Blue Goat CyberBlue Goat CyberSMMedical Device Cybersecurity
    K
    Regulatory Strategy

    Pick the right FDA pathway, build the right cybersecurity evidence.

    510(k), De Novo, PMA, HDE, Breakthrough, Pre-Sub - each pathway has a different timeline, a different bar, and a different cybersecurity package. This is the working guide we use with our clients.

    Pathway journeyFind your pathwayPathwaysDevice classes5-step planMDCC crosswalk
    Interactive walkthrough

    The Pathway Journey

    Click through the seven stages every connected medical device walks - from scoping to postmarket. See what's due, where cyber lifts the bar, and the traps we see most often.

    Stage 1 of 7

    1. Define & Scope

    Scope

    Typical duration·1–2 weeks

    Goal: Lock the device description, intended use, and patient/clinical risk profile so every downstream decision has a stable anchor.

    You'll produce

    • Device description & intended use statement
    • Connectivity & interface inventory (BLE, Wi-Fi, USB, cloud, mobile)
    • Initial risk and patient-harm framing
    Cybersecurity artifacts checklist

    What plugs in, and when

    Each row is a cybersecurity artifact reviewers expect to see. Each column is a stage of the pathway. The current stage is highlighted - markers show where an artifact starts, gets iterated, or is finalized.

    Start draftingIterate / expandFinalize / submit
    Artifact
    Start Iterate Iterate Iterate - Submit Iterate
    Start - - Iterate - Submit -
    - Start Iterate Iterate Iterate Submit Iterate
    - - Start Iterate Iterate Submit Iterate
    - - - Start Iterate Submit Iterate
    - - - Start Iterate Submit Iterate
    - - - Start - Submit -
    - - - - Start Submit -
    - - - - Start Submit -
    - - - Start - Submit Iterate
    - - Start Iterate - Submit Iterate
    - - Start Iterate - Submit Iterate

    At Scope · 2 artifacts active

    Start drafting(2)

    • • Secure Product Development Framework (SPDF)
    • • Asset & Interface Inventory

    Iterate / expand(0)

    • -

    Finalize / submit(0)

    • -
    Interactive walkthrough

    Find your pathway in 60 seconds.

    Answer 2–4 quick questions. We'll recommend a pathway and the exact cybersecurity artifacts FDA will expect - no email required.

    Is your product intended to diagnose, treat, prevent, monitor, or mitigate a disease or condition?

    This is the FDA's threshold question for whether something is a medical device.

    FDA pathways

    Six routes to market - and what each one demands

    The pathway you pick drives your timeline, your user fee, and the depth of your cybersecurity package. All connected medical devices fall under Section 524B regardless of pathway, but reviewer expectations scale with risk.

    510(k)3–9 months FDA review (avg ~6)

    Premarket Notification

    Best for: Most Class II devices that are substantially equivalent to a legally marketed predicate.

    Cybersecurity lift: Section 524B applies in full. Reviewers expect SPDF evidence, machine-readable SBOM, threat model, and a postmarket plan in the eSTAR.

    Examples: Patient monitors, infusion pumps, connected wearables, imaging software (CADx).

    Fee: Standard / small business user fees apply.

    De Novo9–12+ months

    Risk-Based Classification Request

    Best for: Novel low-to-moderate risk devices (Class I/II) with no valid predicate. Establishes a new classification.

    Cybersecurity lift: Cybersecurity expectations equal to 510(k); novelty often draws additional reviewer attention to threat model rigor and ML/AI threats.

    Examples: First-of-kind digital therapeutics, novel SaMD diagnostics, AI-enabled triage tools.

    Fee: Higher than 510(k); special small-business waivers available.

    PMA12–24+ months

    Premarket Approval

    Best for: Class III devices - those supporting/sustaining human life or presenting potential unreasonable risk.

    Cybersecurity lift: Highest cybersecurity bar. Manual penetration testing, deep traceability (threat → requirement → design control → V&V), and an active CVD program are effectively required.

    Examples: Implantable cardiac devices, neurostimulators, life-supporting infusion systems, certain AI/ML diagnostics.

    Fee: Highest user fee tier.

    HDE75-day review after HUD designation

    Humanitarian Device Exemption

    Best for: Devices for rare conditions affecting fewer than 8,000 patients/year in the US. Requires HUD designation first.

    Cybersecurity lift: Cybersecurity requirements still apply. Connectivity profile and patient-safety impact drive the depth of evidence expected.

    Examples: Pediatric implants for rare disorders, niche neuromodulation devices.

    Fee: Reduced.

    BreakthroughFaster sprint reviews and priority engagement (still goes through 510(k)/De Novo/PMA).

    Breakthrough Devices Program

    Best for: Devices providing more effective treatment/diagnosis of life-threatening or irreversibly debilitating conditions.

    Cybersecurity lift: Speed does not relax cyber expectations. Build the SPDF + threat model + SBOM in parallel - late additions cause schedule slips.

    Examples: Novel cancer dx, first-line stroke detection AI, BCI devices for paralysis.

    Fee: Same as underlying pathway; benefits include sprint discussions and priority review.

    Pre-Sub (Q-Sub)60–75 days to written feedback + meeting.

    Pre-Submission Program

    Best for: Getting written FDA feedback on your strategy before you file. Free and underused.

    Cybersecurity lift: Best place to align on cybersecurity evidence depth, AI/ML threat scope, and acceptable VEX justifications before you commit to a build plan.

    Examples: Used at concept, before pivotal study, before submission of any pathway above.

    Fee: Free.

    Device classes

    Class I, II, III - and what changes for cyber

    Classification is risk-based. The higher the class, the higher the controls and the deeper the cybersecurity evidence reviewers expect.

    Class I

    Low risk

    Controls
    General controls (registration, listing, GMP, labeling).
    Typical pathway
    Most are 510(k)-exempt; some require 510(k).
    Cybersecurity lift
    Section 524B still applies if the device meets the cyber-device definition. Even minimal connectivity (Bluetooth, USB sync) triggers full cyber expectations.
    Examples
    Bandages, manual stethoscopes, basic surgical instruments, some software accessories.

    Class II

    Moderate risk

    Controls
    General + special controls (performance standards, post-market surveillance, labeling).
    Typical pathway
    Typically 510(k); some De Novo.
    Cybersecurity lift
    Default for connected medical devices. SPDF + machine-readable SBOM + threat model + pen test + postmarket plan all expected.
    Examples
    Infusion pumps, patient monitors, most SaMD, imaging software, connected diagnostics.

    Class III

    High risk / life-supporting

    Controls
    Premarket approval (PMA) - highest level of regulatory control.
    Typical pathway
    PMA (rarely HDE for rare-disease versions).
    Cybersecurity lift
    Highest expectations. Reviewers want exhaustive traceability, manual exploit-driven testing, AI/ML threat coverage where applicable, and a mature CVD program.
    Examples
    Implantable defibrillators, neurostimulators, replacement heart valves, certain implantable AI systems.
    The 5-step plan

    How we sequence regulatory + cybersecurity strategy

    The single biggest mistake we see: cybersecurity treated as a final-mile add-on. The pathways above all reward teams that build evidence in parallel with engineering.

    1. Step 1

      Confirm device classification

      Use the FDA product classification database and the MDCC crosswalk (linked below) to confirm your product code, regulation number, and class. Class drives pathway, evidence depth, and timeline.

    2. Step 2

      Decide pathway

      510(k) if a defensible predicate exists. De Novo if novel and low-to-moderate risk. PMA if Class III. Consider Breakthrough designation if eligible - file Q-Sub feedback before committing.

    3. Step 3

      Map cybersecurity to the pathway

      Every pathway above triggers Section 524B cyber-device requirements. Build the SPDF, SBOM, threat model, and postmarket plan in parallel with engineering - not at the end.

    4. Step 4

      Use a Pre-Sub to de-risk

      A Q-Sub is the cheapest reviewer feedback you'll ever get. Use it to validate the cybersecurity scope, AI/ML threat coverage, and acceptable VEX justifications before you build evidence at scale.

    5. Step 5

      Build the eSTAR-ready package

      Cybersecurity risk assessment, threat model, SBOM (CycloneDX 1.5), pen test report, postmarket plan, labeling. Each artifact has a specific eSTAR slot - see our FDA 2026 Decoder.

    Recommended tool

    MDCC Crosswalk - map FDA, EU MDR, IEC 62304, AAMI TIR57 in one view

    When you're working a multi-jurisdiction submission (FDA + CE + IEC 62304 + AAMI TIR57 + ISO 14971), the MDCC Crosswalk is the cleanest way to see where standards align and where they don't. We use it on real client engagements alongside our own evidence-mapping templates.

    Open MDCC Crosswalk
    Go deeper

    Related playbooks

    Ready when you are

    Need a regulatory + cybersecurity strategy session?

    30 minutes with a senior medical device security engineer. We'll review your device profile, recommend the pathway, and identify the cybersecurity evidence you need.