IECVersion 2019 (Reaffirmed)Published 2016

AAMI TIR57:2016/(R)2019

Principles for medical device security — Risk management

Overview

Scope

AAMI TIR57 is a Technical Information Report (TIR) that establishes principles for applying risk management to medical device cybersecurity. Published in 2016, it was the first AAMI document to address cybersecurity risk management specifically for medical devices. TIR57 adapts the ISO 14971 risk management framework for cybersecurity threats, replacing probabilistic occurrence estimates with exploitability-based assessment. While TIR57 has been functionally superseded by ANSI/AAMI SW96:2023 (which is an FDA-recognized consensus standard), TIR57 remains widely referenced in existing QMS documentation, FDA submissions, and industry literature.

Why It Matters

TIR57 was the foundational document that established the principle: cybersecurity risks cannot be managed using traditional probability-based methods because attackers are intentional, not random. This insight — now enshrined in FDA guidance and SW96 — originated in TIR57. For medical device companies: (1) If your existing QMS references TIR57, you need to understand what it covers and plan migration to SW96. (2) FDA reviewers still recognize TIR57 but prefer SW96 as the current standard. (3) Legacy submissions referencing TIR57 are acceptable but new submissions should reference SW96. (4) Understanding TIR57 provides context for why SW96 was developed and what problems it solved.

Key Concepts

  • Technical Information Report (TIR) — not a full consensus standard; represents expert committee guidance
  • First AAMI document addressing cybersecurity-specific risk management for medical devices
  • Adapts ISO 14971 risk management framework for intentional threats
  • Replaces occurrence probability with exploitability assessment
  • Asset-based approach: identify assets, identify threats to assets, assess vulnerabilities
  • Cybersecurity risk vs. safety risk: parallel processes with shared severity scales
  • Precursor to ANSI/AAMI SW96:2023 — TIR57 principles were formalized into the consensus standard
  • FDA recognized but being supplanted by SW96 in new submissions
  • Still valuable as a process guide for small organizations starting cybersecurity risk management

🔧 Insight coming soon... Here's what we know: regulatory compliance and international standards conformance aren't obstacles—they're the foundation that lets us build devices people can trust with their health and their lives. The real opportunity? When we collaborate across disciplines—sharing knowledge about laser and light-based technologies, software validation, risk management, and clinical evidence—we accelerate everyone's ability to bring better solutions to patients who need them. This section will feature practical insights on implementing this standard effectively. Because faster submissions, better safety protocols, and stronger clinical outcomes aren't competing goals—they reinforce each other when we get the fundamentals right. Together, we can navigate these requirements and focus on what matters: developing medical devices that make a real difference.

— ER | medev.ai

Building better devices, together.

Key Sections Overview

Cybersecurity Risk Management Process (Section 4)

Establishes that cybersecurity risk management should follow the ISO 14971 process structure (plan → identify → analyze → evaluate → control → monitor) but with cybersecurity-specific adaptations. The risk management plan should be a standalone document or an addendum to the ISO 14971 risk management plan. Defines the team composition, scope, and methodology for cybersecurity risk activities.

Asset Identification (Section 5)

Identifies what needs protecting: patient data (ePHI/PII), device functionality (therapy delivery, diagnostic accuracy), communication channels, firmware/software integrity, cryptographic keys, audit logs, and configuration data. Assets are classified by sensitivity and criticality. This asset inventory drives the subsequent threat analysis — every asset is a potential target.

Threat Analysis (Section 6)

Identifies threats to each asset. TIR57 recommends threat modeling techniques (STRIDE, attack trees) to systematically enumerate threats. Threats are categorized by threat source (external attacker, insider, malware, supply chain), attack vector (network, physical, social engineering), and potential impact. TIR57 explicitly notes that threats from intentional actors should not use probabilistic occurrence estimates.

Vulnerability Assessment (Section 7)

Evaluates the vulnerabilities that could be exploited by identified threats. Sources include: SBOM analysis against known vulnerability databases (NVD/CVE), design-level weaknesses (CWE analysis), penetration testing results, and security architecture review findings. Vulnerability severity is scored using exploitability metrics (CVSS was recommended; SW96 formalizes this requirement).

Risk Evaluation and Control (Sections 8-9)

Combines exploitability and impact to determine risk levels using a cybersecurity-specific risk matrix (not the ISO 14971 probability-severity matrix). Risks classified as unacceptable require security controls. Controls follow the ISO 14971 hierarchy: inherently safe design → protective measures → information. Residual risk must be evaluated and accepted through a formal process.

Post-Market Monitoring (Section 10)

Establishes that cybersecurity risk management extends through the product lifecycle. Post-market activities include: monitoring for new vulnerabilities in deployed components, tracking CISA/ICS-CERT advisories, processing field security reports, and triggering risk reassessment when new threat information emerges. TIR57 was prescient in emphasizing lifecycle monitoring before FDA Section 524B made it a legal requirement.

Using TIR57 and Planning Migration to SW96

1

Assess Current TIR57 Usage

Determine if your QMS, SOPs, or existing submissions reference TIR57. If so, document where it is referenced and plan the migration to SW96. If you have not yet implemented a cybersecurity risk management process, skip directly to SW96.

2

Map TIR57 to SW96 for Gap Analysis

SW96 Clauses 5–10 correspond to TIR57 Sections 4–10 but with significantly more detail and formalized requirements. Key additions in SW96: explicit CVSS/CWSS scoring requirements, formal security context establishment, enhanced post-market monitoring procedures, and alignment with FDA-recognized consensus standard status. Map your existing TIR57 artifacts to SW96 requirements to identify gaps.

3

Update References and Documentation

Update QMS procedures, SOPs, and templates to reference SW96:2023 instead of TIR57. Update premarket submission templates to cite SW96. For legacy products with existing submissions referencing TIR57, no action is required unless a new submission is filed.

4

Leverage TIR57 Knowledge for SW96

If your team is experienced with TIR57, the migration to SW96 is straightforward — the core principles are the same. The key changes: more formal process requirements, explicit scoring methodology requirements, enhanced documentation expectations, and FDA recognition status. Your existing cybersecurity risk files can be updated to SW96 format.

Common Challenges & Solutions

TIR status vs. consensus standard status confusion

A TIR (Technical Information Report) is expert guidance, not a full consensus standard. It cannot be referenced for regulatory presumption of conformity the way a recognized consensus standard can. SW96 is a full ANSI/AAMI consensus standard with FDA recognition — always prefer SW96 for new submissions.

Existing submissions reference TIR57 — should I update?

For existing cleared/approved devices with submissions referencing TIR57, no update is required unless you file a new submission (supplement, amendment). For new submissions for the same device, reference SW96. FDA will not reject a submission referencing TIR57, but SW96 carries stronger regulatory weight.

Resources

Copyright Notice: AAMI TIR57:2016/(R)2019 is copyrighted by IEC. This page provides implementation guidance and educational content only. The standard itself must be purchased from the official IEC website.