Download presentation
Presentation is loading. Please wait.
Published byPercival Wells Modified over 6 years ago
1
Proportionate Mitigation on Large Safety Related IT Projects
Mark Machin June 2017
2
Proportionate Mitigation
3
Agenda Large IT Supply Synergy of Domains Proportionate View
Challenges Summary
4
CGI Founded in 1976, CGI Group Inc. is the fifth largest independent information technology and business process services firm in the world. Approximately 68,000 professionals serve thousands of global clients across the Americas, Europe and Asia Pacific, with a comprehensive portfolio of services including high-end business and IT consulting, systems integration, application development and maintenance, and infrastructure management.
5
Large IT Supply
6
Standards Domains Aviation – Well established standards Defence – Well established internally with outward contracting and re-emergence of but positioning towards available commercial standards. Healthcare – Patient Safety primacy domain and clinical focus. Emergence of NHS safety standards in response to the growth of IT
7
Non Standards Domains Justice Systems Law Enforcement Local Government
Utilities Data Centric and Informing decisions Safety related in nature but requiring commercial supply
8
Large IT Challenges No longer bespoke single company systems
Consortia of integrators or suppliers COTS Open Source Distribution of operation – onshore/offshore Focus on Data Centric/Analytics Step change in complexity Susceptibility to unperceived risk
9
Don’t Panic
10
Synergy of Domains Process approaches and integrity requirements SIL/Software Integrity/ASIL from IEC 61508, DO-178C, IEC Goal based outlook from Def Stan , NHS SCCI-0129 Existing controls considered e.g. NHS IT hazard logs Cross domain initiatives on Data and Services by SCSC
11
Traditional Measures Existing safety analysis approaches new or old still apply Systematic nature of underlying software will still be evident Still seeking to: Design out Design Control in Test Sufficiency Operational Process and warnings
12
Proportionate Approach
Identify risks from the IT components Understand the inter-relationships Clear on availability of mitigation options
13
Proportionate Risk Establish the dependency and reliance on the IT output Determine the contributions and proximity to accident Understand the existing operational environment controls
14
Proportionate Mitigation
Identify practicable measures Demonstrate compliance to the safety requirements placed Apply process to assure achievement of residual risk
15
Proportionate Infrastructure
Reliability Redundancy Sufficiency of SLA Architectures
16
Proportionate Software and Data
COTS – Assure/additions Open Source – Manage change Interfaces – Configuration and interaction Software – Integration, wrappers, controls Data – Integrity and interoperation
17
Proportionate Service
Service Desk Support tiers Business continuity Disaster recovery
18
Achieving or Arguing Sufficiency
Justify sufficiency of proportional mitigation Demonstrate reduction in residual risk Relationship to the intended use
19
Paradigm Changes and Challenges
Agile/continuous development – Shouldn’t be ‘hacking’ but cost pressures can easy result in that effect being achieved. Suggest it also represents opportunity for continuous development of the safety assurance and have management of the residual risk which classical methods do not afford without significant cost implications. Cloud – Shift on centre of gravity of apps and data, increasing complexity and difficulty of integration and hence safety assurance. Traditional methods applied traditionally may breakdown, however methods are sound so repurposing and adaptation need to be considered. SaaS – Combines agile and cloud under a service container requiring service safety interaction to be considered….noticed SCSC commenced considering service safety…ITIL safety overlap perhaps? Machine Intelligence/RPA/AI – Organic evolution of Data centric and analysis. Further increases in complexity and ability to understand interactions sufficiency to assure. Drift to output based test?
20
Summary Understand interoperation within the wider operational environment Determine the risk contribution of the Large IT Define proportional levels of mitigation to address presented risk Justify sufficiency Agree with top duty holder
21
Questions
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.