eSTAR Submission Support

To assist you in preparing your FDA submissions, BioT provides documentation structured to align with the FDA’s eSTAR (Electronic Submission Template and Resource) Non-IVD version 5.5.

The eSTAR template standardizes the content and structure expected in premarket submissions, with dedicated sections for software and cybersecurity documentation. BioT’s documentation is organized to match these requirements, enabling you to efficiently integrate it into your overall submission.

eSTAR Documentation Mapping

The table below outlines how BioT documentation maps to specific eSTAR requirements, including document names and the corresponding input sections in the eSTAR PDF.

eStar CategoryeStar Document TypeBiot Document NameInputs for eStar PDF
SoftwareSoftware/Firmware DescriptionSRS-0001Section 2: "Overall Description"
Risk Management FileQRM-0003 Risk analysis table
Software Requirements SpecificationSRS-0001
System and Software Architecture Design (SAD) ChartSDD-0001Section 2: "System Overview",
Section 3: "System Architecture"
Software Design Specification (SDS)SDD-0001
Software Life Cycle Process DescriptionQDC-00013 Software Life Cycle Procedure
Software Testing as part of Verification & ValidationSTD-001 Software Test Description
STR-001 Software Test Report
Software Version/Revision Level HistorySVD-0001 Software Version Description
Unresolved Software AnomaliesSVD-0001 Software Version DescriptionSection 2.7: "Possible Problems and Known Errors"
Cybersecurity"Risk Management - Security risk management report detailing a separate, parallel,
and interconnected security risk management process"
CS-003 BioT Cybersecurity Report
Risk Management - Threat ModelCS-003 BioT Cybersecurity ReportSection 3.3: "Threat Modeling"
STRIDE is the threat modeling method.
Cybersecurity Risk AssessmentCS-002 BioT Cybersecurity Risk AssessmentUses Exploitability for likelihood
Software Bill of Materials (SBOM) fileSBOM.zip
SBOM - software level of support and end-of-support date for each software componentOTS-001 Off-the-Shelf Software Documentation
SBOM - Safety and Security Assessment of vulnerabilitiesSnyk_issues-detail
Assessment of Unresolved AnomaliesCS-003 BioT Cybersecurity ReportSection 5.2: "Anomalies and Vulnerabilities"
Cybersecurity Metrics - data from monitoring cybersecurity metricsCS-003 BioT Cybersecurity ReportSection 5.3: "Measures and Metrics"
Cybersecurity ControlsCS-003 BioT Cybersecurity ReportSection 4.2: "Architecture of Security Controls" Includes:
A) Authentication controls
B) Authorization controls
C) Cryptography controls
D) Code, data, and execution integrity controls
E) Confidentiality controls
F) Event detection and logging controls
G) Resiliency and recovery controls
H) Firmware and software update controls
Architecture ViewsCS-003 BioT Cybersecurity ReportSection 4.3: "Security Architecture Views" Includes:
A) Global System View
B) Multi-Patient Harm View
C) Updatability/Patchability View
D) Security Use Case Views."
Cybersecurity TestingCS-003 BioT Cybersecurity ReportSection 5.1: "Testing Reports"
Includes
A) Security requirement testing
B) Vulnerability testing
C) Penetration testing
Cybersecurity LabelingCS-003 BioT Cybersecurity ReportSection 8: "Labeling for Cybersecurity Risks"
Cybersecurity Management PlanCS-001 BioT Cybersecurity Management PlanSection 10: "Cybersecurity Post-market Management Plan" includes a description of and justification for the timelines to make patches on a regular cycle and out-of-cycle.
Interoperability Risk Assessment / Verification and ValidationCS-001 BioT Cybersecurity Management PlanSection 5: "Interoperability Considerations"

How to Use

You may use the mapped documents:

  • In combination with device-specific additions (e.g., custom risks or test cases)
  • As standalone supporting documents for the cloud infrastructure component