Qualification Guideline

Size: px
Start display at page:

Download "Qualification Guideline"

Transcription

1 Qualification Guideline June 2013

2 Disclaimer: This document is meant as a reference to Life Science companies in regards to the Microsoft O365 platform. Montrium does not warrant that the use of the recommendations contained herein will result in a qualified system or that a system validated within Office 365 in accordance with this document will be acceptable to regulatory authorities. This document is provided as-is. Information and views expressed in this document, including URL and other Internet Web site references, may change without notice. Limitation of Liability: In no event shall Montrium or any of its affiliates or the officers, directors, employees, members, or agents of each of them, be liable for any damages of any kind, including without limitation any special, incidental, indirect, or consequential damages, whether or not advised of the possibility of such damages, and on any theory of liability whatsoever, arising out of or in connection with the use of this information Montrium Inc. Page 2 of 74

3 Authors Michael Zwetkow Stephanie Tanguay Paul Fenton Gabrielle Soucy VP Operations, Montrium Inc. Quality Assurance Manager, Montrium Inc. CEO, Montrium Inc. Sr. Business Analyst, Montrium Inc Montrium Inc. Page 3 of 74

4 Foreword Over the last few years, Microsoft has paid an increasing amount of attention to a couple of key concepts that are represented in this whitepaper: compliance and the cloud. Together these concepts represent a fairly radical departure from normal business. By enabling cloud technologies, which provide an ease of use and ease of implementation, with compliance, which provides the ability to work with information in a regulatory compliant fashion, the implementing party may find the best of both worlds. This set of guideline whitepapers show how Microsoft is committed to cloud and compliance, spanning Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS), a relatively unique combination of technologies and commitment to compliance. At the end of the day these are qualification guidelines and do not represent any guarantees from Microsoft that your processes can be validated in any of the environments discussed or against any of the regulations or standards discussed. Yet when paired with the documentation referred to herein along with customer evidence, these guidelines offer customers a starting point for their own compliance in the cloud efforts, a starting point that may be furthered by the expertise Montrium has demonstrated in producing these guidelines. Mohamed Ayad, Cloud Solution Specialist Les Jordan, Chief Technology Strategist Health & Life Sciences Industry Unit Microsoft 2013 Montrium Inc. Page 4 of 74

5 Executive Summary The purpose of this document is to assist Microsoft s life science customers in establishing a qualification strategy for the Microsoft Office 365 (O365) software service. This guideline identifies the responsibilities shared by Microsoft and its customers for meeting the regulatory requirements of FDA 21 CFR Part 11 Electronic Records; Electronic Signatures (21 CFR Part 11) and EudraLex Volume 4 - Annex 11 Computerised Systems (Annex 11). The intended audience for this guideline is any regulated customer within the life sciences industry, aiming to use the O365 platform to run GxP regulated applications. It is assumed that these regulated applications will support GxP activities and produce and/or manage electronic records. Traditionally GxP computerized systems have been deployed on specific servers either directly or through the use of virtual machines. This underlying hardware was usually qualified, managed and specifically identified as being part of a specific instance of a GxP computerized system. With cloud computing this paradigm changes slightly. The O365 software solution is composed of many hardware and software components which all fall under the same controls that have been identified in this guideline. Each time a new customer instance of O365 is commissioned, it is done using the same controlled process and standards. When considering public cloud based systems, it is important to view the whole public cloud as one system upon which we are able to install and run GxP computerized systems and applications. This guideline will help companies achieve this by providing references to the 21 CFR Part 11 controls that are present within the O365 environment and that should be identified in customer qualification documentation. Microsoft s GFS and O365 platform services have undergone SSAE 16 Service Organization Control (SOC) audits and are also certified according to ISO/IEC 27001:2005 standards. Although these standards do not specifically focus on regulatory compliance, their objectives are very similar to those of 21 CFR Part 11 and Annex 11. Montrium has therefore decided to leverage the reports produced by independent third party SSAE and ISO auditors to identify the procedural and technical controls established at Microsoft that could be used to satisfy the requirements of 21 CFR Part 11 and Annex 11. It was assumed that these audit reports were generated by qualified third party auditors and that all information contained within the reviewed audit reports was objective and accurate at the time of the audits. It is expected that customers will perform an independent analysis and verification of relevant regulatory requirements to determine if the GxP applications deployed on O365 are fit for their intended purpose. The customer must also ensure that GxP applications system will be sufficiently documented and validated to further demonstrate compliance. GFS delivers the core infrastructure and foundation technologies for Microsoft's Online Services environment. Microsoft Office O365 is subscription-based software service hosted by the Global Foundation Services (GFS) group within Microsoft managed data centers. The services included as part of O365 are Microsoft SharePoint Online, Microsoft Exchange Online, Microsoft Lync Online and Microsoft Forefront Online Protection for Exchange. This guideline focuses on the Microsoft SharePoint Online service, which is the only O365 service which when configured appropriately, provides the ability 2013 Montrium Inc. Page 5 of 74

6 to manage electronic records in manner that could satisfy applicable regulatory requirements. The O365 platform is classified as a public, off-premise, third-party managed solution which is offered via the SaaS cloud service model. From the perspective of a regulated user (customer), Microsoft Office is considered to be Category 4 Configured Product as defined in GAMP5. O365 is considered to be an open system per 21 CFR Part 11, therefore additional measures, such as encryption should be employed to further secure information stored within or transiting from the system. It should be noted that only certain versions of O365 is able to meet the 21 CFR Part 11 requirements for open systems. Audited controls implemented by Microsoft serve to ensure confidentiality, integrity and availability of data stored on O365 and correspond to the applicable regulatory requirements defined in 21 CFR Part 11 and Annex 11 that have been identified as the responsibility of Microsoft. Microsoft is responsible for ensuring that O365 meets the terms defined within the governing Service Level Agreements (SLA). In addition to ensuring that computerized systems have the relevant technical controls outlined in the assessment contained within the guideline, the customer is also responsible for ensuring adequate procedural controls governing the use of the GxP computerized system are in place. These procedural controls should cover the technical aspects of system management, including but not limited to logical security, user management, data backup and disaster recovery. There should also be procedural controls relating to the operation of the GxP computerized system. The customer should determine the GxP requirements that apply to the computerized system based on its intended use and follow internal procedures governing qualification and/or validation processes to demonstrate that the GxP requirements are met. In conclusion, following the assessment performed by Montrium, it is felt that the audited procedural and technical controls that Microsoft has implemented could serve to demonstrate that the O365 platform is being maintained in a state of control that is in accordance with the applicable regulatory requirements. Moreover, the customer may leverage the audited controls described in this document and related audit reports as part of the risk analysis and qualification effort of their GxP applications deployed in the O365 environment Montrium Inc. Page 6 of 74

7 Table of Contents Authors... 3 Foreword... 4 Executive Summary... 5 Table of Contents Introduction Purpose Key Definitions Audience and Scope Methodology Glossary System Overview Global Foundation Services Microsoft Office System Classification Microsoft Audits and Certifications Microsoft Controls Qualification Approach Qualification Activities and Responsibilities US FDA 21 CFR Part 11 Electronic Records; Electronic Signatures Compliance Assessment EudraLex Volume 4 Annex 11 Computerised Systems Compliance Assessment Conclusion References Appendices Appendix A. Recommended Procedures / Policies Montrium Inc. Page 7 of 74

8 1 Introduction 1.1 Purpose The purpose of this document is to assist Microsoft s life science customers in establishing a qualification strategy for the Microsoft Office 365 (O365) software service, which is hosted on the infrastructure provided by the Global Foundation Services (GFS) group within Microsoft. The guidance provided in this document is based on the assumption that Microsoft s customers will utilize the O365 service as a GxP application to perform GxP regulated activities. This guideline identifies the responsibilities shared by Microsoft and its customers for meeting the regulations specified within Section 1.2. A summary is provided of the procedural and technical controls which govern the O365 service and can be leveraged by the regulated user (customer) to demonstrate compliance with applicable regulatory requirements. Also summarized within this guideline, are recommended activities and controls that should be established by customers in order qualify and maintain control over the GxP application configured to run on O365. The qualification approach outlined within this guideline is based on industry best practices with an emphasis on the concepts presented and described within ISPE s, GAMP series of Good Practice Guides (Ref. [7]) and PIC/S PI Good Practices for Computerised Systems in Regulated GxP Environments (Ref. [17]). 1.2 Key Definitions GxP computerized system A GxP computerized system is defined as application configured on the O365 platform that will support activities and records governed by regulations pertaining to GLP, GCP and GMP environments GxP activity Any regulated activity performed with the context of GLP, GCP and GMP environments Customer Within the context of this guideline, the customer is defined as any person or persons using a GxP computerized system hosted on the O365 platform, who are responsible for the content of the electronic records produced and/or managed within the GxP computerized system Customer Data on Storage As per the Microsoft O365 Privacy Statement (Ref. [19]), Customer Data is all the data, including all text, sound, software or image files that you provide, or are provided on your behalf, to us through your use of the Services. For example, Customer Data on storage includes data that customers upload for storage or processing in the O365 platform, and applications that customer or customer s end users upload for hosting in the Services. Customer Data on Storage does not include configuration or technical settings and information. Microsoft does not 2013 Montrium Inc. Page 8 of 74

9 monitor or approve the applications that customers configure on O365. Microsoft does not claim ownership of the Data on Storage. Microsoft s Online Services Use Rights (Ref. [20]) states you [the customer] retain all right, title and interest in and to customer data. We [Microsoft] acquire no rights in customer data, other than the rights you grant to us for the applicable online service. This does not apply to software or services we license you. Data security beyond the access controls mechanisms, including but not limited to fine-grain access controls or encryption, is the responsibility of the customer. 1.3 Audience and Scope The intended audience for this guideline is any regulated customer within the life sciences industry, aiming to configure the O365 platform for use as a GxP application(s). It is assumed that the application will support GxP activities and produce and/or manage electronic records. The specific GxP activities performed within the customer s O365 environment are not addressed in this guidance document, as the customer is responsible for defining the requirements and evaluating the risk associated with each GxP application within the O365 environment. The regulations within the scope of this qualification guidance document are limited to the following: FDA 21 CFR Part 11 Electronic Records; Electronic Signatures - Subpart A and B (Sec and Sec 11.30) (Ref. [5]) 1 EudraLex Volume 4 - Annex 11 Computerised Systems (Ref. [8]) 2 The O365 platform consists of several services as described in Section 2.2; however, Microsoft SharePoint Online is the only service which could provide the ability to generate or manage electronic records within the context GxP regulated activities. Therefore, this guidance will focus on the functionality of SharePoint Online as it relates to the management of electronic records. This guideline also covers the underlying infrastructure components provided by the Global Foundation Services group upon which the O365 service is delivered to Microsoft customers. 1.4 Methodology Microsoft s GFS and O365 platform services have undergone SSAE 16 Service Organization Control (SOC) audits and are also certified according to ISO/IEC 27001:2005 standards (see Section 2.4). Montrium has leveraged the reports produced by independent third party auditors to identify procedural and technical controls established at Microsoft which could be used to satisfy 1 21 CFR Part 11 subparts related to electronic signatures are out of scope for this guide, as Microsoft does not provide electronic signature functionality as part of the above services. 2 Although Eudralex Volume 4 Annex 11 specifically discusses GMP systems, it is generally accepted in industry that the same principals in the most part are applicable to GCP and GLP systems Montrium Inc. Page 9 of 74

10 regulatory requirements within US FDA 21 CFR Part 11 (Ref. [5]) and EudraLex Volume 4 - Annex 11 (Ref. [8]). These controls are described in detail in Section 2.5. Montrium based the analysis on the ISO and SSAE 16 standards as they have similar objectives to 21 CFR Part 11 and EudraLex Volume 4 - Annex 11 in relation to controls for computerized systems. The qualification approach summarizes the activities and responsibilities shared between the regulated user (customer) and the cloud service provider (Microsoft) to qualify the system against the relevant regulatory requirements. A detailed assessment (see Section 3.2 and 3.3) was performed on each regulatory requirement to interpret how compliance could be achieved within the context of a GxP computerized system configured on the O365 platform. The assessment described the responsibilities of the customer and Microsoft, as well as the activities, documentation and controls (technical/procedural) that are required to meet the regulatory requirement. The contents of this document are based on these assumptions: Audit reports listed in Section 2.4 were generated by qualified third party auditors; All information contained within the reviewed audit reports was objective and accurate at the time of the audits; Customers will perform an independent analysis and verification of related regulatory requirements to determine if the O365 platform is fit for its intended purpose; The O356 application(s) will be sufficiently documented and validated by the customer to demonstrate compliance with all applicable regulations; The customer will use only out-of-the-box functionality and will not be installing developing any customizations or 3rd party applications within the O365 environment Montrium Inc. Page 10 of 74

11 1.5 Glossary Term AICPA CFR Closed System Cloud Infrastructure as a Service (IaaS). Cloud Platform as a Service (PaaS) Cloud Software as a Service (SaaS) Computerized System Customer CV Definition American Institute of Certified Public Accountants Code of Federal Regulations An environment in which system access is controlled by persons who are responsible for the content of electronic records that are on the system. 3 The capability provided to the consumer is to provision processing, storage, networks, and other fundamental computing resources where the consumer is able to deploy and run arbitrary software, which can include operating systems and applications. The consumer does not manage or control the underlying cloud infrastructure but has control over operating systems, storage, deployed applications, and possibly limited control of select networking components (e.g., host firewalls). 4 The capability provided to the consumer is to deploy onto the cloud infrastructure consumer-created or acquired applications created using programming languages and tools supported by the provider. The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, or storage, but has control over the deployed applications and possibly application hosting environment configurations. 4 The capability provided to the consumer is to use the provider s applications running on a cloud infrastructure. The applications are accessible from various client devices through a thin client interface such as a Web browser (e.g., Webbased ). The consumer does not manage or control the underlying cloud infrastructure including network, servers, operating systems, storage, or even individual application capabilities, with the possible exception of limited user specific application configuration settings. Includes hardware, software, peripheral devices, personnel, and documentation; e.g., manuals and Standard Operating Procedures. 5 O365 user using the software service for GxP regulated activities. Curriculum Vitae 3 FDA 21 CFR Part 11 (Ref. [4]). 4 NIST Cloud Computing Standards Roadmap (Ref. [9]) 5 FDA, Glossary of Computer Systems Software Development Terminology (8/95) 2013 Montrium Inc. Page 11 of 74

12 Term Electronic Record FDA GAMP GFS GCP GLP GMP GxP IaaS ID IEC ISO ISPE IT NDA NIST Open System O/S PaaS PIC/S Procedure Definition Any combination of text, graphics, data, audio, pictorial, or other information representation in digital form that is created, modified, maintained, archived, retrieved, or distributed by a computer system. 3 United States Food and Drug Administration Good Automated Manufacturing Practice Global Foundation Services Good Clinical Practice Good Laboratory Practice Good Manufacturing Practice Compliance requirements for all good practice disciplines in the regulated pharmaceutical sector supply chain from discovery to post marketing. 6 Infrastructure as a Service Identifier International Electrotechnical Commission International Organization for Standardization International Society of Pharmaceutical Engineers Information Technology Non-Disclosure Agreement National Institute of Standards and Technology An environment in which system access is not controlled by persons who are responsible for the content of electronic records that are on the system. 3 Operating System Platform as a Service Pharmaceutical Inspection Convention and Pharmaceutical Inspection Cooperation Scheme The term procedure within the context of this document refers to any approved and effective controlled document governing specific processes (i.e. Policy, SOP, Standard, Guide, Work Instruction). 6 PIC/S (Ref. [17]) 2013 Montrium Inc. Page 12 of 74

13 Term SaaS SDLC SLA SMAPI SOC SOP SSAE SSL STB TLS TSP VM VPN Definition Software as a Service Software Development Lifecycle Service Level Agreement System Management Application Program Interface Service Organization Controls Standard Operating Procedure Statement on Standards for Attestation Engagements Secure Sockets Layer Microsoft Server and Tools Business Transport Layer Security Trust Services Principles Virtual Machine Virtual Private Network 2013 Montrium Inc. Page 13 of 74

14 2 System Overview 2.1 Global Foundation Services Global Foundation Services (GFS) delivers the core infrastructure, foundation technologies and operational support for Microsoft's Online Services environment, including O365. As described within the GFS SOC 2 report (Ref. [2]), the GFS operational infrastructure services include the following: Engineering and operations for core infrastructure (networking, directory services, access services, data retention and backup, hardware and software procurement, physical and environmental controls) Deployment, hosting and data center services Service support, monitoring and escalation Information security management and compliance monitoring 2.2 Microsoft Office 365 Microsoft Office O365 is subscription-based software service hosted by the Global Foundation Services group within Microsoft managed data centers. As described within the O365 SOC 1 report (Ref. [1]), the O365 hosted service is offered in two ways: Microsoft Office 365 where all customers receive a standard set of features they subscribe to, hosted on a multi-tenant basis Microsoft Office 365 Dedicated (O365-D) hosts applications and services with a separate, secured hardware infrastructure dedicated to a single customer The services included as part of O365 and O365-D are: Microsoft SharePoint Online, Microsoft Exchange Online, Microsoft Lync Online and Microsoft Forefront Online Protection for Exchange. This guideline will focus on the Microsoft SharePoint Online service, which is the only O365 service which when configured appropriately, provides the ability to manage electronic records in manner that could satisfy applicable regulatory requirements (see Section 1.3). SharePoint Online allows users to create and store data as well as documents in lists and libraries within SharePoint which can be configured with audit trails and versioning. In addition, user permissions can be configured to control access to the content stored with the various lists and libraries Montrium Inc. Page 14 of 74

15 In order to be able to meet regulatory requirements for encryption, the software service must also provide the ability to encrypt data which is stored within the application. The Active Directory Rights Management functionality can be configured to encrypt documents stored with SharePoint. However, this functionality is only available with the SharePoint Online Plan 2 option, which is included in the following O365 plans: Office 365 Enterprise E3 Office 365 Education A3 Office 365 Government G3 Office 365 Enterprise E4 Office 365 Education A4 Office 365 Government G4 2.3 System Classification Cloud Service Model The O365 platform is classified as a public, off-premise, third-party managed solution which is offered via the SaaS cloud service model (see NIST definition in Section 1.5). The following diagram depicts the various components of the software service which are managed by Microsoft as part of the SaaS service model. Figure 1 SaaS Cloud Service Model (based on Ref. [18]) 2013 Montrium Inc. Page 15 of 74

16 2.3.2 GAMP5 Category From the perspective of a regulated user (customer), Microsoft Office is considered to be Category 4 Configured Product as defined in GAMP5 (Ref. [6]). A configured product refers to a commercially available software product which is configured to meet a specific business requirement FDA Classification While Microsoft is not directly responsible for the electronic records contained within the O365 platform, it is responsible for maintaining the O365 platform. In addition, Microsoft configures the O365 platform and establishes access control requirements for logical and physical security. The O365 platform is therefore considered to be open (refer to definition in Section 1.5). The FDA requires open systems to meet additional requirements, such as encryption, as defined in 21 CFR Part (Ref. [5]). 2.4 Microsoft Audits and Certifications The following table lists the formal audit reports prepared by third parties which were reviewed by Montrium in order to identify relevant controls which have a potential impact on compliance with the 21 CFR Part 11 (Ref. [5]) and Annex 11 (Ref. [8]) regulations. Existing Microsoft customers may request access to these reports subject to NDA terms and conditions, through their respective Microsoft account representatives. Audited Service Audit Type Date Reference No. GFS SOC 2 Type II April 18, 2012 Ref. [2] Office 365 SOC 1 Type II June 14, 2012 Ref. [1] Office 365 ISO/IEC 27001:2005 November 16, 2012 Ref. [3] ISO/IEC 27001:2005 Certification ISO/IEC 27001:2005 specifies the requirements for establishing, implementing, operating, monitoring, reviewing, maintaining and improving a documented information security management system within the context of the organization's overall business risks. It specifies requirements for the implementation of security controls customized to the needs of individual organizations or parts thereof. ISO/IEC 27001:2005 certifications for O365 and Global Foundation Services can be found by clicking on the following links: Microsoft Office 365 ISO/IEC 27001:2005 certificate GFS ISO/IEC 27001:2005 certificate 2013 Montrium Inc. Page 16 of 74

17 2.4.2 SOC Service Audit Reports Service Organization Controls reports are designed by the American Institute of Certified Public Accountants (AICPA) to help service organizations that operate information systems and provide information system services to other entities, build trust and confidence in their service delivery processes and controls through a report by an independent Certified Public Accountant. SOC 1 Service Audit Reports are conducted in accordance with the professional standard known as Statement on Standards for Attestation Engagements (SSAE) No. 16. SOC 1 reports are geared towards reporting on controls at service organizations that are relevant to Internal Control over Financial Reporting, and replace the SAS 70 auditing standard. The O365 services group has been audited by independent third party auditors to generate a SOC 1 Service Auditor s report which examined the following control areas: Logical Access Change Management Backup and Restoration Monitoring and Incident Management Software Development Lifecycle (SDLC) Network Services SOC 2 Service Auditor s Reports are also conducted in accordance with the professional standard of SSAE 16. SOC2 reports are intended to meet the needs of a broad range of users that need to understand internal control at a service organization as it relates to security, availability, processing integrity, confidentiality and privacy and are intended for use by stakeholders (e.g., customers, regulators, business partners, suppliers, directors) of the service organization that have a thorough understanding of the service organization and its internal controls. The SOC 2 framework is a comprehensive set of criteria known as the Trust Services Principles (TSP) which are composed of the following five (5) sections: The security of a service organization' system The availability of a service organization's system The processing integrity of a service organization's system The confidentiality of the information that the service organization's system processes or maintains for user entities The privacy of personal information that the service organization collects, uses, retains, discloses, and disposes of for user entities The GFS services group has undergone a SOC 2 audit, to examine the suitability of the design and operating effectiveness of controls to meet the criteria for the security principle set forth in TSP section 100, Trust Services Principles and Criteria for Security, Availability, Processing Integrity, Confidentiality, and Privacy (Ref. [11]) Montrium Inc. Page 17 of 74

18 2.5 Microsoft Controls This section describes the audited controls implemented by Microsoft which serve to assure confidentiality, integrity and availability of data stored on the O365 platform. These controls are also referenced within the compliance assessment sections (see Section 3.2 and 3.3), where they respond to applicable regulatory requirements Security Policies and Procedures Microsoft has implemented a Security Policy which applies to Microsoft O365. The Security Organization control objective within the SOC 1 audit reported that the information security policies are implemented and communicated to the applicable employees. The GFS SOC 2 audit reported that the security policies are established, periodically reviewed and approved by a designated individual or group. The O365 ISO/IEC 27001:2005 audit reported that an approved information security policy has been published and communicated to all employees and relevant external parties Physical and Environmental Security The physical assets on which the O365 system resides Microsoft has been audited to verify that proper physical security controls are established to protect the physical assets forming the foundation of the O365 platform as part of the GFS SOC 2 audit report. The GFS SOC 2 audit reported that the GFS services group has implemented procedures to restrict physical access to the infrastructure elements including, but not limited to: Facilities Backup media Firewalls Routers Servers The GFS ISO/IEC 27001:2005 audit reported that procedural controls are in place for tracking and monitoring physical infrastructures and services, as well as a documented methodology for determining the asset security level Logical Security The O365 SOC 1 audit reported that Microsoft has implemented logical security controls to provide reasonable assurance that logical access to the O365 production infrastructure and systems is restricted to authorized personnel. User Account Management is performed using Active Directory which centralizes the authentication and authorization to the O365 environment. Policies and standards have been implemented to enforce appropriate user account password expiration, length, complexity and history Montrium Inc. Page 18 of 74

19 The GFS SOC2 audit reported that the GFS services group has implemented procedures to restrict logical access to the system including, but not limited to, the following measures: a. Logical access security measures to restrict access to information resources not deemed to be public b. Identification and authentication of users c. Registration and authorization of new users d. The process to make changes and updates to user profiles e. Distribution of output restricted to authorized users f. Restriction of access to offline storage, backup data, systems and media g. Restriction of access to system configurations, super-user functionality, master passwords, power utilities and security devices (for example, firewalls) The O365 ISO/IEC 27001:2005 audit reported that the logical access to the system is restricted to authorized personnel in accordance with an enforced access control policy System Monitoring and Maintenance The O365 SOC 1 audit reported that proper controls are established to provide reasonable assurance that the O365 platform is monitored to detect and remediate any security vulnerabilities. The following activities/controls were audited in relation to system monitoring and maintenance: Vulnerability and Patch Management Security Incident Management The GFS SOC 2 audit reported that proper controls are established to monitor the GFS infrastructure components and proper actions are taken to maintain compliance within its defined system security policies. Automated tools are used to monitor the security controls on a regular basis. The GFS group monitors, logs, reports and takes appropriate action to resolve events involving critical/suspicious activities Data Backup, Recovery and Retention The O365 SOC 1 audit reported that O365 utilizes secure backup system infrastructure delivered by the Global Foundation Services Data Protection Services. The GFS SOC 2 audit reported that the GFS Data Protection Services group provides secure backup retention and restoration of data in the Microsoft Online Services environment. The audit also reported that the recovery and backup process is tested on an annual basis Confidentiality The following excerpt for the publicly available Office 365 Standard Response to Request for Information - Security and Privacy (Ref. [13]) describes the technical controls which help to ensure confidentiality of data as it transmits between the customer and the O365 platform: 2013 Montrium Inc. Page 19 of 74

20 Customer access to services provided over the Internet originates from users Internet-enabled locations and ends at a Microsoft data center. These connections established between customers and Microsoft data centers are encrypted using industry-standard Transport Layer Security (TLS) /Secure Sockets Layer (SSL). The use of TLS/SSL effectively establishes a highly secure browser-to-server connection to help provide data confidentiality and integrity between the desktop and the data center. Filtering routers at the edge of the Office 365 services network provides security at the packet level for preventing unauthorized connections to Office 365 Services. The GFS SOC 2 audit reported that encryption or other equivalent security techniques are used to protect user authentication information and the corresponding session transmitted over the internet or other public networks Software Development / Change Management The O365 SOC 1 audit reported that a formal SDLC process is defined which governs the development of new features or major changes to the O365 platform with the goal of minimizing processing errors and security vulnerabilities within the environment. The SDLC process encompasses the following phases: Requirements gathering Design Implementation Verification Release Key stakeholders are required to provide approval of the tested code prior to deployment of newly developed or changed code into the production environment. The O365 SOC 1 audit also reported that a formal change control process has been established to provide reasonable assurance that changes to the production environment are made in a controlled manner. Ticketing systems are used to track changes which contain documented details including appropriate authorizations and approvals. The GFS SOC 2 audit of the GFS services verified adequate IT change management controls are established surrounding the following topics: Service Infrastructure and Support Systems Change Management Secure Configuration Imaging Network Change Management Network Patch Management The O365 ISO/IEC 27001:2005 audit reported that a procedural document covering change management is in place which covers security impact analysis, change control and component inventory management Montrium Inc. Page 20 of 74

This interpretation of the revised Annex

This interpretation of the revised Annex Reprinted from PHARMACEUTICAL ENGINEERING The Official Magazine of ISPE July/August 2011, Vol. 31 No. 4 www.ispe.org Copyright ISPE 2011 The ISPE GAMP Community of Practice (COP) provides its interpretation

More information

Addressing Cloud Computing Security Considerations

Addressing Cloud Computing Security Considerations Addressing Cloud Computing Security Considerations with Microsoft Office 365 Protect more Contents 2 Introduction 3 Key Security Considerations 4 Office 365 Service Stack 5 ISO Certifications for the Microsoft

More information

Pharma CloudAdoption. and Qualification Trends

Pharma CloudAdoption. and Qualification Trends Pharma CloudAdoption and Qualification Trends OurCloudExperience Numerous implementations of EDMS systems with external hosting for smaller life science clients Development of qualification strategy for

More information

Validating Enterprise Systems: A Practical Guide

Validating Enterprise Systems: A Practical Guide Table of Contents Validating Enterprise Systems: A Practical Guide Foreword 1 Introduction The Need for Guidance on Compliant Enterprise Systems What is an Enterprise System The Need to Validate Enterprise

More information

Compliance Response SIMATIC SIMATIC PCS 7 V8.1. Electronic Records / Electronic Signatures (ERES) Edition 03/2015. Answers for industry.

Compliance Response SIMATIC SIMATIC PCS 7 V8.1. Electronic Records / Electronic Signatures (ERES) Edition 03/2015. Answers for industry. SIMATIC SIMATIC PCS 7 V8.1 Electronic Records / Electronic Signatures (ERES) Compliance Response Edition 03/2015 Answers for industry. Compliance Response Electronic Records / Electronic Signatures (ERES)

More information

Oracle WebCenter Content

Oracle WebCenter Content Oracle WebCenter Content 21 CFR Part 11 Certification Kim Hutchings US Data Management Phone: 888-231-0816 Email: khutchings@usdatamanagement.com Introduction In May 2011, US Data Management (USDM) was

More information

Full Compliance Contents

Full Compliance Contents Full Compliance for and EU Annex 11 With the regulation support of Contents 1. Introduction 2 2. The regulations 2 3. FDA 3 Subpart B Electronic records 3 Subpart C Electronic Signatures 9 4. EU GMP Annex

More information

Services Providers. Ivan Soto

Services Providers. Ivan Soto SOP s for Managing Application Services Providers Ivan Soto Learning Objectives At the end of this session we will have covered: Types of Managed Services Outsourcing process Quality expectations for Managed

More information

Implementing Title 21 CFR Part 11 (Electronic Records ; Electronic Signatures) in Manufacturing Presented by: Steve Malyszko, P.E.

Implementing Title 21 CFR Part 11 (Electronic Records ; Electronic Signatures) in Manufacturing Presented by: Steve Malyszko, P.E. Implementing Title 21 CFR Part 11 (Electronic Records ; Electronic Signatures) in Manufacturing Presented by: Steve Malyszko, P.E. President & CEO Agenda Introduction Who is Malisko Engineering? Title

More information

INTRODUCTION. This book offers a systematic, ten-step approach, from the decision to validate to

INTRODUCTION. This book offers a systematic, ten-step approach, from the decision to validate to INTRODUCTION This book offers a systematic, ten-step approach, from the decision to validate to the assessment of the validation outcome, for validating configurable off-the-shelf (COTS) computer software

More information

TIBCO Spotfire and S+ Product Family

TIBCO Spotfire and S+ Product Family TIBCO Spotfire and S+ Product Family Compliance with 21 CFR Part 11, GxP and Related Software Validation Issues The Code of Federal Regulations Title 21 Part 11 is a significant regulatory requirement

More information

Computerized System Audits In A GCP Pharmaceutical Laboratory Environment

Computerized System Audits In A GCP Pharmaceutical Laboratory Environment IVTGXP_july06.qxd 6/28/06 1:09 PM Page 36 Computerized System Audits In A GCP Pharmaceutical Laboratory Environment By Maintaining data integrity for both clinical laboratory processes and patient data

More information

Compliance Response Edition 07/2009. SIMATIC WinCC V7.0 Compliance Response Electronic Records / Electronic Signatures. simatic wincc DOKUMENTATION

Compliance Response Edition 07/2009. SIMATIC WinCC V7.0 Compliance Response Electronic Records / Electronic Signatures. simatic wincc DOKUMENTATION Compliance Response Edition 07/2009 SIMATIC WinCC V7.0 Compliance Response Electronic Records / Electronic Signatures simatic wincc DOKUMENTATION Compliance Response Electronic Records / Electronic Signatures

More information

Using SharePoint 2013 for Managing Regulated Content in the Life Sciences. Presented by Paul Fenton President and CEO, Montrium

Using SharePoint 2013 for Managing Regulated Content in the Life Sciences. Presented by Paul Fenton President and CEO, Montrium Using SharePoint 2013 for Managing Regulated Content in the Life Sciences Presented by Paul Fenton President and CEO, Montrium Overview Informative Webinar that aims to provide an overview of how SharePoint

More information

21 CFR Part 11 Checklist

21 CFR Part 11 Checklist 21 CFR Part 11 Checklist GUIDE NOTOCORD - 113 Chemin de Ronde - 78290 Croissy-sur-Seine www.notocord.com my.notocord.com support@notocord.com +33 (0)1 34 80 00 00 1. Preliminary information 1.1. Purpose

More information

Electronic records and electronic signatures in the regulated environment of the pharmaceutical and medical device industries

Electronic records and electronic signatures in the regulated environment of the pharmaceutical and medical device industries White Paper No 01 I December 2010 Implementation of 21 CFR Part 11 in the epmotion Software Electronic records and electronic signatures in the regulated environment of the pharmaceutical and medical device

More information

rsdm and 21 CFR Part 11

rsdm and 21 CFR Part 11 rsdm and 21 CFR Part 11 Meeting the 21 CFR Part 11 Burden without Overburdening The right solutions for smaller biopharma. Nothing more. Nothing less. Prepared by: Ken VanLuvanee www.virtualregulatorysolutions.com

More information

Anypoint Platform Cloud Security and Compliance. Whitepaper

Anypoint Platform Cloud Security and Compliance. Whitepaper Anypoint Platform Cloud Security and Compliance Whitepaper 1 Overview Security is a top concern when evaluating cloud services, whether it be physical, network, infrastructure, platform or data security.

More information

SRA International Managed Information Systems Internal Audit Report

SRA International Managed Information Systems Internal Audit Report SRA International Managed Information Systems Internal Audit Report Report #2014-03 June 18, 2014 Table of Contents Executive Summary... 3 Background Information... 4 Background... 4 Audit Objectives...

More information

Microsoft s Compliance Framework for Online Services

Microsoft s Compliance Framework for Online Services Microsoft s Compliance Framework for Online Services Online Services Security and Compliance Executive summary Contents Executive summary 1 The changing landscape for online services compliance 4 How Microsoft

More information

REGULATIONS COMPLIANCE ASSESSMENT

REGULATIONS COMPLIANCE ASSESSMENT ALIX is free software: you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation. REGULATIONS COMPLIANCE ASSESSMENT BUSINESS

More information

Information security controls. Briefing for clients on Experian information security controls

Information security controls. Briefing for clients on Experian information security controls Information security controls Briefing for clients on Experian information security controls Introduction Security sits at the core of Experian s operations. The vast majority of modern organisations face

More information

The silver lining: Getting value and mitigating risk in cloud computing

The silver lining: Getting value and mitigating risk in cloud computing The silver lining: Getting value and mitigating risk in cloud computing Frequently asked questions The cloud is here to stay. And given its decreased costs and increased business agility, organizations

More information

Ayla Networks, Inc. SOC 3 SysTrust 2015

Ayla Networks, Inc. SOC 3 SysTrust 2015 Ayla Networks, Inc. SOC 3 SysTrust 2015 SOC 3 SYSTRUST FOR SERVICE ORGANIZATIONS REPORT July 1, 2015 To December 31, 2015 Table of Contents SECTION 1 INDEPENDENT SERVICE AUDITOR S REPORT... 2 SECTION 2

More information

Meeting the FDA s Requirements for Electronic Records and Electronic Signatures (21 CFR Part 11)

Meeting the FDA s Requirements for Electronic Records and Electronic Signatures (21 CFR Part 11) Meeting the FDA s Requirements for Electronic Records and Electronic Signatures (21 CFR Part 11) Executive Summary...3 Background...4 Internet Growth in the Pharmaceutical Industries...4 The Need for Security...4

More information

SAS 70 Type II Audits

SAS 70 Type II Audits Thinking from IntraLinks SAS 70 Type II Audits SAS 70 Type II Audits Ensuring Data Security, Reliability and Integrity If your organization shares sensitive data over the Internet, you need rigorous controls

More information

The Impact of 21 CFR Part 11 on Product Development

The Impact of 21 CFR Part 11 on Product Development The Impact of 21 CFR Part 11 on Product Development Product development has become an increasingly critical factor in highly-regulated life sciences industries. Biotechnology, medical device, and pharmaceutical

More information

Clinical Trials in the Cloud: A New Paradigm?

Clinical Trials in the Cloud: A New Paradigm? Marc Desgrousilliers CTO at Clinovo Clinical Trials in the Cloud: A New Paradigm? Marc Desgrousilliers CTO at Clinovo What is a Cloud? (1 of 3) "Cloud computing is a model for enabling convenient, on-demand

More information

Effectively using SOC 1, SOC 2, and SOC 3 reports for increased assurance over outsourced operations. kpmg.com

Effectively using SOC 1, SOC 2, and SOC 3 reports for increased assurance over outsourced operations. kpmg.com Effectively using SOC 1, SOC 2, and SOC 3 reports for increased assurance over outsourced operations kpmg.com b Section or Brochure name Effectively using SOC 1, SOC 2, and SOC 3 reports for increased

More information

Christchurch Polytechnic Institute of Technology Information Systems Acquisition, Development and Maintenance Security Standard

Christchurch Polytechnic Institute of Technology Information Systems Acquisition, Development and Maintenance Security Standard Christchurch Polytechnic Institute of Technology Information Systems Acquisition, Development and Maintenance Security Standard Corporate Policies & Procedures Section 1: General Administration Document

More information

Cloud Computing: What needs to Be Validated and Qualified. Ivan Soto

Cloud Computing: What needs to Be Validated and Qualified. Ivan Soto Cloud Computing: What needs to Be Validated and Qualified Ivan Soto Learning Objectives At the end of this session we will have covered: Technical Overview of the Cloud Risk Factors Cloud Security & Data

More information

GAMP 4 to GAMP 5 Summary

GAMP 4 to GAMP 5 Summary GAMP 4 to GAMP 5 Summary Introduction This document provides summary information on the GAMP 5 Guide and provides a mapping to the previous version, GAMP 4. It specifically provides: 1. Summary of Need

More information

Clinical database/ecrf validation: effective processes and procedures

Clinical database/ecrf validation: effective processes and procedures TITOLO SLIDE Testo Slide Testo Slide Testo Slide Clinical database/ecrf validation: effective processes and procedures IV BIAS ANNUAL CONGRESS Padova September, 26 th 2012 PQE WORKSHOP: What's new in Computerized

More information

GAMP 5 as a Suitable Framework for Validation of Electronic Document Management Systems On Premise and 'In the Cloud' Keith Williams CEO GxPi

GAMP 5 as a Suitable Framework for Validation of Electronic Document Management Systems On Premise and 'In the Cloud' Keith Williams CEO GxPi GAMP 5 as a Suitable Framework for Validation of Electronic Document Management Systems On Premise and 'In the Cloud' Keith Williams CEO GxPi Disclaimer The views and opinions expressed in the following

More information

Considerations When Validating Your Analyst Software Per GAMP 5

Considerations When Validating Your Analyst Software Per GAMP 5 WHITE PAPER Analyst Software Validation Service Considerations When Validating Your Analyst Software Per GAMP 5 Blair C. James, Stacy D. Nelson Introduction The purpose of this white paper is to assist

More information

Security Issues in Cloud Computing

Security Issues in Cloud Computing Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources

More information

DeltaV Capabilities for Electronic Records Management

DeltaV Capabilities for Electronic Records Management January 2013 Page 1 DeltaV Capabilities for Electronic Records Management This paper describes DeltaV s integrated solution for meeting FDA 21CFR Part 11 requirements in process automation applications

More information

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225

More information

CONTENTS. List of Tables List of Figures

CONTENTS. List of Tables List of Figures Prelims 13/3/06 9:11 pm Page iii CONTENTS List of Tables List of Figures ix xi 1 Introduction 1 1.1 The Need for Guidance on ERP System Validation 1 1.2 The Need to Validate ERP Systems 3 1.3 The ERP Implementation

More information

Welcome. Panel. Cloud Computing New Challenges in Data Integrity and Security 13 November 2014

Welcome. Panel. Cloud Computing New Challenges in Data Integrity and Security 13 November 2014 Welcome Cloud Computing New Challenges in Data Integrity and Security 13 November 2014 Panel Tracy Lampula, Associate Director of GIS Compliance, Vertex Pharmaceuticals William Sanborn, Director of Information

More information

DeltaV Capabilities for Electronic Records Management

DeltaV Capabilities for Electronic Records Management September 2004 Page 1 An integrated solution for meeting FDA 21CFR Part 11 requirements in process automation applications using a configurable off-the-shelf (COTS) solution Emerson Process Management.

More information

Declaration of Conformity 21 CFR Part 11 SIMATIC WinCC flexible 2007

Declaration of Conformity 21 CFR Part 11 SIMATIC WinCC flexible 2007 Declaration of Conformity 21 CFR Part 11 SIMATIC WinCC flexible 2007 SIEMENS AG Industry Sector Industry Automation D-76181 Karlsruhe, Federal Republic of Germany E-mail: pharma.aud@siemens.com Fax: +49

More information

Validation of a Cloud-Based ERP system, in practice. Regulatory Affairs Conference Raleigh. 8Th September 2014

Validation of a Cloud-Based ERP system, in practice. Regulatory Affairs Conference Raleigh. 8Th September 2014 Validation of a Cloud-Based ERP system, in practice. Regulatory Affairs Conference Raleigh. 8Th September What is the The Cloud Some Definitions The NIST Definition of Cloud computing Cloud computing is

More information

Self-Assessment of eresearch Compliance with 21 CFR Part 11, Electronic Record; Electronic Signatures

Self-Assessment of eresearch Compliance with 21 CFR Part 11, Electronic Record; Electronic Signatures Self-Assessment of eresearch Compliance with 21 CFR Part 11, Electronic Record; Electronic Signatures Subpart A General Provisions Sec. 11.1 Scope. (a) The regulations in this part set forth the criteria

More information

FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information

FINAL May 2005. Guideline on Security Systems for Safeguarding Customer Information FINAL May 2005 Guideline on Security Systems for Safeguarding Customer Information Table of Contents 1 Introduction 1 1.1 Purpose of Guideline 1 2 Definitions 2 3 Internal Controls and Procedures 2 3.1

More information

IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results

IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results Acquire or develop application systems software Controls provide reasonable assurance that application and system software is acquired or developed that effectively supports financial reporting requirements.

More information

WHITE PAPER. HIPAA-Compliant Data Backup and Disaster Recovery

WHITE PAPER. HIPAA-Compliant Data Backup and Disaster Recovery WHITE PAPER HIPAA-Compliant Data Backup and Disaster Recovery DOCUMENT INFORMATION HIPAA-Compliant Data Backup and Disaster Recovery PRINTED March 2011 COPYRIGHT Copyright 2011 VaultLogix, LLC. All Rights

More information

Domain 1 The Process of Auditing Information Systems

Domain 1 The Process of Auditing Information Systems Certified Information Systems Auditor (CISA ) Certification Course Description Our 5-day ISACA Certified Information Systems Auditor (CISA) training course equips information professionals with the knowledge

More information

CHIS, Inc. Privacy General Guidelines

CHIS, Inc. Privacy General Guidelines CHIS, Inc. and HIPAA CHIS, Inc. provides services to healthcare facilities and uses certain protected health information (PHI) in connection with performing these services. Therefore, CHIS, Inc. is classified

More information

www.pwc.com Third Party Risk Management 12 April 2012

www.pwc.com Third Party Risk Management 12 April 2012 www.pwc.com Third Party Risk Management 12 April 2012 Agenda 1. Introductions 2. Drivers of Increased Focus on Third Parties 3. Governance 4. Third Party Risks and Scope 5. Third Party Risk Profiling 6.

More information

The SaaS LMS and Total Cost of Ownership in FDA-Regulated Companies

The SaaS LMS and Total Cost of Ownership in FDA-Regulated Companies The SaaS LMS and Total Cost of Ownership in FDA-Regulated Companies The SaaS LMS and Total Cost of Ownership in FDA-Regulated Companies By Rob Sims, Director, Life Science, UL EduNeering When a Life Science

More information

IBM Cognos TM1 on Cloud Solution scalability with rapid time to value

IBM Cognos TM1 on Cloud Solution scalability with rapid time to value IBM Solution scalability with rapid time to value Cloud-based deployment for full performance management functionality Highlights Reduced IT overhead and increased utilization rates with less hardware.

More information

Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security

Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security Technical Paper Plain talk about security When it comes to Cloud deployment, security is top of mind for all concerned. The Infor CloudSuite team uses best-practice protocols and a thorough, continuous

More information

Cloud Computing and SaaS Environments

Cloud Computing and SaaS Environments Regulatory Considerations for Use of Cloud Computing and SaaS Environments Institute of Validation Technology Conference Qualifying and Validating Cloud and Virtualized IT Infrastructure Philadelphia PA

More information

A ChemoMetec A/S White Paper September 2013

A ChemoMetec A/S White Paper September 2013 NucleoCounter NC-3000, NucleoView NC-3000 Software and Code of Federal Regulation 21 Part 11; Electronic Records, Electronic Signatures (21 CFR Part 11) A ChemoMetec A/S White Paper September 2013 ChemoMetec

More information

Library Systems Security: On Premises & Off Premises

Library Systems Security: On Premises & Off Premises Library Systems Security: On Premises & Off Premises Guoying (Grace) Liu University of Windsor Leddy Library Huoxin (Michael) Zheng Castlebreck Inc. CLA 2015 Annual Conference, Ottawa, June 5, 2015 Information

More information

---Information Technology (IT) Specialist (GS-2210) IT Security Competency Model---

---Information Technology (IT) Specialist (GS-2210) IT Security Competency Model--- ---Information Technology (IT) Specialist (GS-2210) IT Security Model--- TECHNICAL COMPETENCIES Computer Forensics Knowledge of tools and techniques pertaining to legal evidence used in the analysis of

More information

Back to index of articles. Qualification of Computer Networks and Infrastructure

Back to index of articles. Qualification of Computer Networks and Infrastructure Back to index of articles Qualification of Computer Networks and Infrastructure R.D.McDowall McDowall Consulting Validation of computerised systems generally focuses on the providing documented evidence

More information

Information Security Policies. Version 6.1

Information Security Policies. Version 6.1 Information Security Policies Version 6.1 Information Security Policies Contents: 1. Information Security page 3 2. Business Continuity page 5 3. Compliance page 6 4. Outsourcing and Third Party Access

More information

Service Definition Document

Service Definition Document Service Definition Document QinetiQ Secure Cloud Protective Monitoring Service (AWARE) QinetiQ Secure Cloud Protective Monitoring Service (DETER) Secure Multi-Tenant Protective Monitoring Service (AWARE)

More information

Service Organization Controls 3 Report. Report on Hyland Software, Inc. s OnBase Online Cloud Platform, relevant to Security and Availability

Service Organization Controls 3 Report. Report on Hyland Software, Inc. s OnBase Online Cloud Platform, relevant to Security and Availability Service Organization Controls 3 Report Report on Hyland Software, Inc. s OnBase Online Cloud Platform, relevant to Security and Availability for the period May 1, 2015 through October 31, 2015 Ernst &

More information

Cloud Vendor Evaluation

Cloud Vendor Evaluation Cloud Vendor Evaluation Checklist Life Sciences in the Cloud Cloud Vendor Evaluation Checklist What to evaluate when choosing a cloud vendor in Life Sciences Cloud computing is radically changing business

More information

Xerox Mobile Print Cloud

Xerox Mobile Print Cloud September 2012 702P00860 Xerox Mobile Print Cloud Information Assurance Disclosure 2012 Xerox Corporation. All rights reserved. Xerox and Xerox and Design are trademarks of Xerox Corporation in the United

More information

Service Organization Control (SOC) Reports Focus on SOC 2 Reporting Standard

Service Organization Control (SOC) Reports Focus on SOC 2 Reporting Standard Information Systems Audit and Controls Association Service Organization Control (SOC) Reports Focus on SOC 2 Reporting Standard February 4, 2014 Tom Haberman, Principal, Deloitte & Touche LLP Reema Singh,

More information

Assessment of Vaisala Veriteq vlog Validation System Compliance to 21 CFR Part 11 Requirements

Assessment of Vaisala Veriteq vlog Validation System Compliance to 21 CFR Part 11 Requirements / WHITE PAPER Assessment of Vaisala Veriteq vlog Validation System Compliance to 21 CFR Part 11 Requirements The 21 CFR Part 11 rule states that the FDA view is that the risks of falsification, misinterpretation,

More information

OMCL Network of the Council of Europe QUALITY ASSURANCE DOCUMENT

OMCL Network of the Council of Europe QUALITY ASSURANCE DOCUMENT OMCL Network of the Council of Europe QUALITY ASSURANCE DOCUMENT PA/PH/OMCL (08) 69 3R Full document title and reference Document type VALIDATION OF COMPUTERISED SYSTEMS Legislative basis - CORE DOCUMENT

More information

05.0 Application Development

05.0 Application Development Number 5.0 Policy Owner Information Security and Technology Policy Application Development Effective 01/01/2014 Last Revision 12/30/2013 Department of Innovation and Technology 5. Application Development

More information

FormFire Application and IT Security. White Paper

FormFire Application and IT Security. White Paper FormFire Application and IT Security White Paper Contents Overview... 3 FormFire Corporate Security Policy... 3 Organizational Security... 3 Infrastructure and Security Team... 4 Application Development

More information

Considerations for validating SDS Software v2.x Enterprise Edition for the 7900HT Fast Real-Time PCR System per the GAMP 5 guide

Considerations for validating SDS Software v2.x Enterprise Edition for the 7900HT Fast Real-Time PCR System per the GAMP 5 guide WHITE PAPER SDS Software v2.x Enterprise Edition Considerations for validating SDS Software v2.x Enterprise Edition for the 7900HT Fast Real-Time PCR System per the GAMP 5 guide This white paper describes

More information

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)

More information

PDS (The Planetary Data System) Information Technology Security Plan for The Planetary Data System: [Node Name]

PDS (The Planetary Data System) Information Technology Security Plan for The Planetary Data System: [Node Name] PDS (The Planetary Data System) Information Technology Security Plan for The Planetary Data System: [Node Name] [Date] [Location] 1 Prepared by: [Author] [Title] Date Approved by: [Name] [Title] Date 2

More information

Regulated Applications in the Cloud

Regulated Applications in the Cloud Keith Williams CEO Regulated Applications in the Cloud Aspects of Security and Validation Statement on the Cloud and Pharma s added Complexity Clouds already make sense for many small and mediumsize businesses,

More information

Gatekeeper PKI Framework. February 2009. Registration Authority Operations Manual Review Criteria

Gatekeeper PKI Framework. February 2009. Registration Authority Operations Manual Review Criteria Gatekeeper PKI Framework ISBN 1 921182 24 5 Department of Finance and Deregulation Australian Government Information Management Office Commonwealth of Australia 2009 This work is copyright. Apart from

More information

BMC s Security Strategy for ITSM in the SaaS Environment

BMC s Security Strategy for ITSM in the SaaS Environment BMC s Security Strategy for ITSM in the SaaS Environment TABLE OF CONTENTS Introduction... 3 Data Security... 4 Secure Backup... 6 Administrative Access... 6 Patching Processes... 6 Security Certifications...

More information

Microsoft Online Subscription Agreement/Open Program License Amendment Microsoft Online Services Security Amendment Amendment ID MOS10

Microsoft Online Subscription Agreement/Open Program License Amendment Microsoft Online Services Security Amendment Amendment ID MOS10 Microsoft Online Subscription Agreement/Open Program License Amendment Microsoft Online Services Security Amendment Amendment ID This Microsoft Online Services Security Amendment ( Amendment ) is between

More information

INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION

INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION Information security is a critical issue for institutions of higher education (IHE). IHE face issues of risk, liability, business continuity,

More information

GoodData Corporation Security White Paper

GoodData Corporation Security White Paper GoodData Corporation Security White Paper May 2016 Executive Overview The GoodData Analytics Distribution Platform is designed to help Enterprises and Independent Software Vendors (ISVs) securely share

More information

White Paper How Noah Mobile uses Microsoft Azure Core Services

White Paper How Noah Mobile uses Microsoft Azure Core Services NoahMobile Documentation White Paper How Noah Mobile uses Microsoft Azure Core Services The Noah Mobile Cloud service is built for the Microsoft Azure platform. The solutions that are part of the Noah

More information

Strategic Compliance & Securing the Cloud. Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security

Strategic Compliance & Securing the Cloud. Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security Strategic Compliance & Securing the Cloud Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security Complexity and Challenges 2 Complexity and Challenges Compliance Regulatory entities

More information

Hosted SharePoint: Questions every provider should answer

Hosted SharePoint: Questions every provider should answer Hosted SharePoint: Questions every provider should answer Deciding to host your SharePoint environment in the Cloud is a game-changer for your company. The potential savings surrounding your time and money

More information

The Cloud in Regulatory Affairs - Validation, Risk Management and Chances -

The Cloud in Regulatory Affairs - Validation, Risk Management and Chances - 45 min Webinar: November 14th, 2014 The Cloud in Regulatory Affairs - Validation, Risk Management and Chances - www.cunesoft.com Rainer Schwarz Cunesoft Holger Spalt ivigilance 2014 Cunesoft GmbH PART

More information

Shiny Server Pro: Regulatory Compliance and Validation Issues

Shiny Server Pro: Regulatory Compliance and Validation Issues Shiny Server Pro: Regulatory Compliance and Validation Issues A Guidance Document for the Use of Shiny Server Pro in Regulated Clinical Trial Environments June 19, 2014 RStudio, Inc. 250 Northern Ave.

More information

Connectivity to Polycom RealPresence Platform Source Data

Connectivity to Polycom RealPresence Platform Source Data Polycom RealAccess Security White Paper The Polycom RealAccess service is delivered using the Software as a Service (SaaS) model. This white paper outlines how the service protects sensitive customer data

More information

Cloud Security Trust Cisco to Protect Your Data

Cloud Security Trust Cisco to Protect Your Data Trust Cisco to Protect Your Data As cloud adoption accelerates, organizations are increasingly placing their trust in third-party cloud service providers (CSPs). But can you fully trust your most sensitive

More information

Securing Oracle E-Business Suite in the Cloud

Securing Oracle E-Business Suite in the Cloud Securing Oracle E-Business Suite in the Cloud November 18, 2015 Stephen Kost Chief Technology Officer Integrigy Corporation Phil Reimann Director of Business Development Integrigy Corporation Agenda The

More information

Internet Banking Internal Control Questionnaire

Internet Banking Internal Control Questionnaire Internet Banking Internal Control Questionnaire Completed by: Date Completed: 1. Has the institution developed and implemented a sound system of internal controls over Internet banking technology and systems?

More information

Welcome Computer System Validation Training Delivered to FDA. ISPE Boston Area Chapter February 20, 2014

Welcome Computer System Validation Training Delivered to FDA. ISPE Boston Area Chapter February 20, 2014 Welcome Computer System Validation Training Delivered to FDA ISPE Boston Area Chapter February 20, 2014 1 Background Training Conducted on April 24, 2012 Food & Drug Administration Division of Manufacturing

More information

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V2.0, JULY 2015 Multiple Layers of Protection Overview Password Salted-Hash Thank you

More information

Autodesk PLM 360 Security Whitepaper

Autodesk PLM 360 Security Whitepaper Autodesk PLM 360 Autodesk PLM 360 Security Whitepaper May 1, 2015 trust.autodesk.com Contents Introduction... 1 Document Purpose... 1 Cloud Operations... 1 High Availability... 1 Physical Infrastructure

More information

Enrollment for Education Solutions Addendum Microsoft Online Services Agreement Amendment 10 EES17 --------------

Enrollment for Education Solutions Addendum Microsoft Online Services Agreement Amendment 10 EES17 -------------- w Microsoft Volume Licensing Enrollment for Education Solutions Addendum Microsoft Online Services Agreement Amendment 10 Enrollment for Education Solutions number Microsoft to complete --------------

More information

Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis

Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis Information Security Risk Assessment Checklist A High-Level Tool to Assist USG Institutions with Risk Analysis Updated Oct 2008 Introduction Information security is an important issue for the University

More information

Ellucian Cloud Services. Joe Street Cloud Services, Sr. Solution Consultant

Ellucian Cloud Services. Joe Street Cloud Services, Sr. Solution Consultant Ellucian Cloud Services Joe Street Cloud Services, Sr. Solution Consultant Confidentiality Statement The information contained herein is considered proprietary and highly confidential by Ellucian Managed

More information

Supplier Information Security Addendum for GE Restricted Data

Supplier Information Security Addendum for GE Restricted Data Supplier Information Security Addendum for GE Restricted Data This Supplier Information Security Addendum lists the security controls that GE Suppliers are required to adopt when accessing, processing,

More information

Cloud Computing An Auditor s Perspective

Cloud Computing An Auditor s Perspective Cloud Computing An Auditor s Perspective Sailesh Gadia, CPA, CISA, CIPP sgadia@kpmg.com December 9, 2010 Discussion Agenda Introduction to cloud computing Types of cloud services Benefits, challenges,

More information

Securing the Service Desk in the Cloud

Securing the Service Desk in the Cloud TECHNICAL WHITE PAPER Securing the Service Desk in the Cloud BMC s Security Strategy for ITSM in the SaaS Environment Introduction Faced with a growing number of regulatory, corporate, and industry requirements,

More information

IOD Incorporated. SOC 3 Report for IOD Incorporated

IOD Incorporated. SOC 3 Report for IOD Incorporated SOC 3 Report for IOD Incorporated For The Period From SOC 3 Report Table of Contents Section 1: Management of IOD Incorporated Service Organization s Assertion... 2 Section 2: Independent Accountant s

More information

Why SaaS (Software as a Service) and not COTS (Commercial Off The Shelf software)?

Why SaaS (Software as a Service) and not COTS (Commercial Off The Shelf software)? SaaS vs. COTS Why SaaS (Software as a Service) and not COTS (Commercial Off The Shelf software)? Unlike COTS solutions, SIMCO s CERDAAC is software that is offered as a service (SaaS). This offers several

More information

Information Security Program Management Standard

Information Security Program Management Standard State of California California Information Security Office Information Security Program Management Standard SIMM 5305-A September 2013 REVISION HISTORY REVISION DATE OF RELEASE OWNER SUMMARY OF CHANGES

More information