top of page
Search

What Does FDA Require for SaMD Cybersecurity?

  • Writer: Beng Ee Lim
    Beng Ee Lim
  • 2 days ago
  • 2 min read

TL;DR:


FDA’s 2025 draft mandates that SaMD developers provide a Software Bill of Materials (SBOM), threat model, secure-by-design evidence, and penetration-test results as part of premarket submissions. These must be embedded into your De Novo or 510(k) eSTAR modules.


SAMD Cybersecurity fda


Why Cybersecurity Matters for SaMD


With cyber-attacks on medical software rising and connected devices becoming more common, cybersecurity is no longer optional. The FDA has explicitly tied patient safety to strong cyber hygiene. Several warning letters in 2024 cited insufficient cyber documentation as the root cause for clearance delays. SaMD products face high scrutiny, especially those with network interfaces, data processing functions, or cloud dependencies.





Key 2025 Cybersecurity Expectations


1. SBOM (Software Bill of Materials)


The FDA expects a machine-readable SBOM that lists every software component, including:


  • Component name and version

  • Supplier

  • License type

  • Known vulnerabilities (linked to CVEs)


Use formats like CycloneDX or SPDX, and automate SBOM generation at build-time.


2. Threat Modeling


Map your architecture using STRIDE or PASTA frameworks to identify:


  • Entry points

  • Threat vectors

  • Mitigations applied


Attach diagrams and mitigation plans that align with your software risk profile.


3. Secure-by-Design Controls


Demonstrate implementation of controls like:


  • Encryption (at rest & in transit)

  • Role-based access control (RBAC)

  • Digital signatures / code signing


Evidence should show these controls were considered from early development.


4. Validation & Penetration Testing


Include:


  • Penetration test protocols

  • Red team test results

  • Fuzz testing summaries


Document vulnerabilities found, actions taken, and ensure test reproducibility.


5. Update & Patch Process


FDA wants to see:


  • Defined roles for monitoring & patching

  • 48–72 hour patch deployment window

  • Rollback strategy for failed patches


Include this as part of your risk control and maintenance documentation.





Submission Checklist

Deliverable

Description

Template / Tool

SBOM

Full component list (CycloneDX or SPDX format)

SBOM wizard export

Threat Model

STRIDE diagram + mitigation table

Threat-model template

Secure-by-Design Evidence

Architecture diagram with security controls highlighted

Secure-design slide

Penetration-Test Report

Third-party test summary, vulnerability log, remediation actions

Pen-test report PDF

Patch & Rollback Plan

Documented update process, roles, timelines, rollback criteria

Patch plan checklist




Best Practices & Pro Tips


  • Automate SBOM generation in your CI/CD pipeline (e.g., CycloneDX plugin).

  • Embed security tests in every build, not just pre-submission.

  • Link security docs to your IEC 62304/ISO 14971 traceability matrix—show how risk controls tie to cyber tests.

  • Use version control for SBOMs and threat-model artifacts (tag commits with submission versions).

  • Validate early with FDA’s pre-Sub Q-meeting to avoid last-minute surprises.



FAQ


Is an SBOM required for SaMD submissions?

Yes. FDA’s 2025 draft requires a complete SBOM for all premarket pathways.


What threat-modeling standard should I use?

STRIDE or PASTA are both acceptable. Pick one, be consistent, and provide mitigation documentation.


Do I need third-party penetration tests?

Yes. FDA expects independent pen-test results and remediation summaries, especially for connected or critical SaMD.


 
 

Never miss an update

Thanks for signing up!!

bottom of page