Integrating System Safety and Software Assurance



Similar documents
SOFTWARE VERIFICATION RESEARCH CENTRE SCHOOL OF INFORMATION TECHNOLOGY THE UNIVERSITY OF QUEENSLAND. Queensland 4072 Australia TECHNICAL REPORT

Introduction to Aviation Software Design Assurance

SAFE SOFTWARE FOR SPACE APPLICATIONS: BUILDING ON THE DO-178 EXPERIENCE. Cheryl A. Dorsey Digital Flight / Solutions cadorsey@df-solutions.

Certification Authorities Software Team (CAST) Position Paper CAST-9

Chapter 10. System Software Safety

Certification Authorities Software Team (CAST) Position Paper CAST-3

LSST Hazard Analysis Plan

AC REUSABLE SOFTWARE COMPONENTS

University of Paderborn Software Engineering Group II-25. Dr. Holger Giese. University of Paderborn Software Engineering Group. External facilities

Safety Management Systems (SMS) guidance for organisations

WORKSHOP RC EVI Integração de Sistemas Junho de 2011 Eng. Nelson José Wilmers Júnior

Safety Regulation Group SAFETY MANAGEMENT SYSTEMS GUIDANCE TO ORGANISATIONS. April

REQUIREMENTS OF SAFETY MANAGEMENT SYSTEM

Parameters for Efficient Software Certification

Environmental-Related Risk Assessment

Program Hazard Analysis

Advisory Circular. U.S. Department of Transportation Federal Aviation Administration

OSW TN002 - TMT GUIDELINES FOR SOFTWARE SAFETY TMT.SFT.TEC REL07

RTCA DO-178B/EUROCAE ED-12B

A System-safety process for by-wire automotive systems

asuresign Aero (NATEP Grant MA005)

Mauro Calvano. About Aviation Safety Management Systems

Software Safety -- Process Overview and Application

Safety and Airworthiness Cases for Unmanned System Control Segments. George Romanski, Joe Wlad S5 Symposium, Dayton, OH June 12-14, 2012

Mission Operation Ground. ESA. Mario Merri GSAW, Los Angeles, USA 2 Mar 2011 ESA UNCLASSIFIED

MODEL REGULATION SAFETY MANAGEMENT SYSTEM REGULATION. International Civil Aviation Organisation

Accurate Risk Assessment Using Multi-Relational Hazard/Mishap Pairings

Designing an Effective Risk Matrix

Technical Standard Order

SOFTWARE SAFETY STANDARD

UNCONTROLLED IF PRINTED SYSTEMS SAFETY

Civil Air Patrol BASIC LEVEL OPERATIONAL RISK MANAGEMENT

4 Applying DO-178B for safe airborne software

Safety Analysis and Certification of Open Distributed Systems. P. M. Conmy; Department of Computer Science, University of York, York, YO10 5DD U.K.

Design & Manufacture Seminar SOFTWARE SECURITY & DESIGN ASSURANCE JAYSON ROWE SENIOR ENGINEER AVIONICS

Certification Authorities Software Team (CAST) Position Paper CAST-26

Safety Integrity Levels

Software Safety Hazard Analysis

Fundamental Principles of Software Safety Assurance

Space product assurance

ISO 14971: Overview of the standard

A risk assessment procedure for the safety management of airport infrastructures

Safety-Critical Systems: Processes, Standards and Certification

Identifying and Understanding Relevant System Safety Standards for use in the Automotive Industry

Hazard Identification, Risk Assessment and Management Procedure. Documentation Control

Certification Authorities Software Team (CAST) Position Paper CAST-10

Dr. Brian Murray March 4, 2011

1.0 Safety Management System

OPERATIONAL RISK MANAGEMENT B STUDENT HANDOUT

Understanding Compliance with Automatic Dependent Surveillance Broadcast (ADS-B) Out

Interrelationship with other "Ability Engineering" and Logistics Groups

Software Review Job Aid - Supplement #1

The Use of M&S VV&A as a Risk Mitigation Strategy in Defense Acquisition

ORDER C. Effective Date: 03/08/12. Technical Standard Order Program

Guidance for Industry: Quality Risk Management

Lecture 17: Requirements Specifications

HQMC 20 Aug 04 E R R A T U M. to MCO B OPERATIONAL RISK MANAGEMENT (ORM)

Controlling Risks Safety Lifecycle

A System-Safety Process For By-Wire Automotive Systems

ARINC 653. An Avionics Standard for Safe, Partitioned Systems

DRAFT RESEARCH SUPPORT BUILDING AND INFRASTRUCTURE MODERNIZATION RISK MANAGEMENT PLAN. April 2009 SLAC I

Rev 1 January 16, 2004

8. Master Test Plan (MTP)

Verification and Validation of Mission Data Libraries for Electronic Warfare Operational Support

3.0 Risk Assessment and Analysis Techniques and Tools

System Safety: A Science and Technology Primer. The New England Chapter. of the System Safety Society. April, 2002

1. Software Engineering Overview

Commandes de vol électriques Airbus: une approche globale de la sûreté de fonctionnement

Aviation Safety Policy. Aviation Safety (AVS) Safety Management System Requirements

Safety Management Challenges for Aviation Cyber Physical Systems

European Aviation Safety Agency The Executive Director

Your Software Quality is Our Business. INDEPENDENT VERIFICATION AND VALIDATION (IV&V) WHITE PAPER Prepared by Adnet, Inc.

Version: 3.0. Effective From: 19/06/2014

Software testing. Objectives

Part-145: Approved Maintenance Organisations (Annex II (EC) 2042/2003)

Session 4. System Engineering Management. Session Speaker : Dr. Govind R. Kadambi. M S Ramaiah School of Advanced Studies 1

Rulemaking Directorate. Preliminary Regulatory Impact Assessment Explanatory Note 2012/2013

AP1000 European 18. Human Factors Engineering Design Control Document

Risk Management and Internal Audit Specialized Training Course Audit Risk Assessment Methodology

AEROSPACE ENGINEERING SERIES, GS-0861

Improving fire safety through engineering (rational designs)

Calculation of Risk Factor Using the Excel spreadsheet Calculation of Risk Factor.xls

CIVIL AVIATION ADVISORY PUBLICATION CAAP 50 SAFETY MANAGEMENT SYSTEM ( SMS )

SERVICES. Designing, deploying and supporting world class communications solutions.

Bringing Legacy Medical Devices into Usability Compliance. Shannon Clark 4/29/2015

Date: 9/30/15 AC No: Initiated by: AFS-300 Change: 0

CERTIFICATION MEMORANDUM

Risk/Issue Management Plan

Software-based medical devices from defibrillators

Systems Engineering. Designing, implementing, deploying and operating systems which include hardware, software and people

Space project management

Federal Aviation Administration ADS- B Installation Guidance

Safety Analysis for Nuclear Power Plants

Automating Code Reviews with Simulink Code Inspector

Transcription:

Integrating System Safety and Software Assurance Systems Certification and Integrity Directorate of Aviation Engineering Directorate General Technical Airworthiness 1 Overview Integration of software assurance into the system safety program. Discuss different ADF paradigms for software assurance. Explain application of software assurance to missionised hazards and capability integrity. 2

Complementary Approaches Perform functional analysis Does the software satisfy the requirements? (Did we build the product right?) Assign software assurance levels Allocate software assurance objectives Software Assurance System and Software Safety Design, code and test functions to meet objectives Verify satisfaction of software safety requirements Safer System Define software safety requirements to treat hazards Identify software contribution to hazards Identify mishaps, hazards and failure modes Are the requirements appropriate? (Did we build the right product?) 3 The Goal What are we trying to achieve? Establish a standard of proof that software exhibits the required behaviours. Which means What activities do I need to complete in order to prove that my software satisfies its requirements?

The Basic Concept The more important it is that the software should work, the more effort should be applied to proving that it does work. 5 Software Assurance Paradigms in the ADF ARP 75/761 & RTCA DO-178B Civil Certified Aircraft MIL-STD-882C & RTCA DO-178B Military Aircraft (recent programs) MIL-STD-882C & MIL-STD-98/DOD- STD-2167A Military Aircraft (legacy programs) 6

ARP 75/761 & RTCA DO-178B Civil Certified Aircraft 7 Applicable Standards FAR 2x.1309 Equipment, Systems and Installations AC 2x.1309 Guidance on complying with FAR 2x.1309 SAE ARP 75 Certification Considerations for Highly-Integrated or Complex Aircraft Systems A standard that can be used to demonstrate compliance with FAR 2x.1309 SAE ARP 761 Guidelines and Methods for Conducting the Safety Assessment Process on Civil Airborne Systems and Equipment Describes the techniques that underpin ARP 75 RTCA DO-178B Software Considerations in Airborne Systems and Equipment Certification Describes the techniques for treating the software aspects of compliance with ARP 75 8

ARP 75 System Safety Approach 9 ARP 75 to DO-178B Mapping Section 5. of ARP 75 Design Assurance Determination Failure Condition Classification Catastrophic Hazardous/Severe Major Major Minor No Safety Effect System Development Assurance Level A B C D E Note: Section 2.2.2 of DO-178B maps software levels to failure severities, but this is included only for historical reasons (DO-178B was released before ARP 75). Section 2.2.2 of DO-178B should never be used. RTCA DO-178B Software Levels 10

ARP 75 5..1 Architectural Considerations Section 5..1 allows for a reduction in assurance levels for: Partitioned Designs Each partition assigned its own level Dissimilar, Independent Designs Implementing an Aircraft Level Function Two Level Bs = Level A (but can only use once in any fault tree) Active/Monitor Parallel Design One to Level A, the other to Level C Backup Parallel Design Primary: Level A, Backup: Level C Note: examples above are for Catastrophic aircraft level failure conditions. 11 Example DO-178B Table 12

DO-178B Annex A Tables Table A.5 Verification of Outputs of Software Coding and Integration Process DO-178B Chapter 6 DO-178B Chapter 11 13 Is it really that easy? Hazardous/Severe Major Failure conditions that could result in a large reduction in safety margins. Major Failure conditions that could result in a significant reduction in safety margins. What is the difference between large and significant? 1

How does SCI-DGTA handle this? Look to FAA policy: ACs, TSOs, etc Best Reference: AC 23.1309-1D Appendix 1 No published list for Part 25 (high value IP) Another Example: TSO-C151b TAWS Software implementing the functions defined in this TSO must be developed to Level C as defined in RTCA DO-178B. 15 MIL-STD STD-882C & RTCA-DO DO-178B Military Aircraft (recent programs) 16

Integrating Software Assurance into Military System Safety Engineering Step 1: Functional Safety Analysis/Assessment Step 2: Categorisation of each software function IAW Safety Integrity Level (SIL) definitions Step 3: Providing the software development team with the required tasks for software development and test for each SIL (i.e. process objectives). Step : Implement the software development and test tasks in accordance with the SIL definitions. 17 MIL-STD-882C is Task Based Task 101 102 103 10 105 106 107 201 202 203 20 205 206 Title System Safety Program System Safety Program Plan Integration/Management of Associate Contractors etc System Safety Program Review/Audits SSG/SSWG Support Hazard Tracking and Risk Resolution System Safety Progress Summary Preliminary Hazard List Preliminary Hazard Analysis Safety Requirements/Criteria Analysis Subsystem Hazard Analysis System Hazard Analysis Operating and Support Hazard Analysis Note that there are no software specific tasks! Task Type MGT MGT MGT MGT MGT MGT MGT ENG ENG ENG ENG ENG ENG 18

Sample Hazard Severity Categories (MIL-STD-882C) Description Catastrophic Critical Marginal Negligible Cat I II III IV Definition Death, system loss or severe environmental damage. Severe injury, severe occupational illness, major system or environmental damage. Minor injury, minor occupational illness or minor system or environmental damage. Less than minor injury, occupational illness or less than minor system or environmental damage. 19 Sample Hazard Probability Levels (MIL-STD-882C) Description Cat Specific Individual Item Fleet or Inventory Frequent A Likely to occur frequently Continuously experienced Probable B Will occur several times in the life of an item Will occur frequently Occasional C Likely to occur some time in the life of an item Will occur several times Remote D Unlikely but possible to occur in the life of an item Unlikely but can reasonably be expected to occur Improbable E So unlikely it can be assumed occurrence may not be experienced Unlikely to occur, but possible 20

Sample Hazard Risk Index Matrix (MIL-STD-882C) CAT CRIT MAR NEG Frequent 1 3 6 10 Probable 2 5 8 12 Occasional 7 11 1 Remote 10 13 16 18 Improbable 15 17 19 20 Colours link to risk acceptance authority (e.g. ADF AA, OAA, OAAR, DAR). Likelihoods cannot be correctly assigned to software causal factors: how then does software fit into the above matrix? 21 Software Control Categories Control Category Ia Ib IIa IIb IIIa IIIb IV Direct control. Description Displays information that is directly and constantly relied upon. Direct control but time for intervention by independent safety system. Displays information that if incorrect, may lead to operator action/inaction that progressively degrades safety margins. Control over hazardous systems, but operator action required to complete the task. Displays information about discrete events that require an operator to respond to prevent a hazard occurring. No control of safety related functions. Summary of Definitions from 7001.05 Section 2 Chapter 7. 22

Software Hazard Risk Index Control I II III IV CAT 1 2 3 5 Hazard Category CRIT MAR 2 3 3 5 5 NEG 5 Aircraft hazards will mostly fall into here SHRI 1 2 3 5 DO-178B Level A B C D E Satisfaction of assurance level is the measure of hazard acceptability. 23 SHRI vs. HRI SHRIs and HRIs are not interchangeable or comparable. Consider multi-axis aircraft stability augmentation system. Loss of function Catastrophic. Probabilistic (hardware) Failure Modes: High Probability (> 10-2 ): HRI = 1 Low Probability (< 10-9 ): HRI = 15 HRI is a measure of acceptability Systematic (software) Failure Modes Poor Software: SHRI = 1 (Catastrophic/Control Category Ia) Good Software: SHRI = 1 (Catastrophic/Control Category Ia) SHRI is not a measure of acceptability. 2

Don t Confuse Methods Navigation System for Large Aircraft ARP 75 & DO-178B Loss of: Major Malfunction: Hazardous Requires DO-178B Level B MIL-STD-882C & DO-178B Hazard Category: Catastrophic (CFIT) Control Category: IIb (Display of Information) SHRI 2: Requires DO-178B Level B Incorrect Malfunction: Hazardous Critical in 882C terminology Control Category: IIb SHRI 3: Requires DO-178B Level C 25 MIL-STD STD-882C & MIL-STD STD-98/DOD- STD-2167A Military Aircraft (legacy programs) 26

MIL-STD-882C to MIL-STD-98 Mapping Hazard Category CAT CRIT MAR NEG Control I II III 1 2 3 2 3 3 IV 5 5 5 5 SHRI 1 2 3 5 MIL-STD-98 Level?????????? MIL-STD-98 does not define varying levels of development and verification rigour. 27 Software Assurance Matrix AAP 7001.05 Section 2 Chapter 7 28

From MIL-STD-882D Rev 1 29 Putting it All Together Commercial Aircraft FAR 2x.1309 Military Aircraft MIL-STD-882C AC 2x.1309 JSSSC SSSH DO-178B ARP 75/761 IEEE-1228 IEEE-1228 DO-178B These are the ADF preferred airworthiness standards for aviation software. 30

Weapons STANAG 0 and AOP 52 31 Background DEOP 102 approves the following software standards: AOP-52 Guidelines for the Safety and Suitability for Service of Safety Critical Computing Systems in Munitions Applications DEF (AUST) 5679 The Procurement of Computer-Based Safety Critical Systems IEEE/EIA STD 12207 Software Life Cycle Processes Implementation Considerations RTCA/DO-178B Software Considerations in Airborne Systems and Equipment Certification STANAG 0 Safety Design Requirements and Guidelines for Munitions Related Safety Critical Computing Systems STANAG 52 Safety Assessment Requirements for Munition Related Computing Systems 32

STANAG 0 STANAG 0 combines software safety and software assurance considerations. It identifies: Generic software safety requirements. Good software design practices. Verification benchmarks. Apply practices to Safety Critical Computing System Functions (SCCSF). Provides guidance on which functions are likely to be SCCSFs. Assigns example MIL-STD-882C control categories to weapon functions. 33 STANAG 0 Requirements Applicability F&E: Fuzes, Electronic Arming and Safety Devices S: Seekers GS: Guidance Systems T&L: Targeting and Launcher Control Systems P&F: Pointing and Firing Cutout Systems C&C: Command and Control Systems 3

Using STANAG 0 If STANAG 0 is to be used, there are a number of shortfalls that should be resolved: STANAG 0 was never ratified, so it doesn t really exist. SCI-DGTA is aware of at least two different versions. You may need to apply your own configuration control, or include a copy in the contract. Some requirements are ambiguous. Example: All software testing shall be controlled by a formal test coverage analysis and document. Computer based tools shall be used to ensure that the coverage is as complete as possible. When is coverage complete? Statement? Decision? Condition/Decision? Exhaustive? What is as complete as possible? You may need to provide clarification to some requirements. 35 AOP-52 AOP-52 replaced STANAG 0 and STANAG 52. Strikingly similar to the JSSSC SSSH. AOP-52 is a guidance document. It does not contain clear requirements. It would be very difficult, if not impossible, to apply it under a contract. But, it does contain good information and practices. You might be able to convert it to an enforceable standard. 36

Using STANAG 0 An Example Consider a weapon guidance system. Is it a Safety Critical Computing System Function? Probably: see para 5.3.a Any function which determines, controls, or directly influences the flight path of a munition system. Annex B: A guidance system with a self destruct capability is Control Category II: Software exercises control over potentially hazardous hardware systems, subsystems, or components allowing time for intervention by independent safety systems to mitigate the hazard. However, these systems by themselves are not considered adequate. Which requirements are applicable? See GS column of Table B-1. 37 Missionised Hazards and Capability Integrity 38

The Basic Concept The more important it is that the software should work, the more effort should be applied to proving that it does work.. except now the motivation is completion of the mission. 39 Definitions Missionised Hazards aircraft system hazards considered not only within benign operating environments but also within worst credible missionised scenarios. Capability Integrity functionality required for achieving mission objectives but with limited airworthiness impact. 0

Missionised Hazards May be considered as part of the functional and system-level hazard assessments. Operator input at SSWGs. Tracked and maintained through the hazard log. Requires good engineering judgement credible scenarios Examples??? Not used very often. 1 Capability Integrity Definitions Mission Critical Failure conditions would immediately raise the threat posed by external events (e.g. enemy action) to unacceptable levels and could result in loss of the aircraft. Mission Serious Failure conditions would reduce the capability of the aircraft or the ability of the crew to cope with adverse mission conditions to the extent that there would be: a large reduction in mission capabilities, higher workload such that the flight crew could not be relied upon to perform their tasks accurately or completely, or increased risk to aircrew and occupants. Mission Degraded Anything else. 2

Software Level Assignments Mission Failure Categorisation Mission Critical Mission Serious Mission Degraded AAP 7001.05 Section 2 Chapter 7 Software Level Assignment DO-178B Level C DO-178B Level D No additional objectives DO-178B sets objectives for developing and verifying high-integrity software. The need for high-integrity software can be driven by either safety or mission considerations. 3 Capability Integrity Examples Mission System Function RWR/MWS/CMDS Mission Failure Categorisation Mission Critical Considerations For aircraft that operate in a hostile environment (e.g. F/A-18) RWR/MWS/CMDS Mission Serious For aircraft that operate in a more benign environment (e.g. AAR) ESM Data Link Mission Serious Mission Degraded Large reduction in mission capabilities, but no direct threat to the aircraft. Mission more difficult, but still possible.

Capability Integrity Clearly articulated in the contract e.g. AAR to Level C, AP-3C ESM to Level D Mission assumptions verified by operators Input at SSWGs Documented Requires good engineering judgement credible scenarios 5 Summary Three paradigms for integrating software assurance into the system safety program. Civil: Severity of failure linked to assurance level. Military: Hazard Category and Control Category. Both: more safety critical more effort. Missionised Hazards Capability Integrity 6

Questions 7