1 Mike Saleski 1 Safety Systems Configuration Control FAC 2009 Safety Systems Configuration Management E. Michael Saleski Control.

Slides:



Advertisements
Similar presentations
OPERATING EFFECTIVELY AT WESD. What is Internal Control? A process designed to provide reasonable assurance the organizations objectives are achieved.
Advertisements

Software Quality Assurance Plan
Checking & Corrective Action
Radiopharmaceutical Production
The International Security Standard
Chapter 7: Key Process Areas for Level 2: Repeatable - Arvind Kabir Yateesh.
More CMM Part Two : Details.
Lecture Outline 10 INFORMATION SYSTEMS SECURITY. Two types of auditors External auditor: The primary mission of the external auditors is to provide an.
Coping with Electronic Records Setting Standards for Private Sector E-records Retention.
AFISS Prospectus of Services AFISS offers HACCP food safety and food quality systems development and management services including preparation for regulatory.
Environmental Management Systems An Overview With Practical Applications.
Security Controls – What Works
Stepan Potiyenko ISS Sr.SW Developer.
Lecture 8. Quality Assurance/Quality Control The Islamic University of Gaza- Environmental Engineering Department Environmental Measurements (EENV 4244)
1 Roger Erickson 1 Coordination with Accelerator Systems NEH Accelerator Readiness Review Coordination with Accelerator Systems.
© 2005 by Prentice Hall Chapter 5 Maintaining Information Systems Modern Systems Analysis and Design Fourth Edition Jeffrey A. Hoffer Joey F. George Joseph.
E. M. Saleski FAC 11/11/08 Configuration Control of PPS FAC Review November 2008 E. Michael Saleski Controls Dept Safety.
Pertemuan 20 Matakuliah: A0214/Audit Sistem Informasi Tahun: 2007.
E. Michael Saleski PPS and April 20, 2006 LCLS Personnel Protection System and Beam Containment System E. Michael Saleski.
Configuration Management
Stephen S. Yau CSE , Fall Security Strategies.
Quality Assurance/Quality Control Policy
Breakout Group 2: Software Quality Assurance Outcome 8/18/10 1.
Hamid Shoaee Accelerator Readiness Dec. 2, ‘08 SLAC National Accelerator Laboratory Controls Department LCLS Maintenance.
Chapter 16 Maintaining Information Systems
Instructions and forms
Effectively Integrating Information Technology (IT) Security into the Acquisition Process Section 5: Security Controls.
Software Quality Assurance (SQA) Monitor the methods and standards used during the software development and verify their correct usage. What is Quality?
 Review the security rule as it pertains to ›Physical Safeguards ♦ How to protect the ePHI in the work environment ♦ Implementation ideas for your office.
NUAGA May 22,  IT Specialist, Utah Department of Technology Services (DTS)  Assigned to Department of Alcoholic Beverage Control  PCI Professional.
Laboratory Biorisk Management Standard CWA 15793:2008
Standard WBS Version 1.0 WBS2-3.pptPage 1 Standard Work Breakdown Structure Legend = Decomposes to lower level WBS elements 4.0 Implementation 4.0 Implementation.
FHM TRAINING TOOLS This training presentation is part of FHM’s commitment to creating and keeping safe workplaces. Be sure to check out all the training.
Commissioning of Fire Protection and Life Safety Systems Presented by: Charles Kilfoil Bechtel National Waste Treatment Plant Richland WA.
Elements of Clinical Trial Quality Assurance Regulatory Coordinator –SCTR SUCCESS Center QA Monitor – NIDA Clinical Trials Network Stephanie Gentilin,
Health Insurance Portability and Accountability Act of 1996 (HIPAA) Proposed Rule: Security and Electronic Signature Standards.
ETICS2 All Hands Meeting VEGA GmbH INFSOM-RI Uwe Mueller-Wilm Palermo, Oct ETICS Service Management Framework Business Objectives and “Best.
NEH ARR PPS 11AUG09 LCLS NEH Hutch Protection System E. Michael Saleski; QC Manager Michael G. Harms, Patrick Bong, James Murphy, Alan Hill; Engineers.
MD Digital Government Summit, June 26, Maryland Project Management Oversight & System Development Life Cycle (SDLC) Robert Krauss MD Digital Government.
School for drafting regulations Nuclear Safety Operation Vienna, 26 November -7 December 2012 Tea Bilic Zabric.
Mechanical Integrity Written Procedures. Lesson Objectives  Describe Required Written Procedures for Establishing an MI Program  List Acceptable Sources.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
© 2006 ITT Educational Services Inc. System Analysis for Software Engineers: Unit 3 Slide 1 Chapter 16 Maintaining Information Systems.
Georgia Institute of Technology CS 4320 Fall 2003.
1 FRENCH PROPOSAL FOR ESARR6 1 - BACKGROUND - 15/02/00 : Kick-off meeting, Presentation of the CAA/SRG input (SW01), Request from the chairman to comment.
Software Configuration Management Lessons Learned Patrick Bong Safety Systems Group Stanford Linear Accelerator Center.
Engineering Essential Characteristics Security Engineering Process Overview.
IAEA International Atomic Energy Agency IAEA Safety Standards for Research Reactors W. Kennedy Research Reactor Safety Section Division of Nuclear Installation.
Purpose: The purpose of CMM Integration is to provide guidance for improving your organization’s processes and your ability to manage the development,
1 Enzo Carrone 1 NEH Safety Systems NEH ARR 2009 NEH Safety Systems Enzo Carrone June 30 th, 2009.
Chapter 19: Building Systems with Assurance Dr. Wayne Summers Department of Computer Science Columbus State University
Information Security Measures Confidentiality IntegrityAccessibility Information cannot be available or disclosed to unauthorized persons, entities or.
Chapter 16 Maintaining Information Systems. Objectives:  Explain and contrast four types of system maintenance.  Describe factors affecting maintenance.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
1 Interfaces, Engineering and Standards. 2 Interfaces LoKI Interface document description for deliverables Elements: PBS number, Deliverable description,
BSA 385 Week 4 Individual Assignment Frequent Shopper Program Part 3 For the items specified in the technical architecture document developed for the Frequent.
Introduction for the Implementation of Software Configuration Management I thought I knew it all !
Accelerator Readiness Review October 31, 2006
Software Configuration Management
NIEP Evaluation PO&A “How-to” Guide and Issue Classification
Accelerator Operations Department Readiness (Part 2)
Concept of ACSF TAN (Type Approval Number)
Session II: System authority for ERTMS 4RP Trackside approval
Management of Change Report Errors to Management.
Chapter 19: Building Systems with Assurance
UConn NIST Compliance Project
Maintaining Information Systems (SAD- 18)
Chapter 16 Maintaining Information Systems
DOE Review of the LCLS Project October 2006
Radiopharmaceutical Production
Presentation transcript:

1 Mike Saleski 1 Safety Systems Configuration Control FAC 2009 Safety Systems Configuration Management E. Michael Saleski Control Dept Safety Systems Section QC Manager June 8, 2009

2 Mike Saleski 2 Safety Systems Configuration Control FAC 2009 Configuration Control Elements Prevention of Unintended Change Physical Security of System Labeling Training Control of Intended Change Work Planning (adequate review of design) Work Authorization (RSWCF) Verification of Work (RSWCF) Periodic Confirmation of System Integrity Routine testing and inspections

3 Mike Saleski 3 Safety Systems Configuration Control FAC 2009 SLAC Configuration Control Policies Guidelines for Operations Guideline 14 “Configuration Control of Radiation Safety Systems” Safety-significant systems are protected from inadvertent tampering by unauthorized persons This is achieved by a combination of physical security, system architecture, labeling/education, and frequent inspection Maintenance by authorized persons is subject to authorization via Radiation Safety Work Control Form Guideline 24 “Safety Review of Major Modifications” Work is also subject to the prescribed Safety Lifecycle process whenever the system is ‘changed’ Guidelines 27 “Testing of PPS Systems” Radiation Safety Systems Technical Basis Document

4 Mike Saleski 4 Safety Systems Configuration Control FAC 2009 Safety Systems Section Docs

5 Mike Saleski 5 Safety Systems Configuration Control FAC 2009 Safety System Lifecycle Describes the development, review, configuration management and testing process for the PPS from inception, to design, construction, commissioning, and through to operations and system modifications.

6 Mike Saleski 6 Safety Systems Configuration Control FAC 2009 Implementation, Operations, and Maintenance

7 Mike Saleski 7 Safety Systems Configuration Control FAC 2009 Proposed PLC PPS ‘Dev and Rev’

8 Mike Saleski 8 Safety Systems Configuration Control FAC 2009 Established SSS Design Review Process Strengths: Emphasis on review and development process and documentation Collects development and review docs for auditability Areas for Improvement: Increase emphasis that PDR = established system req’s Provide mechanism for post-PDR change requests

9 Mike Saleski 9 Safety Systems Configuration Control FAC 2009 Software Configuration Control Issues Program Security: All communication to the safety-critical PLCs is through TCP/IP to ‘buffer’ Allen-Bradley PLC, then via DeviceNet (serial data communication). Safety-critical program ‘smart card’ cannot be written to while in the PLC Communication from the safety-critical PLCs is through DeviceNet to ‘buffer’ Allen-Bradley PLC and output to control system via TCP/IP Network Access Security: Hardwire Enable from MCC required Only specific IP addresses are allowed to issue PPS commands Physical Access Security: PLCs and DeviceNet are inside locked racks. Version Management (next page):

10 Mike Saleski 10 Safety Systems Configuration Control FAC 2009 Software Version Management Software versions are checked during annual certification Written procedures Exist for extracting PPS code from CVS and uploading it to PLCs A documented training program tracks personnel PLC qualifications in the Section