fdacybersecuritymedical-devicessamd

FDA cybersecurity requirements for connected medical devices in 2026

RegAid Team5 min read
FDA cybersecurity requirements for connected medical devices in 2026

The FDA now requires all premarket submissions for "cyber devices" to include a comprehensive cybersecurity plan. Section 524B of the FD&C Act, enacted through the Consolidated Appropriations Act of 2023, gave the FDA explicit authority to refuse to accept submissions that lack adequate cybersecurity documentation. The FDA's Premarket Cybersecurity Guidance (September 2023) details exactly what manufacturers must provide.

What is a "cyber device"?

Under Section 524B, a cyber device is any device that:

  • Includes software validated, installed, or authorized by the sponsor
  • Has the ability to connect to the internet
  • Contains any technological characteristics that could be vulnerable to cybersecurity threats

This definition is intentionally broad. It covers connected infusion pumps, implantable cardiac devices with wireless telemetry, diagnostic imaging systems on hospital networks, and cloud-connected SaMD. If your device has software and any form of network connectivity, it is a cyber device.

Premarket submission requirements

The FDA expects the following cybersecurity documentation in every 510(k), De Novo, and PMA submission for cyber devices:

Security risk management: A cybersecurity risk assessment that identifies threats and vulnerabilities, evaluates their potential impact on device safety and effectiveness, and documents the controls implemented to mitigate them. The FDA recommends aligning with AAMI TIR57 (Principles for medical device security) and using threat modeling frameworks such as STRIDE.

Secure Product Development Framework (SPDF): Evidence that security was integrated into the software development lifecycle. This includes secure coding practices, static and dynamic analysis, penetration testing, and third-party component security assessment.

Software Bill of Materials (SBOM): A machine-readable SBOM listing all software components, including commercial, open-source, and off-the-shelf software. The SBOM must include component names, versions, and suppliers. The FDA accepts formats aligned with NTIA minimum elements.

Cybersecurity management plan: A postmarket plan describing how the manufacturer will:

  • Monitor the device and its ecosystem for vulnerabilities
  • Assess and triage identified vulnerabilities
  • Deploy patches and updates in a timely manner
  • Communicate with users about cybersecurity risks and actions

Vulnerability disclosure policy: A documented coordinated vulnerability disclosure (CVD) process that allows external researchers to report vulnerabilities and ensures timely response.

Premarket vs. postmarket obligations

AreaPremarket (Section 524B)Postmarket
Risk assessmentRequired in submissionMust be updated when new threats emerge
SBOMRequired in submissionMust be maintained and updated with each software release
PatchingPlan required in submissionPatches must be deployed in a timely manner throughout device lifecycle
Vulnerability monitoringPlan requiredActive monitoring required for known vulnerabilities in components
Coordinated disclosurePolicy requiredMust be operational and responsive
Incident reportingPlan referencedSubject to existing MDR (21 CFR Part 803) reporting requirements

Refuse to Accept: what happens without cybersecurity documentation

Since October 1, 2023, the FDA applies Refuse to Accept (RTA) criteria for cybersecurity. If your submission for a cyber device does not include the required cybersecurity documentation, the FDA will refuse to accept it for substantive review. Your submission will not enter the review queue until the documentation is provided.

This is not a discretionary review deficiency. It is a hard gate at the acceptance stage.

SBOM: practical requirements

The SBOM must be provided for every software component of the device, including:

  • Operating system and kernel components
  • Third-party libraries and frameworks
  • Open-source software packages
  • Custom firmware and application code (by component name and version)

The FDA expects manufacturers to actively monitor SBOM components for known vulnerabilities using resources such as the National Vulnerability Database (NVD) and to assess whether identified CVEs affect the device's safety or effectiveness.

SBOM elementRequired detail
Component nameFull name as published by the supplier
VersionExact version number deployed in the device
SupplierOriginal developer or distributor
Dependency relationshipsDirect and transitive dependencies
Hash/checksumIntegrity verification value (recommended)

Comparison with EU requirements

Manufacturers selling in both the US and EU face cybersecurity requirements from multiple frameworks:

RequirementFDA (Section 524B)EU MDR (Annex I, 17.4)EU CRA (if applicable)
Risk assessmentAAMI TIR57 / STRIDEISO 14971 + MDCG 2019-16CRA Annex I Part I
SBOMRequired in premarket submissionNot explicitly required (covered by technical documentation)Required, maintained throughout lifecycle
Vulnerability reportingCVD policy + MDR 803Vigilance system (MDR Article 87)24h/72h/14-day to CSIRT/ENISA
PatchingLifecycle plan requiredCovered by PMS planSecurity updates for minimum 5 years
Penetration testingExpected in SPDF evidenceRecommended in MDCG 2019-16Expected under security by design

Looking for the right regulatory intelligence tool? Read our guide to evaluating regulatory intelligence platforms.

Key takeaways

  • Every connected medical device ("cyber device") must include comprehensive cybersecurity documentation in FDA premarket submissions
  • The FDA will refuse to accept submissions that lack cybersecurity documentation
  • An SBOM is mandatory and must be actively monitored for known vulnerabilities
  • Manufacturers must operate a coordinated vulnerability disclosure policy
  • A postmarket cybersecurity management plan with patching and monitoring commitments is required
  • EU-bound manufacturers should align their cybersecurity approach with both FDA expectations and MDR/CRA requirements to avoid duplicated effort

How RegAid helps

RegAid covers FDA cybersecurity guidance, EU MDR Annex I cybersecurity requirements, and MDCG 2019-16. Ask "What cybersecurity documentation does the FDA require for a 510(k) submission?" and get a cited answer mapping Section 524B requirements to the FDA's premarket guidance and SBOM expectations.