compensating control(s) selected

4.1 Control description

Pattern C — Inline hardware MFA shim at the RS-232 service port. A small vendor-neutral hardware device sits inline between technician tooling and the pump’s RS-232 service port. The shim:

The Pattern C device is currently a research artifact with a software-first reference design published in this repository (mfa-shim/). The deployment described in this CJR is at a single ICU pilot site (12 pumps) per the FDA-aware piloting plan documented in mfa-shim/FDA-CONSIDERATIONS.md.

This is not a cleared medical device; it is a security accessory deployed under the institutional research and quality improvement programme. Production-grade hardware procurement is on the 2027 plan.

In addition to Pattern C, this CJR documents the supporting policy controls:

4.2 Reference to Compensating Controls Playbook

Paper §3.3 Table 3, “Service-mode password disclosed” constraint. Pattern C described in §3.4.

4.3 How the control addresses the threat

4.4 Why this control is appropriate

4.5 Implementation references

5. Residual risk evaluation (ISO 14971 cl.8)

5.1 Risk after control deployment

Dimension Score Rationale
Likelihood (residual) Low TOTP factor required in addition to disclosed PIN; population of actors with both proximity and TOTP is small and audited.
Severity (residual) High Unchanged — the harm potential if compromise occurs remains the same.
Detectability (residual) Easy Shim logs every session; video surveillance provides corroboration; audit reconciliation surfaces discrepancies.

5.2 Residual risk acceptability

Acceptable for the pilot deployment under the legacy device research programme criteria (LMD-RISK-2026-001 and the research-artifact addendum LMD-RISK-2026-001A). The pilot is time-bounded (12 months) with quarterly review.

For broader deployment, the control’s status as a research artifact rather than a cleared medical device is the governing constraint. See mfa-shim/FDA-CONSIDERATIONS.md for the regulatory analysis of broader deployment paths.

5.3 Risk acceptance authority

CISO (K. Williams), Director of Clinical Engineering (M. Robinson), and Chief Medical Information Officer (Dr T. Aiyer) jointly, dated 2026-04-10. Pilot scope is signed off by the institutional research and quality improvement committee.

6. Effectiveness rating

Medium for the pilot deployment. Pattern C addresses the primary disclosed-credential exposure but is itself a research-grade artifact. Validation:

A re-rating to High is contingent on (a) production hardware procurement and (b) FDA regulatory analysis confirming that inline insertion does not constitute a device modification requiring re-clearance.

7. Normative references

8. Approval and review

Field Value
Author S. Patel, Senior Clinical Engineer
Reviewer (Clinical Engineering) M. Robinson
Reviewer (InfoSec) J. Chen
Approver (CISO) K. Williams
Approver (Director of Clinical Engineering) M. Robinson
Approver (CMIO) Dr T. Aiyer
Approval date 2026-04-10
Effective date 2026-05-15 (after pilot site preparation)
Next scheduled review 2026-08-15 (90-day pilot review), then quarterly
Trigger conditions for early review Shim component failure; tamper-evident seal violation; vendor advisory; FDA clarification on inline-device classification

9. Linked records

Record type Reference
STRIDE-HC threat model stride-hc-templates/examples/infusion-pump.md
MDS² disclosure ExampleMed-IP3.2-MDS2-2024
Pattern C reference design mfa-shim/
FDA regulatory analysis mfa-shim/FDA-CONSIDERATIONS.md
Pilot operations review (90-day) scheduled 2026-08-15
Related CJRs CJR-EMPump-001-MFA (Pattern A network-side), CJR-EMPump-002-Encryption
Test harness output test-harness/results/empump-v32-2026-q1.csv

10. Change log

Version Date Author Change summary
1.0 2026-04-10 S. Patel Initial CJR for service-port PIN exposure on ExampleMed Volumetric Infusion Pump v3.2; introduces Pattern C compensating control under research-artifact pilot