Skip to content

//EU MDR MEDICAL DEVICE CYBERSECURITY

Meet Your EU MDR Cybersecurity Obligations — Without Slowing Down Your Path to Market

The EU Medical Device Regulation (MDR 2017/745) and In Vitro Diagnostic Regulation (IVDR 2017/746) place significant cybersecurity obligations on medical device manufacturers. Demonstrating state-of-the-art cybersecurity is a mandatory requirement — not an option — for any connected, software-enabled, or data-processing device entering the EU market.

Periculo provides specialist cybersecurity support to medical device manufacturers, giving you the technical evidence, documentation, and expert guidance your Notified Body needs to assess your cybersecurity compliance.
We don’t handle your CE Marking process — we handle the cybersecurity side of it, thoroughly.

Why EU MDR Cybersecurity Compliance Is Non-Negotiable

MDR Annex I General Safety and Performance Requirements (GSPRs) set out specific cybersecurity obligations for software-enabled medical devices:

GSPR 17.2

Software must be developed and manufactured in accordance with the state of the art, taking into account the principles of development lifecycle, risk management including information security, verification and validation.

GSPR 17.4

Manufacturers must set out minimum requirements for hardware, IT network characteristics, and IT security measures, including protection against unauthorised access, necessary to run the software as intended.

GSPR 23.4

Instructions for use must contain cybersecurity-relevant information for users.

Notified Bodies are increasingly rigorous in assessing cybersecurity evidence. Gaps in your technical documentation, risk management file, or post-market surveillance plan are a common cause of delays and non-conformities during conformity assessment.

CONTENTS

What is EU MDR
Why EU MDR Compliance Matters
What is IEC 81001-5-1 Medical Software Security?
What is Post-Market Cybersecurity Surveillance?
How It Works
Ready To Start Your EU MDR Journey?

What is EU MDR

The European Medical Device Regulation (EU) 2017/745 (EU MDR)

The European Medical Device Regulation (EU) 2017/745 (EU MDR) is the robust regulatory framework governing the safety, performance, and clinical evaluation of medical devices in the European Union. Replacing the older MDD, it introduces stricter requirements for technical documentation and transparency. For software and connected devices, the MDR elevates cybersecurity to a core safety requirement, mandating that manufacturers protect devices against unauthorised access and data breaches throughout their entire lifecycle.

Why EU MDR Compliance Matters

Market Access

Without a valid CE Mark under EU MDR, your device cannot be sold or used within the EU.

Patient Safety & Trust

It ensures that cybersecurity risks are mitigated, protecting patients from device malfunctions or data theft.

GSPR (General Safety and Performance Requirements)

Adhering to the latest GSPR (General Safety and Performance Requirements) shields your organisation from heavy fines and legal action resulting from non-compliance.

Competitive Edge

Demonstrating "State-of-the-Art" security builds immediate trust with hospital IT procurement teams and clinicians.

What is IEC 81001-5-1 Medical Software Security?

EN IEC 81001-5-1 is the international standard for the lifecycle management of health software.

EN IEC 81001-5-1 is the international "State-of-the-Art" standard for the lifecycle management of health software. While ISO 13485 focuses on quality and IEC 62304 on software processes, IEC 81001-5-1 specifically addresses cybersecurity activities.

Secure-by-Design

Integrating security requirements from the initial concept.

Vulnerability Handling

Section 524B requires manufacturers making premarket submissions for cyber devices to demonstrate a reasonable assurance that the device and related systems are cybersecure. This is a statutory requirement, and non-compliance can result in denial of market authorisation, independent of other safety and effectiveness considerations.

Software Configuration

Ensuring the software environment remains stable and protected against external threats.
Under EU MDR, following this standard is the primary way to demonstrate compliance with cybersecurity mandates.

What is Post-Market Cybersecurity Surveillance?

Post-Market Cybersecurity Surveillance (PMCS)

Post-Market Cybersecurity Surveillance (PMCS) is the continuous process of monitoring your device for new threats after it is deployed. As part of your Post-Market Clinical Follow-up

Active Monitoring

Tracking new CVEs (Common Vulnerabilities and Exposures) that could affect your device’s OS or libraries.

Incident Response

Having a plan to deploy "security patches" or "hotfixes" before a vulnerability is exploited.

Regulatory Reporting

Notifying authorities and users of significant cyber risks to maintain the device's high level of safety over time.

How It Works

1. Discovery Call

We start by understanding your device, your submission timeline, and where you currently stand on cybersecurity documentation.

2. Gap Assessment

We map your current position against EU MDR requirements and produce a clear, prioritised list of what needs to be done. You'll know exactly what's missing and what it will take to fix it.

3. Documentation & Remediation

We get to work. Depending on your needs, this means threat modelling, SBOM development, policy drafting, architecture review, or the full package. We work to your timeline, not ours.

4. Submission Support

We review your final submission documentation, flag any remaining risk, and make sure what goes to the FDA is as strong as it can be. If Q-Sub feedback comes back, we help you respond.

Ready to Start Your ISO 42001 Journey?

Book Your Discovery Call

EU MDR rejections cost time you don't have and money you shouldn't be spending. Most of the manufacturers we speak to have left cybersecurity too late, and are scrambling to catch up.

If your submission window is approaching, start the conversation now.

FAQ’s

Does my medical device need to comply with cybersecurity requirements? minus-icon

If your device contains software, is software itself (SaMD), or features any form of electronic connectivity (Bluetooth, Wi-Fi, Cloud), it must meet the General Safety and Performance Requirements (GSPR) outlined in Annex I. Specifically, GSPR 17.2 mandates that devices be resilient against unauthorised access and "state-of-the-art" security threats.

What is the "State-of-the-Art" standard for MDR cybersecurity? plus-icon
How does the EU AI Act overlap with MDR cybersecurity? plus-icon
Do I need to provide a Software Bill of Materials (SBOM)? plus-icon
What are the requirements for Post-Market Cybersecurity Surveillance (PMCS)? plus-icon
Can I use "legacy" software under the EU MDR? plus-icon
How does EUDAMED handle cybersecurity data? plus-icon

Latest Insights

ISO 42001: The AI Management System Standard Your Organisation Needs to Understand

ISO 42001: The AI Management System Standard ...

ISO 42001 is showing up in procurement requirements. Enterprise customers are asking for it. NHS supply chain assessment...

Threat Report 173

Threat Report 173

This week’s report highlights five developments with direct implications for digital health and defence organisations: -...

AI Security Threat Series: Model theft

AI Security Threat Series: Model theft

Cloning a proprietary AI through its own front door Building a world-class AI model takes months of work, millions in co...

Weekly Round Up Issue 16

Weekly Round Up Issue 16

The regulatory direction of travel got louder this week. The NCSC pulled back the curtain on 18 months of coordinated wo...

UK Biobank Data Listed for Sale

UK Biobank Data Listed for Sale

The UK government has issued a formal statement through the National Data Guardian after reports emerged that data from ...

AI Security Threat Series: Membership inference

AI Security Threat Series: Membership inferen...

Proving your data was used to train an AI — without ever seeing it You do not need to extract someone's data from a mode...

Building Resilient AI Agents: Defending Against Prompt Injection Attacks

Building Resilient AI Agents: Defending Again...

As AI agents become increasingly embedded within enterprise workflows, prompt injection attacks have emerged as a critic...

Threat Advisory: Weaponisation of Anthropic's Claude LLM in Targeted Cyberattacks

Threat Advisory: Weaponisation of Anthropic's...

Introduction: The Emergence of AI-Powered Cyber Threats In early 2026, a sophisticated cyber intrusion targeting the Mex...