legacy-medical-device-security-frameworks

STRIDE-HC Threat Model: [Device name]

Template: replace bracketed text and italicised guidance with device-specific content. Delete unused subsections.

1. Device profile

Field Value
Device name and model e.g., ExampleMed Volumetric Infusion Pump v3.2
Manufacturer e.g., ExampleMed Inc.
Device class (FDA / EU MDR) e.g., Class II
UMDNS / GMDN code e.g., 16495 / 35143
MDS² reference attach manufacturer disclosure form
Archetype Archetype 1 (general-purpose-OS legacy) or Archetype 2 (embedded RTOS legacy)
Operating system / firmware e.g., VxWorks 6.9 (EOL); proprietary firmware v3.2
Networking e.g., 100Mbit Ethernet, HL7 v2 over TCP/2575, no TLS
Authentication e.g., Hardcoded service-mode credential; no per-user login
Patching Manufacturer no longer issues patches; FDA clearance limits modification
Audit logging None on device; only at upstream nursing station
Physical interfaces RS-232 service port; USB-A (firmware update); Bluetooth (paired display)
Deployment count e.g., 240 units across the facility
Clinical use Continuous medication infusion; ICU and oncology

2. STRIDE-HC threat scenarios

For each category, list network-attacker and physical/insider-attacker scenarios. Some categories may have more scenarios than others. Mark each scenario with the archetype it applies to (A1, A2, or both).

S — Spoofing (CAW = 1.2)

Network-attacker scenarios:

Physical / insider-attacker scenarios:

Detection methods (Framework V):

Compensating controls (Framework I):


T — Tampering (CAW = 1.1)

Network-attacker scenarios:

Physical / insider-attacker scenarios:

Detection methods (Framework V):

Compensating controls (Framework I):


R — Repudiation (CAW = 0.9)

Network-attacker scenarios:

Physical / insider-attacker scenarios:

Detection methods (Framework V):

Compensating controls (Framework I):


I — Information Disclosure (CAW = 1.2)

Network-attacker scenarios:

Physical / insider-attacker scenarios:

Detection methods (Framework V):

Compensating controls (Framework I):


D — Denial of Service (CAW = 1.5)

Network-attacker scenarios:

Physical / insider-attacker scenarios:

Detection methods (Framework V):

Compensating controls (Framework I):


E — Elevation of Privilege (CAW = 1.1)

Network-attacker scenarios:

Physical / insider-attacker scenarios:

Detection methods (Framework V):

Compensating controls (Framework I):

3. Mapping to MDRS

This threat model informs the device’s MDRS Compensating Control Deficit (CCD) score. The CCD dimension counts STRIDE-HC categories with effective compensating controls:

For this device, the CCD score is [fill in] because:

4. Document control

Field Value
Author Clinical engineering / information security
Reviewer CISO and Director of Clinical Engineering
Approval Joint sign-off
Approval date YYYY-MM-DD
Next review YYYY-MM-DD (annual or after material event)
Linked CJRs List of Control Justification Records
MDRS score (current) e.g., 8.175 → CRITICAL