Synergy between ISMS & GxP Compliance for value add in Pharma IT
The Covid pandemic has pushed all companies to accelerate their digitization plans and ramp up adoption of emerging technologies. For regulated companies like Pharma, which operated in secure offices and fortified offshore development centers, this has also meant new ways of working and additional challenges in cybersecurity. Furthermore, with the need for agility in cases like developing the Covid vaccine, it has prompted innovation on saving efforts and time to achieve GxP Compliance. With Pharma companies' legacy focus on compliance and with the evolving zeitgeist, it has become more important to synergize the cybersecurity and GxP compliance efforts and derive complementary gains.
There always has been some overlaps and confusion between the expectations on Cybersecurity Implementation following NIST/ISO standards and 21 CFR Part 11/Annex 11/ GAMP expectation on Computer System Validation. The contradiction stems from the seemingly different end goals, gatekeepers, and standard for confirming fulfillment of the expectation. While QA Compliance professionals have a mandate for ensuring regulatory compliance and audit readiness for GxP Business Processes/Data for the organization, ISMS (Information Security Management System) Professionals have a mandate of ensuring the 'CIA Triad (Confidentiality, Integrity & Availability) is maintained for end to-end business processes and all relevant data based on risk classification. Furthermore, considering the ISO OSI model( a conceptual model for network communication) as reference point, ISMS professionals have ownership for all 7 Layers (Physical Layer to Application Layer) whereas Quality Unit is mostly focused on Layer 7(Application Layer). On the outset it may seem that there is only narrow overlap of scope in Application Layer. However, in practice there are overlaps that transcends the OSI layer boundaries – this is especially true as Quality Unit is in some cases responsible to enforce requirements not limited to application layer and may not have enough tools and expertise to enforce requirements on lower OSI Layers. For e.g., Annex 11, Point 7.1 requires that’ Data should be secured by both physical and electronic means against damage’ – this requirement cannot be fulfilled without appropriate controls at the Physical layer of the OSI model. Despite the differences and contradictions there are many common elements that provide potential for synergy due to overlaps.
NIST Control ID | NIST SP 800-53 CONTROLS Title | ISO/IEC 27001 CONTROLS Reference ID | Pharma Regulations |
---|---|---|---|
AC-3 | Access Enforcement | A.6.2.2, A.9.1.2, A.9.4.1, A.9.4.4, A.9.4.5, A.13.1.1, A.14.1.2, A.14.1.3, A.18.1.3 | EU Annex 11, Section 12, 21 CFR Part 11 Sec.11.10 - (d), (g) |
AU-2 | Event Logging | None | EU Annex 11, Section9, 21 CFR Part 11 Sec.11.10(e) |
AU-10 | Non-repudiation | None | 21 CFR Part 11 Sec.11.10 (j) |
AU-11 | Audit Record Retention | A.12.4.1, A.16.1.7 | EU Annex 11, Section9, 21 CFR Part 11 Sec.11.10(e) |
CA-3 | Information Exchange | A.13.1.2, A.13.2.1, A.13.2.2 | EU Annex 11, Section5 |
CM-1 | Configuration Management Policy and Procedures | 5.2, 5.3, 7.5.1, 7.5.2, 7.5.3, A.5.1.1, A.5.1.2, A.6.1.1, A.12.1.1, A.18.1.1, A.18.2.2 | EU Annex 11, Section 10 |
CM-3 | Configuration Change Control | 8.1, A.12.1.2, A.14.2.2, A.14.2.3, A.14.2.4 | EU Annex 11, Section 10 |
CM-8 | System Component Inventory | A.8.1.1, A.8.1.2 | EU Annex 11, Section 4.3 |
CP-1 | Contingency Planning Policy and Procedures | 5.2, 5.3, 7.5.1, 7.5.2, 7.5.3, A.5.1.1, A.5.1.2, A.6.1.1, A.12.1.1, A.18.1.1, A.18.2.2 | EU Annex 11, Section 16 |
CP-2 | Contingency Plan | 7.5.1, 7.5.2, 7.5.3, A.6.1.1, A.17.1.1, A.17.2.1 | EU Annex 11, Section 16 |
CP-4 | Contingency Plan Testing | A.17.1.3 | EU Annex 11, Section 16 |
IA-2 | Identification and Authentication (Organizational Users) | A.9.2.1 | 21CFR Part 11, Subpart C, Sec 11.300(a), Annex 11 Section 12.1 |
PM-5 | System Inventory | None | Annex 11, Section 4.3 |
SA-5 | System Documentation | 7.5.1, 7.5.2, 7.5.3, A.12.1.1* | 21CFR Part 11, Subpart C, Sec 11.10(k), Annex 11 Section 4.1 |
SI-10 | Information Input Validation | None | Annex 11, Section 4.7 |
SI-11 | Error Handling | None | Annex 11, Section 4.7 |
SI-12 | Information Management and Retention | None | Annex 11, Section 7.1, Section 17 |
SR-6 | Supplier Assessments and Reviews | A.15.2.1 | Annex 11, Section 3.2 |
Note: NIST controls have been considered for mapping as its has most exhaustive scope for information security controls. Only NIST to Pharma regulations have been mapped as part of this article and NIST to ISO control mapping has been taken AS-IS from NIST publication[R1].
The strong case for synergy for GxP relevant process and data would mean that rather than duplicate verification for similar requirements derived from different frameworks, requirements could be checked or formally tested by one group and referred by the other group. In terms of control assessments, this would mean translating the similar controls written with different languages under the same item and leveraging each other for evidence required for fulfillment of the control . Also, each group can leverage each other's core expertise and focus on bringing value with their skills and knowledge .
The only issue could be the expectation on evidence fulfillment. While a simple system screenshot showing the required evidence may be considered sufficient by the ISMS group, GXP good documentation practices may expect a more rigorous process. The best approach would be to use industry and organizational best practices independent of which group is performing the checks.
A few cases as below are identified to typify the potential of this synergy:
Security & Authorization
Annex 11 and 21 CFR part 11 outline the need for authentication and authorization requirements. These also form the very core of the ISO expectations and mandate of ISMS professionals in ensuring data integrity & confidentiality. Most of these controls can be taken as access control design requirements during application set up in initial project phase and confirmed by ISMS group. The compliance group can refer to the evidence gathered by ISMS group for concepts of appropriate authentication, password management, authorization set up etc. With the resultant time saved, they can focus and bring in more value to formally validate the role-based training & authorization to specific GxP modules and functionalities in complex enterprise systems.
Audit Log and Audit trails
Audit trails in GxP Compliant computerized systems represent the core expectation from Annex 11 and 21 CFR part 11 in ensuring integrity of GXP Data. While audit logs may refer to logging activity for any changes to system configuration, user authorizations etc, from a GxP audit trail perspective it is most important to log creation and update or any data changes for GxP regulated records. For some systems, GXP Audit trail requirements could potentially be a subset of this data action change audit log . At system level both represent the same if audit logs are configured to maintain traceability of all user activity (rather than only last change) and compliance group should proactively set this expectation. As per GAMP Data Integrity Key Concepts[R4], ‘audit trails should be on from system installation and data should be fully attributable’, however compliance professionals may not be always involved during initial system set up. If the audit trail functionality is confirmed by the ISMS during application set up, the same could be leveraged by compliance group for different projects.
As a simplistic example, most enterprise systems available today offer audit trails as standard or configurable items. Audit trails availability and verification could be done during system set up and configured as enabled for specific modules as and when they go live. Of course, an assessment by quality unit for each case would be required to establish whether the system audit trails can be leveraged AS-IS or with supporting requirements and fitness for intended use. For any additional customization requirements, compliance unit would ensure audit trail requirements are captured and verified at new functionality or table level.
Another aspect for consideration is that the audit log or trail may be enabled however if it is not retained in a secure way and available for review, it does not add any value. ISMS professionals can ensure strict privileged access control to avoid any integrity issues in audit trails. The audit trail retention is discussed in detail in the last point as a consideration item for ISMS professionals.
Protecting Confidential GxP data
For open systems, 21 CFR Part 11 has mention of document encryption requirements for consideration. For closed systems though there is no explicit mention in 21CFR part 11, there is a strong case for encryption for some subset of GXP data. For e.g., Patient details are considered Pll from data privacy perspective and study details are considered confidential thus requiring encryption. In this context ISMS professionals can bring in much more value with their expertise on cryptography concepts for maintaining confidentiality and managing privacy topics. Compliance professionals working closely with the projects can check for masking or anonymization of sensitive GxP Data where production data is exposed (e.g., creating test data or migration mock loads).
Data exchange with other systems
Annex 11 states that computerized systems exchanging data electronically with other systems should include appropriate built-in checks for correct and secure entry and data processing. 21 CFR also alludes to the same with mention of terminal checks.. This is very relevant for ISMS professionals for ensuring integrity of the data exchanged. In respect of ensuring integrity, the compliance group can oversee a formal validation for intended use of the interface (including checksums when required) and requirement for transfer of metadata based on GxP complexity (e.g., audit trails). The ISMS group can contribute more on setting up monitoring of the interface for any failures, considering if any new threats are introduced in interfacing with another system (with different risk classification & security set up) and importantly ensuring confidentiality with use of encryption for data in transit as required.
Data backup & retention requirement
Back up requirement is explicitly mentioned only in Annex 11 while Retention requirements are enumerated in both 21CFR Part 11 and Annex 11. Back up topic is a forte of ISMS professionals with their in-depth knowledge of different data backup procedures, schemes and technical requirements defined for RPO (Recovery Point Objective) and RTO (Recovery Time Objective). Compliance group can use their domain knowledge in verifying that retention requirements are appropriately applied as per GXP requirements and only backup is not retained instead of true archives.
In terms of audit trail retention, though it’s a core GxP expectation, compliance group may not have enough tools to set up preventive controls and thus can leverage experience of the ISMS group to enforce this more accurately.
Above mentioned points are just few examples on the power of synergy. It is pertinent to note here that ISPE has set up a special interest group on IT Cybersecurity as part of GAMP Trademark. It would be interesting to see further discussions on building this synergy between ISMS and GxP Compliance Professionals to bring further value to the Pharma organization. 1, 2, 3, 4
iSpeak Blog posts provide an opportunity for the dissemination of ideas and opinions on topics impacting the pharmaceutical industry. Ideas and opinions expressed in iSpeak Blog posts are those of the author(s) and publication thereof does not imply endorsement by ISPE