JSP Verification & Validation: Inspecting What You Built

Topics:
Healthcare Cybersecurity
This is some text inside of a div block.
Joint Security Plan (JSP)
This is some text inside of a div block.
FDA Compliance
This is some text inside of a div block.
Multi-device ecosystems
This is some text inside of a div block.
Tools & processes
This is some text inside of a div block.
Software Bill of Materials (SBOM)
This is some text inside of a div block.
Vulnerability management
This is some text inside of a div block.
Secure device communication
This is some text inside of a div block.
Stacey Martinez
Stacey Martinez

October 21, 2025

JSP Verification & Validation: Inspecting What You Built

The walls are up, the wiring’s in, and it’s finally time for inspection day. The Verification & Validation (V&V) Phase is when the inspector walks through your cybersecurity house - checking that every outlet works, every circuit is grounded, and every lock does its job.

In product terms, this is where security controls, requirements, and documentation are tested, verified, and validated - the formal evidence that your device was built securely, performs as intended, and can withstand the threats it was designed to resist.

From Framing to Inspection

The Concept and Design phases defined what and how to build. Now comes the moment to prove it all works.

Just like a building inspection, V&V doesn’t happen all at once. Some tests are run early, as individual systems come online; others wait until everything is integrated. The goal is simple: make sure every requirement, from encryption to authentication to patching, performs exactly as promised - safely, securely, and reliably.

The JSP breaks this phase into three key inspection checkpoints:

  1. Verify Security Controls (E.1) - Does every control you designed actually work?
  2. Identify Known Vulnerabilities (E.2) - Is your product free of known weaknesses?
  3. Security Validation Testing (E.3) - How does the system hold up when attacked?

Together, they form the final inspection - a blend of craftsmanship review and stress test before the keys are handed over.

Checking Every Outlet: Verifying Security Controls (JSP2 Section E.1)

This is the first pass of the inspection - confirming that every switch, outlet, and smoke detector was installed where the blueprint said it should be.

In device terms, that means ensuring security requirements are verified through traceable test cases. Unit and integration tests are designed to confirm that encryption works as implemented, access controls function properly, and data is logged as required.

The best inspectors don’t rely on guesswork - they follow a checklist. Each test is tied to a specific requirement and documented so it can be repeated later. Some tests are automated (run continuously through regression suites), while others require careful manual validation.

When this pass is complete, you have the evidence that what you built actually matches the blueprint - no missing locks, no dead circuits, no undocumented shortcuts.

Scanning for Weak Spots: Identifying Known Vulnerabilities (JSP2 Section E.2)

Even the best-built homes need to be checked for hidden cracks or faulty wiring. In cybersecurity, that means identifying known vulnerabilities using automated scanning tools and regularly updated databases like the NVD and CISA’s Known Exploited Vulnerability list.

These scans reveal whether any third-party components have reported flaws or misconfigurations - the equivalent of finding a recalled breaker or a leaking pipe. But a mature inspection doesn’t stop at detection; it evaluates context and exposure. A vulnerability in one product might not pose the same risk in another, depending on how it’s used or isolated.

By analyzing these findings through the lens of exploitability and impact, your team can distinguish between what needs urgent repair and what simply needs monitoring - ensuring the house passes not just today’s inspection, but tomorrow’s as well.

The Stress Test: Security Validation Testing (JSP2 Section E.3)

Once the cosmetic inspection is complete, it’s time for the real test - slam the doors, crank the system, and see if anything breaks. This is where penetration testing, robustness testing, and resiliency testing come in.

Penetration testing simulates an intruder’s attempt to bypass your locks - probing for weak points in authentication, data flows, and configurations. The best pen tests combine technical precision with creativity, chaining small issues into meaningful risks, much like testing how a door, window, and vent might together create an entry point.

Robustness testing takes a broader approach, running standardized test suites to ensure each subsystem can withstand a range of known attacks. Resiliency testing pushes the system past its limits - like simulating a storm - to confirm that even if something fails, the device recovers gracefully without compromising patient safety or data integrity.

When done correctly, these tests don’t just validate your defenses; they demonstrate how well the house holds up when the unexpected happens.

Who’s in the Room

Inspection day always draws a crowd - and for good reason. QA and Engineering are the first ones on site, running through their punch list to verify that every outlet works, every lock turns, and every item on the software bill of material (SBOM) is up to date. RA/QA follows close behind, clipboard in hand, documenting test results and making sure every security control can be traced back to its blueprint. Product Managers keep everyone on schedule, tracking open issues and confirming that nothing gets left unfinished before the sign-off. Clinicians and usability teams walk through the space too, making sure the added security features don’t make the “house” harder or less safe to live in. And then there are the independent inspectors - penetration testers and outside reviewers - the fresh set of eyes who double-check the craftsmanship and make sure the final build meets every code and safety requirement.

Why It Matters

Verification & Validation is where talk becomes proof. Regulators will expect to see traceability between requirements, controls, and tests - evidence that every identified risk was verified, validated, or justified. Hospitals and buyers will ask for the same proof when evaluating security posture.

If these records are missing or incomplete, it’s like failing your final inspection - you can’t move in until the issues are resolved, and every day of delay costs time, money, and trust.

Designed for Life

When the inspector signs off, you’re not just getting approval - you’re earning confidence.

Your device now has documented evidence that:

  • Every security control was verified and validated.
  • Known vulnerabilities were identified, triaged, and resolved.
  • Independent testing proved the system could withstand real-world attack scenarios.
  • Safety and usability remain intact under all tested conditions.

It’s not just a stamp of compliance - it’s proof of quality craftsmanship.

Securing Your Legacy

The Verification & Validation Phase is the inspection of your cybersecurity house. This is where you prove that every bolt, beam, and lock was installed to spec - that your security controls hold up under pressure, your vulnerabilities are managed, and your device is ready for safe occupancy.

When builders, testers, and inspectors all work together, the outcome isn’t just a product that passes FDA review - it’s one you’d trust your own family to live in.

Related articles

Why Pen Testing Isn’t Enough (Especially If You Want a Smooth FDA Review)
This is some text inside of a div block.

Why Pen Testing Isn’t Enough (Especially If You Want a Smooth FDA Review)

Penetration Testing
This is some text inside of a div block.
Nick Atwell
Nick Atwell

September 29, 2025

ICYMI: The Legacy Dilemma - Security, Responsibility & Regulation for Connected Medical Devices
This is some text inside of a div block.

ICYMI: The Legacy Dilemma - Security, Responsibility & Regulation for Connected Medical Devices

Webinars
This is some text inside of a div block.
Thought leadership
This is some text inside of a div block.
End-of-Life / End-of-Support
This is some text inside of a div block.
Medcrypt
Medcrypt

September 29, 2025

JSP Design & Development Phase - Building Security into the Frame
This is some text inside of a div block.

JSP Design & Development Phase - Building Security into the Frame

Joint Security Plan (JSP)
This is some text inside of a div block.
Healthcare Cybersecurity
This is some text inside of a div block.
Tools & processes
This is some text inside of a div block.
Stacey Martinez
Stacey Martinez

October 13, 2025

Subscribe to Medcrypt news

Get the latest healthcare cybersecurity news right in your inbox.

We'll never spam you or sell your information