Skip to main content
QMSQMS
QMS
  • Welcome to your QMS
  • Quality Manual
  • Procedures
  • Records
  • Legit.Health Plus Version 1.1.0.0
    • Index of Technical Documentation or Product File
    • Summary of Technical Documentation (STED)
    • Description and specifications
    • R-TF-001-007 Declaration of conformity
    • GSPR
    • Artificial Intelligence
    • Clinical
    • Cybersecurity
      • R-TF-024-001 Software Bills Of Materials
      • R-TF-024-002 Cyber Security Risk Management Plan
      • R-TF-024-003 Cyber Security Risk Matrix
      • R-TF-024-004 Security Risk Assessment Report
      • R-TF-025-005 Security Risk Testing Report
      • T-024-006 Threat Model Document
      • T-024-007 Cybersecurity Post-Market Surveillance Plan
      • T-024-009 Security Architecture Document
    • Design and development
    • Design History File
    • IFU and label
    • Post-Market Surveillance
    • Quality control
    • Risk Management
    • Usability and Human Factors Engineering
  • Legit.Health Plus Version 1.1.0.1
  • Licenses and accreditations
  • Applicable Standards and Regulations
  • Public tenders
  • Legit.Health Plus Version 1.1.0.0
  • Cybersecurity
  • T-024-007 Cybersecurity Post-Market Surveillance Plan

T-024-007 Cybersecurity Post-Market Surveillance Plan

Executive Summary​

Purpose and Scope​

This Cybersecurity Post-Market Surveillance Plan establishes a comprehensive framework for monitoring, assessing, and responding to cybersecurity threats and vulnerabilities affecting the Legit.Health Plus medical device software throughout its operational lifecycle. The plan ensures continuous security monitoring, timely vulnerability remediation, and compliance with regulatory requirements while maintaining patient safety and data protection.

Regulatory Alignment​

This plan has been developed in accordance with:

  • FDA Cybersecurity in Medical Devices: Quality System Considerations and Content of Premarket Submissions (September 2023)
  • FDA Postmarket Management of Cybersecurity in Medical Devices (December 2016)
  • EU Medical Device Regulation (MDR) 2017/745 Article 83 and Annex III
  • EU Directive 2022/2555 (NIS2) on measures for high common level of cybersecurity
  • MDCG 2019-16 - Guidance on Cybersecurity for medical devices
  • IMDRF/CYBER WG/N60FINAL:2020 - Principles and Practices for Medical Device Cybersecurity
  • IEC 62443-4-1:2018 - Product security lifecycle requirements
  • ISO/IEC 29147:2018 - Vulnerability disclosure
  • ISO/IEC 30111:2019 - Vulnerability handling processes

Integration with Overall Post-Market Surveillance​

This cybersecurity-specific plan operates as an integral component of the broader post-market surveillance system described in:

  • GP-009: Post-Market Surveillance Procedure
  • R-TF-007-002: Post-Market Clinical Follow-up (PMCF) Plan
  • R-TF-007-001: Post-Market Surveillance Plan

The cybersecurity activities outlined herein shall be coordinated with general post-market surveillance activities to ensure comprehensive risk management and regulatory compliance.

Document Control​

VersionDateAuthorDescription
1.02025-08-29Technical TeamInitial cybersecurity post-market surveillance plan

Vulnerability Monitoring Program​

Vulnerability Intelligence Sources​

Primary Sources​

Source IDSource NameTypeMonitoring FrequencyResponsible Role
VIS-001National Vulnerability Database (NVD)Government DatabaseDaily automatedSecurity Team
VIS-002CISA Known Exploited VulnerabilitiesGovernment AdvisoryDaily automatedSecurity Team
VIS-003ICS-CERT Medical Device AdvisoriesSector-SpecificDaily automatedSecurity Team
VIS-004FDA MAUDE DatabaseMedical Device ReportsWeeklyQuality Team
VIS-005EU Medical Device Coordination GroupRegulatory UpdatesWeeklyRegulatory Affairs

Secondary Sources​

Source IDSource NameTypeMonitoring FrequencyResponsible Role
VIS-006MITRE CVE DatabaseVulnerability DatabaseDaily automatedSecurity Team
VIS-007Healthcare ISAC AlertsIndustry SharingReal-time alertsSecurity Team
VIS-008Vendor Security BulletinsVendor NotificationsAs publishedDevelopment Team
VIS-009CERT Coordination CenterResearch InstitutionWeeklySecurity Team
VIS-010Security Research PublicationsAcademic/IndustryMonthlyR&D Team

SOUP/Third-Party Component Monitoring​

Component Inventory Management​

All Software of Unknown Provenance (SOUP) and third-party components shall be maintained in a comprehensive Software Bill of Materials (SBOM) including:

  • Component name and version
  • Vendor/maintainer information
  • License type
  • Known vulnerabilities (CVEs)
  • End-of-life/support dates
  • Security contact information

Monitoring Process​

ActivityFrequencyTool/MethodOutput
SBOM UpdateMonthlyAutomated scanningUpdated component list
Vulnerability ScanningDailyTrivy, SnykVulnerability report
License Compliance CheckQuarterlyLicense scannerCompliance report
EOL Component ReviewQuarterlyManual reviewUpdate plan
Security Patch AssessmentAs releasedManual reviewPatch decision

Threat Intelligence Integration​

Threat Intelligence Feeds​

Feed IDFeed NameCoverageIntegration Method
TIF-001Healthcare Threat IntelHealthcare-specific threatsAPI integration
TIF-002Cloud Security AllianceCloud infrastructure threatsEmail alerts
TIF-003STIX/TAXII FeedsStructured threat informationAutomated ingestion
TIF-004Dark Web MonitoringCredential leaks, exploitsVendor service
TIF-005Social Media MonitoringEarly warning indicatorsManual review

Intelligence Processing Workflow​

  1. Collection: Automated gathering from configured sources
  2. Normalization: Standardize data format and severity ratings
  3. Enrichment: Add context from internal systems
  4. Analysis: Assess applicability to Legit.Health Plus
  5. Prioritization: Rank by potential impact and exploitability
  6. Distribution: Alert relevant teams based on severity

Security Bulletin Monitoring​

Security bulletins shall be monitored for all components in the technology stack:

  • Operating Systems: Linux distributions, container base images
  • Runtime Environments: Python, Node.js
  • Frameworks: FastAPI, React
  • Libraries: PyTorch, NumPy, OpenCV
  • Cloud Services: AWS services and features
  • Databases: MongoDB, AWS DocumentDB
  • Infrastructure: Docker, Kubernetes

Vulnerability Assessment Process​

CVSS Scoring Methodology​

All identified vulnerabilities shall be assessed using the Common Vulnerability Scoring System (CVSS) v3.1:

Base Score Calculation​

MetricValuesDescription
Attack Vector (AV)Network/Adjacent/Local/PhysicalHow the vulnerability is exploited
Attack Complexity (AC)Low/HighConditions beyond attacker's control
Privileges Required (PR)None/Low/HighLevel of privileges needed
User Interaction (UI)None/RequiredWhether user must participate
Scope (S)Unchanged/ChangedWhether impact extends beyond vulnerable component
Confidentiality (C)None/Low/HighImpact on data confidentiality
Integrity (I)None/Low/HighImpact on data integrity
Availability (A)None/Low/HighImpact on resource availability

Environmental Score Modifiers​

Environmental metrics shall be adjusted based on Legit.Health Plus deployment:

  • Confidentiality Requirement: High (patient data protection)
  • Integrity Requirement: High (diagnostic accuracy)
  • Availability Requirement: Medium (non-life-supporting)
  • Modified Attack Vector: Consider network segmentation
  • Modified Attack Complexity: Account for existing controls

Risk Assessment Criteria​

Severity Classification​

CVSS ScoreSeverity LevelResponse TimeEscalation Required
9.0-10.0Critical24 hoursExecutive team
7.0-8.9High7 daysManagement team
4.0-6.9Medium30 daysTeam lead
0.1-3.9Low90 daysStandard process
0.0NoneMonitor onlyNone

Medical Device Specific Factors​

Additional factors for medical device context:

  1. Patient Safety Impact

    • Direct harm potential
    • Diagnostic accuracy impact
    • Treatment delay risk
  2. Clinical Setting

    • Healthcare facility exposure
    • Internet connectivity requirements
    • User access levels
  3. Data Sensitivity

    • Protected health information (PHI)
    • Personally identifiable information (PII)
    • Clinical research data

Prioritization Matrix​

Vulnerabilities shall be prioritized using a risk-based approach:

Priority Score = CVSS Base Score × Exploitability Factor × Asset Criticality × Exposure Factor

Where:
- Exploitability Factor: 0.5-2.0 based on exploit availability
- Asset Criticality: 1.0-3.0 based on component importance
- Exposure Factor: 0.5-2.0 based on attack surface exposure

Priority Levels​

Priority ScorePriority LevelAction Required
>20P1 - CriticalImmediate action, emergency patch
15-20P2 - HighExpedited patch within 7 days
10-14P3 - MediumStandard patch cycle (30 days)
5-9P4 - LowNext maintenance window
<5P5 - MinimalMonitor and batch update

Impact Analysis Procedures​

Technical Impact Assessment​

  1. Component Analysis

    • Identify affected components
    • Determine dependency chain
    • Assess function criticality
  2. Attack Surface Evaluation

    • External exposure assessment
    • Authentication requirements
    • Network accessibility
  3. Exploit Viability

    • Exploit code availability
    • Technical skill requirements
    • Attack complexity analysis

Business Impact Assessment​

  1. Operational Impact

    • Service availability effects
    • Performance degradation
    • Functionality limitations
  2. Compliance Impact

    • Regulatory requirement violations
    • Certification implications
    • Audit findings
  3. Reputational Impact

    • Customer trust implications
    • Market perception
    • Competitive positioning

Incident Response Framework​

Detection and Reporting Procedures​

Detection Mechanisms​

Detection IDMethodCoverageAlert Threshold
DET-001SIEM MonitoringAll systemsAnomaly detection
DET-002IDS/IPSNetwork trafficSignature match
DET-003File Integrity MonitoringCritical filesAny change
DET-004User Behavior AnalyticsUser activitiesDeviation from baseline
DET-005Vulnerability ScanningAll componentsNew vulnerabilities
DET-006Customer ReportsProduction issuesAny security concern
DET-007Third-Party NotificationsSupply chainVendor alerts

Reporting Channels​

  1. Internal Reporting

    • Security hotline: [24/7 contact number]
    • Email: security@legithealth.com
    • Incident portal: [Internal URL]
    • Slack channel: #security-incidents
  2. External Reporting

    • Responsible disclosure: security@legithealth.com
    • Bug bounty program: [If applicable]
    • Customer support: Through standard channels

NIS2 24/72-Hour Notification Requirements​

24-Hour Early Warning (Significant Incidents)​

Criteria for Significant Incident:

  • Causes or is capable of causing substantial operational disruption
  • Affects more than 100 users
  • Duration exceeds 1 hour for critical services
  • Data breach involving patient information

Notification Content:

  • Initial assessment of incident
  • Potential impact scope
  • Initial containment measures
  • Contact information for follow-up

Recipients:

  • National CSIRT
  • Competent sectoral authority
  • Affected customers (if applicable)

72-Hour Incident Notification​

Required Information:

  • Detailed incident description
  • Severity and impact assessment
  • Root cause analysis (preliminary)
  • Mitigation measures implemented
  • Timeline of events
  • Affected systems and data
  • Customer impact assessment

Notification Format:

  • Use NIS2 standard template
  • Include ENISA taxonomy classification
  • Provide incident reference number

Classification and Severity Levels​

Incident Classification​

ClassTypeDescriptionExamples
IC-1Data BreachUnauthorized access to dataPatient data exposure, credential theft
IC-2System CompromiseUnauthorized system accessMalware infection, backdoor installation
IC-3Denial of ServiceService availability impactDDoS attack, resource exhaustion
IC-4Data IntegrityData modification/corruptionDatabase tampering, file modification
IC-5Supply ChainThird-party compromiseVendor breach, component vulnerability

Severity Levels​

SeverityImpactResponse TimeTeam Activation
SEV-1Critical - Patient safety risk15 minutesFull incident response team
SEV-2High - Major service disruption1 hourCore response team
SEV-3Medium - Limited impact4 hoursOn-call team
SEV-4Low - Minimal impact24 hoursStandard team
SEV-5Info - No immediate impact72 hoursMonitoring only

Response Team Roles and Responsibilities​

Incident Response Team Structure​

RolePrimary ResponsibilitiesBackup
Incident CommanderOverall incident coordination, decision authorityTechnical Director
Security LeadTechnical investigation, forensicsSenior Security Engineer
Operations LeadSystem stability, service restorationDevOps Manager
Communications LeadInternal/external communicationsMarketing Director
Legal AdvisorLegal implications, regulatory complianceExternal Counsel
Quality RepresentativeQMS compliance, documentationQuality Manager
Clinical Safety OfficerPatient safety assessmentMedical Director

RACI Matrix for Incident Response​

ActivityIncident CommanderSecurity LeadOperationsCommunicationsLegalQuality
Initial AssessmentARCIII
Containment DecisionARCICI
InvestigationIRCIIC
Recovery PlanningACRIIC
CommunicationAIIRCI
DocumentationCRRCIR
Post-Incident ReviewRCCCCC

R=Responsible, A=Accountable, C=Consulted, I=Informed

Communication Protocols​

Internal Communication​

  1. Immediate Notification (0-15 minutes)

    • Security team activation
    • Management alert for SEV-1/2
    • Initial assessment communication
  2. Status Updates (Every 2 hours during incident)

    • Incident status dashboard
    • Email updates to stakeholders
    • Slack channel updates
  3. Resolution Communication

    • Incident closure notification
    • Lessons learned summary
    • Action items distribution

External Communication​

  1. Customer Communication

    • Timing: Based on impact assessment
    • Channel: Email, status page, direct contact for major customers
    • Content: Impact, mitigation, timeline, recommendations
  2. Regulatory Communication

    • FDA notification for recalls or safety issues
    • NIS2 compliance notifications
    • MDR vigilance reporting if applicable
  3. Public Communication

    • Security advisories on website
    • Coordinated vulnerability disclosure
    • Media response if required

Security Update Management​

Patch Development Process​

Vulnerability Remediation Workflow​

  1. Triage (PMS-VUL-001)

    • Vulnerability identification
    • Initial risk assessment
    • Priority assignment
  2. Analysis (PMS-VUL-002)

    • Root cause analysis
    • Impact assessment
    • Fix identification
  3. Development (PMS-VUL-003)

    • Code modification
    • Security testing
    • Code review
  4. Testing (PMS-VUL-004)

    • Unit testing
    • Integration testing
    • Security validation
  5. Release (PMS-VUL-005)

    • Release notes preparation
    • Deployment planning
    • Customer notification

Testing and Validation Procedures​

Security Patch Testing Requirements​

Test TypeScopeSuccess CriteriaDocumentation
Unit TestsModified code100% pass rateTest results
Integration TestsAffected modulesNo regressionTest report
Security TestsAttack vectorsVulnerability resolvedSecurity scan
Performance TestsSystem-wideNo degradationPerformance metrics
Clinical ValidationClinical functionsAccuracy maintainedValidation report

Validation Checklist​

  • Vulnerability successfully remediated
  • No new vulnerabilities introduced
  • Existing functionality preserved
  • Performance requirements met
  • Security controls effective
  • Documentation updated
  • Release notes prepared
  • Rollback procedure tested

Deployment Strategies​

Deployment Models​

StrategyUse CaseRisk LevelRollback Time
Immediate PushCritical vulnerabilitiesHigh< 1 hour
Phased RolloutStandard updatesMedium< 4 hours
Scheduled MaintenanceLow-priority patchesLow< 24 hours
Customer-ControlledOptional updatesMinimalCustomer-dependent

Deployment Process​

  1. Pre-Deployment (PMS-DEP-001)

    • Customer notification (T-24 hours)
    • Backup verification
    • Rollback procedure ready
  2. Deployment (PMS-DEP-002)

    • Canary deployment (5% of instances)
    • Monitoring and validation
    • Full deployment authorization
  3. Post-Deployment (PMS-DEP-003)

    • Health checks
    • Performance monitoring
    • Customer feedback collection

Customer Notification Procedures​

Notification Timeline​

SeverityPre-NotificationPatch AvailablePost-Deployment
CriticalImmediateWithin 24 hoursImmediate confirmation
High48 hoursWithin 7 daysWithin 24 hours
Medium1 weekWithin 30 daysWithin 48 hours
LowWith patchWithin 90 daysWith next update

Notification Content Template​

Subject: [SEVERITY] Security Update for Legit.Health Plus - [CVE-ID]

Dear Customer,

We are writing to inform you of a security update for Legit.Health Plus.

VULNERABILITY DETAILS:
- CVE ID: [CVE-YYYY-NNNNN]
- Severity: [Critical/High/Medium/Low]
- CVSS Score: [X.X]
- Component Affected: [Component name]

IMPACT:
[Description of potential impact]

MITIGATION:
[Temporary mitigation if available]

PATCH INFORMATION:
- Version: [X.X.X]
- Release Date: [YYYY-MM-DD]
- Installation: [Automatic/Manual]

ACTION REQUIRED:
[Specific actions customer needs to take]

SUPPORT:
For assistance, contact support@legithealth.com

Regards,
Legit.Health Security Team

Emergency Patch Procedures​

Emergency Patch Criteria​

Patches qualify as emergency when:

  • CVSS score ≥ 9.0
  • Active exploitation detected
  • Patient safety impact identified
  • Regulatory mandate issued
  • Zero-day vulnerability discovered

Emergency Response Process​

  1. Hour 0-1: Assessment (PMS-EMR-001)

    • Vulnerability verification
    • Impact assessment
    • Resource mobilization
  2. Hour 1-6: Development (PMS-EMR-002)

    • Fix development
    • Expedited testing
    • Management approval
  3. Hour 6-24: Deployment (PMS-EMR-003)

    • Emergency change approval
    • Staged deployment
    • Real-time monitoring
  4. Hour 24-48: Stabilization (PMS-EMR-004)

    • Performance monitoring
    • Issue resolution
    • Documentation completion

Coordinated Vulnerability Disclosure​

Disclosure Policy​

Responsible Disclosure Program​

Legit.Health maintains a coordinated vulnerability disclosure program aligned with ISO/IEC 29147:2018:

Scope:

  • All Legit.Health Plus components
  • Associated infrastructure
  • Third-party integrations
  • Documentation and processes

Out of Scope:

  • Social engineering attacks
  • Physical security testing
  • Third-party services not under our control
  • Denial of service attacks

Safe Harbor: Researchers acting in good faith will not face legal action if they:

  • Make good faith effort to avoid privacy violations
  • Avoid service disruption
  • Report findings promptly
  • Provide reasonable time for remediation

Researcher Engagement​

Communication Channels​

ChannelPurposeResponse Time
security@legithealth.comPrimary disclosure24 hours acknowledgment
PGP-encrypted emailSensitive disclosures24 hours acknowledgment
Bug bounty platformIf applicablePer platform SLA
Security advisory pagePublic informationUpdated as needed

Researcher Recognition​

  • Public acknowledgment (with permission)
  • Security hall of fame listing
  • Bounty payments (if applicable)
  • CVE credit attribution
  • Reference in security advisories

Timeline for Remediation​

Standard Disclosure Timeline​

PhaseDurationActivities
ReceiptDay 0Acknowledge receipt, initial assessment
TriageDays 1-3Verify vulnerability, assess severity
Fix DevelopmentDays 4-30Develop and test patch
CoordinationDays 31-60Coordinate with affected parties
Disclosure PreparationDays 61-75Prepare advisory, notifications
Public DisclosureDay 90Publish advisory, CVE details

Expedited Timeline Triggers​

  • Severity score ≥ 9.0
  • Active exploitation
  • Public disclosure imminent
  • Multiple researchers reporting
  • Significant public interest

Public Disclosure Process​

Advisory Publication​

  1. CVE Assignment (PMS-CVE-001)

    • Request CVE from MITRE
    • Provide vulnerability details
    • Coordinate numbering
  2. Advisory Preparation (PMS-CVE-002)

    • Technical description
    • Impact assessment
    • Mitigation guidance
    • Patch information
  3. Stakeholder Notification (PMS-CVE-003)

    • Customer pre-notification
    • Regulatory notification
    • CERT coordination
  4. Public Release (PMS-CVE-004)

    • Website publication
    • Security mailing list
    • Social media announcement
    • RSS feed update

Metrics and KPIs​

Performance Metrics​

Mean Time to Detect (MTTD)​

MetricTargetMeasurementReporting
Critical vulnerabilities< 24 hoursTime from publication to detectionMonthly
High vulnerabilities< 72 hoursTime from publication to detectionMonthly
Medium vulnerabilities< 1 weekTime from publication to detectionQuarterly
Low vulnerabilities< 1 monthTime from publication to detectionQuarterly

Calculation: MTTD = Timestamp(Detection) - Timestamp(Publication)

Mean Time to Respond (MTTR)​

MetricTargetMeasurementReporting
Critical incidents< 1 hourTime from detection to containmentPer incident
High incidents< 4 hoursTime from detection to containmentMonthly
Medium incidents< 24 hoursTime from detection to containmentMonthly
Low incidents< 72 hoursTime from detection to containmentQuarterly

Calculation: MTTR = Timestamp(Containment) - Timestamp(Detection)

Patch Deployment Rate​

MetricTargetMeasurementReporting
Critical patches100% within 24hPercentage deployed on timeMonthly
High patches95% within 7dPercentage deployed on timeMonthly
Medium patches90% within 30dPercentage deployed on timeQuarterly
Low patches85% within 90dPercentage deployed on timeQuarterly

Calculation: Deployment Rate = (Patches Deployed on Time / Total Patches) × 100

Vulnerability Closure Rate​

MetricTargetMeasurementReporting
Critical100%Percentage remediatedMonthly
High> 95%Percentage remediatedMonthly
Medium> 90%Percentage remediatedQuarterly
Low> 80%Percentage remediatedAnnually

Calculation: Closure Rate = (Vulnerabilities Closed / Total Vulnerabilities) × 100

Trend Analysis​

Incident Frequency and Severity Trends​

Monthly Tracking:

  • Number of incidents by severity
  • Number of incidents by type
  • Time to resolution trends
  • Repeat incident analysis

Quarterly Analysis:

  • Incident root cause distribution
  • Attack vector trends
  • Threat actor analysis
  • Control effectiveness

Annual Review:

  • Year-over-year comparisons
  • Emerging threat patterns
  • Security posture evolution
  • Investment effectiveness

KPI Dashboard​

KPICurrentTargetTrendStatus
MTTD (Critical)[Value]< 24h[↑↓→][🔴🟡🟢]
MTTR (Critical)[Value]< 1h[↑↓→][🔴🟡🟢]
Patch Compliance[Value]%> 95%[↑↓→][🔴🟡🟢]
Vulnerability Backlog[Value]< 10[↑↓→][🔴🟡🟢]
Security Incidents[Value]< 5/month[↑↓→][🔴🟡🟢]
False Positive Rate[Value]%< 10%[↑↓→][🔴🟡🟢]

Periodic Security Activities​

Penetration Testing Schedule​

Annual Penetration Testing Plan​

QuarterTest TypeScopeProviderPlan ID
Q1External NetworkInternet-facing systemsThird-partyPMS-PEN-001
Q2Web ApplicationLegit.Health Plus applicationThird-partyPMS-PEN-002
Q3API SecurityREST APIs, integrationsInternal + Third-partyPMS-PEN-003
Q4Red Team ExerciseFull scope attack simulationThird-partyPMS-PEN-004

Testing Requirements​

Scope Definition:

  • Production-like environment
  • All external interfaces
  • Authentication mechanisms
  • Data handling processes
  • Integration points

Methodology:

  • OWASP Testing Guide
  • PTES (Penetration Testing Execution Standard)
  • NIST SP 800-115
  • Medical device specific scenarios

Security Audits​

Audit Schedule​

Audit TypeFrequencyScopeAuditorPlan ID
Code Security ReviewQuarterlyNew featuresInternalPMS-AUD-001
Configuration AuditMonthlyInfrastructureAutomatedPMS-AUD-002
Access Control ReviewQuarterlyUser permissionsSecurity teamPMS-AUD-003
Compliance AuditAnnuallyFull QMSExternalPMS-AUD-004
SOUP AssessmentSemi-annuallyThird-party componentsSecurity teamPMS-AUD-005

Audit Criteria​

  • Compliance with security policies
  • Implementation of security controls
  • Vulnerability remediation status
  • Incident response effectiveness
  • Security training completion
  • Documentation accuracy

Third-Party Assessments​

Assessment Types​

AssessmentProvider TypeFrequencyOutputPlan ID
SOC 2 Type IICertified AuditorAnnualAttestation reportPMS-TPA-001
ISO 27001 SurveillanceCertification BodyAnnualAudit reportPMS-TPA-002
Cloud Security AssessmentCloud ProviderAnnualCompliance reportPMS-TPA-003
Supply Chain ReviewSecurity VendorSemi-annualRisk reportPMS-TPA-004

SBOM Updates​

Software Bill of Materials Management​

Update Frequency:

  • Production changes: Real-time
  • Routine review: Monthly
  • Comprehensive audit: Quarterly
  • Regulatory submission: As required

SBOM Components:

ElementDescriptionFormatPlan ID
Component InventoryAll software componentsSPDX/CycloneDXPMS-SBOM-001
Version TrackingComponent versionsJSONPMS-SBOM-002
Vulnerability MappingKnown CVEsCVRFPMS-SBOM-003
License InventoryLicense complianceSPDXPMS-SBOM-004
Dependency GraphComponent relationshipsGraph formatPMS-SBOM-005

Update Process:

  1. Automated scanning of codebase
  2. Manual verification of changes
  3. Vulnerability correlation
  4. Risk assessment update
  5. Stakeholder notification

Documentation and Reporting​

Monthly Security Reports​

Report Components​

Executive Summary

  • Key security metrics
  • Critical incidents summary
  • Major vulnerabilities addressed
  • Upcoming security initiatives

Detailed Sections:

  1. Vulnerability Management (PMS-REP-001)

    • New vulnerabilities identified
    • Patches deployed
    • Outstanding vulnerabilities
    • SOUP component updates
  2. Incident Response (PMS-REP-002)

    • Incidents by severity
    • Response time analysis
    • Root cause summaries
    • Lessons learned
  3. Threat Intelligence (PMS-REP-003)

    • Emerging threats
    • Threat actor activity
    • Industry trends
    • Relevance assessment
  4. Compliance Status (PMS-REP-004)

    • Regulatory updates
    • Audit findings
    • Corrective actions
    • Certification status

Distribution List​

RecipientRoleFormatDelivery
Executive TeamOversightExecutive summaryEmail
Quality ManagerQMS complianceFull reportDocument system
Development TeamTechnical detailsTechnical sectionsJira
Regulatory AffairsCompliance statusCompliance sectionEmail
Board of DirectorsGovernanceQuarterly summaryBoard package

Quarterly Trend Analysis​

Analysis Framework​

Metrics Trending:

  • Vulnerability discovery rate
  • Patch deployment velocity
  • Incident frequency patterns
  • Control effectiveness metrics
  • Resource utilization trends

Predictive Analytics:

  • Vulnerability forecast modeling
  • Threat probability assessment
  • Resource requirement projections
  • Risk score evolution

Comparative Analysis:

  • Quarter-over-quarter comparison
  • Year-over-year trends
  • Industry benchmark comparison
  • Peer organization metrics

Annual Security Review​

Comprehensive Annual Assessment​

Review Sections:

  1. Security Posture Assessment (PMS-ANN-001)

    • Overall security maturity
    • Control effectiveness evaluation
    • Gap analysis results
    • Improvement recommendations
  2. Incident Analysis (PMS-ANN-002)

    • Annual incident statistics
    • Major incident post-mortems
    • Systemic issue identification
    • Process improvement opportunities
  3. Vulnerability Trends (PMS-ANN-003)

    • Vulnerability statistics
    • Remediation performance
    • SOUP component analysis
    • Emerging vulnerability patterns
  4. Compliance Review (PMS-ANN-004)

    • Regulatory compliance status
    • Audit findings summary
    • Corrective action effectiveness
    • Upcoming regulatory changes
  5. Investment Analysis (PMS-ANN-005)

    • Security investment ROI
    • Tool effectiveness assessment
    • Resource allocation review
    • Budget recommendations

Regulatory Reporting Requirements​

FDA Reporting​

Report TypeTriggerTimelinePlan ID
Medical Device Report (MDR)Security issue causing adverse event30 daysPMS-FDA-001
Correction and Removal ReportSecurity patch as correction10 daysPMS-FDA-002
Annual ReportRoutine updateAnnuallyPMS-FDA-003
PMA SupplementMajor security changesBefore implementationPMS-FDA-004

EU MDR Reporting​

Report TypeTriggerTimelinePlan ID
Serious Incident ReportSecurity breach with patient impact15 daysPMS-MDR-001
Field Safety NoticeSecurity vulnerability requiring actionImmediatelyPMS-MDR-002
Periodic Safety UpdateRoutine reportingAnnuallyPMS-MDR-003
Trend ReportSignificant increase in incidents20 daysPMS-MDR-004

NIS2 Compliance Reporting​

Report TypeTriggerTimelinePlan ID
Early WarningSignificant incident potential24 hoursPMS-NIS-001
Incident NotificationConfirmed significant incident72 hoursPMS-NIS-002
Final ReportIncident closure1 monthPMS-NIS-003
Annual SummaryCompliance demonstrationAnnuallyPMS-NIS-004

Integration Points​

Risk Management Integration​

Link to R-TF-013-002​

Risk Identification Updates:

  • New vulnerabilities → Risk assessment
  • Incident analysis → Risk re-evaluation
  • Threat intelligence → Risk identification
  • Control effectiveness → Risk mitigation validation

Risk Management Synchronization:

ActivityRisk Management UpdateFrequencyPlan ID
Vulnerability assessmentRisk likelihood updateMonthlyPMS-RSK-001
Incident post-mortemNew risk identificationPer incidentPMS-RSK-002
Penetration test resultsControl effectivenessQuarterlyPMS-RSK-003
Threat model reviewRisk scenario updateAnnuallyPMS-RSK-004

Threat Model Maintenance​

Link to T-024-006​

Threat Model Updates Triggered By:

  • New attack vectors discovered
  • Architecture changes
  • New integration points
  • Vulnerability patterns
  • Incident learnings

Update Process:

  1. Quarterly Review (PMS-THR-001)

    • Review new vulnerabilities
    • Assess threat landscape changes
    • Update attack vectors
  2. Annual Revision (PMS-THR-002)

    • Comprehensive threat reassessment
    • Architecture review
    • Control effectiveness evaluation

Post-Market Surveillance Integration​

Link to GP-009​

Data Sharing:

  • Security incidents → Post-market surveillance database
  • Customer security complaints → Trend analysis
  • Security-related field actions → Vigilance reporting
  • Performance metrics → Quality metrics

Coordination Points:

ActivityPMS IntegrationResponsiblePlan ID
Incident reportingAdd to PMS databaseQuality teamPMS-PMS-001
Trend analysisInclude security trendsAnalytics teamPMS-PMS-002
Customer feedbackSecurity complaint analysisSupport teamPMS-PMS-003
Regulatory reportingConsolidated reportingRegulatory teamPMS-PMS-004

Cybersecurity Procedures Alignment​

Link to GP-013/GP-024​

Procedure Implementation:

  • GP-013 Information Security controls
  • GP-024 Cybersecurity lifecycle processes
  • Incident response procedures
  • Change management integration
  • Access control enforcement

Process Touchpoints:

ProcessIntegration PointVerificationPlan ID
Change ManagementSecurity impact assessmentChange review boardPMS-PRO-001
Access ControlPrivilege reviewsQuarterly auditPMS-PRO-002
Software DevelopmentSecurity testingRelease criteriaPMS-PRO-003
Supplier ManagementSOUP assessmentProcurement reviewPMS-PRO-004

Plan Maintenance and Review​

Review Schedule​

Review TypeFrequencyParticipantsOutput
Operational ReviewMonthlySecurity teamAction items
Management ReviewQuarterlyManagement teamStrategy updates
Effectiveness ReviewSemi-annuallyCross-functionalProcess improvements
Comprehensive ReviewAnnuallyAll stakeholdersPlan revision

Update Triggers​

The plan shall be updated when:

  • Major security incident occurs
  • Significant vulnerability discovered
  • Regulatory requirements change
  • Architecture significantly modified
  • New threat vectors emerge
  • Organizational changes occur
  • Annual review cycle

Change Control​

All changes to this plan shall:

  1. Be reviewed by Security Team
  2. Approved by Quality Manager
  3. Validated by Regulatory Affairs
  4. Communicated to stakeholders
  5. Version controlled in QMS

Appendices​

Appendix A: Plan ID Reference​

Plan ID SeriesDescriptionCount
PMS-VUL-XXXVulnerability management005
PMS-DEP-XXXDeployment processes003
PMS-EMR-XXXEmergency response004
PMS-CVE-XXXCVE management004
PMS-PEN-XXXPenetration testing004
PMS-AUD-XXXSecurity audits005
PMS-TPA-XXXThird-party assessments004
PMS-SBOM-XXXSBOM management005
PMS-REP-XXXReporting processes004
PMS-ANN-XXXAnnual reviews005
PMS-FDA-XXXFDA reporting004
PMS-MDR-XXXMDR reporting004
PMS-NIS-XXXNIS2 reporting004
PMS-RSK-XXXRisk management004
PMS-THR-XXXThreat model002
PMS-PMS-XXXPMS integration004
PMS-PRO-XXXProcess integration004

Total Unique Plan IDs: 73

Appendix B: Regulatory Cross-Reference​

RegulationSectionRequirementPlan Section
FDA Cybersecurity GuidanceSection V.CVulnerability monitoringSection 2
FDA Cybersecurity GuidanceSection VICoordinated disclosureSection 6
MDR 2017/745Article 83Post-market surveillanceSection 9
MDR 2017/745Annex IIITechnical documentationSection 9
NIS2 DirectiveArticle 23Incident notificationSection 4.2
ISO/IEC 29147Section 6Disclosure policySection 6.1
IEC 62443-4-1Section 7.4Security updatesSection 5

Appendix C: Contact Information​

FunctionContactAvailability
Security Hotline+[Number]24/7
Security Emailsecurity@legithealth.comMonitored 24/7
On-Call SecurityVia PagerDuty24/7
Regulatory Affairsregulatory@legithealth.comBusiness hours
Customer Supportsupport@legithealth.comBusiness hours
Legal Counsellegal@legithealth.comBusiness hours

Appendix D: Acronyms and Definitions​

  • CVSS: Common Vulnerability Scoring System
  • CVE: Common Vulnerabilities and Exposures
  • CSIRT: Computer Security Incident Response Team
  • DDoS: Distributed Denial of Service
  • ENISA: European Union Agency for Cybersecurity
  • FDA: Food and Drug Administration
  • ICS-CERT: Industrial Control Systems Cyber Emergency Response Team
  • ISAC: Information Sharing and Analysis Center
  • MAUDE: Manufacturer and User Facility Device Experience
  • MDR: Medical Device Regulation
  • MITRE: Not an acronym (research organization)
  • NIS2: Network and Information Security Directive 2
  • NVD: National Vulnerability Database
  • SBOM: Software Bill of Materials
  • SIEM: Security Information and Event Management
  • SOC: Security Operations Center / Service Organization Control
  • SOUP: Software of Unknown Provenance
  • SPDX: Software Package Data Exchange
  • STIX/TAXII: Structured Threat Information Expression / Trusted Automated Exchange of Intelligence Information

Document Approval​

This Cybersecurity Post-Market Surveillance Plan has been reviewed and approved by:

RoleNameDateSignature
Technical Director[Name][Date][Signature]
Quality Manager[Name][Date][Signature]
Security Officer[Name][Date][Signature]
Regulatory Affairs Manager[Name][Date][Signature]
Medical Director[Name][Date][Signature]

End of Document - Version 1.0

This document is part of the Legit.Health Plus Quality Management System and is subject to change control procedures as defined in GP-001.

Previous
T-024-006 Threat Model Document
Next
T-024-009 Security Architecture Document
  • Executive Summary
    • Purpose and Scope
    • Regulatory Alignment
    • Integration with Overall Post-Market Surveillance
  • Document Control
  • Vulnerability Monitoring Program
    • Vulnerability Intelligence Sources
      • Primary Sources
      • Secondary Sources
    • SOUP/Third-Party Component Monitoring
      • Component Inventory Management
      • Monitoring Process
    • Threat Intelligence Integration
      • Threat Intelligence Feeds
      • Intelligence Processing Workflow
    • Security Bulletin Monitoring
  • Vulnerability Assessment Process
    • CVSS Scoring Methodology
      • Base Score Calculation
      • Environmental Score Modifiers
    • Risk Assessment Criteria
      • Severity Classification
      • Medical Device Specific Factors
    • Prioritization Matrix
      • Priority Levels
    • Impact Analysis Procedures
      • Technical Impact Assessment
      • Business Impact Assessment
  • Incident Response Framework
    • Detection and Reporting Procedures
      • Detection Mechanisms
      • Reporting Channels
    • NIS2 24/72-Hour Notification Requirements
      • 24-Hour Early Warning (Significant Incidents)
      • 72-Hour Incident Notification
    • Classification and Severity Levels
      • Incident Classification
      • Severity Levels
    • Response Team Roles and Responsibilities
      • Incident Response Team Structure
      • RACI Matrix for Incident Response
    • Communication Protocols
      • Internal Communication
      • External Communication
  • Security Update Management
    • Patch Development Process
      • Vulnerability Remediation Workflow
    • Testing and Validation Procedures
      • Security Patch Testing Requirements
      • Validation Checklist
    • Deployment Strategies
      • Deployment Models
      • Deployment Process
    • Customer Notification Procedures
      • Notification Timeline
      • Notification Content Template
    • Emergency Patch Procedures
      • Emergency Patch Criteria
      • Emergency Response Process
  • Coordinated Vulnerability Disclosure
    • Disclosure Policy
      • Responsible Disclosure Program
    • Researcher Engagement
      • Communication Channels
      • Researcher Recognition
    • Timeline for Remediation
      • Standard Disclosure Timeline
      • Expedited Timeline Triggers
    • Public Disclosure Process
      • Advisory Publication
  • Metrics and KPIs
    • Performance Metrics
      • Mean Time to Detect (MTTD)
      • Mean Time to Respond (MTTR)
      • Patch Deployment Rate
      • Vulnerability Closure Rate
    • Trend Analysis
      • Incident Frequency and Severity Trends
    • KPI Dashboard
  • Periodic Security Activities
    • Penetration Testing Schedule
      • Annual Penetration Testing Plan
      • Testing Requirements
    • Security Audits
      • Audit Schedule
      • Audit Criteria
    • Third-Party Assessments
      • Assessment Types
    • SBOM Updates
      • Software Bill of Materials Management
  • Documentation and Reporting
    • Monthly Security Reports
      • Report Components
      • Distribution List
    • Quarterly Trend Analysis
      • Analysis Framework
    • Annual Security Review
      • Comprehensive Annual Assessment
    • Regulatory Reporting Requirements
      • FDA Reporting
      • EU MDR Reporting
      • NIS2 Compliance Reporting
  • Integration Points
    • Risk Management Integration
      • Link to R-TF-013-002
    • Threat Model Maintenance
      • Link to T-024-006
    • Post-Market Surveillance Integration
      • Link to GP-009
    • Cybersecurity Procedures Alignment
      • Link to GP-013/GP-024
  • Plan Maintenance and Review
    • Review Schedule
    • Update Triggers
    • Change Control
  • Appendices
    • Appendix A: Plan ID Reference
    • Appendix B: Regulatory Cross-Reference
    • Appendix C: Contact Information
    • Appendix D: Acronyms and Definitions
  • Document Approval
All the information contained in this QMS is confidential. The recipient agrees not to transmit or reproduce the information, neither by himself nor by third parties, through whichever means, without obtaining the prior written permission of Legit.Health (AI LABS GROUP S.L.)