Jerry Anderson Isis Pharmaceuticals - cbinet.com C_Anderson_pres.pdf · Jerry Anderson Isis...

Preview:

Citation preview

Implementing the New Part 11 Guidance 1

Infrastructure Qualification

Jerry AndersonIsis Pharmaceuticals

AGENDA

The Case For Qualifying Your Infrastructure

Qualification Foundations

Risk Management

Qualification Methodology

Background

1990’s: Increased regulatory scrutiny on all things computer-related

1997: Part 11

1999: GAMP article “Compliance for Corporate Information Technology,” Pharmaceutical Engineering

2001: Pharmacia warning letter

2002: IVT Infrastructure Qualification Conference

2004: Article “IVT Network Infrastructure Qualification Proposed Standard,” Journal of Validation Technology

2005: “GAMP Good Practice Guide: IT Infrastructure Control and Compliance”

Pharmacia Warning Letter

A custom networked application and an off-the-shelf networked application

– No revision control system

– Failure to update and maintain structural and functional diagrams and design descriptions

– Failure to update and maintain diagrams with text descriptions identifying interfaces to other network programs

– Inadequate standard operation procedures to ensure that records are included with validation documentation, maintained and updated when changes are made

– The network was not included in the validation efforts and therefore lacked adequate documentation controls

Translation

“Okay, your distributed application worked during the time you ran your application testing. What assurance do you have that it would

have worked an hour later? A day later? A year later?”

“Do you have any controls over your network and its services?”

“No?”

“You fail.”

The life sciences world went nutzo

Consultants, however…

What Is Infrastructure?

Network hardware, appliances, software, and services

“Applications”: Active Directory, enterprise backup, network/application monitoring…

Data center facilities

Servers, operating systems, data management software

Clients (PCs, tablets) and their software

What Is Infrastructure: Another Perspective

An application is software doing useful work

– A GxP application is software that automates a regulated process, and/or creates and manipulates regulated data

Infrastructure is the hardware, software, communications, and facilities that provide the operating environment for applications

– GxP infrastructure supports applications and ensures a high degree of integrity for the supported data

Why Qualify Infrastructure?

To generate documentation proving it is well-built and in a state of control

To provide a qualified home for validated applications

To satisfy inspectors

To prevent regulatory action

These are different ways of saying

“Because we’re forced to!”

Regulatory Risk

Fairly low

– No requirement in the law

– cGxP expectation based on regulatory action, FDA statements regarding distributed applications on a network, implications in Annex 11

– We’ve yet to see much about companies being cited for not having qualified their infrastructure

– It’s never come up in my inspections

Inspectors open the first door (validated applications)

If they like what they see, they tend to find another first door

If they don’t like what they see, they walk farther in and open the next door

Why Qualify Infrastructure?

Better reasons:

– Provide better documentation of functionality

– Make IT knowledge transfer easier

– Lower the average downtime of applications

– Reduce the number of network outages

– Reduce the number of trouble/incident tickets

– Reduce mean time to troubleshoot/repair

– Increase the success rate of planned changes

– Lower the overall cost of providing IT services

Is Your Infrastructure In A State Of Control?

If it’s not, maybe it should be:

“Problems arising from system misconfigurations

are the largest source of network failures, system

downtime, help desk calls and security breaches.”

- Network World

Bottom-Line

There’s more business risk than compliance risk in your IT infrastructure

– The compliance risk of most infrastructure is lower than your lowest-risk GxP application

Therefore, the need to get infrastructure into a state of control is driven more by business need than compliance need

– GxP and Sarbanes-Oxley regulations are driving companies to put IT controls in place, but all companies would benefit from better IT infrastructure documentation and management

Qualifying your infrastructure reduces business and compliance risks at the same time

AGENDA

The Case For Qualifying Your Infrastructure

Qualification Foundations

Risk Management

Qualification Methodology

Validation vs. Qualification

Application Validation

– Ensures that an application was specified, designed, built, and deployed following good engineering and quality practices; that it meets the specified user requirements; and that it appropriately automates the GxP process / GxP data manipulation

Infrastructure Qualification

– Ensures that infrastructure meets specified design and configuration requirements (if any) and is maintained in a state of control

Infrastructure qualification is all about good engineering and quality assurance

Good Engineering & Quality Assurance

The GAMP infrastructure good practice guide stresses these

IT infrastructure (like anything else) should be designed, deployed, and maintained using good engineering practices (GEP)

The independent quality unit uses quality assurance practices to:

– Verify GEP and other compliance requirements during qualification activities

– Verify ongoing GEP, compliance, and control

Hardware and Software Standards

IVT:

– “Standards form the basis for controlled, uniformly applied technical solutions… This, in turn, is the first step in providing a qualified network infrastructure.”

– “Standards should be available for servers, operating systems, database management software, desktop workstations, base desktop utilities, network hardware, network operating systems, and other key infrastructure components.”

GAMP:

– “If standard platform components, such as standard server and client configurations, are adequately managed, the initial qualification of the platform component becomes a standard qualification package which permits efficient cost-effective duplication…”

Staff Qualifications

IVT and GAMP both stress the following:

– Documented roles and job requirements

– Documented experience and qualifications

– Documented training on relevant procedures

GAMP goes on to state that a formal quality management system which enforces these requirements can make the infrastructure qualification job easier

Supplier Management

Supplier management is required throughout the lifecycle of systems and infrastructure

– Before purchase: vendor assessment

– Management of consulting services during development and deployment

– Management of service contracts, bug fixes, and version upgrades

– Controls on outsourcing of applications, services, infrastructure management

– Management of infrastructure-specific services (e.g. off-site data media storage, disaster recovery services)

Configuration Management

A key (maybe THE key) to successful infrastructure management

– Configuration identification, control, status accounting, auditing

Proper configuration management during development is essential for knowing what you’re qualifying

– Done right, it forms a big part of your documentation effort

After qualification is completed, 50%+ of the work required to maintain the qualified state is configuration management work

AGENDA

The Case For Qualifying Your Infrastructure

Qualification Foundations

Risk Management

Qualification Methodology

Infrastructure Risk

Key concept: IT infrastructure has low residual risk compared to validated applications

– Infrastructure doesn’t automate a regulated process; instead, it helps keeps applications running and talking to each other, and helps protect data availability, integrity, and confidentiality

– That’s why we’re talking qualification, not validation

– In fact, what we’re REALLY talking about is good engineering and quality assurance practices

Still, the risk management process can be useful in determining what and what not to qualify, and how much to do

Risk Management

The ISO risk management process:

1. Risk assessment

a. Risk analysis: identifies types and levels of risk

Impact * probability of occurrence * probability of non-detection

b. Risk evaluation: categorizes identified risks as acceptable or not

2. Risk control: implements controls to reduce risks to acceptable levels

3. Periodic review and evaluation: captures missed or changed risks

1. Risk Assessment

Risk assessment should be used at the beginning of the qualification effort to:

– Identify what elements are in scope, based on their risk

– Identify the extent of each element’s qualification

Let’s look at one risk on an example infrastructure element: a virtual private network (VPN) appliance

1a. Risk Analysis

Example element: VPN appliance

– Hazard: allows unauthenticated user onto network

– Impact: *HIGH*

– Probability of occurrence: *LOW*

– Probability of non-detection: *MEDIUM*

1a. Risk Analysis

*Low* Med High

*High* *Med* High High

Med Low Med High

Low Low 3 Med

Probability of

Occurrence

Imp

act

Risk Classification

Determine Risk Classification:

1. Determine the probability of the bad thing occurring

2. Determine the impact if the bad thing occurs

3. Plot the risk exposure:

– The Impact if it occurs is *HIGH*

– The Probability of occurrence is *LOW*

– Our Risk Classification is *MEDIUM*

1a. Risk Analysis

Low *Med* High

High Med High High

*Med* Low *Med* High

Low Low Low MedRis

k C

lassif

icati

on

Risk Priority

Probability of

Non-Detection

Determine Risk Priority:

1. Copy the risk classification from the previous step

2. Determine the probability of not detecting an occurrence

3. Plot the risk priority:

– Our Risk Classification was *MEDIUM*

– The Probability of Non-Detection is *MEDIUM*

– Our overall Risk Priority for this risk is *MEDIUM*

1b. Risk Evaluation

Example element: VPN appliance

– Is a medium risk of an unauthorized individual being allowed onto your network acceptable to you?

– If yes: you’re done managing this risk

– If no: you’ll need to implement controls to mitigate this risk

Our answer: Unacceptable Risk

2. Risk Control

Example element: VPN appliance

Unacceptable risk: lets unauthenticated user onto network

Possible controls

– General: put VPN appliance “in scope” for qualification

– Specific:

Integration of VPN appliance and authentication server

Testing

Configuration management/change control

SOPs, work instructions, training

Supplier assessments

Note

This example was very specific

A best practice is to automatically put any element that protects your network “in scope” for qualification

Examples:

– Authentication services

– VPN services

– Firewalls

– Virus protection

– Intrusion detection

3. Periodic Review

On a periodic basis, reexamine risks and controls

– Were all identified risks estimated properly?

– Are controls still in place and sufficient?

– Are any new risks present?

AGENDA

The Case For Qualifying Your Infrastructure

Qualification Foundations

Risk Management

Qualification Methodology

Overview

The minimum

– Partnership with IT management

– SOPs

– A quality management system within IT

– GxP training for IT

– Periodic audits by the quality unit

A step up

– Formal qualification documentation for key infrastructure elements

Partnership With IT Management

IT is driven to provide and change services quickly

Quality and validation groups tend to slow things down and create more work

These two things often don’t mix well

One way to deal with this is for the quality group to be tyrannical

A better approach is to build partnership and trust

– When IT understands the risks, and Quality bends (but not breaks) to support the business needs, that’s partnership

Only IT management can make IT compliance happen

General Quality SOPs

Training

Supplier management

Document and record management

Validation / qualification

Change control

Deviations / CAPA

IT SOPs

Security

Backup / restore / archive

Incident / problem management

Database administration

Business continuity / disaster recovery

System administration

Internal IT Quality System (work instructions)

Platform management (general)

– New hardware/software

– Configuration and change management

– Preventive maintenance and problem resolution

– Service startup, shutdown, restrictions

– System monitoring, event/problem logging, problem tracking

– System retirement, data archival/retrieval

Internal IT Quality System (work instructions)

Servers and mainframes: job scheduling

Network management

Client management

– Creation and management of standard image

– Software distribution/upgrade

– Virus protection

Security

– Physical security/access

– Account management, password security, access rights

– Administrator accounts, intrusions, vulnerabilities

Internal IT Quality System (work instructions)

Data management

– Backups, restores, media management

Quality management

– Service level agreements

– Risk management

Continuity management

– Disaster recovery

– Contingency planning

GxP Training For IT

People tend to be more willing to comply if they understand the risks

“Read and understand” training on SOPs is good

General GxP training on regulatory expectations and the consequences of non-compliance is better

Specific training on regulatory expectations regarding validated applications and IT infrastructure is outstanding

Periodic Audits By Quality

IT should be a regular component of the internal audit program

The first audit could be considered a “qualification audit”

– Are we good to go? Is IT self-managing for compliance?

Future audits verify continued compliance, perhaps to changing regulatory expectations, and verify improvement / corrections

Now The Minimum Requirements Are In Place

Quality is partnered with IT management

High level SOPs are in place

Lower level quality management system within IT is in place

IT is GxP-trained

Quality is auditing IT (maybe annually)

Is that enough?

Probably.

The Typical Inspector

He opens the door, probably on the inventory of GxP equipment and applications

Next door: a validated distributed software application

If he likes what he sees, he’ll probably move on to the labs, or batch records, or lunch

But he may open the IT infrastructure door

Your Answer

“Here are the SOPs in place…”

“Here are the work instructions governing IT’s day-to-day operations…”

“Here are the GxP training records for IT personnel…”

“Here is the 2015 internal audit schedule showing an audit of the IT quality management system…”

Nothing to see here… Move along…

Don’t Bite Off More Than You Can Chew

Many companies don’t go even this far

Others do, but don’t have the resources to go further

If you can go further, and want to… “Qualification Plus”

Remember: Qualification, Not Validation

There’s no regulated process being automated, so you typically don’t need a user requirements specification

– “The router must route? The switch must switch?”

No URS means limited functional requirements

– Resist the urge to quote IETF RFCs...

This means we can skip right to design specifications

Then execute IOQs to verify minimums and record installations

No need to PQ devices/software when there’s no user process

– But you might want to PQ the entire network

General Qualification Approach

Qualification plan

Design specs (with any functional requirements and diagrams)

Installation/Operation Qualifications (IOQs - one per infrastructure element or per logical grouping)

Bonus: a network Performance Qualification (PQ)

Qualification report

SOPs and work instructions

Qualification Plan

Describes high-level approach

Says what’s in scope

– E.g. parts of Active Directory are “in” but Exchange and SMTP are “out”

Required activities, documents, other deliverables

Roles and responsibilities

Design Specification

Any functional requirements can be captured here

Document what your “minimums” and configurations are

You might have just one design spec covering your entire network (ISO layers 1-3)

Possibly other design specs covering specific GxP services:

– AD authentication and authorization (group policies)

– NTP

– VPN / IPSEC / TLS

– Directories other than AD

Critical non-GxP services? (e.g. DHCP)

Design Specification

A design spec can apply to a single device, a family of devices, or an entire network

Recommended approach:

– A design spec for the network

– A design spec for GxP data center(s)

– A design spec for GxP server farm, SAN, etc. (combined as appropriate)

– A design spec for each major GxP network service (e.g. Active Directory)

– A design spec for desktop clients

Design Specification

Each design specification describes:

– An element of your infrastructure (e.g. routers)

– How that element is used/what it must do

– Any minimum functional or configuration requirements

It’s OK to base your design on what you already have

– List your existing minimums as your requirements (e.g. minimum RAM, minimum IOS version, minimum circuit bandwidth)

Include vendor recommendations for installation and configuration as appropriate

IOQ

Challenges/records installation and configuration data

Recommended approach:

– One IOQ for the network

If you decide to do an IOQ per equipment type (router, switch, PC):

– Execute the full operational challenge for one family member

– Record the installation for every member

– Refer to IVT’s ‘cookie cutter’ approach for PCs, and GAMP’s ‘horizontal’ approach to equipment types

– One IOQ per GxP network service

– One IOQ per GxP data center

IOQ

If you’re doing IOQs for network equipment, focus on the “I”

– For device families: do functional challenges once (i.e. OQ just one router); do installation documentation for all instances of the model/family

– Also: think about making your functional challenges “bench qualifications.” Examples:

New Cisco router: you’re pretty confident that it routes datagrams, so just document that what you buy meets your specifications for the role that the router will play on your network

Existing router: you already know it’s working, so just document its installation and configuration information

This means that you might be able to IOQ most or all of your network equipment from a central location (e.g. using CiscoWorks, OpenView)

IOQ

Focus more on the “O” for network services

– Low-level services (e.g. DNS, DHCP) = small “o”

– Higher-level, record-critical, or security-critical services (e.g. Active Directory, NIS+, LDAP, VPN, firewall, data backup) = BIG “O”

Infrastructure Elements to Challenge With IOQs

Network devices

Network services

Data centers

Desktop PCs

Network Devices

Routers, switches, hubs, repeaters, etc.

– If you’re lucky, IT has standardized hardware (e.g. all-Cisco, with multiple routers & switches from the same model families)

– Use the “cookie-cutter” “horizontal” approach: fully OQ one device from each family, then record the installation and configuration data for all devices in that family

– Verify what you’ve specified in your design document. Examples:

Networking protocols you’ve specified are configured

Connectivity, bandwidth, and (if important) latency across links

Redundancy, if you’ve built it in

The “Cookie Cutter” or “Horizontal” Qualification Approach

Role: Access SwitchMinimum RAM: xxxMinimum Flash: xxxSpanning tree protocolTACACS authenticationetc.

3. Many instances of the device are deployed

1. A configurationis specified for

a role:

2. One device is fully challengedSystem: Catalyst 65xx; software: IOS 12.x

Network Device Configuration Settings

Important: recording network device configuration includes the configuration settings done in software (e.g. in IOS)

This is critical, and it changes often (e.g. new static routes, access lists, packet filters)

You need to “version” these config settings

Print them out if you have to

Better still, copy each version into a secure directory or document management app

Even better: use a network management tool (e.g. CiscoWorks)

Network Services

Low-level services = little qualification work

– NTP, DNS, DHCP

– Don’t forget: broken low-level services can have high-level impact

More testing and documentation for higher-level record-critical or security-critical services

– Authentication services (e.g. Active Directory, LDAP, NIS+, )

– Remote access & VPN services

– Firewalls

– Virus protection

– Backup/restore solutions

– Network management software

Data Centers

Recommended approach:

– Unless your company is fat with cash, your data centers will look very different from site to site… so don’t set your standards arbitrarily high!

– Focus on compliance with building/safety codes, physical security, and meeting the requirements of the equipment within

– Leverage commissioning paperwork if possible to show that power, HVAC, fire, and security systems are installed per manufacturer specifications and have proper capacity

– Verify proper equipment loading (e.g. breakers, batteries, cooling)

– “Testing” is mostly a lot of looking, verifying, measuring, documenting

– Runs from subjective (“This rats nest under the floor is ugly and needs fixing”) to objective (“These cables are blocking air flow”)

Desktop PCs

Recommended approach:

– Qualify a “golden image” that you’ll burn onto each PC

– Qualify an approved standards list for hardware & software add-ons

– Limit the changes that users can make (e.g. no local admin privs; Active Directory controls, approved software add-on lists)

– Control the changes that IT can make (e.g. qualify electronic software distribution tools and changes to the golden image; use SOPs to control these activities)

Recommendation: don’t even bother with change control for your PCs unless they’re running GxP software locally(e.g. standalone or “fat client”)

Desktop PCs

Enforce standardization of hardware & software

Standardize on thin client applications (e.g. Citrix, Java, ActiveX)

– If your software configuration specifies only “IE10 or better under Windows 7 SPx or better”, your qualification job is pretty easy

Test the golden image with all GxP apps

If feasible, test all software on the “Approved Add-Ons” list with all GxP apps

Challenge any controls that are expected to keep the desktop configuration locked down

– Examples: users don’t have local admin privs; users can’t install applications; users can’t change the clock

The “Cookie Cutter” or “Horizontal” Qualification Approach

Baseline ConfigurationFamily: Lenovo xxxxBIOS: xxxMinimum RAM: xxxApproved devices…Windows settings…Installed apps…

3. Many instances of the family are deployed

1. A configurationis specified for

a series:

2. One machine running the “golden softwareimage” is qualified

Network PQ

Recommended!

– The protocol should be as simple as formally monitoring the network for a period of time (say 30 – 60 days)

– Record any incidents, problems, anomalies, capacity issues, etc.

– Document resolutions (or plans for resolutions)

Qualification Final Report

Summarizes the outcome of each protocol

– If each protocol had its own report, the final report just summarizes those

– If not, then the final report should explain/rationalize any deviations that were encountered along the way

– If any non-critical deviations are still “open” (e.g. were resolved by change controls), the final report lists these along with the change control numbers

Declares the infrastructure “qualified”

Maintaining The Qualified State

Necessary procedures and work instructions

– Change control & configuration management: to maintain that qualified state

– Operations: assure regular monitoring, backups, preventive maintenance, etc.

– Security: password rules, access rights by role, periodic audits

– Others (incidents & problems, capacity management, training, etc.)

Monitor the ongoing performance of your network, servers, and applications on an ongoing basis

Keep qualification documents, network diagrams, and configuration data up to date as the network changes over time

– Pointers to current and prior electronic versions are okay

Test new equipment/configurations as appropriate

Think about executing an overall network PQ on a periodic basis

Change Control and Infrastructure

After qualification, you’ll have many new GxP items to track –each with its own significant configuration challenges

– Supplier changes

– Router/switch configuration changes

– New or reconfigured building

– Desktop hardware refreshing

How can you put infrastructure under change control when it changes so often?

– Decide what change types need QA involvement

– Think ahead and develop a routine change list...

Routine Changes

A pre-defined list of infrastructure changes that can be implemented by IT without ‘formal’ change control

Pre-approved by QA; need no hands-on QA or CV involvement

Typically low-risk/low-impact activities

Examples:

– Adding a previously qualified model of network device

– Reboot server or restart application/service

– “Like-for-like” hardware changes (e.g. disk in RAID 5 array)

– Updating virus .dat files

– Windows security patches? Service pack updates?

Routine Changes

Caveats

– Be very clear and specific in your wording to prevent misinterpretation of “like-for-like”

– Some routine changes must be tested in a non-production environment

– All changes require some type of documentation (e.g. work request, system log)

– History of routine changes must be accessible

– Requires periodic auditing

Events/Problems/Incidents/Deviations

Similar forethought should be given to dealing with infrastructure incidents

Certainly, not every ITIL incident constitutes a GxP incident

The IT SOP or work instruction for handling incidents/problems should have logic that triggers a Quality SOP if appropriate

Possible examples:

– A problem with a GxP server

– A problem with barcode scanners used by a GxP application

– A network intrusion or virus infection

Maintaining The Qualified State

The Quality unit should “Trust…

– Many changes and events/incidents/problems should be handled by IT without direct Quality or Validation involvement

– IT procedures should be in place to guide the proper degree of planning, documentation, testing, verification, reporting, etc.

– The best compliance comes when IT is self-enforcing

– IT needs to understand when to involve Quality

… but Verify”

– Periodically, the independent Quality unit should audit IT operations and documentation to assure that procedures are being followed

Interactive Workshop

Questions?

Recommended