Difference between revisions of "Template:LIMSpec/Configuration management"
Shawndouglas (talk | contribs) (Updated for 2022.) |
Shawndouglas (talk | contribs) m (Tweaks) |
||
(5 intermediate revisions by the same user not shown) | |||
Line 31: | Line 31: | ||
[https://www.acmg.net/ACMG/Medical-Genetics-Practice-Resources/Genetics_Lab_Standards/ACMG/Medical-Genetics-Practice-Resources/Genetics_Lab_Standards.aspx ACMG Technical Standards for Clinical Genetics Laboratories C13.3]<br /> | [https://www.acmg.net/ACMG/Medical-Genetics-Practice-Resources/Genetics_Lab_Standards/ACMG/Medical-Genetics-Practice-Resources/Genetics_Lab_Standards.aspx ACMG Technical Standards for Clinical Genetics Laboratories C13.3]<br /> | ||
[https://www.astm.org/e1578-18.html ASTM E1578-18 S-1-5]<br /> | [https://www.astm.org/e1578-18.html ASTM E1578-18 S-1-5]<br /> | ||
[https://csrc.nist.gov/publications/detail/sp/800-53/rev-5/final NIST 800-53, Rev. 5, AU-10]<br /> | |||
[https://www.gmp-compliance.org/guidelines/gmp-guideline/who-guidance-on-good-data-and-record-management-practices WHO Technical Report Series, #996, Annex 5, Appendix 1] | [https://www.gmp-compliance.org/guidelines/gmp-guideline/who-guidance-on-good-data-and-record-management-practices WHO Technical Report Series, #996, Annex 5, Appendix 1] | ||
| style="background-color:white;" |'''32.7''' The system should provide a configurable (based on sample, test, or both) means of permitting electronic signatures for both entered results and approved reports. | | style="background-color:white;" |'''32.7''' The system should provide a configurable (based on sample, test, or both) means of permitting electronic signatures for both entered results and approved reports. | ||
Line 68: | Line 69: | ||
| style="background-color:white;" |'''32.17''' The system should allow workflow events and status changes to trigger one or more user-defined actions. | | style="background-color:white;" |'''32.17''' The system should allow workflow events and status changes to trigger one or more user-defined actions. | ||
|- | |- | ||
| style="padding:5px; width:500px;" |[https://www.astm.org/e1578-18.html ASTM E1578-18 S-1-17]<br /> | | style="padding:5px; width:500px;" |[https://www.astm.org/e1578-18.html ASTM E1578-18 S-1-17]<br />[https://www.fbi.gov/services/cjis/cjis-security-policy-resource-center CJIS Security Policy 5.7.1]<br />[https://csrc.nist.gov/publications/detail/sp/800-53/rev-5/final NIST 800-53, Rev. 5, AC-6(1)]<br />[https://csrc.nist.gov/publications/detail/sp/800-53/rev-5/final NIST 800-53, Rev. 5, CM-7] | ||
[https://www.fbi.gov/services/cjis/cjis-security-policy-resource-center CJIS Security Policy 5.7.1]<br /> | |||
[https://csrc.nist.gov/publications/detail/sp/800-53/rev-5/final NIST 800-53, Rev. 5, AC-6(1)]<br /> | |||
[https://csrc.nist.gov/publications/detail/sp/800-53/rev-5/final NIST 800-53, Rev. 5, CM-7] | |||
| style="background-color:white;" |'''32.18''' The system should provide an interface for administrative access that permits approved users to configure the system without extra programming or manipulation of data storage systems. | | style="background-color:white;" |'''32.18''' The system should provide an interface for administrative access that permits approved users to configure the system without extra programming or manipulation of data storage systems. | ||
|- | |- | ||
Line 80: | Line 78: | ||
| style="background-color:white;" |'''32.20''' The system should provide a multiuser interface that can be configured to local user needs, including display language, character sets, and time zones. | | style="background-color:white;" |'''32.20''' The system should provide a multiuser interface that can be configured to local user needs, including display language, character sets, and time zones. | ||
|- | |- | ||
| style="padding:5px; width:500px;" |[https://www.law.cornell.edu/cfr/text/21/11.100 21 CFR Part 11.100 (a)]<br /> | | style="padding:5px; width:500px;" | | ||
[https://www.law.cornell.edu/cfr/text/21/11.100 21 CFR Part 11.100 (a)]<br /> | |||
[https://www.astm.org/e1578-18.html ASTM E1578-18 S-1-20]<br /> | [https://www.astm.org/e1578-18.html ASTM E1578-18 S-1-20]<br /> | ||
[https://ec.europa.eu/health/sites/health/files/files/eudralex/vol-4/annex11_01-2011_en.pdf E.U. Annex 11-14]<br /> | [https://ec.europa.eu/health/sites/health/files/files/eudralex/vol-4/annex11_01-2011_en.pdf E.U. Annex 11-14]<br /> | ||
Line 113: | Line 112: | ||
[https://www.epa.gov/sites/production/files/documents/erln_lab_requirements.pdf EPA ERLN Laboratory Requirements 4.9.4 and 4.9.14]<br /> | [https://www.epa.gov/sites/production/files/documents/erln_lab_requirements.pdf EPA ERLN Laboratory Requirements 4.9.4 and 4.9.14]<br /> | ||
[https://ichgcp.net/ ICH GCP 2.10]<br /> | [https://ichgcp.net/ ICH GCP 2.10]<br /> | ||
[https://www.iso.org/standard/66912.html ISO/IEC 17025:2017 4.2.1]<br /> | |||
[https://www.iso.org/standard/66912.html ISO/IEC 17025:2017 7.11.3]<br /> | [https://www.iso.org/standard/66912.html ISO/IEC 17025:2017 7.11.3]<br /> | ||
[https://csrc.nist.gov/publications/detail/sp/800-53/rev-5/final NIST 800-53, Rev. 5, CM-5 and CM-5(1)]<br /> | [https://csrc.nist.gov/publications/detail/sp/800-53/rev-5/final NIST 800-53, Rev. 5, CM-5 and CM-5(1)]<br /> | ||
Line 123: | Line 123: | ||
| style="background-color:white;" |'''32.22''' The system shall provide a security interface usable across all modules of the system that secures data and operations and prevents unauthorized access to data and functions. | | style="background-color:white;" |'''32.22''' The system shall provide a security interface usable across all modules of the system that secures data and operations and prevents unauthorized access to data and functions. | ||
|- | |- | ||
| style="padding:5px; width:500px;" |[https://www.fbi.gov/services/cjis/cjis-security-policy-resource-center CJIS Security Policy 5.5.2.2–3]<br />[https://www.epa.gov/sites/production/files/documents/erln_lab_requirements.pdf EPA ERLN Laboratory Requirements 4.1.14–15]<br /> | | style="padding:5px; width:500px;" | | ||
[https://cdn.scsglobalservices.com/files/program_documents/brc_food_standard_8_0.pdf BRC GSFS, Issue 8, 3.2.1]<br /> | |||
[https://cdn.scsglobalservices.com/files/program_documents/brc_food_standard_8_0.pdf BRC GSFS, Issue 8, 3.3.1]<br /> | |||
[https://www.fbi.gov/services/cjis/cjis-security-policy-resource-center CJIS Security Policy 5.5.2.2–3]<br /> | |||
[https://www.epa.gov/sites/production/files/documents/erln_lab_requirements.pdf EPA ERLN Laboratory Requirements 4.1.14–15]<br /> | |||
[https://csrc.nist.gov/publications/detail/sp/800-53/rev-5/final NIST 800-53, Rev. 5, AC-2(11)] | [https://csrc.nist.gov/publications/detail/sp/800-53/rev-5/final NIST 800-53, Rev. 5, AC-2(11)] | ||
| style="background-color:white;" |'''32.23''' The system shall be able to granularly define access control down to the object level, role level, physical location, logical location, network address, and chronometric restriction level for the protection of regulated, patented, confidential, and classified data, methods, or other types of information. | | style="background-color:white;" |'''32.23''' The system shall be able to granularly define access control down to the object level, role level, physical location, logical location, network address, and chronometric restriction level for the protection of regulated, patented, confidential, and classified data, methods, or other types of information. | ||
Line 170: | Line 174: | ||
| style="background-color:white;" |'''32.27''' The system shall allow the administrator to define a time period in days after which a user will be prompted to change their password. | | style="background-color:white;" |'''32.27''' The system shall allow the administrator to define a time period in days after which a user will be prompted to change their password. | ||
|- | |- | ||
| style="padding:5px; width:500px;" |[https://www.fbi.gov/services/cjis/cjis-security-policy-resource-center CJIS Security Policy 5.6.3.1]<br />[https://csrc.nist.gov/publications/detail/sp/800-53/rev-5/final NIST 800-53, Rev. 5, AC-2(3)]<br /> | | style="padding:5px; width:500px;" |[https://www.fbi.gov/services/cjis/cjis-security-policy-resource-center CJIS Security Policy 5.6.3.1]<br />[https://csrc.nist.gov/publications/detail/sp/800-53/rev-5/final NIST 800-53, Rev. 5, AC-2(3)]<br />[https://csrc.nist.gov/publications/detail/sp/800-53/rev-5/final NIST 800-53, Rev. 5, IA-4 and IA-5(1)]<br />[https://csrc.nist.gov/publications/detail/sp/800-53/rev-5/final NIST 800-53, Rev. 5, PS-4] | ||
[https://csrc.nist.gov/publications/detail/sp/800-53/rev-5/final NIST 800-53, Rev. 5, IA-4 and IA-5(1)]<br /> | |||
[https://csrc.nist.gov/publications/detail/sp/800-53/rev-5/final NIST 800-53, Rev. 5, PS-4] | |||
| style="background-color:white;" |'''32.28''' The system shall allow the administrator to define a time period of inactivity for a user identifier, after which it will be disabled and archived. | | style="background-color:white;" |'''32.28''' The system shall allow the administrator to define a time period of inactivity for a user identifier, after which it will be disabled and archived. | ||
|- | |- | ||
Line 246: | Line 248: | ||
[https://www.astm.org/e1578-18.html ASTM E1578-18 S-1-24]<br /> | [https://www.astm.org/e1578-18.html ASTM E1578-18 S-1-24]<br /> | ||
[https://ec.europa.eu/health/sites/health/files/files/eudralex/vol-4/annex11_01-2011_en.pdf E.U. Annex 11-14]<br /> | [https://ec.europa.eu/health/sites/health/files/files/eudralex/vol-4/annex11_01-2011_en.pdf E.U. Annex 11-14]<br /> | ||
[https://csrc.nist.gov/publications/detail/sp/800-53/rev-5/final NIST 800-53, Rev. 5, AU-10 and AU-10(3)]<br /> | |||
[https://www.gmp-compliance.org/guidelines/gmp-guideline/who-guidance-on-good-data-and-record-management-practices WHO Technical Report Series, #996, Annex 5, Appendix 1] | [https://www.gmp-compliance.org/guidelines/gmp-guideline/who-guidance-on-good-data-and-record-management-practices WHO Technical Report Series, #996, Annex 5, Appendix 1] | ||
| style="background-color:white;" |'''32.36''' The system shall force a user's electronic signature to be unique and traceable to a specific user's account. | | style="background-color:white;" |'''32.36''' The system shall force a user's electronic signature to be unique and traceable to a specific user's account. | ||
|- | |- | ||
| style="padding:5px; width:500px;" |[https://www.law.cornell.edu/cfr/text/21/11.100 21 CFR Part 11.100 (a)]<br />[https://www.astm.org/e1578-18.html ASTM E1578-18 S-1-24]<br /> | | style="padding:5px; width:500px;" |[https://www.law.cornell.edu/cfr/text/21/11.100 21 CFR Part 11.100 (a)]<br />[https://www.astm.org/e1578-18.html ASTM E1578-18 S-1-24]<br />[https://csrc.nist.gov/publications/detail/sp/800-53/rev-5/final NIST 800-53, Rev. 5, AU-10 and AU-10(3)] | ||
| style="background-color:white;" |'''32.37''' The system shall prevent the reuse or reassignment of a user's electronic signature. | | style="background-color:white;" |'''32.37''' The system shall prevent the reuse or reassignment of a user's electronic signature. | ||
|- | |- |
Latest revision as of 14:29, 23 June 2023
|