{"id":5856,"date":"2025-06-13T13:37:17","date_gmt":"2025-06-13T11:37:17","guid":{"rendered":"https:\/\/www.bayoomed.com\/news\/cybersecurity-for-closed-loop-medical-devices-requirements-according-to-mdr-and-fda\/"},"modified":"2025-07-03T09:04:50","modified_gmt":"2025-07-03T07:04:50","slug":"cybersecurity-for-closed-loop-medical-devices-requirements-according-to-mdr-and-fda","status":"publish","type":"news","link":"https:\/\/www.bayoomed.com\/en\/news\/cybersecurity-for-closed-loop-medical-devices-requirements-according-to-mdr-and-fda\/","title":{"rendered":"Cybersecurity for closed-loop medical devices: Requirements according to MDR and FDA"},"content":{"rendered":"<p><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-1 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:calc( 70vw + );margin-left: calc(- \/ 2 );margin-right: calc(- \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-margin-bottom-large:20px;--awb-width-medium:100%;--awb-order-medium:0;--awb-width-small:100%;--awb-order-small:0;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1 fusion-text-no-margin\" style=\"--awb-margin-bottom:50px;\"><p class=\"ai-optimize-9\"><strong>Author: Sebastian Wittor <\/strong>Cybersecurity Lead at BAYOOMED<\/p>\n<\/div><div class=\"fusion-text fusion-text-2\"><p>The increasing use of closed-loop systems in medical technology brings with it a new class of challenges for cybersecurity. Unlike traditional medical devices, where medical professionals make the final treatment decisions, closed-loop systems operate largely autonomously. They continuously measure physiological parameters, interpret them and trigger therapeutic measures as required, without any human intervention. The software thus becomes the central player in the therapy context and at the same time a potential target.  <\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-2 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:calc( 70vw + );margin-left: calc(- \/ 2 );margin-right: calc(- \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-margin-bottom-large:20px;--awb-width-medium:100%;--awb-order-medium:0;--awb-width-small:100%;--awb-order-small:0;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-1 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:0px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:39;line-height:var(--awb-typography1-line-height);\"><h2>Introduction to closed-loop systems<\/h2><\/h2><\/div><div class=\"fusion-text fusion-text-3\"><p>A closed-loop medical device is essentially based on three functional components:<\/p>\n<ul>\n<li>Sensors that continuously record physiological data<\/li>\n<li>Controllers who evaluate the incoming data and make treatment decisions<\/li>\n<li>Actuators that implement the resulting measures<\/li>\n<\/ul>\n<p>This closed control chain enables dynamic, often real-time adaptation of the therapy to the patient&#8217;s status. The increase in efficiency and safety is enormous, provided that the system is reliably protected against errors, manipulation and failures. <\/p>\n<\/div><div class=\"fusion-image-element \" style=\"--awb-margin-bottom:20px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-1 hover-type-none\" style=\"border-radius:10px;\"><img decoding=\"async\" width=\"1200\" height=\"858\" alt=\"BAYOOMED - Organisatrische Ma\u00dfnamen zur Einhaltung von Cyber-Sicherheitsanforderungen an netzwerkf\u00e4hige Medizinprodukte\" title=\"BAYOOMED &#8211; Organisatrische Ma\u00dfnamen zur Einhaltung von Cyber-Sicherheitsanforderungen an netzwerkf\u00e4hige Medizinprodukte\" src=\"https:\/\/www.bayoomed.com\/wp-content\/uploads\/sites\/4\/2024\/06\/BAYOOMED-Organisatrische-Massnamen-zur-Einhaltung-von-Cyber-Sicherheitsanforderungen-an-netzwerkfaehige-Medizinprodukte.jpg\" class=\"img-responsive wp-image-3755\" srcset=\"https:\/\/www.bayoomed.com\/wp-content\/uploads\/sites\/4\/2024\/06\/BAYOOMED-Organisatrische-Massnamen-zur-Einhaltung-von-Cyber-Sicherheitsanforderungen-an-netzwerkfaehige-Medizinprodukte-200x143.jpg 200w, https:\/\/www.bayoomed.com\/wp-content\/uploads\/sites\/4\/2024\/06\/BAYOOMED-Organisatrische-Massnamen-zur-Einhaltung-von-Cyber-Sicherheitsanforderungen-an-netzwerkfaehige-Medizinprodukte-400x286.jpg 400w, https:\/\/www.bayoomed.com\/wp-content\/uploads\/sites\/4\/2024\/06\/BAYOOMED-Organisatrische-Massnamen-zur-Einhaltung-von-Cyber-Sicherheitsanforderungen-an-netzwerkfaehige-Medizinprodukte-600x429.jpg 600w, https:\/\/www.bayoomed.com\/wp-content\/uploads\/sites\/4\/2024\/06\/BAYOOMED-Organisatrische-Massnamen-zur-Einhaltung-von-Cyber-Sicherheitsanforderungen-an-netzwerkfaehige-Medizinprodukte-800x572.jpg 800w, https:\/\/www.bayoomed.com\/wp-content\/uploads\/sites\/4\/2024\/06\/BAYOOMED-Organisatrische-Massnamen-zur-Einhaltung-von-Cyber-Sicherheitsanforderungen-an-netzwerkfaehige-Medizinprodukte.jpg 1200w\" sizes=\"(max-width: 1100px) 100vw, 1200px\" \/><\/span><\/div><div class=\"fusion-title title fusion-title-2 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:0px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:39;line-height:var(--awb-typography1-line-height);\"><h2>Regulatory basis: MDR and FDA<\/h2><\/h2><\/div><div class=\"fusion-title title fusion-title-3 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:0px;--awb-margin-left-small:0px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:30;line-height:var(--awb-typography1-line-height);\"><h3>MDR &#8211; European requirements<\/h3><\/h3><\/div><div class=\"fusion-text fusion-text-4\"><p>The EU Medical Device Regulation (MDR) classifies closed-loop systems as active therapeutic devices with built-in diagnostics. According to Annex VIII, Rule 22, they are subject to risk class III &#8211; the highest class. This results in extensive requirements for the safety, performance and &#8211; increasingly relevant &#8211; the cybersecurity of these systems.  <\/p>\n<\/div><div class=\"fusion-title title fusion-title-4 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:0px;--awb-margin-left-small:0px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:30;line-height:var(--awb-typography1-line-height);\"><h3>FDA requirements from the USA<\/h3><\/h3><\/div><div class=\"fusion-text fusion-text-5\"><p>In September 2023, the FDA published new guidelines for Physiological Closed-Loop Controlled (PCLC) systems. These explicitly address systems that intervene in the therapy process without human intervention. The key requirements are  <\/p>\n<ul>\n<li>Clearly defined and comprehensible switching logic in the controller<\/li>\n<li>Safety mechanisms such as failsafe modes and redundancies<\/li>\n<li>High demands on data integrity and response times<\/li>\n<li>Robustness against artifacts, signal loss and external interference<\/li>\n<\/ul>\n<p>For interoperable systems, the FDA also recommends compliance with the AAMI\/UL standards.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-3 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:calc( 70vw + );margin-left: calc(- \/ 2 );margin-right: calc(- \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-2 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-margin-bottom-large:20px;--awb-width-medium:100%;--awb-order-medium:0;--awb-width-small:100%;--awb-order-small:0;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-5 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:0px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:39;line-height:var(--awb-typography1-line-height);\"><h2 class=\"ai-optimize-33\">Requirements from the \u201cPhysiologic Closed-Loop Controlled Devices\u201d guidance<\/h2><\/h2><\/div><div class=\"fusion-text fusion-text-6\"><p class=\"ai-optimize-35\">The FDA guideline contains practical recommendations for the implementation of PCLC systems. Even if these are not explicitly prescribed in the MDR, they can be used as excellent guidelines for European developments, particularly in the early development phase. <\/p>\n<p class=\"ai-optimize-35\">Important aspects are:<\/p>\n<\/div><ul style=\"--awb-line-height:30.6px;--awb-icon-width:30.6px;--awb-icon-height:30.6px;--awb-icon-margin:12.6px;--awb-content-margin:43.2px;--awb-circlecolor:var(--awb-color4);--awb-circle-yes-font-size:15.84px;\" class=\"fusion-checklist fusion-checklist-1 fusion-checklist-default type-icons\"><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon fa-angle-right fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<div class=\"iconlist_content_wrap\">\n<p class=\"ai-optimize-44\"><strong>Sensor technology:<br \/><\/strong>Sensors must provide reliable values, even under interference. High demands are placed on artifact suppression, signal stability, redundancy and reliability. <\/p>\n<\/div>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon fa-angle-right fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<div class=\"iconlist_content_wrap\">\n<p><strong>Controller:<\/strong><\/p>\n<p class=\"ai-optimize-46\">The controller is the &#8220;brain&#8221; of the system. It must make decisions on a comprehensible, documented and safety-certified basis, be it rule-based, model-based or through machine learning. The behavior in the event of incorrect or missing data is particularly critical.  <\/p>\n<\/div>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon fa-angle-right fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<div class=\"iconlist_content_wrap\"><strong>Actuators:<\/strong><br \/>The actuators convert control commands into specific therapeutic measures. Latency times must be minimized, errors detected and critical situations safeguarded by defined fallback mechanisms. <\/div>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon fa-angle-right fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<div class=\"iconlist_content_wrap\">\n<p class=\"ai-optimize-49\"><strong>System integration:<br \/><\/strong>The connection between sensors, controls and actuators is particularly prone to errors. Communication failures or timing problems must be reliably detected and intercepted. Logging, alarms and clear user guidance are essential components.  <\/p>\n<\/div>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon awb-icon-check\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<p><b>Cloud backend:<br \/><\/b>A cloud backend can serve as a backup in the event of a fault and provide additional control options. At the same time, security requirements are increasing, for example in terms of encrypted communication, data integrity and access protection. <\/p>\n<\/div><\/li><\/ul><div class=\"fusion-image-element \" style=\"--awb-margin-bottom:20px;--awb-caption-title-font-family:var(--h2_typography-font-family);--awb-caption-title-font-weight:var(--h2_typography-font-weight);--awb-caption-title-font-style:var(--h2_typography-font-style);--awb-caption-title-size:var(--h2_typography-font-size);--awb-caption-title-transform:var(--h2_typography-text-transform);--awb-caption-title-line-height:var(--h2_typography-line-height);--awb-caption-title-letter-spacing:var(--h2_typography-letter-spacing);\"><span class=\" fusion-imageframe imageframe-none imageframe-2 hover-type-none\" style=\"border-radius:10px;\"><img decoding=\"async\" width=\"1200\" height=\"800\" alt=\"BAYOOMED-Richtlinien\" title=\"BAYOOMED-Richtlinien\" src=\"https:\/\/www.bayoomed.com\/wp-content\/uploads\/sites\/4\/2025\/04\/BAYOOMED-Richtlinien.jpg\" class=\"img-responsive wp-image-5530\" srcset=\"https:\/\/www.bayoomed.com\/wp-content\/uploads\/sites\/4\/2025\/04\/BAYOOMED-Richtlinien-200x133.jpg 200w, https:\/\/www.bayoomed.com\/wp-content\/uploads\/sites\/4\/2025\/04\/BAYOOMED-Richtlinien-400x267.jpg 400w, https:\/\/www.bayoomed.com\/wp-content\/uploads\/sites\/4\/2025\/04\/BAYOOMED-Richtlinien-600x400.jpg 600w, https:\/\/www.bayoomed.com\/wp-content\/uploads\/sites\/4\/2025\/04\/BAYOOMED-Richtlinien-800x533.jpg 800w, https:\/\/www.bayoomed.com\/wp-content\/uploads\/sites\/4\/2025\/04\/BAYOOMED-Richtlinien.jpg 1200w\" sizes=\"(max-width: 1100px) 100vw, 1200px\" \/><\/span><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-4 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:calc( 70vw + );margin-left: calc(- \/ 2 );margin-right: calc(- \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-3 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-margin-bottom-large:20px;--awb-width-medium:100%;--awb-order-medium:0;--awb-width-small:100%;--awb-order-small:0;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-6 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:0px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:39;line-height:var(--awb-typography1-line-height);\"><h2 class=\"ai-optimize-54\">Experience from the development of closed-loop systems<\/h2><\/h2><\/div><div class=\"fusion-title title fusion-title-7 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:0px;--awb-margin-left-small:0px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:30;line-height:var(--awb-typography1-line-height);\"><h3>Safety and security &#8211; two sides of the same coin<\/h3><\/h3><\/div><div class=\"fusion-text fusion-text-7\"><p>Safety and security are inextricably linked in the development of PCLC systems. Measures from one area often have an effect on the other. For example, redundant calculations of critical algorithm steps increase both safety (in the sense of \u201csafety\u201d) and protection against manipulation (in the sense of \u201csecurity\u201d). Comprehensive logging also helps to precisely reconstruct the causes of system behavior later on.   <\/p>\n<\/div><div class=\"fusion-title title fusion-title-8 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:0px;--awb-margin-left-small:0px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:30;line-height:var(--awb-typography1-line-height);\"><h3>Dealing with worst-case scenarios<\/h3><\/h3><\/div><div class=\"fusion-text fusion-text-8\"><p>A central question in development is: What should the system do in an emergency?<\/p>\n<p>If the database breaks down or the controller detects an error, it must be clearly defined whether the system switches back to a basic medication, stops operation or takes alternative safety measures. This decision must be medically sound and documented as part of risk management. <\/p>\n<\/div><div class=\"fusion-title title fusion-title-9 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:0px;--awb-margin-left-small:0px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:30;line-height:var(--awb-typography1-line-height);\"><h3>Cloud backend as a critical system component<\/h3><\/h3><\/div><div class=\"fusion-text fusion-text-9\"><p>A cloud backend offers decisive advantages, especially for PCLC systems. It enables: <\/p>\n<ul>\n<li>The continuous backup and analysis of logs<\/li>\n<li>Subsequent evaluation of system behavior, even in the event of device failure<\/li>\n<li>Early warning messages in the event of abnormal behavior, independent of the device itself<\/li>\n<li>Computationally intensive validation of critical algorithms for plausibility checks and tamper detection<\/li>\n<\/ul>\n<p>All of this helps to increase confidence in the functionality and security of the system.<\/p>\n<\/div><div class=\"fusion-title title fusion-title-10 fusion-sep-none fusion-title-text fusion-title-size-three\" style=\"--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:0px;--awb-margin-left-small:0px;\"><h3 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:30;line-height:var(--awb-typography1-line-height);\"><h3>Documentation &#8211; not just an obligation, but an opportunity<\/h3><\/h3><\/div><div class=\"fusion-text fusion-text-10\"><p>As PCLC systems are still comparatively new in regulatory terms, it is worth creating detailed documentation for the closed-loop part, especially at the beginning. As experience grows, this can be streamlined and adapted in a targeted manner. As with the introduction of the MDR, the right measure will emerge over time.  <\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"fusion-fullwidth fullwidth-box fusion-builder-row-5 fusion-flex-container has-pattern-background has-mask-background nonhundred-percent-fullwidth non-hundred-percent-height-scrolling\" style=\"--awb-border-radius-top-left:0px;--awb-border-radius-top-right:0px;--awb-border-radius-bottom-right:0px;--awb-border-radius-bottom-left:0px;--awb-flex-wrap:wrap;\" ><div class=\"fusion-builder-row fusion-row fusion-flex-align-items-flex-start fusion-flex-content-wrap\" style=\"max-width:calc( 70vw + );margin-left: calc(- \/ 2 );margin-right: calc(- \/ 2 );\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-4 fusion_builder_column_1_1 1_1 fusion-flex-column\" style=\"--awb-bg-size:cover;--awb-width-large:100%;--awb-margin-top-large:0px;--awb-margin-bottom-large:20px;--awb-width-medium:100%;--awb-order-medium:0;--awb-width-small:100%;--awb-order-small:0;\"><div class=\"fusion-column-wrapper fusion-column-has-shadow fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-title title fusion-title-11 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:0px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:39;line-height:var(--awb-typography1-line-height);\"><h2>Recommendations for manufacturers<\/h2><\/h2><\/div><div class=\"fusion-text fusion-text-11\"><p class=\"ai-optimize-70\">A holistic approach to security is essential &#8211; throughout the entire life cycle. Important measures include <\/p>\n<\/div><ul style=\"--awb-line-height:30.6px;--awb-icon-width:30.6px;--awb-icon-height:30.6px;--awb-icon-margin:12.6px;--awb-content-margin:43.2px;--awb-circlecolor:var(--awb-color4);--awb-circle-yes-font-size:15.84px;\" class=\"fusion-checklist fusion-checklist-2 fusion-checklist-default type-icons\"><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon fa-angle-right fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<div class=\"iconlist_content_wrap\">\n<p class=\"ai-optimize-76\">Early integration of cybersecurity expertise in product development<\/p>\n<\/div>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon fa-angle-right fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<div class=\"iconlist_content_wrap\">\n<p class=\"ai-optimize-78\">Threat analysis (threat modeling) as early as the concept phase<\/p>\n<\/div>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon fa-angle-right fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<div class=\"iconlist_content_wrap\">\n<p class=\"ai-optimize-80\">Permanent monitoring and seamless logging<\/p>\n<\/div>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon fa-angle-right fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<div class=\"iconlist_content_wrap\">\n<p class=\"ai-optimize-80\">Redundancy and diversity in safety-critical areas<\/p>\n<\/div>\n<\/div><\/li><li class=\"fusion-li-item\" style=\"\"><span class=\"icon-wrapper circle-yes\"><i class=\"fusion-li-icon fa-angle-right fas\" aria-hidden=\"true\"><\/i><\/span><div class=\"fusion-li-item-content\">\n<div class=\"iconlist_content_wrap\">\n<p class=\"ai-optimize-80\">Clear communication structures between all departments involved, from Regulatory Affairs to Legal<\/p>\n<\/div>\n<\/div><\/li><\/ul><div class=\"fusion-title title fusion-title-12 fusion-sep-none fusion-title-text fusion-title-size-two\" style=\"--awb-margin-top-small:0px;--awb-margin-right-small:0px;--awb-margin-bottom-small:0px;--awb-margin-left-small:0px;\"><h2 class=\"fusion-title-heading title-heading-left fusion-responsive-typography-calculated\" style=\"margin:0;--fontSize:39;line-height:var(--awb-typography1-line-height);\"><h2>Conclusion<\/h2><\/h2><\/div><div class=\"fusion-text fusion-text-12\"><p>Closed-loop medical devices offer enormous potential for precise and adaptive therapies, especially for critically ill or chronically unstable patients. However, the associated cybersecurity requirements are complex and should not be underestimated. Establishing clear security concepts at an early stage, complying with regulatory frameworks and understanding the special features of such systems creates the basis for sustainable success &#8211; technically, regulatory and clinically.  <\/p>\n<\/div><\/div><\/div><\/div><\/div><\/p>\n","protected":false},"author":8,"featured_media":5854,"template":"","categories":[45],"class_list":["post-5856","news","type-news","status-publish","has-post-thumbnail","hentry","category-news-en"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.6 (Yoast SEO v27.6) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Cybersecurity for closed-loop medical devices: Requirements according to MDR and FDA -<\/title>\n<meta name=\"description\" content=\"The increasing use of closed-loop systems in medical technology brings with it a new class of challenges for cybersecurity.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.bayoomed.com\/en\/news\/cybersecurity-for-closed-loop-medical-devices-requirements-according-to-mdr-and-fda\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity for closed-loop medical devices: Requirements according to MDR and FDA\" \/>\n<meta property=\"og:description\" content=\"The increasing use of closed-loop systems in medical technology brings with it a new class of challenges for cybersecurity.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.bayoomed.com\/en\/news\/cybersecurity-for-closed-loop-medical-devices-requirements-according-to-mdr-and-fda\/\" \/>\n<meta property=\"og:site_name\" content=\"BAYOOMED\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-03T07:04:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.bayoomed.com\/wp-content\/uploads\/sites\/4\/2025\/06\/Cybersecurity_fuer_Closed-Loop_Medical_Devices_Beitragsbild.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"935\" \/>\n\t<meta property=\"og:image:height\" content=\"535\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"26 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.bayoomed.com\\\/en\\\/news\\\/cybersecurity-for-closed-loop-medical-devices-requirements-according-to-mdr-and-fda\\\/\",\"url\":\"https:\\\/\\\/www.bayoomed.com\\\/en\\\/news\\\/cybersecurity-for-closed-loop-medical-devices-requirements-according-to-mdr-and-fda\\\/\",\"name\":\"Cybersecurity for closed-loop medical devices: Requirements according to MDR and FDA -\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.bayoomed.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.bayoomed.com\\\/en\\\/news\\\/cybersecurity-for-closed-loop-medical-devices-requirements-according-to-mdr-and-fda\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.bayoomed.com\\\/en\\\/news\\\/cybersecurity-for-closed-loop-medical-devices-requirements-according-to-mdr-and-fda\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.bayoomed.com\\\/wp-content\\\/uploads\\\/sites\\\/4\\\/2025\\\/06\\\/Cybersecurity_fuer_Closed-Loop_Medical_Devices_Beitragsbild.jpg\",\"datePublished\":\"2025-06-13T11:37:17+00:00\",\"dateModified\":\"2025-07-03T07:04:50+00:00\",\"description\":\"The increasing use of closed-loop systems in medical technology brings with it a new class of challenges for cybersecurity.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.bayoomed.com\\\/en\\\/news\\\/cybersecurity-for-closed-loop-medical-devices-requirements-according-to-mdr-and-fda\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.bayoomed.com\\\/en\\\/news\\\/cybersecurity-for-closed-loop-medical-devices-requirements-according-to-mdr-and-fda\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.bayoomed.com\\\/en\\\/news\\\/cybersecurity-for-closed-loop-medical-devices-requirements-according-to-mdr-and-fda\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.bayoomed.com\\\/wp-content\\\/uploads\\\/sites\\\/4\\\/2025\\\/06\\\/Cybersecurity_fuer_Closed-Loop_Medical_Devices_Beitragsbild.jpg\",\"contentUrl\":\"https:\\\/\\\/www.bayoomed.com\\\/wp-content\\\/uploads\\\/sites\\\/4\\\/2025\\\/06\\\/Cybersecurity_fuer_Closed-Loop_Medical_Devices_Beitragsbild.jpg\",\"width\":935,\"height\":535},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.bayoomed.com\\\/en\\\/news\\\/cybersecurity-for-closed-loop-medical-devices-requirements-according-to-mdr-and-fda\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/www.bayoomed.com\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"News\",\"item\":\"https:\\\/\\\/www.bayoomed.com\\\/news\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cybersecurity for closed-loop medical devices: Requirements according to MDR and FDA\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.bayoomed.com\\\/#website\",\"url\":\"https:\\\/\\\/www.bayoomed.com\\\/\",\"name\":\"BAYOOMED\",\"description\":\"We engineer medical software\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.bayoomed.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cybersecurity for closed-loop medical devices: Requirements according to MDR and FDA -","description":"The increasing use of closed-loop systems in medical technology brings with it a new class of challenges for cybersecurity.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.bayoomed.com\/en\/news\/cybersecurity-for-closed-loop-medical-devices-requirements-according-to-mdr-and-fda\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity for closed-loop medical devices: Requirements according to MDR and FDA","og_description":"The increasing use of closed-loop systems in medical technology brings with it a new class of challenges for cybersecurity.","og_url":"https:\/\/www.bayoomed.com\/en\/news\/cybersecurity-for-closed-loop-medical-devices-requirements-according-to-mdr-and-fda\/","og_site_name":"BAYOOMED","article_modified_time":"2025-07-03T07:04:50+00:00","og_image":[{"width":935,"height":535,"url":"https:\/\/www.bayoomed.com\/wp-content\/uploads\/sites\/4\/2025\/06\/Cybersecurity_fuer_Closed-Loop_Medical_Devices_Beitragsbild.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"26 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.bayoomed.com\/en\/news\/cybersecurity-for-closed-loop-medical-devices-requirements-according-to-mdr-and-fda\/","url":"https:\/\/www.bayoomed.com\/en\/news\/cybersecurity-for-closed-loop-medical-devices-requirements-according-to-mdr-and-fda\/","name":"Cybersecurity for closed-loop medical devices: Requirements according to MDR and FDA -","isPartOf":{"@id":"https:\/\/www.bayoomed.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.bayoomed.com\/en\/news\/cybersecurity-for-closed-loop-medical-devices-requirements-according-to-mdr-and-fda\/#primaryimage"},"image":{"@id":"https:\/\/www.bayoomed.com\/en\/news\/cybersecurity-for-closed-loop-medical-devices-requirements-according-to-mdr-and-fda\/#primaryimage"},"thumbnailUrl":"https:\/\/www.bayoomed.com\/wp-content\/uploads\/sites\/4\/2025\/06\/Cybersecurity_fuer_Closed-Loop_Medical_Devices_Beitragsbild.jpg","datePublished":"2025-06-13T11:37:17+00:00","dateModified":"2025-07-03T07:04:50+00:00","description":"The increasing use of closed-loop systems in medical technology brings with it a new class of challenges for cybersecurity.","breadcrumb":{"@id":"https:\/\/www.bayoomed.com\/en\/news\/cybersecurity-for-closed-loop-medical-devices-requirements-according-to-mdr-and-fda\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.bayoomed.com\/en\/news\/cybersecurity-for-closed-loop-medical-devices-requirements-according-to-mdr-and-fda\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.bayoomed.com\/en\/news\/cybersecurity-for-closed-loop-medical-devices-requirements-according-to-mdr-and-fda\/#primaryimage","url":"https:\/\/www.bayoomed.com\/wp-content\/uploads\/sites\/4\/2025\/06\/Cybersecurity_fuer_Closed-Loop_Medical_Devices_Beitragsbild.jpg","contentUrl":"https:\/\/www.bayoomed.com\/wp-content\/uploads\/sites\/4\/2025\/06\/Cybersecurity_fuer_Closed-Loop_Medical_Devices_Beitragsbild.jpg","width":935,"height":535},{"@type":"BreadcrumbList","@id":"https:\/\/www.bayoomed.com\/en\/news\/cybersecurity-for-closed-loop-medical-devices-requirements-according-to-mdr-and-fda\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/www.bayoomed.com\/en\/"},{"@type":"ListItem","position":2,"name":"News","item":"https:\/\/www.bayoomed.com\/news\/"},{"@type":"ListItem","position":3,"name":"Cybersecurity for closed-loop medical devices: Requirements according to MDR and FDA"}]},{"@type":"WebSite","@id":"https:\/\/www.bayoomed.com\/#website","url":"https:\/\/www.bayoomed.com\/","name":"BAYOOMED","description":"We engineer medical software","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.bayoomed.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"acf":[],"_links":{"self":[{"href":"https:\/\/www.bayoomed.com\/en\/wp-json\/wp\/v2\/news\/5856","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.bayoomed.com\/en\/wp-json\/wp\/v2\/news"}],"about":[{"href":"https:\/\/www.bayoomed.com\/en\/wp-json\/wp\/v2\/types\/news"}],"author":[{"embeddable":true,"href":"https:\/\/www.bayoomed.com\/en\/wp-json\/wp\/v2\/users\/8"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.bayoomed.com\/en\/wp-json\/wp\/v2\/media\/5854"}],"wp:attachment":[{"href":"https:\/\/www.bayoomed.com\/en\/wp-json\/wp\/v2\/media?parent=5856"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.bayoomed.com\/en\/wp-json\/wp\/v2\/categories?post=5856"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}