IS026262 Tool Qualification | How can software tools be certified according to ISO 26262?

2023-03-24 695

ISO 26262 is a risk based standard. Although it acknowledges that it is impossible to reduce the risk to zero, it requires a qualitative assessment of the risk and measures to reduce the risk to the "reasonably feasible minimum level" (ALARP).
The vocabulary used in ISO 26262 involves faults, errors, and faults, where 'faults can manifest as errors... and errors ultimately lead to faults'. The most important term to understand is "Vehicle Safety integrity level" or ASIL. ASIL is a classification of electronic component risks. Level D represents the component with the highest risk, while Level A represents the lowest risk (when the risk is considered lower than ASIL A, an additional label QM is used). This level is assigned by following the assessment process applicable to hazards. Each potential hazardous event is classified according to the severity of the harm it may cause, with SIL0 indicating no harm and SIL3 indicating a threat to life. The other important factor in the assessment is exposure, ranging from E0 (very low probability) to E4 (very likely),
ISO 26262 Tool Qualification
Tool identification is crucial for compliance with ISO 26262. The purpose is to ensure that all tools used in the project are reliable, identify any faults, and can handle any issues that arise. All tools involved in the development process, including those used indirectly, must be considered.
How to authenticate software tools according to ISO 26262?
The purpose of tool identification is to provide evidence that software tools are suitable for developing security related software in accordance with the ISO 26262 standard. Article 11 of Part 8 includes methods and guidelines that assist in tool identification. However, it is necessary to determine whether the tool needs to be identified. The answer to this question largely depends on the use case, project scope, and context.
Identification tools
The use of software tools can simplify or automate the activities and tasks necessary for the development of security related software. One of the objectives of the qualification process is to demonstrate understanding and extensive knowledge of specific tools. The first step towards achieving this goal is to correctly identify the characteristics of the tool. At this stage, information such as version number, supplier, calibration or configuration needs to be provided. It is a good practice to verify the official vulnerability logs created by tool suppliers to compare whether the vulnerabilities of a given tool affect security related projects.