- by Dave Butler, CFSE
- Thursday, October 25, 2012
- Software
IEC 61508 Compliant Module Testing: Part 3
The Test Plan
Assessment requires evidence that module tests are designed properly, run properly, and have been successfully run. Documented test results are also required. In order to meet these requirements it is generally a good idea to document a test plan for each module. Information that applies…
Read More...
- by Dave Butler, CFSE
- Friday, October 19, 2012
- Software
IEC 61508 Compliant Module Testing: Part 2
Last week you learned about what exactly a module is, and examples of different types of modules. Now we will move on to interfaces, the need for module testing, and code coverage requirements.
An interface, such as the 3D printer’s communication interface, or the format of the 3D data…
Read More...
- by Michael Medoff , CFSE, CISA
- Tuesday, October 16, 2012
- Industrial Cybersecurity
Pen Testing a Live Control System – Are You Mad?
A recent, disturbing trend I’ve seen in industrial control system (ICS) security is that, in response to concerns about the security of their ICS & SCADA systems, companies are performing penetration (pen) testing on operational systems. Often times they request these services as one of the first steps in…
Read More...
- by Dave Butler, CFSE
- Friday, October 12, 2012
- Software
IEC 61508 Compliant Module Testing: Part I
3D printers are cool! I watched a TED talk this past year about them. I know they have been around for over 30 years, but I still think they’re cool. As I watched, I thought of the wheel for my dishwasher’s roll-out rack, which had…
Read More...
- by Steve Close
- Thursday, October 04, 2012
- Certification
How to Decode an exida IEC 61508 Certificate: Part 2
Click here to read Part 1
Now that you know the step-by-step process of product certification, now let’s take a look at the actual information on the certificate.
In the left panel (gray background) you will find an exida certification logo. …
Read More...
- by Steve Close
- Thursday, September 27, 2012
- Certification
How to Decode an exida IEC 61508 Certificate: Part 1
So you downloaded a product certificate from the exida website and you are trying to understand the information documented in the certificate. Also, you likely want to know what stands behind the certificate and what was involved in the certification of the product.
I’m not…
Read More...
- by Michael Medoff , CFSE, CISA
- Thursday, September 20, 2012
- Certification
Component De-rating Without the Overhead
If you were going to build a bridge, you would want to make sure that it did not fall down if there were too many cars on the bridge. One way that this is accomplished is to overdesign. If the bridge is expected to hold at most 20,000 pounds,…
Read More...
- by Steve Gandy, CFSP
- Thursday, August 30, 2012
- Certification
People and Risk: The Common Enemy
In today’s modern society there is an increasing demand for “safer” products/systems, which have to meet increasingly demanding standards. The management of “risk” is a major factor in ensuring that a product/system can meet its design objectives, as well as satisfying the required standards and, even more importantly, meeting…
Read More...
- by Iwan van Beurden, CFSE
- Thursday, August 23, 2012
- Functional Safety
Super-Duper Logic Solver Data; So what?
I am working on a SIL verification project and just had to share some observations.
For this project, the customer decided to choose a logic solver for which no data is listed in the exida Safety Equipment Reliability Handbook (SERH). One could…
Read More...
- by John Yozallinas, CFSE
- Thursday, August 16, 2012
- Certification
Are You Going for Gold in Safety?
Olympic athletes don’t wake up one day and decide to compete in the Olympics. They don’t arrive at the games by chance or coincidence. Their journey starts long before the games begin. They are often influenced and inspired by watching others or by their own interests. They may begin…
Read More...
- by Iwan van Beurden, CFSE
- Monday, July 23, 2012
- Software
Analysis and Realization: Done. Let’s Start Operation… What’s Next?
Congratulations! You’ve completed the Analysis and Realization phases of the Safety Lifecycle, and are about to begin the Operation phase, but what’s next? Well obviously you need to do proof testing, but is there anything else? You may be familiar with the figure below:
Read More...
- by Steve Close
- Thursday, July 12, 2012
- Certification
Why should I get my mechanical device certified per IEC 61508?
I was recently approached with a question regarding why it would be necessary to certify mechanical devices, such as valves, per IEC 61508 when it is not clearly stated in the standard that the standard is applicable to such devices. After looking through IEC 61511 and Read More...
- by Hal Thomas, CFSE
- Friday, June 29, 2012
- Functional Safety
Relating Test Data to Operating Modes & “Proven in Use”
Everyone wants data, and generally everyone agrees high quality proven in use data is the best. Properly designed experimental testing is one means to simulate actual operation. That is what we all learned as far back as high school during our chemistry and physics labs. These tests can…
Read More...
- by Michael Medoff , CFSE, CISA
- Thursday, June 21, 2012
- Industrial Cybersecurity
A False Sense of Security
About 5 years ago I was sitting around a big table in a conference room at a major LNG terminal. Outside the window I could see a big city harbor filled with boats, bridges, sky scrapers and approximately 5 million people. I could also see two huge LNG storage…
Read More...
- by John Yozallinas, CFSE
- Thursday, June 07, 2012
- Industrial Cybersecurity
(Almost) FREE Security Training
The Department of Homeland Security (DHS) is tasked with many things. One area of focus is Industrial Control Systems (ICS). The Industrial Control Systems Joint Working Group (ICSJWG) was formed to facilitate this focus. This group holds semi-annual conferences (Spring and Fall) in various US cities. These meetings…
Read More...