Monitoring & Patch Cadence Calculator
Three inputs - risk class, connectivity, PHI sensitivity - return the monitoring, patching, and reporting cadence FDA postmarket reviewers expect for your device.
Reviewed by
Christian Espinosa
Founder & CEO, Blue Goat Cyber
Device risk class
Connectivity
PHI / sensitive data on device
What you'll see after you submit
Risk + connectivity + PHI sensitivity → a tiered cadence plan
- TierGauge infographic: A / B / C tier placement based on your inputs.
- Monitoring, patching, pen test, and FDA-reporting SLAs tuned to the tier.
- Reviewer-aligned cadence narrative you can drop into your postmarket plan.
- Tie-back to §524B postmarket obligations so audit trail is obvious.
Common misconceptions
What teams usually get wrong
-
Myth: Annual pen testing is fine for any device.
Reality: FDA expects pen test cadence to scale with risk and connectivity. Internet-connected Class II/III with PHI typically warrants every release plus a yearly external test - not just annual.
-
Myth: 30-day FDA reporting only applies to recalls.
Reality: Uncontrolled cybersecurity risk (CVSS-style or otherwise) can trigger a 30-day report under 21 CFR 806. The threshold is impact, not the word 'recall.'
-
Myth: We monitor CVEs against our SBOM once a quarter.
Reality: Reviewer expectation is continuous monitoring with documented triage SLAs. Quarterly cadence is a deficiency for any internet-connected device.
-
Myth: Patch validation is the same for all devices.
Reality: Closed-loop or life-supporting devices need bench + simulated-clinical validation per patch; lower-risk SaMD can use staged rollout with telemetry. The cadence tool tells you which lane you're in.
References & further reading
Primary sources behind this tool
- Postmarket Management of Cybersecurity in Medical Devices (Dec 2016) - FDA
- 21 CFR Part 806 - Reports of Corrections and Removals - U.S. Code of Federal Regulations
- AAMI TIR97:2019 - Principles for Medical Device Security: Postmarket Risk Management - AAMI
- CISA Known Exploited Vulnerabilities Catalog - CISA
- FDA §524B Postmarket Obligations Summary - FDA
Recent regulatory + supply-chain activity
Tracked signals that change what reviewers expect. Items move on as new ones land.
-
Jun 30, 2026EOS clock
RHEL 7 Extended Life Support phase ends - devices on RHEL 7 need a compensating-controls memo
-
Apr 22, 2026CISA KEV
CISA adds use-after-free in Linux kernel netfilter to KEV (CVE-2026-0511)
-
Apr 15, 2026CISA KEV
BLE pairing bypass in widely embedded Bluetooth stack added to KEV
-
Feb 14, 2026Blue Goat research
AI-letter analysis - 62% of FDA cyber deficiencies cite a missing or stale CVD URL
From cadence on paper to operating program.
Postmarket cybersecurity services
Monitoring, CVD, patch validation, and FDA reporting workflows.
Learn morePostmarket readiness plan
The plan template reviewers expect to see.
Learn moreSBOM services
Continuous CVE/KEV/VEX monitoring against your SBOM.
Learn moreMore tools
PCCP, threat model starter, CVD policy generator.
Learn more