MDEP Generic Common Position No DICWG 02



Similar documents
Steven A. Arndt Division of Engineering Office of Nuclear Reactor Regulation

IAEA 2015 INTERNATIONAL CONFERENCE ON COMPUTER SECURITY IN A NUCLEAR WORLD

Announcement of a new IAEA Co-ordinated Research Programme (CRP)

DRAFT REGULATORY GUIDE

REGULATORY GUIDE (Draft was issued as DG-1207, dated August 2012)

CORDEL Cooperation in Reactor Design Evaluation and Licensing

Olkiluoto 3 Experience

Code of Conduct on the Safety and Security of Radioactive Sources

Development and Application of POSAFE-Q PLC Platform

REGULATORY GUIDE (Draft was issued as DG-1267, dated August 2012)

Improving regulatory practices through the OECD-NEA Stress Corrosion Cracking and Cable Ageing Project (SCAP)

Application of FPGA-based Safety Controller for Implementation of NPPs I&C Systems Vladimir Sklyar, Technical Director

How To Control A Record System

Long term operation integrated processes for delivering extended asset performance

AP1000 European 18. Human Factors Engineering Design Control Document

AN ANALYSIS OF TECHNICAL SECURITY CONTROL REQUIREMENTS FOR DIGITAL I&C SYSTEMS IN NUCLEAR POWER PLANTS

ISO/IEC/IEEE The New International Software Testing Standards

Nuclear Safety Council Instruction number IS-19, of October 22 nd 2008, on the requirements of the nuclear facilities management system

ELECTROTECHNIQUE IEC INTERNATIONALE INTERNATIONAL ELECTROTECHNICAL

The value of accredited certification

CSNI Technical Opinion Papers

[NUGENESIS SAMPLE MANAGEMENT ] AMPLE IMPROVING LAB EFFICIENCY, ANAGEMENT ACCELERATING BUSINESS DECISIONS. bigstock.com $69

Nuclear Consultancy & Engineering Services

OECD SERIES ON PRINCIPLES OF GOOD LABORATORY PRACTICE AND COMPLIANCE MONITORING NUMBER 10 GLP CONSENSUS DOCUMENT

GFMAM Competency Specification for an ISO Asset Management System Auditor/Assessor First Edition, Version 2

IAEA-TECDOC-1328 Solutions for cost effective assessment of software based instrumentation and control systems in nuclear power plants

Win the energy challenge with ISO ISO energy management

ELECTRICAL AND I&C EQUIPMENT OF A NUCLEAR FACILITY

How To Write A Contract For Software Quality Assurance

Nuclear Power Plant Electrical Power Supply System Requirements

Plutonium Watch. Tracking Plutonium Inventories by David Albright and Kimberly Kramer. July 2005, Revised August 2005

International Training Course on Preventive and Protective Measures against Insider Threats at Nuclear Facilities PROSPECTUS

Summary of CIP Version 5 Standards

Foreign Obligations Notification Process

REGULATORY GUIDE 5.29 (Draft was issued as DG 5028, dated May 2012) SPECIAL NUCLEAR MATERIAL CONTROL AND ACCOUNTING SYSTEMS FOR NUCLEAR POWER PLANTS

Guidelines for the Acceptance of Manufacturer's Quality Assurance Systems for Welding Consumables

Options for Cyber Security. Reactors. April 9, 2015

Spillemyndigheden s Certification Programme Change Management Programme

International Organization for Standardization TC 215 Health Informatics. Audrey Dickerson, RN MS ISO/TC 215 Secretary

Regulatory Guide Configuration Management Plans for Digital Computer Software Used in Safety Systems of Nuclear Power Plants

Research Institute (KAERI) Daedeok-daero, Yuseong-gu, Daejeon, Republic of Korea

Human Factors in Design and Construction Regulatory Perspective

AN APPLICATION STUDY FOR THE CLASS IE DIGITAL CONTROL AND

Applying NQA-1 Requirements for Computer Software Used in Nuclear Facilities ASME 2014 Small Modular Reactors Symposium April 17, 2014

Cyber Security R&D (NE-1) and (NEET-4)

Security and Safeguards Considerations in Radioactive Waste Management. Canadian Nuclear Safety Commission

MANAGEMENT SYSTEM FOR A NUCLEAR FACILITY

Regulatory Guide Verification, Validation, Reviews, And Audits For Digital Computer Software Used in Safety Systems of Nuclear Power Plants

Office for Nuclear Regulation

Higher education institutions as places to integrate individual lifelong learning strategies

Spillemyndigheden s Certification Programme Information Security Management System

Sulfuric Acid 2013 World Market Outlook and Forecast up to 2017

DESIGN PROCESS AND CONTROL

Risk-Based Validation of Computer Systems Used In FDA-Regulated Activities


IEC TC106. Standards for the Assessment of Human Exposure to Electric, Magnetic, and Electromagnetic Fields, 0 to 300 GHz

NUCLEAR SECURITY CULTURE IN PRACTICE: IAEA GLOBAL APPROACH 20 March 2014, Amsterdam

Installation Qualification/Operational Qualification Protocols and Instructions. Experion Automated Electrophoresis Station and Software

The World Nuclear Industry Status Report 2014

Career Capital 2014 Global Research Results

Nuclear Safety Council Instruction number IS- 23 on in-service inspection at nuclear power plants

Software Inventory Best Practices. Issued: April 26, Approved: Bruce F Gordon 04/26/2016 Chairperson Date

PRODUCT INFORMATION. SICK LifeTime Services. LifeTime Services for Machines and Systems

How many students study abroad and where do they go?

BT Premium Event Call and Web Rate Card

U.S. NUCLEAR REGULATORY COMMISSION STANDARD REVIEW PLAN. Organization responsible for the review of instrumentation and controls

Market Access and Opportunities. Free Trade Agreements (Trade in Goods) Guide for SMEs

Interpreting the Management Process in IEEE/EIA with the Help of PMBOK

The Role of Nuclear Knowledge Management

NEI 06-13A [Revision 0] Template for an Industry Training Program Description

Preventing fraud and corruption in public procurement

Software Quality Assurance: VI Standards

Technical Meeting on Evaluation and Dependability Assessment of Software for Safety Instrumentation and Control Systems at Nuclear Power Plants

Quantum View SM Manage Administration Guide

DB2 to Oracle database Migration during JD Edwards Upgrade

AQF specification for the Doctoral Degree

IBM Rational systems and software solutions for the medical device industry

Cisco 2-Port OC-3/STM-1 Packet-over-SONET Port Adapter

APPENDIX B SUPPLEMENTAL INSPECTION PROGRAM A. OBJECTIVES AND PHILOSOPHY OF THE SUPPLEMENTAL INSPECTION PROGRAM

FPGA- based technology and systems for I&C of existing and advanced reactors

Update on ISO TC 265 Transportation and

Human Resource Management in Nuclear Safety

UNITED STATES NUCLEAR REGULATORY COMMISSION WASHINGTON, D.C March 3, 2011

Spillemyndigheden s Certification Programme Change Management Programme

Spillemyndigheden s Certification Programme Information Security Management System

How To Calculate Tertiary Type A Graduation Rate

Integrating Cyber Security into Nuclear Power Plant Safety Systems Design

The Status of Nuclear Power in the World Before and After Fukushima


STANDARD REVIEW PLAN

Transcription:

MDEP Generic Common Position No DICWG 02 Related to: Digital Instrumentation and Controls Working Group activities COMMON POSITION ON SOFTWARE TOOLS FOR THE DEVELOPMENT OF SOFTWARE FOR SAFETY SYSTEMS 1

Participation Countries involved in the MDEP working group discussions: Countries which support the present common position Countries with no objection: Countries which disagree Compatible with existing IAEA related documents Canada, Finland, France, India, Japan, People s Republic of China, Republic of Korea, Russian Federation, South Africa, the U.A.E., the U.K. and the U.S. Canada, Finland, France, India, Japan, People s Republic of China, Republic of Korea, Russian Federation, South Africa, the U.A.E., the U.K. and the U.S. Yes 2

Digital Instrumentation and Controls Working Group GENERIC COMMON POSITION DICWG NO2: COMMON POSITION ON SOFTWARE TOOLS FOR THE DEVELOPMENT OF SOFTWARE FOR SAFETY SYSTEMS Summary The Digital Instrumentation and Controls Working Group (DICWG) has agreed that a common position on this topic is warranted given the increase of use of Digital I&C in new reactor designs, its safety implications, and the need to develop a common understanding from the perspectives of regulatory authorities. This action follows the DICWG examination of the regulatory requirements of the participating members and of relevant industry standards and IAEA documents. The DICWG proposes a common position based on its recent experience with the new reactor application reviews and operating plant issues 1. Context The use of appropriate software tools can increase the integrity of the I&C development process, and hence product reliability, by reducing the risk of introducing faults during the process. The use of tools can also have economic benefits as they can reduce the time and human effort required to produce systems, components, and software. Tools can be used to automatically check for adherence to rules of construction and standards, to generate proper records and consistent documentation in standard formats, and to support change control. Tools can also reduce the effort required for testing and to maintain automated logs. In some cases tools are necessary because a specific development methodology requires their use. Tools are most powerful when they are defined to work co-operatively with each other. Scope and Definition of terms This common position applies to software tools used in the development of software for safety systems and software tools are defined to: support the capture of requirements, support the transformation of requirements into the final system code and data (there may be many intermediate steps), 1 The goal of MDEP is not to independently develop new regulatory standards. Common Positions are not legally binding and do not constitute additional obligations for the regulators or the licensees but are guidelines, recommendations, or assessments that the MDEP participants agree are good to highlight during their safety reviews of new reactors. Any MDEP member may decide to implement the common positions through its national regulatory process. 3

directly support the performance of verification, validation and testing, prepare and control application data, and manage and control of the processes and products involved in the software development. In this document safety system means a Class 1 system as defined in IEC 61226. The term safety system as used in this document is equivalent to the term safety system as defined in IEEE 603 which is incorporated into 10 CFR 50.55a (h) and the term safety related system as defined in 10 CFR 50.2. This common position does not apply to: tool support for complex programmable logic devices such as FPGAs, off-line tools, used to calculate important variables used during the design and analysis of safety systems, or office administration tools used to support tasks not directly concerned with software development (e.g., word processors and project management tools). on Software Tools: 1. Tools should be used to support all aspects of the I&C life cycle where benefits result through their use and where tools are available. A key element of integrated project support environments is to ensure proper control and consistency. If tools are not available, the development of new tools may need to be considered. 2. The benefits and risk of using a tool should be balanced against the benefits and risk of not using a tool. The important principle is to choose tools that limit the opportunity for making errors and introducing faults, but maximise the opportunity for detecting faults. System development may be adversely affected by the use of tools in several ways. For example, design tools may introduce faults by producing corrupted outputs; and verification tools may fail to reveal certain faults or types of faults. 3. The functionality and limits of applicability of all tools should be identified and documented. 4. The tools and their output should not be used outside their declared functionality or limits of application without prior justification. For example, tools cannot replace humans when judgement is involved. In some cases, tool support is more appropriate than complete automation of the process 5. Tools should be verified and assessed consistent with the type of tool and the potential of the tool to introduce faults. 4

For example: Verification is not necessary for tools that cannot introduce or fail to detect faults. Less rigor in tool verification may be accepted if there is mitigation of any potential tool faults (e.g. by process diversity or system design,), Verification is not necessary for the tool outputs that are always systematically verified. 6. The qualification process should take into account experience from prior use. 7. All tools should be under appropriate configuration management. 8. Tool parameters used during the development, verification, or validation of baseline equipment or software should be recorded in the development records. This is useful not only for the final software consistency; it also helps in assessing the origin of a fault, which may lie in the source code, in the tool, or in the tool parameters. It may also be necessary in the assessment of the potential for common cause failures due to software tools. 9. Section 14 of IEC standard 60880 provides acceptable guidance for the selection, qualification, and use of software tools for the development of software for safety systems. References Four Party Regulatory Consensus Report On The Safety Case For Computer-Based Systems In Nuclear Power Plants, November 1997 IAEA NS-G-1.1, Software for Computer Based Systems Important to Safety in Nuclear Power Plants IEC 60880, Nuclear power plants - Instrumentation and control systems important to safety - Software aspects for computer-based systems performing category A functions IEC 61226 Ed. 3, Nuclear power plants Instrumentation and control important to safety Classification of instrumentation and control functions, International Electrotechnical Commission, Geneva, Switzerland, 2009. IEEE 7-4.3.2, IEEE Standard Criteria for Digital Computers in Safety Systems of Nuclear Power Generating Stations Licensing of safety critical software for nuclear reactors. Common position of seven European nuclear regulators and authorised technical support organisations, 2007. 5