* [Blog](https://www2.paloaltonetworks.com/blog) * [Network Security](https://www2.paloaltonetworks.com/blog/network-security/) * [Healthcare](https://www2.paloaltonetworks.com/blog/category/healthcare/) * MDS2: A Treasure Trove fo... # MDS2: A Treasure Trove for Internet of Medical Things (IoMT) Security [](https://www.facebook.com/sharer/sharer.php?u=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2Fnetwork-security%2Ftreasure-trove-for-iomt-device-security%2F) [](https://twitter.com/share?text=MDS2%3A+A+Treasure+Trove+for+Internet+of+Medical+Things+%28IoMT%29+Security&url=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2Fnetwork-security%2Ftreasure-trove-for-iomt-device-security%2F) [](https://www.linkedin.com/shareArticle?mini=true&url=https%3A%2F%2Fwww2.paloaltonetworks.com%2Fblog%2Fnetwork-security%2Ftreasure-trove-for-iomt-device-security%2F&title=MDS2%3A+A+Treasure+Trove+for+Internet+of+Medical+Things+%28IoMT%29+Security&summary=&source=) [](https://www.paloaltonetworks.com//www.reddit.com/submit?url=https://www2.paloaltonetworks.com/blog/network-security/treasure-trove-for-iomt-device-security/&ts=markdown) \[\](mailto:?subject=MDS2: A Treasure Trove for Internet of Medical Things (IoMT) Security) Link copied By [Kalyan Siddam](https://www.paloaltonetworks.com/blog/author/kalyan-siddam/?ts=markdown "Posts by Kalyan Siddam") Jan 26, 2022 7 minutes [Healthcare](https://www.paloaltonetworks.com/blog/category/healthcare/?ts=markdown) [IoT](https://www.paloaltonetworks.com/blog/category/iot/?ts=markdown) [IoT Security](https://www.paloaltonetworks.com/blog/network-security/category/iot-security/?ts=markdown) [healthcare device security](https://www.paloaltonetworks.com/blog/tag/healthcare-device-security/?ts=markdown) [healthcare IoT security](https://www.paloaltonetworks.com/blog/tag/healthcare-iot-security/?ts=markdown) [IoMT Security](https://www.paloaltonetworks.com/blog/tag/iomt-security/?ts=markdown) [IOT security](https://www.paloaltonetworks.com/blog/tag/iot-security/?ts=markdown) ### What are MDS2 documents? MDS2 (Manufacturer Disclosure Statement for Medical Device Security) documents are probably the best resource to maximize clinical IoT security, as they contain invaluable information to improve the security posture of medical devices, yet, they are the least leveraged resource! National Electrical Manufacturers Association (NEMA), an ANSI-accredited Standards Developing Organization, and Medical Imaging \& Technology Alliance (MITA), has introduced the new voluntary standard - [MDS2 documents](https://www.nema.org/standards/view/manufacturer-disclosure-statement-for-medical-device-security) - in conjunction with a diverse range of industry stakeholders and aligns with the 2018 U.S. Food and Drug Administration (FDA) Medical Device Cybersecurity Playbook, issued in October 2018. The MDS2 form was introduced in 2004 to capture medical device security standards which provides healthcare delivery organizations (HDOs) with important information about risk management and medical device security controls to harden the devices against unauthorized access and cyberattacks. The MDS2 form continues to evolve, with updates published in 2013 and 2019. The 2019 version is a substantial improvement and the controls introduced in this version also mapped to the controls recommended in the following specification frameworks: * [**IEC/TR 80001-2-2:2012**](https://www.iso.org/standard/57939.html) --- Application of risk management for IT-networks incorporating medical devices --- Part 2-2: Guidance for the communication of medical device security needs, risks, and controls * [**SP 800-53 Rev 5**](https://csrc.nist.gov/publications/detail/sp/800-53/rev-5/final) --- Security and Privacy Controls for Information Systems and Organizations * [**ISO/IEC 27002:2013**](https://www.iso.org/standard/54533.html) --- Information technology --- Security techniques --- Code of practice for information security controls ### How does the MDS2 information help maximize medical IoT device security? MDS2 forms provide a structured format for the medical device manufacturers and Healthcare Delivery Organizations (HDOs) for security-risk assessment in managing medical device security issues. The 2019 MDS2 version includes **23 different groups of security controls**for medical devices. These controls help answer critical questions in accessing the cybersecurity risk and help surface additional device context and identify security anomalies. In fact, information within the MDS2 documents can help with the clinical IoT life cycle. ![](https://www.paloaltonetworks.com/blog/wp-content/uploads/2022/01/word-image-55.png) MDS2 forms help us answer some of the use cases: * **Device Context**: What operating system/ software does the device run? * **Risk**: Does the device transmit or maintain Electronic Protected Health Information (ePHI)? What type of ePHI data is collected? Does the device encrypt the ePHI data? * **Risk/ Compliance**: Is the device equipped with pre-installed anti-malware software? Can you install aftermarket anti-malware software? * **Anomaly**: Does the device support remote software updates? E.g., When network security detected downloads on the device. |--------------------------------------------------------------------------------------------------------------------------------------------------------------------------| | **The MDS2 documents are a great source of information for medical devices and similar to Threat Intelligence are an excellent tool in the Security Analyst's toolset.** | There are a few challenges with operationalizing the MDS2 documents and getting the most out of them: 1. **Awareness**: The InfoSec and Security Operations teams that are responsible for the security of HDOs typically are not aware of the existence of the MDS2 and the treasure trove of information in those documents 2. **Access**: Different medical device modalities are often managed by different clinical teams and are typically not organized in a centralized repository., In most cases, Security teams do not have access to the MDS2 documents and lose the relevant security information of the medical devices when assessing risk to the network. 3. **Automation** (lack thereof): A typical HDO has thousands of medical devices in their inventory, running different software versions. As MDS2 documents are software specific, this translates into manual upkeep of tens of thousands of documents for the entire inventory of medical devices. The manual process of looking up the information contained within the MDS2 document causes delays and errors when planning preventive maintenance or security upkeep. Another challenge the healthcare industry is facing is that the medical device manufacturers are yet to incorporate the Software Bill of Materials (SBOM) details of their medical devices in the MDS2 forms, though the 2019 MDS2 version recommends it. We are working with OEM vendors to incorporate such information to greatly increase the risk assessment and security of their devices (e.g., QNX Real-Time Operating System (RTOS) [BadAlloc vulnerability](https://www.cisa.gov/uscert/ncas/alerts/aa21-229a) --- CVE-2021-22156 that impacted many medical devices or [Treck vulnerability](https://www.cisa.gov/uscert/ics/advisories/icsa-20-353-01) impacting TCP/IP stack). |---|-------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------| | | **Complete medical device security controls list in the** [**2019 MDS2 form**](https://www.nema.org/docs/default-source/standards-document-library/mds2-worksheet-xlsx.xlsx?sfvrsn=fd59e14a_1)**:** 1. Management of personally identifiable information 2. **Automatic logoff** (ALOF) - Device's ability to prevent access and misuse by unauthorized users if the device is left idle for a period of time 3. **Audit controls** (AUDT) - Ability to reliably audit activity on the device 4. **Authorization** (AUTH) - Ability to determine the authorization of users 5. **Cyber security product upgrades** (CSUP) - Ability to install/upgrade security patches 6. **Health data de-identification** (DIDT) - Ability to remove information that allows identification of a person 7. **Data backup and disaster recovery** (DTBK) - Ability to recover after damage or destruction of device data, hardware, software, or site configuration information 8. **Emergency access** (EMRG) - Ability to access personally identifiable information in a medical emergency 9. **Health data integrity and authenticity** (IGAU) - Ability to ensure that the stored data on the device has not been altered or destroyed in a non-authorized manner and is from the originator 10. **Malware detection/protection** (MLDP) - Ability to effectively prevent, detect and remove malicious software (malware) 11. **Node authentication** (NAUT) - Ability to authenticate communication partners/nodes 12. **Connectivity capabilities** (CONN) - Connectivity capabilities of the device 13. **Person authentication** (PAUT) - Ability to configure the device to authenticate users. 14. **Physical locks** (PLOK) - Ability to prevent from compromising the integrity and confidentiality of personally identifiable information stored on the device or removable media 15. **Roadmap for third-party components in device life cycle** (RDMP) - Manufacturer's plans for security support of third-party components within the device's life cycle. 16. **Software bill of materials** (SBoM) - A Software Bill of Material (SBoM) lists all the software components incorporated into the device described for operational security planning 17. **System and application hardening** (SAHD) - Device's inherent resistance to cyber attacks and malware. 18. **Security guidance** (SGUD) - Availability of security guidance for operator and administrator of the device and manufacturer sales and service. 19. **Health data storage confidentiality** (STCF) - Ability to ensure unauthorized access does not compromise the integrity and confidentiality of personally identifiable information stored on the device or removable media. 20. **Transmission confidentiality** (TXCF) - Ability to ensure the confidentiality of transmitted personally identifiable information. 21. **Transmission integrity** (TXIG) - Ability to ensure the integrity of transmitted data 22. **Remote service** (RMOT) refers to all kinds of device maintenance activities performed by a service person via network or other remote connection. 23. Other security considerations (OTHR) - Information not covered in other controls | ### Palo Alto Networks IoT Security for Healthcare [Palo Alto Networks IoT Security for Healthcare](https://www.paloaltonetworks.com/network-security/iot-security-for-healthcare) is a pioneering solution using Machine Learning (ML) for observing IoT and IoMT device network behaviors for classifying the devices, identifying anomalies, and making security policy recommendations. We are committed to improving medical IoT devices' security and risk assessment. We take a holistic approach to assessing the risks of IoT devices, MDS2 documents are one such source. ![](https://www.paloaltonetworks.com/blog/wp-content/uploads/2022/01/word-image-56.png) [IoT Security for Healthcare](https://www.paloaltonetworks.com/network-security/iot-security-for-healthcare) supports ingesting the MDS2 documents, all 2004, 2013, and 2019 versions, and extracting the information contained within these documents. To make it further easier for our customers, we have taken a community approach to collectively improving the security and risk assessment of medical devices. You can contribute to the collection of MDS2 documents we support natively in our solution while benefiting from the insights from the MDS2 documents your peers have contributed. Our customers have already contributed ~2000 MDS2 documents. Our IoT Security solution specifically addresses the challenges associated with the operationalization of MDS2 documents. You can view information extracted from the MDS2 documents in the context of your specific medical device, search for medical devices that match certain attributes of MDS2 (e.g., devices with ePHI), identify anomalies (e.g., devices not capable of remote software updates but are downloading), etc. **Want to learn more?** Contact your Palo Alto Networks representative to request a [demonstration](https://start.paloaltonetworks.com/iot-security-demo) or [free trial](https://start.paloaltonetworks.com/iot-security-free-trial.html) of our IoT Security solution. Or to learn more about managing the IoT security lifecycle, read our [Healthcare CISOs Guide to IoT Security](https://www.paloaltonetworks.com/resources/ebooks/the-healthcare-ciso-guide-to-iot-security). ### References * [https://www.hipaajournal.com/mita-publishes-new-medical-device-security-standard/](https://www.hipaajournal.com/mita-publishes-new-medical-device-security-standard/) * [https://www.ecri.org/search-results/member-preview/hdjournal/pages/getting-the-most-out-of-the-mds2-form](https://www.ecri.org/search-results/member-preview/hdjournal/pages/getting-the-most-out-of-the-mds2-form) *** ** * ** *** ## Related Blogs ### [IoT Security](https://www.paloaltonetworks.com/blog/network-security/category/iot-security/?ts=markdown), [Points of View](https://www.paloaltonetworks.com/blog/category/points-of-view/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown) [#### Securing and Managing IoT and IoMT Devices in Healthcare](https://www2.paloaltonetworks.com/blog/2022/03/iot-iomt-devices-healthcare/) ### [Announcement](https://www.paloaltonetworks.com/blog/category/announcement/?ts=markdown), [IoT](https://www.paloaltonetworks.com/blog/category/iot/?ts=markdown), [IoT Security](https://www.paloaltonetworks.com/blog/network-security/category/iot-security/?ts=markdown), [Network Access Control](https://www.paloaltonetworks.com/blog/category/network-access-control/?ts=markdown) [#### Unlock the power of IT and security solutions with ZERO IoT blindspots](https://www2.paloaltonetworks.com/blog/network-security/zero-iot-blind-spots/) ### [Announcement](https://www.paloaltonetworks.com/blog/category/announcement/?ts=markdown), [IoT](https://www.paloaltonetworks.com/blog/category/iot/?ts=markdown), [IoT Security](https://www.paloaltonetworks.com/blog/network-security/category/iot-security/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown) [#### Announcing Device Security: Supercharging Proactive Device Protection](https://www2.paloaltonetworks.com/blog/network-security/announcing-device-security-supercharging-proactive-device-protection/) ### [IoT](https://www.paloaltonetworks.com/blog/category/iot/?ts=markdown), [IoT Security](https://www.paloaltonetworks.com/blog/network-security/category/iot-security/?ts=markdown) [#### You Can't Spell Platformization Without IoT](https://www2.paloaltonetworks.com/blog/network-security/you-cant-spell-platformization-without-iot/) ### [Announcement](https://www.paloaltonetworks.com/blog/category/announcement/?ts=markdown), [IoT Security](https://www.paloaltonetworks.com/blog/network-security/category/iot-security/?ts=markdown) [#### Securing Healthcare Lifelines with Medical IoT Security](https://www2.paloaltonetworks.com/blog/network-security/securing-healthcare-lifelines-with-medical-iot-security/) ### [IoT Security](https://www.paloaltonetworks.com/blog/network-security/category/iot-security/?ts=markdown), [Products and Services](https://www.paloaltonetworks.com/blog/category/products-and-services/?ts=markdown) [#### From Risk to Resilience: OT Security Lessons from Industry Experts](https://www2.paloaltonetworks.com/blog/network-security/from-risk-to-resilience-ot-security-lessons-industry-experts/) ### Subscribe to Network Security Blogs! Sign up to receive must-read articles, Playbooks of the Week, new feature announcements, and more. ![spinner](https://www2.paloaltonetworks.com/blog/wp-content/themes/panwblog2023/dist/images/ajax-loader.gif) Sign up Please enter a valid email. By submitting this form, you agree to our [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) and acknowledge our [Privacy Statement](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown). Please look for a confirmation email from us. If you don't receive it in the next 10 minutes, please check your spam folder. This site is protected by reCAPTCHA and the Google [Privacy Policy](https://policies.google.com/privacy) and [Terms of Service](https://policies.google.com/terms) apply. {#footer} {#footer} ## Products and Services * [AI-Powered Network Security Platform](https://www.paloaltonetworks.com/network-security?ts=markdown) * [Secure AI by Design](https://www.paloaltonetworks.com/precision-ai-security/secure-ai-by-design?ts=markdown) * [Prisma AIRS](https://www.paloaltonetworks.com/prisma/prisma-ai-runtime-security?ts=markdown) * [AI Access Security](https://www.paloaltonetworks.com/sase/ai-access-security?ts=markdown) * [Cloud Delivered Security Services](https://www.paloaltonetworks.com/network-security/security-subscriptions?ts=markdown) * [Advanced Threat Prevention](https://www.paloaltonetworks.com/network-security/advanced-threat-prevention?ts=markdown) * [Advanced URL Filtering](https://www.paloaltonetworks.com/network-security/advanced-url-filtering?ts=markdown) * [Advanced WildFire](https://www.paloaltonetworks.com/network-security/advanced-wildfire?ts=markdown) * [Advanced DNS Security](https://www.paloaltonetworks.com/network-security/advanced-dns-security?ts=markdown) * [Enterprise Data Loss Prevention](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Enterprise IoT Security](https://www.paloaltonetworks.com/network-security/enterprise-device-security?ts=markdown) * [Medical IoT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [Industrial OT Security](https://www.paloaltonetworks.com/network-security/medical-device-security?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [Next-Generation Firewalls](https://www.paloaltonetworks.com/network-security/next-generation-firewall?ts=markdown) * [Hardware Firewalls](https://www.paloaltonetworks.com/network-security/hardware-firewall-innovations?ts=markdown) * [Software Firewalls](https://www.paloaltonetworks.com/network-security/software-firewalls?ts=markdown) * [Strata Cloud Manager](https://www.paloaltonetworks.com/network-security/strata-cloud-manager?ts=markdown) * [SD-WAN for NGFW](https://www.paloaltonetworks.com/network-security/sd-wan-subscription?ts=markdown) * [PAN-OS](https://www.paloaltonetworks.com/network-security/pan-os?ts=markdown) * [Panorama](https://www.paloaltonetworks.com/network-security/panorama?ts=markdown) * [Secure Access Service Edge](https://www.paloaltonetworks.com/sase?ts=markdown) * [Prisma SASE](https://www.paloaltonetworks.com/sase?ts=markdown) * [Application Acceleration](https://www.paloaltonetworks.com/sase/app-acceleration?ts=markdown) * [Autonomous Digital Experience Management](https://www.paloaltonetworks.com/sase/adem?ts=markdown) * [Enterprise DLP](https://www.paloaltonetworks.com/sase/enterprise-data-loss-prevention?ts=markdown) * [Prisma Access](https://www.paloaltonetworks.com/sase/access?ts=markdown) * [Prisma Browser](https://www.paloaltonetworks.com/sase/prisma-browser?ts=markdown) * [Prisma SD-WAN](https://www.paloaltonetworks.com/sase/sd-wan?ts=markdown) * [Remote Browser Isolation](https://www.paloaltonetworks.com/sase/remote-browser-isolation?ts=markdown) * [SaaS Security](https://www.paloaltonetworks.com/sase/saas-security?ts=markdown) * [AI-Driven Security Operations Platform](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cloud Security](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Cortex Cloud](https://www.paloaltonetworks.com/cortex/cloud?ts=markdown) * [Application Security](https://www.paloaltonetworks.com/cortex/cloud/application-security?ts=markdown) * [Cloud Posture Security](https://www.paloaltonetworks.com/cortex/cloud/cloud-posture-security?ts=markdown) * [Cloud Runtime Security](https://www.paloaltonetworks.com/cortex/cloud/runtime-security?ts=markdown) * [Prisma Cloud](https://www.paloaltonetworks.com/prisma/cloud?ts=markdown) * [AI-Driven SOC](https://www.paloaltonetworks.com/cortex?ts=markdown) * [Cortex XSIAM](https://www.paloaltonetworks.com/cortex/cortex-xsiam?ts=markdown) * [Cortex XDR](https://www.paloaltonetworks.com/cortex/cortex-xdr?ts=markdown) * [Cortex XSOAR](https://www.paloaltonetworks.com/cortex/cortex-xsoar?ts=markdown) * [Cortex Xpanse](https://www.paloaltonetworks.com/cortex/cortex-xpanse?ts=markdown) * [Unit 42 Managed Detection \& Response](https://www.paloaltonetworks.com/cortex/managed-detection-and-response?ts=markdown) * [Managed XSIAM](https://www.paloaltonetworks.com/cortex/managed-xsiam?ts=markdown) * [Threat Intel and Incident Response Services](https://www.paloaltonetworks.com/unit42?ts=markdown) * [Proactive Assessments](https://www.paloaltonetworks.com/unit42/assess?ts=markdown) * [Incident Response](https://www.paloaltonetworks.com/unit42/respond?ts=markdown) * [Transform Your Security Strategy](https://www.paloaltonetworks.com/unit42/transform?ts=markdown) * [Discover Threat Intelligence](https://www.paloaltonetworks.com/unit42/threat-intelligence-partners?ts=markdown) ## Company * [About Us](https://www.paloaltonetworks.com/about-us?ts=markdown) * [Careers](https://jobs.paloaltonetworks.com/en/) * [Contact Us](https://www.paloaltonetworks.com/company/contact-sales?ts=markdown) * [Corporate Responsibility](https://www.paloaltonetworks.com/about-us/corporate-responsibility?ts=markdown) * [Customers](https://www.paloaltonetworks.com/customers?ts=markdown) * [Investor Relations](https://investors.paloaltonetworks.com/) * [Location](https://www.paloaltonetworks.com/about-us/locations?ts=markdown) * [Newsroom](https://www.paloaltonetworks.com/company/newsroom?ts=markdown) ## Popular Links * [Blog](https://www.paloaltonetworks.com/blog/?ts=markdown) * [Communities](https://www.paloaltonetworks.com/communities?ts=markdown) * [Content Library](https://www.paloaltonetworks.com/resources?ts=markdown) * [Cyberpedia](https://www.paloaltonetworks.com/cyberpedia?ts=markdown) * [Event Center](https://events.paloaltonetworks.com/) * [Manage Email Preferences](https://start.paloaltonetworks.com/preference-center) * [Products A-Z](https://www.paloaltonetworks.com/products/products-a-z?ts=markdown) * [Product Certifications](https://www.paloaltonetworks.com/legal-notices/trust-center/compliance?ts=markdown) * [Report a Vulnerability](https://www.paloaltonetworks.com/security-disclosure?ts=markdown) * [Sitemap](https://www.paloaltonetworks.com/sitemap?ts=markdown) * [Tech Docs](https://docs.paloaltonetworks.com/) * [Unit 42](https://unit42.paloaltonetworks.com/) * [Do Not Sell or Share My Personal Information](https://panwedd.exterro.net/portal/dsar.htm?target=panwedd) ![PAN logo](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/pan-logo-dark.svg) * [Privacy](https://www.paloaltonetworks.com/legal-notices/privacy?ts=markdown) * [Trust Center](https://www.paloaltonetworks.com/legal-notices/trust-center?ts=markdown) * [Terms of Use](https://www.paloaltonetworks.com/legal-notices/terms-of-use?ts=markdown) * [Documents](https://www.paloaltonetworks.com/legal?ts=markdown) Copyright © 2026 Palo Alto Networks. All Rights Reserved * [![Youtube](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/youtube-black.svg)](https://www.youtube.com/user/paloaltonetworks) * [![Podcast](https://www.paloaltonetworks.com/content/dam/pan/en_US/images/icons/podcast.svg)](https://www.paloaltonetworks.com/podcasts/threat-vector?ts=markdown) * [![Facebook](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/facebook-black.svg)](https://www.facebook.com/PaloAltoNetworks/) * [![LinkedIn](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/linkedin-black.svg)](https://www.linkedin.com/company/palo-alto-networks) * [![Twitter](https://www.paloaltonetworks.com/etc/clientlibs/clean/imgs/social/twitter-x-black.svg)](https://twitter.com/PaloAltoNtwks) * EN Select your language