Difference between revisions of "User:Shawndouglas/sandbox/sublevel1"

From LIMSWiki
Jump to navigationJump to search
Line 1: Line 1:
The previous chapter explored many aspects of informatics in the laboratory, emphasizing that while software and hardware systems bring many benefits to the laboratory, a thoughtful, organization-wide approach to managing the risks that that software and hardware introduces—particularly when related to cloud computing—is required. Given these complications, it's unsurprising to learn some laboratories have turned to MSSPs to help them meet regulatory requirements and maintain the security of their on-premises and cloud-based data solutions. Examples of industries with research and laboratory work served by MSSPs over the years include the gemstone testing and grading<ref name="IntradoVirtualArmour19">{{cite web |url=https://www.globenewswire.com/news-release/2019/04/08/1799042/0/en/VirtualArmour-Expands-Managed-Cybersecurity-Services-with-Global-Gemological-Organization.html |title=VirtualArmour Expands Managed Cybersecurity Services with Global Gemological Organization |author=VirtualArmour International |work=Intrado GlobeNewswire |date=08 April 2019 |accessdate=21 August 2021}}</ref>, energy research and supply<ref name="PreScouterManaged17">{{cite web |url=https://www.publicpower.org/system/files/documents/cybersecurity-service_providers_guide.pdf |format=PDF |title=Managed Cybersecurity Service Providers for Electric Utilities |author=PreScouter |publisher=American Public Power Association |date=October 2017 |accessdate=21 August 2021}}</ref>, clinical and forensic toxicology<ref name="FrontierCaseStudy20">{{cite web |url=https://ftiusa.com/case-studies/case-study-managed-detection-response-for-toxicology-laboratory/ |title=Case Study: Managed Detection Response for Toxicology Laboratory |publisher=Frontier Technologies, Inc |date=2020 |accessdate=21 August 2021}}</ref>, and healthcare industries.<ref name="CyleraHealthcare20">{{cite web |url=https://resources.cylera.com/healthcare-managed-security-services-forum |title=Healthcare Managed Security Services Forum |publisher=Cylera |date=November 2020 |accessdate=21 August 2021}}</ref><ref name="ANXPutting">{{cite web |url=http://anxebiz.anx.com/content/industries/healthcare |title=Putting Information Exchange to Work for Healthcare |publisher=ANXeBusiness Corp |accessdate=21 August 2021}}</ref> In all these examples, the implication is that proprietary trade secrets, critical infrastructure, or sensitive patient data must be protected. The laboratories operating in those industries could have attempted to keep security efforts in-house, but for one reason or another they chose to outsource a significant portion of that protection to a third-party MSSP.
[[File:Quality assurance laboratory 140305-N-OE749-012.jpg|left|400px]]Imagine a medical device manufacturer (which happens to incorporate laboratories, but that's not the main point here). A medical device manufacturer works in a highly regulated industry that not just asks but demands quality from the manufactured medical devices. As many such devices are increasingly electronic—and even network-enabled—it's imperative that cybersecurity is considered in their design and use.<ref name="NayyarTheUnique20">{{cite web |url=https://www.forbes.com/sites/forbestechcouncil/2020/12/22/the-unique-threats-posed-by-medical-iot-devices-and-what-to-do-about-them/ |title=The Unique Threats Posed By Medical IoT Devices And What To Do About Them |author=Nayyar, S. |work=Forbes |date=22 December 2020 |accessdate=21 August 2021}}</ref> As David Jensen of MasterControl noted in 2017: "The technologies that elevate the quality of life for patients can be used by cyber actors to undermine both the manufacturing organization and the products themselves. This means cybersecurity is as much a quality issue as it is a security issue."<ref name="JensenHow17">{{cite web |url=https://www.mastercontrol.com/gxp-lifeline/how-an-electronic-quality-management-system-helps-with-cybersecurity/ |title=How an Electronic Quality Management System Helps With Cybersecurity |author=Jensen, D. |publisher=MasterControl |date=03 June 2017 |accessdate=21 August 2021}}</ref>


But why even bother with this level of security? As previous chapters have noted, regulatory requirements are a significant driver to that end; if the lab won't meet its regulatory requirements, it risks major fines at a minimum, or at worst going out of business. In fact, some 60 percent of small businesses end up closing shop within six months of a cyberattack.<ref name="Galvin60_18">{{cite web |url=https://www.inc.com/joe-galvin/60-percent-of-small-businesses-fold-within-6-months-of-a-cyber-attack-heres-how-to-protect-yourself.html |title=60 Percent of Small Businesses Fold Within 6 Months of a Cyber Attack. Here's How to Protect Yourself |author=Galvin, J. |work=Inc.com |date=07 May 2018 |accessdate=21 August 2021}}</ref> This happens for multiple reasons, with costs related to compliance fines, breach notifications, post-breach customer protection, public relations, reputation loss, attorney's fees, litigation, and operational disruption often laying waste to the business.<ref name="SBDCC_BlogCost17">{{cite web |url=https://www.virginiasbdc.org/blog-cost-of-cyber-crime-to-small-businesses/ |archiveurl=https://web.archive.org/web/20201227041535/https://www.virginiasbdc.org/blog-cost-of-cyber-crime-to-small-businesses/ |title=BLOG: Cost of Cyber Crime to Small Businesses |work=Virginia SBDC Blog |publisher=Virginia SBDC |date=30 May 2017 |archivedate=27 December 2020 |accessdate=21 August 2021}}</ref> And it happens to businesses in almost every industry.
Note that Jensen related "cybersecurity" and "quality" together, which naturally leads to a discussion of the [[quality management system]] (QMS). A QMS is "a set of related and interacting elements that organizations use to direct and control how quality policies are implemented and quality objectives are achieved."<ref name="ShoemakerCyber14">{{cite book |url=https://books.google.com/books?id=b1s8AwAAQBAJ&pg=PA62 |title=Cybersecurity: Engineering a Secure Information Technology Organization |author=Shoemaker, D.; Sigler, K. |publisher=Cengage Learning |pages=62–63 |year=2014 |isbn=9781285169903}}</ref> Those elements include, but are not limited to, documented processes, management models, business strategies, human capital, and information technology. Not only does the QMS help guide the implementation and achievement of organizational policy and objectives for resource management and personnel, but also it prompts an organization to focus on the core elements of quality management within its products and services: planning, control, assurance, and improvement. And just as the development and use of a QMS is often driven by standards (e.g., [[ISO/IEC 17025|ISO/IEC 17025:2017]] and [[ISO 13485|ISO 13485:2016]]), the QMS often drives the organization to adopt other standards as part of bringing quality to the organization. Using our medical device manufacturer as an example, their QMS may direct them to use the ANSI/CAN/UL 2900-1 standard for ensuring medical device cybersecurity protection.<ref name="WirthMedical20">{{cite book |url=https://books.google.com/books?id=oawCEAAAQBAJ&pg=PA23 |title=Medical Device Cybersecurity for Engineers and Manufacturers |author=Wirth, A.; Gates, C.; Smith, J. |publisher=Artech House |pages=23–24 |year=2020 |isbn=9781630818159}}</ref>


Laboratories are not exempt from these cyberattacks and losses, whether using on-premises systems or turning to the cloud. In 2019, Canadian laboratory testing business LifeLabs suffered a cyberattack on its systems that saw the attackers steal information and request a ransom to have the data returned. While it's not clear exactly what went wrong, talk of "[f]urther strengthening our systems to deter future incidents"<ref name="SecurityCanadian19">{{cite web |url=https://www.securitymagazine.com/articles/91467-canadian-lab-test-firm-lifelabs-pays-ransom-after-data-breach |title=Canadian Lab Test Firm LifeLabs Pays Ransom After Data Breach |work=Security |publisher=BNP Media |date=26 December 2019 |accessdate=21 August 2021}}</ref> indicates something was off about LifeLabs' computer systems, something that likely could have been prevented with properly managed security services. In 2021, clinical at-home laboratory provider Apex Laboratory announced that it had been attacked by ransomware that hit its systems, which allowed hackers to take sensitive patient information and forcefully encrypt system and other data files until a ransom was paid.<ref name="ArghireApex21">{{cite web |url=https://www.securityweek.com/apex-laboratory-says-patient-data-stolen-ransomware-attack |title=Apex Laboratory Says Patient Data Stolen in Ransomware Attack |author=Arghire, I. |work=Security Week |date=04 January 2021 |accessdate=21 August 2021}}</ref> This kind of attack also could have been prevented—or the damage at least mitigated—with active MSS protections. And in May 2021, news broke that benevolent hacking group Sakura Samurai, as part of a "vulnerability disclosure program" through the U.S. Department of Energy's Fermilab, had tracked down multiple vulnerabilities in Fermilab's systems, which have since reportedly been corrected.<ref name="KirkUS21">{{cite web |url=https://www.bankinfosecurity.com/us-physics-laboratory-exposed-documents-credentials-a-16536 |title=US Physics Laboratory Exposed Documents, Credentials |author=Kirk, J. |work=Bank Info Security |date=07 May 2021 |accessdate=21 August 2021}}</ref><ref name="WillisFermilab21">{{cite web |url=https://robertwillishacking.com/fermilab-hack-april-may-2021/ |title=Fermilab Hack, April/May 2021 |author=Willis, R. |work=Robert Willis Hacking |date=06 May 2021 |accessdate=21 August 2021}}</ref> Would have a knowledgeable and experienced MSSP caught these issues before Sakura Samurai?
Not only is the QMS vital to medical device manufacturers<ref name="JensenHow17" /><ref name="AGMedical21">{{cite web |url=https://www.tga.gov.au/sites/default/files/medical-device-cyber-security-guidance-industry.pdf |format=PDF |title=Medical device cyber security guidance for industry |author=Therapeutic Goods Administration |publisher=Commonwealth of Australia |date=March 2021 |accessdate=21 August 2021}}</ref><ref name="AssurXRisk17">{{cite web |url=https://www.assurx.com/risk-management-cybersecurity-compliance/ |title=Risk Management Best Practices for Cybersecurity Compliance |work=AssurX Blog |publisher=AssurX, Inc |date=30 January 2017 |accessdate=21 August 2021}}</ref><ref name="ApracitiCyber">{{cite web |url=https://apraciti.com/cybersecurity-quality-management-system-integration/ |title=Cybersecurity & Quality Management System Integration |publisher=Apraciti |accessdate=21 August 2021}}</ref>, but also the QMS plays an important role in most any laboratory's operations.<ref name="WHOLab11">{{cite book |url=https://www.who.int/ihr/publications/lqms/en/ |title=Laboratory Quality Management System Handbook |author=World Health Organization |publisher=World Health Organization |year=2011 |isbn=9789241548274}}</ref><ref name="USGSQuality">{{cite web |url=https://www.usgs.gov/about/organization/science-support/office-science-quality-and-integrity/quality-management-system |title=Quality Management System for USGS Laboratories |author=United States Geological Survey |publisher=United States Geological Survey |accessdate=21 August 2021}}</ref> And in the laboratory, a quality assurance officer or manager is responsible for helping develop and maintain the laboratory's QMS, which optimally will address the importance of cybersecurity in meeting the laboratory’s goals. But the connection between a laboratory's quality assurance officer and cybersecurity is sadly not well represented in the cloud computing era. Look through the job descriptions on online job boards for quality assurance officers and you will rarely find the word "security" mentioned. Sure, the relationship between "quality" and "security" gets discussed in the context of modern software development<ref name="WorrallWhy20">{{cite web |url=https://www.darkreading.com/vulnerabilities---threats/why-quality-and-security-both-matter-in-software/a/d-id/1338649 |title=Why Quality & Security Both Matter in Software |author=Worrall, J. |work=DarkReading |date=18 August 2020 |accessdate=21 August 2021}}</ref>, but what about within the context of a laboratory's operational quality and the people who drive it forward?  


However, the use of an MSSP in the laboratory can't prevent all cases of inadvertently compromising sensitive information. Take for example the case of the Wyoming Department of Health, which accidentally exposed sensitive health information about COVID-19, influenza, and controlled substance analyses in late 2020. An April 2021 news report indicated that more than 164,000 Wyoming residents were affected by the accidental uploading of files containing their testing information as part of a batch file upload to a public-facing GitHub server. While GitHub itself did not cause the release, the upload of the files—which were not intended to be in the upload batch of otherwise normal software code files—to the public servers by the Department of Health did. The Wyoming Department of Health notes that "[b]usiness practices have been revised to include prohibiting the use of GitHub or other public repositories and employees have been retrained."<ref name="FlackWyoming21">{{cite web |url=https://www.sweetwaternow.com/wyoming-department-of-health-announces-data-breach-of-thousands-of-wyoming-residents/ |archiveurl=https://web.archive.org/web/20210427221317if_/https://www.sweetwaternow.com/wyoming-department-of-health-announces-data-breach-of-thousands-of-wyoming-residents/ |title=Wyoming Department of Health Announces Data Breach of Thousands of Wyoming Residents |author=Flack, B. |work=SweetwaterNow |date=27 April 2021 |archivedate=27 April 2021 |accessdate=21 August 2021}}</ref>  
In a 2019 journal article for ''Lab Manager'' magazine, Sandia National Laboratories' chief information officer Carol Jones stated that "[c]ybersecurity is not just a technology problem; it is a people, process, and knowledge problem."<ref name="TulsiGreater19">{{cite web |url=https://www.labmanager.com/business-management/greater-awareness-and-vigilance-in-laboratory-data-security-776 |title=Greater Awareness and Vigilance in Laboratory Data Security |author=Tulsi, B.B. |work=Lab Manager |date=04 September 2019 |accessdate=21 August 2021}}</ref> While this is an accurate statement, shouldn't cybersecurity also be a quality problem for a laboratory? Yes, well-trained people, vetted processes, and relevant and timely knowledge is required to ensure secure operations, but quality management and assurance—which incorporates that training, SOPs, and knowledge—should also be part of that equation. One could argue that the responsibilities of a quality assurance officer or manager are already numerous and weighty. But shouldn't that person at least have a modicum of understanding about how well-implemented IT and software security in the lab correlates to improved quality assurance outcomes?<ref name="">{{cite journal |title=Fundamental Concepts of IT Security Assurance |journal=ISACA Journal |author=Hamidovic, H. |volume=2 |pages=45–9 |year=2012 |url=https://www.isacajournal-digital.org/isacajournal/2012vol2?article_id=1078418&pg=45}}</ref>


This statement highlights that, ultimately, internal process and procedure that didn't address the use and corresponding potential risks of public-facing servers within day-to-day operations was to blame. Strictly speaking, any MSS in place could not have prevented the upload to GitHub, unless the MSSP had prior identified this type of risk and brought it to the attention of the laboratory. It's possible an MSSP could have encouraged the lab to turn to group policies or some other access control to limit internet access from laboratory computers<ref name="PaulHowTo19">{{cite web |url=https://thesysadminchannel.com/how-to-restrict-internet-access-using-group-policy-gpo/ |title=How To Restrict Internet Access Using Group Policy (GPO) |author=Paul |work=The Sysadmin Channel |date=03 June 2019 |accessdate=03 June 2019}}</ref>, though a careful balance of managing security risk with ensuring lab tech productivity would still need to be maintained. However, in the end, this is largely a story of internal laboratory policy, not something an MSS could prevent unless previously anticipated. This naturally brings up the discussion about a laboratory's quality assurance officer and their increasingly important role in addressing cybersecurity and choosing CSPs and MSSPs for the lab.
At this juncture, several questions must be asked about the quality assurance officer or manager in a laboratory operating in the 2020s:
 
* What is the importance of the quality assurance officer (QAO), and do they understand cybersecurity?
* How does the QAO help ensure quality of operations with security as a managed service?
* How do standard operating procedures (SOPs), security audits, and other elements of a QMS positively affect quality assurance by addressing cybersecurity and cloud hosting processes?
 
'''The importance of a QAO and their security knowledge'''
 
First, the definition of what a QAO does will largely vary from company to company. However, turning to Bartram and Ballance's 1996 guide ''Water Quality Monitoring,'' the author's describe a quality assurance officer as someone "to liaise with management, to manage data archives, to conduct regular audits and reviews of the QA system, and to report on any QA issues to the program or institution manager."<ref name="BartramWater20">{{cite book |url=https://books.google.com/books?id=5PQCEAAAQBAJ&pg=PA218 |title=Water Quality Monitoring: A practical guide to the design and implementation of freshwater quality studies and monitoring programmes |editor=Bartram, J.; Ballance, R. |publisher=CRC Press |page=218 |year=2020 |isbn=9780419223207}}</ref> They add that the QAO is also "responsible for regularly inspecting all aspects of the [record keeping] system to ensure staff compliance, for reporting on such inspections and audits to management, and for recommending improvements."<ref name="BartramWater20" /> But what of a more modern definition? Turning to ISO 9000, we get a bland and non-informative definition of quality assurance itself: "part of quality management focused on providing confidence that quality requirements will be fulfilled."<ref name="ISO9000">{{cite web |url=https://www.iso.org/obp/ui/#iso:std:iso:9000:en |title=ISO 9000:2015(en) Quality management systems — Fundamentals and vocabulary |publisher=ISO |date=2015 |accessdate=21 August 2021}}</ref> By extension, we then get "a person responsible for providing confidence that requirements for organizational quality are fulfilled." This is a broad description, sadly. However, pulling from Bartram and Ballance, the ISO, and other sources<ref name="SeekCyber21">{{cite web |url=https://www.seek.com.au/job/52226409?type=standard |archiveurl=https://web.archive.org/web/20210524220443/https://www.seek.com.au/job/52226409?type=standard |title=Cybersecurity Quality and Compliance Officer - 6 Month Contract |author=Genesis IT&T |work=Seek |date=10 May 2021 |archivedate=21 August 2021 |accessdate=21 August 2021}}</ref><ref name="ZippiaQuality">{{cite web |url=https://www.zippia.com/quality-control-officer-jobs/what-does-a-quality-control-officer-do/ |title=Quality Control Officer - What They Do |publisher=Zippia |accessdate=21 August 2021}}</ref>, we could go with something like:
 
<blockquote>A quality assurance officer (QAO) is an individual responsible for ensuring organizational quality through the regular management, monitoring, review, and auditing of documentation, record systems, data, and processes as they relate to organizational quality and compliance frameworks and initiatives, while also reporting timely results, making recommendations based on those results, and assisting with training staff on approved recommendations.</blockquote>
 
Given that definition, does the average QAO need to understand at least the basics of cybersecurity? That's arguable, to be sure. After all, there are job positions such as the "cybersecurity quality and compliance officer" and the like<ref name="SeekCyber21" />, with an individual who works directly with an IT department and its cybersecurity team to ensure all mandatory laws and regulatory requirements are being adhered to, much in the same way a QAO does but on a broader organizational basis. But what about the laboratory realm? Major laboratories with significant resources may have these sorts of positions, but smaller, independent labs may not. In that case, laboratory personnel will often wear many hats, including "the tech person" or "laboratory systems engineer." (See Joe Liscouski's discussion of the "laboratory systems engineer" in his 2020 guide ''[[LII:Laboratory Technology Planning and Management: The Practice of Laboratory Systems Engineering|Laboratory Technology Planning and Management: The Practice of Laboratory Systems Engineering]]'' for more on this topic.<ref name="LiskouskiLab20">{{cite web |title=[[LII:Laboratory Technology Planning and Management: The Practice of Laboratory Systems Engineering|Laboratory Technology Planning and Management: The Practice of Laboratory Systems Engineering]] |author=Liscouski, J. |date=December 2020}}</ref>) However, given that the security surrounding an organization's electronic efforts is vital to maintaining quality operations, and also given that—hopefully—cybersecurity efforts are documented and trained upon, it's not that far a leap to suggest that the laboratory QAO should have a rudimentary understanding of IT systems and how they are secured. If cybersecurity is interwoven into the laboratory culture, including quality management, the tech-savvy QAO will be a boon to the overall quality assurance process.
 
'''The QAO and managed security services'''
 
Where does a QAO and an MSS intersect in the lab? Judging by the previous statement that the QAO may need to review organizational documentation and training material regarding cybersecurity—and even audit or assess personnel on their use of that documentation and training—we can see deduce that a QAO may be required to audit the effectiveness of any implemented MSS, or at least the documentation and processes related to the MSS. Again, it's likely in mid- to large size organizations this responsibility will fall upon the shoulders of an IT lead or IT quality officer. However, these resources may not be readily available in some laboratory settings. If those resources aren't available, the QAO may be required to know more than they expected about what managed security services entail. They won't need to be MSS experts, but as the nature of computing in the laboratory continues to evolve, having laboratory staff with relevant knowledge of automation, data management systems, and even the cloud is increasingly vital.<ref name="LiskouskiLab20" />
 
'''The QMS and cybersecurity'''
 
In 2019, scientific and business consultancy Brevitas brought up the challenges of addressing cybersecurity in laboratories and other settings, noting evolving guidance that strives to address the business policies, security controls, informatics systems, and security monitoring required to better ensure the integrity and security of electronic records and data. They are one of a handful of consultancies that have publicly tied these types of standard-driven cybersecurity measures directly to the QMS<ref name="BrevitasCyber19">{{cite web |url=https://brevitas.us/cybersecurity-response/ |title=Cybersecurity Response |publisher=Brevitas |date=2019 |accessdate=21 August 2021}}</ref>:
 
<blockquote>The challenge is in ensuring that these measures are effectively integrated into the existing processes outlined in the organization’s quality management system (QMS). Consideration needs to be given to first integrating cybersecurity into risk and/or criticality assessments, then downstream into system security testing during qualification and/or validation activities. As the technological landscape evolves, organizations must be more effective in their implementation of cybersecurity measures to ensure the safety of their electronic records and data. These measures must be considered as part of the QMS for all activities involved in the lifecycle of a computerized system.</blockquote>
 
As has been previously mentioned, this type of philosophy is already woven into the fabric of medical device regulation and standardization, with 21 CFR 820 on quality system regulation, ISO 13485:2016 on quality management systems, and ANSI/CAN/UL 2900 on ensuring medical device security driving how medical device cybersecurity is addressed in the manufacturer's quality management system.<ref name="ApracitiCyber" /><ref name="LincolnCyber17">{{cite web |url=https://www.ivtnetwork.com/article/cybersecurity-buzzword-or-serious-safety-concern |title=Cybersecurity - Buzzword or Serious Safety Concern? |author=Lincoln, J.E. |work=IVT Network |date=17 April 2017 |accessdate=21 August 2021}}</ref><ref name="HeylOverview17">{{cite web |url=https://www.cybersecuritysummit.org/wp-content/uploads/2017/10/4.00-Justin-Heyl.pdf |format=PDF |title=Overview of UL 2900 - Medical Device Cybersecurity Workshop |author=Heyl, J. |publisher=UL |date=October 2017 |accessdate=21 August 2021}}</ref><ref name="UL2900ACyber19">{{cite web |url=https://www.fda.gov/media/123068/download |format=PDF |title=UL 2900: A Cybersecurity aid for industry and regulators |publisher=UL |date=2019 |accessdate=21 August 2021}}</ref><ref name="ISO13485">{{cite web |url=https://www.iso.org/standard/59752.html |title=ISO 13485:2016 Medical devices — Quality management systems — Requirements for regulatory purposes |publisher=ISO |date=March 2016 |accessdate=21 August 2021}}</ref> And it may be even easier for medical device manufacturers—as well as other laboratory types—to compile, organize, disseminate, and train upon cybersecurity risk analysis data and procedural documentation with the help of an electronic QMS.<ref name="JensenHow17" /> However, we can turn to some other businesses who have included security standards in their quality management system. Technology consultancy Konsolute has discussed why it chose to integrate ISO 27001 on information security management (and the information security management system or ISMS) into its business processes and the development of its electronic QMS, noting benefits of improved compliance, lower security risk, improved financial savings, improved reputation, and more new business.<ref name="KonsoluteCyber21">{{cite web |url=https://www.konsolute.com/blog/iso-27001-cybersecurity-quality-management/ |title=Cybersecurity of the future: Why we include ISO 27001 as standard in our Quality Management System |publisher=Konsolute |date=30 April 2021 |accessdate=21 August 2021}}</ref>
 
As it turns out, the ISMS and ISO 27001 have a bit in common with the QMS and ISO 9001, primarily with the goal of improving quality within the organization. Here again we see the link between a focus on cybersecurity and ensuring quality within an organization.<ref name="CVGInform20">{{cite web |url=https://cvgstrategy.com/information-security-management-system/ |title=Information Security Management System (ISMS) |publisher=CVG Strategy |date=2020 |accessdate=21 August 2021}}</ref><ref name="PatelISO17">{{cite web |url=https://www.schellman.com/blog/iso-9001-and-27001-the-relationship |title=ISO 9001 and 27001 – The Relationship |author=Patel, N. |work=Schellman Blog |publisher=Schellman & Company |date=16 October 2017 |accessdate=21 August 2021}}</ref> Senior associate Nikita Patel of Schellman & Company highlighted this association in 2017, saying that an organization "achieving this dual certification of an ISO 9001 and ISO 27001 can prove incredibly useful—in doing so, an organization can simultaneously demonstrate an organization’s ability and commitment to information security risk management, while also validating their dedication to the optimal delivery of their quality products and services."<ref name="PatelISO17" /> From addressing anything from scoping, leadership, human resources support, and document management to internal auditing, measurement and monitoring, management review, and [[Continual improvement process|continual improvement]], both the ISMS, focused on information security, and QMS, focused on organizational quality, improve the overall quality of an organization and its efforts.
 
'''The QAO in the context of these three points'''
 
Where does this all place the quality assurance officer in the scope of laboratory quality and information security? Whether it's managed security services, private or public cloud services, in-house networking, or a mix of all these, the modern laboratory is a technology-driven business requiring modern approaches to addressing the risks that technology carries with it. An on-site IT staff may handle many of the details associated with those efforts, but the QAO of the 2020s needs to also be familiar with how that technology works and how it impacts organizational quality initiatives. The QAO will interact with the lab's QMS, and perhaps even the ISMS if one separately exists. Ideally cybersecurity policy and procedure is already woven into the various elements of the QMS, or, worst case, the lab doesn't have much of a cybersecurity policy. This is where the QAO of today's lab must shine, "ensuring organizational quality through the regular management, monitoring, review, and auditing of documentation, record systems, data, and processes as they relate to organizational quality and compliance frameworks and initiatives." That means also understanding how managed security services and cloud services operate. It's perhaps a tall ask, but in today's competitive laboratory environment, the tech-savvy QAO is more important than ever.


==References==
==References==
{{Reflist|colwidth=30em}}
{{Reflist|colwidth=30em}}

Revision as of 23:42, 3 February 2022

Quality assurance laboratory 140305-N-OE749-012.jpg

Imagine a medical device manufacturer (which happens to incorporate laboratories, but that's not the main point here). A medical device manufacturer works in a highly regulated industry that not just asks but demands quality from the manufactured medical devices. As many such devices are increasingly electronic—and even network-enabled—it's imperative that cybersecurity is considered in their design and use.[1] As David Jensen of MasterControl noted in 2017: "The technologies that elevate the quality of life for patients can be used by cyber actors to undermine both the manufacturing organization and the products themselves. This means cybersecurity is as much a quality issue as it is a security issue."[2]

Note that Jensen related "cybersecurity" and "quality" together, which naturally leads to a discussion of the quality management system (QMS). A QMS is "a set of related and interacting elements that organizations use to direct and control how quality policies are implemented and quality objectives are achieved."[3] Those elements include, but are not limited to, documented processes, management models, business strategies, human capital, and information technology. Not only does the QMS help guide the implementation and achievement of organizational policy and objectives for resource management and personnel, but also it prompts an organization to focus on the core elements of quality management within its products and services: planning, control, assurance, and improvement. And just as the development and use of a QMS is often driven by standards (e.g., ISO/IEC 17025:2017 and ISO 13485:2016), the QMS often drives the organization to adopt other standards as part of bringing quality to the organization. Using our medical device manufacturer as an example, their QMS may direct them to use the ANSI/CAN/UL 2900-1 standard for ensuring medical device cybersecurity protection.[4]

Not only is the QMS vital to medical device manufacturers[2][5][6][7], but also the QMS plays an important role in most any laboratory's operations.[8][9] And in the laboratory, a quality assurance officer or manager is responsible for helping develop and maintain the laboratory's QMS, which optimally will address the importance of cybersecurity in meeting the laboratory’s goals. But the connection between a laboratory's quality assurance officer and cybersecurity is sadly not well represented in the cloud computing era. Look through the job descriptions on online job boards for quality assurance officers and you will rarely find the word "security" mentioned. Sure, the relationship between "quality" and "security" gets discussed in the context of modern software development[10], but what about within the context of a laboratory's operational quality and the people who drive it forward?

In a 2019 journal article for Lab Manager magazine, Sandia National Laboratories' chief information officer Carol Jones stated that "[c]ybersecurity is not just a technology problem; it is a people, process, and knowledge problem."[11] While this is an accurate statement, shouldn't cybersecurity also be a quality problem for a laboratory? Yes, well-trained people, vetted processes, and relevant and timely knowledge is required to ensure secure operations, but quality management and assurance—which incorporates that training, SOPs, and knowledge—should also be part of that equation. One could argue that the responsibilities of a quality assurance officer or manager are already numerous and weighty. But shouldn't that person at least have a modicum of understanding about how well-implemented IT and software security in the lab correlates to improved quality assurance outcomes?[12]

At this juncture, several questions must be asked about the quality assurance officer or manager in a laboratory operating in the 2020s:

  • What is the importance of the quality assurance officer (QAO), and do they understand cybersecurity?
  • How does the QAO help ensure quality of operations with security as a managed service?
  • How do standard operating procedures (SOPs), security audits, and other elements of a QMS positively affect quality assurance by addressing cybersecurity and cloud hosting processes?

The importance of a QAO and their security knowledge

First, the definition of what a QAO does will largely vary from company to company. However, turning to Bartram and Ballance's 1996 guide Water Quality Monitoring, the author's describe a quality assurance officer as someone "to liaise with management, to manage data archives, to conduct regular audits and reviews of the QA system, and to report on any QA issues to the program or institution manager."[13] They add that the QAO is also "responsible for regularly inspecting all aspects of the [record keeping] system to ensure staff compliance, for reporting on such inspections and audits to management, and for recommending improvements."[13] But what of a more modern definition? Turning to ISO 9000, we get a bland and non-informative definition of quality assurance itself: "part of quality management focused on providing confidence that quality requirements will be fulfilled."[14] By extension, we then get "a person responsible for providing confidence that requirements for organizational quality are fulfilled." This is a broad description, sadly. However, pulling from Bartram and Ballance, the ISO, and other sources[15][16], we could go with something like:

A quality assurance officer (QAO) is an individual responsible for ensuring organizational quality through the regular management, monitoring, review, and auditing of documentation, record systems, data, and processes as they relate to organizational quality and compliance frameworks and initiatives, while also reporting timely results, making recommendations based on those results, and assisting with training staff on approved recommendations.

Given that definition, does the average QAO need to understand at least the basics of cybersecurity? That's arguable, to be sure. After all, there are job positions such as the "cybersecurity quality and compliance officer" and the like[15], with an individual who works directly with an IT department and its cybersecurity team to ensure all mandatory laws and regulatory requirements are being adhered to, much in the same way a QAO does but on a broader organizational basis. But what about the laboratory realm? Major laboratories with significant resources may have these sorts of positions, but smaller, independent labs may not. In that case, laboratory personnel will often wear many hats, including "the tech person" or "laboratory systems engineer." (See Joe Liscouski's discussion of the "laboratory systems engineer" in his 2020 guide Laboratory Technology Planning and Management: The Practice of Laboratory Systems Engineering for more on this topic.[17]) However, given that the security surrounding an organization's electronic efforts is vital to maintaining quality operations, and also given that—hopefully—cybersecurity efforts are documented and trained upon, it's not that far a leap to suggest that the laboratory QAO should have a rudimentary understanding of IT systems and how they are secured. If cybersecurity is interwoven into the laboratory culture, including quality management, the tech-savvy QAO will be a boon to the overall quality assurance process.

The QAO and managed security services

Where does a QAO and an MSS intersect in the lab? Judging by the previous statement that the QAO may need to review organizational documentation and training material regarding cybersecurity—and even audit or assess personnel on their use of that documentation and training—we can see deduce that a QAO may be required to audit the effectiveness of any implemented MSS, or at least the documentation and processes related to the MSS. Again, it's likely in mid- to large size organizations this responsibility will fall upon the shoulders of an IT lead or IT quality officer. However, these resources may not be readily available in some laboratory settings. If those resources aren't available, the QAO may be required to know more than they expected about what managed security services entail. They won't need to be MSS experts, but as the nature of computing in the laboratory continues to evolve, having laboratory staff with relevant knowledge of automation, data management systems, and even the cloud is increasingly vital.[17]

The QMS and cybersecurity

In 2019, scientific and business consultancy Brevitas brought up the challenges of addressing cybersecurity in laboratories and other settings, noting evolving guidance that strives to address the business policies, security controls, informatics systems, and security monitoring required to better ensure the integrity and security of electronic records and data. They are one of a handful of consultancies that have publicly tied these types of standard-driven cybersecurity measures directly to the QMS[18]:

The challenge is in ensuring that these measures are effectively integrated into the existing processes outlined in the organization’s quality management system (QMS). Consideration needs to be given to first integrating cybersecurity into risk and/or criticality assessments, then downstream into system security testing during qualification and/or validation activities. As the technological landscape evolves, organizations must be more effective in their implementation of cybersecurity measures to ensure the safety of their electronic records and data. These measures must be considered as part of the QMS for all activities involved in the lifecycle of a computerized system.

As has been previously mentioned, this type of philosophy is already woven into the fabric of medical device regulation and standardization, with 21 CFR 820 on quality system regulation, ISO 13485:2016 on quality management systems, and ANSI/CAN/UL 2900 on ensuring medical device security driving how medical device cybersecurity is addressed in the manufacturer's quality management system.[7][19][20][21][22] And it may be even easier for medical device manufacturers—as well as other laboratory types—to compile, organize, disseminate, and train upon cybersecurity risk analysis data and procedural documentation with the help of an electronic QMS.[2] However, we can turn to some other businesses who have included security standards in their quality management system. Technology consultancy Konsolute has discussed why it chose to integrate ISO 27001 on information security management (and the information security management system or ISMS) into its business processes and the development of its electronic QMS, noting benefits of improved compliance, lower security risk, improved financial savings, improved reputation, and more new business.[23]

As it turns out, the ISMS and ISO 27001 have a bit in common with the QMS and ISO 9001, primarily with the goal of improving quality within the organization. Here again we see the link between a focus on cybersecurity and ensuring quality within an organization.[24][25] Senior associate Nikita Patel of Schellman & Company highlighted this association in 2017, saying that an organization "achieving this dual certification of an ISO 9001 and ISO 27001 can prove incredibly useful—in doing so, an organization can simultaneously demonstrate an organization’s ability and commitment to information security risk management, while also validating their dedication to the optimal delivery of their quality products and services."[25] From addressing anything from scoping, leadership, human resources support, and document management to internal auditing, measurement and monitoring, management review, and continual improvement, both the ISMS, focused on information security, and QMS, focused on organizational quality, improve the overall quality of an organization and its efforts.

The QAO in the context of these three points

Where does this all place the quality assurance officer in the scope of laboratory quality and information security? Whether it's managed security services, private or public cloud services, in-house networking, or a mix of all these, the modern laboratory is a technology-driven business requiring modern approaches to addressing the risks that technology carries with it. An on-site IT staff may handle many of the details associated with those efforts, but the QAO of the 2020s needs to also be familiar with how that technology works and how it impacts organizational quality initiatives. The QAO will interact with the lab's QMS, and perhaps even the ISMS if one separately exists. Ideally cybersecurity policy and procedure is already woven into the various elements of the QMS, or, worst case, the lab doesn't have much of a cybersecurity policy. This is where the QAO of today's lab must shine, "ensuring organizational quality through the regular management, monitoring, review, and auditing of documentation, record systems, data, and processes as they relate to organizational quality and compliance frameworks and initiatives." That means also understanding how managed security services and cloud services operate. It's perhaps a tall ask, but in today's competitive laboratory environment, the tech-savvy QAO is more important than ever.

References

  1. Nayyar, S. (22 December 2020). "The Unique Threats Posed By Medical IoT Devices And What To Do About Them". Forbes. https://www.forbes.com/sites/forbestechcouncil/2020/12/22/the-unique-threats-posed-by-medical-iot-devices-and-what-to-do-about-them/. Retrieved 21 August 2021. 
  2. 2.0 2.1 2.2 Jensen, D. (3 June 2017). "How an Electronic Quality Management System Helps With Cybersecurity". MasterControl. https://www.mastercontrol.com/gxp-lifeline/how-an-electronic-quality-management-system-helps-with-cybersecurity/. Retrieved 21 August 2021. 
  3. Shoemaker, D.; Sigler, K. (2014). Cybersecurity: Engineering a Secure Information Technology Organization. Cengage Learning. pp. 62–63. ISBN 9781285169903. https://books.google.com/books?id=b1s8AwAAQBAJ&pg=PA62. 
  4. Wirth, A.; Gates, C.; Smith, J. (2020). Medical Device Cybersecurity for Engineers and Manufacturers. Artech House. pp. 23–24. ISBN 9781630818159. https://books.google.com/books?id=oawCEAAAQBAJ&pg=PA23. 
  5. Therapeutic Goods Administration (March 2021). "Medical device cyber security guidance for industry" (PDF). Commonwealth of Australia. https://www.tga.gov.au/sites/default/files/medical-device-cyber-security-guidance-industry.pdf. Retrieved 21 August 2021. 
  6. "Risk Management Best Practices for Cybersecurity Compliance". AssurX Blog. AssurX, Inc. 30 January 2017. https://www.assurx.com/risk-management-cybersecurity-compliance/. Retrieved 21 August 2021. 
  7. 7.0 7.1 "Cybersecurity & Quality Management System Integration". Apraciti. https://apraciti.com/cybersecurity-quality-management-system-integration/. Retrieved 21 August 2021. 
  8. World Health Organization (2011). Laboratory Quality Management System Handbook. World Health Organization. ISBN 9789241548274. https://www.who.int/ihr/publications/lqms/en/. 
  9. United States Geological Survey. "Quality Management System for USGS Laboratories". United States Geological Survey. https://www.usgs.gov/about/organization/science-support/office-science-quality-and-integrity/quality-management-system. Retrieved 21 August 2021. 
  10. Worrall, J. (18 August 2020). "Why Quality & Security Both Matter in Software". DarkReading. https://www.darkreading.com/vulnerabilities---threats/why-quality-and-security-both-matter-in-software/a/d-id/1338649. Retrieved 21 August 2021. 
  11. Tulsi, B.B. (4 September 2019). "Greater Awareness and Vigilance in Laboratory Data Security". Lab Manager. https://www.labmanager.com/business-management/greater-awareness-and-vigilance-in-laboratory-data-security-776. Retrieved 21 August 2021. 
  12. Hamidovic, H. (2012). "Fundamental Concepts of IT Security Assurance". ISACA Journal 2: 45–9. https://www.isacajournal-digital.org/isacajournal/2012vol2?article_id=1078418&pg=45. 
  13. 13.0 13.1 Bartram, J.; Ballance, R., ed. (2020). Water Quality Monitoring: A practical guide to the design and implementation of freshwater quality studies and monitoring programmes. CRC Press. p. 218. ISBN 9780419223207. https://books.google.com/books?id=5PQCEAAAQBAJ&pg=PA218. 
  14. "ISO 9000:2015(en) Quality management systems — Fundamentals and vocabulary". ISO. 2015. https://www.iso.org/obp/ui/#iso:std:iso:9000:en. Retrieved 21 August 2021. 
  15. 15.0 15.1 Genesis IT&T (10 May 2021). "Cybersecurity Quality and Compliance Officer - 6 Month Contract". Seek. Archived from the original on 21 August 2021. https://web.archive.org/web/20210524220443/https://www.seek.com.au/job/52226409?type=standard. Retrieved 21 August 2021. 
  16. "Quality Control Officer - What They Do". Zippia. https://www.zippia.com/quality-control-officer-jobs/what-does-a-quality-control-officer-do/. Retrieved 21 August 2021. 
  17. 17.0 17.1 Liscouski, J. (December 2020). "Laboratory Technology Planning and Management: The Practice of Laboratory Systems Engineering". 
  18. "Cybersecurity Response". Brevitas. 2019. https://brevitas.us/cybersecurity-response/. Retrieved 21 August 2021. 
  19. Lincoln, J.E. (17 April 2017). "Cybersecurity - Buzzword or Serious Safety Concern?". IVT Network. https://www.ivtnetwork.com/article/cybersecurity-buzzword-or-serious-safety-concern. Retrieved 21 August 2021. 
  20. Heyl, J. (October 2017). "Overview of UL 2900 - Medical Device Cybersecurity Workshop" (PDF). UL. https://www.cybersecuritysummit.org/wp-content/uploads/2017/10/4.00-Justin-Heyl.pdf. Retrieved 21 August 2021. 
  21. "UL 2900: A Cybersecurity aid for industry and regulators" (PDF). UL. 2019. https://www.fda.gov/media/123068/download. Retrieved 21 August 2021. 
  22. "ISO 13485:2016 Medical devices — Quality management systems — Requirements for regulatory purposes". ISO. March 2016. https://www.iso.org/standard/59752.html. Retrieved 21 August 2021. 
  23. "Cybersecurity of the future: Why we include ISO 27001 as standard in our Quality Management System". Konsolute. 30 April 2021. https://www.konsolute.com/blog/iso-27001-cybersecurity-quality-management/. Retrieved 21 August 2021. 
  24. "Information Security Management System (ISMS)". CVG Strategy. 2020. https://cvgstrategy.com/information-security-management-system/. Retrieved 21 August 2021. 
  25. 25.0 25.1 Patel, N. (16 October 2017). "ISO 9001 and 27001 – The Relationship". Schellman Blog. Schellman & Company. https://www.schellman.com/blog/iso-9001-and-27001-the-relationship. Retrieved 21 August 2021.