SlideShare a Scribd company logo
GxP Validation In The
Cloud
Debunking The Most Popular Myths To Validating
SaaS Apps In A GxP Environment
By: Ed Morris, The Morris Group, LLC
Ed Morris, Managing Member
The Morris Group, LLC
2
• Twenty plus years consulting to Life Sciences clients related to regulatory compliance (21 CFR Part 210/211,
820, PDMA, GAMP, 21 CFR Part 11) Core expertise in system implementation and validation as well as data
management and analytics. Hands-on experience with validation strategy and IT governance related to new
architectures including Cloud, SaaS and SOA based systems. IT Quality Assurance related to Software
Development Lifecycle (SDLC) and change control
• Consulting Services
• Systems Implementation / Validation
• Audits and Assessments
• Remediation
• Technology Evaluation & Selection
• Performance Optimization
• Project Management
• Operational Domains
• Quality Assurance
• Pharmacovigilance
• Clinical Development
• Regulatory Affairs
• Manufacturing / Shop Floor
• Commercial Operations
• Current Projects
• IT Governance / Validation Strategy For Cloud
Based Clinical Data Management Platform
• Network security breach investigation /
remediation
• Clinical Vendor Qualification Audits
• For Cause audits / Root Cause Analysis
ZenQMS
3
• Jeff Thomas, Vice President email: jeff@zenqms.com
• ZenQMS offers a robust, affordable cloud-based QMS
• No Seat Licenses, Full access, Straightforward pricing
www.zenqms.com
• Software as a Service (SaaS)
Applications Allow For Easier & More
Affordable Implementations.
• Getting to SaaS requires an
understanding of the facts and the myths.
SaaS / Cloud Based Solutions
Myth 1:
My data is ‘floating’ around the Internet
5
• High availability gives the illusion that data
is “everywhere”
• Most Tier 1 cloud providers support the
ability to specify a geographic location or
region e.g. by country, state or city.
Myth 2:
My Data is Not Secure
6
• Often, cloud providers have multiple layers of security
including network and server based intrusion detection,
antivirus and malware systems.
• Data can be encrypted in-transit and at rest. The
majority of Tier 1 Cloud providers operate HIPAA
specific environments that are separate from the
general public cloud infrastructures
Myth 3: Without A Serial Number, a
Server Can’t Be Validated
7
● Traceability
● Virtual Machines should have a traceable
Instance ID
● Focus should be on the Systems Development
LifeCycle (SDLC)
● If SDLC follows GAMP V with a traceable ID, the
system can be considered compliant
Myth 4: There’s No Such Thing As A
“Pre-validated” System
• A validated system is less about the infrastructure or where it resides
and more about when it was installed and/or customized
• For instance, if a basic Customer Relationship Management (CRM)
system is installed and configured according to a set of base
requirements, it can be validated in that state.
• Theoretically, an organization can begin using the system provided
no changes are made to the configuration e.g. data fields, screens,
reports.
8
Myth 4: There’s No Such Thing As A
“Pre-validated” System (continued)
• Multi-tenant Systems. Execute a full validation of the “core system”
which is available for immediate use by new clients.
• Becomes the Gold Copy
• Any proposed configurations must be assessed for regulatory risk to
determine if additional validation is necessary.
• If so, the client specific user requirements are documented and a UAT
protocol is written and executed. Most user specific validations are
very brief and can be fully executed in just a few weeks.
9
Myth 5:
Cloud Providers Cannot Be Audited
• Physical audits of cloud data centers are typically not possible due to
strict premises security controls.
• TMG performs multiple IT QA audits per year. Rarely do they include
a detailed tour of the data center.
• Occasionally, we do make a brief visit to the data center to verify
certain controls such as physical access and fire suppression.
• Maintenance logs including backups, outages, patches and updates
are accessed outside of the data center itself.
1
0
Myth 5:
Cloud Providers Cannot Be Audited (cont’d)
• Twenty years ago, data centers were busy places with lots of
activity by operators running printers, loading tapes and launching
jobs. Today, all of those functions have been eliminated or
automated leaving data centers dark with no human presence
whatsoever
• If you were to audit a data center today what would you examine?
There’s just not much to see anymore
• The real audit is done through interviews with key personnel and
documentation reviews.
1
1
Myth 6:
I Am Not In Control Of My Data
● Control Vs. Possession?
○ Clients always own their data. It is their intellectual property.
○ The best way to control data is to manage its flow from entry, through
processing, storing, integration and archiving.
● All of this is defined in the SDLC of the given system by
documenting and testing integrations including:
○ Subscribers and Publishers – Unique Identification
○ Data Fields – Transport Mechanism - Encryption
○ Authentication - Boundaries
1
2
Myth 7: Automatic Software
Updates Require Re-validation
• Built-in maintenance and updates that come as part
of the subscription are one of the major values of a
SaaS or cloud based system.
• Your Vendor is responsible for change control and
re-validation if necessary
• Check with your vendor to understand frequency of
updates as well as the testing period available.
1
3
Review and Discussion
• Myth 1: My Data is ‘floating’ around the Internet
• Myth 2: My Data is Not Secure
• Myth 3: Without A Serial Number, a Server Can’t Be Validated
• Myth 4: There’s No Such Thing as A “Pre-validated” System
• Myth 5: Cloud Providers Cannot Be Audited
• Myth 6: I Am Not In Control Of My Data
• Myth 7: Automatic Software Updates Require Re-validation
Contact Information
• Ed Morris
• The Morris Group
• Ed.morris@themorrisgrp.com
• 973 713 2211
• www.themorrisgrp.com
• Jeff Thomas
• ZenQms
• jeff@zenqms.com
• 267 672 8999
• www.zenqms.com

More Related Content

What's hot

CSV Audit Presentation
CSV Audit PresentationCSV Audit Presentation
CSV Audit Presentation
Robert Ruemer
 
Computer System Validation - The Validation Master Plan
Computer System Validation - The Validation Master PlanComputer System Validation - The Validation Master Plan
Computer System Validation - The Validation Master Plan
Wolfgang Kuchinke
 
Cv 1
Cv 1Cv 1
Cv 1
libowq
 
Strategies for Conducting GxP Vendor Assessment of Cloud Service Providers - ...
Strategies for Conducting GxP Vendor Assessment of Cloud Service Providers - ...Strategies for Conducting GxP Vendor Assessment of Cloud Service Providers - ...
Strategies for Conducting GxP Vendor Assessment of Cloud Service Providers - ...
Montrium
 
Computerized System Validation Business Intelligence Solutions
Computerized System Validation Business Intelligence SolutionsComputerized System Validation Business Intelligence Solutions
Computerized System Validation Business Intelligence Solutions
Digital-360
 
Codex validation Group presentation
Codex validation Group presentationCodex validation Group presentation
Codex validation Group presentation
Walter Acevedo
 
Gamp Riskbased Approch To Validation
Gamp Riskbased Approch To ValidationGamp Riskbased Approch To Validation
Gamp Riskbased Approch To Validation
Rajendra Sadare
 
Computer system validations
Computer system validations Computer system validations
Computer system validations
Saikiran Koyalkar
 
SaaS System Validation, practical tips on getting validated for go-live and t...
SaaS System Validation, practical tips on getting validated for go-live and t...SaaS System Validation, practical tips on getting validated for go-live and t...
SaaS System Validation, practical tips on getting validated for go-live and t...
Steffan Stringer
 
Computerized System Validation : Understanding basics
Computerized System Validation : Understanding basics Computerized System Validation : Understanding basics
Computerized System Validation : Understanding basics
Anand Pandya
 
Overview of computer system validation
Overview of computer system validationOverview of computer system validation
Overview of computer system validation
Nilesh Damale
 
Overview of Computerized Systems Compliance Using the GAMP® 5 Guide
Overview of Computerized Systems Compliance Using the GAMP® 5 GuideOverview of Computerized Systems Compliance Using the GAMP® 5 Guide
Overview of Computerized Systems Compliance Using the GAMP® 5 Guide
ProPharma Group
 
Kelis king - a storehouse of vast knowledge on software testing and quality ...
Kelis king  - a storehouse of vast knowledge on software testing and quality ...Kelis king  - a storehouse of vast knowledge on software testing and quality ...
Kelis king - a storehouse of vast knowledge on software testing and quality ...
KelisKing
 
Validating SharePoint for Regulated Life Sciences Applications
Validating SharePoint for Regulated Life Sciences ApplicationsValidating SharePoint for Regulated Life Sciences Applications
Validating SharePoint for Regulated Life Sciences Applications
Montrium
 
Computer system validation
Computer system validationComputer system validation
Computer system validation
Payam Khorramshahi
 
CSV - Computer System Validation
CSV - Computer System Validation CSV - Computer System Validation
CSV - Computer System Validation
JayaKrishna161
 
Computer system validation
Computer system validation Computer system validation
Computer system validation
ShameerAbid
 
Process and Regulated Processes Software Validation Elements
Process and Regulated Processes Software Validation ElementsProcess and Regulated Processes Software Validation Elements
Process and Regulated Processes Software Validation Elements
Arta Doci
 
Overview on “Computer System Validation” CSV
Overview on  “Computer System Validation” CSVOverview on  “Computer System Validation” CSV
Overview on “Computer System Validation” CSV
Anil Sharma
 
Computer-System-Validation
Computer-System-ValidationComputer-System-Validation
Computer-System-ValidationHal Plant
 

What's hot (20)

CSV Audit Presentation
CSV Audit PresentationCSV Audit Presentation
CSV Audit Presentation
 
Computer System Validation - The Validation Master Plan
Computer System Validation - The Validation Master PlanComputer System Validation - The Validation Master Plan
Computer System Validation - The Validation Master Plan
 
Cv 1
Cv 1Cv 1
Cv 1
 
Strategies for Conducting GxP Vendor Assessment of Cloud Service Providers - ...
Strategies for Conducting GxP Vendor Assessment of Cloud Service Providers - ...Strategies for Conducting GxP Vendor Assessment of Cloud Service Providers - ...
Strategies for Conducting GxP Vendor Assessment of Cloud Service Providers - ...
 
Computerized System Validation Business Intelligence Solutions
Computerized System Validation Business Intelligence SolutionsComputerized System Validation Business Intelligence Solutions
Computerized System Validation Business Intelligence Solutions
 
Codex validation Group presentation
Codex validation Group presentationCodex validation Group presentation
Codex validation Group presentation
 
Gamp Riskbased Approch To Validation
Gamp Riskbased Approch To ValidationGamp Riskbased Approch To Validation
Gamp Riskbased Approch To Validation
 
Computer system validations
Computer system validations Computer system validations
Computer system validations
 
SaaS System Validation, practical tips on getting validated for go-live and t...
SaaS System Validation, practical tips on getting validated for go-live and t...SaaS System Validation, practical tips on getting validated for go-live and t...
SaaS System Validation, practical tips on getting validated for go-live and t...
 
Computerized System Validation : Understanding basics
Computerized System Validation : Understanding basics Computerized System Validation : Understanding basics
Computerized System Validation : Understanding basics
 
Overview of computer system validation
Overview of computer system validationOverview of computer system validation
Overview of computer system validation
 
Overview of Computerized Systems Compliance Using the GAMP® 5 Guide
Overview of Computerized Systems Compliance Using the GAMP® 5 GuideOverview of Computerized Systems Compliance Using the GAMP® 5 Guide
Overview of Computerized Systems Compliance Using the GAMP® 5 Guide
 
Kelis king - a storehouse of vast knowledge on software testing and quality ...
Kelis king  - a storehouse of vast knowledge on software testing and quality ...Kelis king  - a storehouse of vast knowledge on software testing and quality ...
Kelis king - a storehouse of vast knowledge on software testing and quality ...
 
Validating SharePoint for Regulated Life Sciences Applications
Validating SharePoint for Regulated Life Sciences ApplicationsValidating SharePoint for Regulated Life Sciences Applications
Validating SharePoint for Regulated Life Sciences Applications
 
Computer system validation
Computer system validationComputer system validation
Computer system validation
 
CSV - Computer System Validation
CSV - Computer System Validation CSV - Computer System Validation
CSV - Computer System Validation
 
Computer system validation
Computer system validation Computer system validation
Computer system validation
 
Process and Regulated Processes Software Validation Elements
Process and Regulated Processes Software Validation ElementsProcess and Regulated Processes Software Validation Elements
Process and Regulated Processes Software Validation Elements
 
Overview on “Computer System Validation” CSV
Overview on  “Computer System Validation” CSVOverview on  “Computer System Validation” CSV
Overview on “Computer System Validation” CSV
 
Computer-System-Validation
Computer-System-ValidationComputer-System-Validation
Computer-System-Validation
 

Viewers also liked

How to Spot a Good Document Control System
How to Spot a Good Document Control SystemHow to Spot a Good Document Control System
How to Spot a Good Document Control System
EtQ, Inc.
 
eDMS247 document control application
eDMS247 document control applicationeDMS247 document control application
eDMS247 document control application
Doug Littlejohn
 
Document control management march lagos
Document  control management   march lagosDocument  control management   march lagos
Document control management march lagos
Petro Nomics
 
Document Control in Regulated FDA Environments - When and how to stick with p...
Document Control in Regulated FDA Environments - When and how to stick with p...Document Control in Regulated FDA Environments - When and how to stick with p...
Document Control in Regulated FDA Environments - When and how to stick with p...
Jeff Thomas
 
Document Control in FDA Regulated Environments - When and how to automate
Document Control in FDA Regulated Environments - When and how to automateDocument Control in FDA Regulated Environments - When and how to automate
Document Control in FDA Regulated Environments - When and how to automate
Jeff Thomas
 
Top 5 document controller cover letter samples
Top 5 document controller cover letter samplesTop 5 document controller cover letter samples
Top 5 document controller cover letter samplesjompote
 
Document Control
Document ControlDocument Control
Document ControlAnggi Hafiz
 
2009 ARMA Toronto Symposium - Document Control on Capital Projects - Paper to...
2009 ARMA Toronto Symposium - Document Control on Capital Projects - Paper to...2009 ARMA Toronto Symposium - Document Control on Capital Projects - Paper to...
2009 ARMA Toronto Symposium - Document Control on Capital Projects - Paper to...
Keith Atteck C.Tech. ERMm
 

Viewers also liked (9)

How to Spot a Good Document Control System
How to Spot a Good Document Control SystemHow to Spot a Good Document Control System
How to Spot a Good Document Control System
 
eDMS247 document control application
eDMS247 document control applicationeDMS247 document control application
eDMS247 document control application
 
Document control management march lagos
Document  control management   march lagosDocument  control management   march lagos
Document control management march lagos
 
Document Control in Regulated FDA Environments - When and how to stick with p...
Document Control in Regulated FDA Environments - When and how to stick with p...Document Control in Regulated FDA Environments - When and how to stick with p...
Document Control in Regulated FDA Environments - When and how to stick with p...
 
Document Control in FDA Regulated Environments - When and how to automate
Document Control in FDA Regulated Environments - When and how to automateDocument Control in FDA Regulated Environments - When and how to automate
Document Control in FDA Regulated Environments - When and how to automate
 
Top 5 document controller cover letter samples
Top 5 document controller cover letter samplesTop 5 document controller cover letter samples
Top 5 document controller cover letter samples
 
Document Control
Document ControlDocument Control
Document Control
 
Document management 101 slideshare
Document management 101   slideshareDocument management 101   slideshare
Document management 101 slideshare
 
2009 ARMA Toronto Symposium - Document Control on Capital Projects - Paper to...
2009 ARMA Toronto Symposium - Document Control on Capital Projects - Paper to...2009 ARMA Toronto Symposium - Document Control on Capital Projects - Paper to...
2009 ARMA Toronto Symposium - Document Control on Capital Projects - Paper to...
 

Similar to Myths of validation

Lecture27 cc-security2
Lecture27 cc-security2Lecture27 cc-security2
Lecture27 cc-security2
Ankit Gupta
 
IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...
Leif Davidsen
 
3433 IBM messaging security why securing your environment is important-feb2...
3433   IBM messaging security why securing your environment is important-feb2...3433   IBM messaging security why securing your environment is important-feb2...
3433 IBM messaging security why securing your environment is important-feb2...
Robert Parker
 
Transforming cloud security into an advantage
Transforming cloud security into an advantageTransforming cloud security into an advantage
Transforming cloud security into an advantage
Moshe Ferber
 
PCI DSS and PA DSS Compliance
PCI DSS and PA DSS CompliancePCI DSS and PA DSS Compliance
PCI DSS and PA DSS Compliance
Kimberly Simon MBA
 
PCI DSS and PA DSS
PCI DSS and PA DSSPCI DSS and PA DSS
PCI DSS and PA DSS
Kimberly Simon MBA
 
45 Minutes to PCI Compliance in the Cloud
45 Minutes to PCI Compliance in the Cloud45 Minutes to PCI Compliance in the Cloud
45 Minutes to PCI Compliance in the Cloud
CloudPassage
 
Software Defined Networking in the ATMOSPHERE project
Software Defined Networking in the ATMOSPHERE projectSoftware Defined Networking in the ATMOSPHERE project
Software Defined Networking in the ATMOSPHERE project
ATMOSPHERE .
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud Computing
Falgun Rathod
 
Cloud Audit and Compliance
Cloud Audit and ComplianceCloud Audit and Compliance
Cloud Audit and Compliance
Quadrisk
 
Cloud Security: A matter of trust?
Cloud Security: A matter of trust?Cloud Security: A matter of trust?
Cloud Security: A matter of trust?
Mark Williams
 
Chapter_5_Security_CC.pptx
Chapter_5_Security_CC.pptxChapter_5_Security_CC.pptx
Chapter_5_Security_CC.pptx
LokNathRegmi1
 
Cloud Cmputing Security
Cloud Cmputing SecurityCloud Cmputing Security
Cloud Cmputing Security
Devyani Vaidya
 
dtechnClouologyassociatepart2
dtechnClouologyassociatepart2dtechnClouologyassociatepart2
dtechnClouologyassociatepart2
Anne Starr
 
Cloud-based vs. On-site CTMS - Which is Right for Your Organization?
Cloud-based vs. On-site CTMS - Which is Right for Your Organization?Cloud-based vs. On-site CTMS - Which is Right for Your Organization?
Cloud-based vs. On-site CTMS - Which is Right for Your Organization?Perficient
 
Security architecture best practices for saas applications
Security architecture best practices for saas applicationsSecurity architecture best practices for saas applications
Security architecture best practices for saas applications
kanimozhin
 
Access Assurance in the Cloud
Access Assurance in the CloudAccess Assurance in the Cloud
Access Assurance in the Cloud
Courion Corporation
 
Overcoming Barriers to the Cloud
Overcoming Barriers to the Cloud Overcoming Barriers to the Cloud
Overcoming Barriers to the Cloud
Andy Milsark
 
Riskfactorypcitheessentials 151125164111-lva1-app6892
Riskfactorypcitheessentials 151125164111-lva1-app6892Riskfactorypcitheessentials 151125164111-lva1-app6892
Riskfactorypcitheessentials 151125164111-lva1-app6892
Risk Crew
 
Open Science Grid security-atlas-t2 Bob Cowles
Open Science Grid security-atlas-t2 Bob CowlesOpen Science Grid security-atlas-t2 Bob Cowles
Open Science Grid security-atlas-t2 Bob Cowles
Information Security Awareness Group
 

Similar to Myths of validation (20)

Lecture27 cc-security2
Lecture27 cc-security2Lecture27 cc-security2
Lecture27 cc-security2
 
IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...
 
3433 IBM messaging security why securing your environment is important-feb2...
3433   IBM messaging security why securing your environment is important-feb2...3433   IBM messaging security why securing your environment is important-feb2...
3433 IBM messaging security why securing your environment is important-feb2...
 
Transforming cloud security into an advantage
Transforming cloud security into an advantageTransforming cloud security into an advantage
Transforming cloud security into an advantage
 
PCI DSS and PA DSS Compliance
PCI DSS and PA DSS CompliancePCI DSS and PA DSS Compliance
PCI DSS and PA DSS Compliance
 
PCI DSS and PA DSS
PCI DSS and PA DSSPCI DSS and PA DSS
PCI DSS and PA DSS
 
45 Minutes to PCI Compliance in the Cloud
45 Minutes to PCI Compliance in the Cloud45 Minutes to PCI Compliance in the Cloud
45 Minutes to PCI Compliance in the Cloud
 
Software Defined Networking in the ATMOSPHERE project
Software Defined Networking in the ATMOSPHERE projectSoftware Defined Networking in the ATMOSPHERE project
Software Defined Networking in the ATMOSPHERE project
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud Computing
 
Cloud Audit and Compliance
Cloud Audit and ComplianceCloud Audit and Compliance
Cloud Audit and Compliance
 
Cloud Security: A matter of trust?
Cloud Security: A matter of trust?Cloud Security: A matter of trust?
Cloud Security: A matter of trust?
 
Chapter_5_Security_CC.pptx
Chapter_5_Security_CC.pptxChapter_5_Security_CC.pptx
Chapter_5_Security_CC.pptx
 
Cloud Cmputing Security
Cloud Cmputing SecurityCloud Cmputing Security
Cloud Cmputing Security
 
dtechnClouologyassociatepart2
dtechnClouologyassociatepart2dtechnClouologyassociatepart2
dtechnClouologyassociatepart2
 
Cloud-based vs. On-site CTMS - Which is Right for Your Organization?
Cloud-based vs. On-site CTMS - Which is Right for Your Organization?Cloud-based vs. On-site CTMS - Which is Right for Your Organization?
Cloud-based vs. On-site CTMS - Which is Right for Your Organization?
 
Security architecture best practices for saas applications
Security architecture best practices for saas applicationsSecurity architecture best practices for saas applications
Security architecture best practices for saas applications
 
Access Assurance in the Cloud
Access Assurance in the CloudAccess Assurance in the Cloud
Access Assurance in the Cloud
 
Overcoming Barriers to the Cloud
Overcoming Barriers to the Cloud Overcoming Barriers to the Cloud
Overcoming Barriers to the Cloud
 
Riskfactorypcitheessentials 151125164111-lva1-app6892
Riskfactorypcitheessentials 151125164111-lva1-app6892Riskfactorypcitheessentials 151125164111-lva1-app6892
Riskfactorypcitheessentials 151125164111-lva1-app6892
 
Open Science Grid security-atlas-t2 Bob Cowles
Open Science Grid security-atlas-t2 Bob CowlesOpen Science Grid security-atlas-t2 Bob Cowles
Open Science Grid security-atlas-t2 Bob Cowles
 

Recently uploaded

This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
nirahealhty
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
laozhuseo02
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
ufdana
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Brad Spiegel Macon GA
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
Gal Baras
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
GTProductions1
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
JungkooksNonexistent
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
eutxy
 
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptxInternet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
VivekSinghShekhawat2
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Sanjeev Rampal
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
laozhuseo02
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
Javier Lasa
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
keoku
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
natyesu
 

Recently uploaded (20)

This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
 
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptxInternet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
 
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
 

Myths of validation

  • 1. GxP Validation In The Cloud Debunking The Most Popular Myths To Validating SaaS Apps In A GxP Environment By: Ed Morris, The Morris Group, LLC
  • 2. Ed Morris, Managing Member The Morris Group, LLC 2 • Twenty plus years consulting to Life Sciences clients related to regulatory compliance (21 CFR Part 210/211, 820, PDMA, GAMP, 21 CFR Part 11) Core expertise in system implementation and validation as well as data management and analytics. Hands-on experience with validation strategy and IT governance related to new architectures including Cloud, SaaS and SOA based systems. IT Quality Assurance related to Software Development Lifecycle (SDLC) and change control • Consulting Services • Systems Implementation / Validation • Audits and Assessments • Remediation • Technology Evaluation & Selection • Performance Optimization • Project Management • Operational Domains • Quality Assurance • Pharmacovigilance • Clinical Development • Regulatory Affairs • Manufacturing / Shop Floor • Commercial Operations • Current Projects • IT Governance / Validation Strategy For Cloud Based Clinical Data Management Platform • Network security breach investigation / remediation • Clinical Vendor Qualification Audits • For Cause audits / Root Cause Analysis
  • 3. ZenQMS 3 • Jeff Thomas, Vice President email: jeff@zenqms.com • ZenQMS offers a robust, affordable cloud-based QMS • No Seat Licenses, Full access, Straightforward pricing www.zenqms.com
  • 4. • Software as a Service (SaaS) Applications Allow For Easier & More Affordable Implementations. • Getting to SaaS requires an understanding of the facts and the myths. SaaS / Cloud Based Solutions
  • 5. Myth 1: My data is ‘floating’ around the Internet 5 • High availability gives the illusion that data is “everywhere” • Most Tier 1 cloud providers support the ability to specify a geographic location or region e.g. by country, state or city.
  • 6. Myth 2: My Data is Not Secure 6 • Often, cloud providers have multiple layers of security including network and server based intrusion detection, antivirus and malware systems. • Data can be encrypted in-transit and at rest. The majority of Tier 1 Cloud providers operate HIPAA specific environments that are separate from the general public cloud infrastructures
  • 7. Myth 3: Without A Serial Number, a Server Can’t Be Validated 7 ● Traceability ● Virtual Machines should have a traceable Instance ID ● Focus should be on the Systems Development LifeCycle (SDLC) ● If SDLC follows GAMP V with a traceable ID, the system can be considered compliant
  • 8. Myth 4: There’s No Such Thing As A “Pre-validated” System • A validated system is less about the infrastructure or where it resides and more about when it was installed and/or customized • For instance, if a basic Customer Relationship Management (CRM) system is installed and configured according to a set of base requirements, it can be validated in that state. • Theoretically, an organization can begin using the system provided no changes are made to the configuration e.g. data fields, screens, reports. 8
  • 9. Myth 4: There’s No Such Thing As A “Pre-validated” System (continued) • Multi-tenant Systems. Execute a full validation of the “core system” which is available for immediate use by new clients. • Becomes the Gold Copy • Any proposed configurations must be assessed for regulatory risk to determine if additional validation is necessary. • If so, the client specific user requirements are documented and a UAT protocol is written and executed. Most user specific validations are very brief and can be fully executed in just a few weeks. 9
  • 10. Myth 5: Cloud Providers Cannot Be Audited • Physical audits of cloud data centers are typically not possible due to strict premises security controls. • TMG performs multiple IT QA audits per year. Rarely do they include a detailed tour of the data center. • Occasionally, we do make a brief visit to the data center to verify certain controls such as physical access and fire suppression. • Maintenance logs including backups, outages, patches and updates are accessed outside of the data center itself. 1 0
  • 11. Myth 5: Cloud Providers Cannot Be Audited (cont’d) • Twenty years ago, data centers were busy places with lots of activity by operators running printers, loading tapes and launching jobs. Today, all of those functions have been eliminated or automated leaving data centers dark with no human presence whatsoever • If you were to audit a data center today what would you examine? There’s just not much to see anymore • The real audit is done through interviews with key personnel and documentation reviews. 1 1
  • 12. Myth 6: I Am Not In Control Of My Data ● Control Vs. Possession? ○ Clients always own their data. It is their intellectual property. ○ The best way to control data is to manage its flow from entry, through processing, storing, integration and archiving. ● All of this is defined in the SDLC of the given system by documenting and testing integrations including: ○ Subscribers and Publishers – Unique Identification ○ Data Fields – Transport Mechanism - Encryption ○ Authentication - Boundaries 1 2
  • 13. Myth 7: Automatic Software Updates Require Re-validation • Built-in maintenance and updates that come as part of the subscription are one of the major values of a SaaS or cloud based system. • Your Vendor is responsible for change control and re-validation if necessary • Check with your vendor to understand frequency of updates as well as the testing period available. 1 3
  • 14. Review and Discussion • Myth 1: My Data is ‘floating’ around the Internet • Myth 2: My Data is Not Secure • Myth 3: Without A Serial Number, a Server Can’t Be Validated • Myth 4: There’s No Such Thing as A “Pre-validated” System • Myth 5: Cloud Providers Cannot Be Audited • Myth 6: I Am Not In Control Of My Data • Myth 7: Automatic Software Updates Require Re-validation
  • 15. Contact Information • Ed Morris • The Morris Group • Ed.morris@themorrisgrp.com • 973 713 2211 • www.themorrisgrp.com • Jeff Thomas • ZenQms • jeff@zenqms.com • 267 672 8999 • www.zenqms.com