Reprinted with permission from Colgin Consulting, Inc.
User access to databases can impact data integrity and get you in trouble with FDA.
In my next few blog posts, we'll be covering user access and how it can impact data integrity. For starters, let's explore the Principle of Least Privilege. What is it? What happens when it's violated? Finally we'll map out five actions you can take to protect your company.
You may need to pick up some new vocabulary.
Why?
Because it will help you have intelligent conversations with your clients and get better results for your company.
My sad story...
Once upon a time, I was a new statistician in industry assigned to general tox studies.
As I reviewed the study data, I saw "tarry stools."
I read "tarry" as in "to delay" or "to be late."
What the heck? Late rat stools? How would anyone know? My colleagues professed not to know. So I called the Study Director for clarification. Color me red. I'm pretty sure they're all telling that story over a beer to this day.
Let me help you not be that guy when it comes to computer systems.
The Principle of Least Privilege means providing users the minimum access they need to do their work for the minimum time required.
(I'm not a fan of acronyms, but you might see Principle of Least Privilege abbreviated PoLP. Just not in my blog posts.)
The Principle of Least Privilege also applies to computer programs and processes. In this blog post, we'll address only human users.
Violations of the Principle of Least Privilege can result in
Any of these violations may qualify as a security incident in your organization - be familiar with your policies and procedures so you can involve the right people at the right time. DON'T ACT ALONE! Taking action on your own may cloud the issue and interfere with the effectiveness of any necessary investigation.
In all three cases below, the violations should trigger a review of all user access to quantify the extent of the problem and make all necessary corrections.
You're a clinical auditor who has suddenly realized you have investigator access to all sites in the EDC system. You don't think you've created, modified, or deleted any records.
This is a variation of Violation 1 and demonstrates why the Principle of Least Privilege has a time element attached.
You're a clinical auditor auditing one of your company's providers: a clinical lab. The lab hosts an in-house developed web-based application allowing clinical project teams at your company to view all the data for their assigned studies and download it into Excel. Once a user has access to the system, they can access it from anywhere - their personal smart phone, their home computer, their work laptop, etc. As you review the user list, you notice the name of someone you know well. Unfortunately, they left your company months ago to work for a direct competitor. Whoops!
You're a GLP auditor auditing one of your company's GLP labs. During the tour, you notice multiple technicians and supervisors interacting with the chemistry analyzer without signing on and off. Through interviews, demonstrations, and record and document review, you confirm they are all sharing the same login ID and password, the account has super user access to all instrument functionality and the access level allows for modification and deletion of data before they are transmitted to the LIMS. How do you know the data are complete and accurate? To whom can you attribute actions?
Let's assume the analyzer offers role-based access, and the lab just isn't taking advantage of it.
(If the analyzer doesn't provide role-based access, you have an even bigger problem. More and more manufacturers are taking heed of regulators' concerns about data integrity and are modernizing their instruments to allow role-based access and good audit trail functionality. Your company may need to upgrade.)
For some real life examples highlighted in FDA Warning Letters, see these instances of sharing login IDs:
Here are some examples from Europe, in the GMP environment.
And the forecast isn't good....According to Medical Economics, of all the industries in the Standard and Poor's 500, "healthcare and pharmaceutical companies have the worst cybersecurity." And for a European perspective, see "Pharmaceutical firms 'can't keep ignoring information risk'".
I'm sure your VP of Quality or Executive Director of Development Quality Assurance doesn't want to have to go to Executive Management or the Board of Director's Audit Committee to explain
Here are five actions your company should be taking (and requiring your service providers to take) to protect itself from violations of the Principle of Least Privilege:
In the GMP environment, regulators are taking a firm stand on violations of least privilege when they can be demonstrated to impact data integrity. At the very least, they require "a retrospective review" of data (see Finding 1). They may require hiring a data integrity consultant (see the end of this Warning Letter) to get to the root of the problem at your entire company. And in the most extreme case, when combined with other quality problems, product may be blocked from a country or an entire region (see official report here).