Back to Top Skip to main content

Army medical device cyber team balances benefits and risks of technology

An Army medic positions a patient for a CT scan, which helps radiologists diagnose different types of disease and injuries. Medical devices, such as radiology imaging systems, must now go through a cybersecurity validation process in order to connect to military networks (U.S. Army photo by Staff Sgt. Evelyn Chavez) An Army medic positions a patient for a CT scan, which helps radiologists diagnose different types of disease and injuries. Medical devices, such as radiology imaging systems, must now go through a cybersecurity validation process in order to connect to military networks (U.S. Army photo by Staff Sgt. Evelyn Chavez)

Recommended Content:


Access to advanced medical care directly supports the readiness of the Army's Warfighters by ensuring troops are fit and healthy on and off the battlefield.

Modern medical devices help the Army provide and sustain essential Soldier support; however, this same technology also poses an inherent risk.

Almost all newer medical devices contain some type of computer technology. If a medical device doesn't connect directly to a network, it is remotely or wirelessly accessible. These factors make medical devices potentially susceptible to intrusion from a hacker.

Experts warn hackers could exploit technology vulnerabilities within medical devices to either harm patients, steal private health care information and data, or gain "back door" entry to the wider DoD network.

At the U.S. Army Medical Materiel Agency, a subordinate organization of the U.S. Army Medical Research and Materiel Command, a team of medical technology experts comprise a cybersecurity cell created in early 2017. This team, part of the Integrated Clinical Systems Program Management Office, focuses on ensuring medical devices used by the military comply with strict DoD cybersecurity standards.

"The frequency and severity of cybersecurity attacks against the medical community will continue to rise until medical device manufacturers make security a top priority," explained USAMMA's Medical Device Cybersecurity Chief Andrew McGraw.

McGraw said that simply not connecting medical devices to the network isn't the best solution. Most modern medical devices, such as computed tomography (CT) scanners, are designed to connect to hospital networks. Network connection allows clinicians to access previous test results or upload images directly to the patient's electronic health records.

To maintain those capabilities, McGraw and his team work to ensure each medical device passes a robust security certification process to reduce the security vulnerabilities of commercially developed medical devices purchased and used by the Army.

"We believe in taking a proactive approach to cybersecurity," said McGraw. "We work with medical device manufacturers to reduce cybersecurity risks, so we can continue to leverage advanced medical technology."

To protect the network, DoD officials enforce strict cyber standards on all information technology. Medical devices, however, are not "information technology," explained McGraw. Rather, they are "medical technology." It is a subtle yet significant difference.

Information technology includes computers and supporting equipment designed to be controlled by the central processing unit of a computer, software, firmware and similar procedures, services and related resources.

Medical technologies are single purpose systems intended for use in the diagnosis of disease or other conditions, or in the cure, mitigation, treatment or prevention of disease.

Understanding this difference is important, said McGraw, because Federal Acquisition Regulation 2.1 excludes medical equipment from being classified as information technology. However, often medical technology is still held to the same strict standards as IT.

McGraw said that cybersecurity in health care delivery must be a balancing act. Too strict of a security requirement results in the continued use of antiquated and technologically outdated medical devices. Too lax of a security requirement results in greater risk.

"The requirement to secure the network and patient data needs to be weighed against the medical mission and the ability to provide best in class medical care to the Warfighter," McGraw said.

One process that helps the Army navigate through that balancing act is the Risk Management Framework process. The RMF approach to security control considers effectiveness, efficiency and constraints due to applicable laws, directives, executive orders, policies, standards or regulations.

In 2014, the DoD began adopting RMF as a replacement to the DoD Information Assurance Certification and Accreditation Process. Army networks began getting Authority to Operate (ATO) under RMF in 2016.

By 2017, the Army received ATO under RMF for its first medical device – a portable digital radiography system designed for use on the battlefield.

"This was a huge win for the Army, USAMRMC, and USAMMA," said ICS Project Manager Terri Pryor, who manages the medical device cybersecurity cell. "However, it is not a quick, simple or low-cost process."

Under current policy, RMF is a mandatory process for all medical devices on the DoD network, which includes not only new purchases but also all medical devices already in use. Pryor and others are concerned that the current process could create a significant issue for military medical care – forcing some devices off the network. Additionally, if a device can't pass the process, the Army might have to replace medical devices – which would otherwise be in good working order – before the end of their lifespans, which are typically 10 - 12 years.

"Is cybersecurity of medical devices important? Absolutely. Is there possibly a more streamlined approach to achieve our end goals? We think so," said McGraw.

To that end, USAMMA's medical device cybersecurity cell has been exploring the possibility of a "black box" solution that they believe could greatly reduce the number of security steps they have to take to gain ATO under RMF. The solution they are exploring works through a process called microsegmentation, which would allow an organization to isolate mini-networks within the larger network.

"Traditional security firewalls work like a fence to protect critical assets. But hackers have gotten pretty good at defeating these perimeters," said McGraw. "With microsegmentation, instead of one fence, we would have hundreds or thousands of smaller fences."

McGraw explained that actions such as running vulnerability scans or pushing IT updates on medical devices while they are in use could shut them down and affect patient care. Experts are also concerned that some security patches, designed and tested for DoD computers and not medical technology, could cause medical devices to malfunction.

"We don't just look at this from the perspective of protecting the network because we have to consider the potential impact to patient care," said McGraw. "So, in many ways, we have to protect the network from the device and, at the same time, we have to protect the device from the network."

The "black box" solution is one of many solutions being explored by McGraw and his team, who work closely with network security experts throughout DoD and the Defense Health Agency. While no specific solutions has been agreed upon just yet, the team remains focused on their mission.

McGraw added, "We take great pride in knowing that the work we do helps put life-saving tools into the hands of Soldiers, ultimately saving lives."

Disclaimer: Re-published content may have been edited for length and clarity. Read original post.

You also may be interested in...

Project Sea Raven delivers cutting-edge pathogen detection technology

U.S. Navy Petty Officer 1st Class James Bowes, senior preventive-medicine technician, places mosquitoes on a dish to view under a microscope. Project Sea Raven’s capabilities are not limited to just insects – it can test anything from blood to soil and water. (U.S. Navy photo by Petty Officer 1st Class Tom Ouellette)

Project Sea Raven is now an integral part of USNS Mercy’s microbiology capacity

Recommended Content:

Global Health Engagement | Technology | Military Hospitals and Clinics

Air Force lab puts medical devices through their paces

A 10-bed Expeditionary Medical Support Hospital (EMEDS+10) set up at the Air Force Medical Evaluation Support Activity testing facility at Fort Detrick, Maryland. AFMESA tests medical devices to ensure they will work in the field and survive the rigors of deployment. Many devices tested by AFMESA are used in EMEDS facilities, making it a critical testing location. (U.S. Air Force photo by Shireen Bedi)

Lab’s mission is unique within the Air Force, and across the U.S. military

Recommended Content:



Fact Sheet

The military’s inpatient electronic health record is used in acute hospital environments, providing point-of-care data capture at the patient’s bedside for physiological devices, fetal/uterine devices, ventilators and other patient care machines.

Recommended Content:

Technology | Military Health System Electronic Health Record

Advancements in telehealth improve access to healthcare

Air Force Medical Service Seal

Telehealth brings a range of services all working together to improve access

Recommended Content:

Access to Health Care | Military Hospitals and Clinics | Technology

Air Force robotic surgery training program aims at improving patient outcomes

Air Force Col. Debra Lovette (left), 81st Training Wing commander, receives a briefing from Air Force 2nd Lt. Nina Hoskins, 81st Surgical Operations squadron room nurse, on robotics surgery capabilities inside the robotics surgery clinic at Keesler Medical Center, Mississippi. The training program stood up in March 2017 and has trained surgical teams within the Air Force and across the Department of the Defense. (U.S. Air Force photo by Kemberly Groue).

Robotic surgery is becoming the standard of care for many specialties and procedures

Recommended Content:

Technology | Innovation | Military Hospitals and Clinics

Robot dog improves SOF medical practices

A multi-purpose canine handler with U.S. Marine Corps Forces, Special Operations Command, controls a laceration on a realistic canine mannequin during MPC medical training. During this training, MPC handlers practice applying canine medical aid on the new “robot dog” for the first time, which is in its final stages of testing and development. (U.S. Marine Corps photo by Cpl. Bryann K Whitley)

The development of the new “robot dog” came from SOCOM’s desire to improve the current medical training capabilities

Recommended Content:

Technology | Veterinary Service

Theater Enterprise-Wide Logistics Systems (TEWLS)

Fact Sheet

TEWLS consolidates numerous military logistics functions into a single application and database.

Recommended Content:

Medical Logistics | Technology

Defense Medical Logistics Standard Support (DMLSS)

Fact Sheet

DMLSS delivers an automated and integrated information system with a comprehensive range of medical materiel, equipment, war reserve materiel and facilities management functions.

Recommended Content:

Medical Logistics | Technology

Joint Medical Asset Repository (JMAR)

Fact Sheet

JMAR provides 24/7 access to medical asset information for users, on any computer

Recommended Content:

Medical Logistics | Technology

Doctors use cutting-edge research at Navy hospital

Chad Rodarmer, traumatic brain injury clinic program manager, demonstrates tracking a patient's eye movement at Naval Medical Center San Diego, California. (DoD photo by EJ Hersom)

The Navy is developing and using cutting-edge research to better help service members, their family members and retirees

Recommended Content:

Technology | Warrior Care | Traumatic Brain Injury

We have the technology: 3-D printing takes wounded warriors to a new dimension

Peter Liacouras is director of the 3-D Medical Applications Center at Walter Reed National Military Medical Center in Bethesda, Maryland.

Center at Walter Reed designs, produces custom-made items

Recommended Content:

Technology | Warrior Care

App helps Guard Soldiers prepare for physical fitness test

New app available through Guard Your Health will help Soldiers prepare for their physical fitness assessments. (U.S. Army photo)

Guard Your Health recently launched Guard Fit

Recommended Content:

Physical Activity | Technology | Health Readiness

Combat medic students train using hologram technology

Alonzo Gonzales, a Combat Medic Program emergency medical technician course instructor, lectures students in Alpha Class 70-17 about different obstetrics complications  utilizing a specialized OB training manikin. The OB manikins resemble life-size pelvic cavities inside which the “fetus” can be positioned to replicate any number of complicated situations. (U.S. Army photo by Lisa Braun)

The Combat Medic Training program is the first METC program to incorporate hologram technology to augment training

Recommended Content:

Technology | Innovation



This postcard is for MHS GENESIS locations to provide to beneficiaries as introductory information.

Recommended Content:

MHS GENESIS | Military Health System Electronic Health Record | Technology

Training, technological synergy likely the key to future battlefield care scenarios

Soldiers from the 15th Brigade Support Battalion out of Fort Hood, Texas, provide treatment to the "wounded" during a mass casualty exercise, March 2, 2015. The training, taking place on Fort Irwin, California, is part of a National Training Center rotation scenario testing their ability to perform under a simulated combat environment. (Photo Credit: G. A. Volb)

Universal interoperability among technological devices and the development of an on-demand, on-call marketplace for continuous communication regardless of location key for prolonged care on the battlefield

Recommended Content:

Health Readiness | Technology
<< < 1 2 3 4 5  ... > >> 
Showing results 46 - 60 Page 4 of 8

DHA Address: 7700 Arlington Boulevard | Suite 5101 | Falls Church, VA | 22042-5101

Some documents are presented in Portable Document Format (PDF). A PDF reader is required for viewing:: Download a PDF Reader or learn more about PDFs.