📓
mediam
  • doc.mediam.dev
  • D1 - Specification
    • Introduction
      • What are the risks?
      • What is specific to healthcare?
      • New regulations
      • Regulatory requirements
    • Market study
      • Competitive landscape
        • Features
      • Market characteristics
      • Interviews
    • Use cases
      • Healthcare IT
      • Connected medical devices
      • BMS
    • References
  • Prototypes
    • Hardware prototype
    • Technical issues today
    • Solution architecture
    • D2 - Network management
      • HTTP3
      • SCHC
      • End to end encryption
    • D3 - Lifecycle management
      • Machine identity
        • Decentralized identity
        • DIF KERI
      • Remote updates
    • D4 - User access
  • perspectives
    • D5 - Final report
      • How to implement regulatory requirements
      • Next steps
Powered by GitBook
On this page
  • Awareness
  • References

Was this helpful?

  1. D1 - Specification

References

Links to useful resources.

PreviousBMSNextHardware prototype

Last updated 3 years ago

Was this helpful?

Awareness

  • iamthecavalry gathers information related to the threats encountered in the and has even what an attack could mean

References

  • Related to healthcare in general

    • the is well adapted to the healthcare domain

    • kantara initiative, and in particular identity management is a topic that has received specific attention in the heathcare sector, with standards such as (which solves the patient-doctor access problem)

    • ENISA has published several papers related to

    • : an example of EU project that studies how to mitigating cyber-physical threats in the healthcare sector

  • Standards related to connected devices

    • IEC 62443 provides guidance useful to secure industrial IoT, which could be applied to healthcare as well

    • provides guidance on IoT security

    • : "safe, effective and secure health software and health IT systems, including those incorporating medical devices"

    • has published several standards to better secure IoT devices

healthcare sector
simulated
nodirt threat model
UMA2
cybersecurity in healthcare
safecare
ETSI EN 303 645
IEC JWG7
Trusted computing group