Blue Goat CyberSMMedical Device Cybersecurity
    K
    SaMD Cybersecurity · Full-Service Premarket

    The Entire Premarket Cybersecurity Package for Software as a Medical Device.

    We own 100% of the FDA Section 524B premarket cybersecurity submission for your SaMD: threat model, secure architecture, SBOM, cloud + mobile + API pen testing, vulnerability management plan, labeling, and reviewer-ready evidence binder. Most modern SaMD includes AI/ML, so we extend the same package with PCCP, GMLP, adversarial robustness, and transparency labeling when your device uses ML. Postmarket monitoring is a separate annual contract, but you can bundle it with premarket at signature for a single fixed fee from kickoff through your first year on market.

    One team owns the full FDA Section 524B premarket package, with AI/ML extensions (PCCP, GMLP, AAMI CR34971) layered in when your SaMD includes a model.

    • End-to-end Section 524B package
    • Cloud + mobile + API testing
    • AI/ML SaMD ready (PCCP + GMLP)
    • SBOM + VEX
    • Bundle premarket + postmarket
    • Free 30-min discovery call
    • Senior SaMD security engineer from minute one
    • Fixed-fee quote in 24-hours
    • NDA available on request
    • US-based team

    Trusted by leading MedTech companies

    Intuitive Surgical logo, Blue Goat Cyber client
    bioMérieux logo, Blue Goat Cyber client
    Inogen logo, Blue Goat Cyber client
    Natera logo, Blue Goat Cyber client
    Velico Medical logo, Blue Goat Cyber client
    Medivis logo, Blue Goat Cyber client
    Spiro Robotics logo, Blue Goat Cyber client
    Nova Biomedical logo, Blue Goat Cyber client
    VitalConnect logo, Blue Goat Cyber client
    AngioWave logo, Blue Goat Cyber client
    Intuitive Surgical logo, Blue Goat Cyber client
    bioMérieux logo, Blue Goat Cyber client
    Inogen logo, Blue Goat Cyber client
    Natera logo, Blue Goat Cyber client
    Velico Medical logo, Blue Goat Cyber client
    Medivis logo, Blue Goat Cyber client
    Spiro Robotics logo, Blue Goat Cyber client
    Nova Biomedical logo, Blue Goat Cyber client
    VitalConnect logo, Blue Goat Cyber client
    AngioWave logo, Blue Goat Cyber client
    Christian Espinosa, Founder & CEO

    Reviewed by Christian Espinosa, MBA, CISSP · Founder & CEO

    Last reviewed May 2026

    Is this you?

    Four SaMD shapes we package end-to-end

    Pick the shape that looks like your device. Same fixed-fee package, scoped to the attack surface that actually applies.

    Cloud-hosted CDS or workflow SaMD

    Multi-tenant SaaS that ingests clinical data, runs decision logic, and writes back to the EHR. We cover IAM, KMS, tenancy isolation, OWASP ASVS, and CSPM drift baselines.

    Mobile diagnostic or therapeutic app

    Native iOS / Android SaMD where the phone is the device. We cover OWASP MASVS, certificate pinning, runtime tampering, code-signing, and the backend API the app talks to.

    Web image-analysis viewer

    Browser-based viewer for radiology, pathology, or wound imaging. We cover OAuth/SSO redirection, DICOM transport, session management, and clinical-workflow business-logic abuse.

    AI/ML SaMD with a model in the clinical path

    ML clinical decision support, image analysis, risk scoring, or LLM features. We layer PCCP, GMLP, adversarial robustness, and transparency labeling on top of the standard Section 524B package.

    Why generic medical-device cyber programs miss SaMD

    Most cybersecurity guidance assumes a connected device with firmware. When the device is a cloud service or a mobile app, the deliverables change.

    "Hosted on AWS" is not architecture documentation

    FDA reviewers expect a cloud reference architecture (VPC, IAM boundaries, KMS, tenancy isolation, logging) as a first-class diagram. Pointing at a shared-responsibility matrix draws a deficiency.

    SiMD pen tests don't satisfy SaMD reviewers

    Network and RF testing won't cover what matters: web app, API, mobile binary, OAuth/SSO redirection, multi-tenant data isolation, and cloud config drift. Scope must cite OWASP ASVS / MASVS.

    Read: SaMD vs SiMD, what manufacturers need to know

    Patch cadence expectations are days, not months

    Because you control the production environment, reviewers expect continuous deployment with documented change control and a CVE-to-patch SLA in days-to-weeks, not the quarterly cycle a SiMD can justify.

    AI/ML is now part of most SaMD, and the FDA treats it that way

    If your SaMD includes a model (clinical decision support, image analysis, risk scoring, LLM features), reviewers expect a PCCP, GMLP-aligned lifecycle, adversarial robustness evidence, and transparency labeling on top of the standard Section 524B package. We bundle the AI/ML extension into the SaMD engagement so nothing falls between services.

    Attack surface

    SaMD attack surface we cover

    Scoped to your modality: cloud-hosted CDS, mobile diagnostic app, web image-analysis viewer, digital therapeutic, or AI/ML SaMD.

    Cloud architecture & tenancy

    • IAM, KMS, and service-account review (least privilege, key rotation)
    • Multi-tenant isolation: row-level security, key separation, network segmentation
    • Cloud security posture management (CSPM) drift baseline
    • Build provenance and CI/CD pipeline review (SLSA-aligned)

    Web app & API

    • Authenticated and unauthenticated testing per OWASP ASVS L2/L3
    • OWASP API Top 10: broken object-level authorization, mass assignment, rate limiting
    • OAuth / SSO redirection, token replay, EHR federation flows
    • Session management, CSRF, and clinical-workflow business logic abuse

    Mobile SaMD (iOS / Android)

    • OWASP MASVS: local storage, IPC, runtime tampering, certificate pinning
    • Side-loading and repackaging resistance, code-signing integrity
    • Backend API coverage from the mobile threat model
    • Offline-mode and sync-conflict edge cases that affect clinical correctness

    SBOM, supply chain & dependencies

    • Application SBOM and container base-image SBOM (CycloneDX)
    • VEX statements covering exploitability in your deployed configuration
    • Dependency confusion / typosquatting controls in package registries
    • Third-party API and AI-vendor inventory, including BAAs/DPAs where PHI is in scope
    How it works

    How we engage

    Scope first, then test what matters, then document for the FDA and the notified body.

    1. 01

      1 · SaMD scoping & threat model

      STRIDE-based threat model of the cloud architecture, mobile/web client, CI/CD, and IAM, with explicit RACI for manufacturer, cloud provider, and operating organization per IEC 82304-1.

    2. 02

      2 · Section 524B documentation

      Cybersecurity risk assessment (AAMI SW96), security architecture views, SBOM (app + container), patchability narrative, and operating-environment assumptions for labeling.

    3. 03

      3 · Test execution

      Manual-led web/API pen test (OWASP ASVS), mobile pen test (MASVS) where applicable, cloud configuration review, and IAM/tenancy isolation validation. Reproducible artifacts.

    4. 04

      4 · Submission package

      FDA-reviewer-ready evidence binder mapped to the 2026 premarket guidance and Section 524B, plus a parallel pack aligned to MDCG 2019-16 / IEC 81001-5-1 for EU MDR.

    5. 05

      5 · Optional postmarket bundle

      Postmarket monitoring (continuous SBOM monitoring, CSPM drift alerts, CVE-to-patch SLA, CVD intake) is a separate annual contract. You can bundle it with premarket at signature so the same team carries you from kickoff through your first year on market under one fixed fee.

    Standards crosswalk

    One evidence binder. Four regulators happy.

    The same SaMD artifacts satisfy the FDA Section 524B, AAMI SW96, IEC 81001-5-1, and MDCG 2019-16 — mapped row-by-row so you don't pay to rebuild evidence for each filing. This is the table reviewers cite when they ask "where is your control for X?"

    Deliverable
    FDA §524B
    + 2026 guidance
    AAMI SW96
    ANSI/AAMI
    IEC 81001-5-1
    lifecycle activities
    MDCG 2019-16
    EU MDR notified body
    Cybersecurity threat model (STRIDE)
    Cloud architecture, mobile/web client, CI/CD, IAM and tenancy boundaries.
    Primary Primary Primary Primary
    Cybersecurity risk assessment
    Patient-safety risk linkage to ISO 14971; AAMI SW96 risk-acceptability rationale.
    Primary Primary Primary Primary
    Secure design & architecture views
    Reference architecture, trust boundaries, data flows, IAM/KMS, multi-tenant isolation.
    Primary Supports Primary Primary
    SBOM (application + container)
    CycloneDX, third-party + transitive dependencies, container base images.
    Primary Supports Primary Primary
    VEX statements
    Exploitability per CVE in the deployed configuration; published alongside advisories.
    Primary Supports Supports Primary
    Penetration testing (web / API / mobile / cloud)
    OWASP ASVS L2/L3, OWASP API Top 10, OWASP MASVS, cloud configuration review.
    Primary Primary Primary Primary
    Vulnerability management plan
    CVE-to-patch SLA, change control, CVD intake, postmarket monitoring procedures.
    Primary Primary Primary Primary
    Coordinated vulnerability disclosure (CVD)
    Published security.txt, disclosure inbox, triage workflow, FDA 30-day notification.
    Primary Supports Primary Primary
    Operating-environment & accompanying documentation
    IEC 82304-1 operating-environment statement; cybersecurity labeling for users.
    Primary Supports Primary Primary
    AI/ML extension (PCCP, GMLP, adversarial robustness)
    Layered when the SaMD includes a model; references AAMI CR34971 and NIST AI RMF.
    Primary Supports Supports Supports

    Primary = framework explicitly requires this artifact. Supports = framework accepts it as evidence or references it indirectly.

    How we compare

    Blue Goat vs. a boutique pen-test shop vs. a big consultancy

    Most SaMD founders compare us against either a boutique app-security shop or a Big-4 medical-device practice. Here's how the three options actually stack up on what reviewers care about.

    Dimension
    Blue Goat Cyber
    SaMD specialists
    Boutique pen-test shop
    app-security focus
    Big consultancy
    Big-4 / large MedTech advisory
    SaMD-specific scope (cloud + mobile + API + AI/ML) Built for SaMD Often app-only Generic medical-device template
    Senior engineer from minute one (no junior delivery) Yes Yes Tiered delivery model
    Fixed fee in 24 hours, no T&M billing Yes Often hourly T&M default
    Reviewer-ready FDA evidence binder included Mapped to 2026 guidance Pen test report only Doc team is separate scope
    AI/ML extension (PCCP, GMLP, adversarial robustness) bundled Yes No Separate AI practice
    Postmarket bundle option (annual SBOM/CVD/CSPM) 1-yr bundle at signature No Different team
    Typical cycle time, kickoff to submission 6 to 10 weeks Test only, ~3 wks 12 to 20+ weeks
    100% success guarantee on cybersecurity deficiencies Yes No No

    Generalized comparison based on common engagement structures we encounter in scoping calls. Individual firms may differ.

    What's included

    Reviewer-ready deliverables in one engagement

    Every samd cybersecurity engagement ships with the artifacts FDA reviewers expect to see - traceable, complete, and aligned with current guidance.

    • Entire FDA Section 524B premarket cybersecurity package, owned end-to-end
    • Threat model, secure design docs, architecture views, and labeling
    • Cloud + mobile + API pen testing (OWASP ASVS / MASVS) and IAM/tenancy review
    • SBOM (app + container) with VEX, vulnerability mgmt plan, and patchability narrative
    Recent SaMD outcomes

    Software-only devices, cleared on the first cycle

    Cycle time and outcome from recent SaMD engagements. Device names withheld under NDA; modality, class, and the actual evidence binder are available under MNDA on request.

    Cloud CDS · Class II

    Multi-tenant cloud CDS cleared, first cycle

    Full Section 524B package: STRIDE threat model of the cloud architecture, OWASP ASVS web/API pen test, CycloneDX SBOM, IAM and tenancy isolation review, reviewer-ready evidence binder.

    Cycle time

    8 weeks · kickoff to submission

    Outcome

    Cleared with zero cybersecurity deficiencies

    Mobile diagnostic · Class II

    iOS + Android diagnostic app cleared

    OWASP MASVS mobile pen test on both platforms, backend API testing, code-signing and pinning review, IEC 82304-1 operating-environment labeling, MDCG 2019-16 parallel pack for EU MDR.

    Cycle time

    7 weeks · kickoff to submission

    Outcome

    Cleared with one minor information request, resolved in 5 days

    AI/ML SaMD · Class II

    ML image-analysis SaMD with PCCP cleared

    Section 524B core package plus AI/ML extension: PCCP, GMLP-aligned lifecycle, adversarial robustness evidence (FGSM + PGD), AAMI CR34971 risk extension, transparency labeling for the ML model card.

    Cycle time

    10 weeks · kickoff to submission

    Outcome

    Cleared with PCCP accepted as filed

    Pricing approach

    One fixed fee. Scoped to your device's complexity and timeline.

    We don't bill hourly and we don't sell tiers. Every SaMD engagement is a single fixed fee, quoted in writing within 24 hours of a free 30-minute discovery call. The fee tracks the actual attack surface of your device and the submission window you're working against — not seat counts, not retainers, not add-ons.

    What's always included

    • Section 524B premarket package, end to end
    • STRIDE threat model + AAMI SW96 risk assessment
    • OWASP ASVS / MASVS pen testing scoped to your surfaces
    • CycloneDX SBOM + VEX + vulnerability management plan
    • Reviewer-ready evidence binder mapped to the 2026 guidance
    • Unlimited retests until reviewers are satisfied

    What drives your fee

    • Number of exposed surfaces (web, API, mobile platforms, embedded SDKs)
    • Multi-tenancy model and IAM/KMS complexity
    • Whether an AI/ML model sits in the clinical path
    • Dual-jurisdiction filing (the FDA + EU MDR notified body)
    • Postmarket bundle (12-month vs. premarket only)
    • Submission timeline and parallel-track requirements

    SaMD engagements are typically lower than comparable connected-hardware projects because there is no firmware or RF testing scope. Postmarket is a separate annual contract; bundle pricing is quoted alongside.

    Backed by our 100% success guarantee: if a cybersecurity deficiency in our deliverables delays your submission, we resolve it at no additional cost until clearance.

    Relevant standards

    Standards this service maps to

    Every samd cybersecurity engagement produces evidence aligned to the regulatory and consensus standards FDA reviewers and notified bodies expect to see - traceable, complete, and ready to drop into your ISO 13485 quality system.

    Featured site-wide
    FDA 2026 Guidance Featured

    FDA Premarket Cybersecurity Guidance (Feb 3, 2026)

    Defines the SPDF, Section 524B submission package, threat modeling, SBOM, security architecture views, and cybersecurity testing every cyber device submission must include.

    Section 524B

    FD&C Act Cyber Device Requirements

    Statutory requirement that every cyber device 510(k), De Novo, PMA, and IDE submission include a complete cybersecurity package or face Refuse to Accept (RTA).

    SPDF

    Secure Product Development Framework

    End-to-end secure development lifecycle the FDA expects to see referenced and evidenced in every cyber device submission.

    IEC 81001-5-1

    Health Software Security Activities

    International standard for security activities across the health software product lifecycle.

    ANSI/AAMI SW96 Featured

    Medical Device Security Risk Management

    The consensus standard for medical device security risk management - asset, threat, vulnerability, likelihood, severity, and residual risk acceptability.

    ISO 14971 Featured

    Medical Device Risk Management

    Foundational risk management standard. Cybersecurity risk is tied directly to patient-safety risk in the 14971 file.

    OWASP ASVS

    Application Security Verification Standard

    Verification requirements for web and application security controls.

    OWASP MASVS

    Mobile Application Security Verification Standard

    Verification requirements for iOS / Android companion app security controls.

    OWASP API Top 10

    API Security Top 10

    The most common and impactful API security risks - required reading for any device with cloud or partner APIs.

    Related services mapped to the same standards

    FAQ

    SaMD cybersecurity FAQs

    Related reading

    Go deeper on SaMD cybersecurity

    Background reading and adjacent services for teams scoping a SaMD premarket submission.

    Guide

    SaMD cybersecurity requirements

    The full reference: what the FDA and notified bodies expect for Software as a Medical Device, mapped to Section 524B, IEC 81001-5-1, and MDCG 2019-16.

    Read the guide
    Blog

    SaMD vs SiMD: what manufacturers need to know

    Why the distinction drives your FDA strategy, which standards apply to each, and how cybersecurity scope changes when there's no firmware to test.

    Read the post
    Service

    AI/ML SaMD cybersecurity

    When your SaMD includes a model, the package extends with PCCP, GMLP, adversarial robustness, and transparency labeling, layered on top of the Section 524B core.

    See the AI/ML service
    In their words

    Backed by MedTech leaders.

    HT
    "Blue Goat Cyber's depth of expertise was impressive. We had no in-house cybersecurity experience, and their team guided us through every step of the FDA process. The penetration testing and SBOM testing were thorough and gave us complete confidence."
    Hank Tucker
    CEO · MedTech Manufacturer
    Ready to start SaMD Cybersecurity?

    SaMD Cybersecurity - scoped, fixed-fee, FDA-ready.

    We own 100% of the FDA Section 524B premarket cybersecurity submission for your SaMD: threat model, secure architecture, SBOM, cloud + mobile + API pen testing, vulnerability management plan, labeling, and reviewer-ready evidence binder. Most modern SaMD includes AI/ML, so we extend the same package with PCCP, GMLP, adversarial robustness, and transparency labeling when your device uses ML. Postmarket monitoring is a separate annual contract, but you can bundle it with premarket at signature for a single fixed fee from kickoff through your first year on market.