
ISO 13485 + ISO 27001: The Two Certifications That Define Serious Medical Device Software in 2026
Most medical device manufacturers know they need ISO 13485. Fewer treat ISO 27001 as equally non-negotiable. In 2026, that gap is becoming a liability — both technically and commercially.
What Each Standard Actually Covers
The distinction is precise. ISO 13485 is about product quality and patient safety — it governs supplier traceability, design validation, and defect management. ISO 27001, on the other hand, is centered on establishing an Information Security Management System to protect sensitive data.
A practical example makes this concrete: take a cloud-connected glucose monitor. ISO 13485 governs the device's quality — design validation, CAPA logs, supplier qualification. ISO 27001 governs the data the device collects, ensuring patient health information is protected against cyber risks. One standard without the other leaves a structural hole either in product integrity or data security.
Why 2026 Changed the Equation
Two regulatory shifts have made this combination a hard requirement rather than a best practice.
First, on the FDA side: the new Quality Management System Regulation, effective February 2026, structurally integrates cybersecurity into the quality management system. Cybersecurity is no longer a standalone technical consideration — it is embedded into design controls, risk management, and post-market surveillance. In short, cybersecurity risk management now maps directly to your QMS, meaning threat models, vulnerability assessments, and security controls must integrate with existing design control and risk management procedures.
Second, in the EU: regulators now explicitly reference ISO/IEC 27001 alongside ISO 13485 as the framework for cybersecurity management across the medical device lifecycle, requiring lifecycle risk identification and mitigation to address cybersecurity threats throughout the product.
The Integration Problem Most Teams Get Wrong
Having both certifications is not the same as having them integrated. The most effective approach is a cross-functional framework where shared elements — document control, training, internal audits, CAPA, and management reviews — are unified under a single system rather than maintained as two parallel processes.
In practice, this means ISO 27001 Annex A supplier relationship controls feed directly into ISO 13485 purchasing procedures and supplier qualification workflows, and any risk treatment actions identified during ISO 27001 assessments are documented within the quality records and change control processes governed by ISO 13485. When these two systems operate in silos, auditors find the gaps quickly.
Demonstrating compliance with the full range of cybersecurity requirements on an individual basis is impractical — it is far more effective to address all information security within the scope of an ISMS certified to ISO 27001, anchored in an ISO 13485 QMS.
What This Means for Connected Device Builders
For teams building IoMT platforms, biosensing systems, AI-integrated diagnostics, or embedded medical software, the message is direct: a device that is quality-compliant but not security-certified will face growing friction in both regulatory submissions and enterprise procurement. Hospitals and health systems now routinely require ISO 27001 evidence during vendor qualification — not as a bonus, but as a baseline.
At Thaumatec, holding ISO 13485, ISO 27001, and ISO 9001 simultaneously is not a marketing credential. It is the operational baseline from which connected medical systems are designed, built, and maintained — where quality controls and security controls share the same documentation, the same audit cycle, and the same change management process. That integration is what allows compliant-by-design software to move faster, not slower, through certification.