🇺🇸English
Risk Management Specialist
ISO 14971:2019 risk management implementation throughout the medical device lifecycle.
Table of Contents
- Risk Management Planning Workflow
- Risk Analysis Workflow
- Risk Evaluation Workflow
- Risk Control Workflow
- Post-Production Risk Management
- Risk Assessment Templates
- Decision Frameworks
- Tools and References
Risk Management Planning Workflow
Establish risk management process per ISO 14971.
Workflow: Create Risk Management Plan
- Define scope of risk management activities:
- Medical device identification
- Lifecycle stages covered
- Applicable standards and regulations
- Establish risk acceptability criteria:
- Define probability categories (P1-P5)
- Define severity categories (S1-S5)
- Create risk matrix with acceptance thresholds
- Assign responsibilities:
- Risk management lead
- Subject matter experts
- Approval authorities
- Define verification activities:
- Methods for control verification
- Acceptance criteria
- Plan production and post-production activities:
- Information sources
- Review triggers
- Update procedures
- Obtain plan approval
- Establish risk management file
- Validation: Plan approved; acceptability criteria defined; responsibilities assigned; file established
Risk Management Plan Content
| Section | Content | Evidence |
|---|
| Scope | Device and lifecycle coverage | Scope statement |
| Criteria | Risk acceptability matrix | Risk matrix document |
| Responsibilities | Roles and authorities | RACI chart |
| Verification | Methods and acceptance | Verification plan |
| Production/Post-Production | Monitoring activities | Surveillance plan |
Risk Acceptability Matrix (5x5)
| Probability \ Severity | Negligible | Minor | Serious | Critical | Catastrophic |
|---|
| Frequent (P5) | Medium | High | High | Unacceptable | Unacceptable |
| Probable (P4) | Medium | Medium | High | High | Unacceptable |
| Occasional (P3) | Low | Medium | Medium | High | High |
| Remote (P2) | Low | Low | Medium | Medium | High |
|
Risk Level Actions
| Level | Acceptable | Action Required |
|---|
| Low | Yes | Document and accept |
| Medium | ALARP | Reduce if practicable; document rationale |
| High | ALARP | Reduction required; demonstrate ALARP |
| Unacceptable | No | Design change mandatory |
Risk Analysis Workflow
Identify hazards and estimate risks systematically.
Workflow: Conduct Risk Analysis
- Define intended use and reasonably foreseeable misuse:
- Medical indication
- Patient population
- User population
- Use environment
- Select analysis method(s):
- FMEA for component/function analysis
- FTA for system-level analysis
- HAZOP for process deviations
- Use Error Analysis for user interaction
- Identify hazards by category:
- Energy hazards (electrical, mechanical, thermal)
- Biological hazards (bioburden, biocompatibility)
- Chemical hazards (residues, leachables)
- Operational hazards (software, use errors)
- Determine hazardous situations:
- Sequence of events
- Foreseeable misuse scenarios
- Single fault conditions
- Estimate probability of harm (P1-P5)
- Estimate severity of harm (S1-S5)
- Document in hazard analysis worksheet
- Validation: All hazard categories addressed; all hazards documented; probability and severity assigned
Hazard Categories Checklist
| Category | Examples | Analyzed |
|---|
| Electrical | Shock, burns, interference | ☐ |
| Mechanical | Crushing, cutting, entrapment | ☐ |
| Thermal | Burns, tissue damage | ☐ |
| Radiation | Ionizing, non-ionizing | ☐ |
| Biological | Infection, biocompatibility | ☐ |
| Chemical | Toxicity, irritation | ☐ |
| Software | Incorrect output, timing | ☐ |
| Use Error | Misuse, perception, cognition | ☐ |
| Environment | EMC, mechanical stress | ☐ |
Analysis Method Selection
| Situation | Recommended Method |
|---|
| Component failures | FMEA |
| System-level failure | FTA |
| Process deviations | HAZOP |
| User interaction | Use Error Analysis |
| Software behavior | Software FMEA |
| Early design phase | PHA |
Probability Criteria
| Level | Name | Description | Frequency |
|---|
| P5 | Frequent | Expected to occur | >10⁻³ |
| P4 | Probable | Likely to occur | 10⁻³ to 10⁻⁴ |
| P3 | Occasional | May occur | 10⁻⁴ to 10⁻⁵ |
| P2 | Remote | Unlikely | 10⁻⁵ to 10⁻⁶ |
| P1 | Improbable | Very unlikely | <10⁻⁶ |
Severity Criteria
| Level | Name | Description | Harm |
|---|
| S5 | Catastrophic | Death | Death |
| S4 | Critical | Permanent impairment | Irreversible injury |
| S3 | Serious | Injury requiring intervention | Reversible injury |
| S2 | Minor | Temporary discomfort | No treatment needed |
| S1 | Negligible | Inconvenience | No injury |
See: references/risk-analysis-methods.md
Risk Evaluation Workflow
Evaluate risks against acceptability criteria.
Workflow: Evaluate Identified Risks
- Calculate initial risk level from probability × severity
- Compare to risk acceptability criteria
- For each risk, determine:
- Acceptable: Document and accept
- ALARP: Proceed to risk control
- Unacceptable: Mandatory risk control
- Document evaluation rationale
- Identify risks requiring benefit-risk analysis
- Complete benefit-risk analysis if applicable
- Compile risk evaluation summary
- Validation: All risks evaluated; acceptability determined; rationale documented
Risk Evaluation Decision Tree
Risk Estimated
│
▼
Apply Acceptability Criteria
│
├── Low Risk ──────────► Accept and document
│
├── Medium Risk ───────► Consider risk reduction
│ │ Document ALARP if not reduced
│ ▼
│ Practicable to reduce?
│ │
│ Yes──► Implement control
│ No───► Document ALARP rationale
│
├── High Risk ─────────► Risk reduction required
│ │ Must demonstrate ALARP
│ ▼
│ Implement control
│ Verify residual risk
│
└── Unacceptable ──────► Design change mandatory
Cannot proceed without control
ALARP Demonstration Requirements
| Criterion | Evidence Required |
|---|
| Technical feasibility | Analysis of alternative controls |
| Proportionality | Cost-benefit of further reduction |
| State of the art | Comparison to similar devices |
| Stakeholder input | Clinical/user perspectives |
Benefit-Risk Analysis Triggers
| Situation | Benefit-Risk Required |
|---|
| Residual risk remains high | Yes |
| No feasible risk reduction | Yes |
| Novel device | Yes |
| Unacceptable risk with clinical benefit | Yes |
| All risks low | No |
Risk Control Workflow
Implement and verify risk control measures.
Workflow: Implement Risk Controls
- Identify risk control options:
- Inherent safety by design (Priority 1)
- Protective measures in device (Priority 2)
- Information for safety (Priority 3)
- Select optimal control following hierarchy
- Analyze control for new hazards introduced
- Document control in design requirements
- Implement control in design
- Develop verification protocol
- Execute verification and document results
- Evaluate residual risk with control in place
- Validation: Control implemented; verification passed; residual risk acceptable; no unaddressed new hazards
Risk Control Hierarchy
| Priority | Control Type | Examples | Effectiveness |
|---|
| 1 | Inherent Safety | Eliminate hazard, fail-safe design | Highest |
| 2 | Protective Measures | Guards, alarms, automatic shutdown | High |
| 3 | Information | Warnings, training, IFU | Lower |
Risk Control Option Analysis Template
RISK CONTROL OPTION ANALYSIS
Hazard ID: H-[XXX]
Hazard: [Description]
Initial Risk: P[X] × S[X] = [Level]
OPTIONS CONSIDERED:
| Option | Control Type | New Hazards | Feasibility | Selected |
|--------|--------------|-------------|-------------|----------|
| 1 | [Type] | [Yes/No] | [H/M/L] | [Yes/No] |
| 2 | [Type] | [Yes/No] | [H/M/L] | [Yes/No] |
SELECTED CONTROL: Option [X]
Rationale: [Justification for selection]
IMPLEMENTATION:
- Requirement: [REQ-XXX]
- Design Document: [Reference]
VERIFICATION:
- Method: [Test/Analysis/Review]
- Protocol: [Reference]
- Acceptance Criteria: [Criteria]
Risk Control Verification Methods
| Method | When to Use | Evidence |
|---|
| Test | Quantifiable performance | Test report |
| Inspection | Physical presence | Inspection record |
| Analysis | Design calculation | Analysis report |
| Review | Documentation check | Review record |
Residual Risk Evaluation
| After Control | Action |
|---|
| Acceptable | Document, proceed |
| ALARP achieved | Document rationale, proceed |
| Still unacceptable | Additional control or design change |
| New hazard introduced | Analyze and control new hazard |
Post-Production Risk Management
Monitor and update risk management throughout product lifecycle.
Workflow: Post-Production Risk Monitoring
- Identify information sources:
- Customer complaints
- Service reports
- Vigilance/adverse events
- Literature monitoring
- Clinical studies
- Establish collection procedures
- Define review triggers:
- New hazard identified
- Increased frequency of known hazard
- Serious incident
- Regulatory feedback
- Analyze incoming information for risk relevance
- Update risk management file as needed
- Communicate significant findings
- Conduct periodic risk management review
- Validation: Information sources monitored; file current; reviews completed per schedule
Information Sources
| Source | Information Type | Review Frequency |
|---|
| Complaints | Use issues, failures | Continuous |
| Service | Field failures, repairs | Monthly |
| Vigilance | Serious incidents | Immediate |
| Literature | Similar device issues | Quarterly |
| Regulatory | Authority feedback | As received |
| Clinical | PMCF data | Per plan |
Risk Management File Update Triggers
| Trigger | Response Time | Action |
|---|
| Serious incident | Immediate | Full risk review |
| New hazard identified | 30 days | Risk analysis update |
| Trend increase | 60 days | Trend analysis |
| Design change | Before implementation | Impact assessment |
| Standards update | Per transition period | Gap analysis |
Periodic Review Requirements
| Review Element | Frequency |
|---|
| Risk management file completeness | Annual |
| Risk control effectiveness | Annual |
| Post-market information analysis | Quarterly |
| Risk-benefit conclusions | Annual or on new data |
Risk Assessment Templates
Hazard Analysis Worksheet
HAZARD ANALYSIS WORKSHEET
Product: [Device Name]
Document: HA-[Product]-[Rev]
Analyst: [Name]
Date: [Date]
| ID | Hazard | Hazardous Situation | Harm | P | S | Initial Risk | Control | Residual P | Residual S | Final Risk |
|----|--------|---------------------|------|---|---|--------------|---------|------------|------------|------------|
| H-001 | [Hazard] | [Situation] | [Harm] | [1-5] | [1-5] | [Level] | [Control ref] | [1-5] | [1-5] | [Level] |
FMEA Worksheet
FMEA WORKSHEET
Product: [Device Name]
Subsystem: [Subsystem]
Analyst: [Name]
Date: [Date]
| ID | Item | Function | Failure Mode | Effect | S | Cause | O | Control | D | RPN | Action |
|----|------|----------|--------------|--------|---|-------|---|---------|---|-----|--------|
| FM-001 | [Item] | [Function] | [Mode] | [Effect] | [1-10] | [Cause] | [1-10] | [Detection] | [1-10] | [S×O×D] | [Action] |
RPN Action Thresholds:
>200: Critical - Immediate action
100-200: High - Action plan required
50-100: Medium - Consider action
<50: Low - Monitor
Risk Management Report Summary
RISK MANAGEMENT REPORT
Product: [Device Name]
Date: [Date]
Revision: [X.X]
SUMMARY:
- Total hazards identified: [N]
- Risk controls implemented: [N]
- Residual risks: [N] Low, [N] Medium, [N] High
- Overall conclusion: [Acceptable / Not Acceptable]
RISK DISTRIBUTION:
| Risk Level | Before Control | After Control |
|------------|----------------|---------------|
| Unacceptable | [N] | 0 |
| High | [N] | [N] |
| Medium | [N] | [N] |
| Low | [N] | [N] |
CONTROLS IMPLEMENTED:
- Inherent safety: [N]
- Protective measures: [N]
- Information for safety: [N]
OVERALL RESIDUAL RISK: [Acceptable / ALARP Demonstrated]
BENEFIT-RISK CONCLUSION: [If applicable]
APPROVAL:
Risk Management Lead: _____________ Date: _______
Quality Assurance: _____________ Date: _______
Decision Frameworks
Risk Control Selection
What is the risk level?
│
├── Unacceptable ──► Can hazard be eliminated?
│ │
│ Yes─┴─No
│ │ │
│ ▼ ▼
│ Eliminate Can protective
│ hazard measure reduce?
│ │
│ Yes─┴─No
│ │ │
│ ▼ ▼
│ Add Add warning
│ protection + training
│
└── High/Medium ──► Apply hierarchy
starting at Level 1
New Hazard Analysis
| Question | If Yes | If No |
|---|
| Does control introduce new hazard? | Analyze new hazard | Proceed |
| Is new risk higher than original? | Reject control option | Acceptable trade-off |
| Can new hazard be controlled? | Add control | Reject control option |
Risk Acceptability Decision
| Condition | Decision |
|---|
| All risks Low | Acceptable |
| Medium risks with ALARP | Acceptable |
| High risks with ALARP documented | Acceptable if benefits outweigh |
| Any Unacceptable residual | Not acceptable - redesign |
Tools and References
Scripts
Risk Matrix Calculator Features:
- ISO 14971 5x5 risk matrix calculation
- FMEA RPN (Risk Priority Number) calculation
- Interactive mode for guided assessment
- Display risk criteria definitions
- JSON output for integration
References
Quick Reference: ISO 14971 Process
| Stage | Key Activities | Output |
|---|
| Planning | Define scope, criteria, responsibilities | Risk Management Plan |
| Analysis | Identify hazards, estimate risk | Hazard Analysis |
| Evaluation | Compare to criteria, ALARP assessment | Risk Evaluation |
| Control | Implement hierarchy, verify | Risk Control Records |
| Residual | Overall assessment, benefit-risk | Risk Management Report |
| Production | Monitor, review, update | Updated RM File |
Related Skills
AI-Specific Risk Management (ISO 14971 + AI Risk Considerations)
AI/ML Medical Device Risk Categories
Traditional ISO 14971 hazard categories must be extended for AI/ML-based devices:
| AI-Specific Hazard | Description | Severity Potential | Detection Difficulty |
|---|
| Model bias | Discriminatory outputs across patient subgroups | S3-S5 (misdiagnosis) | High — requires subgroup analysis |
| Data drift | Input data distribution shifts from training data | S2-S4 (degraded performance) | Medium — requires monitoring |
| Concept drift | Clinical ground truth changes over time | S3-S5 (outdated predictions) | High — requires clinical validation |
| Adversarial inputs | Intentionally crafted inputs to deceive model | S2-S5 (incorrect output) | High — requires adversarial testing |
| Hallucination/confabulation | Plausible but incorrect outputs | S3-S5 (false diagnosis) | Medium — requires output validation |
| Training data poisoning | Corrupted training data leads to systematic errors | S3-S5 |
AI Risk Analysis Methodology
Step 1: AI System Characterization
→ Define intended use, user population, clinical context
→ Classify: locked algorithm vs. adaptive vs. continuously learning
→ Map to SaMD risk framework (IMDRF)
Step 2: AI-Specific Hazard Identification
→ Apply standard ISO 14971 hazard categories
→ ADD: data quality hazards, algorithmic hazards, integration hazards
→ Consider: training data representativeness, edge cases, failure modes
Step 3: AI Failure Mode Analysis
→ Extend FMEA with AI-specific failure modes:
- False positive/negative beyond acceptable rates
- Performance degradation over time
- Out-of-distribution input handling
- Feature importance shift
→ For each failure mode: determine harm pathway to patient
Step 4: AI-Specific Risk Controls
→ Confidence thresholds (reject uncertain predictions)
→ Human-in-the-loop for high-risk decisions
→ Input validation and out-of-distribution detection
→ Continuous performance monitoring with drift detection
→ Automated model retraining safeguards
→ Fail-safe modes when AI system is unavailable
Step 5: AI Risk Monitoring Plan
→ Define performance metrics and acceptable thresholds
→ Establish monitoring frequency (real-time, daily, weekly)
→ Define retraining triggers and validation requirements
→ Plan for model versioning and rollback procedures
AI Risk Acceptability Considerations
| Risk Factor | Additional Consideration for AI |
|---|
| Probability | Include statistical confidence intervals for model performance |
| Severity | Consider both direct harm and harm from delayed correct treatment |
| Detectability | Factor in opacity of AI decision-making (explainability) |
| Benefit | Quantify clinical benefit vs. non-AI alternative |
| ALARP | State-of-the-art includes current AI best practices (GMLP) |
Cybersecurity Risk Integration (IEC 81001-5-1)
Health Software Cybersecurity Risk Management
IEC 81001-5-1:2021 establishes cybersecurity lifecycle requirements for health software. Integrate with ISO 14971:
| ISO 14971 Stage | IEC 81001-5-1 Integration | Combined Output |
|---|
| Risk Management Plan | Include cybersecurity scope, threat modeling methodology | Combined RM + cybersecurity plan |
| Hazard identification | Add cybersecurity threat identification (STRIDE, attack trees) | Extended hazard analysis with cyber threats |
| Risk estimation | Estimate probability based on threat landscape and exploitability | Risk register with cyber-specific likelihood factors |
| Risk control | Implement security controls as risk mitigations | Controls traceable to both safety and security risks |
| Residual risk | Evaluate residual cybersecurity risk | Combined residual risk assessment |
| Post-production | Monitor threat landscape, CVE databases, incident reports | Integrated PMS + security monitoring |
Cybersecurity Threat Categories for Medical Devices
| Threat Category | Examples | ISO 14971 Harm Pathway |
|---|
| Unauthorized access | Credential theft, privilege escalation | Modification of device settings → patient harm |
| Data breach | PHI exfiltration, ransomware | Loss of data availability → delayed treatment |
| Denial of service | Network flooding, resource exhaustion | Device unavailable → delayed diagnosis/treatment |
| Malware | Ransomware, trojans, supply chain compromise | Device malfunction → incorrect output |
| Data integrity | Man-in-the-middle, data manipulation | Corrupted clinical data → incorrect treatment |
| Supply chain | Compromised dependencies, malicious updates | Backdoor access → any harm pathway |
Cybersecurity FMEA Extension
Add these columns to standard FMEA for cybersecurity failure modes:
CYBERSECURITY FMEA EXTENSION
| ID | Component | Security Function | Threat | Attack Vector | Exploitability | Impact | S | O | D | RPN | Security Control |
|----|-----------|-------------------|--------|---------------|---------------|--------|---|---|---|-----|-----------------|
| CS-001 | Auth module | User authentication | Credential theft | Phishing | High (8) | Full access | 8 | 6 | 4 | 192 | MFA + session management |
| CS-002 | Data store | Data confidentiality | SQL injection | Network input | Medium (5) | Data breach | 9 | 4 | 3 | 108 | Parameterized queries + WAF |
| CS-003 | Update mechanism | Integrity | Supply chain | Compromised update | Low (3) | Malware install | 10 | 2 | 7 | 140 | Code signing + integrity verification |
Supply Chain Risk Management
Medical Device Supply Chain Risks
| Risk Category | Description | Probability | Impact | Control Strategy |
|---|
| Single-source component | Critical component from sole supplier | Medium | Critical | Dual-source qualification, safety stock |
| Counterfeit components | Fraudulent parts entering supply chain | Low-Medium | Catastrophic | Supplier audits, incoming inspection, chain of custody |
| Supplier quality failure | Supplier QMS breakdown | Medium | High | Supplier qualification, periodic audits, quality agreements |
| Software dependency | Vulnerable or unsupported open-source library | High | Medium-High | SBOM management, vulnerability scanning, update policy |
| Geopolitical disruption | Sanctions, trade restrictions, supply interruption | Low-Medium | High |
Supply Chain Risk Assessment Workflow
Step 1: Supply Chain Mapping
→ Identify all direct suppliers (Tier 1)
→ Map critical Tier 2 and Tier 3 suppliers
→ Document component criticality (safety-critical, quality-critical, standard)
Step 2: Supplier Risk Scoring
→ Quality risk: past performance, certification status, audit results
→ Financial risk: stability, dependency on your business
→ Geographic risk: natural disaster, political stability
→ Cyber risk: supplier's information security posture
→ Concentration risk: single-source, regional concentration
Step 3: Risk Treatment
→ Critical suppliers: quality agreements, annual audits, dual-sourcing
→ High-risk suppliers: enhanced monitoring, contingency plans
→ Medium-risk suppliers: periodic review, performance metrics
→ Low-risk suppliers: standard purchasing controls
Step 4: Ongoing Monitoring
→ Supplier scorecard tracking (quality, delivery, responsiveness)
→ Annual supplier risk reassessment
→ Trigger-based reassessment (quality event, financial change, M&A)
Post-Market Risk Monitoring Automation
Automated Signal Detection
| Data Source | Automation Approach | Alert Threshold |
|---|
| Complaint database | Statistical process control (SPC) charts on complaint rates | >2 sigma deviation from baseline |
| Adverse event reports | NLP-based classification + trend analysis | Any serious event; trend >3x baseline |
| Literature monitoring | Automated PubMed/regulatory database searches | New publication on similar device adverse events |
| Field service data | Automated failure rate tracking | Failure rate exceeds design MTBF by >20% |
| Social media/forums | Keyword monitoring for device-related complaints | Cluster of similar complaints in 30-day window |
| Regulatory databases | MAUDE, EUDAMED vigilance module, BfArM monitoring | New recall or safety communication for similar device |
Risk Management File Update Automation
Automated Trigger → Risk Review Decision Tree
New complaint received
→ Classify by hazard category (auto or manual)
→ Check: Known hazard?
YES → Update frequency data → Recalculate risk level
→ Risk level changed? → Flag for risk management review
NO → New hazard identified → Initiate risk analysis
→ Estimate initial risk → Determine controls needed
→ Update risk management file
Trend threshold exceeded
→ Generate trend report with statistical analysis
→ Convene risk management review within 30 days
→ Update risk management file with new probability estimates
→ Evaluate if additional risk controls needed
→ If safety issue: initiate FSCA/field action assessment
Cross-Reference: NIST Cybersecurity Framework Risk Assessment
Map ISO 14971 risk management to NIST CSF 2.0 for comprehensive risk coverage:
| ISO 14971 Process | NIST CSF 2.0 Function | Integration Point |
|---|
| Hazard identification | Identify (ID.RA) | Combine clinical and cyber threat identification |
| Risk estimation | Identify (ID.RA-03, ID.RA-04) | Unified likelihood and impact scales |
| Risk evaluation | Identify (ID.RA-05, ID.RA-06) | Single risk register with combined acceptance criteria |
| Risk control | Protect (PR), Detect (DE) | Security controls as risk mitigations |
| Residual risk evaluation | Govern (GV.RM) | Combined residual risk statement |
| Post-production monitoring | Detect (DE.CM, DE.AE) | Unified monitoring for safety and security events |
See also: ../information-security-manager-iso27001/SKILL.md for ISO 27001 security controls that serve as risk mitigations.
Cross-Reference: DORA ICT Risk Management
For medical device companies operating as or supplying to financial entities in the EU, the Digital Operational Resilience Act (DORA, Regulation 2022/2554) adds ICT risk requirements:
| DORA Requirement | ISO 14971 Integration | Action |
|---|
| ICT risk management framework (Art. 6) | Extend risk management plan to include ICT risks | Add ICT-specific risk categories to hazard analysis |
| ICT incident management (Art. 17) | Align with post-production monitoring | Unified incident classification and response |
| Digital operational resilience testing (Art. 24-27) | Complement risk control verification | Include penetration testing in verification activities |
| Third-party ICT risk (Art. 28-30) | Extend supply chain risk management | Assess ICT service providers per DORA requirements |
| Information sharing (Art. 45) | Enhance post-market information sources | Participate in threat intelligence sharing arrangements |
Enhanced FMEA with Cybersecurity Failure Modes
Combined Safety-Security FMEA Template
COMBINED SAFETY-SECURITY FMEA
Product: [Device Name]
Subsystem: [Subsystem]
Date: [Date]
TRADITIONAL SAFETY FAILURE MODES:
| ID | Item | Function | Failure Mode | Effect | S | Cause | O | Detection | D | RPN | Control |
|----|------|----------|--------------|--------|---|-------|---|-----------|---|-----|---------|
| FM-001 | Sensor | Measure vital sign | Incorrect reading | Wrong diagnosis | 8 | Calibration drift | 4 | Self-test | 3 | 96 | Auto-calibration |
CYBERSECURITY FAILURE MODES:
| ID | Asset | Security Objective | Threat | Attack Vector | Exploitability (O) | Impact (S) | Detection (D) | RPN | Security Control |
|----|-------|-------------------|--------|---------------|-------------------|-----------|---------------|-----|-----------------|
| CS-001 | Sensor data | Integrity | Data manipulation | MITM attack | 3 | 8 | 5 | 120 | TLS + data signing |
| CS-002 | Firmware | Integrity | Malicious update | Supply chain | 2 | 10 | 6 | 120 | Secure boot + code signing |
| CS-003 | User interface | Availability | DoS attack | Network flooding | 5 | 6 | 4 | 120 | Rate limiting + redundancy |
AI/ML FAILURE MODES (if applicable):
| ID | Component | ML Function | Failure Mode | Clinical Effect | S | Cause | O | Detection | D | RPN | ML Control |
|----|-----------|-------------|--------------|----------------|---|-------|---|-----------|---|-----|-----------|
| AI-001 | Classifier | Diagnose condition | False negative | Missed diagnosis | 9 | Distribution shift | 4 | Performance monitoring | 5 | 180 | Drift detection + human review |
| AI-002 | Classifier | Diagnose condition | Biased output | Health disparity | 8 | Unrepresentative training data | 3 | Subgroup analysis | 6 | 144 | Fairness constraints + diverse data |
COMBINED RPN THRESHOLDS:
>200: Critical — Immediate action required (all categories)
100-200: High — Action plan within 30 days
50-100: Medium — Monitor and consider action
<50: Low — Accept and monitor
Cybersecurity-Safety Interaction Analysis
| Safety Control | Cybersecurity Impact | Mitigation |
|---|
| Alarm system | Alarm suppression via unauthorized access | Access control + alarm integrity monitoring |
| Fail-safe mode | Denial of service forcing perpetual safe mode | Rate limiting + redundant communication |
| Software update | Malicious update compromising safety function | Code signing + dual authorization + rollback capability |
| Data logging | Log tampering concealing safety events | Append-only logs + cryptographic integrity |
| User authentication | Lockout preventing emergency use | Break-glass procedures + local override |
Enhanced Risk Management — AI, Cybersecurity & Cross-Framework Integration
AI-Specific Risk Management
When managing risk for AI/ML medical devices, extend ISO 14971 with:
- AI Model Risk: Training data bias, model drift, adversarial attacks, explainability gaps
- Performance Degradation: Monitor for distribution shift, concept drift, and data quality issues
- Algorithmic Bias: Demographic parity, equalized odds, calibration across subgroups
- Human-AI Interaction Risks: Over-reliance, automation bias, alert fatigue, trust calibration
- Cross-reference: See
eu-ai-act-specialist for EU AI Act risk classification
Cybersecurity Risk Integration (IEC 81001-5-1)
- Health Software Cybersecurity: IEC 81001-5-1 extends ISO 14971 for cybersecurity
- Threat Modeling: STRIDE methodology applied to medical device architecture
- Cybersecurity FMEA: Failure modes include unauthorized access, data breach, ransomware, supply chain attack
- Vulnerability Management: CVSS scoring integrated with ISO 14971 severity/probability matrix
- Cross-reference: See
infrastructure-compliance-auditor for technical security checks
Supply Chain Risk Management
- Component Risk: Third-party software vulnerabilities (SBOM-based assessment)
- Supplier Risk: Single-source dependencies, geopolitical risks, quality history
- Cloud Risk: Data residency, service availability, vendor lock-in
- Cross-reference: See
nis2-directive-specialist for NIS2 supply chain requirements
Cross-Framework Risk Mapping
| Risk Area | ISO 14971 | NIST CSF 2.0 | DORA | NIS2 |
|---|
| Risk Assessment | Clause 4 | ID.RA | Art. 6 | Art. 21.1 |
| Risk Treatment | Clause 7 | PR (all) | Art. 9 | Art. 21.2 |
| Monitoring | Clause 9 | DE.CM | Art. 10 | Art. 21.2.f |
| Incident Response | Clause 9 | RS.MA | Art. 17 | Art. 23 |
| Continuous Improvement | Clause 10 | ID.IM | Art. 13 | Art. 21.2.f |
Weekly Installs
37
Repository
borghei/claude-skills
GitHub Stars
29
First Seen
Feb 23, 2026
Security Audits
Gen Agent Trust HubPassSocketFailSnykPass
Installed on
claude-code31
cursor23
gemini-cli23
cline23
github-copilot23
codex23