SlideShare una empresa de Scribd logo
1 de 15
GxP Validation In The
Cloud
Debunking The Most Popular Myths To Validating
SaaS Apps In A GxP Environment
By: Ed Morris, The Morris Group, LLC
Ed Morris, Managing Member
The Morris Group, LLC
2
• Twenty plus years consulting to Life Sciences clients related to regulatory compliance (21 CFR Part 210/211,
820, PDMA, GAMP, 21 CFR Part 11) Core expertise in system implementation and validation as well as data
management and analytics. Hands-on experience with validation strategy and IT governance related to new
architectures including Cloud, SaaS and SOA based systems. IT Quality Assurance related to Software
Development Lifecycle (SDLC) and change control
• Consulting Services
• Systems Implementation / Validation
• Audits and Assessments
• Remediation
• Technology Evaluation & Selection
• Performance Optimization
• Project Management
• Operational Domains
• Quality Assurance
• Pharmacovigilance
• Clinical Development
• Regulatory Affairs
• Manufacturing / Shop Floor
• Commercial Operations
• Current Projects
• IT Governance / Validation Strategy For Cloud
Based Clinical Data Management Platform
• Network security breach investigation /
remediation
• Clinical Vendor Qualification Audits
• For Cause audits / Root Cause Analysis
ZenQMS
3
• Jeff Thomas, Vice President email: jeff@zenqms.com
• ZenQMS offers a robust, affordable cloud-based QMS
• No Seat Licenses, Full access, Straightforward pricing
www.zenqms.com
• Software as a Service (SaaS)
Applications Allow For Easier & More
Affordable Implementations.
• Getting to SaaS requires an
understanding of the facts and the myths.
SaaS / Cloud Based Solutions
Myth 1:
My data is ‘floating’ around the Internet
5
• High availability gives the illusion that data
is “everywhere”
• Most Tier 1 cloud providers support the
ability to specify a geographic location or
region e.g. by country, state or city.
Myth 2:
My Data is Not Secure
6
• Often, cloud providers have multiple layers of security
including network and server based intrusion detection,
antivirus and malware systems.
• Data can be encrypted in-transit and at rest. The
majority of Tier 1 Cloud providers operate HIPAA
specific environments that are separate from the
general public cloud infrastructures
Myth 3: Without A Serial Number, a
Server Can’t Be Validated
7
● Traceability
● Virtual Machines should have a traceable
Instance ID
● Focus should be on the Systems Development
LifeCycle (SDLC)
● If SDLC follows GAMP V with a traceable ID, the
system can be considered compliant
Myth 4: There’s No Such Thing As A
“Pre-validated” System
• A validated system is less about the infrastructure or where it resides
and more about when it was installed and/or customized
• For instance, if a basic Customer Relationship Management (CRM)
system is installed and configured according to a set of base
requirements, it can be validated in that state.
• Theoretically, an organization can begin using the system provided
no changes are made to the configuration e.g. data fields, screens,
reports.
8
Myth 4: There’s No Such Thing As A
“Pre-validated” System (continued)
• Multi-tenant Systems. Execute a full validation of the “core system”
which is available for immediate use by new clients.
• Becomes the Gold Copy
• Any proposed configurations must be assessed for regulatory risk to
determine if additional validation is necessary.
• If so, the client specific user requirements are documented and a UAT
protocol is written and executed. Most user specific validations are
very brief and can be fully executed in just a few weeks.
9
Myth 5:
Cloud Providers Cannot Be Audited
• Physical audits of cloud data centers are typically not possible due to
strict premises security controls.
• TMG performs multiple IT QA audits per year. Rarely do they include
a detailed tour of the data center.
• Occasionally, we do make a brief visit to the data center to verify
certain controls such as physical access and fire suppression.
• Maintenance logs including backups, outages, patches and updates
are accessed outside of the data center itself.
1
0
Myth 5:
Cloud Providers Cannot Be Audited (cont’d)
• Twenty years ago, data centers were busy places with lots of
activity by operators running printers, loading tapes and launching
jobs. Today, all of those functions have been eliminated or
automated leaving data centers dark with no human presence
whatsoever
• If you were to audit a data center today what would you examine?
There’s just not much to see anymore
• The real audit is done through interviews with key personnel and
documentation reviews.
1
1
Myth 6:
I Am Not In Control Of My Data
● Control Vs. Possession?
○ Clients always own their data. It is their intellectual property.
○ The best way to control data is to manage its flow from entry, through
processing, storing, integration and archiving.
● All of this is defined in the SDLC of the given system by
documenting and testing integrations including:
○ Subscribers and Publishers – Unique Identification
○ Data Fields – Transport Mechanism - Encryption
○ Authentication - Boundaries
1
2
Myth 7: Automatic Software
Updates Require Re-validation
• Built-in maintenance and updates that come as part
of the subscription are one of the major values of a
SaaS or cloud based system.
• Your Vendor is responsible for change control and
re-validation if necessary
• Check with your vendor to understand frequency of
updates as well as the testing period available.
1
3
Review and Discussion
• Myth 1: My Data is ‘floating’ around the Internet
• Myth 2: My Data is Not Secure
• Myth 3: Without A Serial Number, a Server Can’t Be Validated
• Myth 4: There’s No Such Thing as A “Pre-validated” System
• Myth 5: Cloud Providers Cannot Be Audited
• Myth 6: I Am Not In Control Of My Data
• Myth 7: Automatic Software Updates Require Re-validation
Contact Information
• Ed Morris
• The Morris Group
• Ed.morris@themorrisgrp.com
• 973 713 2211
• www.themorrisgrp.com
• Jeff Thomas
• ZenQms
• jeff@zenqms.com
• 267 672 8999
• www.zenqms.com

Más contenido relacionado

La actualidad más candente

CSV Audit Presentation
CSV Audit PresentationCSV Audit Presentation
CSV Audit PresentationRobert Ruemer
 
Computer System Validation - The Validation Master Plan
Computer System Validation - The Validation Master PlanComputer System Validation - The Validation Master Plan
Computer System Validation - The Validation Master PlanWolfgang Kuchinke
 
Strategies for Conducting GxP Vendor Assessment of Cloud Service Providers - ...
Strategies for Conducting GxP Vendor Assessment of Cloud Service Providers - ...Strategies for Conducting GxP Vendor Assessment of Cloud Service Providers - ...
Strategies for Conducting GxP Vendor Assessment of Cloud Service Providers - ...Montrium
 
Computerized System Validation Business Intelligence Solutions
Computerized System Validation Business Intelligence SolutionsComputerized System Validation Business Intelligence Solutions
Computerized System Validation Business Intelligence SolutionsDigital-360
 
Codex validation Group presentation
Codex validation Group presentationCodex validation Group presentation
Codex validation Group presentationWalter Acevedo
 
Gamp Riskbased Approch To Validation
Gamp Riskbased Approch To ValidationGamp Riskbased Approch To Validation
Gamp Riskbased Approch To ValidationRajendra Sadare
 
Computer system validations
Computer system validations Computer system validations
Computer system validations Saikiran Koyalkar
 
SaaS System Validation, practical tips on getting validated for go-live and t...
SaaS System Validation, practical tips on getting validated for go-live and t...SaaS System Validation, practical tips on getting validated for go-live and t...
SaaS System Validation, practical tips on getting validated for go-live and t...Steffan Stringer
 
Computerized System Validation : Understanding basics
Computerized System Validation : Understanding basics Computerized System Validation : Understanding basics
Computerized System Validation : Understanding basics Anand Pandya
 
Overview of computer system validation
Overview of computer system validationOverview of computer system validation
Overview of computer system validationNilesh Damale
 
Overview of Computerized Systems Compliance Using the GAMP® 5 Guide
Overview of Computerized Systems Compliance Using the GAMP® 5 GuideOverview of Computerized Systems Compliance Using the GAMP® 5 Guide
Overview of Computerized Systems Compliance Using the GAMP® 5 GuideProPharma Group
 
Kelis king - a storehouse of vast knowledge on software testing and quality ...
Kelis king  - a storehouse of vast knowledge on software testing and quality ...Kelis king  - a storehouse of vast knowledge on software testing and quality ...
Kelis king - a storehouse of vast knowledge on software testing and quality ...KelisKing
 
Validating SharePoint for Regulated Life Sciences Applications
Validating SharePoint for Regulated Life Sciences ApplicationsValidating SharePoint for Regulated Life Sciences Applications
Validating SharePoint for Regulated Life Sciences ApplicationsMontrium
 
CSV - Computer System Validation
CSV - Computer System Validation CSV - Computer System Validation
CSV - Computer System Validation JayaKrishna161
 
Computer system validation
Computer system validation Computer system validation
Computer system validation ShameerAbid
 
Process and Regulated Processes Software Validation Elements
Process and Regulated Processes Software Validation ElementsProcess and Regulated Processes Software Validation Elements
Process and Regulated Processes Software Validation ElementsArta Doci
 
Overview on “Computer System Validation” CSV
Overview on  “Computer System Validation” CSVOverview on  “Computer System Validation” CSV
Overview on “Computer System Validation” CSVAnil Sharma
 
Computer-System-Validation
Computer-System-ValidationComputer-System-Validation
Computer-System-ValidationHal Plant
 

La actualidad más candente (20)

CSV Audit Presentation
CSV Audit PresentationCSV Audit Presentation
CSV Audit Presentation
 
Computer System Validation - The Validation Master Plan
Computer System Validation - The Validation Master PlanComputer System Validation - The Validation Master Plan
Computer System Validation - The Validation Master Plan
 
Cv 1
Cv 1Cv 1
Cv 1
 
Strategies for Conducting GxP Vendor Assessment of Cloud Service Providers - ...
Strategies for Conducting GxP Vendor Assessment of Cloud Service Providers - ...Strategies for Conducting GxP Vendor Assessment of Cloud Service Providers - ...
Strategies for Conducting GxP Vendor Assessment of Cloud Service Providers - ...
 
Computerized System Validation Business Intelligence Solutions
Computerized System Validation Business Intelligence SolutionsComputerized System Validation Business Intelligence Solutions
Computerized System Validation Business Intelligence Solutions
 
Codex validation Group presentation
Codex validation Group presentationCodex validation Group presentation
Codex validation Group presentation
 
Gamp Riskbased Approch To Validation
Gamp Riskbased Approch To ValidationGamp Riskbased Approch To Validation
Gamp Riskbased Approch To Validation
 
Computer system validations
Computer system validations Computer system validations
Computer system validations
 
SaaS System Validation, practical tips on getting validated for go-live and t...
SaaS System Validation, practical tips on getting validated for go-live and t...SaaS System Validation, practical tips on getting validated for go-live and t...
SaaS System Validation, practical tips on getting validated for go-live and t...
 
Computerized System Validation : Understanding basics
Computerized System Validation : Understanding basics Computerized System Validation : Understanding basics
Computerized System Validation : Understanding basics
 
Overview of computer system validation
Overview of computer system validationOverview of computer system validation
Overview of computer system validation
 
Overview of Computerized Systems Compliance Using the GAMP® 5 Guide
Overview of Computerized Systems Compliance Using the GAMP® 5 GuideOverview of Computerized Systems Compliance Using the GAMP® 5 Guide
Overview of Computerized Systems Compliance Using the GAMP® 5 Guide
 
Kelis king - a storehouse of vast knowledge on software testing and quality ...
Kelis king  - a storehouse of vast knowledge on software testing and quality ...Kelis king  - a storehouse of vast knowledge on software testing and quality ...
Kelis king - a storehouse of vast knowledge on software testing and quality ...
 
Validating SharePoint for Regulated Life Sciences Applications
Validating SharePoint for Regulated Life Sciences ApplicationsValidating SharePoint for Regulated Life Sciences Applications
Validating SharePoint for Regulated Life Sciences Applications
 
Computer system validation
Computer system validationComputer system validation
Computer system validation
 
CSV - Computer System Validation
CSV - Computer System Validation CSV - Computer System Validation
CSV - Computer System Validation
 
Computer system validation
Computer system validation Computer system validation
Computer system validation
 
Process and Regulated Processes Software Validation Elements
Process and Regulated Processes Software Validation ElementsProcess and Regulated Processes Software Validation Elements
Process and Regulated Processes Software Validation Elements
 
Overview on “Computer System Validation” CSV
Overview on  “Computer System Validation” CSVOverview on  “Computer System Validation” CSV
Overview on “Computer System Validation” CSV
 
Computer-System-Validation
Computer-System-ValidationComputer-System-Validation
Computer-System-Validation
 

Destacado

How to Spot a Good Document Control System
How to Spot a Good Document Control SystemHow to Spot a Good Document Control System
How to Spot a Good Document Control SystemEtQ, Inc.
 
eDMS247 document control application
eDMS247 document control applicationeDMS247 document control application
eDMS247 document control applicationDoug Littlejohn
 
Document control management march lagos
Document  control management   march lagosDocument  control management   march lagos
Document control management march lagosPetro Nomics
 
Document Control in Regulated FDA Environments - When and how to stick with p...
Document Control in Regulated FDA Environments - When and how to stick with p...Document Control in Regulated FDA Environments - When and how to stick with p...
Document Control in Regulated FDA Environments - When and how to stick with p...Jeff Thomas
 
Document Control in FDA Regulated Environments - When and how to automate
Document Control in FDA Regulated Environments - When and how to automateDocument Control in FDA Regulated Environments - When and how to automate
Document Control in FDA Regulated Environments - When and how to automateJeff Thomas
 
Top 5 document controller cover letter samples
Top 5 document controller cover letter samplesTop 5 document controller cover letter samples
Top 5 document controller cover letter samplesjompote
 
Document Control
Document ControlDocument Control
Document ControlAnggi Hafiz
 
2009 ARMA Toronto Symposium - Document Control on Capital Projects - Paper to...
2009 ARMA Toronto Symposium - Document Control on Capital Projects - Paper to...2009 ARMA Toronto Symposium - Document Control on Capital Projects - Paper to...
2009 ARMA Toronto Symposium - Document Control on Capital Projects - Paper to...Keith Atteck C.Tech. ERMm
 

Destacado (9)

How to Spot a Good Document Control System
How to Spot a Good Document Control SystemHow to Spot a Good Document Control System
How to Spot a Good Document Control System
 
eDMS247 document control application
eDMS247 document control applicationeDMS247 document control application
eDMS247 document control application
 
Document control management march lagos
Document  control management   march lagosDocument  control management   march lagos
Document control management march lagos
 
Document Control in Regulated FDA Environments - When and how to stick with p...
Document Control in Regulated FDA Environments - When and how to stick with p...Document Control in Regulated FDA Environments - When and how to stick with p...
Document Control in Regulated FDA Environments - When and how to stick with p...
 
Document Control in FDA Regulated Environments - When and how to automate
Document Control in FDA Regulated Environments - When and how to automateDocument Control in FDA Regulated Environments - When and how to automate
Document Control in FDA Regulated Environments - When and how to automate
 
Top 5 document controller cover letter samples
Top 5 document controller cover letter samplesTop 5 document controller cover letter samples
Top 5 document controller cover letter samples
 
Document Control
Document ControlDocument Control
Document Control
 
Document management 101 slideshare
Document management 101   slideshareDocument management 101   slideshare
Document management 101 slideshare
 
2009 ARMA Toronto Symposium - Document Control on Capital Projects - Paper to...
2009 ARMA Toronto Symposium - Document Control on Capital Projects - Paper to...2009 ARMA Toronto Symposium - Document Control on Capital Projects - Paper to...
2009 ARMA Toronto Symposium - Document Control on Capital Projects - Paper to...
 

Similar a Myths of validation

Lecture27 cc-security2
Lecture27 cc-security2Lecture27 cc-security2
Lecture27 cc-security2Ankit Gupta
 
3433 IBM messaging security why securing your environment is important-feb2...
3433   IBM messaging security why securing your environment is important-feb2...3433   IBM messaging security why securing your environment is important-feb2...
3433 IBM messaging security why securing your environment is important-feb2...Robert Parker
 
IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...Leif Davidsen
 
Transforming cloud security into an advantage
Transforming cloud security into an advantageTransforming cloud security into an advantage
Transforming cloud security into an advantageMoshe Ferber
 
45 Minutes to PCI Compliance in the Cloud
45 Minutes to PCI Compliance in the Cloud45 Minutes to PCI Compliance in the Cloud
45 Minutes to PCI Compliance in the CloudCloudPassage
 
Software Defined Networking in the ATMOSPHERE project
Software Defined Networking in the ATMOSPHERE projectSoftware Defined Networking in the ATMOSPHERE project
Software Defined Networking in the ATMOSPHERE projectATMOSPHERE .
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud ComputingFalgun Rathod
 
Cloud Audit and Compliance
Cloud Audit and ComplianceCloud Audit and Compliance
Cloud Audit and ComplianceQuadrisk
 
Cloud Security: A matter of trust?
Cloud Security: A matter of trust?Cloud Security: A matter of trust?
Cloud Security: A matter of trust?Mark Williams
 
Chapter_5_Security_CC.pptx
Chapter_5_Security_CC.pptxChapter_5_Security_CC.pptx
Chapter_5_Security_CC.pptxLokNathRegmi1
 
Cloud Cmputing Security
Cloud Cmputing SecurityCloud Cmputing Security
Cloud Cmputing SecurityDevyani Vaidya
 
dtechnClouologyassociatepart2
dtechnClouologyassociatepart2dtechnClouologyassociatepart2
dtechnClouologyassociatepart2Anne Starr
 
Cloud-based vs. On-site CTMS - Which is Right for Your Organization?
Cloud-based vs. On-site CTMS - Which is Right for Your Organization?Cloud-based vs. On-site CTMS - Which is Right for Your Organization?
Cloud-based vs. On-site CTMS - Which is Right for Your Organization?Perficient
 
Security architecture best practices for saas applications
Security architecture best practices for saas applicationsSecurity architecture best practices for saas applications
Security architecture best practices for saas applicationskanimozhin
 
Overcoming Barriers to the Cloud
Overcoming Barriers to the Cloud Overcoming Barriers to the Cloud
Overcoming Barriers to the Cloud Andy Milsark
 
Riskfactorypcitheessentials 151125164111-lva1-app6892
Riskfactorypcitheessentials 151125164111-lva1-app6892Riskfactorypcitheessentials 151125164111-lva1-app6892
Riskfactorypcitheessentials 151125164111-lva1-app6892Risk Crew
 

Similar a Myths of validation (20)

Lecture27 cc-security2
Lecture27 cc-security2Lecture27 cc-security2
Lecture27 cc-security2
 
3433 IBM messaging security why securing your environment is important-feb2...
3433   IBM messaging security why securing your environment is important-feb2...3433   IBM messaging security why securing your environment is important-feb2...
3433 IBM messaging security why securing your environment is important-feb2...
 
IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...IBM Messaging Security - Why securing your environment is important : IBM Int...
IBM Messaging Security - Why securing your environment is important : IBM Int...
 
Transforming cloud security into an advantage
Transforming cloud security into an advantageTransforming cloud security into an advantage
Transforming cloud security into an advantage
 
PCI DSS and PA DSS Compliance
PCI DSS and PA DSS CompliancePCI DSS and PA DSS Compliance
PCI DSS and PA DSS Compliance
 
PCI DSS and PA DSS
PCI DSS and PA DSSPCI DSS and PA DSS
PCI DSS and PA DSS
 
45 Minutes to PCI Compliance in the Cloud
45 Minutes to PCI Compliance in the Cloud45 Minutes to PCI Compliance in the Cloud
45 Minutes to PCI Compliance in the Cloud
 
Software Defined Networking in the ATMOSPHERE project
Software Defined Networking in the ATMOSPHERE projectSoftware Defined Networking in the ATMOSPHERE project
Software Defined Networking in the ATMOSPHERE project
 
Security Issues of Cloud Computing
Security Issues of Cloud ComputingSecurity Issues of Cloud Computing
Security Issues of Cloud Computing
 
Cloud Audit and Compliance
Cloud Audit and ComplianceCloud Audit and Compliance
Cloud Audit and Compliance
 
Cloud Security: A matter of trust?
Cloud Security: A matter of trust?Cloud Security: A matter of trust?
Cloud Security: A matter of trust?
 
Chapter_5_Security_CC.pptx
Chapter_5_Security_CC.pptxChapter_5_Security_CC.pptx
Chapter_5_Security_CC.pptx
 
Cloud Cmputing Security
Cloud Cmputing SecurityCloud Cmputing Security
Cloud Cmputing Security
 
dtechnClouologyassociatepart2
dtechnClouologyassociatepart2dtechnClouologyassociatepart2
dtechnClouologyassociatepart2
 
Cloud-based vs. On-site CTMS - Which is Right for Your Organization?
Cloud-based vs. On-site CTMS - Which is Right for Your Organization?Cloud-based vs. On-site CTMS - Which is Right for Your Organization?
Cloud-based vs. On-site CTMS - Which is Right for Your Organization?
 
Security architecture best practices for saas applications
Security architecture best practices for saas applicationsSecurity architecture best practices for saas applications
Security architecture best practices for saas applications
 
Access Assurance in the Cloud
Access Assurance in the CloudAccess Assurance in the Cloud
Access Assurance in the Cloud
 
Overcoming Barriers to the Cloud
Overcoming Barriers to the Cloud Overcoming Barriers to the Cloud
Overcoming Barriers to the Cloud
 
Riskfactorypcitheessentials 151125164111-lva1-app6892
Riskfactorypcitheessentials 151125164111-lva1-app6892Riskfactorypcitheessentials 151125164111-lva1-app6892
Riskfactorypcitheessentials 151125164111-lva1-app6892
 
Open Science Grid security-atlas-t2 Bob Cowles
Open Science Grid security-atlas-t2 Bob CowlesOpen Science Grid security-atlas-t2 Bob Cowles
Open Science Grid security-atlas-t2 Bob Cowles
 

Último

Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663Call Girls Mumbai
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGAPNIC
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.soniya singh
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.soniya singh
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girladitipandeya
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Delhi Call girls
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...Escorts Call Girls
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...singhpriety023
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLimonikaupta
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.
INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.
INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.CarlotaBedoya1
 
CALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service Online
CALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service OnlineCALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service Online
CALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service Onlineanilsa9823
 

Último (20)

Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
 
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
@9999965857 🫦 Sexy Desi Call Girls Laxmi Nagar 💓 High Profile Escorts Delhi 🫶
@9999965857 🫦 Sexy Desi Call Girls Laxmi Nagar 💓 High Profile Escorts Delhi 🫶@9999965857 🫦 Sexy Desi Call Girls Laxmi Nagar 💓 High Profile Escorts Delhi 🫶
@9999965857 🫦 Sexy Desi Call Girls Laxmi Nagar 💓 High Profile Escorts Delhi 🫶
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
 
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
Russian Call Girls in %(+971524965298  )#  Call Girls in DubaiRussian Call Girls in %(+971524965298  )#  Call Girls in Dubai
Russian Call Girls in %(+971524965298 )# Call Girls in Dubai
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
 
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Ashram Chowk Delhi 💯Call Us 🔝8264348440🔝
 
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
 
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRLLucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
Lucknow ❤CALL GIRL 88759*99948 ❤CALL GIRLS IN Lucknow ESCORT SERVICE❤CALL GIRL
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.
INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.
INDIVIDUAL ASSIGNMENT #3 CBG, PRESENTATION.
 
CALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service Online
CALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service OnlineCALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service Online
CALL ON ➥8923113531 🔝Call Girls Lucknow Lucknow best sexual service Online
 

Myths of validation

  • 1. GxP Validation In The Cloud Debunking The Most Popular Myths To Validating SaaS Apps In A GxP Environment By: Ed Morris, The Morris Group, LLC
  • 2. Ed Morris, Managing Member The Morris Group, LLC 2 • Twenty plus years consulting to Life Sciences clients related to regulatory compliance (21 CFR Part 210/211, 820, PDMA, GAMP, 21 CFR Part 11) Core expertise in system implementation and validation as well as data management and analytics. Hands-on experience with validation strategy and IT governance related to new architectures including Cloud, SaaS and SOA based systems. IT Quality Assurance related to Software Development Lifecycle (SDLC) and change control • Consulting Services • Systems Implementation / Validation • Audits and Assessments • Remediation • Technology Evaluation & Selection • Performance Optimization • Project Management • Operational Domains • Quality Assurance • Pharmacovigilance • Clinical Development • Regulatory Affairs • Manufacturing / Shop Floor • Commercial Operations • Current Projects • IT Governance / Validation Strategy For Cloud Based Clinical Data Management Platform • Network security breach investigation / remediation • Clinical Vendor Qualification Audits • For Cause audits / Root Cause Analysis
  • 3. ZenQMS 3 • Jeff Thomas, Vice President email: jeff@zenqms.com • ZenQMS offers a robust, affordable cloud-based QMS • No Seat Licenses, Full access, Straightforward pricing www.zenqms.com
  • 4. • Software as a Service (SaaS) Applications Allow For Easier & More Affordable Implementations. • Getting to SaaS requires an understanding of the facts and the myths. SaaS / Cloud Based Solutions
  • 5. Myth 1: My data is ‘floating’ around the Internet 5 • High availability gives the illusion that data is “everywhere” • Most Tier 1 cloud providers support the ability to specify a geographic location or region e.g. by country, state or city.
  • 6. Myth 2: My Data is Not Secure 6 • Often, cloud providers have multiple layers of security including network and server based intrusion detection, antivirus and malware systems. • Data can be encrypted in-transit and at rest. The majority of Tier 1 Cloud providers operate HIPAA specific environments that are separate from the general public cloud infrastructures
  • 7. Myth 3: Without A Serial Number, a Server Can’t Be Validated 7 ● Traceability ● Virtual Machines should have a traceable Instance ID ● Focus should be on the Systems Development LifeCycle (SDLC) ● If SDLC follows GAMP V with a traceable ID, the system can be considered compliant
  • 8. Myth 4: There’s No Such Thing As A “Pre-validated” System • A validated system is less about the infrastructure or where it resides and more about when it was installed and/or customized • For instance, if a basic Customer Relationship Management (CRM) system is installed and configured according to a set of base requirements, it can be validated in that state. • Theoretically, an organization can begin using the system provided no changes are made to the configuration e.g. data fields, screens, reports. 8
  • 9. Myth 4: There’s No Such Thing As A “Pre-validated” System (continued) • Multi-tenant Systems. Execute a full validation of the “core system” which is available for immediate use by new clients. • Becomes the Gold Copy • Any proposed configurations must be assessed for regulatory risk to determine if additional validation is necessary. • If so, the client specific user requirements are documented and a UAT protocol is written and executed. Most user specific validations are very brief and can be fully executed in just a few weeks. 9
  • 10. Myth 5: Cloud Providers Cannot Be Audited • Physical audits of cloud data centers are typically not possible due to strict premises security controls. • TMG performs multiple IT QA audits per year. Rarely do they include a detailed tour of the data center. • Occasionally, we do make a brief visit to the data center to verify certain controls such as physical access and fire suppression. • Maintenance logs including backups, outages, patches and updates are accessed outside of the data center itself. 1 0
  • 11. Myth 5: Cloud Providers Cannot Be Audited (cont’d) • Twenty years ago, data centers were busy places with lots of activity by operators running printers, loading tapes and launching jobs. Today, all of those functions have been eliminated or automated leaving data centers dark with no human presence whatsoever • If you were to audit a data center today what would you examine? There’s just not much to see anymore • The real audit is done through interviews with key personnel and documentation reviews. 1 1
  • 12. Myth 6: I Am Not In Control Of My Data ● Control Vs. Possession? ○ Clients always own their data. It is their intellectual property. ○ The best way to control data is to manage its flow from entry, through processing, storing, integration and archiving. ● All of this is defined in the SDLC of the given system by documenting and testing integrations including: ○ Subscribers and Publishers – Unique Identification ○ Data Fields – Transport Mechanism - Encryption ○ Authentication - Boundaries 1 2
  • 13. Myth 7: Automatic Software Updates Require Re-validation • Built-in maintenance and updates that come as part of the subscription are one of the major values of a SaaS or cloud based system. • Your Vendor is responsible for change control and re-validation if necessary • Check with your vendor to understand frequency of updates as well as the testing period available. 1 3
  • 14. Review and Discussion • Myth 1: My Data is ‘floating’ around the Internet • Myth 2: My Data is Not Secure • Myth 3: Without A Serial Number, a Server Can’t Be Validated • Myth 4: There’s No Such Thing as A “Pre-validated” System • Myth 5: Cloud Providers Cannot Be Audited • Myth 6: I Am Not In Control Of My Data • Myth 7: Automatic Software Updates Require Re-validation
  • 15. Contact Information • Ed Morris • The Morris Group • Ed.morris@themorrisgrp.com • 973 713 2211 • www.themorrisgrp.com • Jeff Thomas • ZenQms • jeff@zenqms.com • 267 672 8999 • www.zenqms.com