legacy-medical-device-security-frameworks

Archetype 1 Scenario Library — General-purpose-OS Legacy

Reusable threat scenarios for medical devices built on legacy general-purpose operating systems (Windows XP, Windows 7, Windows Server 2008/R2, older Linux distributions, macOS pre-10.13). Examples include PACS workstations, imaging modality consoles, laboratory analysers, pharmacy automation, and certain ultrasound and patient-monitoring central stations.

The defining characteristic of Archetype 1 is the presence of a general-purpose OS shell that admits host-based controls (application allowlisting, EDR, host-based firewall, file integrity monitoring) but suffers from the absence of vendor-supported security patches.

How to use this library

When authoring a STRIDE-HC threat model for an Archetype 1 device, draw scenarios from the relevant category below and adapt them to your specific device. Add device-specific scenarios as needed; this library is illustrative, not exhaustive.

S — Spoofing

Network attacker

Physical / insider attacker

T — Tampering

Network attacker

Physical / insider attacker

R — Repudiation

Network attacker

Physical / insider attacker

I — Information Disclosure

Network attacker

Physical / insider attacker

D — Denial of Service

Network attacker

Physical / insider attacker

E — Elevation of Privilege

Network attacker

Physical / insider attacker

Cross-cutting compensating-control patterns

For Archetype 1, the following compensating controls have broad applicability across categories:

When Archetype 1 protections are insufficient

There are scenarios where Archetype 1 host-based protections cannot fully address the threat, and the threat must be mitigated at the network or physical layer: