How Medical Devices Can Comply with Section 524B to Meet FDA Cybersecurity Requirements
September 17, 2025
Medical device manufacturers must now ensure every device—whether it’s a new AI‑enabled implant or a decades‑old imaging system—is resilient against constantly evolving cyber threats.
Most people picture MRI machines or pacemakers when considering medical devices, and often assume these run on proprietary software. In reality, about 96% of medical device software leverages open source, creating a complex blend of proprietary and open source components.
With stricter laws, like section 524B of the Federal Food, Drug, and Cosmetic Act (FD&C Act), security is now expected from the design phase. It’s never been more critical to answer the question: “What’s inside your device’s software?”
After years of work in software transparency, provenance, and SBOMs, I’ve seen regulatory demands intensify across a number of industries. Let’s explore what’s become essential for quality, risk, and regulatory teams in medtech cybersecurity.
Software now lies at the heart of medical devices previously considered pure hardware. Today’s medical devices are sophisticated, software-driven machines.
From MRI machines and pacemakers to surgical robots and monitoring apps, nearly all rely on a blend of proprietary and open source software.
Patient outcomes depend on these devices’ software — and any vulnerability or malfunction carries immediate, serious consequences. Regulators are right to pay close attention.
Recent events have proven a sobering truth: cybersecurity is patient safety. Consider these incidents:
In healthcare, cyber risks are not just about data or financial losses. They translate directly to delayed surgery, disrupted care, and lives at stake. Recognizing these risks, the FDA is sharply increasing its focus on medical device cybersecurity.
For software quality, compliance, and regulatory teams, the message is clear: software bills of materials (SBOMs) are now a required starting point for cybersecurity.
Let’s talk specifics.
The FDA’s Center for Devices and Radiological Health (CDRH) has been focused on cybersecurity in medical devices for years, but new elements are coming forward.
As of March 2023, the FDA mandates cybersecurity documentation with premarket submissions—chief among these: a software bill of materials.
SBOMs must be:
That last point is crucial. It’s not enough to list what’s in your device. The FDA requires details on component support, end-of-life status, known vulnerabilities, and your remediation plan. Consider:
2025 FDA guidance in “Cybersecurity in Medical Devices: Quality System Considerations and Content of Premarket Submissions” further recommends listing known software anomalies and evaluating each for safety, exploitability, and proposed mitigations — a critical bridge between inventory and real-world risk. For each anomaly, manufacturers should evaluate:
This is important because it connects directly to SBOM data. An SBOM might tell you what components you have — but anomaly reporting helps tie that inventory to real-world risks.
FDA guidance is clear: SBOMs are more than regulatory paperwork. Manufacturers are urged to share SBOMs with hospitals, clinics, and healthcare delivery organizations.
When critical vulnerabilities arise, such as Log4Shell, hospitals need to quickly assess whether affected devices are in use, the patient risk, and the remediation plan. SBOMs enable a faster, smarter response. Without them, hospitals can’t answer those questions quickly, which delays critical incident response.
An SBOM alone is not enough to solve cybersecurity issues. You need SBOMs plus another data point to take action. For example, SBOMs plus CVE data will tell you what vulnerabilities you might be exposed to. SBOMs plus CVE data plus VEX data will tell you what vulnerabilities you’re actually exposed to. SBOMs help give you this information, but SBOMs alone don’t give you actionable insight.
Making SBOMs useful requires:
For medical device manufacturers, and for the regulatory teams evaluating devices, SBOMs should help answer critical questions like:
This is where SBOMs become more than a regulatory checkbox. They become a tool for proactive risk management.
Historically, many device manufacturers operated under the belief that cybersecurity could be handled reactively:
That’s no longer viable. Reactive cybersecurity and post-market patching are no longer enough. The FDA now considers device safety inseparable from cybersecurity.
And if you’re in Quality, Regulatory, or Compliance roles, this means:
Here’s another reason SBOMs matter and it goes beyond FDA requirements: business risk. A device recall due to a cybersecurity vulnerability isn’t just a regulatory problem. It can:
Hospitals and buyers increasingly require SBOMs during procurement, making strong cybersecurity practices key to competitiveness and business success.
Kusari is building solutions to transform static SBOMs into dynamic, actionable intelligence, standardizing machine-readable records, automating threat correlation, and rapidly sharing risk insights across the ecosystem.
The ultimate goal is to have an ecosystem where:
So that, above all, medical devices remain safe for patients.
If you’re working in Software Quality, Risk & Compliance, or Regulatory Affairs at a medical device company, here are my top five next steps:
If you’re wrestling with the next steps for SBOM generation, medical device cybersecurity, cybercompliance, and supply chain risk management, connect with me on LinkedIn or contact us. Kusari is committed to turning SBOMs into living intelligence. We can help you implement security by design and know what’s in your device’s software so your organization is resilient and your devices are safer for patients.
No older posts
No newer posts