Wireless & Physical Interface Profiler
Pick the interfaces your device actually exposes - from Wi-Fi and BLE to NFC, RFID, USB-OTG, JTAG, and CAN. Get the threats reviewers expect to see in the threat model, the pen-test scoping that proves them out, and the evidence each interface adds to your premarket submission.
Reviewed by
Christian Espinosa
Founder & CEO, Blue Goat Cyber
Interfaces the device actually exposes
Include service-only ports, paired accessories, and anything physically present even if disabled in software.
Wireless
Wired / physical
Cloud / app
Update / service
What you'll see after you submit
Every interface → threats + pen-test scope + premarket evidence
- 17 interface entries spanning wireless (Wi-Fi, BLE, BR/EDR, NFC, RFID, cellular, paired phone), wired/physical (USB data, USB-OTG, serial/CAN, removable media, JTAG/SWD), cloud/app (vendor API, companion app, portal), and update/service (OTA).
- Reviewer-relevant seeded threats with abuse case, safety impact, and AAMI TIR57 / SW96 control IDs.
- Pen-test scoping list per interface so your testing SOW covers every exposed surface.
- Premarket-evidence list per interface so your eSTAR cybersecurity sections include what reviewers expect.
Common misconceptions
What teams usually get wrong
-
Myth: If it's just NFC for pairing, it doesn't need a threat model entry.
Reality: Tap-to-configure NFC is one of the most common ways malicious configuration lands on a device. Reviewers expect it in the threat register with signed-payload mitigations.
-
Myth: RFID is a logistics concern, not a cybersecurity concern.
Reality: If the device authenticates a consumable, accessory, or clinician using RFID, it is a safety-relevant security control and must be modeled.
-
Myth: A USB-C port that 'only charges' has no attack surface.
Reality: USB-C role detection can be coerced. Without hardware-level data-line isolation, the port is a data path.
References & further reading
Primary sources behind this tool
Recent regulatory + supply-chain activity
Tracked signals that change what reviewers expect. Items move on as new ones land.
Where to take this next.
Threat Model Starter
Add asset-level threats + ISO 14971 linkage.
Learn morePen Test Scope Estimator
Turn this profile into an effort estimate.
Learn moreMedical device penetration testing
Run the test against every interface on this profile.
Learn moreFDA premarket cybersecurity
Get the evidence into the submission cleanly.
Learn more