Title: JSSSH
1JOINT SERVICES SOFTWARE SYSTEMS SAFETY HANDBOOK
presented to the Safety Critical Systems Club
Michael L. Brown, Chairperson JOINT SOFTWARE
SYSTEMS SAFETY COMMITTEE (JSSSC) March 2001
2INTRODUCTION
- This presentation provides an overview of the
Software Safety Handbook and its Status. The
following topics are addressed - Purpose
- Background
- Handbook Layout and Contents
- Software Systems Safety Processes
- Applicability
- Project Status
- Additional tasks
- Recommendations
3PURPOSE
- Provide management and engineering how-to
guidelines to achieve a reasonable level of
assurance that software will execute in a system
context with an acceptable level of safety risk. - Initial process and methodology based on
Independent Software Nuclear Safety Analysis
process tailored to conventional systems and
experience from many programs. - Process successfully applied to wide range of
systems
4Background
- Inconsistent processes
- Most incomplete
- Many good points but not tied together well
- Lessons learned
- SSSTRP
- Took good points from each process
- Developed comprehensive systems engineering based
software systems safety process
5HANDBOOK LAYOUT CONTENTS
6System and Software Engineers
- Written for all members of safety team
- Purpose and scope of handbook
- Authority for software safety program
requirements - Organization of handbook
7Software Safety Engineer
- How-to guidance on establishing and conducting
software systems safety program - Process based on DODI-5000.1 and DOD-5000.2R
System Acquisition Process and Requirements,
MIL-STD-498/IEEE STD 1498/12207 Software
Development Process, MIL-STD-882 Standard
Practice for System Safety, and NATO
Standardization Agreement requirements
8Section 4.0
- Main part of the document
- How-to Guidance
- Complete
- However, needs expansion in certain areas (e.g.,
CDI in safety critical applications) - Covers entire software systems safety process
from concept to system retirement - Refers reader to examples in appendices and
reference documents
9Software Systems Safety Process
- Program management
- Planning through execution
- Requirements derivation
- Generic Requirements from Lessons Learned
- System Specific Safety Requirements from system
level analyses - Requirements verification and validation
- Detailed analyses
- Safety Testing
- Safety Assessment
10SWS Processes
Program Phases Milestones
11SWS PROCESSES
Software Safety Requirements Derivation
Derive Functional Safety Critical Requirements
Develop Generic Safety Critical Software
Guidelines Requirements
Preliminary Hazard List (PHL)
- Obtain Generic Software Safety Requirements Lists
- Tailor Generic Software Safety Requirements/Guidel
ines List for the specific system and/or
subsystem - Categorize and Prioritize Generic Software
Requirements/Guidelines
- Develop Safety Critical Functions List
- Develop Potential Functional Hazard List
Preliminary Hazard Analysis (PHA)
- Categorize Prioritize System Functional Hazards
- Determine System Level H/W, S/W and HF Causal
Factors - Execute System Level Trade Study
- Begin Determining all of the Software Specific
Causal Factors - Begin Software Architectural Detailed Design
Trade Study
Derive System-Specific Software Safety Critical
Requirements
Requirements Hazard Analysis/Software Criteria
Requirements Analysis
- Tag Safety-Critical Software Requirements
- Establish Methods for Tracing Software Safety
Requirements to Test - Provide Evidence for Each Functional Hazard
Mitigated by Comparing to Requirements - Verify Software Developed IAW Applicable
Standards and Criteria
12SWS PROCESSES
Software Safety Program Planning - Customer
13SWS PROCESSES
Preliminary Hazard Analysis
14Handbook Charts
15Developed Outline
- Used Process Charts as basis
- Covered all items in chart
- Assigned specific sections to primary authors
- Assigned secondary authors to each section
16Authors
- Selected for particular expertise
- Sources sought from each service, industry, and
academia - Coordinating author
- Selected for expertise in field
- Provided common voice through out handbook
17Authors
- Michael Brown, NAVSEA Dahlgren
- John Bozarth, EGG
- Janet Gill, NAWC AD
- Brenda Hyland, NAWC AD
- Archibald McKinlay
- BAH
- Lenny Russo, CECOM
- Coordinating Author
- Steve Mattern, SEA
18Task Assignments
- Based on authors area of expertise
- Prior experience
- Interest in topical area
- Secondary author
- Prior experience
- Area of Expertise
19Applicability
- Process applicable to wide range of military and
non-military systems - Weapon Systems
- Fire Control and Guidance Systems
- Operational Flight Control Programs
- Any system containing safety critical software
- Handbook provides tailoring guidance for wide
range of programs
20Status
- Submitted draft to community for review and
comment October 1997 - Received and collated comments
- Comments adjudicated by committee
- Developed revisions based on comments and
additional input from authors - Forward revised draft to reviewers
- Finalized handbook in November 1999
21Collating comments
- Comments are annotated next to applicable
paragraph - Source identified
- Comment as provided entered
- Rationale for acceptance, rejection, or
modification provided. - Handbook with comments placed on web page
22(No Transcript)
23PROJECT STATUS - Mar 2001
- First Publication - 31 December 1999
- Handbook text complete
- All topical areas addressed
- Some areas require additional work
- Appendices approximately 75 complete
- Need to develop additional examples for guidance
- Based on previous programs and lessons learned
- Need to incorporate additional reference documents
24Funding Sources to date
- Joint Systems Engineering Steering Group
- Funding source Army
- Naval Ordnance Center
- WSESRB
- USAF HQ-AFSC
- Lt. Col. Alberico
- Naval Facilities Engineering Command
- Personal time by authors
25Additional Tasks
- Commercial Developed Items, Government
off-the-shelf (legacy) items, and
Non-Developmental Items (Hardware and Software)
in safety critical applications
- Selection criteria
- Design requirements and guidelines
- How to guidelines on influencing system and
software architecture, design, and implementation - How-to analysis and testing guidelines
- Configuration Control Requirements
26Additional Tasks
- Software Safety Risk Assessment
- Relating software causal factors and control
categories to Hazard Risk Indices - Relating software metrics to hazard risk
assessment - Guidelines for assessing adequacy of safety
program efforts
27(No Transcript)
28Additional Tasks
- Guidelines for selection and/or implementation
of - Language
- Operating Systems
- Operating Environments
- Middleware
- Pros and Cons for each language, OS, OE, etc.
- Selection and implementation guidelines and
criteria - Analysis and testing guidelines
- Caveats and requirements for each language, etc.
- Configuration control
29Additional Tasks
- Software like hardware FPGAs, PLDs
- Define safety assessment process and develop
guidelines
30FUTURE OBJECTIVES
- Hypertext CD-ROM
- Integrate into DoD Acquisition Deskbook
- Software Safety WWW Home Page
- Revisions updates to handbook
- On-Site Software Systems Safety Training
- System Safety Handbook
- Tool Development
31Conclusions
- The JSSSH provides a comprehensive, Systems
Engineering based approach to ensuring that
software executes safely within the system
context. - The process is designed for application to a wide
range of systems without the need for highly
specialized expertise (e.g., formal methods) - The JSSSH provides a basis against which to
evaluate the thoroughness of Software Systems
Safety Programs - The JSSSH is a useful guideline for any safety
critical system