SlideShare a Scribd company logo
1 of 2
Download to read offline
IEC 61511 / ISA 84 Safety Lifecycle
 The safety lifecycle is defined as an
 engineering process that includes all of
 the steps necessary to achieve required
 functional safety. The lifecycle addresses
 all necessary activities involved in the
 implementation of safety-related systems,
 occurring during a period of time that
 starts at the concept phase of a project
 and finishes when all of the safety-related
 systems are no longer available for use.
 IEC 61511 identifies 12 key activities
 related to safety lifecycle management. To
 simplify things, the sequential phases are
 often grouped into three main phases:
 Analysis, Implementation, and Operation.
 For more information, go to:
 www.DeltaVSIS.com
IEC 61511 / ISA 84 Safety Lifecycle
                 Management of Functional Safety and                                      Analysis
                 Functional Safety Assessment and Auditing                                The main focus of the Analysis phase is to identify the required
                 Management of Functional Safety involves the identification of           safety instrumented functions and to define the related safety
                 management activities that are necessary to ensure functional            functional and safety integrity requirements.
                 safety objectives are met.                                               A hazard and risk assessment is performed to identify and assess
                 Functional Safety Assessments should be carried out at various           risk related to the hazardous events of the process and associated
                 stages during the implementation and operation phases of the             equipment. Based on risk reduction requirements that result from
                 safety lifecycle. This activity assesses the functional safety that is   the HAZOP, safety functions are allocated to protection layers.
                 achieved by the SIS. The choice of the assessment team                   These can be safety instrumented functions, or non-SIS safety
                 membership is important. The team should include technical,              functions such as relief valves, rupture disks, diking, etc. Finally,
                 application, and operations expertise as well as at least one senior     the specification of the functional and integrity requirements for
                 competent person not involved in the project design team.                each safety instrumented function are documented in the safety
                                                                                          requirement specifications (SRS).
                 Safety Lifecycle Structure and Planning                                  Implementation
                 Safety planning defines the activities that are required to be           The Implementation phase is the phase in which the SIS is
                 carried out along with the persons, department, organization or          designed, engineered, installed, commissioned and validated.
                 other units responsible to carry out these activities. This planning     Designing and developing other means of risk reduction is the
                 is updated as necessary through-out the entire safety life cycle.        development of non-SIS safeguards such as relief valves, rupture
                 Adequate planning should exist to ensure that the SIS meets the          disks, diking, etc.
                 safety requirements. This includes the definition of the safety          Validation is the final step to validate that the installed and
                 lifecycle, including the inputs, outputs, and verification activities.   commissioned SIS and its associated safety functions achieve the
                 A Safety Management System (SMS), or Safety Plan, must be in             requirements as stated in the safety requirement specification.
                 place to ensure that functional safety objectives are met and
                 appropriate auditing processes are defined. This includes
                 procedures for assessment, auditing, management of change,
                 configuration management, and timely implementation of
                 recommendations. The SMS defines who does what, and
                 includes policies and procedures for competency management.
                 Verification                                                             Operation
                 Verification demonstrates by review, analysis and/or testing             The objective of the Operation phase of the lifecycle is to ensure
                 that the required outputs satisfy the defined requirements               that the required SIL of each safety function is maintained and to
                 for the appropriate phases of the safety life cycle identified by        ensure that the hazard demand rate on the safety system and the
                 the verification planning.                                               availability of the safety system are consistent with the original
                                                                                          design assumptions.
                                                                                          If there are any significant increases in hazard demand rate or
                                                                                          decreases in the safety system availability between the design
                                                                                          assumptions and those found in the operation of the plant which
                                                                                          would compromise the plant safety targets then changes to the
                                                                                          safety system will have to be made in order to maintain the plant
                                                                                          safety.
              www.DeltaVSIS.com

More Related Content

What's hot

Iso27001 The Road To Certification
Iso27001   The Road To CertificationIso27001   The Road To Certification
Iso27001 The Road To Certificationtschraider
 
NIST 800-37 Certification & Accreditation Process
NIST 800-37 Certification & Accreditation ProcessNIST 800-37 Certification & Accreditation Process
NIST 800-37 Certification & Accreditation Processtimmcguinness
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...Donald E. Hester
 
Understanding the NIST Risk Management Framework: 800-37 Rev. 2
Understanding the NIST Risk Management Framework: 800-37 Rev. 2Understanding the NIST Risk Management Framework: 800-37 Rev. 2
Understanding the NIST Risk Management Framework: 800-37 Rev. 2Denise Tawwab
 
Nist.sp.800 37r2
Nist.sp.800 37r2Nist.sp.800 37r2
Nist.sp.800 37r2newbie2019
 
Centralizing security on the mainframe
Centralizing security on the mainframeCentralizing security on the mainframe
Centralizing security on the mainframeArun Gopinath
 
Information Security Continuous Monitoring within a Risk Management Framework
Information Security Continuous Monitoring within a Risk Management FrameworkInformation Security Continuous Monitoring within a Risk Management Framework
Information Security Continuous Monitoring within a Risk Management FrameworkWilliam McBorrough
 
How auditable is your disaster recovery program
How auditable is your disaster recovery programHow auditable is your disaster recovery program
How auditable is your disaster recovery programgeekmodeboy
 
NIST Risk Management Framework (RMF)
NIST Risk Management Framework (RMF)NIST Risk Management Framework (RMF)
NIST Risk Management Framework (RMF)James W. De Rienzo
 
Aips guide element 6 process safety knowledge rev 2
Aips guide   element 6 process safety knowledge rev 2Aips guide   element 6 process safety knowledge rev 2
Aips guide element 6 process safety knowledge rev 2bitsgian
 
SAFECode’s latest “Software Security Guidance for Agile Practitioners” White...
SAFECode’s latest “Software Security Guidance for Agile Practitioners”  White...SAFECode’s latest “Software Security Guidance for Agile Practitioners”  White...
SAFECode’s latest “Software Security Guidance for Agile Practitioners” White...EMC
 
The Demystification of successful cybersecurity initiatives.
The Demystification of successful cybersecurity initiatives.The Demystification of successful cybersecurity initiatives.
The Demystification of successful cybersecurity initiatives.FitCEO, Inc. (FCI)
 
Planning for security and security audit process
Planning for security and security audit processPlanning for security and security audit process
Planning for security and security audit processDivya Tiwari
 
Ch14-Software Engineering 9
Ch14-Software Engineering 9Ch14-Software Engineering 9
Ch14-Software Engineering 9Ian Sommerville
 
FISMA NextGen - Continuous Monitoring, Near Real-Time Risk Management
FISMA NextGen - Continuous Monitoring, Near Real-Time Risk ManagementFISMA NextGen - Continuous Monitoring, Near Real-Time Risk Management
FISMA NextGen - Continuous Monitoring, Near Real-Time Risk Managementdanphilpott
 
Chapter 10 security standart
Chapter 10 security standartChapter 10 security standart
Chapter 10 security standartnewbie2019
 
What’s making way for secure sdlc
What’s making way for secure sdlcWhat’s making way for secure sdlc
What’s making way for secure sdlcAvancercorp
 

What's hot (20)

Iso27001 The Road To Certification
Iso27001   The Road To CertificationIso27001   The Road To Certification
Iso27001 The Road To Certification
 
NIST 800-37 Certification & Accreditation Process
NIST 800-37 Certification & Accreditation ProcessNIST 800-37 Certification & Accreditation Process
NIST 800-37 Certification & Accreditation Process
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 8: Implement ...
 
8. operational risk management
8.  operational risk management8.  operational risk management
8. operational risk management
 
Understanding the NIST Risk Management Framework: 800-37 Rev. 2
Understanding the NIST Risk Management Framework: 800-37 Rev. 2Understanding the NIST Risk Management Framework: 800-37 Rev. 2
Understanding the NIST Risk Management Framework: 800-37 Rev. 2
 
Nist.sp.800 37r2
Nist.sp.800 37r2Nist.sp.800 37r2
Nist.sp.800 37r2
 
Centralizing security on the mainframe
Centralizing security on the mainframeCentralizing security on the mainframe
Centralizing security on the mainframe
 
Information Security Continuous Monitoring within a Risk Management Framework
Information Security Continuous Monitoring within a Risk Management FrameworkInformation Security Continuous Monitoring within a Risk Management Framework
Information Security Continuous Monitoring within a Risk Management Framework
 
How auditable is your disaster recovery program
How auditable is your disaster recovery programHow auditable is your disaster recovery program
How auditable is your disaster recovery program
 
NIST Risk Management Framework (RMF)
NIST Risk Management Framework (RMF)NIST Risk Management Framework (RMF)
NIST Risk Management Framework (RMF)
 
Aips guide element 6 process safety knowledge rev 2
Aips guide   element 6 process safety knowledge rev 2Aips guide   element 6 process safety knowledge rev 2
Aips guide element 6 process safety knowledge rev 2
 
SAFECode’s latest “Software Security Guidance for Agile Practitioners” White...
SAFECode’s latest “Software Security Guidance for Agile Practitioners”  White...SAFECode’s latest “Software Security Guidance for Agile Practitioners”  White...
SAFECode’s latest “Software Security Guidance for Agile Practitioners” White...
 
The Demystification of successful cybersecurity initiatives.
The Demystification of successful cybersecurity initiatives.The Demystification of successful cybersecurity initiatives.
The Demystification of successful cybersecurity initiatives.
 
Managing Compliance
Managing ComplianceManaging Compliance
Managing Compliance
 
Planning for security and security audit process
Planning for security and security audit processPlanning for security and security audit process
Planning for security and security audit process
 
Ch14-Software Engineering 9
Ch14-Software Engineering 9Ch14-Software Engineering 9
Ch14-Software Engineering 9
 
FISMA NextGen - Continuous Monitoring, Near Real-Time Risk Management
FISMA NextGen - Continuous Monitoring, Near Real-Time Risk ManagementFISMA NextGen - Continuous Monitoring, Near Real-Time Risk Management
FISMA NextGen - Continuous Monitoring, Near Real-Time Risk Management
 
Chapter 10 security standart
Chapter 10 security standartChapter 10 security standart
Chapter 10 security standart
 
Ebsl Technologies It Operations Internal Presentation
Ebsl Technologies It Operations Internal PresentationEbsl Technologies It Operations Internal Presentation
Ebsl Technologies It Operations Internal Presentation
 
What’s making way for secure sdlc
What’s making way for secure sdlcWhat’s making way for secure sdlc
What’s making way for secure sdlc
 

Similar to IEC Safety Lifecycle

Edgilis principles of isa may11
Edgilis principles of isa may11Edgilis principles of isa may11
Edgilis principles of isa may11Max Armbruster
 
Eplc security approach_practices_guide
Eplc security approach_practices_guideEplc security approach_practices_guide
Eplc security approach_practices_guidedizainioras
 
A Warrior's Journey: Building a Global AppSec Program - OWASP Global AppSec 2020
A Warrior's Journey: Building a Global AppSec Program - OWASP Global AppSec 2020A Warrior's Journey: Building a Global AppSec Program - OWASP Global AppSec 2020
A Warrior's Journey: Building a Global AppSec Program - OWASP Global AppSec 2020Brian Levine
 
DevSecOps: Integrating Security into DevOps
DevSecOps: Integrating Security into DevOpsDevSecOps: Integrating Security into DevOps
DevSecOps: Integrating Security into DevOpsDomain News Tech
 
Secure in Software Development Life Cycle
Secure in Software Development Life CycleSecure in Software Development Life Cycle
Secure in Software Development Life Cyclejosheph max
 
Scada implement secure - architecture
Scada implement secure - architectureScada implement secure - architecture
Scada implement secure - architectureFelipe Prado
 
Security management concepts and principles
Security management concepts and principlesSecurity management concepts and principles
Security management concepts and principlesDivya Tiwari
 
AN EXTENDED SECURITY MEASUREMENT FRAMEWORK FOR OPEN-SOURCE ENTERPRISE RESOURC...
AN EXTENDED SECURITY MEASUREMENT FRAMEWORK FOR OPEN-SOURCE ENTERPRISE RESOURC...AN EXTENDED SECURITY MEASUREMENT FRAMEWORK FOR OPEN-SOURCE ENTERPRISE RESOURC...
AN EXTENDED SECURITY MEASUREMENT FRAMEWORK FOR OPEN-SOURCE ENTERPRISE RESOURC...IJNSA Journal
 
Framework for Safety Critical System Software
Framework for Safety Critical System SoftwareFramework for Safety Critical System Software
Framework for Safety Critical System Softwareijtsrd
 
It Security Audit Process
It Security Audit ProcessIt Security Audit Process
It Security Audit ProcessRam Srivastava
 
Cloud Control Matrix CSA 云控制矩阵 v4 中英文版对照
Cloud Control Matrix CSA 云控制矩阵 v4 中英文版对照Cloud Control Matrix CSA 云控制矩阵 v4 中英文版对照
Cloud Control Matrix CSA 云控制矩阵 v4 中英文版对照chizhangufl
 
Building a Product Security Practice in a DevOps World
Building a Product Security Practice in a DevOps WorldBuilding a Product Security Practice in a DevOps World
Building a Product Security Practice in a DevOps WorldArun Prabhakar
 
Secure Software Development Life Cycle
Secure Software Development Life CycleSecure Software Development Life Cycle
Secure Software Development Life CycleMaurice Dawson
 
CHAPTER 15Security Quality Assurance TestingIn this chapter yo
CHAPTER 15Security Quality Assurance TestingIn this chapter yoCHAPTER 15Security Quality Assurance TestingIn this chapter yo
CHAPTER 15Security Quality Assurance TestingIn this chapter yoJinElias52
 
Information Technology Security Techniques Evaluation Criteria For It Secrit...
Information Technology  Security Techniques Evaluation Criteria For It Secrit...Information Technology  Security Techniques Evaluation Criteria For It Secrit...
Information Technology Security Techniques Evaluation Criteria For It Secrit...Vishnu Kesarwani
 
Verifikasi dan Validasi keamanan informasi
Verifikasi dan Validasi keamanan informasiVerifikasi dan Validasi keamanan informasi
Verifikasi dan Validasi keamanan informasirizqiariy
 
Reliability Instrumented System | Arrelic Insights
Reliability Instrumented System | Arrelic Insights Reliability Instrumented System | Arrelic Insights
Reliability Instrumented System | Arrelic Insights Arrelic
 
Integrating Security Across SDLC Phases
Integrating Security Across SDLC PhasesIntegrating Security Across SDLC Phases
Integrating Security Across SDLC PhasesIshrath Sultana
 
Cybersecurity Assurance at CloudSec 2015 Kuala Lumpur
Cybersecurity Assurance  at CloudSec 2015 Kuala LumpurCybersecurity Assurance  at CloudSec 2015 Kuala Lumpur
Cybersecurity Assurance at CloudSec 2015 Kuala LumpurAlan Yau Ti Dun
 
Security
SecuritySecurity
Securitya1aass
 

Similar to IEC Safety Lifecycle (20)

Edgilis principles of isa may11
Edgilis principles of isa may11Edgilis principles of isa may11
Edgilis principles of isa may11
 
Eplc security approach_practices_guide
Eplc security approach_practices_guideEplc security approach_practices_guide
Eplc security approach_practices_guide
 
A Warrior's Journey: Building a Global AppSec Program - OWASP Global AppSec 2020
A Warrior's Journey: Building a Global AppSec Program - OWASP Global AppSec 2020A Warrior's Journey: Building a Global AppSec Program - OWASP Global AppSec 2020
A Warrior's Journey: Building a Global AppSec Program - OWASP Global AppSec 2020
 
DevSecOps: Integrating Security into DevOps
DevSecOps: Integrating Security into DevOpsDevSecOps: Integrating Security into DevOps
DevSecOps: Integrating Security into DevOps
 
Secure in Software Development Life Cycle
Secure in Software Development Life CycleSecure in Software Development Life Cycle
Secure in Software Development Life Cycle
 
Scada implement secure - architecture
Scada implement secure - architectureScada implement secure - architecture
Scada implement secure - architecture
 
Security management concepts and principles
Security management concepts and principlesSecurity management concepts and principles
Security management concepts and principles
 
AN EXTENDED SECURITY MEASUREMENT FRAMEWORK FOR OPEN-SOURCE ENTERPRISE RESOURC...
AN EXTENDED SECURITY MEASUREMENT FRAMEWORK FOR OPEN-SOURCE ENTERPRISE RESOURC...AN EXTENDED SECURITY MEASUREMENT FRAMEWORK FOR OPEN-SOURCE ENTERPRISE RESOURC...
AN EXTENDED SECURITY MEASUREMENT FRAMEWORK FOR OPEN-SOURCE ENTERPRISE RESOURC...
 
Framework for Safety Critical System Software
Framework for Safety Critical System SoftwareFramework for Safety Critical System Software
Framework for Safety Critical System Software
 
It Security Audit Process
It Security Audit ProcessIt Security Audit Process
It Security Audit Process
 
Cloud Control Matrix CSA 云控制矩阵 v4 中英文版对照
Cloud Control Matrix CSA 云控制矩阵 v4 中英文版对照Cloud Control Matrix CSA 云控制矩阵 v4 中英文版对照
Cloud Control Matrix CSA 云控制矩阵 v4 中英文版对照
 
Building a Product Security Practice in a DevOps World
Building a Product Security Practice in a DevOps WorldBuilding a Product Security Practice in a DevOps World
Building a Product Security Practice in a DevOps World
 
Secure Software Development Life Cycle
Secure Software Development Life CycleSecure Software Development Life Cycle
Secure Software Development Life Cycle
 
CHAPTER 15Security Quality Assurance TestingIn this chapter yo
CHAPTER 15Security Quality Assurance TestingIn this chapter yoCHAPTER 15Security Quality Assurance TestingIn this chapter yo
CHAPTER 15Security Quality Assurance TestingIn this chapter yo
 
Information Technology Security Techniques Evaluation Criteria For It Secrit...
Information Technology  Security Techniques Evaluation Criteria For It Secrit...Information Technology  Security Techniques Evaluation Criteria For It Secrit...
Information Technology Security Techniques Evaluation Criteria For It Secrit...
 
Verifikasi dan Validasi keamanan informasi
Verifikasi dan Validasi keamanan informasiVerifikasi dan Validasi keamanan informasi
Verifikasi dan Validasi keamanan informasi
 
Reliability Instrumented System | Arrelic Insights
Reliability Instrumented System | Arrelic Insights Reliability Instrumented System | Arrelic Insights
Reliability Instrumented System | Arrelic Insights
 
Integrating Security Across SDLC Phases
Integrating Security Across SDLC PhasesIntegrating Security Across SDLC Phases
Integrating Security Across SDLC Phases
 
Cybersecurity Assurance at CloudSec 2015 Kuala Lumpur
Cybersecurity Assurance  at CloudSec 2015 Kuala LumpurCybersecurity Assurance  at CloudSec 2015 Kuala Lumpur
Cybersecurity Assurance at CloudSec 2015 Kuala Lumpur
 
Security
SecuritySecurity
Security
 

IEC Safety Lifecycle

  • 1. IEC 61511 / ISA 84 Safety Lifecycle The safety lifecycle is defined as an engineering process that includes all of the steps necessary to achieve required functional safety. The lifecycle addresses all necessary activities involved in the implementation of safety-related systems, occurring during a period of time that starts at the concept phase of a project and finishes when all of the safety-related systems are no longer available for use. IEC 61511 identifies 12 key activities related to safety lifecycle management. To simplify things, the sequential phases are often grouped into three main phases: Analysis, Implementation, and Operation. For more information, go to: www.DeltaVSIS.com
  • 2. IEC 61511 / ISA 84 Safety Lifecycle Management of Functional Safety and Analysis Functional Safety Assessment and Auditing The main focus of the Analysis phase is to identify the required Management of Functional Safety involves the identification of safety instrumented functions and to define the related safety management activities that are necessary to ensure functional functional and safety integrity requirements. safety objectives are met. A hazard and risk assessment is performed to identify and assess Functional Safety Assessments should be carried out at various risk related to the hazardous events of the process and associated stages during the implementation and operation phases of the equipment. Based on risk reduction requirements that result from safety lifecycle. This activity assesses the functional safety that is the HAZOP, safety functions are allocated to protection layers. achieved by the SIS. The choice of the assessment team These can be safety instrumented functions, or non-SIS safety membership is important. The team should include technical, functions such as relief valves, rupture disks, diking, etc. Finally, application, and operations expertise as well as at least one senior the specification of the functional and integrity requirements for competent person not involved in the project design team. each safety instrumented function are documented in the safety requirement specifications (SRS). Safety Lifecycle Structure and Planning Implementation Safety planning defines the activities that are required to be The Implementation phase is the phase in which the SIS is carried out along with the persons, department, organization or designed, engineered, installed, commissioned and validated. other units responsible to carry out these activities. This planning Designing and developing other means of risk reduction is the is updated as necessary through-out the entire safety life cycle. development of non-SIS safeguards such as relief valves, rupture Adequate planning should exist to ensure that the SIS meets the disks, diking, etc. safety requirements. This includes the definition of the safety Validation is the final step to validate that the installed and lifecycle, including the inputs, outputs, and verification activities. commissioned SIS and its associated safety functions achieve the A Safety Management System (SMS), or Safety Plan, must be in requirements as stated in the safety requirement specification. place to ensure that functional safety objectives are met and appropriate auditing processes are defined. This includes procedures for assessment, auditing, management of change, configuration management, and timely implementation of recommendations. The SMS defines who does what, and includes policies and procedures for competency management. Verification Operation Verification demonstrates by review, analysis and/or testing The objective of the Operation phase of the lifecycle is to ensure that the required outputs satisfy the defined requirements that the required SIL of each safety function is maintained and to for the appropriate phases of the safety life cycle identified by ensure that the hazard demand rate on the safety system and the the verification planning. availability of the safety system are consistent with the original design assumptions. If there are any significant increases in hazard demand rate or decreases in the safety system availability between the design assumptions and those found in the operation of the plant which would compromise the plant safety targets then changes to the safety system will have to be made in order to maintain the plant safety. www.DeltaVSIS.com