Medical Device Regulation (EU) 2017/745
1. Why the MDR matters for connected devices
The Medical Device Regulation (MDR)—Regulation (EU) 2017/745—is the comprehensive legal framework for placing medical devices on the EU market. It replaces the previous Medical Device Directive (MDD), establishing a more robust, transparent, and sustainable regulatory system with a strong focus on a lifecycle approach to safety and performance.
A critical feature of the MDR is its emphasis on software and cybersecurity. For any medical device with digital elements—from hospital infusion pumps to consumer wellness apps that qualify as a medical device—the MDR legally mandates a secure-by-design approach. Manufacturers must design and build their products according to the "state of the art", taking into account principles of risk management and information security. The regulation's requirements are detailed in the General Safety and Performance Requirements (GSPRs) of Annex I.
- Official Journal: EUR-Lex 32017R0745
- Consolidated Version: EUR-Lex 02017R0745-20250110
While the MDR lays down the legal requirements, it does not specify how to meet them. The Medical Device Coordination Group (MDCG) publishes guidance that represents the "state of the art" for compliance.
- Cybersecurity: MDCG 2019-16 – Guidance on Cybersecurity for medical devices
Because the "state of the art" in cybersecurity evolves rapidly, guidance from other modern regulations can be highly valuable. While primarily a playbook for the Cyber-Resilience Act, Germany's BSI technical guideline is an excellent resource for implementing best practices that support MDR compliance.
- Best Practice Reference: BSI TR-03183 – Cyber Resilience Requirements for Manufacturers and Products
Timeline of Key Dates
Date | Event | Legal Reference |
---|---|---|
2017-05-25 | MDR entered into force. | MDR Art. 123(1) |
2021-05-26 | MDR fully applies, replacing the MDD. | MDR Art. 123(2) |
2027-12-31 | End of transition for higher-risk (Class III, IIb) devices certified under the old MDD. | Regulation (EU) 2023/607 |
2028-12-31 | End of transition for lower-risk (Class IIa, I) devices certified under the old MDD. | Regulation (EU) 2023/607 |
Relationship to other EU laws
Law | How it interacts with the MDR |
---|---|
Cyber-Resilience Act (CRA) | Products qualifying as medical devices under the MDR are exempt from the CRA (CRA Art. 2 § 2(a)). The MDR is considered lex specialis—more specific legislation that provides its own comprehensive set of cybersecurity rules. |
GDPR | Medical devices often process sensitive health data, making compliance with the General Data Protection Regulation essential. The MDR's security requirements provide a foundation for protecting this data. |
IVDR | The IVDR is a parallel regulation covering in vitro diagnostic devices. Its structure and cybersecurity requirements are nearly identical to the MDR's. |
2. Scope & Classification
2.1 What is a Medical Device?
The MDR defines a medical device as any instrument, apparatus, software, implant, or other article intended for a specific medical purpose, such as:
- Diagnosis, prevention, monitoring, prediction, prognosis, treatment, or alleviation of disease.
- Diagnosis, monitoring, treatment, alleviation of, or compensation for, an injury or disability.
- Investigation, replacement, or modification of the anatomy or of a physiological or pathological process.
Software can be a medical device in its own right (Software as a Medical Device - SaMD) or be a component of a physical medical device.
2.2 Device Classification
The MDR uses a risk-based classification system. The class determines the strictness of the conformity assessment procedure.
Class | Risk Level | Examples |
---|---|---|
Class I | Low | Non-sterile bandages, stethoscopes. If sterile (Is), with measuring function (Im), or reusable surgical instrument (Ir), Notified Body involvement is needed. |
Class IIa | Medium | Hearing aids, dental fillings, surgical clamps. |
Class IIb | Medium-High | Infusion pumps, ventilators, intensive care monitors, most SaMD. |
Class III | High | Pacemakers, heart valves, implantable defibrillators. |
This classification is crucial as it dictates the required level of evidence and the specific conformity assessment procedure the manufacturer must follow, as detailed in Section 4.
3. MDR Requirements & How to Implement Them
The following table translates the MDR's General Safety and Performance Requirements (GSPRs) and the official MDCG 2019-16 guidance into a practical engineering checklist. Requirements marked with a (*)
are not explicitly mandated by the MDR but represent the "state of the art" based on modern cybersecurity practices and related regulations like the CRA. Each row links to the relevant implementation guide in this handbook.
Obligations & Legal Basis | Engineering Tasks & Interpretation | Implementation Guides |
---|---|---|
Risk Management System MDR Annex I, §3 MDCG 2019-16, §3.2 | Establish a risk management system as a continuous, iterative process across the entire lifecycle. This must explicitly include information security risks alongside safety risks. | Threat Modeling |
Secure Software Lifecycle MDR Annex I, §17.2 MDCG 2019-16, §3.1 | Develop and manufacture software according to the state of the art, incorporating a secure development lifecycle (SDL) with security integrated into every phase. | CI/CD Hardening |
IT Security Measures MDR Annex I, §17.4 MDCG 2019-16, §3.3 | Define and implement minimum requirements for hardware, IT network characteristics, and IT security measures to protect against unauthorised access and ensure the device can be run as intended. | Secure Configuration |
Secure Authentication & Access Control MDR Annex I, §17.4 MDCG 2019-16, §3.3 | Implement strong, unique user authentication (not shared passwords) and role-based access control (RBAC) to enforce the principle of least privilege. | Unique Device Identity |
Secure Cryptography & Key Management MDR Annex I, §17.2 MDCG 2019-16, §3.3 | Use state-of-the-art encryption to protect data-in-transit and data-at-rest. Protect cryptographic keys in a hardware-backed secure storage environment (e.g., TEE, Secure Element). | Key Provisioning & Storage |
Secure Boot & Integrity Protection MDR Annex I, §17.2 MDCG 2019-16, §3.3 | Verify the integrity and authenticity of all software and firmware during the boot process to prevent tampering and ensure the device only runs authorised code. | Secure Boot |
Security Logging MDR Annex I, §17.4 MDCG 2019-16, §3.3 | Create tamper-resistant event logs for security-relevant events, including access attempts, configuration changes, and errors, with accurate timestamps. | Security Logging |
Secure Updates & Patching MDR Annex I, §17.2 MDCG 2019-16, §3.8 | Implement a secure update mechanism. All updates must be cryptographically signed to ensure authenticity and integrity, and the device must verify the signature before installation. | Secure OTA Updates |
Information to Users MDR Annex I, §23.4 MDCG 2019-16, §4.2 | Provide clear Instructions for Use (IFU) including: minimum IT requirements; secure configuration guidance; network port/protocol details; instructions for secure deployment and updates; and details of backup/restore features. Maintain security information in an electronic form to allow for dynamic updates. | User Documentation |
No Known Vulnerabilities (*) CRA Annex I §1(2)(a) | Ship without known exploitable vulnerabilities. Establish a process to identify vulnerabilities in all product components, including third-party software. | CI/CD Hardening |
Regular Security Testing (*) CRA Annex I, Part II, §3 | Regularly test the product for vulnerabilities using both internal processes (e.g., SAST/DAST) and independent experts (e.g., penetration testing). | Static & Dynamic Analysis |
Identify Components (SBOM) (*) CRA Art. 13 §3 | Create and maintain an up-to-date, machine-readable Software Bill of Materials (SBOM) for all software components to facilitate vulnerability management. | SBOM & VEX Workflows |
Coordinated Vulnerability Disclosure (*) CRA Art. 13(8) | Publish a clear Coordinated Vulnerability Disclosure (CVD) policy and provide an easily accessible contact channel for third parties to report vulnerabilities. | Vulnerability Disclosure |
Minimum Support Period (*) CRA Art. 13(8) | Define and publish the minimum length of time security updates will be provided. This support period should be appropriate for the device type and its expected lifetime. | Patch Cadence |
4. Conformity Assessment & Notified Bodies
To affix a CE mark to a medical device, manufacturers must undergo a conformity assessment. For nearly all connected devices, this requires a Notified Body—an independent organisation designated by an EU authority—to audit the device's documentation and the manufacturer's Quality Management System (QMS).
The role of the Notified Body includes:
- Auditing the QMS: Conducting on-site audits (including unannounced audits) of the manufacturer's processes.
- Reviewing Technical Documentation: Assessing the technical file, including clinical evaluation and cybersecurity evidence, based on the device's risk class.
- Testing: Performing or ordering physical or laboratory tests to verify conformity.
- Issuing Certificates: Granting, suspending, or withdrawing CE certificates.
Class | Assessment Route | Notified Body Audit Required? |
---|---|---|
Class I | Manufacturer prepares technical documentation and declares conformity. | No, unless the device is sterile (Is), has a measuring function (Im), or is a reusable surgical instrument (Ir). |
Class IIa | Audit of the QMS and assessment of technical documentation for at least one representative device per category. | ✅ Yes |
Class IIb | Audit of the QMS and assessment of technical documentation for at least one representative device per generic group. For implantables, assessment of every device's technical documentation is required. | ✅ Yes |
Class III | Full audit of the QMS and scrutiny of every device's technical documentation. May require consultation with expert panels. | ✅ Yes |
5. Post-Market Surveillance & Vigilance
The MDR establishes a lifecycle approach, making post-market activities a core regulatory requirement. Manufacturers have an ongoing duty to keep their devices safe and secure after they are placed on the market.
- Post-Market Surveillance (PMS) System (MDR Art. 83): Manufacturers must have a system to proactively collect and review data from their devices on the market. This data is used to continuously update the risk assessment and technical documentation.
- Periodic Safety Update Report (PSUR) (MDR Art. 86): For Class IIa, IIb, and III devices, the results of the PMS are documented in a PSUR. This must be updated at least annually for Class IIb and III devices, and every two years for Class IIa.
- Vigilance Reporting (MDR Art. 87): Manufacturers must report all serious incidents and Field Safety Corrective Actions (FSCAs) to the relevant national authorities. A cybersecurity event that could lead to patient harm qualifies as a reportable incident. Reporting must follow strict timelines:
- No later than 2 days after awareness of a serious public health threat.
- No later than 10 days after awareness of a death or unanticipated serious deterioration in health.
- No later than 15 days for all other serious incidents.
6. Technical Documentation
Manufacturers must draw up and maintain comprehensive technical documentation as laid out in Annex II and Annex III of the MDR. This is a living document that must be kept up to date throughout the device's lifecycle.
For cybersecurity, the technical documentation must include:
- A detailed cybersecurity risk assessment.
- A description of the vulnerability management plan.
- A Software Bill of Materials (SBOM).
- All verification and validation results, including security test reports (e.g., penetration testing).
- The full Instructions for Use (IFU) and any other user-facing security documentation.