Free Guide · Blue Goat Cyber · Updated 2026
DECISION TREE · WELLNESS VS. DEVICE
FDA Classification Decision Tree (Wellness vs. Device) A plain-English walk through the FDA's general-wellness vs. medical-device boundary.
250+ 0 6–10 wk FDA submissions supported Cybersecurity rejections Class II eSTAR cyber pack SINCE 2014 TRACK RECORD TYPICAL TIMELINE
The two questions that decide it FDA's General Wellness Policy gives a narrow path to non-device status. To stay outside FDA's device authority, both must be true:
• (1) Intended use is for a general state of health or to reduce the risk or impact of certain chronic diseases or conditions. • (2) The product presents a low risk to the safety of users and other persons.
What kicks you back into device land • Diagnosing or treating a specific disease or condition. • Closed-loop control of any therapy. • Claims about adverse events the product can prevent. • Any data path that informs a clinical decision by a provider.
If you are a device, what class
Class Risk Pathway
I Low (most are exempt) Often no premarket review
II Moderate 510(k) / De Novo (new intended use)
III High / life-sustaining PMA
What changes when you cross the line • QMS obligations under 21 CFR Part 820 (or the new QMSR). • Labeling and adverse-event reporting under MDR. • Cybersecurity content under Section 524B (if a cyber device). • Design controls, design history file, and clinical evaluation.
When to use this guide This guide is most useful in one of the following situations. If none of them describe your team, the resources index has a better fit.
• You are a Class II software-enabled MedTech preparing for a 510(k), De Novo, or PMA submission. • You are mid-development and need the cybersecurity story to land in the eSTAR without rework. • RA/QA owns the submission but cybersecurity work is spread across engineering, with no clear ownership.
• You have read Section 524B and the Feb 3 2026 final guidance and want a practical operating model.
Operating framework The framework below sequences the work this guide describes against the four TPLC phases used in the Feb 3 2026 final guidance. Use it to locate the activities that apply to your team this quarter.
TPLC phase Activities relevant to this guide Primary artifact
Concept / design Architecture diagram, trust Threat model v0 boundaries, initial STRIDE pass
Development SBOM in CI, SAST/DAST, SBOM (CycloneDX/SPDX) secure-coding evidence
V&V Independent pen test, fuzz, vuln SPDF + pen-test report scan, SPDF documentation
Submission eSTAR cyber package, labelling, eSTAR section + CVD plan CVD plan
Post-market Vuln monitoring, SBOM refresh, Annual cyber report re-test, CVD operations
Step-by-step playbook
-
Confirm Section 524B applicability. Apply the three-part test (software + connectivity + exploitable characteristic). Most software-enabled Class II devices meet it. The cost of getting this wrong is a Refusal-to-Accept - clarify it now.
-
Inventory existing cyber artifacts. Pull what you have: architecture diagram, SBOM, any threat model, prior pen tests, risk file. Most teams have more than they think - what they lack is traceability between artifacts.
-
Map artifacts to the Feb 3 2026 final guidance. For every artifact the guidance expects (SBOM, threat model, risk assessment, security testing, SPDF, labelling, CVD), note 'have', 'partial', or 'gap'. The gap list is your scope.
-
Sequence the gap list against TPLC phase. Don't try to fix everything in parallel. Sequence by what unblocks the next phase gate, not by what is easiest. The threat model usually has to land first because everything else traces to it.
-
Stand up post-market processes before they are needed. Post-market cyber is not a launch-day activity - it is a day-zero activity that has to be operating before the first sale, with evidence reviewers can audit.
Worked example - a typical Class II MedTech Setup A typical Class II software-enabled device team: 8–15 engineers, mid-development, planned 510(k) submission in 4–6 months, no prior FDA cyber experience on the team.
Walk-through We apply the operating framework. Architecture and SBOM exist; threat model is informal; pen test was done a year ago against an older build; SPDF documentation does not exist. We rebuild the threat model against the current architecture, regenerate SBOM in CI, schedule independent pen testing for the V&V build, and draft the SPDF in parallel. Every cyber control is linked to an existing ISO 14971 hazard.
Outcome Submission ships on the original date. The eSTAR clears the RTA screen on first review. The team carries the operating model forward as the QMS-default for every subsequent product line.
Standards crosswalk The work this guide describes does not live inside any single standard. The crosswalk below shows how each artifact ties to the regulatory text and the consensus standards a reviewer expects you to cite. Use it when you are asked, mid-review, 'where does this come from?'
Artifact Primary regulatory anchor Consensus standard
SBOM Section 524B(b)(3) NTIA / CycloneDX / SPDX
Threat model Feb 3 2026 final guidance §V AAMI TIR57, STRIDE
Cyber risk assessment Feb 3 2026 final guidance §V AAMI TIR57 + ISO 14971
Security testing Feb 3 2026 final guidance §VI AAMI SW96, IEC 62443-4-1
SPDF documentation Feb 3 2026 final guidance §IV IEC 62443-4-1, AAMI SW96
Cybersecurity labelling Section 524B(b)(2)(A) Feb 3 2026 final guidance §VII
CVD plan Section 524B(b)(1) ISO/IEC 29147 + 30111
HOW TO USE THIS IN A REVIEW MEETING
When a reviewer or an internal stakeholder challenges an artifact, do not defend it on its own merits - point to the row in this crosswalk. Every artifact in your eSTAR cyber package should sit on top of both a statutory anchor and a consensus standard.
Reviewer lens - what FDA actually looks for Reviewers do not score artifacts on weight or polish. They score them on traceability, independence, and whether the cyber story matches the safety story. The bullets below are what an experienced reviewer scans for first.
• Traceability - every cyber control must trace back to a specific hazard in the ISO 14971 risk file. • Independence - the engineer who built the system did not also test it. • Currency - the SBOM and threat model reflect the build that is actually being submitted, not last sprint's. • Coverage - the threat model addresses every trust boundary shown on the architecture diagram. • Disclosure - a coordinated vulnerability disclosure (CVD) plan exists, with a published intake path. • Labelling - end-user cybersecurity content (intended use, controls, residual risks) is in the IFU.
What 'evidence-grade' looks like Reviewers are not impressed by length. They are impressed by traceability. The four characteristics below are what separates an evidence-grade cyber package from one that draws an Additional Information letter.
-
Versioned Every artifact carries a version, a date, and a commit/build identifier. The SBOM in your eSTAR matches the build under review, not last sprint's.
-
Linked Threat-model entries link to risk-file hazards. Pen-test findings link to threat-model entries. Mitigations link to design controls. The reviewer can walk any chain end-to-end without leaving the package.
-
Independent Testing was performed by an engineer who did not write the code. The org chart in the SPDF documentation makes that visible.
-
Operational Post-market processes (vuln monitoring, CVD intake, patch validation) exist as live processes with named owners - not as procedures that will be 'stood up at launch'.
Pitfalls we see in the wild • Treating cybersecurity as a pre-submission task instead of a TPLC obligation. • Assuming a single pen test satisfies the eSTAR cyber package - it does not. • Letting developers run their own pen test, then losing the independence argument with the reviewer. • SBOM generated once, never refreshed before submission, missing the build that ships. • Threat model and risk file maintained in different tools, with no link between cyber controls and ISO 14971 hazards.
• Coordinated vulnerability disclosure deferred until after clearance - then scrambled together post-launch.
Frequently asked questions How does this fit Section 524B? Section 524B of the FD&C Act, in force since March 29, 2023, makes cybersecurity content a refusal-to-accept item for any 'cyber device'. The Feb 3, 2026 final guidance, Cybersecurity in Medical Devices, defines what that content looks like in practice: SBOM, threat model, risk assessment, security testing evidence, SPDF documentation, labelling, and a coordinated vulnerability disclosure plan. Everything in this guide is written to land cleanly inside that package.
What if our device isn't a 'cyber device'? The Section 524B test is broad: software + connectivity (even transient, even via a phone) + any exploitable technological characteristic. Most software-enabled Class II devices meet it. Even when they don't, the FDA can still ask for cyber content under its general safety-and-effectiveness authority, and a right-sized threat model is the cheapest insurance you can buy against an Additional Information letter.
Action checklist Use this checklist to confirm the artifacts and decisions covered in this guide are in place before any premarket conversation.
Section 524B applicability documented. Architecture diagram with all trust boundaries labelled. SBOM generated in CI, in CycloneDX or SPDX format. Threat model (typically STRIDE) covers every trust boundary. Cybersecurity risk assessment linked to ISO 14971 hazards. Independent pen test scheduled or complete on the V&V build. SPDF documentation drafted before eSTAR build starts. CVD intake live before first commercial sale. Post-market vuln monitoring process assigned and documented.
What to do this week Before any partner conversation, do three things this week: (1) pull the current architecture diagram and confirm every trust boundary is labelled, (2) export the latest SBOM (CycloneDX or SPDX) for the build you intend to submit, and (3) note the TPLC phase you are in. With those three inputs, a good cyber partner can scope a right-sized engagement in 20 minutes - without them, every conversation re-starts from zero.
NEXT STEP
Book a 20-minute discovery call We'll map your device, your submission timing, and the artifacts FDA expects, and you'll leave with a one-page plan you can share with your team. No deck, no obligation.
(844) 939-4628 (GOAT) ·
go.bluegoatcyber.com/meetings/blue-goat-cyber/discovery-session Scan the QR code to book instantly →
Talk to us
This guide is part of Blue Goat Cyber's MedTech cybersecurity library. To apply it to your device program, book a 30-minute strategy session - no cost, no obligation. Or browse all guides.
