March 4, 2026

For medical device manufacturers, 2025 was a watershed year. The FDA’s transition from guidance-driven "recommendations" to enforceable statutory mandate under Section 524B of the Food, Drug and Cosmetics (FD&C) Act has fundamentally changed the premarket submission hurdle.
As we move into 2026, the "honeymoon phase" of the FDA cybersecurity guidance is over. Recent data reveals a clear pattern in why submissions are hitting regulatory roadblocks. If you are a Product Security Officer or a Regulatory Affairs Lead, your focus shouldn't just be on completing the documentation, but on the sufficiency of the evidence.
Reviewing and analyzing actual FDA deficiencies, here the top trends we are seeing, and how to stay ahead of them.
The most significant trend in recent deficiencies is insufficient penetration testing. The FDA is no longer satisfied with the mere presence of a report. Instead, we see increasing scrutiny of the findings in a report, including assessing disposition and resolution of findings.
The Deficiency: Submissions are being flagged for having "unresolved findings"—even those labeled as "Low" or "Medium" risk—without a documented mitigation, acceptance criteria, or "by-design" justification.
The Fix: * Sufficiency is Key: Your penetration test must be performed on the final, production-equivalent version of the device. It should cover all system elements, not just the regulated ones.
We’ve moved past the "What is an SBOM?" phase into the "Is your SBOM actually useful?" phase.
The Deficiency: Incomplete Software Bills of Materials that miss baseline elements like End of Support (EOS) dates. More critically, the FDA is now cross-referencing SBOMs against public vulnerability databases (NVD/GitHub Advisories). If a reviewer finds a known CVE (Common Vulnerabilities and Exposures) applicable to a component in your SBOM that you haven't disclosed or addressed in your risk assessment, it raises concerns.
The Fix:
Many manufacturers are still treating Appendix 1 of the Premarket Guidance as a suggestion. In 2026, the FDA is treating it as a mandatory checklist.
The Deficiency: Missing one or more core controls—such as Event Detection and Logging, or Cryptographic Implementation—without a robust technical justification.
The Fix:
Security is now a core component of the "Instructions for Use" (IFU).
The Deficiency: Labeling that fails to provide the end-user (usually a hospital IT admin, clinical engineer, or a clinician) with the information needed to securely configure and operate the device.
The Fix:
In 2026, the FDA is looking for a Secure Product Development Framework (SPDF) that is "built-in," not "bolted-on." They want to see a cohesive story where your Threat Model identifies a risk, your Security Architecture mitigates it, and your Testing proves the mitigation works.

February 27, 2026


December 16, 2025


December 10, 2025
Get the latest healthcare cybersecurity news right in your inbox.
We'll never spam you or sell your information