Worked example for Archetype 1 (general-purpose-OS legacy) — Windows 7-based PACS reading workstation.
| Field | Value |
|---|---|
| Device name and model | Vendor X PACS Reading Station v8.4 |
| Manufacturer | Vendor X |
| Device class (FDA) | Class II (image display application) |
| Archetype | Archetype 1 (general-purpose-OS legacy) |
| Operating system | Windows 7 Pro x64 (EOL) |
| Networking | Gigabit Ethernet, DICOM (TCP/104 cleartext, TCP/2762 TLS), HL7 v2 to RIS |
| Authentication | Local Windows account with shared technologist credentials |
| Patching | Vendor delivers cumulative patches quarterly; OS no longer receives Microsoft updates |
| Audit logging | Windows Security Event Log; vendor application log |
| Physical interfaces | USB-A (multiple), DVD-RW, optional badge reader |
| Deployment | 38 units across radiology reading rooms and ED imaging review |
| Clinical use | Diagnostic image review and reporting |
This example deliberately contrasts with the infusion pump example. Note the differences:
These differences drive different compensating-control selections, captured below.
Network-attacker scenarios:
Physical / insider-attacker scenarios:
Detection methods: UEBA on DICOM source AE-Title; badge-to-workstation correlation.
Compensating controls: PAM with individual MFA upstream (Pattern A), session recording, USB device control whitelisting only HID-class on approved list.
CCD coverage: Full
Network-attacker scenarios:
Physical / insider-attacker scenarios:
Detection methods: DICOM-aware proxy with checksum verification; EDR baseline of DLL loads; FIM on critical Windows directories.
Compensating controls:
CCD coverage: Full
Network-attacker scenarios: Anonymous DICOM transfers without strong AE-Title auth; image-export events not attributable to a specific user.
Physical / insider-attacker scenarios: Reading session with shared credentials; PHI capture via DVD burn or USB export by unidentified user.
Detection methods: Windows Security log forwarded to SIEM; badge tap to workstation correlation; deviation from scheduled radiologist shift flagged.
Compensating controls: Individual MFA via PAM (Pattern A); session recording for elevated actions; Sysmon and EDR telemetry to SIEM.
CCD coverage: Full
Network-attacker scenarios: DICOM in transit with cleartext PHI; memory scraping via Windows 7 vuln; unprotected SMB share export.
Physical / insider-attacker scenarios: Unattended workstation with PHI visible from corridor; bulk PHI export to USB or DVD; shoulder-surfing.
Detection methods: DLP at DICOM proxy; EDR mass-file-access detection.
Compensating controls:
CCD coverage: Full
Network-attacker scenarios: Network flooding disrupts modality-to-PACS flow; ransomware encrypting DICOM cache; targeted Windows 7 SMB exploit crash.
Physical / insider-attacker scenarios: Power or network disconnection; display destruction.
Detection methods: SIEM alert on unexpected reboot; ransomware behavioural detection (mass file rename / encryption).
Compensating controls: Application allowlisting prevents ransomware execution; SMB v1 disabled; backup workstation staged in each reading room; UPS with 30-minute runtime.
CCD coverage: Full
Network-attacker scenarios: Windows 7 local privilege escalation post-foothold; lateral movement to PACS server.
Physical / insider-attacker scenarios: Local administrator credential abuse; boot from USB to bypass disk encryption.
Detection methods: EDR token-manipulation detection; network IDS for post-exploitation tooling.
Compensating controls: Application allowlisting; LAPS for local admin rotation; BitLocker enforced; PAM brokering for any admin function.
CCD coverage: Full
All six STRIDE categories have comprehensive controls, validated through annual penetration testing.
→ CCD = 2
This feeds the MDRS calculation: with CIS=5.5, ES=4.0, DCI=6.0, NEF=3.5, CCD=2.0, the composite is 4.750 → MEDIUM tier (paper Table 7).
| Field | Value |
|---|---|
| Author | Clinical Engineering / InfoSec / Radiology IT |
| Reviewer | CISO and Radiology Director |
| Approval date | 2026-03-15 |
| Next review | 2027-03-15 |
| Linked CJRs | CJR-PACS-001-Win7Patching, CJR-PACS-002-DICOMTLS, CJR-PACS-003-USBControl |
| Current MDRS | 4.750 → MEDIUM |