Applying GAMP 5 To Validate An ERP System: by Stephen R. Ferrell
Applying GAMP 5 To Validate An ERP System: by Stephen R. Ferrell
Applying GAMP 5 To Validate An ERP System: by Stephen R. Ferrell
This article
discusses how Applying GAMP 5 to Validate an ERP
the GAMP 5
quality risk System
management
strategy was
applied to an by Stephen R. Ferrell
actual case
study of a
validated
Enterprise
Resource
Planning (ERP) Introduction
R
was a legacy system. The system had not been
system. isk management concepts in the indus- previously used for GMP purposes. Therefore,
try are maturing and harmonizing as the documentation surrounding the system was
reflected in ICH Q9 Quality Risk Man- essentially non-existent in that it did little to
agement. GAMP 5® provides direction support the use of the system in a regulated
in applying these concepts in the development, environment.
implementation, and maintenance of computer- An important element when purchasing a
ized systems. Risk to the patient and product computer product or service is supplier assess-
quality continue to be the primary areas of ment, which may include supplier audit. In this
concern. This article shows how such risk-based case, however, while the system was new to the
approaches can be effectively applied to ERP GMP manufacturing plant, it had been in use
validation and compliance. supporting the business for 15 years. As a result,
Typically, Commercial Off-the-Shelf Soft- a decision was made, justified, and documented
ware (COTS) packages, including those used as with the rationale for why an audit would not
the basis for most ERP implementations, will occur. The organization acknowledged that the
be carefully tested by the suppliers before com- vendor is an established and recognized busi-
mercial release. Therefore, there is no intrinsic ness solution provider with a large user base
value in attempting to test every mouse click in the industry. The project team defined and
or every submenu in this context and it is not included relevant intended use risks in the Risk
a regulatory requirement. The focus should Assessment.
be rather on ensuring that the configuration
of the product is defined, holistic (in terms of Process
GxP1,2 and Part 113 compliance), follows actual Validation Strategy
business processes, and is verified to be fit for Creating a Computerized System Validation
intended use. Plan is a fundamental building block of any vali-
The regulated company should focus on dation project because it outlines the strategy
managing potential risk to patient safety and for the entire project. Keep in mind, however,
product quality, and ensuring compliance with that every system, implementation, organiza-
the relevant GxP regulations, including 21 CFR tion, and site is different, so rather than focus
Part 11. Additionally, they also should consider on “what goes in a validation plan,” focus rather
the impact to the overall business process. on the various document components that do
GAMP 5 defines a computerized system as: “A exist based on the legacy history of the ERP
computerized system consists of the hardware, system to determine the rationale, and the ap-
software, and network components, together proach used to outline a testing strategy. This
with the controlled functions and associated strategy can be incorporated into any validation
documentation.”4 Based on this definition, a plan or equivalent.
holistic approach was used in the implementa-
tion of the ERP system as described below. GAMP 5 Based Risk Assessment
For the purpose of this case study, the risk was
Case Study broken down into the following three compo-
Overview nents:
The ERP system discussed in this article, SAP®,
SCS-06. CPU Speed 1.0 – 4.7 GHz CPU clock rate Table B. Server configuration.
SCS-07. RAM 12 – 28 GB
Network Topology
SCS-08. Disk Space 660 – 1200 GB
Table D describes the various components that were mapped
SCS-09. Network Ports Minimum 1 Network Port and later qualified.
SCS-10. Logical Partition Yes
SCS-11. LPAR Details 4 FC Adapter Transport Management
2 Network Adapter Figure 1 illustrates how the transport process flow is man-
Table A. ERP infrastructure hardware configuration. aged from Sandbox to Development, from Development to
QA, and then ultimately into production. It is important to
Table A illustrates how each server was broken down. Table define and control the transport method and flow. This should
B illustrates how each switch was broken down. be incorporated into the change control system.
ERP Infrastructure Environmental Conditions Peripheral System Interfaces
It may seem redundant to capture and verify environmental The last key element to discuss in the Core SCS are Peripheral
conditions, especially considering the servers had already been Systems. It is important to understand the data input into
used in support of the application. However, failure to ensure the ERP, the data source, and the controls around that source.
a temperate and sustained environment for your servers can Equally, one must understand what system the ERP output
have a significant business impact - Table C. data is sent to for use. Those interfaces and the associated
systems should be carefully evaluated to determine GMP use
Physical Security and subsequently their validation status. Examples from this
All of the Physical Security attributes were defined and implementation included a barcode system, a LIMS, and a
later formally verified for the various data centers around Labeling System.
the globe.
Part 2 – Customizing the Application and
Database Security Profiles Configuration Documents (GAMP 5 Appendix
An important and easily overlooked component to any client/ D3 – 3.3.5 Software Design)
server system is database security, i.e., who has access to As described earlier, the ERP system was used for non-GMP
your back-end tables. Typically, application security will not purposes; therefore, the configuration documentation was
address those accessing your servers from outside the ap- not very reliable. The idea of examining and categorizing all
plication. For this ERP system, the Administrator Accounts, of the various customizations of the past would prove to be a
Administrators Roles, Role Mapping, Data Exchange Account, non-value added exercise, and it became very apparent that
and Unix Access were defined. Again, the “buckets” are not doing so would not be practical, due to the required customi-
as important as the content, and who can access the data. It zation to further achieve compliance.
is important to understand who can do what, define it, and
control the access to the data.
11. ISPE GAMP® 5: A Risk-Based Approach to Compliant GxP About the Author
Computerized Systems, International Society for Phar- Stephen Ferrell is a Certified Information
maceutical Engineering (ISPE), Fifth Edition, February Systems Auditor and is Certified in Risk and
2008, Appendix D2 3.2.3 – Functions, www.ispe.org. Information Systems Control. He has more
than 12 years of progressive IT experience
12. ISPE GAMP® 5: A Risk-Based Approach to Compliant GxP
with emphasis on computer system and soft-
Computerized Systems, International Society for Phar-
ware compliance, QA auditing, and quality
maceutical Engineering (ISPE), Fifth Edition, February
strategies. He is currently a member of the
2008, Appendix D2 3.2.4 – Data, www.ispe.org.
GAMP North America Steering Committee,
13. ISPE GAMP® 5: A Risk-Based Approach to Compliant GxP Chairs the GAMP IT Infrastructure SIG, is Assc. Director of
Computerized Systems, International Society for Phar- Verification & Validation, serves as a Regulatory Advisor on
maceutical Engineering (ISPE), Fifth Edition, February the Board of Sidus BioData. He can be contacted by telephone:
2008, Appendix D2 3.2.5 – Interfaces, www.ispe.org. +1-717-330-8941 or by email: stephen.ferrell@qiagen.com.
Qiagen Inc., 1201 Clopper Rd., Gaithersburg, MD 20878,
14. ISPE GAMP® 5: A Risk-Based Approach to Compliant GxP USA.
Computerized Systems, International Society for Phar-
maceutical Engineering (ISPE), Fifth Edition, February
2008, Appendix M8 – Project Change and Configuration
Management, www.ispe.org.