Blue Goat CyberBlue Goat CyberSMMedical Device Cybersecurity
    K
    2-minute scope estimator

    What does a pen test for your device actually look like?

    Six questions mapped to the SPDF and FDA premarket guidance. Get a planning-grade scope, depth, and timeline - then a tailored proposal.

    Question 1 of 60% complete

    What is the device's submission pathway?

    Test depth

    White-box vs grey-box vs black-box

    For medical devices, both Blue Goat and the FDA recommend white-box testing. Reviewers expect testers to leverage source, firmware, and threat models - black-box alone routinely leads to deficiencies.

    Capability Black-box Grey-box White-box
    Source code access
    Firmware / binaries
    Threat model & architecture
    Authenticated test paths
    Deep logic + business-flow flaws
    Aligned with FDA expectations
    Scope coverage per test-day
    Yes Partial No
    References

    Why FDA and AAMI point to white-box

    Premarket guidance and consensus standards both expect testers to leverage source code, design artifacts, and threat models, not just an external view of the device.

    Before you scope

    The estimator gives you a planning number. These resources help you sharpen scope before kickoff.

    FDA cybersecurity readiness quiz

    2-minute self-assessment to score your submission against current FDA guidance.

    Learn more

    Medical device penetration testing

    Our SPDF-aligned methodology, deliverables, and reviewer-ready report format.

    Learn more

    Threat modeling services

    STRIDE-based modeling - the input that lets a pen test test the right things.

    Learn more

    FDA premarket cybersecurity

    Full SPDF + eSTAR-ready submission package aligned to FDA guidance.

    Learn more

    Cost-of-delay calculator

    Quantify what every week of submission slip costs in revenue and runway.

    Learn more

    White-box penetration testing

    Our recommended depth for medical devices - and the FDA's preference. Full source, firmware, and threat-model access for deeper findings.

    Learn more

    Pen testing methodology

    How we plan, execute, and report - designed for FDA reviewer scrutiny.

    Learn more