Validating Enterprise Systems: A Practical Guide

Similar documents
CONTENTS. List of Tables List of Figures

Services Providers. Ivan Soto

Validation of a Cloud-Based ERP system, in practice. Regulatory Affairs Conference Raleigh. 8Th September 2014

Pharma CloudAdoption. and Qualification Trends

Cloud Courses Description

Cloud Courses Description

Domain 1 The Process of Auditing Information Systems

Dublin City University

Securing and Auditing Cloud Computing. Jason Alexander Chief Information Security Officer

ICT Category Sub Category Description Architecture and Design

Cloud Panel Service Evaluation Scenarios

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

Cloud Computing: What needs to Be Validated and Qualified. Ivan Soto

Public Benefit & Purpose

AMANDA Managed Services Understanding the benefits of moving to the cloud

Healthcare: La sicurezza nel Cloud October 18, IBM Corporation

Qualification Guideline

Cloud Computing in a Regulated Environment

Client Security Risk Assessment Questionnaire

How To Run A Cloud Based Data Centre

CLOUD IN HEALTHCARE EXECUTIVE SUMMARY 1/21/15

Managing Cloud Computing Risk

ENTERPRISE IT SERVICE MANAGEMENT BUREAU OF ENTERPRISE SYSTEMS AND TECHNOLOGY ENTERPRISE SERVICE DESCRIPTION FOR. Ocotber 2012

The Cloud is Not Enough Why Hybrid Infrastructure is Shaping the Future of Cloud Computing

Lot 1 Service Specification MANAGED SECURITY SERVICES

Why SaaS (Software as a Service) and not COTS (Commercial Off The Shelf software)?

ICT priorities in Canada

LEGAL ISSUES IN CLOUD COMPUTING

Request for Proposal for Application Development and Maintenance Services for XML Store platforms

Applying Business Architecture to the Cloud

Enterprise Governance and Planning

G-Cloud Service Description. Atos: Cloud Professional Services: Requirements Specification

GAMP 4 to GAMP 5 Summary

Project Management/Controls and their impact on Auditing and Accounting Issues. October 31, 2012

Roles & Grades Rate Cards and Applicable SFIA Skills

Federal Aviation Administration. efast. Cloud Computing Services. 25 October Federal Aviation Administration

Tribal Triple Play. Compliance Solutions

COMMERCIALISM INTEGRITY STEWARDSHIP. Back-up Policy & Guidance

Managed Hosting is a managed service provided by MN.IT. It is structured to help customers meet:

Report on Hong Kong SME Cloud Adoption and Security Readiness Survey

ALIGNING BUSINESS STRATEGY TO CLOUD APPLICATIONS

Guardian365. Managed IT Support Services Suite

Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus

Strategic Compliance & Securing the Cloud. Annalea Sharack-Ilg, CISSP, AMBCI Technical Director of Information Security

Security Issues in Cloud Computing

Migrating to Cloud Best Practices and Strategies. Srinivasa Raghavan, CTO Office

Risk-Based Validation of Computer Systems Used In FDA-Regulated Activities

Asset management guidelines

Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds.

IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results

The Cloud in Regulatory Affairs - Validation, Risk Management and Chances -

Configuration Management Why we should care! Anne-Rose Suriel Senior Systems Engineer

ICT Priorities in Pharmaceuticals

PHASE 5: DESIGN PHASE

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

Vistara Lifecycle Management

Welcome Computer System Validation Training Delivered to FDA. ISPE Boston Area Chapter February 20, 2014

Mapping the Technical Dependencies of Information Assets

Cloud Computing Security Issues

JOB DESCRIPTION CONTRACTUAL POSITION

SPLA Compliance Your Check List!

Cloud Computing and Records Management

Computer System Configuration Management and Change Control

Requirements Checklist for Choosing a Cloud Backup and Recovery Service Provider

HBR Consulting Data Center Service Offerings

Task Area 1: IT Services for Biomedical Research, Health Sciences, and Healthcare

Updating Your Skills from Microsoft Exchange Server 2003 or Exchange Server 2007 to Exchange Server 2010 SP1

SaaS or On-Premise? How to Select the Right Paths for Your Enterprise. David Linthicum

Carahsoft End-User Computing Solutions Services

Software Asset Management High Risk, High Reward

Goals. Understanding security testing

Oracle Technical Cloud Consulting Services Descriptions. July 23, 2015

An ITIL Perspective for Storage Resource Management

Security Officer s Checklist in a Sourcing Deal

Navigating through the cloud: A case study in opportunities & risks

Are You Prepared for the Cloud? Nick Kael Principal Security Strategist Symantec

What Every User Needs To Know Before Moving To The Cloud. LawyerDoneDeal Corp.

Innovation through Outsourcing

Fujitsu Private Cloud Customer Service Description

Quattra s Cloud Vision & Framework Value

Introduction to Cloud Computing What is SaaS? Conventional vs. SaaS Methodologies Validation Requirements Change Management Q&A

Cloud and Regulations: A match made in heaven, or the worst blind date ever?

END TO END DATA CENTRE SOLUTIONS COMPANY PROFILE

Applying CMMI SM In Information Technology Organizations SEPG 2003

Course Outline: Course 10165: Updating Your Skills from Microsoft Exchange Server 2003 or Exchange

Cloud Panel Draft Statement of Requirement

IT Architecture FOR DUMHIE5* by Kalani Kirk Hausman. and Susan L. Cook WILEY. Wiley Publishing/ Inc.

Confidence in the Cloud Five Ways to Capitalize with Symantec

Using SharePoint 2013 for Managing Regulated Content in the Life Sciences. Presented by Paul Fenton President and CEO, Montrium

Addressing Cloud Computing Security Considerations

Take Your Vision to the Cloud

Service Definition Document

GETTING THE MOST FROM THE CLOUD. A White Paper presented by

GENERAL RECORDS SCHEDULE 3.1: General Technology Management Records

Why Migrate to the Cloud. ABSS Solutions, Inc. 2014

IT Service Continuity Management PinkVERIFY

SRA International Managed Information Systems Internal Audit Report

IT Security Risk Management Model for Cloud Computing: A Need for a New Escalation Approach.

Computer System Configuration Management and Change Control

Transcription:

Table of Contents Validating Enterprise Systems: A Practical Guide Foreword 1 Introduction The Need for Guidance on Compliant Enterprise Systems What is an Enterprise System The Need to Validate Enterprise Systems The Enterprise System Implementation Phenomenon Background and Content Chapter by Chapter Background Reading 2 The Challenge of Enterprise Systems Breaking Down Silos Extending the Traditional Footprint The Move Towards Business Process Management The Need to Increase Software License Revenues Regulatory Compliance Challenges The Need to Validate Enterprise Systems 3 Acquisition and Procurement Stakeholder Involvement Cost of Compliant Ownership Package Assessment System integrator Selection Supplier Assessments Contractual Commitments Program Structure IT Infrastructure Qualification and Control 4 Developing and Documenting User (Business) Requirements What Are User Requirements For? Regulatory Expectations for User Requirements User Requirements Capture Use of Business Process Models Use of Process Narratives Leveraging Use Cases Including Business Rules Identifying Key Regulatory Requirements Non-Functional Requirements

Recommended Approach to User Requirement Specifications What about Functional Requirements? Requirements Identification, Verification and Allocation 5 Validation Planning Assumptions The Implementation Program Off-the-Shelf, System Specific Validation Models System Integrators Experience Validation Training Rapid Applications Development Configurable versus Custom Software System, not Software Development Lifecycle Roles and Responsibilities Risk Management 6 Governance Procedures Establishing Procedures Scope Roles and Responsibilities Program Team Training Document Management Configuration Management Change Control Change Control During the Implementation Phases Operational Change Control Incident and Defect Management Program Risks and Issues Regulatory and Business Risk Management Requirements Management Other program SOPs 7 Data Migration What Data Should We Migrate? Metadata and Audit Trails Risk Based Data Verification and Validation Manual Verification Automatic Verification Validated Data Migration Routines Data Migration Steps and Phases 8 Prototyping and Conference Room Pilots

The System Integrators View of Conference Room Pilots The Regulated Company View of Conference Room Pilots Successfully Positioning the Conference Room Pilot Interactive Conference Room Pilots Verification Conference Room Pilots One CRP or Two? Inputs to a Conference Room Pilot Outputs from a Conference Room Pilot Conference Room Pilots in a Validation Context 9 Test Strategies Testing and Other Forms of Verification To Test or Not To Test What Tests To Conduct Installation, Operational and Performance Qualification Risk Assessment and Testing Workflow Reports and Business Intelligence Interfaces Data Conversions Custom Extensions (including standard COTS software calling Extensions Standard Functional COTS Software Other Testing Test Planning, Management and Reporting 10 Managing Configuration Settings Configuration Settings Determining the Correct Configuration Settings Documenting Configuration Settings Verification of Configuration Settings Change Control and Configuration Management Configuration Settings Transport Verification of Configuration Settings between Instances 11 Electronic Records and Signatures Scope and Application Definition Documentation Technical Compliance Procedural, Security and User Issues 12 Customizations

What is a Customization Waterfall Development or Prototyping? Design Specifications Design Verification Software Development and Verification Change Control and Configuration Management Appropriate Testing Program Integration 13 Infrastructure Qualification Large, Complex Architectures Instances Environments The Impact of Virtualization Qualifying Environments Specifying and Installing Components Middleware and SOA Open Source Software The Desktop (or Laptop) Speciality Field Devices Common Items of IT Infrastructure 14 Detailed Risk Management Leverage Industry Good Practice Risk Management Scope and Process Risk Management Scope Risk Management Process Functional Risk Management Scaling the Risk Assessment and Risk Management Activities Initial Functional Risk Assessment Risk Severity and Requirements Requirements Allocation, Risk Likelihood and Probability of Detection Functional Risk Mitigation Technical Risk Management Managing Other Risks Is It Worth It? 15 SOPs and User Training Change Management and Regulatory Roles User Roles and the Need for Effective Communications Revising and Creating SOPs Training Users Verifying Successful Change

16 Testing Enterprise Systems Nature and Scope of Testing Pressure of Time Training, Tools and Templates Roles and Responsibilities Test Documentation The Role of Operational Qualification Unit Testing Integration Testing Functional Testing User Acceptance Testing The Use of Computer Based Test Tools 17 Validating Enterprise Applications In the Cloud Hosting and Managed Services versus The Cloud On-Premise versus Off-Premise Deployment Models Infrastructure, Platform and Software as a Service (IaaS, PaaS and SaaS) Software as a Service Issues Platform as Service Issues 18 Go Live! Going Live and the Validation Report The Validation Report Are We Ready? Proceeding at Risk Go Live! Gone Live 19 Post Go Live Additional Use Cases Enhanced Monitoring Initial Periodic Review Post Implementation Review Audit / Inspection Readiness Review 20 Retrospective Validation Assessment of the Existing System Supplier Assessment System Risk Assessment Assess Regulatory Requirements for Validation

System Assessment Gap Analysis Cost / Benefits Analysis Retrospective Validation Planning Validation and Reporting 21 Maintaining the Validated State Competency Centers Outsourcing New Requirements Upgrades and Patches Maintenance and Support Processes Intrusion Detection Vulnerability Management Anti-Virus Shield Updates Security Management Public Key Infrastructure Server Management Client Management Network Management Change Management Configuration Management Help (Service) Desk Management Incident and Problem Management Backup, Restore and Archiving Disaster Recovery Performance Monitoring Supplier Management Periodic Review Decommissioning 22 Conclusions Implementation and Validation Overview Conclusions Appendix A Definitions Appendix B References and Bibliography Appendix C Acknowledgements