Scenario: Community Hospital has 4,200 medical IoT devices: 1,800 patient monitors, 900 infusion pumps, 300 ventilators, 600 imaging equipment, 400 building systems, 200 laboratory analyzers. Current security: perimeter firewall + VPN for remote access. After ransomware attack at neighboring facility, board mandates zero trust within 12 months.
Phase 1: Identity Establishment (Months 1-3)
| Modern monitors (TPM) |
1,200 |
TPM-backed X.509 |
Automated via MDM |
$0 (built-in) |
| Legacy monitors (no TPM) |
600 |
Software X.509 + gateway proxy |
Manual cert install |
$3/device (gateway amortized) |
| Infusion pumps |
900 |
Secure element retrofit |
Technician visit per device |
$25/device (hardware + labor) |
| Ventilators |
300 |
TPM-backed X.509 |
Vendor remote provisioning |
$0 (vendor service) |
| Imaging (MRI, CT, X-ray) |
600 |
Gateway proxy (cannot modify) |
Gateway appliance (10 devices/gateway) |
$200/gateway (60 gateways) |
| Building/Lab equipment |
600 |
Pre-shared keys (Zigbee/BACnet) |
Gateway with PSK translation |
$15/device (gateway amortized) |
Device Identity Hardware Cost: $45,300 (legacy monitors $1.8K + pumps $22.5K + imaging gateways $12K + building/lab $9K). Total Identity Cost including PKI infrastructure, certificate authority, MDM licensing, and deployment labor: $156,000.
Phase 2: Network Micro-Segmentation (Months 2-5)
Create 18 clinical micro-segments + 6 facility segments:
- Clinical VLANs 100-117: By department (ICU, ER, Med-Surg floors, OR) and device type
- Facility VLANs 200-205: Building automation, security cameras, access control
Each clinical VLAN has strict policies: devices can ONLY access designated clinical servers (EHR, PACS, lab systems). NO inter-device communication. NO internet access.
Segmentation Result: Average device can now reach 12 destinations (specific servers) vs 4,200 destinations (entire network) before.
Phase 3: Continuous Verification (Months 4-9)
Deploy behavioral monitoring for all 4,200 devices:
Example: Infusion Pump Baseline
Device: Pump-ICU-042
Normal Behavior:
- Connections: EHR API (10.50.30.10:443) every 5 minutes
- Traffic: 2-5 KB per connection (medication orders, vitals)
- Protocols: HTTPS only
- Active: 24/7 (patient care)
Anomaly Detected (Month 6):
- Unusual connection: Pump-ICU-042 → 203.0.113.50:8080 (external IP)
- Volume: 250 MB outbound (~125,000x normal 2 KB baseline)
- Protocol: HTTP (never used before)
- Zero Trust Response:
1. Gateway blocks connection (external IP not in allowlist)
2. Device quarantined (network access revoked)
3. Clinical engineering alerted (patient safety protocol)
4. Device replaced with backup pump (patient unaffected)
5. Forensics: Vendor remote support trojan
6. Resolution: Vendor access revoked, security audit
Phase 4: Policy Automation (Months 7-12)
Implement automated response for common threats:
| Unauthorized external connection |
Behavioral + firewall |
Block + quarantine (3 seconds) |
SOC override if false positive |
| Firmware integrity failure |
TPM attestation |
Block clinical use + alert biomed |
Manual attestation bypass for emergencies |
| Credential compromise |
Failed auth attempts (3x) |
Lock device + alert security |
Physical key override at nurse station |
| Unusual data volume |
Behavioral baseline (3σ) |
Rate limit + alert |
SOC can approve if legitimate |
| Cross-segment lateral movement |
Firewall + behavioral |
Block + investigate |
None (always block) |
Final Architecture:
- Identity: 100% devices have cryptographic identity (TPM, secure element, or gateway proxy)
- Segmentation: 24 micro-segments, average 175 devices per segment, default-deny policies
- Verification: Real-time behavioral monitoring, 4.2-second mean time to detect anomaly
- Automation: 94% of threats blocked automatically, 6% escalated to SOC
Results After 12 Months:
- Malware infections: 0 (prevented 7 attempts)
- Lateral movement incidents: 0 (blocked 23 attempts)
- Patient safety incidents due to security: 0
- HIPAA audit findings: 0 (full compliance)
- Mean time to detect: 4.2 seconds (vs industry avg 197 days)
- Total investment: $1.2M (identity $156K, segmentation $480K, monitoring $350K, automation $214K)
- ROI: 18 months (prevented one ransomware attack like neighbor facility, estimated $8M cost)