3. Safety FAQ1. What should we be doing to identify what software might be safety-critical under the new Standard (NASA-STD-8739.8A )?NASA-STD-8739.8A defines a safety criticality software determination process which should be used to identify safety-critical software: Software is classified as safety-critical, if it meets at least one of the following criteria: - Causes or contributes to a system hazardous condition/event,
- Provides control or mitigation for a system hazardous condition/event,
- Controls safety-critical functions,
- Mitigates damage if a hazardous condition/event occurs,
- Detects, reports, and takes corrective action, if the system reaches a potentially hazardous state.
Look at the systems hazard analysis and see if there is any software that meets any of the above criteria. If so, it is safety-critical 2. If the software could affect a command, but there are features built in to ensure the problem will not occur, is it safety-critical?No. 3. What additional requirements or activities are done for safety-critical software?The majority of the activities for safety-critical software are just good engineering practices. The new Standard only has two new requirements for safety-critical software that were not in the old Standard: - Achieve 100% code coverage when testing safety-critical software. (If it can’t be achieved, a rational for why it can’t be reached must be provided)
- The Cyclomatic Complexity of safety-critical software must be 15 or lower.
Other important activities for safety-critical software include: - Perform an assessment of the hazard analysis to identify software components associated with system hazards as per the safety criticality determination listed of Question 1.
- Develop and maintain a safety analysis throughout the life cycle.
- Assess that the code meets the requirements in SWE-134.
- Perform a software assurance design analysis.
- Confirm that the software test plan addresses the verification of safety-critical software, specifically the off-nominal scenarios.
- All safety-critical software needs to be verified by test. All critical lines of code must be tested as well as all conditions and end points
- Confirm that the traceability between software requirements and hazards with software contributions exist.
- Perform a software assurance analysis on the detailed software requirements to analyze the software requirement sources and identify any incorrect, missing, or incomplete requirements.
- Confirm that the software design implements all of the required safety-critical functions and requirements.
- Perform test witnessing for safety-criticality software.
- Adequate regression testing is performed and includes retesting of all safety-critical code components.
It is important to make sure you have a good hazard analysis. It tells what requirements are safety-critical to indicate which elements of the design, code, and test activities need additional rigor. 4. Do we still need to mark the safety-critical code?Marking (“tagging”) of the software is no longer required. 5. Do we still figure out the “levels” of safety-critical software (i.e., use of the levels to scope the work on the safety-critical software) like it is described in the Software Safety Guidebook?The sub-levels are not needed any more---either the software is safety-critical or it is not. 6. The previous method called for a formal preliminary hazard analysis, plus a hazard analysis, now what do we need? Do we need explicit documentation on safety-critical software? When would you see it?The hardware and software groups should cooperate on developing the hazard analysis reports. You need to have a plan on how you plan to handle the safety-critical software. Now, with the new approach, software by itself must cause a hazard for it to be safety-critical. This may be mitigated with inhibits or just declare it safety-critical. The new approach just requires a few new steps and tracing to hazards. 7. What about mission critical software?Still need to consider SWE-134 for mission critical software. 8. Is verification by similarity allowed for safety-critical software?No, safety-critical software is required to be verified by test. See the requirements below. NPR 7150.2C  4.5.12 The project manager shall verify through test the software requirements that trace to a hazardous event, cause, or mitigation technique. [SWE-192] NASA-STD-8739.8A  4.5.12 | 192 | The project manager shall verify through test the software requirements that trace to a hazardous event, cause, or mitigation technique. | 1. Confirm that the project verifies the software requirements, which trace to a hazardous event, cause, or mitigation techniques, through testing. |
3.7.3 | 134 | If a project has safety-critical software or mission-critical software, the project manager shall implement the following items in the software: a. The software is initialized, at first start and restarts, to a known safe state. b. The software safely transitions between all predefined known states. c. Termination performed by software of functions is performed to a known safe state. d. Operator overrides of software functions require at least two independent actions by an operator. e. Software rejects commands received out of sequence when execution of those commands out of sequence can cause a hazard. f. The software detects inadvertent memory modification and recovers to a known safe state. g. The software performs integrity checks on inputs and outputs to/from the software system. h. The software performs prerequisite checks prior to the execution of safety-critical software commands. i. No single software event or action is allowed to initiate an identified hazard. j. The software responds to an off-nominal | 1. Analyze the software requirements and the software design and work with the project to implement NPR 7150.2 requirement items "a" through "l." | 2. Assess that the source code satisfies the conditions in the NPR 7150.2 requirement "a" through "l" for safety-critical and mission-critical software at each code inspection, test review, safety review, and project review milestone. | 3. Confirm 100% code test coverage is addressed for all identified software safety-critical software components or assure that software developers provide a risk assessment explaining why the test coverage is not possible for the safety-critical code component. |
|
A project can tailor the requirement if the engineering and SMA TAs agree with the rational and risk.
9. In the new NASA-STD-8739.8, safety and software assurance are combined, but they are often performed by different roles. Will the training for each be combined or will there be separate training for each role?The SMA Technical Training Program (STEP) program has separate paths of study for the software assurance and software safety roles. However, the training classes for each are available individually. The classes are available in SATERN to anyone who wants to take them, so the individual may select and take a designated class if desired. The STEP program is a tiered, coordinated set of classes and on-the-job-training to prepare participants for certain roles.

|