Skip to main content

Medical Device Regulation (EU) 2017/745

1. Why the MDR matters for connected devices

The Medical Device Regulation (MDR)—Regulation (EU) 2017/745—is the comprehensive legal framework for placing medical devices on the EU market. It replaces the previous Medical Device Directive (MDD), establishing a more robust, transparent, and sustainable regulatory system with a strong focus on a lifecycle approach to safety and performance.

A critical feature of the MDR is its emphasis on software and cybersecurity. For any medical device with digital elements—from hospital infusion pumps to consumer wellness apps that qualify as a medical device—the MDR legally mandates a secure-by-design approach. Manufacturers must design and build their products according to the "state of the art", taking into account principles of risk management and information security. The regulation's requirements are detailed in the General Safety and Performance Requirements (GSPRs) of Annex I.

Official Texts
Key Guidance & State of the Art

While the MDR lays down the legal requirements, it does not specify how to meet them. The Medical Device Coordination Group (MDCG) publishes guidance that represents the "state of the art" for compliance.

Because the "state of the art" in cybersecurity evolves rapidly, guidance from other modern regulations can be highly valuable. While primarily a playbook for the Cyber-Resilience Act, Germany's BSI technical guideline is an excellent resource for implementing best practices that support MDR compliance.

Timeline of Key Dates

DateEventLegal Reference
2017-05-25MDR entered into force.MDR Art. 123(1)
2021-05-26MDR fully applies, replacing the MDD.MDR Art. 123(2)
2027-12-31End of transition for higher-risk (Class III, IIb) devices certified under the old MDD.Regulation (EU) 2023/607
2028-12-31End of transition for lower-risk (Class IIa, I) devices certified under the old MDD.Regulation (EU) 2023/607

Relationship to other EU laws

LawHow it interacts with the MDR
Cyber-Resilience Act (CRA)Products qualifying as medical devices under the MDR are exempt from the CRA (CRA Art. 2 § 2(a)). The MDR is considered lex specialis—more specific legislation that provides its own comprehensive set of cybersecurity rules.
GDPRMedical devices often process sensitive health data, making compliance with the General Data Protection Regulation essential. The MDR's security requirements provide a foundation for protecting this data.
IVDRThe IVDR is a parallel regulation covering in vitro diagnostic devices. Its structure and cybersecurity requirements are nearly identical to the MDR's.

2. Scope & Classification

2.1 What is a Medical Device?

The MDR defines a medical device as any instrument, apparatus, software, implant, or other article intended for a specific medical purpose, such as:

  • Diagnosis, prevention, monitoring, prediction, prognosis, treatment, or alleviation of disease.
  • Diagnosis, monitoring, treatment, alleviation of, or compensation for, an injury or disability.
  • Investigation, replacement, or modification of the anatomy or of a physiological or pathological process.

Software can be a medical device in its own right (Software as a Medical Device - SaMD) or be a component of a physical medical device.

2.2 Device Classification

The MDR uses a risk-based classification system. The class determines the strictness of the conformity assessment procedure.

ClassRisk LevelExamples
Class ILowNon-sterile bandages, stethoscopes. If sterile (Is), with measuring function (Im), or reusable surgical instrument (Ir), Notified Body involvement is needed.
Class IIaMediumHearing aids, dental fillings, surgical clamps.
Class IIbMedium-HighInfusion pumps, ventilators, intensive care monitors, most SaMD.
Class IIIHighPacemakers, heart valves, implantable defibrillators.

This classification is crucial as it dictates the required level of evidence and the specific conformity assessment procedure the manufacturer must follow, as detailed in Section 4.

3. MDR Requirements & How to Implement Them

The following table translates the MDR's General Safety and Performance Requirements (GSPRs) and the official MDCG 2019-16 guidance into a practical engineering checklist. Requirements marked with a (*) are not explicitly mandated by the MDR but represent the "state of the art" based on modern cybersecurity practices and related regulations like the CRA. Each row links to the relevant implementation guide in this handbook.

Obligations & Legal BasisEngineering Tasks & InterpretationImplementation Guides
Risk Management System
MDR Annex I, §3
MDCG 2019-16, §3.2
Establish a risk management system as a continuous, iterative process across the entire lifecycle. This must explicitly include information security risks alongside safety risks.Threat Modeling
Secure Software Lifecycle
MDR Annex I, §17.2
MDCG 2019-16, §3.1
Develop and manufacture software according to the state of the art, incorporating a secure development lifecycle (SDL) with security integrated into every phase.CI/CD Hardening
IT Security Measures
MDR Annex I, §17.4
MDCG 2019-16, §3.3
Define and implement minimum requirements for hardware, IT network characteristics, and IT security measures to protect against unauthorised access and ensure the device can be run as intended.Secure Configuration
Secure Authentication & Access Control
MDR Annex I, §17.4
MDCG 2019-16, §3.3
Implement strong, unique user authentication (not shared passwords) and role-based access control (RBAC) to enforce the principle of least privilege.Unique Device Identity
Secure Cryptography & Key Management
MDR Annex I, §17.2
MDCG 2019-16, §3.3
Use state-of-the-art encryption to protect data-in-transit and data-at-rest. Protect cryptographic keys in a hardware-backed secure storage environment (e.g., TEE, Secure Element).Key Provisioning & Storage
Secure Boot & Integrity Protection
MDR Annex I, §17.2
MDCG 2019-16, §3.3
Verify the integrity and authenticity of all software and firmware during the boot process to prevent tampering and ensure the device only runs authorised code.Secure Boot
Security Logging
MDR Annex I, §17.4
MDCG 2019-16, §3.3
Create tamper-resistant event logs for security-relevant events, including access attempts, configuration changes, and errors, with accurate timestamps.Security Logging
Secure Updates & Patching
MDR Annex I, §17.2
MDCG 2019-16, §3.8
Implement a secure update mechanism. All updates must be cryptographically signed to ensure authenticity and integrity, and the device must verify the signature before installation.Secure OTA Updates
Information to Users
MDR Annex I, §23.4
MDCG 2019-16, §4.2
Provide clear Instructions for Use (IFU) including: minimum IT requirements; secure configuration guidance; network port/protocol details; instructions for secure deployment and updates; and details of backup/restore features. Maintain security information in an electronic form to allow for dynamic updates.User Documentation
No Known Vulnerabilities (*)
CRA Annex I §1(2)(a)
Ship without known exploitable vulnerabilities. Establish a process to identify vulnerabilities in all product components, including third-party software.CI/CD Hardening
Regular Security Testing (*)
CRA Annex I, Part II, §3
Regularly test the product for vulnerabilities using both internal processes (e.g., SAST/DAST) and independent experts (e.g., penetration testing).Static & Dynamic Analysis
Identify Components (SBOM) (*)
CRA Art. 13 §3
Create and maintain an up-to-date, machine-readable Software Bill of Materials (SBOM) for all software components to facilitate vulnerability management.SBOM & VEX Workflows
Coordinated Vulnerability Disclosure (*)
CRA Art. 13(8)
Publish a clear Coordinated Vulnerability Disclosure (CVD) policy and provide an easily accessible contact channel for third parties to report vulnerabilities.Vulnerability Disclosure
Minimum Support Period (*)
CRA Art. 13(8)
Define and publish the minimum length of time security updates will be provided. This support period should be appropriate for the device type and its expected lifetime.Patch Cadence

4. Conformity Assessment & Notified Bodies

To affix a CE mark to a medical device, manufacturers must undergo a conformity assessment. For nearly all connected devices, this requires a Notified Body—an independent organisation designated by an EU authority—to audit the device's documentation and the manufacturer's Quality Management System (QMS).

The role of the Notified Body includes:

  • Auditing the QMS: Conducting on-site audits (including unannounced audits) of the manufacturer's processes.
  • Reviewing Technical Documentation: Assessing the technical file, including clinical evaluation and cybersecurity evidence, based on the device's risk class.
  • Testing: Performing or ordering physical or laboratory tests to verify conformity.
  • Issuing Certificates: Granting, suspending, or withdrawing CE certificates.
ClassAssessment RouteNotified Body Audit Required?
Class IManufacturer prepares technical documentation and declares conformity.No, unless the device is sterile (Is), has a measuring function (Im), or is a reusable surgical instrument (Ir).
Class IIaAudit of the QMS and assessment of technical documentation for at least one representative device per category.Yes
Class IIbAudit of the QMS and assessment of technical documentation for at least one representative device per generic group. For implantables, assessment of every device's technical documentation is required.Yes
Class IIIFull audit of the QMS and scrutiny of every device's technical documentation. May require consultation with expert panels.Yes

5. Post-Market Surveillance & Vigilance

The MDR establishes a lifecycle approach, making post-market activities a core regulatory requirement. Manufacturers have an ongoing duty to keep their devices safe and secure after they are placed on the market.

  • Post-Market Surveillance (PMS) System (MDR Art. 83): Manufacturers must have a system to proactively collect and review data from their devices on the market. This data is used to continuously update the risk assessment and technical documentation.
  • Periodic Safety Update Report (PSUR) (MDR Art. 86): For Class IIa, IIb, and III devices, the results of the PMS are documented in a PSUR. This must be updated at least annually for Class IIb and III devices, and every two years for Class IIa.
  • Vigilance Reporting (MDR Art. 87): Manufacturers must report all serious incidents and Field Safety Corrective Actions (FSCAs) to the relevant national authorities. A cybersecurity event that could lead to patient harm qualifies as a reportable incident. Reporting must follow strict timelines:
    • No later than 2 days after awareness of a serious public health threat.
    • No later than 10 days after awareness of a death or unanticipated serious deterioration in health.
    • No later than 15 days for all other serious incidents.

6. Technical Documentation

Manufacturers must draw up and maintain comprehensive technical documentation as laid out in Annex II and Annex III of the MDR. This is a living document that must be kept up to date throughout the device's lifecycle.

For cybersecurity, the technical documentation must include:

  • A detailed cybersecurity risk assessment.
  • A description of the vulnerability management plan.
  • A Software Bill of Materials (SBOM).
  • All verification and validation results, including security test reports (e.g., penetration testing).
  • The full Instructions for Use (IFU) and any other user-facing security documentation.