legacy-medical-device-security-frameworks

Control Justification Record (CJR)

CJR-ID: CJR-PACS-002-DICOMTLS Status: Approved Version: 1.0

1. Device identification

Field Value
Device name and model Vendor X PACS Reading Station v8.4
Manufacturer Vendor X
Device class (FDA) Class II (image display application)
Device archetype Archetype 1 (general-purpose-OS legacy — Windows 7 Pro)
MDS² reference VendorX-PACS-RS-v8.4-MDS2-2023
Asset inventory IDs Asset register: pacs-reading-fleet-v84
Deployment count 38 reading stations
Linked STRIDE-HC threat model stride-hc-templates/examples/pacs-workstation.md
Current MDRS score and tier 4.750 → MEDIUM

2. Standard control and constraint

2.1 Standard control that cannot be applied

TLS encryption for all DICOM communication between modalities and the PACS reading station, and between the reading station and PACS server.

2.2 Constraint preventing standard control

No encryption (data in transit) — partial constraint. The reading station supports DICOM TLS in principle but the constraint applies to legacy modalities (CT, MR, X-ray) deployed in the facility that do not support TLS, and to legacy reporting workflows that depend on cleartext DICOM port 104.

2.3 Constraint detail

Three of seven imaging modality classes deployed in the facility do not support DICOM TLS:

The reading station itself supports TLS, but enforcing TLS-only would prevent image reception from these modalities, halting clinical operations. Vendor engagement is in progress for each constraint, but resolution timelines extend beyond the 90-day MEDIUM-tier remediation window.

3. Threat addressed

3.1 STRIDE-HC mapping

3.2 Threat scenario summary

Network-attacker scenarios:

3.3 Initial risk assessment (pre-control)

Dimension Score Rationale
Likelihood Medium Imaging network is segmented from corporate, but the facility has had vendor-laptop incidents documented in incident review history.
Severity High PHI breach has regulatory consequences; image manipulation has direct clinical-decision implications.
Detectability Difficult Cleartext interception leaves no application-layer trace.

4. Compensating control(s) selected

4.1 Control description

A combination of network-layer and protocol-layer controls:

  1. Dedicated imaging VLAN with restrictive ACLs. All modalities and the PACS reading station are placed in a Zone 2 (Diagnostic Imaging) VLAN per the five-zone segmentation model. Inbound and outbound ACLs allow only DICOM source–destination pairs; lateral traffic is blocked.
  2. DICOM-aware proxy gateway. All DICOM transfers between modalities and the reading station traverse a DICOM-aware proxy that re-encrypts to TLS on the reading-station-facing leg, providing TLS protection on the busiest segment.
  3. Network DLP at zone edge. A DLP appliance at the Zone 2 to Zone 3 boundary inspects DICOM PHI fields and alerts on anomalous bulk transfers.
  4. TLS deprecation roadmap. Each non-TLS modality has a documented vendor engagement record, target replacement or upgrade date, and quarterly status review.

4.2 Reference to Compensating Controls Playbook

Paper §3.2 Table 2, “No encryption (data in transit)” constraint.

4.3 How the control addresses the threat

4.4 Why this control is appropriate

4.5 Implementation references

5. Residual risk evaluation (ISO 14971 cl.8)

5.1 Risk after control deployment

Dimension Score Rationale
Likelihood (residual) Low Cleartext segment is short and well-controlled; network DLP detects anomaly.
Severity (residual) High Unchanged.
Detectability (residual) Moderate DLP detects unusual patterns; targeted single-image interception remains difficult to detect.

5.2 Residual risk acceptability

Acceptable with two conditions: (1) the deprecation roadmap remains active and is tracked at quarterly InfoSec / Radiology IT joint review; (2) any new modality deployment must support DICOM TLS at procurement. Conditions documented in the procurement standard PROC-IMG-2026-001.

5.3 Risk acceptance authority

CISO (K. Williams) with Radiology Director (Dr R. Suzuki) concurrence, dated 2026-03-15.

6. Effectiveness rating

Medium. Cleartext PHI persists on the modality-to-proxy segment. Penetration test (PT-2026-Q1-009) confirmed that interception in the dedicated imaging VLAN requires existing host compromise; no bypass of the VLAN ACL identified. DLP false-positive rate is acceptable (3.2% over Q1 2026); detection rate for synthetic bulk-export tests was 100%.

7. Normative references

8. Approval and review

Field Value
Author A. Nakamura, Senior Network Engineer (Imaging)
Reviewer (Clinical Engineering) M. Robinson
Reviewer (InfoSec) J. Chen
Approver (CISO) K. Williams
Approver (Radiology Director) Dr R. Suzuki
Approval date 2026-03-15
Effective date 2026-04-01
Next scheduled review 2026-09-15 (semi-annual due to active deprecation roadmap)
Trigger conditions for early review Modality vendor security advisory; modality replacement; DLP false-positive rate exceeds 5%; new DICOM TLS CVE

9. Linked records

Record type Reference
STRIDE-HC threat model stride-hc-templates/examples/pacs-workstation.md
MDS² disclosure VendorX-PACS-RS-v8.4-MDS2-2023
Penetration test report PT-2026-Q1-009
Procurement standard PROC-IMG-2026-001
Related CJRs CJR-PACS-001-Win7Patching, CJR-PACS-003-USBControl

10. Change log

Version Date Author Change summary
1.0 2026-03-15 A. Nakamura Initial CJR for cleartext DICOM constraint on PACS reading fleet