Product Security Policy Template External Site en
Product Security Policy Template External Site en
Medical Technology Company Standard Operating Policy Template
The following Product Security Standard Operating Policy (SOP) Template is provided below
in furtherance of our commitment to transparency and collaboration with customers and
industry stakeholders.
PURPOSE
1.1 The purpose of this SOP is to provide [insert company name] with the proper
guidance for securing software-enabled commercial offerings by design, in use,
and through partnership throughout the Product Lifecycle.
1.0 SCOPE
1.1 This SOP is applicable to functions that may take part in any aspect of the
following:
1.1.2 Third-Party Entities that [insert company name] collaborates with at any
point in the Product Lifecycle including acquisition, development and
servicing that do business with [insert company name] products or are
in acquisition.
1.2 This document is not intended to provide guidance to update related business
procedures, and is exempt from:
2.3 Threat Source: The intent and method targeted at the intentional exploitation
of a Vulnerability or a situation and method that may accidentally trigger a
Vulnerability.
and are processed through Risk Management that comprise a product or other
commercial offerings.
2.7 Secure Coding Standards: Guidelines for writing software code which
mitigates common security flaws specific to a programming language or in
general to all software.
2.8 Static Code Analysis: The automated analysis of software code for security
flaws and adherence to a Secure Coding Standard.
2.14 [insert company name] Assets and Systems: Includes, but not limited to,
equipment used by any function in any aspect of day-to-day business
operations that is owned by [insert company name] . Examples such as
development environments used by R&D, equipment used by Manufacturing to
produce products or computers used to support products.
Examples include hard disks, floppy disks, zip drives, compact disks, thumb
drives, pen drives, and similar USB storage devices.
2.16 Product Lifecycle: Managing the entire lifecycle of a product from inception,
through engineering design and manufacture, to monitoring, service and
disposal of manufactured products.
3.0 RESPONSIBILITIES
3.1 Product Security (PS):
3.3.1 Ensures the [insert company name] Product Security Policy is aligned
and consistent with other [insert company name] corporate policies, as
well as global regulations and standards, for product development, risk
management, manufacturing, and support. Quality, jointly with the PS,
will ensure adherence to the [insert company name] Product Security
Policy.
3.5.1 Ensure proper response to security incidents and events with products at
customer sites, including proper documentation records as per business
unit complaint handling procedures. Secure [insert company name]
service assets, maintain validated security updates and ensure secure
implementation, periodic reporting of security incidents and events and
security update tracking.
business levels. This may include the creation of local procedures that
align with and supplement where needed, due to regional laws and
regulation, the over-arching [insert company name] Product Security
Policy.
3.7.1 Ensures [insert company name] managed assets, including but not
limited to laptops, Removable Media, and networks that interact with
[insert company name] products adhere to the [insert company name]
Information Security Policy.
4.0 REQUIREMENTS
4.1 The following requirements must be considered during any design,
development, manufacturing, service and support of [insert company name]
products that provide software or firmware solutions including:
Medical devices
Cloud-based solutions
Software-only products
4.2 Exemptions and Vulnerabilities not being addressed will be documented in the
Product Security Management Plan.
4.3 The flowchart below is used to illustrate how Product Security may be
incorporated within existing [insert company name] design control, quality
systems and release processes.
Penetration Testing
Management Plan
Risk Assessment
Product Security
Product Security
System Requirements Vulnerability Customer
Hardening Standards Scanning Complaint
Patch Management
Product Security
White Paper
4.4 Risk Management for Product Security: There are specific considerations
necessary for ensuring Product Security risks identified during Design Control
and Complaint Handling are properly analyzed, evaluated, and documented.
4.4.3 Exemptions for potential risks that are identified but which are
addressed in subsequent releases or patch updates will require
documentation of the risk assessment performed and the remediation
planning that was not pursued in accordance with the [insert company
name] Product Security Procedure.
4.5 Product Security controls and potential Vulnerabilities identified during Design
Control will be incorporated per the relevant design control policy/procedure.
The following should be used as additional requirements to be considered and
implemented as part of product development.
4.5.3 System Requirements, including third-party components used in the
product, shall also be subject to Product Security Requirements such as
Hardening Standards, System Patching and Vulnerability Scanning.
4.5.4 Static Code Analysis and robust testing shall be performed throughout
the development cycle to ensure Secure Coding Standards are followed.
4.7.2 [insert company name] Service and Support activities should include
guidance regarding Service Access (remote and local), Customer Data
Handling, Removable Media, and Decommissioning of [insert company
name] products when applicable.
4.7.4 Third-Party Assets and Systems shall be assessed and adhere to [insert
company name] Information Security Policy and Standards.