[SystemSafety] Software Safety Assessment
Andreoli, Kevin (UK)
kevin.andreoli at baesystems.com
Wed Jul 8 14:18:43 CEST 2015
The fact that the software was assessed 10 years ago and hasn't been fielded suggests that it is unused 10 year old code.
I am not sure how that can be read any other way.
From: systemsafety-bounces at lists.techfak.uni-bielefeld.de [mailto:systemsafety-bounces at lists.techfak.uni-bielefeld.de] On Behalf Of Carl Sandom
Sent: 08 July 2015 13:09
To: systemsafety at lists.techfak.uni-bielefeld.de
Subject: Re: [SystemSafety] Software Safety Assessment
Some important clarifications:
Project A has not yet been fielded but the software was assessed against Standard X 10 years ago.
The techniques applied to Project A were appropriate and fulfilled the requirements of Standard X......at that time and now. But the evidence from the checklist could have been better.
No idea why you assumed unused 10 year old code but that's not the case here.
Cheers
Carl
From: Drew Rae [mailto:d.rae at griffith.edu.au]
Sent: 08 July 2015 12:57
To: Carl Sandom
Cc: systemsafety at lists.techfak.uni-bielefeld.de<mailto:systemsafety at lists.techfak.uni-bielefeld.de>
Subject: Re: [SystemSafety] Software Safety Assessment
"Acceptable" either comes from some form of social consensus, or from a belief that the particular techniques applied are appropriate for that particular piece of software. The way you've phrased the question, it sounds like there is significant doubt that the techniques applied on Project A were appropriate for Project A. If Project A hasn't been previously deployed, that's like saying
"I've got this piece of old flex cable sitting under the house. It doesn't meet current electrical safety standards - in fact it wouldn't have met 10 year old safety standards except they were a bit vague and there was a loophole - but I should be allowed to use it anyway. And since I'm using dodgy flex anyway, you don't mind if I apply the same standards to my new wiring as well, do you?".
Compliance with a standard is typically the _minimum_ required for safety. Safety requires compliance, but compliance doesn't give safety. If there's doubt that the checklist for Project A was good enough, no amount of weaselling about standards is going to make it good enough.
As others have said though, if you just want acceptability as a social consensus, then it's not a question that can be answered in the abstract, only in terms of the supplier, customer, and any contract or regulator involved.
Incidentally - someone is resurrecting 10 year old code that's been sitting unused, and significantly hacking it around, and they intend to use it for a safety application? And that's not enough to make people run screaming for cover? I can understand a need to modify legacy embedded code that's been in use, but unused 10 year old code?
* This message is from my work email
* I can also be contacted on andrew at ajrae.com<mailto:andrew at ajrae.com>
* My mobile number is 0450 161 361
* My desk phone is 07 37359764
* My safety podcast is DisasterCast.co.uk<http://DisasterCast.co.uk>
On 08/07/2015, at 7:53 PM, Carl Sandom wrote:
Consider the following scenario:
In 2004 Project A software was assessed against a safety standard (let's call it Standard X). Standard X had a very prescriptive list of software safety requirements and a simple checklist was used for assessing SIL1 compliance.
In 2014, Project B began to integrate significant new functionality into Project A. Standard X, which was by 2014 an obsolete standard, was used to assess the significantly smaller software baseline of Project B. Under modern scrutiny, the simple Standard X checklist used for Project A in 2004 was not as explicit as it could have been and it was decided to use an improved checklist for Project B.
A couple of important questions can be raised with this scenario:
1. Is it acceptable to use an obsolete safety standard to assess software?
2. Is the SIL1 claim for 10 year old Project A invalid because the checklist could have been better?
3. If Project B used the old checklist from Project A would that be adequate?
I've been having some interesting discussions with the Project Managers involved, any thoughts?
Regards
Carl
_________________________________
Dr. Carl Sandom CErgHF CEng PhD
Director
iSys Integrity Ltd.
+44 7967 672560
carl at isys-integrity.com<mailto:carl at isys-integrity.com>
www.isys-integrity.com<http://www.isys-integrity.com>
_________________________________
_______________________________________________
The System Safety Mailing List
systemsafety at TechFak.Uni-Bielefeld.DE<mailto:systemsafety at TechFak.Uni-Bielefeld.DE>
********************************************************************
This email and any attachments are confidential to the intended
recipient and may also be privileged. If you are not the intended
recipient please delete it from your system and notify the sender.
You should not copy it or use it for any purpose nor disclose or
distribute its contents to any other person.
********************************************************************
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.techfak.uni-bielefeld.de/mailman/private/systemsafety/attachments/20150708/7965be23/attachment.html>
More information about the systemsafety
mailing list