IEC_62304_CheckList
|
IEC |
||||
|
Reference |
Software Lifecycle |
Applicable |
||
|
Class |
Class |
Class |
||
|
|
PRIMARY |
|
|
|
|
5 |
SOFTWARE |
|
|
|
|
5.1 |
Development Planning |
|
|
|
|
5.1.1 |
Software |
X |
X |
X |
|
5.1.2 |
Software |
X |
X |
X |
|
5.1.3 |
SOUP management |
|
X |
X |
|
5.1.4 |
Software |
|
X |
X |
|
5.1.5 |
Software |
|
X |
X |
|
5.1.6 |
Software |
X |
X |
X |
|
5.1.7 |
Software |
|
X |
X |
|
5.1.8 |
Software RISK |
X |
X |
X |
|
5.1.9 |
Documentation |
X |
X |
X |
|
5.1.10 |
Software |
X |
X |
X |
|
5.1.11 |
Software |
|
X |
X |
|
5.1.12 |
Software problem |
|
|
X |
|
5.2 |
Requirements Analysis |
|
|
|
|
5.2.1 |
Define software |
X |
X |
X |
|
5.2.2 |
Establish |
X |
X |
X |
|
5.2.3 |
Software |
X |
X |
X |
|
5.2.4 |
Include RISK |
|
X |
X |
|
5.2.5 |
Update RISK |
X |
X |
X |
|
5.2.6 |
Ensure |
X |
X |
X |
|
5.2.7 |
Uniquely |
X |
X |
X |
|
5.2.8 |
Update SYSTEM |
X |
X |
X |
|
5.2.9 |
Verify software |
X |
X |
X |
|
5.2.10 |
Document |
X |
X |
X |
|
5.3 |
Architectural Design |
|
|
|
|
5.3.1 |
Transform |
X |
X |
X |
|
5.3.2 |
Document |
X |
X |
X |
|
5.3.3 |
Document |
X |
X |
X |
|
5.3.4 |
Develop an |
|
X |
X |
|
5.3.5 |
Specify SYSTEM |
|
X |
X |
|
5.3.6 |
Specify |
|
X |
X |
|
5.3.7 |
Identify |
|
X |
X |
|
5.3.8 |
Verify software |
|
X |
X |
|
5.3.9 |
Verify |
|
X |
X |
|
5.3.10 |
Document results |
|
X |
X |
|
5.4 |
Detailed |
|
|
|
|
5.4.1 |
Refine SOFTWARE |
|
X |
X |
|
5.4.2 |
Inheritance of |
|
X |
X |
|
5.4.3 |
Develop detailed |
|
|
X |
|
5.4.4 |
Develop detailed |
|
|
X |
|
5.4.5 |
Verify detailed |
|
X |
X |
|
5.4.6 |
Additional |
|
|
X |
|
5.4.7 |
Document results |
|
X |
X |
|
5.5 |
Software |
|
|
|
|
5.5.1 |
Implement each |
|
X |
X |
|
5.5.2 |
Establish |
|
X |
X |
|
5.5.3 |
Verify software |
|
X |
X |
|
5.5.4 |
Additional |
|
X |
X |
|
5.5.5 |
Document the |
|
X |
X |
|
5.6 |
Integration and Testing |
|
|
|
|
5.6.1 |
Integrate |
|
X |
X |
|
5.6.2 |
Verify software |
|
X |
X |
|
5.6.3 |
Document the |
|
X |
X |
|
5.5.4 |
Additional |
|
X |
X |
|
5.6.5 |
Integration |
|
X |
X |
|
5.6.6 |
Include |
|
|
X |
|
5.6.7 |
Conduct |
|
X |
X |
|
5.6.8 |
Document results |
|
X |
X |
|
5.6.9 |
Integration test |
|
X |
X |
|
5.6.10 |
Use formal |
|
X |
X |
|
5.7 |
System |
|
|
|
|
5.7.1 |
Establish tests |
|
X |
X |
|
5.7.2 |
Use formal |
|
X |
X |
|
5.7.3 |
Repeat tests and |
|
X |
X |
|
5.7.4 |
Verify SOFTWARE |
|
X |
X |
|
5.7.5 |
Record data for |
|
X |
X |
|
5.8 |
Release |
|
|
|
|
5.8.1 |
Ensure software |
|
X |
X |
|
5.8.2 |
Ensure |
|
X |
X |
|
5.8.3 |
Document known |
|
X |
X |
|
5.8.4 |
Evaluate known |
|
X |
X |
|
5.8.5 |
Document |
|
X |
X |
|
5.8.6 |
Document how |
|
X |
X |
|
5.8.7 |
Archive master |
|
X |
X |
|
5.8.8 |
Use established |
|
X |
X |
|
6 |
SOFTWARE |
|
|
|
|
6.1 |
Establish software |
|
|
|
|
6.1.1 |
Establish |
X |
X |
X |
|
6.2 |
Problem |
|
|
|
|
6.2.1 |
Record and |
X |
X |
X |
|
6.2.2 |
Use software |
X |
X |
X |
|
6.2.3 |
Analyse |
X |
X |
X |
|
6.2.4 |
Conduct analysis |
X |
X |
X |
|
6.2.5 |
Document new, |
X |
X |
X |
|
6.2.6 |
Review and |
X |
X |
X |
|
6.2.7 |
Document |
|
X |
X |
|
6.3 |
Modification |
|
|
|
|
6.3.1 |
Use established |
X |
X |
X |
|
6.3.2 |
Define criteria |
|
X |
X |
|
6.3.3 |
Verify |
|
X |
X |
|
6.3.4 |
Conduct |
|
X |
X |
|
6.3.5 |
Demonstrate |
|
X |
X |
|
6.3.6 |
Document the |
|
X |
X |
|
see |
Architectural Design |
|
|
|
|
see |
Detailed |
|
|
|
|
see |
Software |
|
|
|
|
see |
Integration and Testing |
|
|
|
|
see |
System |
|
|
|
|
see |
Release |
|
|
|
|
|
SUPPORTING |
|
|
|
|
7 |
SOFTWARE |
|
|
|
|
7.1 |
Analysis |
|
|
|
|
7.1.1 |
Identify |
|
X |
X |
|
7.1.2 |
Identify |
|
X |
X |
|
7.1.3 |
Consider |
|
X |
X |
|
7.1.4 |
Review published |
|
X |
X |
|
7.1.5 |
Document |
|
X |
X |
|
7.1.6 |
Document |
|
X |
X |
|
7.2 |
RISK |
|
|
|
|
7.2.1 |
Define RISK |
|
X |
X |
|
7.2.2 |
RISK CONTROL |
|
X |
X |
|
7.3 |
VERIFICATION of RISK |
|
|
|
|
7.3.1 |
Verify RISK |
|
X |
X |
|
7.3.2 |
Document any new |
|
X |
X |
|
7.3.3 |
Document |
|
X |
X |
|
7.4 |
RISK |
|
|
|
|
7.4.1 |
Analyse changes |
X |
X |
X |
|
7.4.2 |
Analyse impact |
|
X |
X |
|
7.4.3 |
Perform RISK |
|
X |
X |
|
8 |
SOFTWARE |
|
|
|
|
8.1 |
Configuration |
|
|
|
|
8.1.1 |
Establish means |
X |
X |
X |
|
8.1.2 |
Identify SOUP |
X |
X |
X |
|
8.1.3 |
Document SOUP |
X |
X |
X |
|
8.1.4 |
Identify SYSTEM |
X |
X |
X |
|
8.2 |
Configuration control |
|
|
|
|
8.2.1 |
Identify and |
X |
X |
X |
|
8.2.2 |
Approve requests |
X |
X |
X |
|
8.2.3 |
Implement |
X |
X |
X |
|
8.2.4 |
Provide means |
X |
X |
X |
|
8.3 |
Configuration status |
|
|
|
|
8.3.1 |
Configuration |
X |
X |
X |
|
9 |
SOFTWARE |
|
|
|
|
|
SOFTWARE |
|
|
|
|
9.1.1 |
Prepare problem |
X |
X |
X |
|
9.1.2 |
Advise relevant |
X |
X |
X |
|
9.1.3 |
Investigate the |
X |
X |
X |
|
9.1.4 |
Evaluate the |
X |
X |
X |
|
9.1.5 |
Track and report |
X |
X |
X |
|
9.1.6 |
Resolve the |
X |
X |
X |
|
9.1.7 |
Maintain a |
X |
X |
X |
|
9.1.8 |
Analyse problems |
X |
X |
X |
|
9.1.9 |
Verify |
X |
X |
X |
IEC_62304_CheckList的更多相关文章
随机推荐
- kubernetes pod termination pending
在将k8s从1.7.9 升级到1.10.2 之后,发现删除pod一直处于terminating状态, 调查发现删不掉的pod都有一个特点就是pod yaml中command部分写错了,如下所示: ap ...
- window.name实现跨域
在 http://www.cnblogs.com/zhuzhenwei918/p/6759459.html 这篇文章中,我提到了几种跨域的方式,这里主要讲解使用window.name实现跨域. 跨域就 ...
- Vue单文件模板实例
AddItemComponent.vue <template> <div id="add-item-template"> <div class=&qu ...
- Linux下Tomcat8.0.44配置使用Apr
听说Apr可以提高tomcat很多的性能,配置具体如下 1.安装apr 1.5.2 [root@ecs-3c46 ]# cd /usr/local/src [root@ecs-3c46 src]# w ...
- Linux 命令学习之cd
功能说明: cd 命令是 linux 最基本的命令语句,其他的命令都会依赖与 cd 命令.因此学好 cd 命令是必须的. 语 法:cd [目的目录] 补充说明:cd指令可让用户在不同的目录间切换,需要 ...
- C++中文件流操作
一.C++中流和流操作符 C++中把数据之间的传输操作称为流,流既可以表示数据从内存传送到某个载体或设备中,即输出流,也可以表示数据从某个载体或设备传送到内存缓冲区变量中,即输入流.C++输入输出除了 ...
- bug: 1.eclipse 中tomcat server 变灰色 2.build path 添加的jar不识别
1.网上百度的方案试过,没有作用. 最后删掉tomcat重新解压配置解决. 确保工程属性栏中,server正确才可加载tomcat. 猜测可能原因,tomcat在eclipse有时崩溃,一般做法是将s ...
- angular2自学笔记(二)---路由、服务等八大主要构造块
angular的思想:总是把数据访问工作委托给一个支持性服务类. Angular 应用的:用 Angular 扩展语法编写 HTML 模板, 用组件类管理这些模板,用服务添加应用逻辑, 用模块打包发布 ...
- linux和Android的Makefile和android.mk
1. makefile 1.1 gcc的参数 -Wall: 是打开警告开关, -O: 代表默认优化,可选:-O0不优化,-O1低级优化,-O2中级优化,-O3高级优化,-Os代码空间优化. -g ...
- 使用 Redis 实现分布式锁(转载)
背景 在一般的分布式应用中,要安全有效地同步多服务器多进程之间的共享资源访问,就要涉及到分布式锁.目前项目是基于 Tornado 实现的分布式部署,同时也使用了 Redis 作为缓存.参考了一些资料并 ...