Anti-tampering of hard coded secrets/keys/ data within medical device software

Explanation: Employ appropriate software/ hardware protections against malicious observation/modification of medical device secrets by the device possessor.

Vulnerabilities addressed: Addresses unauthorized access or deliberate modification of application generated and/or managed data by a malicious device owner.

Developer resources required: Requires access to appropriate software/hardware packages and expertise to apply them correctly.

Evaluator resources required: Requires manual review of application of the selected mechanisms; potentially requires red-team testing to evaluate overall effectiveness.