What you need to know about traceable requirements for medical devices

A key piece of the technical documentation for a medical device is a requirement stack that covers the total product lifecycle (TPLC) of that device, including the requirements.

The two questions often come up, that we will answer in this blog, are:

  1. How extensive does the requirements stack need to be?  

  2. Where and how do I store the requirements?  

Organising the requirements stack

We must begin with outlining the essential content that should be included in the requirements stack and organise these requirements effectively. The organisation of these requirements is vital, as the stack isn’t just for the initial regulatory submission – whether to a UK Approved Body (UKAB), an EU Notified Body, the US FDA, or any other certification body. The requirements stack must also be maintained throughout the Total Product Life Cycle (TPLC). Therefore, establishing a system that ensures ongoing maintenance is efficient, effective, and as painless as possible is crucial.

Tiered requirements approach at Hardian Health

At Hardian Health, we categorise requirements into four tiers:

  • Tier 0: Provides a narrative of the Intended Use and the subsequent Regulatory Strategy.

  • Tier 1: Defines the Problem Space – the issues brought to the development team by the marketplace and the Product Manager or Product Owner.

  • Tier 2: Defines the Solution Space – instructions for developers to solve the problems outlined in Tier 1.

  • Tier 3: Defines the components or artefacts resulting from developing Tier 2, such as software executables, AI models, databases, hardware specifications, and documentation.


Understanding each tier

Tier 0 

These are not written in formal language but represented in an Intended Use Statement and a Regulatory Strategy Record that includes Risk Classification

Tier 1 

Also known as User Needs, Product Requirements, or System Requirements. Tier 1 requirements for software are detailed in sections 4.2 and 4.5 of the International Standard IEC 82304-1:2016 and BS EN 82304-1:2017 in British Standard guise.

4.2

The manufacturer shall determine and document:

  1. Requirements that address the intended use
  2. Interface requirements, including user interface requirements where applicable
  3. Requirements for immunity from or susceptibility to unintended influence by other software using the same hardware resources
  4. Privacy and security requirements addressing areas such as authorised use, person authentication, health data integrity and authenticity, and protection against malicious intent
  5. Requirements for accompanying documents including instructions for use
  6. Requirements derived from applicable regulation, including rules for protected information
  7. Requirements to support:
  • upgrades from previous versions, including maintaining data integrity, and compatibility with prior versions
  • rollback to the previous version after upgrade
  • timely security patches and updates
  • software distribution mechanism that ensures integrity of installation
  • decommissioning, irreversible deletion, transfer and/or retention of data
4.5

The manufacturer shall specify and document the system requirements for the health software product. These requirements shall include the functionality for intended use and, as applicable:

  1. Interoperability
  2. Localisation and language support
  3. Risk control measures that have to be implemented in the health software product at system level, based on the initial risk assessment
  4. User interface specification
  5. Requirements on the software and hardware platforms for the health software product to function as expected under expected load, and with required performance levels
  6. Features that allow for security compromises to be detected, recognised, logged, timed, and acted upon during normal use
  7. Features that protect essential functions, even when the software security has been compromised
  8. Methods for retention and recovery of product configuration by an authenticated privileged user

If we break this down further: 

We find the expected content of Tier 1 requirements for hardware in other standards such as the 60601-1 series.

  • Section 4.2.5 shows that accompanying documents (instructions for use for users such as patients and clinicians, instructions for IT staff working with the software, etc.) also need to be considered in Tier 1.

  • Section 4.2.7 emphasises that we must consider not only the initial release of software (and hardware) but also how we maintain and update these systems over time.

  • Section 4.2.6 highlights that we need to dive into regulations, such as:

    • The EU Medical Device Regulation (MDR) and In vitro Diagnostic Medical Device.

    • Regulation (IVDR) and/ or the UK Medical Device Regulation.

    • The EU Electronic Instructions for Use Regulation.

    • The EU AI Act.

    • The General Data Protection Regulation rules for protected information.

    • Equivalent US Federal Regulations for Medical Devices, and for information security, such as HIPAA (the Health Information Portability and Accountability Act).

    • Equivalent regulations for other target markets outside of the UK, EU and USA.

  • Section 4.5 tells us to consider not only software and hardware performance (4.5.5) but also cybersecurity measures (4.5.6-7).


For us, the term ‘User Needs’ is correctly placed in for Tier 1. We believe Tier 1 is more about a holistic view of all stakeholders’ requirements, rather than just the end users' needs.

Tier 2

Also known as Design Inputs, Tier 2 requirements for software are listed in sections 5.2.2 and 5.2.3 of IEC 62304:2006+A1:2015 and BS EN 62304:2006+A1:2015 in its British Standard guise. These requirements detail functional and capability aspects, software system inputs and outputs, interface requirements, security needs, and more.

5.2.2

As appropriate to the medical device software, the manufacturer shall include in the software requirements:

  1. functional and capability requirements
  2. software system inputs and outputs
  3. interfaces between the software systems and other systems
  4. software-driven alarms, warnings and operator messages
  5. security requirements
  6. user interface requirements implemented by software
  7. data definition and database requirements
  8. installation and acceptance requirements of the delivered medical device software at the operation and maintenance site or sites
  9. requirements related to methods of operation and maintenance
  10. requirements related to IT-network aspects
  11. user maintenance requirements
  12. regulatory requirements
5.2.3

The manufacturer shall include risk control measures implemented in software in the requirements as appropriate to the medical device software.

  • In section 5.2.2 we see how it neatly traces from 4.2.6 in 82304-1, as listed above; also 5.2.2.5 traces from 82304-1’s 4.5 – more on tracing later in this article.

  • In section 5.2.3 there is key point that ties formal risk analysis back to software (and hardware) requirements – all risk control measures are themselves Tier 2 requirements, that is features implemented to mitigate risks – be they mitigating safety, effectiveness or cybersecurity.

Tier 3

Also known as Design Outputs, these specifications detail the components, including hardware and software platforms (operating systems), on which the Tier 2 requirements are implemented. These are also the accompanying documents into which information is written.


Organising requirements by lifecycle phases and user groups 

At Hardian Health, we organise individual Tier 1 requirements logically by lifecycle phases and user groups. This approach allows us to derive Tier 2 and Tier 3 requirements logically as well. The lifecycle phases go through the TPLC from cradle (development) to grave (requirement and disposal) of the product.

Lifecycle Phase

Lifecycle Phase description

Lifetime & Labelling

General requirements for all phases for defining the lifetime of the system, and for the labelling (human-readable and machine-readable)

Development and Deployment

Development of code/ models/ documentation, pre-deployment; deployment to production environments

Manufacturing and Logistics

For a hardware device, manufacturing, storage and distribution process requirements

Installation and Configuration

Installation of server-side and client-side artefacts

Registration

Onboarding of users, including external systems that use APIs

Authentication

Login of users and of external systems

Input

Ingesting data into the system, for processing

Process

Processing of data to produce information/ therapy/ …

Output

Emission of reports/ alerts/ … including interoperability

Termination

Logout of users and of external systems

Support

Technical support functions including Data Protection Officer (DPO) but excluding Postmarket Surveillance (PMS)

Vigilance

Ongoing requirement for Postmarket Surveillance (PMS)/ Postmarket Clinical Follow-up or IVD Postmarket Performance Follow-up (PMPF) including patient safety and cybersecurity

Update/ Rollback

Pushed or pulled software updates on to cloud and/ or on-premise instances; rollback to previously-deployed versions

Revocation

Offboarding of users (revocation of access)

Retirement

Retirement of system at end of life, including dispositioning of stored data

Disposal

For a hardware device, safe disposal of used and unused items and of stock at the life

Regulatory Attributes

This is a dummy phase, used to collect general system attributes (non-functional requirements) regarding regulatory requirements (UK + EU MDR/ IVDR Essential Requirements/ General Safety and Performance Requirements, UK & EU GDPR, UK & EU eIFUR, US FDA Special Controls, ...)

Market Attributes

This is a dummy phase, used to collect general system attributes (non-functional requirements) regarding customer-specific requirements for entry into markets (e.g. NHS DTAC/ DSPT/ … in the UK)

Security Attributes

This is a dummy phase, used to collect general system attributes (non-functional requirements) regarding cybersecurity for all markets

The user groups, as mentioned above, cover not only the end users (primary and secondary), but also supporting functions including those relating to quality assurance and regulatory compliance. We individually identify requirements with unique prefixes so that we can search our documentation for them.

User Group

User Group description

Primary user

End users that input data to the system

Secondary User

End users that consume information generated by the system

End user (pri. or sec.)

Primary and secondary users

Administrator

Those who register/ deregister users from the system (tertiary user)

PMS

Those who perform postmarket surveillance/ vigilance (tertiary user)

Data Protection Officer

Those who fulfil the role of Data Protection Officer (tertiary user)

ICT

Information & Communication Technology (ICT) Support, either manufacturer's or customer sites

System

The system itself e.g. AI algorithms that process data

External

External systems that need to interface/ interoperate via Application Programming Interface (API)

Developer

Internal or external developer or system integrator

Manufacturer

Responsibilities of the legal manufacturer of the system

Vigilance

Ongoing requirement for Postmarket Surveillance (PMS)/ Postmarket Clinical Follow-up or IVD Postmarket Performance Follow-up (PMPF) including patient safety and cybersecurity

OEM

Original Equipment Manufacturer - for outsourced or virtual manufacturing


Tier 1 requirements

We think of three types of Tier 1 requirements, namely functional and nonfunctional requirements, and risk mitigations.

  • Functional requirements or use cases – identified as “-UCxxx”

    • These are what define the behaviour of the system that end users interact with

    • We tend to write the use cases in user need language e.g. “as a user I need to log in to the system” or “as a system I need to process a chest x-ray image”

  • Nonfunctional requirements or system attributes – identified as “-SAxxx”

    • These define the attributes that end users do not necessarily consider directly but would be concerned with if not working correctly. Examples include:

      • Overall System Effectiveness (OSE) – This encompasses the availability, resilience, performance (analysis throughput, or roundtrip time limits), and quality (accuracy, precision, etc.) of analyses performed in software. The OSE requirements align with the clinical performance claims for a device, generally taken from literature reviews or other demonstrations of scientific validity. These claims are crucial for ensuring the device is superior (or at least non-inferior) to the current state of the art in its target market.

      • Security – Ensuring the protection of sensitive data and system integrity.

      • Interoperability with other systems The ability of the device to work seamlessly with other systems.

    • We write these system attributes in imperative language, such as “The image analysis will take a maximum of 1.0 seconds until a report is presented on-screen.”

  • Risk mitigations – identified as “-RMxxx”

    • These relate to the aforementioned IEC 82304-1 section 4.5.3 “Risk control measures that have to be implemented in the health software product at the system level, based on the initial risk assessment.” Risk mitigations can arise from two primary sources:

      • Foreseeable Misuse Analysis – Typically documented in the Use Specification, the very first technical document for any product.

      • Characteristics Related to Safety Overview – Detailed in the product’s Risk Management Plan (RMP) as a list of triggers, which are then used to develop a comprehensive Device Hazard Analysis (DHA).

Tier 2 Requirements

Also known as Design Inputs, Tier 2 requirements are derived from Tier 1 requirements and further specify the system’s design. These are written as imperatives and identified as:

  • SRxxx for System or Software Requirements

  • HRxxx for Hardware Requirements

Every Tier 2 requirement should trace up to one or more Tier 1 requirements, and conversely, every Tier 1 requirement should trace down to one or more Tier 2 requirements. This strict traceability helps identify gaps, such as Tier 1 requirements that lack corresponding Tier 2 solutions, or Tier 2 requirements that do not address a Tier 1 problem.

For example, consider the requirement for logging into a system:

  • Tier 1: “As an end user, I need to log in securely” – this considers factors such as accessibility and environmental conditions (e.g., whether users can utilise keyboards, fingerprint sensors, facial recognition, or passcards due to physical or environmental factors).

  • Tier 2: Authorisation - Is it achieved via username & password, biometrics, or a passcard?

  • Tier 3: This includes end-user instructions, administrator processes for granting/revoking access, etc. The implementation would then involve:

    • Client hardware specification to allow biometrics (Fingerprint? Face?) and/or passcard reader.

    • Client hardware specification to read a passcard (Magnetic? NFC/RFID?).

    • Keyboard only?

    • Authentication: How is secure authentication achieved?

    • Instructions to Users: Where are these instructions documented?

Rule of thumb for writing requirements

Expect to write at least 100 Tier 1 requirements for a small to medium system.

  • As each Tier 1 requirement is decomposed into three or more Tier 2 requirements (client, server, documentation), you should expect at least 300 Tier 2 requirements.

  • All Risk Control Measures (RCMs) identified in the Device Hazard Analysis are treated as Tier 2 requirements. The analysis of existing Tier 2 requirements may lead to some being classified as RCMs or may result in the definition of additional RCMs.

Verification, validation, and traceability

Verification ensures that each Tier 2 requirement has been correctly implemented in the corresponding Tier 3 components and artefacts.

  • Validation confirms that Tier 1 requirements satisfy user or market needs, aligning with the intended use as specified in the Use Specification.

  • Traceability can be represented in the V-model, which maps out the relationships between Tiers 3, 2, 1, and even Tier 0, and links these to verification and validation testing. The V-model gets its name from the V-shape formed by the arrows representing the flow from requirements to testing.

SaMD tiered requirements

Containers and tools for managing requirements

The organisation of all the above requires digital tools:

  • A dedicated Requirements Management System (RMS) is ideal, but it can be relatively expensive for a startup or scaleup to subscribe to

  • A dedicated eQMS such as Greenlight Guru’s Design Matrix that offers features for requirements capture and tracing though these systems can also be relatively expensive to subscribe to, and have particular workflows that can be quite rigid, which must be weighed against whether the users (product owner, software developers, …) can use them effectively

  • An Issue Management System (IMS), such as Atlassian Jira can be configured to contain the requirements (the left side of the V) and the test protocols and results (the right side) but requires configuration of multiple paid add-ons to be able to expose and use the trace effectively

To overcome the above – at least to begin with for the first certifications of an agile startup looking to reduce costs – you can simply use a spreadsheet solution that runs in Microsoft Excel and Google Sheets.  

Our solution at Hardian contains the requirements that our experience suggests should be established. We can handle (and teach you to handle) the tracing that must be submitted for a medical device certification and part of the change impact analysis that are key features of a dedicated RMS.

Hardian Health is a clinical digital consultancy focused on leveraging technology into healthcare markets through clinical strategy, scientific validation, regulation, health economics, and intellectual property.

Mike Pogose

By Mike Pogose, Director of Quality Assurance & Regulatory Affairs

Previous
Previous

Are LLM-based ambient scribes and clinical summarisers medical devices?

Next
Next

MVP and MMP: a winning strategy for medical device development