Moving Forward: Collaborative Approaches to Medical Device Cybersecurity; Public Workshop; Request for Comments, 76022-76025 [2015-30772]
Download as PDF
76022
Federal Register / Vol. 80, No. 234 / Monday, December 7, 2015 / Notices
Demonstration Projects’’ study. This
notice addresses the cross-site process
evaluation to be conducted with the FY
2015 domestic human trafficking
demonstration sites funded by the
Family and Youth Services Bureau
(FYSB).
The objective of the process
evaluation is to describe program
operations and implementation
experience, such as start-up efforts,
service provision to a wide array of
trafficking victims, collaboration
development, training, and
sustainability actions. Information from
the evaluation will assist federal, state,
and community policymakers and
funders in laying the groundwork for
the refinement of program models to
serve domestic victims of human
trafficking, as well as evaluation
strategies for future programs targeting
trafficking victims.
The evaluation of domestic human
trafficking demonstration projects will
document and describe each site’s
community and organizational capacity;
partnership composition and
functioning; comprehensive, victimcentered services; and survivor
characteristics, experiences, and
outcomes. Primary data for the
evaluation will be collected via
qualitative interviews, including key
informant interviews, case narrative
interviews and client interviews. Data
will be collected in two waves, during
2016 and 2017. Only the case narrative
interviews will include follow up
interviews. Interviews from multiple
perspectives will enhance the
government’s understanding of
strategies by which grantees can
identify, engage and serve diverse
populations of victims of sever forms of
human trafficking.
Respondents: Case managers at the
three FY 2015 FYSB funded
demonstration projects; staff (e.g.,
program managers and directors) from
partner organizations that are working
with the three FY 2015 FYSB-funded
demonstration projects; and clients who
have received services from the three FY
2015 FYSB-funded demonstration
projects.
ANNUAL BURDEN ESTIMATES
Total number
of respondents
Instrument
mstockstill on DSK4VPTVN1PROD with NOTICES
Partner Interviews ................................................................
Case Manger Interview ........................................................
Case Narrative Interview .....................................................
Client Interview ....................................................................
Project Director Interview .....................................................
Estimated Total Annual Burden
Hours: 74.
In compliance with the requirements
of Section 3506(c)(2)(A) of the
Paperwork Reduction Act of 1995, the
Administration for Children and
Families is soliciting public comment
on the specific aspects of the
information collection described above.
Copies of the proposed collection of
information can be obtained and
comments may be forwarded by writing
to the Administration for Children and
Families, Office of Planning, Research
and Evaluation, 330 C Street SW.,
Washington, DC 20201, Attn: OPRE
Reports Clearance Officer. Email
address: OPREinfocollection@
acf.hhs.gov. All requests should be
identified by the title of the information
collection.
The Department specifically requests
comments on (a) whether the proposed
collection of information is necessary
for the proper performance of the
functions of the agency, including
whether the information shall have
practical utility; (b) the accuracy of the
agency’s estimate of the burden of the
proposed collection of information; (c)
the quality, utility, and clarity of the
information to be collected; and (d)
ways to minimize the burden of the
collection of information on
respondents, including through the use
of automated collection techniques or
VerDate Sep<11>2014
18:36 Dec 04, 2015
Jkt 238001
Annual
number of
respondents
30
30
30
30
6
15
15
15
15
3
other forms of information technology.
Consideration will be given to
comments and suggestions submitted
within 60 days of this publication.
Robert Sargis,
ACF Certifying Officer.
[FR Doc. 2015–30742 Filed 12–4–15; 8:45 am]
BILLING CODE 4184–01–P
DEPARTMENT OF HEALTH AND
HUMAN SERVICES
Food and Drug Administration
[Docket No. FDA–2014–N–1286]
Moving Forward: Collaborative
Approaches to Medical Device
Cybersecurity; Public Workshop;
Request for Comments
AGENCY:
Food and Drug Administration,
HHS.
Notice of public workshop;
request for comments.
ACTION:
The Food and Drug
Administration (FDA) is announcing the
following public workshop entitled
‘‘Moving Forward: Collaborative
Approaches to Medical Device
Cybersecurity.’’ FDA, in collaboration
with the National Health Information
Sharing Analysis Center (NH–ISAC), the
Department of Health and Human
Services, and the Department of
SUMMARY:
PO 00000
Frm 00064
Fmt 4703
Sfmt 4703
Number of
responses per
respondent
1
1
1
1
1
Average
burden hours
per response
1.25
1.25
1
1
2
Annual burden
hours
19
19
15
15
6
Homeland Security, seek to bring
together diverse stakeholders to discuss
complex challenges in medical device
cybersecurity that impact the medical
device ecosystem. The purpose of this
workshop is to highlight past
collaborative efforts; increase awareness
of existing maturity models (i.e.
frameworks leveraged for benchmarking
an organization’s processes) which are
used to evaluate cybersecurity status,
standards, and tools in development;
and to engage the multi-stakeholder
community in focused discussions on
unresolved gaps and challenges that
have hampered progress in advancing
medical device cybersecurity.
DATES: The public workshop will be
held January 20–21, 2016, from 9 a.m.
to 5:30 p.m. Submit either electronic or
written comments on the public
workshop by February 22, 2016.
ADDRESSES: The public workshop will
be held at the FDA White Oak Campus,
10903 New Hampshire Ave., Building
31 Conference Center, the Great Room,
(Rm. 1503), Silver Spring, MD 20993–
0002. Entrance for the public meeting
participants (non-FDA employees) is
through Building 1 where routine
security check procedures will be
performed. For parking and security
information, please refer to https://www.
fda.gov/AboutFDA/WorkingatFDA/
BuildingsandFacilities/WhiteOak
CampusInformation/ucm241740.htm.
E:\FR\FM\07DEN1.SGM
07DEN1
mstockstill on DSK4VPTVN1PROD with NOTICES
Federal Register / Vol. 80, No. 234 / Monday, December 7, 2015 / Notices
You may submit comments as
follows:
Electronic Submissions
Submit electronic comments in the
following way:
• Federal eRulemaking Portal: https://
www.regulations.gov. Follow the
instructions for submitting comments.
Comments submitted electronically,
including attachments, to https://
www.regulations.gov will be posted to
the docket unchanged. Because your
comment will be made public, you are
solely responsible for ensuring that your
comment does not include any
confidential information that you or a
third party may not wish to be posted,
such as medical information, your or
anyone else’s Social Security number, or
confidential business information, such
as a manufacturing process. Please note
that if you include your name, contact
information, or other information that
identifies you in the body of your
comments, that information will be
posted on https://www.regulations.gov.
• If you want to submit a comment
with confidential information that you
do not wish to be made available to the
public, submit the comment as a
written/paper submission and in the
manner detailed (see ‘‘Written/Paper
Submissions’’ and ‘‘Instructions’’).
Written/Paper Submissions
Submit written/paper submissions as
follows:
• Mail/Hand delivery/Courier (for
written/paper submissions): Division of
Dockets Management (HFA–305), Food
and Drug Administration, 5630 Fishers
Lane, Rm. 1061, Rockville, MD 20852.
• For written/paper comments
submitted to the Division of Dockets
Management, FDA will post your
comment, as well as any attachments,
except for information submitted,
marked and identified, as confidential,
if submitted as detailed in
‘‘Instructions.’’
Instructions: All submissions received
must include the Docket No. FDA–
2014–N–1286 for ‘‘Moving Forward:
Collaborative Approaches to Medical
Device Cybersecurity.’’ Received
comments will be placed in the docket
and, except for those submitted as
‘‘Confidential Submissions,’’ publicly
viewable at https://www.regulations.gov
or at the Division of Dockets
Management between 9 a.m. and 4 p.m.,
Monday through Friday.
• Confidential Submissions—To
submit a comment with confidential
information that you do not wish to be
made publicly available, submit your
comments only as a written/paper
submission. You should submit two
copies total. One copy will include the
VerDate Sep<11>2014
18:36 Dec 04, 2015
Jkt 238001
information you claim to be confidential
with a heading or cover note that states
‘‘THIS DOCUMENT CONTAINS
CONFIDENTIAL INFORMATION’’. The
Agency will review this copy, including
the claimed confidential information, in
its consideration of comments. The
second copy, which will have the
claimed confidential information
redacted/blacked out, will be available
for public viewing and posted on https://
www.regulations.gov. Submit both
copies to the Division of Dockets
Management. If you do not wish your
name and contact information to be
made publicly available, you can
provide this information on the cover
sheet and not in the body of your
comments and you must identify this
information as ‘‘confidential.’’ Any
information marked as ‘‘confidential’’
will not be disclosed except in
accordance with 21 CFR 10.20 and other
applicable disclosure law. For more
information about FDA’s posting of
comments to public dockets, see 80 FR
56469, September 18, 2015, or access
the information at: https://www.fda.gov/
regulatoryinformation/dockets/
default.htm.
Docket: For access to the docket to
read background documents or the
electronic and written/paper comments
received, go to https://
www.regulations.gov and insert the
docket number, found in brackets in the
heading of this document, into the
‘‘Search’’ box and follow the prompts
and/or go to the Division of Dockets
Management, 5630 Fishers Lane, Rm.
1061, Rockville, MD 20852.
FOR FURTHER INFORMATION CONTACT:
Suzanne Schwartz, Food and Drug
Administration, Center for Devices and
Radiological Health, 10903 New
Hampshire Ave., Bldg. 66, Rm. 5428,
Silver Spring, MD 20993, 301–796–
6937, Suzanne.Schwartz@fda.hhs.gov.
SUPPLEMENTARY INFORMATION:
I. Background
Effective medical device cybersecurity
to assure device safety and functionality
has become more important with the
increasing use of wireless, Internet- and
network-connected devices, and the
frequent electronic exchange of medical
device-related health information. As
medical devices become more
connected and interoperable, the
potential for exploit of device
vulnerabilities, whether intentional or
not, increases. Rather than impacting a
single device or single system, multiple
devices or an entire hospital network
may be compromised. In the past, the
Healthcare and Public Health (HPH)
sector has been the target of many
PO 00000
Frm 00065
Fmt 4703
Sfmt 4703
76023
attempts at intrusion. Protecting the
HPH critical infrastructure from attack
by strengthening cybersecurity is a high
priority for the Federal government.
Cybersecurity is the subject of recent
Executive Orders focused on enhancing
the cybersecurity of critical
infrastructure (E.O. 13636) (Ref. 1) and
increasing cybersecurity information
sharing (E.O. 13691) (Ref. 2).
Furthermore, Presidential Policy
Directive 21 tasks the Federal
government to work together with the
private sector in order to strengthen the
security and resilience of critical
infrastructure against physical and
cyber threats (Ref. 3). This public
workshop will bring together diverse
stakeholders from the public and private
sector to discuss the current state of
medical device cybersecurity, including
its evolution over the past 12 months.
Moreover, the workshop plans to
provide a vision for the desired state of
medical device cybersecurity through
ongoing collaboration and new
partnerships over the next 12 months.
Meeting participants are encouraged to
formulate strategies and feasible action
plans to address gaps, such as
management of vulnerabilities in legacy
devices. These diverse stakeholders
include, but are not limited to: Medical
device manufacturers; healthcare
facilities and personnel (e.g., healthcare
providers, biomedical engineers, IT
system administrators); professional and
trade organizations including medical
device cybersecurity consortia; patient
groups; insurance providers;
cybersecurity researchers; local, State,
and Federal Governments; and
information security firms.
A voluntary, risk-based framework for
achieving enhanced cybersecurity was
developed by the National Institute of
Standards and Technology (NIST) in
collaboration with external public and
private sector partners (Ref. 4). Since its
release in February 2014, the
‘‘Framework for Improving Critical
Infrastructure Cybersecurity’’
(Framework) has been leveraged by
entities within the HPH sector to better
manage and reduce cybersecurity risks.
This workshop aims to highlight some
of the ways that the Framework has
been employed to better understand,
manage, communicate, and mitigate
medical device cybersecurity risks
across the medical device total product
lifecycle.
Medical device cybersecurity
vulnerabilities, if exploited, may result
in device malfunction, disruption of
healthcare services including treatment
interventions, inappropriate access to
patient information, or compromised
electronic health record data integrity.
E:\FR\FM\07DEN1.SGM
07DEN1
mstockstill on DSK4VPTVN1PROD with NOTICES
76024
Federal Register / Vol. 80, No. 234 / Monday, December 7, 2015 / Notices
Such outcomes could have a profound
impact on patient care and safety. In the
last few years, HPH sector stakeholders
have been engaged in many
collaborative activities that seek to
strengthen medical device cybersecurity
and, therefore, enhance patient safety.
FDA has contributed to these efforts
through guidance, multi-stakeholder
engagement, outreach, and by hosting a
2014 public workshop on cybersecurity
(Ref. 5). The 2016 public workshop
announced in this Federal Register
notice will build upon previous work by
featuring some of the collaborative
efforts that address medical device
cybersecurity through education and
training, information sharing, standards,
risk assessment, and tools development.
Though progress is evident, key
hurdles continue to impede maturation
of the HPH community’s cybersecurity
posture. This workshop seeks to
increase awareness among stakeholders
and create a common understanding of
potential threats and vulnerabilities, as
well as to present proactive preventative
measures that may be universally
employed as best practices and good
cyber hygiene. The workshop also aims
to facilitate extensive dialogue and
articulate paths forward in the critical
areas of information sharing,
coordinated vulnerability disclosure
and vulnerability management, and the
Common Vulnerability Scoring System
(CVSS). Information sharing continues
to be a challenge as stakeholders work
to define processes to create a trusted
environment. Coordinated vulnerability
disclosure is an important component of
information sharing. Proactively
identifying, assessing, and managing
medical device vulnerabilities before
they are exploited is one way to protect
against potential patient harm.
Vulnerabilities may be identified by the
device manufacturer as well as by
external entities such as healthcare
facilities, cybersecurity researchers, and
other sectors of critical infrastructure.
As described in International
Organization for Standardization/
International Electrotechnical
Commission 29147:2014, ‘‘Coordinated
disclosure, also known as responsible
disclosure, is a vulnerability disclosure
model in which all stakeholders agree to
delay publishing vulnerability details
for an agreed-upon period of time,
generally after a patch to mitigate the
vulnerability is available. The model
includes steps that simplify the
otherwise-complex, back-and-forth
communications between the
vulnerability finder and the affected
manufacturer’’ (Ref. 6). Coordinated
disclosure is just one aspect of
VerDate Sep<11>2014
18:36 Dec 04, 2015
Jkt 238001
vulnerability management.
Understanding how a vulnerability may
affect device functionality, assessing the
vulnerability impact across multiple
product types, and identifying
mitigations that may be employed until
a permanent fix may be implemented
are all critical components of
vulnerability management that should
be addressed throughout the medical
device total product lifecycle. This
workshop provides an opportunity for
stakeholders to explore implementation
of coordinated vulnerability disclosure
and vulnerability management,
including existing standards, models,
best practices, and lessons learned in
this area.
One of the tools that manufacturers or
healthcare facilities may use to assess
and manage the impact of vulnerability
is CVSS. CVSS is a risk assessment tool
that provides an open and standardized
method for rating information
technology vulnerabilities. However,
incorporating CVSS into medical device
vulnerability assessments has proven to
be a challenge in that it does not
directly incorporate patient risk and
public health impact factors. This
workshop encourages robust dialogue
on how CVSS might be adapted for
medical devices and how considerations
of the use environment might be
incorporated in a more standardized
manner into medical device CVSS
scores.
II. Topics for Discussion at the Public
Workshop
The public workshop sessions are
designed to incorporate the following
general themes:
• Envisioning a roadmap for
coordinated vulnerability disclosure
and vulnerability management as part of
the broader effort to create a trusted
environment for information sharing.
Æ How might the stakeholder
community create incentives to
encourage stakeholder participation?
Æ What do individual stakeholders
need to understand and be aware of
regarding coordinated disclosure?
Æ What current tools and models
presently exist that may aid
stakeholders in implementing
disclosure and vulnerability
management?
Æ How can the security researcher
community work in collaboration with
HPH stakeholders to identify, assess,
and mitigate vulnerabilities?
• Sharing FDA’s current thinking on
the implementation of the Framework in
the medical device total product
lifecycle.
• Adapting cybersecurity and/or risk
assessment tools such as CVSS for the
PO 00000
Frm 00066
Fmt 4703
Sfmt 4703
medical device operational
environment.
• Adapting and/or implementing
existing cybersecurity standards for
medical devices.
• Understanding the challenges that
manufacturers face as they increase
collaboration with external third parties
(cybersecurity researchers, Information
Sharing and Analysis Organizations
(ISAOs), and end users), to resolve
cybersecurity vulnerabilities that impact
their devices. Note that an ISAO is a
group created to gather, analyze, and
disseminate critical infrastructure
information (Ref. 7).
• Gaining situational awareness of the
current activities in the HPH sector to
enhance medical device cybersecurity.
• Identifying cybersecurity gaps and
challenges that persist in the medical
device ecosystem and begin crafting
action plans to address them.
Registration: Registration is free and
available on a first-come, first-served
basis. Persons interested in attending
this public workshop must register
online by January 13, 2016, at 4 p.m.
Early registration is recommended
because facilities are limited and,
therefore, FDA may limit the number of
participants from each organization. If
time and space permits, onsite
registration on the day of the public
workshop will be provided beginning at
8 a.m.
If you need special accommodations
due to a disability, please contact Susan
Monahan, Center for Devices and
Radiological Health, Office of
Communication and Education, 301–
796–5661 or email: susan.monahan@
fda.hhs.gov no later than January 7,
2016.
Please provide complete contact
information for each attendee, including
name, title, affiliation, email, and
telephone number. Those without
Internet access should contact Susan
Monahan to register. Registrants will
receive confirmation after they have
been accepted. You will be notified if
you are on a waiting list.
Streaming Webcast of the Public
Workshop: This public workshop will
also be Webcast. The Webcast link will
be available on the registration Web
page after January 13, 2016. Please visit
FDA’s Medical Devices News &
Events—Workshops & Conferences
calendar at https://www.fda.gov/Medical
Devices/NewsEvents/Workshops
Conferences/default.htm. Select this
meeting/public workshop from the
posted events list. If you have never
attended a Connect Pro event before,
test your connection at https://
collaboration.fda.gov/common/help/en/
support/meeting_test.htm. To get a
E:\FR\FM\07DEN1.SGM
07DEN1
Federal Register / Vol. 80, No. 234 / Monday, December 7, 2015 / Notices
quick overview of the Connect Pro
program, visit https://www.adobe.com/
go/connectpro_overview. FDA has
verified the Web site addresses in this
document, but FDA is not responsible
for any subsequent changes to the Web
site after this document publishes in the
Federal Register.
Transcripts: Please be advised that as
soon as a transcript is available, it will
be accessible at https://
www.regulations.gov. It may be viewed
at the Division of Dockets Management
(see ADDRESSES). A transcript will also
be available in either hardcopy or on
CD–ROM, after submission of a
Freedom of Information request. The
Freedom of Information office address is
available on the Agency’s Web site at
https://www.fda.gov. A link to the
transcripts will also be available
approximately 45 days after the public
workshop on the Internet at https://www.
fda.gov/MedicalDevices/NewsEvents/
WorkshopsConferences/default.htm.
(Select this public workshop from the
posted events list).
mstockstill on DSK4VPTVN1PROD with NOTICES
III. References
The following references are on
display in the Division of Dockets
Management (see ADDRESSES) and are
available for viewing by interested
persons between 9 a.m. and 4 p.m.,
Monday through Friday; they are also
available electronically at https://
www.regulations.gov. FDA has verified
the Web site addresses, as of the date
this document publishes in the Federal
Register, but Web sites are subject to
change over time.
1. Executive Order 13636, ‘‘Improving
Critical Infrastructure Cybersecurity,’’
February 19, 2013 (https://www.gpo.gov/
fdsys/pkg/FR-2013-02-19/pdf/201303915.pdf).
2. Executive Order 13691, ‘‘Promoting Private
Sector Cybersecurity Information
Sharing,’’ February 13, 2015 (https://
www.gpo.gov/fdsys/pkg/FR-2015-02-20/
pdf/2015-03714.pdf).
3. Presidential Policy Directive 21, ‘‘Critical
Infrastructure Security and Resilience,’’
February 12, 2013 (https://
www.whitehouse.gov/the-press-office/
2013/02/12/presidential-policy-directivecritical-infrastructure-security-and-resil).
4. National Institute of Standards and
Technology (NIST), ‘‘Framework for
Improving Critical Infrastructure
Cybersecurity,’’ version 1, February 12,
2014 (https://www.nist.gov/cyberframe
work/upload/cybersecurity-framework021214-final.pdf).
5. Food and Drug Administration, ‘‘Public
Workshop—Collaborative Approaches
for Medical Device and Healthcare
Cybersecurity, October 21–22, 2014.’’
October 11, 2015 (https://www.fda.gov/
MedicalDevices/NewsEvents/Workshops
Conferences/ucm412979.htm).
VerDate Sep<11>2014
18:36 Dec 04, 2015
Jkt 238001
6. ‘‘ISO/IEC 29147:2014—Information
Technology—Security Techniques—
Vulnerability Disclosure,’’ (https://www.
iso.org/iso/catalogue_detail.htm
?csnumber=45170).
7. Department of Homeland Security,
‘‘Frequently Asked Questions About
Information Sharing and Analysis
Organizations (ISAOs),’’ November 17,
2015 (https://www.dhs.gov/isao-faq).
Dated: December 2, 2015.
Peter Lurie,
Associate Commissioner for Public Health
Strategy and Analysis.
[FR Doc. 2015–30772 Filed 12–4–15; 8:45 am]
BILLING CODE 4164–01–P
DEPARTMENT OF HEALTH AND
HUMAN SERVICES
Meeting of the Advisory Group on
Prevention, Health Promotion, and
Integrative and Public Health
Department of Health and
Human Services, Office of the Secretary,
Office of the Assistant Secretary for
Health, Office of the Surgeon General of
the United States Public Health Service.
ACTION: Notice.
AGENCY:
In accordance with Section
10(a) of the Federal Advisory Committee
Act, Public Law 92–463, as amended (5
U.S.C. App.), notice is hereby given that
a meeting is scheduled for the Advisory
Group on Prevention, Health Promotion,
and Integrative and Public Health (the
‘‘Advisory Group’’). This meeting will
be open to the public. Information about
the Advisory Group and the agenda for
this meeting can be obtained by
accessing the following Web site: https://
www.surgeongeneral.gov/priorities/
prevention/advisorygrp/.
DATES: The meeting will be held on
December 22, 2015. The exact meeting
time will be published closer to the
meeting date at: https://www.surgeon
general.gov/priorities/prevention/
advisorygrp/advisory-groupmeetings.html.
ADDRESSES: This meeting will be held
via teleconference. Teleconference
information and an exact meeting time
will be published closer to the meeting
date at: https://www.surgeongeneral.gov/
priorities/prevention/advisorygrp/
index.html.
FOR FURTHER INFORMATION CONTACT:
Office of the Surgeon General, 200
Independence Ave. SW.; Washington,
DC 20201; 202–205–9517;
prevention.council@hhs.gov.
SUPPLEMENTARY INFORMATION: The
Advisory Group is a non-discretionary
federal advisory committee that was
initially established under Executive
SUMMARY:
PO 00000
Frm 00067
Fmt 4703
Sfmt 4703
76025
Order 13544, dated June 10, 2010, to
comply with the statutes under Section
4001 of the Patient Protection and
Affordable Care Act, Public Law 111–
148. The Advisory Group was
established to assist in carrying out the
mission of the National Prevention,
Health Promotion, and Public Health
Council (the Council). The Advisory
Group provides recommendations and
advice to the Council.
The Advisory Group was terminated
on September 30, 2012, by Executive
Order 13591, dated November 23, 2011.
Authority for the Advisory Group to be
re-established was given under
Executive Order 13631, dated December
7, 2012. Authority for the Advisory
Group to continue to operate until
September 30, 2017, was given under
Executive Order 13708, dated
September 30, 2015.
It is authorized for the Advisory
Group to consist of no more than 25
non-federal members. The Advisory
Group currently has 21 members who
were appointed by the President. The
membership includes a diverse group of
licensed health professionals, including
integrative health practitioners who
have expertise in (1) worksite health
promotion; (2) community services,
including community health centers; (3)
preventive medicine; (4) health
coaching; (5) public health education;
(6) geriatrics; and (7) rehabilitation
medicine.
A meeting description and relevant
materials will be published closer to the
meeting date at: https://www.surgeon
general.gov/priorities/prevention/
advisorygrp/.
Members of the public have the
opportunity to participate in the
meeting and/or provide comments to
the Advisory Group on December 22,
2015. Public comment will be limited to
3 minutes per speaker. Individuals who
wish to participate in the meeting and/
or provide comments must register by
12:00 p.m. EST on December 15, 2015.
In order to register, individuals must
send their full name and affiliation via
email to prevention.council@hhs.gov.
Individuals who need special assistance
and/or accommodations, i.e., TDD/VP or
other reasonable accommodations,
should indicate so when they register.
Members of the public who wish to
have materials distributed to the
Advisory Group members at this
scheduled meeting should submit those
materials when they register.
E:\FR\FM\07DEN1.SGM
07DEN1
Agencies
[Federal Register Volume 80, Number 234 (Monday, December 7, 2015)]
[Notices]
[Pages 76022-76025]
From the Federal Register Online via the Government Publishing Office [www.gpo.gov]
[FR Doc No: 2015-30772]
-----------------------------------------------------------------------
DEPARTMENT OF HEALTH AND HUMAN SERVICES
Food and Drug Administration
[Docket No. FDA-2014-N-1286]
Moving Forward: Collaborative Approaches to Medical Device
Cybersecurity; Public Workshop; Request for Comments
AGENCY: Food and Drug Administration, HHS.
ACTION: Notice of public workshop; request for comments.
-----------------------------------------------------------------------
SUMMARY: The Food and Drug Administration (FDA) is announcing the
following public workshop entitled ``Moving Forward: Collaborative
Approaches to Medical Device Cybersecurity.'' FDA, in collaboration
with the National Health Information Sharing Analysis Center (NH-ISAC),
the Department of Health and Human Services, and the Department of
Homeland Security, seek to bring together diverse stakeholders to
discuss complex challenges in medical device cybersecurity that impact
the medical device ecosystem. The purpose of this workshop is to
highlight past collaborative efforts; increase awareness of existing
maturity models (i.e. frameworks leveraged for benchmarking an
organization's processes) which are used to evaluate cybersecurity
status, standards, and tools in development; and to engage the multi-
stakeholder community in focused discussions on unresolved gaps and
challenges that have hampered progress in advancing medical device
cybersecurity.
DATES: The public workshop will be held January 20-21, 2016, from 9
a.m. to 5:30 p.m. Submit either electronic or written comments on the
public workshop by February 22, 2016.
ADDRESSES: The public workshop will be held at the FDA White Oak
Campus, 10903 New Hampshire Ave., Building 31 Conference Center, the
Great Room, (Rm. 1503), Silver Spring, MD 20993-0002. Entrance for the
public meeting participants (non-FDA employees) is through Building 1
where routine security check procedures will be performed. For parking
and security information, please refer to https://www.fda.gov/AboutFDA/WorkingatFDA/BuildingsandFacilities/WhiteOakCampusInformation/ucm241740.htm.
[[Page 76023]]
You may submit comments as follows:
Electronic Submissions
Submit electronic comments in the following way:
Federal eRulemaking Portal: https://www.regulations.gov.
Follow the instructions for submitting comments. Comments submitted
electronically, including attachments, to https://www.regulations.gov
will be posted to the docket unchanged. Because your comment will be
made public, you are solely responsible for ensuring that your comment
does not include any confidential information that you or a third party
may not wish to be posted, such as medical information, your or anyone
else's Social Security number, or confidential business information,
such as a manufacturing process. Please note that if you include your
name, contact information, or other information that identifies you in
the body of your comments, that information will be posted on https://www.regulations.gov.
If you want to submit a comment with confidential
information that you do not wish to be made available to the public,
submit the comment as a written/paper submission and in the manner
detailed (see ``Written/Paper Submissions'' and ``Instructions'').
Written/Paper Submissions
Submit written/paper submissions as follows:
Mail/Hand delivery/Courier (for written/paper
submissions): Division of Dockets Management (HFA-305), Food and Drug
Administration, 5630 Fishers Lane, Rm. 1061, Rockville, MD 20852.
For written/paper comments submitted to the Division of
Dockets Management, FDA will post your comment, as well as any
attachments, except for information submitted, marked and identified,
as confidential, if submitted as detailed in ``Instructions.''
Instructions: All submissions received must include the Docket No.
FDA-2014-N-1286 for ``Moving Forward: Collaborative Approaches to
Medical Device Cybersecurity.'' Received comments will be placed in the
docket and, except for those submitted as ``Confidential Submissions,''
publicly viewable at https://www.regulations.gov or at the Division of
Dockets Management between 9 a.m. and 4 p.m., Monday through Friday.
Confidential Submissions--To submit a comment with
confidential information that you do not wish to be made publicly
available, submit your comments only as a written/paper submission. You
should submit two copies total. One copy will include the information
you claim to be confidential with a heading or cover note that states
``THIS DOCUMENT CONTAINS CONFIDENTIAL INFORMATION''. The Agency will
review this copy, including the claimed confidential information, in
its consideration of comments. The second copy, which will have the
claimed confidential information redacted/blacked out, will be
available for public viewing and posted on https://www.regulations.gov.
Submit both copies to the Division of Dockets Management. If you do not
wish your name and contact information to be made publicly available,
you can provide this information on the cover sheet and not in the body
of your comments and you must identify this information as
``confidential.'' Any information marked as ``confidential'' will not
be disclosed except in accordance with 21 CFR 10.20 and other
applicable disclosure law. For more information about FDA's posting of
comments to public dockets, see 80 FR 56469, September 18, 2015, or
access the information at: https://www.fda.gov/regulatoryinformation/dockets/default.htm.
Docket: For access to the docket to read background documents or
the electronic and written/paper comments received, go to https://www.regulations.gov and insert the docket number, found in brackets in
the heading of this document, into the ``Search'' box and follow the
prompts and/or go to the Division of Dockets Management, 5630 Fishers
Lane, Rm. 1061, Rockville, MD 20852.
FOR FURTHER INFORMATION CONTACT: Suzanne Schwartz, Food and Drug
Administration, Center for Devices and Radiological Health, 10903 New
Hampshire Ave., Bldg. 66, Rm. 5428, Silver Spring, MD 20993, 301-796-
6937, Suzanne.Schwartz@fda.hhs.gov.
SUPPLEMENTARY INFORMATION:
I. Background
Effective medical device cybersecurity to assure device safety and
functionality has become more important with the increasing use of
wireless, Internet- and network-connected devices, and the frequent
electronic exchange of medical device-related health information. As
medical devices become more connected and interoperable, the potential
for exploit of device vulnerabilities, whether intentional or not,
increases. Rather than impacting a single device or single system,
multiple devices or an entire hospital network may be compromised. In
the past, the Healthcare and Public Health (HPH) sector has been the
target of many attempts at intrusion. Protecting the HPH critical
infrastructure from attack by strengthening cybersecurity is a high
priority for the Federal government. Cybersecurity is the subject of
recent Executive Orders focused on enhancing the cybersecurity of
critical infrastructure (E.O. 13636) (Ref. 1) and increasing
cybersecurity information sharing (E.O. 13691) (Ref. 2). Furthermore,
Presidential Policy Directive 21 tasks the Federal government to work
together with the private sector in order to strengthen the security
and resilience of critical infrastructure against physical and cyber
threats (Ref. 3). This public workshop will bring together diverse
stakeholders from the public and private sector to discuss the current
state of medical device cybersecurity, including its evolution over the
past 12 months. Moreover, the workshop plans to provide a vision for
the desired state of medical device cybersecurity through ongoing
collaboration and new partnerships over the next 12 months. Meeting
participants are encouraged to formulate strategies and feasible action
plans to address gaps, such as management of vulnerabilities in legacy
devices. These diverse stakeholders include, but are not limited to:
Medical device manufacturers; healthcare facilities and personnel
(e.g., healthcare providers, biomedical engineers, IT system
administrators); professional and trade organizations including medical
device cybersecurity consortia; patient groups; insurance providers;
cybersecurity researchers; local, State, and Federal Governments; and
information security firms.
A voluntary, risk-based framework for achieving enhanced
cybersecurity was developed by the National Institute of Standards and
Technology (NIST) in collaboration with external public and private
sector partners (Ref. 4). Since its release in February 2014, the
``Framework for Improving Critical Infrastructure Cybersecurity''
(Framework) has been leveraged by entities within the HPH sector to
better manage and reduce cybersecurity risks. This workshop aims to
highlight some of the ways that the Framework has been employed to
better understand, manage, communicate, and mitigate medical device
cybersecurity risks across the medical device total product lifecycle.
Medical device cybersecurity vulnerabilities, if exploited, may
result in device malfunction, disruption of healthcare services
including treatment interventions, inappropriate access to patient
information, or compromised electronic health record data integrity.
[[Page 76024]]
Such outcomes could have a profound impact on patient care and safety.
In the last few years, HPH sector stakeholders have been engaged in
many collaborative activities that seek to strengthen medical device
cybersecurity and, therefore, enhance patient safety. FDA has
contributed to these efforts through guidance, multi-stakeholder
engagement, outreach, and by hosting a 2014 public workshop on
cybersecurity (Ref. 5). The 2016 public workshop announced in this
Federal Register notice will build upon previous work by featuring some
of the collaborative efforts that address medical device cybersecurity
through education and training, information sharing, standards, risk
assessment, and tools development.
Though progress is evident, key hurdles continue to impede
maturation of the HPH community's cybersecurity posture. This workshop
seeks to increase awareness among stakeholders and create a common
understanding of potential threats and vulnerabilities, as well as to
present proactive preventative measures that may be universally
employed as best practices and good cyber hygiene. The workshop also
aims to facilitate extensive dialogue and articulate paths forward in
the critical areas of information sharing, coordinated vulnerability
disclosure and vulnerability management, and the Common Vulnerability
Scoring System (CVSS). Information sharing continues to be a challenge
as stakeholders work to define processes to create a trusted
environment. Coordinated vulnerability disclosure is an important
component of information sharing. Proactively identifying, assessing,
and managing medical device vulnerabilities before they are exploited
is one way to protect against potential patient harm. Vulnerabilities
may be identified by the device manufacturer as well as by external
entities such as healthcare facilities, cybersecurity researchers, and
other sectors of critical infrastructure. As described in International
Organization for Standardization/International Electrotechnical
Commission 29147:2014, ``Coordinated disclosure, also known as
responsible disclosure, is a vulnerability disclosure model in which
all stakeholders agree to delay publishing vulnerability details for an
agreed-upon period of time, generally after a patch to mitigate the
vulnerability is available. The model includes steps that simplify the
otherwise-complex, back-and-forth communications between the
vulnerability finder and the affected manufacturer'' (Ref. 6).
Coordinated disclosure is just one aspect of vulnerability management.
Understanding how a vulnerability may affect device functionality,
assessing the vulnerability impact across multiple product types, and
identifying mitigations that may be employed until a permanent fix may
be implemented are all critical components of vulnerability management
that should be addressed throughout the medical device total product
lifecycle. This workshop provides an opportunity for stakeholders to
explore implementation of coordinated vulnerability disclosure and
vulnerability management, including existing standards, models, best
practices, and lessons learned in this area.
One of the tools that manufacturers or healthcare facilities may
use to assess and manage the impact of vulnerability is CVSS. CVSS is a
risk assessment tool that provides an open and standardized method for
rating information technology vulnerabilities. However, incorporating
CVSS into medical device vulnerability assessments has proven to be a
challenge in that it does not directly incorporate patient risk and
public health impact factors. This workshop encourages robust dialogue
on how CVSS might be adapted for medical devices and how considerations
of the use environment might be incorporated in a more standardized
manner into medical device CVSS scores.
II. Topics for Discussion at the Public Workshop
The public workshop sessions are designed to incorporate the
following general themes:
Envisioning a roadmap for coordinated vulnerability
disclosure and vulnerability management as part of the broader effort
to create a trusted environment for information sharing.
[cir] How might the stakeholder community create incentives to
encourage stakeholder participation?
[cir] What do individual stakeholders need to understand and be
aware of regarding coordinated disclosure?
[cir] What current tools and models presently exist that may aid
stakeholders in implementing disclosure and vulnerability management?
[cir] How can the security researcher community work in
collaboration with HPH stakeholders to identify, assess, and mitigate
vulnerabilities?
Sharing FDA's current thinking on the implementation of
the Framework in the medical device total product lifecycle.
Adapting cybersecurity and/or risk assessment tools such
as CVSS for the medical device operational environment.
Adapting and/or implementing existing cybersecurity
standards for medical devices.
Understanding the challenges that manufacturers face as
they increase collaboration with external third parties (cybersecurity
researchers, Information Sharing and Analysis Organizations (ISAOs),
and end users), to resolve cybersecurity vulnerabilities that impact
their devices. Note that an ISAO is a group created to gather, analyze,
and disseminate critical infrastructure information (Ref. 7).
Gaining situational awareness of the current activities in
the HPH sector to enhance medical device cybersecurity.
Identifying cybersecurity gaps and challenges that persist
in the medical device ecosystem and begin crafting action plans to
address them.
Registration: Registration is free and available on a first-come,
first-served basis. Persons interested in attending this public
workshop must register online by January 13, 2016, at 4 p.m. Early
registration is recommended because facilities are limited and,
therefore, FDA may limit the number of participants from each
organization. If time and space permits, onsite registration on the day
of the public workshop will be provided beginning at 8 a.m.
If you need special accommodations due to a disability, please
contact Susan Monahan, Center for Devices and Radiological Health,
Office of Communication and Education, 301-796-5661 or email:
susan.monahan@fda.hhs.gov no later than January 7, 2016.
Please provide complete contact information for each attendee,
including name, title, affiliation, email, and telephone number. Those
without Internet access should contact Susan Monahan to register.
Registrants will receive confirmation after they have been accepted.
You will be notified if you are on a waiting list.
Streaming Webcast of the Public Workshop: This public workshop will
also be Webcast. The Webcast link will be available on the registration
Web page after January 13, 2016. Please visit FDA's Medical Devices
News & Events--Workshops & Conferences calendar at https://www.fda.gov/MedicalDevices/NewsEvents/WorkshopsConferences/default.htm. Select this
meeting/public workshop from the posted events list. If you have never
attended a Connect Pro event before, test your connection at https://collaboration.fda.gov/common/help/en/support/meeting_test.htm. To get a
[[Page 76025]]
quick overview of the Connect Pro program, visit https://www.adobe.com/go/connectpro_overview. FDA has verified the Web site addresses in this
document, but FDA is not responsible for any subsequent changes to the
Web site after this document publishes in the Federal Register.
Transcripts: Please be advised that as soon as a transcript is
available, it will be accessible at https://www.regulations.gov. It may
be viewed at the Division of Dockets Management (see ADDRESSES). A
transcript will also be available in either hardcopy or on CD-ROM,
after submission of a Freedom of Information request. The Freedom of
Information office address is available on the Agency's Web site at
https://www.fda.gov. A link to the transcripts will also be available
approximately 45 days after the public workshop on the Internet at
https://www.fda.gov/MedicalDevices/NewsEvents/WorkshopsConferences/default.htm. (Select this public workshop from the posted events list).
III. References
The following references are on display in the Division of Dockets
Management (see ADDRESSES) and are available for viewing by interested
persons between 9 a.m. and 4 p.m., Monday through Friday; they are also
available electronically at https://www.regulations.gov. FDA has
verified the Web site addresses, as of the date this document publishes
in the Federal Register, but Web sites are subject to change over time.
1. Executive Order 13636, ``Improving Critical Infrastructure
Cybersecurity,'' February 19, 2013 (https://www.gpo.gov/fdsys/pkg/FR-2013-02-19/pdf/2013-03915.pdf).
2. Executive Order 13691, ``Promoting Private Sector Cybersecurity
Information Sharing,'' February 13, 2015 (https://www.gpo.gov/fdsys/pkg/FR-2015-02-20/pdf/2015-03714.pdf).
3. Presidential Policy Directive 21, ``Critical Infrastructure
Security and Resilience,'' February 12, 2013 (https://www.whitehouse.gov/the-press-office/2013/02/12/presidential-policy-directive-critical-infrastructure-security-and-resil).
4. National Institute of Standards and Technology (NIST),
``Framework for Improving Critical Infrastructure Cybersecurity,''
version 1, February 12, 2014 (https://www.nist.gov/cyberframework/upload/cybersecurity-framework-021214-final.pdf).
5. Food and Drug Administration, ``Public Workshop--Collaborative
Approaches for Medical Device and Healthcare Cybersecurity, October
21-22, 2014.'' October 11, 2015 (https://www.fda.gov/MedicalDevices/NewsEvents/WorkshopsConferences/ucm412979.htm).
6. ``ISO/IEC 29147:2014--Information Technology--Security
Techniques--Vulnerability Disclosure,'' (https://www.iso.org/iso/catalogue_detail.htm?csnumber=45170).
7. Department of Homeland Security, ``Frequently Asked Questions
About Information Sharing and Analysis Organizations (ISAOs),''
November 17, 2015 (https://www.dhs.gov/isao-faq).
Dated: December 2, 2015.
Peter Lurie,
Associate Commissioner for Public Health Strategy and Analysis.
[FR Doc. 2015-30772 Filed 12-4-15; 8:45 am]
BILLING CODE 4164-01-P