Intended Use
The AIM System enables a user to make electrophysiological measurements
intraoperatively and in a clinical setting using Advanced Bionics cochlear implants.
Guidelines for IT Security
The AIM System is intended to operate without connection to a network. Sites are
expected to configure appropriate network protections, including malware detection
and response, if they attach the AIM System to their WiFi network.
The AIM System is WiFi enabled to allow automatic updates, access network
storage and connectivity convenience. The AIM system is capable of reading
and writing patient files to a network drive. It is recommended that the following
guidelines be followed for the AIM System in order to help ensure the security and
integrity of recipient data:
•
Place in a physically secure location (e.g., a locked room)
•
Ensure that all logins require a user-specific password with an appropriately strong pass-
word policy.
•
Eliminate all guest accounts and define separate roles for administrator(s), researcher(s),
and primary user(s) as appropriate.
•
Enable automatic Windows and anti-malware/virus scanner updates
•
If Remote Desktop connections are allowed, only allow access with Network Level Authen-
tication.
•
Review the list of services provided by the tablet to ensure the list of services is consistent
with local policy.
•
Ensure that the AIM System only connects to an encrypted wireless network, preferably
one using WPA2 or WPA3.
•
If connecting to a wireless network, only connect to a secure enterprise-managed closed
network that is hardened against cybersecurity intrusions.
The AIM System supports:
Authentication
Authentication Protocols
Encryption
Wi-Fi Direct™ Encryption and
Authentication
MS-CHAP is a registered trademark of Microsoft
Wi-Fi Direct is a registered trademark of Wi-Fi Alliance
Additional IT Security guidelines and advisements include the following:
•
It is recommended that users enable BitLocker to encrypt the AIM System hard drive.
•
It is recommended to harden the AIM System against cybersecurity intrusion, e.g., whitelis-
ting, anti-malware software, firewalls, security logging, physical access control.
•
The BIOS is password protected. Please change the password when first accessing the
system.
4
WPA and WPA2, 802.1X (EAP-TLS, TTLS, PEAP,
LEAP, EAP-FAST), EAP-SIM, EAP-AKA
PAP, CHAP, TLS, GTC, MS-CHAP™, MS-CHAPv2
64-bit and 128-bit WEP, AES-CCMP, TKIP
WPA2, AES-CCMP