Link |
|
Title |
SOFTWARE ASSURANCE AND SOFTWARE SAFETY STANDARD |
SWE or Topic |
SWE-001, SWE-013, SWE-014, SWE-020, SWE-022, SWE-023, SWE-024, SWE-025, SWE-026, SWE-034, SWE-039, SWE-044, SWE-045, SWE-051, SWE-052, SWE-060, SWE-061, SWE-066, SWE-069, SWE-074, SWE-075, SWE-076, SWE-077, SWE-084, SWE-085, SWE-105, SWE-106, SWE-110, SWE-112, SWE-116, SWE-120, SWE-121, SWE-122, SWE-125, SWE-129, SWE-131, SWE-132, SWE-133, SWE-134, SWE-136, SWE-138, SWE-139, SWE-141, SWE-160, SWE-164, SWE-176, SWE-179, SWE-205, SWE-209, SWE-216, SWE-221, Topic 5.02, Topic 5.04, Topic 5.07, Topic 5.14, Topic 5.16, Topic 7.01, Topic 7.2, Topic 7.02, Topic 7.3, Topic 7.03, Topic 7.4, Topic 7.04, Topic 7.09, Topic 7.12, Topic 7.18, Topic 7.20, Intro, Maint, SAP, IDD, Safety, SDD, SVD, VDD, Topic 7.23, Topic 7.24, Topic 8.02, Topic 8.06, Topic 8.08, Topic 8.09, Topic 8.2, Topic 8.6, Topic 8.8, Topic 8.9, Topic 8.10, Topic 8.11, Topic 8.13, Topic 8.14, Topic 8.15, Topic 8.16, Topic 8.17, Topic 8.18, Topic 8.20, Topic 8.21, Topic 8.22, Topic 7.1, Topic 7.21, Topic 9.02, FAQ, ObjEv, IVVRef, SAANALYSIS, SADESIGN, SASTATUS, SATest, SASource, SAAudit, Requirements, Topic 8.51, Topic 8.52, Topic 8.53, Topic 8.54, Topic 8.55, Topic 8.56, Topic 8.57, Topic 8.58, Topic 8.59, |
Citation |
NASA-STD-8739.8B , NASA TECHNICAL STANDARD, Approved 2022-09-08 |
Notes |
|
Example Reference as it will appear to end user:
- Title, Citation
where:
- Title = Title
- Link = http://www.nasa.gov
- Citation = Citation
Old versions of NASA-STD-8739.8
- NASA-STD-8739.8A: https://swehb-pri.msfc.nasa.gov/download/attachments/16450021/nasa-std-8739.8a.pdf?api=v2
- NASA-STD-8739.8B: https://swehb-pri.msfc.nasa.gov/download/attachments/16450021/NASA-STD-8739.8%20Revision%20B_wrd.pdf?api=v2
Quotes used in SWEs and Topics
- SWE-205 - Determination of Safety-Critical Software - tab 3 and 7 - from 4.2
4.2 Safety-Critical Software Determination
Software is classified as safety-critical if the software is determined by and traceable to a hazard analysis. Software is classified as safety-critical if it meets at least one of the following criteria:
a. Causes or contributes to a system hazardous condition/event,
b. Controls functions identified in a system hazard,
c. Provides mitigation for a system hazardous condition/event,
d. Mitigates damage if a hazardous condition/event occurs,
e. Detects, reports, and takes corrective action if the system reaches a potentially hazardous state.
- SWE-023 - Software Safety-Critical Requirements - tab 3 - from Table 1 Software Assurance and Software Safety Requirements Mapping Matrix - SWE-134
Software Assurance and Software Safety Tasks contained in NASA-STD-8739.8A - related to SWE-134 1. Analyze the software requirements and the software design and work with the project to implement NPR 7150.2, SWE-134 requirement items "a" through "l." 2. Assess that the source code satisfies the conditions in the NPR 7150.2, SWE-134 requirement "a" through "l" for safety-critical and mission-critical software at each code inspection, test review, safety review, and project review milestone. 3. Confirm 100% code test coverage is addressed for all identified software safety-critical software components or assure that software developers provide a risk assessment explaining why the test coverage is not possible for the safety-critical code component. 4. Confirm that all identified safety-critical software components have a cyclomatic complexity value of 15 or lower. If not, assure that software developers provide a risk assessment explaining why the cyclomatic complexity value needs to be higher than 15 and why the software component cannot be structured to be lower than 15. 5. Confirm that the values of the safety-critical loaded data, uplinked data, rules, and scripts that affect hazardous system behavior have been tested. 6. Analyze the software design to ensure: 7. Participate in software reviews affecting safety-critical software products.
a. Use of partitioning or isolation methods in the design and code,
b. That the design logically isolates the safety-critical design elements and data from those that are non-safety-critical.
- SWE-205 - Determination of Safety-Critical Software - tab 3 - from Table 1 Software Assurance and Software Safety Requirements Mapping Matrix - SWE-134
1. Analyze the software requirements and the software design and work with the project to implement NPR 7150.2, SWE-134 requirement items "a" through "l." 2. Assess that the source code satisfies the conditions in the NPR 7150.2, SWE-134 requirement "a" through "l" for safety-critical and mission-critical software at each code inspection, test review, safety review, and project review milestone. 3. Confirm 100% code test coverage is addressed for all identified software safety-critical software components or assure that software developers provide a risk assessment explaining why the test coverage is not possible for the safety-critical code component. 4. Confirm that all identified safety-critical software components have a cyclomatic complexity value of 15 or lower. If not, assure that software developers provide a risk assessment explaining why the cyclomatic complexity value needs to be higher than 15 and why the software component cannot be structured to be lower than 15. 5. Confirm that the values of the safety-critical loaded data, uplinked data, rules, and scripts that affect hazardous system behavior have been tested. 6. Analyze the software design to ensure: 7. Participate in software reviews affecting safety-critical software products.
a. Use of partitioning or isolation methods in the design and code,
b. That the design logically isolates the safety-critical design elements and data from those that are non-safety-critical.
- 8.6 - IV&V Surveillance - tab 3 - quote includes all of section 4.4 of this standard