{"id":235193,"date":"2023-03-08T05:32:06","date_gmt":"2023-03-07T20:32:06","guid":{"rendered":"https:\/\/kikakumaster.com\/iso\/iec-81001-5-1\/"},"modified":"2023-03-08T05:32:06","modified_gmt":"2023-03-07T20:32:06","slug":"iec-81001-5-1","status":"publish","type":"iso","link":"https:\/\/kikakumaster.com\/ja\/iso\/iec-81001-5-1\/","title":{"rendered":"IEC 81001-5-1 &#8211; Health software and health IT systems safety, effectiveness and security \u2014 Part 5-1: Security \u2014 Activities in the product life cycle"},"content":{"rendered":"<p>This document defines the LIFE CYCLE requirements for development and maintenance of HEALTH SOFTWARE needed to support conformance to IEC 62443-4-1 \u2013 taking the specific needs for HEALTH SOFTWARE into account. The set of PROCESSES, ACTIVITIES, and TASKS described in this document establishes a common framework for secure HEALTH SOFTWARE LIFE CYCLE PROCESSES._x000D_<br \/>\nThe purpose is to increase the CYBERSECURITY of HEALTH SOFTWARE by establishing certain ACTIVITIES and TASKS in the HEALTH SOFTWARE LIFE CYCLE PROCESSES and also by increasing the SECURITY of SOFTWARE LIFE CYCLE PROCESSES themselves._x000D_<br \/>\nIt is important to maintain an appropriate balance of the key properties SAFETY, effectiveness and SECURITY as discussed in ISO 81001-1._x000D_<br \/>\nThis document excludes specification of ACCOMPANYING DOCUMENTATION contents.<\/p><div id=\"kikak-2339178394\" class=\"kikak- kikak-entity-placement\"><p><a href=\"https:\/\/click.linksynergy.com\/fs-bin\/click?id=tuVq3VflqQM&amp;offerid=208750.10000028&amp;subid=0&amp;type=4\"><img class=\"lazyload\" decoding=\"async\" src=\"data:image\/gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw==\" data-orig-src=\"https:\/\/ad.linksynergy.com\/fs-bin\/show?id=tuVq3VflqQM&amp;bids=208750.10000028&amp;subid=0&amp;type=4&amp;gridnum=16\" alt=\"American National Standards Institute Inc.\" border=\"0\" \/><\/a><\/p>\n<\/div>\n<p><a href=\"https:\/\/www.iso.org\/standard\/76097.html\">Go to IEC 81001-5-1 at ISO.org<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>IEC 81001-5-1 &#8211; Health software and health IT systems safety, effectiveness and security \u2014 Part 5-1: Security \u2014 Activities in the product life cycle &#8211; This document defines the LIFE CYCLE requirements for development and maintenance of HEALTH SOFTWARE needed to support conformance to IEC 62443-4-1 \u2013 taking the specific needs for HEALTH SOFTWARE into account. The set of PROCESSES, ACTIVITIES, and TASKS described in this document establishes a common framework for secure HEALTH SOFTWARE LIFE CYCLE PROCESSES._x000D_<br \/>\nThe purpose is to increase the CYBERSECURITY of HEALTH SOFTWARE by establishing certain ACTIVITIES and TASKS in the HEALTH SOFTWARE LIFE CYCLE PROCESSES and also by increasing the SECURITY of SOFTWARE LIFE CYCLE PROCESSES themselves._x000D_<br \/>\nIt is important to maintain an appropriate balance of the key properties SAFETY, effectiveness and SECURITY as discussed in ISO 81001-1._x000D_<br \/>\nThis document excludes specification of ACCOMPANYING DOCUMENTATION contents.<\/p>\n","protected":false},"featured_media":0,"comment_status":"open","ping_status":"open","template":"","categories":[170,1],"tags":[],"sdo":[165],"topic":[],"fsc":[],"ics":[],"class_list":["post-235193","iso","type-iso","status-publish","hentry","category-iso","category-standards","sdo-iso"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>IEC 81001-5-1 - Health software and health IT systems safety, effectiveness and security \u2014 Part 5-1: Security \u2014 Activities in the product life cycle - \u898f\u683c\u30de\u30b9\u30bf\u30fc<\/title>\n<meta name=\"description\" content=\"Health software and health IT systems safety, effectiveness and security \u2014 Part 5-1: Security \u2014 Activities in the product life cycle - This document defines the LIFE CYCLE requirements for development and maintenance of HEALTH SOFTWARE needed to support conformance to IEC 62443-4-1 \u2013 taking the specific needs for HEALTH SOFTWARE into account. The set of PROCESSES, ACTIVITIES, and TASKS described in this document establishes a common framework for secure HEALTH SOFTWARE LIFE CYCLE PROCESSES._x000D_ The purpose is to increase the CYBERSECURITY of HEALTH SOFTWARE by establishing certain ACTIVITIES and TASKS in the HEALTH SOFTWARE LIFE CYCLE PROCESSES and also by increasing the SECURITY of SOFTWARE LIFE CYCLE PROCESSES themselves._x000D_ It is important to maintain an appropriate balance of the key properties SAFETY, effectiveness and SECURITY as discussed in ISO 81001-1._x000D_ This document excludes specification of ACCOMPANYING DOCUMENTATION contents.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kikakumaster.com\/ja\/iso\/iec-81001-5-1\/\" \/>\n<meta property=\"og:locale\" content=\"ja_JP\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IEC 81001-5-1 - Health software and health IT systems safety, effectiveness and security \u2014 Part 5-1: Security \u2014 Activities in the product life cycle - \u898f\u683c\u30de\u30b9\u30bf\u30fc\" \/>\n<meta property=\"og:description\" content=\"Health software and health IT systems safety, effectiveness and security \u2014 Part 5-1: Security \u2014 Activities in the product life cycle - This document defines the LIFE CYCLE requirements for development and maintenance of HEALTH SOFTWARE needed to support conformance to IEC 62443-4-1 \u2013 taking the specific needs for HEALTH SOFTWARE into account. The set of PROCESSES, ACTIVITIES, and TASKS described in this document establishes a common framework for secure HEALTH SOFTWARE LIFE CYCLE PROCESSES._x000D_ The purpose is to increase the CYBERSECURITY of HEALTH SOFTWARE by establishing certain ACTIVITIES and TASKS in the HEALTH SOFTWARE LIFE CYCLE PROCESSES and also by increasing the SECURITY of SOFTWARE LIFE CYCLE PROCESSES themselves._x000D_ It is important to maintain an appropriate balance of the key properties SAFETY, effectiveness and SECURITY as discussed in ISO 81001-1._x000D_ This document excludes specification of ACCOMPANYING DOCUMENTATION contents.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kikakumaster.com\/ja\/iso\/iec-81001-5-1\/\" \/>\n<meta property=\"og:site_name\" content=\"\u898f\u683c\u30de\u30b9\u30bf\u30fc\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593\" \/>\n\t<meta name=\"twitter:data1\" content=\"1\u5206\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kikakumaster.com\/ja\/iso\/iec-81001-5-1\/\",\"url\":\"https:\/\/kikakumaster.com\/ja\/iso\/iec-81001-5-1\/\",\"name\":\"IEC 81001-5-1 - Health software and health IT systems safety, effectiveness and security \u2014 Part 5-1: Security \u2014 Activities in the product life cycle - \u898f\u683c\u30de\u30b9\u30bf\u30fc\",\"isPartOf\":{\"@id\":\"https:\/\/kikakumaster.com\/ja\/#website\"},\"datePublished\":\"2023-03-07T20:32:06+00:00\",\"description\":\"Health software and health IT systems safety, effectiveness and security \u2014 Part 5-1: Security \u2014 Activities in the product life cycle - This document defines the LIFE CYCLE requirements for development and maintenance of HEALTH SOFTWARE needed to support conformance to IEC 62443-4-1 \u2013 taking the specific needs for HEALTH SOFTWARE into account. The set of PROCESSES, ACTIVITIES, and TASKS described in this document establishes a common framework for secure HEALTH SOFTWARE LIFE CYCLE PROCESSES._x000D_ The purpose is to increase the CYBERSECURITY of HEALTH SOFTWARE by establishing certain ACTIVITIES and TASKS in the HEALTH SOFTWARE LIFE CYCLE PROCESSES and also by increasing the SECURITY of SOFTWARE LIFE CYCLE PROCESSES themselves._x000D_ It is important to maintain an appropriate balance of the key properties SAFETY, effectiveness and SECURITY as discussed in ISO 81001-1._x000D_ This document excludes specification of ACCOMPANYING DOCUMENTATION contents.\",\"breadcrumb\":{\"@id\":\"https:\/\/kikakumaster.com\/ja\/iso\/iec-81001-5-1\/#breadcrumb\"},\"inLanguage\":\"ja\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kikakumaster.com\/ja\/iso\/iec-81001-5-1\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/kikakumaster.com\/ja\/iso\/iec-81001-5-1\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/kikakumaster.com\/ja\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IEC 81001-5-1 &#8211; Health software and health IT systems safety, effectiveness and security \u2014 Part 5-1: Security \u2014 Activities in the product life cycle\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kikakumaster.com\/ja\/#website\",\"url\":\"https:\/\/kikakumaster.com\/ja\/\",\"name\":\"\u898f\u683c\u30de\u30b9\u30bf\u30fc\",\"description\":\"Share your technical standard knowledge.\",\"publisher\":{\"@id\":\"https:\/\/kikakumaster.com\/ja\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kikakumaster.com\/ja\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ja\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kikakumaster.com\/ja\/#organization\",\"name\":\"\u898f\u683c\u30de\u30b9\u30bf\u30fc\",\"url\":\"https:\/\/kikakumaster.com\/ja\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ja\",\"@id\":\"https:\/\/kikakumaster.com\/ja\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/i0.wp.com\/kikakumaster.com\/wp-content\/uploads\/2022\/09\/cropped-logo-fabicon-square-270X270.png?fit=512%2C512&ssl=1\",\"contentUrl\":\"https:\/\/i0.wp.com\/kikakumaster.com\/wp-content\/uploads\/2022\/09\/cropped-logo-fabicon-square-270X270.png?fit=512%2C512&ssl=1\",\"width\":512,\"height\":512,\"caption\":\"\u898f\u683c\u30de\u30b9\u30bf\u30fc\"},\"image\":{\"@id\":\"https:\/\/kikakumaster.com\/ja\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IEC 81001-5-1 - Health software and health IT systems safety, effectiveness and security \u2014 Part 5-1: Security \u2014 Activities in the product life cycle - \u898f\u683c\u30de\u30b9\u30bf\u30fc","description":"Health software and health IT systems safety, effectiveness and security \u2014 Part 5-1: Security \u2014 Activities in the product life cycle - This document defines the LIFE CYCLE requirements for development and maintenance of HEALTH SOFTWARE needed to support conformance to IEC 62443-4-1 \u2013 taking the specific needs for HEALTH SOFTWARE into account. The set of PROCESSES, ACTIVITIES, and TASKS described in this document establishes a common framework for secure HEALTH SOFTWARE LIFE CYCLE PROCESSES._x000D_ The purpose is to increase the CYBERSECURITY of HEALTH SOFTWARE by establishing certain ACTIVITIES and TASKS in the HEALTH SOFTWARE LIFE CYCLE PROCESSES and also by increasing the SECURITY of SOFTWARE LIFE CYCLE PROCESSES themselves._x000D_ It is important to maintain an appropriate balance of the key properties SAFETY, effectiveness and SECURITY as discussed in ISO 81001-1._x000D_ This document excludes specification of ACCOMPANYING DOCUMENTATION contents.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kikakumaster.com\/ja\/iso\/iec-81001-5-1\/","og_locale":"ja_JP","og_type":"article","og_title":"IEC 81001-5-1 - Health software and health IT systems safety, effectiveness and security \u2014 Part 5-1: Security \u2014 Activities in the product life cycle - \u898f\u683c\u30de\u30b9\u30bf\u30fc","og_description":"Health software and health IT systems safety, effectiveness and security \u2014 Part 5-1: Security \u2014 Activities in the product life cycle - This document defines the LIFE CYCLE requirements for development and maintenance of HEALTH SOFTWARE needed to support conformance to IEC 62443-4-1 \u2013 taking the specific needs for HEALTH SOFTWARE into account. The set of PROCESSES, ACTIVITIES, and TASKS described in this document establishes a common framework for secure HEALTH SOFTWARE LIFE CYCLE PROCESSES._x000D_ The purpose is to increase the CYBERSECURITY of HEALTH SOFTWARE by establishing certain ACTIVITIES and TASKS in the HEALTH SOFTWARE LIFE CYCLE PROCESSES and also by increasing the SECURITY of SOFTWARE LIFE CYCLE PROCESSES themselves._x000D_ It is important to maintain an appropriate balance of the key properties SAFETY, effectiveness and SECURITY as discussed in ISO 81001-1._x000D_ This document excludes specification of ACCOMPANYING DOCUMENTATION contents.","og_url":"https:\/\/kikakumaster.com\/ja\/iso\/iec-81001-5-1\/","og_site_name":"\u898f\u683c\u30de\u30b9\u30bf\u30fc","twitter_card":"summary_large_image","twitter_misc":{"\u63a8\u5b9a\u8aad\u307f\u53d6\u308a\u6642\u9593":"1\u5206"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/kikakumaster.com\/ja\/iso\/iec-81001-5-1\/","url":"https:\/\/kikakumaster.com\/ja\/iso\/iec-81001-5-1\/","name":"IEC 81001-5-1 - Health software and health IT systems safety, effectiveness and security \u2014 Part 5-1: Security \u2014 Activities in the product life cycle - \u898f\u683c\u30de\u30b9\u30bf\u30fc","isPartOf":{"@id":"https:\/\/kikakumaster.com\/ja\/#website"},"datePublished":"2023-03-07T20:32:06+00:00","description":"Health software and health IT systems safety, effectiveness and security \u2014 Part 5-1: Security \u2014 Activities in the product life cycle - This document defines the LIFE CYCLE requirements for development and maintenance of HEALTH SOFTWARE needed to support conformance to IEC 62443-4-1 \u2013 taking the specific needs for HEALTH SOFTWARE into account. The set of PROCESSES, ACTIVITIES, and TASKS described in this document establishes a common framework for secure HEALTH SOFTWARE LIFE CYCLE PROCESSES._x000D_ The purpose is to increase the CYBERSECURITY of HEALTH SOFTWARE by establishing certain ACTIVITIES and TASKS in the HEALTH SOFTWARE LIFE CYCLE PROCESSES and also by increasing the SECURITY of SOFTWARE LIFE CYCLE PROCESSES themselves._x000D_ It is important to maintain an appropriate balance of the key properties SAFETY, effectiveness and SECURITY as discussed in ISO 81001-1._x000D_ This document excludes specification of ACCOMPANYING DOCUMENTATION contents.","breadcrumb":{"@id":"https:\/\/kikakumaster.com\/ja\/iso\/iec-81001-5-1\/#breadcrumb"},"inLanguage":"ja","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kikakumaster.com\/ja\/iso\/iec-81001-5-1\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/kikakumaster.com\/ja\/iso\/iec-81001-5-1\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/kikakumaster.com\/ja\/"},{"@type":"ListItem","position":2,"name":"IEC 81001-5-1 &#8211; Health software and health IT systems safety, effectiveness and security \u2014 Part 5-1: Security \u2014 Activities in the product life cycle"}]},{"@type":"WebSite","@id":"https:\/\/kikakumaster.com\/ja\/#website","url":"https:\/\/kikakumaster.com\/ja\/","name":"\u898f\u683c\u30de\u30b9\u30bf\u30fc","description":"Share your technical standard knowledge.","publisher":{"@id":"https:\/\/kikakumaster.com\/ja\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kikakumaster.com\/ja\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ja"},{"@type":"Organization","@id":"https:\/\/kikakumaster.com\/ja\/#organization","name":"\u898f\u683c\u30de\u30b9\u30bf\u30fc","url":"https:\/\/kikakumaster.com\/ja\/","logo":{"@type":"ImageObject","inLanguage":"ja","@id":"https:\/\/kikakumaster.com\/ja\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/kikakumaster.com\/wp-content\/uploads\/2022\/09\/cropped-logo-fabicon-square-270X270.png?fit=512%2C512&ssl=1","contentUrl":"https:\/\/i0.wp.com\/kikakumaster.com\/wp-content\/uploads\/2022\/09\/cropped-logo-fabicon-square-270X270.png?fit=512%2C512&ssl=1","width":512,"height":512,"caption":"\u898f\u683c\u30de\u30b9\u30bf\u30fc"},"image":{"@id":"https:\/\/kikakumaster.com\/ja\/#\/schema\/logo\/image\/"}}]}},"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/kikakumaster.com\/ja\/wp-json\/wp\/v2\/iso\/235193","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kikakumaster.com\/ja\/wp-json\/wp\/v2\/iso"}],"about":[{"href":"https:\/\/kikakumaster.com\/ja\/wp-json\/wp\/v2\/types\/iso"}],"replies":[{"embeddable":true,"href":"https:\/\/kikakumaster.com\/ja\/wp-json\/wp\/v2\/comments?post=235193"}],"wp:attachment":[{"href":"https:\/\/kikakumaster.com\/ja\/wp-json\/wp\/v2\/media?parent=235193"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kikakumaster.com\/ja\/wp-json\/wp\/v2\/categories?post=235193"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kikakumaster.com\/ja\/wp-json\/wp\/v2\/tags?post=235193"},{"taxonomy":"sdo","embeddable":true,"href":"https:\/\/kikakumaster.com\/ja\/wp-json\/wp\/v2\/sdo?post=235193"},{"taxonomy":"topic","embeddable":true,"href":"https:\/\/kikakumaster.com\/ja\/wp-json\/wp\/v2\/topic?post=235193"},{"taxonomy":"fsc","embeddable":true,"href":"https:\/\/kikakumaster.com\/ja\/wp-json\/wp\/v2\/fsc?post=235193"},{"taxonomy":"ics","embeddable":true,"href":"https:\/\/kikakumaster.com\/ja\/wp-json\/wp\/v2\/ics?post=235193"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}