---
case_studies:
- 64011d5f-db70-46cc-bf72-818a1bce7a02
- 16cbd5b7-a754-80b9-bc20-ed002d88b119
description: You need help preparing cybersecurity documents for an FDA submission
  or to respond to a Hold Letter.
featured: true
is_solution: false
service_name: FDA Cybersecurity
sort_order: 14
title: FDA Cybersecurity
widget_icon: []
---

<div class="grid grid-cols-1 sm:grid-cols-2 gap-3">

<div class="[&_div.cta-wrapper]:my-4 [&_div.cta-wrapper]:sm:text-left [&_h1]:text-center [&_h1]:sm:text-left [&_h2]:text-center [&_h2]:sm:text-left [&_h2]:mt-0" markdown="1">

<div markdown="1">

## Don't Let Cybersecurity Slow Down Your FDA Submission

</div>

<div markdown="1">

Do you have an upcoming 510(k), IDE, De Novo, or PMA and have **inadequate cybersecurity documentation**?

</div>

<div markdown="1">

Did you submit already, and received **major cybersecurity deficiencies** in a hold letter?

</div>

<div markdown="1">

**We help medical device manufacturers secure their devices and rapidly get their FDA Cybersecurity Documentation in order.**

</div>

<div markdown="1">

<div class="not-prose text-center cta-wrapper"><a href="https://innolitics.com/contact/" class="bg-secondary text-white rounded hover:no-underline px-6 py-2 inline-block my-2 hover:transition-shadow hover:duration-150 hover:shadow hover:shadow-secondary/50 text-sm text-center">Let's Talk</a></div>

</div>

</div>

<div class="[&_div.cta-wrapper]:my-4 [&_div.cta-wrapper]:sm:text-left [&_h1]:text-center [&_h1]:sm:text-left [&_h2]:text-center [&_h2]:sm:text-left [&_h2]:mt-0" markdown="1">

<div markdown="1">

![](/img/services/FDA_Cybersecurity-1c8bd5b7a75481b99e27fed9c5bac36a.png)

</div>

<div markdown="1">

</div>

<div markdown="1">

</div>

<div markdown="1">

</div>

<div markdown="1">

</div>

</div>

</div>

## We've Helped Others Like You

Our cybersecurity process has been used successfully in **many FDA submissions since the 2026 FDA Cybersecurity Guidance was finalized**, and has been progressively refined with each subsequent submission. Our past experiences have helped us understand FDA's expectations.





## It's not so bad

Your engineers may have tried working through the FDA guidance and have been overwhelmed. It is a lot to learn.

**We've been through this before** and can show you the way.

## We can help push back

If you've submitted to FDA and they've identified deficiencies that seem excessive, you **may be able to push back**!

The ideal time to do this is during the FDA meeting within 10 days of receiving the hold letter.

We can **usually begin immediately** and can quickly put together a strategy.

<div class="not-prose text-center cta-wrapper"><a href="https://innolitics.com/contact/" class="bg-secondary text-white rounded hover:no-underline px-6 py-2 inline-block my-2 hover:transition-shadow hover:duration-150 hover:shadow hover:shadow-secondary/50 text-sm text-center">Let’s Meet</a></div>

## Engagement Models

We can work with you in these ways:

| Name                      | Situation                                                                                                               |
|---------------------------|-------------------------------------------------------------------------------------------------------------------------|
| Gap Analysis              | You don\'t know what you don\'t know                                                                                    |
| Support                   | You are still building the device and want cybersecurity support during design and implementation.                      |
| Remediation               | Your software is nearly complete and you need submission-ready cybersecurity documentation, testing, and risk controls. |
| AINN Deficiencies Support | You submitted to FDA and received an AINN letter with cybersecurity deficiencies.                                       |

## Support

The overall process for our Support engagement works as follows:

1.  Plan and initial assessment
2.  Implementation support (monthly or every two weeks)
3.  Full risk assessment
4.  Testing and final reports
5.  Submit to FDA
6.  Address FDA requests for additional information (no additional cost)
7.  **FDA clearance**

<div class="not-prose text-center cta-wrapper"><a href="https://innolitics.com/contact/" class="bg-secondary text-white rounded hover:no-underline px-6 py-2 inline-block my-2 hover:transition-shadow hover:duration-150 hover:shadow hover:shadow-secondary/50 text-sm text-center">See How Our Process Can Work For You</a></div>

## Quality Guarantee

We have extensive experience helping companies with FDA submissions. If FDA finds any cybersecurity issues we missed, we\'ll fix them at no extra cost to you.

## FAQ

<details class="[&_svg.faq-plus-icon]:open:translate-y-[calc(100%+10px)] [&_svg.faq-plus-icon]:open:opacity-0 [&_svg.faq-minus-icon]:open:translate-y-0 [&_svg.faq-minus-icon]:open:opacity-100 bg-white my-4 py-4 px-3 sm:px-6 rounded border-solid border border-gray"><summary class="flex items-center list-none cursor-pointer [&::-webkit-details-marker]:hidden not-prose"><span class="relative text-center text-xl text-white font-medium mr-4 mt-0 w-[28px] h-[28px] shrink-0 flex justify-center items-center overflow-hidden rounded-full bg-secondary"><svg class="faq-plus-icon absolute transition block w-[12px] h-[12px] fill-inherit" viewBox="0 0 14 14"><path fill-rule="evenodd" clip-rule="evenodd" d="M7 0C7.55228 0 8 0.447715 8 1V6H13C13.5523 6 14 6.44772 14 7C14 7.55228 13.5523 8 13 8H8V13C8 13.5523 7.55228 14 7 14C6.44771 14 6 13.5523 6 13V8H1C0.447715 8 0 7.55228 0 7C0 6.44772 0.447715 6 1 6H6V1C6 0.447715 6.44772 0 7 0Z" fill="currentColor"></path></svg><svg xmlns="http://www.w3.org/2000/svg" class="faq-minus-icon absolute transition block w-[12px] h-auto fill-inherit translate-y-[calc(-100%-10px)] opacity-0" viewBox="0 0 24 24" stroke-width="4" stroke="currentColor" fill="none" stroke-linecap="round" stroke-linejoin="round"><path d="M0 0h24v24H0z" stroke="none"/><path d="M5 12h14"/></svg></span><h3 class="text-heading m-0"><strong>What are the deliverables from the Support engagement?</strong></h3></summary><div class="mr-2 mt-6 [&_ul]:list-image-[url(/img/icons/ul-img.png)]"><p>For the Support engagement, we help you produce the cybersecurity
artifacts typically needed for 510(k), De Novo, and PMA submissions. The
documents are organized so they can be uploaded directly into the latest
eSTAR template.</p>
<p>We align the content to FDA’s current cybersecurity expectations,
using these guidance documents as key references:</p>
<ul>
<li><a
href="https://innolitics.com/articles/2025-cybersecurity-guidance/">2025
FDA Guidance - Cybersecurity in Medical Devices: Quality System
Considerations and Content of Premarket Submissions</a></li>
<li><a
href="https://innolitics.com/articles/fda-guidance-postmarket-management-of-cybersecurity-in-medical-devices/">2016
FDA Guidance - Postmarket Management of Cybersecurity in Medical
Devices</a></li>
<li><a
href="https://innolitics.com/articles/fda-guidance-cybersecurity-for-networked-medical-devices/">2005
FDA Guidance - Cybersecurity for Networked Medical Devices Containing
Off-the-Shelf (OTS) Software</a></li>
</ul>
<p>See below for summary descriptions of each deliverable:</p>
<p><strong>Security Architecture Views</strong></p>
<p>Visual diagrams of system components, data flows, connections, and
trust boundaries. Includes Global System View, Multi-Patient Harm View
(if applicable), Use Case Views, and Updateability View.</p>
<p><strong>Cybersecurity Controls (Draft/Final)</strong></p>
<p>Proposed and final security controls addressing FDA's 8 risk control
categories to mitigate identified risks.</p>
<p>Initial draft provided in Phase 1 for software team
implementation.</p>
<p><strong>Cybersecurity Management Plan</strong></p>
<p>Plan for managing cybersecurity risks throughout product lifecycle,
including development, vulnerability handling, and monitoring.</p>
<p><strong>Cybersecurity Measures and Metrics</strong></p>
<p>Indicators tracking security control effectiveness (e.g.,
vulnerability count, patch response time).</p>
<p>For new devices, outlines planned metrics only.</p>
<p><strong>Threat Model</strong></p>
<p>STRIDE analysis of threat actors, assets, and attack vectors, showing
potential vulnerabilities and safety impacts.</p>
<p><strong>Security Risk Assessment</strong></p>
<p>Risk evaluation showing traceability between vulnerabilities,
controls, and residual risks.</p>
<p><strong>Cybersecurity Labeling</strong></p>
<p>User documentation covering security responsibilities, diagrams,
updates, and anomaly reporting.</p>
<p><strong>Software Bill of Materials (SBOM)</strong></p>
<p>List of all software components and third-party libraries used in the
device.</p>
<p><strong>Software Level of Support and End of Support</strong></p>
<p>Support duration and end-of-life plans for each SBOM component.</p>
<p><strong>Vulnerability Assessment</strong></p>
<p>Review of vulnerabilities found in SBOM scan.</p>
<p><strong>Assessment of Unresolved Security Anomalies</strong></p>
<p>Open security issues with impact analysis and mitigation plans.</p>
<p><strong>Cybersecurity Metrics Report</strong></p>
<p>Addresses plan for on-going cybersecurity metrics.</p>
<p><strong>Cybersecurity Testing Report</strong></p>
<p>Summary of all security testing activities and results.</p>
<p><strong>Penetration Testing Report</strong></p>
<p>Third-party pen-test findings and recommendations with FDA-aligned
analysis.</p>
<p><strong>Security Risk Management Report</strong></p>
<p>Final summary of all security activities providing submission-ready
overview.</p>
</div></details>
<details class="[&_svg.faq-plus-icon]:open:translate-y-[calc(100%+10px)] [&_svg.faq-plus-icon]:open:opacity-0 [&_svg.faq-minus-icon]:open:translate-y-0 [&_svg.faq-minus-icon]:open:opacity-100 bg-white my-4 py-4 px-3 sm:px-6 rounded border-solid border border-gray"><summary class="flex items-center list-none cursor-pointer [&::-webkit-details-marker]:hidden not-prose"><span class="relative text-center text-xl text-white font-medium mr-4 mt-0 w-[28px] h-[28px] shrink-0 flex justify-center items-center overflow-hidden rounded-full bg-secondary"><svg class="faq-plus-icon absolute transition block w-[12px] h-[12px] fill-inherit" viewBox="0 0 14 14"><path fill-rule="evenodd" clip-rule="evenodd" d="M7 0C7.55228 0 8 0.447715 8 1V6H13C13.5523 6 14 6.44772 14 7C14 7.55228 13.5523 8 13 8H8V13C8 13.5523 7.55228 14 7 14C6.44771 14 6 13.5523 6 13V8H1C0.447715 8 0 7.55228 0 7C0 6.44772 0.447715 6 1 6H6V1C6 0.447715 6.44772 0 7 0Z" fill="currentColor"></path></svg><svg xmlns="http://www.w3.org/2000/svg" class="faq-minus-icon absolute transition block w-[12px] h-auto fill-inherit translate-y-[calc(-100%-10px)] opacity-0" viewBox="0 0 24 24" stroke-width="4" stroke="currentColor" fill="none" stroke-linecap="round" stroke-linejoin="round"><path d="M0 0h24v24H0z" stroke="none"/><path d="M5 12h14"/></svg></span><h3 class="text-heading m-0"><strong>How much does the support package cost?</strong></h3></summary><div class="mr-2 mt-6 [&_ul]:list-image-[url(/img/icons/ul-img.png)]"><p>Pricing depends on your device, submission type, and scope. <a
href="https://innolitics.com/contact/">Contact us</a> for a custom
quote.</p>
</div></details>
<details class="[&_svg.faq-plus-icon]:open:translate-y-[calc(100%+10px)] [&_svg.faq-plus-icon]:open:opacity-0 [&_svg.faq-minus-icon]:open:translate-y-0 [&_svg.faq-minus-icon]:open:opacity-100 bg-white my-4 py-4 px-3 sm:px-6 rounded border-solid border border-gray"><summary class="flex items-center list-none cursor-pointer [&::-webkit-details-marker]:hidden not-prose"><span class="relative text-center text-xl text-white font-medium mr-4 mt-0 w-[28px] h-[28px] shrink-0 flex justify-center items-center overflow-hidden rounded-full bg-secondary"><svg class="faq-plus-icon absolute transition block w-[12px] h-[12px] fill-inherit" viewBox="0 0 14 14"><path fill-rule="evenodd" clip-rule="evenodd" d="M7 0C7.55228 0 8 0.447715 8 1V6H13C13.5523 6 14 6.44772 14 7C14 7.55228 13.5523 8 13 8H8V13C8 13.5523 7.55228 14 7 14C6.44771 14 6 13.5523 6 13V8H1C0.447715 8 0 7.55228 0 7C0 6.44772 0.447715 6 1 6H6V1C6 0.447715 6.44772 0 7 0Z" fill="currentColor"></path></svg><svg xmlns="http://www.w3.org/2000/svg" class="faq-minus-icon absolute transition block w-[12px] h-auto fill-inherit translate-y-[calc(-100%-10px)] opacity-0" viewBox="0 0 24 24" stroke-width="4" stroke="currentColor" fill="none" stroke-linecap="round" stroke-linejoin="round"><path d="M0 0h24v24H0z" stroke="none"/><path d="M5 12h14"/></svg></span><h3 class="text-heading m-0"><strong>Will we need to make changes to our software?</strong></h3></summary><div class="mr-2 mt-6 [&_ul]:list-image-[url(/img/icons/ul-img.png)]"><p>Unless your medical device was designed with security in mind, it's
likely that <em>some</em> software changes will be required. Our process
is tailored to pinpoint these necessary changes swiftly so your
engineers can start working on them. In some instances, we can also
provide software engineering support.</p>
</div></details>
<details class="[&_svg.faq-plus-icon]:open:translate-y-[calc(100%+10px)] [&_svg.faq-plus-icon]:open:opacity-0 [&_svg.faq-minus-icon]:open:translate-y-0 [&_svg.faq-minus-icon]:open:opacity-100 bg-white my-4 py-4 px-3 sm:px-6 rounded border-solid border border-gray"><summary class="flex items-center list-none cursor-pointer [&::-webkit-details-marker]:hidden not-prose"><span class="relative text-center text-xl text-white font-medium mr-4 mt-0 w-[28px] h-[28px] shrink-0 flex justify-center items-center overflow-hidden rounded-full bg-secondary"><svg class="faq-plus-icon absolute transition block w-[12px] h-[12px] fill-inherit" viewBox="0 0 14 14"><path fill-rule="evenodd" clip-rule="evenodd" d="M7 0C7.55228 0 8 0.447715 8 1V6H13C13.5523 6 14 6.44772 14 7C14 7.55228 13.5523 8 13 8H8V13C8 13.5523 7.55228 14 7 14C6.44771 14 6 13.5523 6 13V8H1C0.447715 8 0 7.55228 0 7C0 6.44772 0.447715 6 1 6H6V1C6 0.447715 6.44772 0 7 0Z" fill="currentColor"></path></svg><svg xmlns="http://www.w3.org/2000/svg" class="faq-minus-icon absolute transition block w-[12px] h-auto fill-inherit translate-y-[calc(-100%-10px)] opacity-0" viewBox="0 0 24 24" stroke-width="4" stroke="currentColor" fill="none" stroke-linecap="round" stroke-linejoin="round"><path d="M0 0h24v24H0z" stroke="none"/><path d="M5 12h14"/></svg></span><h3 class="text-heading m-0"><strong>Can you provide examples of past projects similar to our product?</strong></h3></summary><div class="mr-2 mt-6 [&_ul]:list-image-[url(/img/icons/ul-img.png)]"><p>Yes! Please review <a href="https://innolitics.com/portfolio/">our
case studies</a> for a sampling of our past projects. If you don’t see
anything relevant, please reach out as only a small number of our
projects have case studies.</p>
</div></details>
<details class="[&_svg.faq-plus-icon]:open:translate-y-[calc(100%+10px)] [&_svg.faq-plus-icon]:open:opacity-0 [&_svg.faq-minus-icon]:open:translate-y-0 [&_svg.faq-minus-icon]:open:opacity-100 bg-white my-4 py-4 px-3 sm:px-6 rounded border-solid border border-gray"><summary class="flex items-center list-none cursor-pointer [&::-webkit-details-marker]:hidden not-prose"><span class="relative text-center text-xl text-white font-medium mr-4 mt-0 w-[28px] h-[28px] shrink-0 flex justify-center items-center overflow-hidden rounded-full bg-secondary"><svg class="faq-plus-icon absolute transition block w-[12px] h-[12px] fill-inherit" viewBox="0 0 14 14"><path fill-rule="evenodd" clip-rule="evenodd" d="M7 0C7.55228 0 8 0.447715 8 1V6H13C13.5523 6 14 6.44772 14 7C14 7.55228 13.5523 8 13 8H8V13C8 13.5523 7.55228 14 7 14C6.44771 14 6 13.5523 6 13V8H1C0.447715 8 0 7.55228 0 7C0 6.44772 0.447715 6 1 6H6V1C6 0.447715 6.44772 0 7 0Z" fill="currentColor"></path></svg><svg xmlns="http://www.w3.org/2000/svg" class="faq-minus-icon absolute transition block w-[12px] h-auto fill-inherit translate-y-[calc(-100%-10px)] opacity-0" viewBox="0 0 24 24" stroke-width="4" stroke="currentColor" fill="none" stroke-linecap="round" stroke-linejoin="round"><path d="M0 0h24v24H0z" stroke="none"/><path d="M5 12h14"/></svg></span><h3 class="text-heading m-0"><strong>How does your team provide support with threat modeling?</strong></h3></summary><div class="mr-2 mt-6 [&_ul]:list-image-[url(/img/icons/ul-img.png)]"><p>Yes! We can work your team team to develop a threat model over a
sequence of collaborative meetings. As part of threat modeling we’ll
develop a set of security architecture views that comply with FDA’s
expectations. We’ll guide the team through identifying external
connections, assets, threat actors, and threats. Our threat modeling
typically uses STRIDE combined with other threat modeling methodologies
as is appropriate.</p>
<p>Our threat modeling approach considers the full end-to-end system,
including “other functions”.</p>
</div></details>
<details class="[&_svg.faq-plus-icon]:open:translate-y-[calc(100%+10px)] [&_svg.faq-plus-icon]:open:opacity-0 [&_svg.faq-minus-icon]:open:translate-y-0 [&_svg.faq-minus-icon]:open:opacity-100 bg-white my-4 py-4 px-3 sm:px-6 rounded border-solid border border-gray"><summary class="flex items-center list-none cursor-pointer [&::-webkit-details-marker]:hidden not-prose"><span class="relative text-center text-xl text-white font-medium mr-4 mt-0 w-[28px] h-[28px] shrink-0 flex justify-center items-center overflow-hidden rounded-full bg-secondary"><svg class="faq-plus-icon absolute transition block w-[12px] h-[12px] fill-inherit" viewBox="0 0 14 14"><path fill-rule="evenodd" clip-rule="evenodd" d="M7 0C7.55228 0 8 0.447715 8 1V6H13C13.5523 6 14 6.44772 14 7C14 7.55228 13.5523 8 13 8H8V13C8 13.5523 7.55228 14 7 14C6.44771 14 6 13.5523 6 13V8H1C0.447715 8 0 7.55228 0 7C0 6.44772 0.447715 6 1 6H6V1C6 0.447715 6.44772 0 7 0Z" fill="currentColor"></path></svg><svg xmlns="http://www.w3.org/2000/svg" class="faq-minus-icon absolute transition block w-[12px] h-auto fill-inherit translate-y-[calc(-100%-10px)] opacity-0" viewBox="0 0 24 24" stroke-width="4" stroke="currentColor" fill="none" stroke-linecap="round" stroke-linejoin="round"><path d="M0 0h24v24H0z" stroke="none"/><path d="M5 12h14"/></svg></span><h3 class="text-heading m-0"><strong>How does your team provide support with security risk management?</strong></h3></summary><div class="mr-2 mt-6 [&_ul]:list-image-[url(/img/icons/ul-img.png)]"><p>Yes! We can guide the Client’s team through writing an appropriate
Security Risk Management Plan, including an appropriate means of
assessing security risks.</p>
<p>We can then guide the team through a security risk assessment, using
the threat modeling as an input. We’ll work with the team to trace
security risks to safety risks. We’ll also help identify relevant
cybersecurity controls (see the next section) and help ensure there is
proper cybersecurity traceability.</p>
<p><img
src="/img/services/FDA_Cybersecurity-1c8bd5b7a75481d9a02fc953bedaf897.png" /></p>
</div></details>
<details class="[&_svg.faq-plus-icon]:open:translate-y-[calc(100%+10px)] [&_svg.faq-plus-icon]:open:opacity-0 [&_svg.faq-minus-icon]:open:translate-y-0 [&_svg.faq-minus-icon]:open:opacity-100 bg-white my-4 py-4 px-3 sm:px-6 rounded border-solid border border-gray"><summary class="flex items-center list-none cursor-pointer [&::-webkit-details-marker]:hidden not-prose"><span class="relative text-center text-xl text-white font-medium mr-4 mt-0 w-[28px] h-[28px] shrink-0 flex justify-center items-center overflow-hidden rounded-full bg-secondary"><svg class="faq-plus-icon absolute transition block w-[12px] h-[12px] fill-inherit" viewBox="0 0 14 14"><path fill-rule="evenodd" clip-rule="evenodd" d="M7 0C7.55228 0 8 0.447715 8 1V6H13C13.5523 6 14 6.44772 14 7C14 7.55228 13.5523 8 13 8H8V13C8 13.5523 7.55228 14 7 14C6.44771 14 6 13.5523 6 13V8H1C0.447715 8 0 7.55228 0 7C0 6.44772 0.447715 6 1 6H6V1C6 0.447715 6.44772 0 7 0Z" fill="currentColor"></path></svg><svg xmlns="http://www.w3.org/2000/svg" class="faq-minus-icon absolute transition block w-[12px] h-auto fill-inherit translate-y-[calc(-100%-10px)] opacity-0" viewBox="0 0 24 24" stroke-width="4" stroke="currentColor" fill="none" stroke-linecap="round" stroke-linejoin="round"><path d="M0 0h24v24H0z" stroke="none"/><path d="M5 12h14"/></svg></span><h3 class="text-heading m-0"><strong>Can your team help us define necessary cybersecurity controls?</strong></h3></summary><div class="mr-2 mt-6 [&_ul]:list-image-[url(/img/icons/ul-img.png)]"><p>Yes! We’ll work with the team to identify appropriate security risk
controls against the FDA guidance. FDA typically requires at minimum one
or two controls from each control category:</p>
<ul>
<li>authentication</li>
<li>authorization</li>
<li>cryptography</li>
<li>integrity</li>
<li>confidentiality</li>
<li>detection</li>
<li>resiliency &amp; recovery</li>
<li>updates.</li>
</ul>
<p>We’ll work with you to identify the most useful controls that add the
minimum necessary software development cost. We also understand what
controls FDA expects for different types of devices.</p>
</div></details>
<details class="[&_svg.faq-plus-icon]:open:translate-y-[calc(100%+10px)] [&_svg.faq-plus-icon]:open:opacity-0 [&_svg.faq-minus-icon]:open:translate-y-0 [&_svg.faq-minus-icon]:open:opacity-100 bg-white my-4 py-4 px-3 sm:px-6 rounded border-solid border border-gray"><summary class="flex items-center list-none cursor-pointer [&::-webkit-details-marker]:hidden not-prose"><span class="relative text-center text-xl text-white font-medium mr-4 mt-0 w-[28px] h-[28px] shrink-0 flex justify-center items-center overflow-hidden rounded-full bg-secondary"><svg class="faq-plus-icon absolute transition block w-[12px] h-[12px] fill-inherit" viewBox="0 0 14 14"><path fill-rule="evenodd" clip-rule="evenodd" d="M7 0C7.55228 0 8 0.447715 8 1V6H13C13.5523 6 14 6.44772 14 7C14 7.55228 13.5523 8 13 8H8V13C8 13.5523 7.55228 14 7 14C6.44771 14 6 13.5523 6 13V8H1C0.447715 8 0 7.55228 0 7C0 6.44772 0.447715 6 1 6H6V1C6 0.447715 6.44772 0 7 0Z" fill="currentColor"></path></svg><svg xmlns="http://www.w3.org/2000/svg" class="faq-minus-icon absolute transition block w-[12px] h-auto fill-inherit translate-y-[calc(-100%-10px)] opacity-0" viewBox="0 0 24 24" stroke-width="4" stroke="currentColor" fill="none" stroke-linecap="round" stroke-linejoin="round"><path d="M0 0h24v24H0z" stroke="none"/><path d="M5 12h14"/></svg></span><h3 class="text-heading m-0"><strong>Can your team help implement cybersecurity controls?</strong></h3></summary><div class="mr-2 mt-6 [&_ul]:list-image-[url(/img/icons/ul-img.png)]"><p>In most cases, yes, although this is at an additional cost. For most
clients, it is more cost effective to have their own team implement the
software controls.</p>
</div></details>
<details class="[&_svg.faq-plus-icon]:open:translate-y-[calc(100%+10px)] [&_svg.faq-plus-icon]:open:opacity-0 [&_svg.faq-minus-icon]:open:translate-y-0 [&_svg.faq-minus-icon]:open:opacity-100 bg-white my-4 py-4 px-3 sm:px-6 rounded border-solid border border-gray"><summary class="flex items-center list-none cursor-pointer [&::-webkit-details-marker]:hidden not-prose"><span class="relative text-center text-xl text-white font-medium mr-4 mt-0 w-[28px] h-[28px] shrink-0 flex justify-center items-center overflow-hidden rounded-full bg-secondary"><svg class="faq-plus-icon absolute transition block w-[12px] h-[12px] fill-inherit" viewBox="0 0 14 14"><path fill-rule="evenodd" clip-rule="evenodd" d="M7 0C7.55228 0 8 0.447715 8 1V6H13C13.5523 6 14 6.44772 14 7C14 7.55228 13.5523 8 13 8H8V13C8 13.5523 7.55228 14 7 14C6.44771 14 6 13.5523 6 13V8H1C0.447715 8 0 7.55228 0 7C0 6.44772 0.447715 6 1 6H6V1C6 0.447715 6.44772 0 7 0Z" fill="currentColor"></path></svg><svg xmlns="http://www.w3.org/2000/svg" class="faq-minus-icon absolute transition block w-[12px] h-auto fill-inherit translate-y-[calc(-100%-10px)] opacity-0" viewBox="0 0 24 24" stroke-width="4" stroke="currentColor" fill="none" stroke-linecap="round" stroke-linejoin="round"><path d="M0 0h24v24H0z" stroke="none"/><path d="M5 12h14"/></svg></span><h3 class="text-heading m-0"><strong>How does does your team help with SBOM generation?</strong></h3></summary><div class="mr-2 mt-6 [&_ul]:list-image-[url(/img/icons/ul-img.png)]"><p>We can usually produce an FDA-compliant SBOM with minimal input from
your engineers.</p>
<p>Alternatively, we can assist your engineers in setting up tools to
automatically generate an SBOM as part of their automated build
procedures (e.g., using a GitHub Action that produces the SBOM as a
build artifact). This second approach takes longer in the short term,
but is more efficient in the long term.</p>
</div></details>
<details class="[&_svg.faq-plus-icon]:open:translate-y-[calc(100%+10px)] [&_svg.faq-plus-icon]:open:opacity-0 [&_svg.faq-minus-icon]:open:translate-y-0 [&_svg.faq-minus-icon]:open:opacity-100 bg-white my-4 py-4 px-3 sm:px-6 rounded border-solid border border-gray"><summary class="flex items-center list-none cursor-pointer [&::-webkit-details-marker]:hidden not-prose"><span class="relative text-center text-xl text-white font-medium mr-4 mt-0 w-[28px] h-[28px] shrink-0 flex justify-center items-center overflow-hidden rounded-full bg-secondary"><svg class="faq-plus-icon absolute transition block w-[12px] h-[12px] fill-inherit" viewBox="0 0 14 14"><path fill-rule="evenodd" clip-rule="evenodd" d="M7 0C7.55228 0 8 0.447715 8 1V6H13C13.5523 6 14 6.44772 14 7C14 7.55228 13.5523 8 13 8H8V13C8 13.5523 7.55228 14 7 14C6.44771 14 6 13.5523 6 13V8H1C0.447715 8 0 7.55228 0 7C0 6.44772 0.447715 6 1 6H6V1C6 0.447715 6.44772 0 7 0Z" fill="currentColor"></path></svg><svg xmlns="http://www.w3.org/2000/svg" class="faq-minus-icon absolute transition block w-[12px] h-auto fill-inherit translate-y-[calc(-100%-10px)] opacity-0" viewBox="0 0 24 24" stroke-width="4" stroke="currentColor" fill="none" stroke-linecap="round" stroke-linejoin="round"><path d="M0 0h24v24H0z" stroke="none"/><path d="M5 12h14"/></svg></span><h3 class="text-heading m-0"><strong>How does your team help with cybersecurity testing?</strong></h3></summary><div class="mr-2 mt-6 [&_ul]:list-image-[url(/img/icons/ul-img.png)]"><p>We can handle the testing on your behalf or we can guide your
engineering team through the cybersecurity testing process. FDA requires
four categories of cybersecurity testing:</p>
<ul>
<li>Requirements Testing: Typically handled through standard Design
Controls, however, we can help draft Design Verification Protocols for
verification of the Design Control requirements.</li>
<li>Vulnerability Testing: We can help select an appropriate
vulnerability testing tool and incorporate it into the development
workflow. This typically includes analyzing third-party packages for
vulnerabilities along with static code analysis.</li>
<li>Fuzz Testing: We can help identify appropriate interfaces to fuzz
test, define the scope, and can even help implement fuzz testing.</li>
<li>Penetration Testing: We can provide pen testing ourselves. We also
have several more specialized pen-testing partners whom we’ve vetted and
used on multiple FDA-submissions. We can help select an appropriate pen
testing vendor and can facilitate communication with the vendor to
ensure they provide records that meet the FDA guidance.</li>
</ul>
<p>We can compile all of these records into tests that are appropriate
for the 510(k) submission.</p>
</div></details>
<details class="[&_svg.faq-plus-icon]:open:translate-y-[calc(100%+10px)] [&_svg.faq-plus-icon]:open:opacity-0 [&_svg.faq-minus-icon]:open:translate-y-0 [&_svg.faq-minus-icon]:open:opacity-100 bg-white my-4 py-4 px-3 sm:px-6 rounded border-solid border border-gray"><summary class="flex items-center list-none cursor-pointer [&::-webkit-details-marker]:hidden not-prose"><span class="relative text-center text-xl text-white font-medium mr-4 mt-0 w-[28px] h-[28px] shrink-0 flex justify-center items-center overflow-hidden rounded-full bg-secondary"><svg class="faq-plus-icon absolute transition block w-[12px] h-[12px] fill-inherit" viewBox="0 0 14 14"><path fill-rule="evenodd" clip-rule="evenodd" d="M7 0C7.55228 0 8 0.447715 8 1V6H13C13.5523 6 14 6.44772 14 7C14 7.55228 13.5523 8 13 8H8V13C8 13.5523 7.55228 14 7 14C6.44771 14 6 13.5523 6 13V8H1C0.447715 8 0 7.55228 0 7C0 6.44772 0.447715 6 1 6H6V1C6 0.447715 6.44772 0 7 0Z" fill="currentColor"></path></svg><svg xmlns="http://www.w3.org/2000/svg" class="faq-minus-icon absolute transition block w-[12px] h-auto fill-inherit translate-y-[calc(-100%-10px)] opacity-0" viewBox="0 0 24 24" stroke-width="4" stroke="currentColor" fill="none" stroke-linecap="round" stroke-linejoin="round"><path d="M0 0h24v24H0z" stroke="none"/><path d="M5 12h14"/></svg></span><h3 class="text-heading m-0"><strong>How does your team help with cybersecurity labeling?</strong></h3></summary><div class="mr-2 mt-6 [&_ul]:list-image-[url(/img/icons/ul-img.png)]"><p>We can work with your team to draft the cybersecurity sections of the
IFU based on our understanding of the device and previous submissions.
This includes:</p>
<ul>
<li>Instructions for performing software updates</li>
</ul>
</div></details>
<details class="[&_svg.faq-plus-icon]:open:translate-y-[calc(100%+10px)] [&_svg.faq-plus-icon]:open:opacity-0 [&_svg.faq-minus-icon]:open:translate-y-0 [&_svg.faq-minus-icon]:open:opacity-100 bg-white my-4 py-4 px-3 sm:px-6 rounded border-solid border border-gray"><summary class="flex items-center list-none cursor-pointer [&::-webkit-details-marker]:hidden not-prose"><span class="relative text-center text-xl text-white font-medium mr-4 mt-0 w-[28px] h-[28px] shrink-0 flex justify-center items-center overflow-hidden rounded-full bg-secondary"><svg class="faq-plus-icon absolute transition block w-[12px] h-[12px] fill-inherit" viewBox="0 0 14 14"><path fill-rule="evenodd" clip-rule="evenodd" d="M7 0C7.55228 0 8 0.447715 8 1V6H13C13.5523 6 14 6.44772 14 7C14 7.55228 13.5523 8 13 8H8V13C8 13.5523 7.55228 14 7 14C6.44771 14 6 13.5523 6 13V8H1C0.447715 8 0 7.55228 0 7C0 6.44772 0.447715 6 1 6H6V1C6 0.447715 6.44772 0 7 0Z" fill="currentColor"></path></svg><svg xmlns="http://www.w3.org/2000/svg" class="faq-minus-icon absolute transition block w-[12px] h-auto fill-inherit translate-y-[calc(-100%-10px)] opacity-0" viewBox="0 0 24 24" stroke-width="4" stroke="currentColor" fill="none" stroke-linecap="round" stroke-linejoin="round"><path d="M0 0h24v24H0z" stroke="none"/><path d="M5 12h14"/></svg></span><h3 class="text-heading m-0"><strong>Can you guarantee our submission will be cleared?</strong></h3></summary><div class="mr-2 mt-6 [&_ul]:list-image-[url(/img/icons/ul-img.png)]"><p>Yes. We’ve done enough submissions that we’re confident we understand
what FDA will require to get your submission cleared or approved.</p>
<p>That being said, FDA’s expectations are continuing to evolve.
Strategies that we’ve seen work previously have stopped working in new
submissions. However, depending on the offer you choose, we will
guarantee that you won’t pay anything extra for our support addressing
any requests for additional information the FDA identifies.</p>
</div></details>
<div class="not-prose text-center cta-wrapper"><a href="https://innolitics.com/contact/" class="bg-secondary text-white rounded hover:no-underline px-6 py-2 inline-block my-2 hover:transition-shadow hover:duration-150 hover:shadow hover:shadow-secondary/50 text-sm text-center">Have other questions? Let’s talk!</a></div>

## Top Cybersecurity Resources

We are experts in our field. Here are a few of our most popular cybersecurity resources:





