Case Study: Baxter Connex Spot Monitor Shared Key
1. The Vulnerability
1. The Vulnerability
1. The Vulnerability
1. The Vulnerability
1. The Vulnerability
1. The Vulnerability
This document provides a second, more advanced example of a threat model for a connected medical device: a Bluetooth-enabled Continuous Glucose Monitor (CGM) system. It follows the four-step process outlined in the main Threat Modeling Guide and highlights risks directly related to patient safety.
1. Why FDA Cybersecurity Requirements Matter
1. Why the IVDR matters for connected devices
1. Why the MDR matters for connected devices