T-024-004 Security Risk Assessment Report
Scope
This document covers the security risk assessment report of the medical device.
It contains:
- The security risk analysis,
- The security risk assessment report,
- The security risk traceability matrixes with software requirements and test cases.
Terms and definitions
| Term | Definition |
|---|---|
| API | A set of rules and protocols that allows different software applications to communicate and interact with each other. |
| Health Care Provider | Organization that delivers medical services to individuals |
| REST API | Representational State Transfer Application Programming Interface, a type of web service that allows communication between systems over HTTP. |
| Security Level (SL) | It represents the degree to which a system or component can withstand threats and potential attacks. |
| Capability Security Level (CSL) | It specifies the degree to which a component, such as a device, system or application, meets the security requirements necessary to resist certain threats |
| Transport Layer Security (TLS) | A cryptographic protocol designed to provide secure communication over a computer network. It is widely used to secure communications over the internet. |
Risk analysis
Intended use
The intended use is available in the Device description and specifications document.
Context of risk assessment
The context of risk assessment is the environment in which the device operates, including the hardware, software, network, and any external systems it interacts with. This context helps to identify potential threats and vulnerabilities that could impact the security of the device.
Assets
Provide a list of assets that are relevant to the device, including hardware, software, data, and any other components that are critical to its operation.
Actors
Actors are individuals or entities that interact with the device, such as users, administrators, and external systems. Identifying actors helps to understand their roles and responsibilities in relation to the device's security.
Diagrams
Connection diagrams
The connection diagrams show how the system components are connected together and what are the type connections.
They are available in the section Global System Views of the document T-012-029 Software Architecture Description.
Data flow diagrams
The data-flow diagrams show the data exchanged between the system components.
They are available in the section Global System Views of the document T-012-029 Software Architecture Description.
Threat model diagram
The threat model diagram provides a visual representation of the potential threats to the system, including the assets, actors, and their interactions. It helps to identify vulnerabilities and assess the risk associated with each threat.
Multi-patient harm view
The multi-Patient harm view is available in the section view Multi-Patient Harm View of the document T-012-029 Software Architecture Description.