legacy-medical-device-security-frameworks

Control Justification Record (CJR)

CJR-ID: CJR-EMPump-001-MFA Status: Approved Version: 1.0

1. Device identification

Field Value
Device name and model ExampleMed Volumetric Infusion Pump v3.2
Manufacturer ExampleMed Inc.
Device class (FDA) Class II
Device archetype Archetype 2 (embedded RTOS legacy — VxWorks 6.9)
MDS² reference ExampleMed-IP3.2-MDS2-2024
Asset inventory IDs Asset register reference: pump-vlan-volumetric-ip32
Deployment count 240 units across ICU and oncology
Linked STRIDE-HC threat model stride-hc-templates/examples/infusion-pump.md
Current MDRS score and tier 8.175 → CRITICAL

2. Standard control and constraint

2.1 Standard control that cannot be applied

Multi-factor authentication for administrative access to the device management interface.

2.2 Constraint preventing standard control

MFA not supported. The device exposes a management interface on TCP/8080 protected only by a hardcoded service-mode password documented in the vendor service manual. The device firmware does not support per-user accounts, MFA, or third-party authentication delegation.

2.3 Constraint detail

ExampleMed Inc. has confirmed in vendor advisory ExampleMed-2024-03 that MFA support is not on the firmware roadmap for the v3.2 model due to the FDA clearance constraints associated with introducing user authentication and per-user accounting. Modifying the firmware to support MFA would require submission as a special 510(k) and is not currently planned by the vendor. The vendor recommends compensating with upstream network controls and access management.

The constraint is technical (the device cannot be modified to support MFA) and regulatory (vendor cannot ship a modified firmware without re-clearance).

3. Threat addressed

3.1 STRIDE-HC mapping

3.2 Threat scenario summary

Network-attacker scenarios:

Physical/insider-attacker scenarios:

3.3 Initial risk assessment (pre-control)

Dimension Score Rationale
Likelihood High Public disclosure of service credential places this in the high-likelihood band; required attacker capability is low.
Severity High Successful exploitation enables therapy parameter modification on a Class II infusion device — direct patient-safety implication.
Detectability Difficult The device generates no authentication audit log; detection depends entirely on upstream network or physical observation.

4. Compensating control(s) selected

4.1 Control description

Pattern A — Upstream PAM (privileged access management) gateway. A privileged-access-management appliance brokers all network connections to the pump management interface. Users authenticate to the PAM with individual MFA. PAM retrieves the hardcoded service credential from a vault and connects to the pump on the user’s behalf. All sessions are recorded with full keystroke and screen capture.

4.2 Reference to Compensating Controls Playbook

Paper §3.2 Table 2, “MFA not supported” constraint. Pattern A described in §3.4.

4.3 How the control addresses the threat

4.4 Why this control is appropriate

4.5 Implementation references

5. Residual risk evaluation (ISO 14971 cl.8)

5.1 Risk after control deployment

Dimension Score Rationale
Likelihood (residual) Low Credential no longer discoverable via network; physical service-port path addressed by separate CJR (CJR-EMPump-003-ServicePort).
Severity (residual) High Unchanged. The harm potential if exploitation occurs (mid-therapy parameter change) remains the same; the control reduces likelihood, not severity.
Detectability (residual) Easy PAM session logging provides full visibility into all administrative sessions, including the user identity and full session content.

5.2 Residual risk acceptability

Acceptable under the organisation’s risk acceptance criteria for legacy device compensating controls (LMD-RISK-2026-001). The criteria require: residual likelihood ≤ Low, validated detection capability, and quarterly monitoring review. All criteria met.

5.3 Risk acceptance authority

CISO (K. Williams), with CMO concurrence under standing approval for the legacy medical device programme. Reference: LMD-RISK-2026-001, dated 2026-02-15.

6. Effectiveness rating

High. Validated through:

7. Normative references

8. Approval and review

Field Value
Author S. Patel, Senior Clinical Engineer
Reviewer (Clinical Engineering) M. Robinson, Director of Clinical Engineering
Reviewer (InfoSec) J. Chen, Lead Security Architect
Approver (CISO) K. Williams
Approver (Director of Clinical Engineering) M. Robinson
Approval date 2026-04-10
Effective date 2026-05-01
Next scheduled review 2027-04-10
Trigger conditions for early review ExampleMed Inc. security advisory; new VxWorks 6.9 CVE; PAM platform end-of-support; pump VLAN architecture change; loss of MFA service availability

9. Linked records

Record type Reference
STRIDE-HC threat model stride-hc-templates/examples/infusion-pump.md
MDS² disclosure ExampleMed-IP3.2-MDS2-2024
Penetration test report PT-2026-Q1-014
Test harness output test-harness/results/empump-v32-2026-q1.csv
Related CJRs CJR-EMPump-002-Encryption, CJR-EMPump-003-ServicePort

10. Change log

Version Date Author Change summary
1.0 2026-04-10 S. Patel Initial CJR for MFA constraint on ExampleMed Volumetric Infusion Pump v3.2