GxP Guidance
Atlassian Outsourcing guidance
Disclaimer
The guidance provided below is solely for the purposes of assisting customers in the public and private sector, as well as enterprise organisations that are deemed a “regulated entity” by Goods & Practices (GxP) that are considering outsourcing business functions to the cloud in their evaluation of Atlassian’s cloud products and associated services.
This report is intended solely to provide information and guidance to Atlassian’s cloud customers on how we align with GxP. In parallel to this, we have a dedicated Shared Responsibilities whitepaper which discusses the shared responsibilities that both a Cloud Service Provider (“CSP”), like Atlassian, and its customers need to keep in mind when ensuring compliance with GxP. This shared responsibility model does not remove the accountability and risk from customers using Atlassian Cloud products, but it does help relieve our customer’s burdens in a number of ways, including by: managing and controlling system components and physical control of facilities; and shifting a portion of the cost of security and compliance onto Atlassian and away from our customers.
To learn more about our commitment to safeguard customer data, visit our Security Practices page.
ID | GxP Guidance | Atlassian Response | Atlassian Resources | |
---|---|---|---|---|
Introduction | 1.0 | What is GxP? GxP is a set of regulations and quality guidelines formulated to ensure the safety of life sciences products while maintaining the quality of processes throughout every stage of manufacturing, control, storage, and distribution. The GxP standards were established by the Food and Drug Administration (FDA) for a range of compliance related activities. The term GxP regulations refers to the underlying international pharmaceutical requirements, such as those outlined in the US FD&C Act, US PHS Act, FDA regulations, EU Directives, Japanese regulations, or other applicable national legislation or regulations under which an organization operates. Atlassian Cloud Security Shared ResponsibilitiesSecurity is a top priority and we must work together to protect your mission-critical applications and make informed decisions. Atlassian products are built with security at the core and our dedicated security teams safeguard your data by monitoring risk and responding quickly. In Cloud, Atlassian focuses on the security, compliance, and reliability of the applications, the systems they run on, and the environment those systems are hosted within. We ensure your systems and environments are compliant with relevant standards, including ISO27001, SOC2, GDPR, and many others that live with our Trust Center. You, our customers, manage the data within your accounts, the users and user accounts accessing your data, and control which Marketplace Apps (formerly called “add-ons”) you install and trust. When using our applications, you are responsible for ensuring your organization is using our products in a compliant way. The guidance provided will articulate the responsibilities both shared between Atlassian and you, our customer. If you would like to learn more about Atlassian’s Shared Responsibility Model, please download our white paper. | ||
Atlassian and GxP | 2.0 | How does Atlassian help organizations that deal with regulated aspects of the research, clinical study, maintenance, manufacturing, and distribution of life science products and services meet their requirements under Good Clinical, Laboratory, and Manufacturing Practices (GxP)? | Customers are solely responsible for determining the suitability of cloud services in the context of FDA 21 CFR Part 11 Subpart B and EudraLex, Volume 4, Annex 11. Organizations using Atlassian products are responsible for determining the GxP requirements that apply to their systems, based on the intended use and regulatory standard. | |
FDA 21 CFR Part 11 Subpart B | ||||
Electronic Records 11.10 Persons who use closed systems to create, modify, maintain or transmit electronic records shall employ procedures and controls designed to ensure the authenticity, integrity, and, when appropriate, the confidentiality of electronic records, and to ensure that the signer cannot readily repudiate the signed record as not genuine. Such procedures and controls shall include the following: | 3.0 | 11.10 (a) Validation of systems to ensure accuracy, reliability, consistent intended performance, and the ability to discern invalid or altered records. Customers using Atlassian products in FDA-regulated systems, are fully responsible for all software-validation activities. | Customers using Atlassian products in FDA-regulated systems, are fully responsible for all software-validation activities. | |
3.1 | 11.10 (b) The ability to generate accurate and complete copies of records in both human readable and electronic form suitable for inspection, review, and copying by the agency. Persons should contact the agency if there are any questions regarding the ability of the agency to perform such review and copying of the electronic records | Customers are responsible for maintaining the accuracy and completeness of their electronic records, and for the direct protection of their data and applications. As a cloud infrastructure provider, Atlassian generally has no insight into the data that customers store or process in Atlassian products. Atlassian has no ability to generate copies of these records. Learn more about how we embed privacy into our products by visiting How we handle your data (https://www.atlassian.com/trust/privacy/how-we-handle-your-data ). | ||
3.1 | 11.10 (c) Protection of records to enable their accurate and ready retrieval throughout the records retention period | Customers are responsible for implementing security procedures that protect against unauthorized access or changes to their systems and data. Customers can implement data backups to align with their record retention policies. To avoid data loss, we recommend making regular backups. Learn more about creating backups in the support documentation for your product: https://support.atlassian.com/ . For more information about our backup program in our Security Practices paper (https://www.atlassian.com/trust/security/security-practices#backups ) | ||
3.2 | 11.10 (d) Limiting system access to authorized individuals. | Customers are responsible for the direct protection of their data and applications, including implementing security procedures that protect against unauthorized access to their systems and data. Customers have the ability to strengthen and enhance access security for their products by readily enforcing 2-step verification (https://support.atlassian.com/security-and-access-policies/docs/enforce-two-step-verification/) and password policies (https://support.atlassian.com/security-and-access-policies/docs/manage-your-password-policy/). To see further documentation, please visit https://support.atlassian.com/. | ||
3.3 | 11.10 (e) Use of secure, computer-generated, time-stamped audit trails to independently record the date and time of operator entries and actions that create, modify, or delete electronic records. Record changes shall not obscure previously recorded information. Such audit trail documentation shall be retained for a period at least as long as that required for the subject electronic records and shall be available for agency review and copying. | Customers are responsible for all aspects of system data retention and integrity, which should be considered in the design and development of computerized systems. These responsibilities include implementing audit controls within the customer’s environment and logging of development history events or data changes. For Atlassian Cloud customers, audit logs for changes to the organization are available as part of Atlassian Access. With audit logs, you have visibility into admin actions to users, groups, permissions etc. More information can be found here: https://support.atlassian.com/security-and-access-policies/docs/track-organization-activities-from-the-audit-log/ | ||
3.4 | 11.10 (f) Use of operational system checks to enforce permitted sequencing of steps and events, as appropriate. | Atlassian assumes responsibility for security, availability and performance of the applications we provide, the systems they run on, and the environments within which those systems are hosted. However, security is a joint responsibility between Atlassian and our customers with respect to four areas in particular: Policy and compliance - ensuring that the system meets customer business needs and is operated in accordance with industry, regulatory and legislative compliance obligations. Users - the creation and management of user accounts. Information - the content customers store within Confluence Cloud, Jira Cloud, Trello or Bitbucket Cloud. Marketplace Apps - third party services which integrate with Atlassian products. | ||
3.5 | 11.10 (g) Use of authority checks to ensure that only authorized individuals can use the system, electronically sign a record, access the operation or computer system input or output device, alter a record, or perform the operation at hand. | Access permissions: While our products are by nature designed to enable collaboration, customers do need to exercise caution in the permissions they grant to users within their organization regarding access to data. In some cases they can also grant public access to data – Atlassian has no control over this and cannot in these cases prevent such data being copied or further distributed. | ||
3.6 | 11.10 (h) Use of device (e.g., terminal) checks to determine, as appropriate, the validity of the source of data input or operational instruction. | This control is not applicable to Atlassian. Customers are responsible for the data hosted in Atlassian, including verifying the validity of the source of data. | ||
3.7 | 11.10 (i) Determination that persons who develop, maintain, or use electronic record/electronic signature systems have the education, training, and experience to perform their assigned tasks. | Customers are responsible for implementing a formal screening, training, and education program to help ensure that personnel have the knowledge and experience required to meet GxP requirements in their environment. | ||
3.8 | 11.10 (j) The establishment of, and adherence to, written policies that hold individuals accountable and responsible for actions initiated under their electronic signatures, in order to deter record and signature falsification. | This control is not applicable to Atlassian. Customers are responsible for establishing and enforcing their own internal policies and procedures to hold their employees or other users accountable and responsible for their individual actions. | ||
3.9 | 11.10 (k) (1) Adequate controls over the distribution of, access to, and use of documentation for system operation and maintenance. | Customers are responsible for implementing and managing procedural controls that govern the access to and use of system documentation within their environment. Atlassian provides documentation for the use and management of cloud tenancies. For more information, see how Atlassian keeps data secure: https://www.atlassian.com/trust/security/security-practices#tenant-separation . | ||
3.10 | 11.10 (k) (2) Revision and change control procedures to maintain an audit trail that documents time-sequenced development and modification of systems documentation. | Customers are responsible for changes made to their own systems, including the maintenance of appropriate documentation and change management procedures. | ||
EudraLex, Volume 4, Annex 11: Computerized Systems | 4.0 | The following table details key considerations for customers running their medicinal products regulated by the European Commission on computerized systems and/or applications on Atlassian. This information includes a brief summary of customer responsibilities, Atlassian practices and controls, and Atlassian services and features that might help customers meet their obligations under the EudraLex, Volume 4 Good Manufacturing Practice (GMP), Annex 11 Computerized Systems Guidelines | ||
Risk Management | 5.0 | Risk management should be applied throughout the lifecycle of the computerized system taking into account patient safety, data integrity and product quality. As part of a risk management system, decisions on the extent of validation and data integrity controls should be based on a justified and documented risk assessment of the computerized system. | Customers are responsible for identifying and assessing environmental, regulatory, and technological changes and, if necessary, updating the design and deployment of its internal controls to help ensure the continuing security, availability, and confidentiality of their applications and workloads. | |
Personnel | 6.0 | There should be close cooperation between all relevant personnel such as Process Owner, System Owner, Qualified Persons and IT. All personnel should have appropriate qualifications, level of access and defined responsibilities to carry out their assigned duties | Customers are responsible for implementing a formal training, and education program to help ensure that personnel have the knowledge and experience required to meet GxP requirements in their environment. Customers are responsible for establishing and enforcing their own internal policies and procedures to hold their employees or other users accountable and responsible for their individual actions. Customers should maintain records of personnel qualifications and training and, where applicable, disciplinary or corrective actions. | |
Suppliers and Service Providers | 7.0 | When third parties (e.g., suppliers, service providers) are used e.g., to provide, install, configure, integrate, validate, maintain (e.g., via remote access), modify or retain a computerized system or related service or for data processing, formal agreements must exist between the manufacturer and any third parties, and these agreements should include clear statements of the responsibilities of the third party. | Customers are responsible for ensuring that they have formal, written agreements with all third parties (for example, suppliers and service providers) that clearly define the roles of each party. | |
7.1 | The competence and reliability of a supplier are key factors when selecting a product or service provider. The need for an audit should be based on a risk assessment. | Customers are responsible for identifying and assessing the competence and reliability of their suppliers based on their system requirements and risk assessment.
| ||
7.2 | Documentation supplied with commercial off-the-shelf products should be reviewed by regulated users to check that user requirements are fulfilled | Customers are responsible for developing and maintaining an appropriate quality-management system of their suppliers and their suppliers’ products and services. This system should include procedures for risk assessments and quality audits. | ||
7.3 | Quality system and audit information relating to suppliers or developers of software and implemented systems should be made available to inspectors on request | Customers are responsible for developing and maintaining an appropriate quality-management system of their suppliers and their suppliers’ products and services. This system should include procedures for risk assessments and quality audits. | ||
Validation | 8.0 | The validation documentation and reports should cover the relevant steps of the life cycle. Manufacturers should be able to justify their standards, protocols, acceptance criteria, procedures and records based on their risk assessment | Customers are responsible for all system-validation documentation of their GxP systems, including protocols, acceptance criteria, and procedures. | |
8.1 | Validation documentation should include change control records (if applicable) and reports on any deviations observed during the validation process | Customers are responsible for all system-validation documentation and testing of their GxP systems, including change control records. | ||
8.2 | An up to date listing of all relevant systems and their GMP functionality (inventory) should be available. | Customers are responsible for all system-validation documentation of their GxP systems, including relevant system inventory. | ||
8.3 | User Requirements Specifications should describe the required functions of the computerized system and be based on documented risk assessment and GMP impact. User requirements should be traceable throughout the life-cycle | Customers are responsible for all system-validation documentation of their GxP systems, including user requirement specifications. | ||
8.4 | The regulated user should take all reasonable steps, to ensure that the system has been developed in accordance with an appropriate quality management system. The supplier should be assessed appropriately | Customers are responsible for all system-validation documentation and testing of their GxP systems, including the implementation of an appropriate quality-management system. | ||
8.5 | For the validation of bespoke or customized computerized systems there should be a process in place that ensures the formal assessment and reporting of quality and performance measures for all the life-cycle stages of the system | Customers are responsible for all system-validation documentation and testing of their GxP systems, including the assessment and reporting of quality and performance measures. | ||
8.6 | Evidence of appropriate test methods and test scenarios should be demonstrated. Particularly, system (process) parameter limits, data limits and error handling should be considered. Automated testing tools and test environments should have documented assessments for their adequacy | Customers are responsible for all system-validation documentation and testing of their GxP systems, including system parameter limits, data limits, and error handling. | ||
8.7 | If data are transferred to another data format or system, validation should include checks that data are not altered in value and/or meaning during this migration process | Customers are responsible for all system-validation documentation and testing of their GxP systems, including data-integrity checks. | ||
Data | 9.0 | Computerized systems exchanging data electronically with other systems should include appropriate built-in checks for the correct and secure entry and processing of data, in order to minimize the risks. | Customers are responsible for the direct protection of their data and applications, including implementing appropriate security controls for secure processing of data. Customers are responsible for encrypting data in transit within their on-premises environment. | |
Accuracy Checks | 10.0 | For critical data entered manually, there should be an additional check on the accuracy of the data. This check maybe done by a second operator or by validated electronic means. The criticality and the potential consequences of erroneous or incorrectly entered data to a system should be covered by risk management | Customers are responsible for ensuring that appropriate checks are in place to validate the accuracy of source data entered into their GxP systems. | |
Data Storage | 11.0 | Data should be secured by both physical and electronic means against damage. Stored data should be checked for accessibility, readability, and accuracy. Access to data should be ensured throughout the retention period. | Customers are responsible for directly protecting their data and applications, including implementing security measures that restrict access to their own facilities and locations where they operate. This responsibility includes physically securing access to and transmission of data, and restricting the display of data, to authorized individuals. | |
11.1 | Regular back-ups of all relevant data should be done. Integrity and accuracy of backup data and the ability to restore the data should be checked during validation and monitored periodically. | Customers are responsible for implementing a backup process, a replication process, or both in line with their requirements and policies. | ||
Printouts | 12.0 | It should be possible to obtain clear printed copies of electronically stored data. | Customers are responsible for ensuring that printed copies of electronically stored data are available. | |
12.1 | For records supporting batch release it should be possible to generate printouts indicating if any of the data has been changed since the original entry. | Customers are responsible for the integrity and accuracy of data generated, stored, or processed by their systems. | ||
Audit Trails | 13.0 | Consideration should be given, based on a risk assessment, to building into the system the creation of a record of all GMP-relevant changes and deletions (a system generated “audit trail”). For change or deletion of GMP-relevant data the reason should be documented. Audit trails need to be available and convertible to a generally intelligible form and regularly reviewed. | Customers are solely responsible for meeting this requirement. | |
Change and Configuration Management | 14.0 | Any changes to a computerized system including system configurations should only be made in a controlled manner in accordance with a defined procedure. | Customers are responsible for any changes made to their environment, including, but not limited to, virtual networks, operating systems, virtual machines, databases, storage, and applications. | |
Periodic Evaluation | 15.0 | Computerized systems should be periodically evaluated to confirm that they remain in a valid state and are compliant with GMP. Such evaluations should include, where appropriate, the current range of functionality, deviation records, incidents, problems, upgrade history, performance, reliability, security and validation status reports. | Customers are responsible for periodically evaluating computerized systems in their environment and complying with GMP requirements. | |
Security | 16.0 | Physical and/or logical controls should be in place to restrict access to computerized system to authorized persons. Suitable methods of preventing unauthorized entry to the system may include the use of keys, pass cards, personal codes with passwords, biometrics, restricted access to computer equipment and data storage areas. | Customers are responsible for directly protecting their data and applications. This protection includes physical and logical security measures that restrict access to its own facilities, systems, and data from unauthorized individuals. | |
16.1 | The extent of security controls depends on the criticality of the computerized system. | Customers are responsible for determining the criticality of their systems and implementing appropriate controls. | ||
16.2 | Creation, change, and cancellation of access authorizations should be recorded. | Customers are responsible for implementing logical and physical access management policies and procedures in their environment, and for recording changes in access status. | ||
16.3 | Management systems for data and for documents should be designed to record the identity of operators entering, changing, confirming or deleting data including date and time. | Customers are responsible for restricting access to confidential information stored or processed in their applications and workloads to authorized parties, in accordance with their confidentiality commitments and requirements. Customers shall implement the appropriate processes and procedures for access management, including access logs and monitoring. | ||
Incident Management | 17.0 | All incidents, not only system failures and data errors, should be reported and assessed. The root cause of a critical incident should be identified and should form the basis of corrective and preventive actions. | Customers are responsible for implementing incident-management plans in their systems. Incident-management procedures for reporting and tracking incidents and implementing corrective and preventative actions should be documented and tested no less than annually. | |
Electronic Signature | 18.0 | Electronic records may be signed electronically. Electronic signatures are expected to: a. have the same impact as hand-written signatures within the boundaries of the company, b. be permanently linked to their respective record, c. include the time and date that they were applied. | Customers are responsible for maintaining all electronic records and implementing electronic signature policies and procedures to meet this requirement. | |
Batch Release | 19.0 | When a computerized system is used for recording certification and batch release, the system should allow only Qualified Persons to certify the release of the batches and it should clearly identify and record the person releasing or certifying the batches. This should be performed using an electronic signature. | Customers are responsible for all certification activities as it relates to batch releases and qualified personnel. | |
Business Continuity | 20.0 | For the availability of computerized systems supporting critical processes, provisions should be made to ensure continuity of support for those processes in the event of a system breakdown (e.g., a manual or alternative system). The time required to bring the alternative arrangements into use should be based on risk and appropriate for a particular system and the business process it supports. These arrangements should be adequately documented and tested. | Customers are responsible for designing and implementing a cloud architecture that meets their own requirements for availability, business continuity, and disaster recovery. | |
Archiving | 21.0 | Data may be archived. This data should be checked for accessibility, readability, and integrity. If relevant changes are to be made to the system (e.g., computer equipment or programs), then the ability to retrieve the data should be ensured and tested | Customers are responsible for architecting, implementing, and testing a data archive strategy to meet their requirements. |