News & Insights

Thought leadership for the Medical Device Industry

Cybersecurity Labeling for Medical Devices

Cybersecurity Labeling for Medical Devices

October 14, 20259 min read

A PDF version of this guide is available for download, which contains additional content and a complete example of cybersecurity labeling content for a fictional medica device.

1.0 Purpose

This guide helps manufacturers understand and implement cybersecurity labeling that complies with the FDA’s 2025 Premarket Cybersecurity Guidance (Section VI.A.) and aligns with IEC 81001-5-1:2021 (Clause 5.8 and Annex E). Cybersecurity labeling connects design intent to real-world device use. It communicates to clinicians, IT administrators, and healthcare delivery organizations how to install, configure, maintain, and retire a device securely. The goal of this guide is to make labeling expectations clear, actionable, and accessible so that teams can produce labeling that supports both compliance and patient safety without unnecessary complexity.

2.0 Introduction

Cybersecurity labeling is required for every medical device containing software or network capability. It bridges engineering, regulatory, and communication disciplines, converting technical design documentation into usable guidance for end users. Section VI.A. of the FDA guidance defines fourteen (14) elements that labeling must include, plus the optional MDS2 Form. These requirements complement IEC 81001-5-1, which calls for accompanying documentation such as:

  • Secure operation and account-management guidelines;

  • Security options and configuration guidance;

  • Information on residual risks; and

  • Instructions for decommissioning and data removal.

Cybersecurity labeling is therefore both a regulatory artifact and a safety control. It is part of the Secure Product Development Framework (SPDF) and the Total Product Life-Cycle (TPLC) process described in SEC-GUIDE-07.

3.0 FDA’s 14 Cybersecurity Labeling Requirements

Each element below includes the FDA’s expectation, a plain-language interpretation, and Velentium Medical’s practical recommendations per Section VI.A. of the FDA Premarket Guidance.

3.1 Device Instructions and Product Specifications

Provide clear instructions for secure setup, installation, and operation, including any hardware or software specifications needed for safe use. Example: The IFU details installation steps, credential creation, and safe startup checks before clinical use.

  • Include configuration prerequisites (OS version, network protocols, permissions).

  • State secure defaults and what not to change, or how to change certain things in an authorized and appropriate manner, if necessary.

3.2 Diagrams or Descriptions of System Architecture

Provide an overview of the device’s components, data flows, and boundaries of trust. Example: A labeled diagram shows the implant, programmer, cloud gateway, and associated trust boundaries.

  • Keep diagrams simple and intuitive but comprehensive in the internal and external interfaces available in the system.

  • Global security architecture views per FDA requirements or similar diagram are useful for users to understand the system and its architecture in terms of deployment and operation.

  • Identify where encryption, authentication, update, and other controls occur.

3.3 List of Network Ports and Interfaces

List all physical and logical interfaces, the purpose of each, and which are enabled by default must be listed clearly in the labeling. Example: Labeling lists USB, Ethernet, and WiFi interfaces with the recommended information and notes that diagnostic ports are disabled in production firmware.

  • Identify whether each interface is configurable or fixed.

  • Include all interfaces, even if they are disabled, not used, or proprietary.

3.4 Supporting Infrastructure Requirements

Specify environmental and infrastructure requirements needed to maintain security. Example: Labeling notes that the device must operate on a segmented network behind a firewall and be integrated into the hospital’s Active Directory for authentication.

  • Define minimum network protections and patch management expectations.

  • Enable IT admins to deploy your system into their network by communicating these needs clearly.

  • Clearly distinguish responsibilities: what the manufacturer provides vs. what the operator must provide.

3.5 Machine-Readable SBOM Available to Users

Provide or reference a Software Bill of Materials (SBOM) that lists all software components. Example: The SBOM is hosted on the manufacturer’s portal and updated with each software release; this is not the only way to provide an SBOM to users.

  • Follow NTIA and CISA minimum elements for SBOMs.

  • Describe how users can access and interpret an up-to-date SBOM. This can be via a web portal, an email address, or other means.

3.6 Authorized Update Process and Version Control

Describe how software and firmware updates and security patches are distributed, authenticated, and tracked. Labeling should clarify how the manufacturer delivers both routine updates (feature or performance enhancements) and patches (targeted corrections for known vulnerabilities). Example: The manual outlines a digitally signed, encrypted update and patch process verified during installation, with automatic version checks and logging of completed updates.

Tips:

  • Include version numbering and rollback prevention steps.

  • Explain how users verify successful installation and how the system confirms patch integrity.

  • State how users will be notified of new updates, emergency patches, or vulnerability advisories (e.g., through a secure portal, email alerts, or in-app notifications).

  • Identify who is authorized to perform updates and patches.

  • Reference the manufacturer’s coordinated vulnerability disclosure (CVD) process for reporting or receiving vulnerability information.

3.7 Event Detection and Response to Anomalies

Describe how the device detects, logs, and communicates anomalous or suspicious activity. Example: The IFU explains that repeated failed login attempts trigger a temporary lockout and generate an audit log.

  • Identify which events are logged locally vs. remotely.

  • Include procedures for responding to alerts, such as who they can reach out to in the event they suspect a security issue is occurring.

  • Determine if users or local HDO admins need log access.

  • Include instructions for reporting suspected security incidents or vulnerabilities to the manufacturer’s designated intake channel as part of the coordinated vulnerability disclosure process.

3.8 Features that Protect Critical Functionality

Identify the device features designed to preserve safe and essential performance during a cybersecurity event. Example: If network communication fails, therapy delivery continues in a default safe mode.

  • Clarify which functions are “essential performance” under non-security IEC standards, and ensure that security mechanisms are designed into the system to preserve these functions.

3.9 Backup and Restore Procedures

Provide instructions for securely backing up configuration and patient data and restoring it when needed. Example: Administrators can export encrypted configuration backups to verified storage media and restore using authenticated credentials.

  • Identify what data can be backed up and who can perform it.

  • Emphasize encryption and authentication of backup files.

3.10 Retention and Recovery by Authenticated Users

Explain how authenticated users can recover configurations and resume operation following an outage or failure. Example: After power loss, an authenticated user logs in and selects “Recover Settings from Secure Backup.”

  • Clarify the difference between automatic and manual recovery.

  • Require authentication before restoration.

  • Reference Resiliency and Recovery Controls from SEC-GUIDE-08.

3.11 Secure Default Configuration and Risk Warnings

State the device’s secure default settings and describe risks if they are changed. Example: Default network mode is “secure-only.” If the user enables “open network,” labeling warns of reduced protection.

  • Highlight settings that affect security posture but sip the system in the most-secure manner possible.

  • Provide rationale for defaults and residual-risk statements per IEC 81001-5-1 5.8.2 (d).

  • Provide authorized users (e.g., local HDO admins) instructions and the ability to modify configurations within reason and where applicable.

3.12 Forensic Logging and SIEM Compatibility

Describe the device’s forensic logging capabilities and compatibility with enterprise security monitoring systems. Example: The manual specifies syslog format and instructions for forwarding logs to a hospital’s SIEM system.

  • Define log formats (e.g., CEF, JSON, syslog).

  • Identify what data is protected and retained.

  • Ensure privacy compliance when PHI appears in logs.

3.13 End-of-Support (EOS) and Risk Transfer Process

Communicate how long the device will receive cybersecurity updates and how risk transfers after support ends. Example: The labeling states that security updates are guaranteed for 7 years, after which the device should be replaced or isolated.

  • Include EOS dates and manufacturer contact for replacement planning.

  • Reference lifecycle management guidance in SEC-GUIDE-07.

3.14 Secure Decommissioning and Sanitization

Provide instructions for secure removal of devices from service and sanitization of data. Example: The IFU describes how to wipe stored data, revoke keys, and verify successful sanitization before disposal or resale.

  • Include step-by-step sanitization procedures.

  • Reference IEC 81001-5-1 Annex E.3 guidance on HEALTH SOFTWARE decommissioning.

  • Address both data and physical device destruction when applicable.

3.15 MDS2 Form (Optional but recommended)

Provide the NEMA Manufacturer Disclosure Statement for Medical Device Security (MDS2) to summarize device cybersecurity features and security controls in a standard, comparable format. Example: The MDS2 Form is provided as a downloadable PDF alongside the IFU and SBOM.

  • Keep MDS2 content consistent with the Cybersecurity Labeling content.

  • Update MDS2 whenever security architecture or components change.

  • Consider sales processes, HDO procurement processes, and long-term maintenance processes in Cybersecurity Labeling content.

4.0 Integrating Labeling into Design and Risk Management

Cybersecurity labeling requirements should be identified early in the design process (SEC-GUIDE-10). For each control derived during threat modeling, ask:

  • Does this control require user configuration or awareness?

  • If yes, what labeling content communicates that responsibility?

Labeling content related to software updates, patching, and vulnerability communication should be identified early in the Secure Product Development Framework (SPDF). As part of threat modeling and cybersecurity risk assessment, determine:

  • Which risks will require labeling statements or user actions (e.g., applying patches).

  • How vulnerability intake and disclosure information will be conveyed to users.

  • How labeling will align with postmarket monitoring and coordinated disclosure processes described in the manufacturer’s cybersecurity management plan.

5.0 Best Practices for Clear Cybersecurity Labeling

  • Write for real users. Use simple, action-oriented language.

  • Show, don’t tell. Use diagrams and tables for configurations and data flows.

  • Keep it honest. Disclose residual risks and expected security responsibilities.

  • Stay consistent. Align terminology across IFUs, technical manuals, and eSTAR artifacts.

  • Review frequently. Update labeling with every release or postmarket security change.

  • Consider publishing required and non-required documentation to users, such as product whitepapers, MDS2 forms, testing reports, and VEX information with SBOMs.

  • Be transparent about patching and vulnerability management: clearly communicate where users can find update notices, vulnerability advisories, and instructions for reporting potential issues.

6.0 Next Steps

Cybersecurity labeling is both a compliance requirement and an opportunity to build trust. When manufacturers communicate security transparently, users are empowered to maintain protection throughout the product’s life. Velentium Medical helps manufacturers create labeling that meets regulatory expectations and speaks clearly to end users. Learn more at www.VelentiumMedical.com/Cybersecurity.

7.0 References and Resources

  • Velentium Medical SEC-GUIDE-00 - Navigating Cybersecurity during FDA eSTAR Submissions

  • Velentium Medical SEC-GUIDE-07 - Total Product Life-Cycle Security

  • Velentium Medical SEC-GUIDE-08 - Security Requirements and Controls

  • Velentium Medical SEC-GUIDE-09 - Cryptographic Assurance Levels (VEL-CAL)

  • Velentium Medical SEC-GUIDE-10 - Design-Time Risk Management for Medical Devices

  • FDA Cybersecurity in Medical Devices: Quality System Considerations and Content of Premarket Submissions (2025)

  • IEC 81001-5-1:2021 – Health Software and Health IT Systems Safety, Effectiveness and Security – Part 5-1: Security Activities in the Product Lifecycle

  • AAMI/ANSI SW96:2023 – Security Risk Management for Device Manufacturers

  • ANSI/NEMA HN 1-2019 Manufacturer Disclosure Statement for Medical Device Security (MDS2) Form (https://www.nema.org/standards/view/manufacturer-disclosure-statement-for-medical-device-security).

Download SEC-GUIDE-11 Cybersecurity Labeling for Medical Devices in PDF Format

An example of cybersecurity content for a fictional medical device system is available in the PDF version of this guide.

Cybersecurity Labeling Requirements per 2025 FDA Premarket Guidance
Back to Blog

Safe. Secure. Effective.

One stop for secure Medical Device R&D, product development, contract

manufacturing, and postmarket services

Velentium Medical logo

© 2025 Velentium Medical LLC. All Rights Reserved.