FDA Guidance2026-04-065 min read

How to Respond to an FDA ANIN Cybersecurity Letter

JK
Jesse Kinser
Extra Security
How to Respond to an FDA ANIN Cybersecurity Letter

You submitted your 510(k) or PMA, and instead of clearance, you got a letter back asking for Additional Information (ANIN) about your cybersecurity documentation. This is increasingly common — the FDA has significantly raised the bar on what they expect in premarket submissions since Section 524B of the FD&C Act took effect.

An ANIN letter isn't a rejection. It's a request for more information. But how you respond determines whether your device gets cleared or enters a drawn-out back-and-forth with the review team.

What an ANIN Cybersecurity Letter Typically Asks For

Every ANIN letter is different, but the deficiencies we see most frequently fall into a few categories:

Insufficient Threat Modeling

The FDA reviewer looked at your threat model and felt it didn't adequately cover the device's attack surfaces. Common reasons:

  • The threat model only covered software and didn't address hardware, wireless, or physical attack vectors
  • No structured methodology was used (STRIDE, TARA, attack trees)
  • The threat model was generic — not specific to your device's architecture and clinical context
  • Risk ratings didn't account for clinical impact to patients

Missing or Incomplete Penetration Testing

Your submission either didn't include third-party penetration testing results, or the testing that was done didn't cover the full attack surface. The FDA expects to see:

  • Testing of all interfaces: network, wireless (BLE, Wi-Fi, etc.), firmware, physical, and cloud/backend
  • Findings mapped to clinical impact, not just CVSS scores
  • Evidence of remediation for identified vulnerabilities
  • Testing performed by an independent third party, not your internal team

Inadequate SBOM

Your Software Bill of Materials was missing, incomplete, or didn't include open-source and third-party component versions. The FDA wants a machine-readable SBOM that accounts for every software component in the device.

No Post-Market Cybersecurity Plan

The FDA expects a documented plan for how you'll handle vulnerabilities discovered after the device ships. This includes coordinated vulnerability disclosure, patch management, and monitoring for new CVEs that affect your device's components.

Weak Authentication or Encryption

The reviewer identified specific technical deficiencies — default passwords, unencrypted communications, missing access controls — and wants evidence that they've been addressed.

How to Respond Effectively

1. Read the Letter Carefully

ANIN letters are specific. The reviewer will cite exactly which sections of the guidance your submission didn't meet. Don't treat it as a general request to "improve cybersecurity" — identify each individual deficiency and plan a targeted response for each one.

2. Don't Just Add Documentation — Fix the Gaps

If the letter says your threat model was insufficient, don't just rewrite the threat model document. Actually perform a proper threat modeling exercise using a recognized methodology, then document it. FDA reviewers can tell the difference between a document written to pass review and one that reflects real analysis.

3. Get Independent Testing

If your submission lacked penetration testing or the testing was inadequate, this is the time to engage a third-party testing firm. The FDA specifically values independent assessment — having your own engineers re-test the device is not what they're asking for.

4. Map Everything to Clinical Impact

The most common theme across ANIN letters is that manufacturers describe cybersecurity findings in purely technical terms without explaining what they mean for patients. Every vulnerability, every mitigation, and every residual risk should be explained in terms of its potential impact on patient safety.

5. Respond to Every Item

Don't skip deficiencies you think are minor. If the letter asks about five things, respond to all five with specific evidence. Partial responses generate follow-up letters, which add months to your timeline.

6. Include Evidence, Not Just Statements

"We have implemented encryption" is not a sufficient response. Include:

  • The specific encryption algorithm and key length
  • Where encryption is applied (data at rest, in transit, or both)
  • Test results demonstrating the encryption works correctly
  • A description of key management practices

Timeline Impact

A well-prepared ANIN response can be submitted within 30-60 days if you have the right resources. A poorly prepared response — or one that triggers a second ANIN — can add 6-12 months to your clearance timeline.

The fastest path is usually:

  1. Week 1: Gap analysis — map the ANIN deficiencies to specific actions needed
  2. Weeks 2-5: Conduct any required testing (threat modeling, penetration testing)
  3. Week 6: Compile response documentation with evidence
  4. Week 7: Internal review and submission

If penetration testing is required, that's typically the longest-lead item. Plan for approximately 4 weeks of testing time.

How to Avoid ANIN Letters in the First Place

The manufacturers who avoid ANIN letters are the ones who address cybersecurity early — not as a last-minute box to check before submission.

  • Start threat modeling during the design phase, not after the device is built
  • Engage a third-party pentest firm early enough to remediate findings before submission
  • Structure your cybersecurity documentation around FDA premarket guidance from the beginning
  • Include a post-market cybersecurity plan in your initial submission
  • Map every finding and mitigation to clinical impact

The cost of doing cybersecurity right the first time is almost always lower than the cost of responding to an ANIN letter — both in dollars and in months of delayed market entry.

Ready to secure your device?

Our penetration tests are designed specifically for FDA premarket and post-market requirements.

Get Help With Your ANIN Response