Section 524B of the FD&C Act gives FDA the explicit authority to refuse any premarket submission for a cyber device that doesn’t meet cybersecurity requirements. FDA’s February 2026 premarket cybersecurity guidance, AAMI SW96, and IEC 81001-5-1 all converge on the same expectation: a documented, repeatable Secure Product Development Framework integrated with your QMS.
After 250+ submissions with zero cybersecurity rejections, we see the same pattern: teams that pass review do not have eight separate security documents. They have one SPDF, with eight pillars feeding consistent artifacts into the design history file. This playbook is how we build it.
Read each pillar as a self-assessment: do you have the artifact, and is it at the depth FDA expects?
Use the checklist at the end to score your submission readiness across all 15 go/no-go criteria.
Where you find a gap, the artifact list is concrete enough to start work on Monday.
Each pillar includes a definition, why FDA cares, and the concrete artifacts you need to build a defensible submission package.
Our experts have guided 250+ submissions without a single cybersecurity rejection. Let us review your SPDF gaps before you submit.
If you cannot check all fifteen, you have known gaps that FDA is likely to flag.
Security requirements specification with traceability to threats, controls, and tests
Threat model with data flow diagrams and STRIDE/PASTA analysis
All four FDA architecture views (global, multi-patient harm, updateability, security use case)
Security Risk Assessment integrated with the ISO 14971 risk file
SOUP analysis with vulnerability assessment for each component
SAST/SCA in CI with results in the design history file
Penetration test covering all interfaces, performed with medical-device context
Fuzz testing on protocols handling untrusted input
Cybersecurity labeling with hardening guidance, EOS dates, and SBOM access
Coordinated Vulnerability Disclosure policy with published intake and SLAs
Validated update mechanism with signature, integrity, and rollback testing
Post-market monitoring plan with risk-based patch timelines
Section 524B documentation set: Risk Management Report, Management Plan, Labeling, Traceability
For a moderate-complexity Class II connected device, this is what a complete SPDF build typically looks like when the work is done right the first time. Several pillars run in parallel.
⚠ Timeline Reality: Most teams need 10–14 weeks of focused work for a first SPDF. Rework after an FDA AI letter typically adds 8–12 weeks to clearance.
You don’t need outside help for every submission. You probably do if any of these are true:
This is your team’s first submission with cybersecurity in scope.
You’ve received a deficiency response citing cybersecurity or SPDF gaps.
Your engineering team owns security alongside firmware and has limited bandwidth.
Your launch date is fixed and a cyber deficiency would slip revenue.
You need a defensible threat model and pen test from a firm FDA already recognizes.
Book a free 30-minute strategy session. No sales rep, no obligation. We’ll review where you are, flag the SPDF gaps FDA is most likely to hit, and give you a fixed-fee quote within 24 hours.