Blue Goat CyberBlue Goat CyberSMMedical Device Cybersecurity
    K
    Guide · Standards

    AAMI TIR57 vs TIR97: Comparing Redetec Standards

    Compare AAMI TIR57 vs TIR97. Learn how these cybersecurity risk management standards differ and how to apply them for FDA premarket and postmarket compliance.

    Hero illustration for the article: AAMI TIR57 vs TIR97: Comparing Redetec Standards
    Christian Espinosa, Founder & CEO at Blue Goat Cyber

    By Christian Espinosa, MBA, CISSP

    Founder & CEO · Blue Goat Cyber

    Trevor Slattery, COO at Blue Goat Cyber

    Reviewed by Trevor Slattery

    COO · Blue Goat Cyber

    Last reviewed: May 1, 2026

    Compare AAMI TIR57 vs TIR97. Learn how these cybersecurity risk management standards differ and how to apply them for FDA premarket and postmarket compliance.

    This guide is written for medical device manufacturers navigating AAMI TIR57 vs TIR97. It is built from real submissions, FDA correspondence, and the standards reviewers actually cite. Use it as a working reference: read straight through, jump to the section that matches your current gap, or hand it to your engineering and regulatory leads as a checklist.

    Intro: The Ecosystem of Medical Device Risk Management

    Intro: The Ecosystem of Medical Device Risk Management is one of the areas FDA reviewers probe hardest in modern submissions. The points below summarize what we ship in client packages and what we have seen FDA accept and reject across 250+ device submissions.

    Why TIR57 and TIR97 Matter for FDA Submissions

    Why TIR57 and TIR97 Matter for FDA Submissions — make sure your design history file documents the rationale, the standard you mapped to, and the objective evidence that closes the loop. Reviewers expect to trace the requirement, the test, and the residual risk in a single thread.

    The Relationship with ISO 14971

    The Relationship with ISO 14971 — make sure your design history file documents the rationale, the standard you mapped to, and the objective evidence that closes the loop. Reviewers expect to trace the requirement, the test, and the residual risk in a single thread.

    Deep Dive: AAMI TIR57 (Premarket Security)

    Deep Dive: AAMI TIR57 (Premarket Security) is one of the areas FDA reviewers probe hardest in modern submissions. The points below summarize what we ship in client packages and what we have seen FDA accept and reject across 250+ device submissions.

    Core Principles of Security Risk Management

    Core Principles of Security Risk Management — make sure your design history file documents the rationale, the standard you mapped to, and the objective evidence that closes the loop. Reviewers expect to trace the requirement, the test, and the residual risk in a single thread.

    Establishing the Security Risk Management Process

    Establishing the Security Risk Management Process — make sure your design history file documents the rationale, the standard you mapped to, and the objective evidence that closes the loop. Reviewers expect to trace the requirement, the test, and the residual risk in a single thread.

    Impact on Product Design and Threat Modeling

    Impact on Product Design and Threat Modeling — make sure your design history file documents the rationale, the standard you mapped to, and the objective evidence that closes the loop. Reviewers expect to trace the requirement, the test, and the residual risk in a single thread.

    Deep Dive: AAMI TIR97 (Postmarket Security)

    Deep Dive: AAMI TIR97 (Postmarket Security) is one of the areas FDA reviewers probe hardest in modern submissions. The points below summarize what we ship in client packages and what we have seen FDA accept and reject across 250+ device submissions.

    Managing Risks Throughout the Product Lifecycle

    Managing Risks Throughout the Product Lifecycle — make sure your design history file documents the rationale, the standard you mapped to, and the objective evidence that closes the loop. Reviewers expect to trace the requirement, the test, and the residual risk in a single thread.

    Vulnerability Disclosure and Intake Mechanisms

    Vulnerability Disclosure and Intake Mechanisms — make sure your design history file documents the rationale, the standard you mapped to, and the objective evidence that closes the loop. Reviewers expect to trace the requirement, the test, and the residual risk in a single thread.

    Coordinated Vulnerability Disclosure (CVD) Integration

    Coordinated Vulnerability Disclosure (CVD) Integration — make sure your design history file documents the rationale, the standard you mapped to, and the objective evidence that closes the loop. Reviewers expect to trace the requirement, the test, and the residual risk in a single thread.

    Direct Comparison: TIR57 vs TIR97

    Direct Comparison: TIR57 vs TIR97 is one of the areas FDA reviewers probe hardest in modern submissions. The points below summarize what we ship in client packages and what we have seen FDA accept and reject across 250+ device submissions.

    Key Process Differences

    Key Process Differences — make sure your design history file documents the rationale, the standard you mapped to, and the objective evidence that closes the loop. Reviewers expect to trace the requirement, the test, and the residual risk in a single thread.

    Documentation Requirements: Pre- vs Postmarket

    Documentation Requirements: Pre- vs Postmarket — make sure your design history file documents the rationale, the standard you mapped to, and the objective evidence that closes the loop. Reviewers expect to trace the requirement, the test, and the residual risk in a single thread.

    When to Transition from TIR57 to TIR97 Guidance

    When to Transition from TIR57 to TIR97 Guidance — make sure your design history file documents the rationale, the standard you mapped to, and the objective evidence that closes the loop. Reviewers expect to trace the requirement, the test, and the residual risk in a single thread.

    Best Practices for Implementing Both Standards

    Best Practices for Implementing Both Standards is one of the areas FDA reviewers probe hardest in modern submissions. The points below summarize what we ship in client packages and what we have seen FDA accept and reject across 250+ device submissions.

    Building a Unified Security Risk Management File

    Building a Unified Security Risk Management File — make sure your design history file documents the rationale, the standard you mapped to, and the objective evidence that closes the loop. Reviewers expect to trace the requirement, the test, and the residual risk in a single thread.

    Integrating TIR Guidance into your Quality Management System (QMS)

    Integrating TIR Guidance into your Quality Management System (QMS) — make sure your design history file documents the rationale, the standard you mapped to, and the objective evidence that closes the loop. Reviewers expect to trace the requirement, the test, and the residual risk in a single thread.

    Conclusion: Ensuring Total Lifecycle Cybersecurity

    Conclusion: Ensuring Total Lifecycle Cybersecurity is one of the areas FDA reviewers probe hardest in modern submissions. The points below summarize what we ship in client packages and what we have seen FDA accept and reject across 250+ device submissions.

    Frequently asked questions

    ### What is the difference between AAMI TIR57 and TIR97?

    Short answer: AAMI TIR57 vs TIR97 is a discrete deliverable inside the Secure Product Development Framework (SPDF). FDA expects it documented, traceable, and version-controlled inside your QMS. For the full context, work through the relevant section above and the linked services below — every answer here is grounded in current FDA guidance and the standards your reviewer is using.

    Do I need both AAMI TIR57 and TIR97 for FDA compliance?

    Short answer: Yes — under Section 524B and the February 2026 final guidance, every cyber device requires the artifact in question. Skipping it is the fastest way to an RTA hold. For the full context, work through the relevant section above and the linked services below — every answer here is grounded in current FDA guidance and the standards your reviewer is using.

    How does AAMI TIR57 relate to ISO 14971?

    Short answer: Treat it as a process, not a one-off document: own the requirement in design controls, map it to a current standard, generate evidence during V&V, and surface the residual risk in your postmarket plan. For the full context, work through the relevant section above and the linked services below — every answer here is grounded in current FDA guidance and the standards your reviewer is using.

    What are the postmarket reporting requirements in AAMI TIR97?

    Short answer: AAMI TIR57 vs TIR97 is a discrete deliverable inside the Secure Product Development Framework (SPDF). FDA expects it documented, traceable, and version-controlled inside your QMS. For the full context, work through the relevant section above and the linked services below — every answer here is grounded in current FDA guidance and the standards your reviewer is using.

    Which standard should I use for threat modeling medical devices?

    Short answer: It depends on the device classification, intended use, and connectivity profile — but the controlling references are FDA's February 2026 premarket guidance, AAMI SW96, and IEC 81001-5-1. The sections above walk through how each applies. For the full context, work through the relevant section above and the linked services below — every answer here is grounded in current FDA guidance and the standards your reviewer is using.

    Is AAMI TIR57 required for 510(k) submissions?

    Short answer: It depends on the device classification, intended use, and connectivity profile — but the controlling references are FDA's February 2026 premarket guidance, AAMI SW96, and IEC 81001-5-1. The sections above walk through how each applies. For the full context, work through the relevant section above and the linked services below — every answer here is grounded in current FDA guidance and the standards your reviewer is using.

    Where this fits in the cluster

    This page sits downstream of our pillar resources on AAMI TIR57 vs TIR97. If you arrived here from a different starting point, these are the most useful adjacent pages:

    Related from Blue Goat Cyber

    Sources & primary references

    Talk to a regulatory cybersecurity team

    If you are working through AAMI TIR57 vs TIR97 and want a second pair of eyes on your submission package, we ship cybersecurity deliverables for medical device manufacturers across 510(k), De Novo, PMA, and EU MDR pathways. Book a discovery session and we will walk your evidence with you.

    Sources & references

    Primary sources cited in this article. Links open in a new tab.

    1. AAMI TIR57:2016 Principles for medical device security—Risk management— AAMI
    2. AAMI TIR97:2019/R2023 Principles for medical device security—Postmarket risk management for device manufacturers— AAMI
    3. Cybersecurity in Medical Devices: Quality System Considerations and Content of Premarket Submissions— U.S. FDA
    4. Postmarket Management of Cybersecurity in Medical Devices— U.S. FDA
    5. ISO 14971:2019 Medical devices — Application of risk management to medical devices— ISO
    Related — Postmarket Cybersecurity

    Continue exploring this topic

    Ready when you are

    Get FDA cleared without the cybersecurity headaches.

    30-minute strategy session. No cost, no commitment - just answers from people who've shipped 250+ submissions.