Skip to main content

Regulatory Compliance Matrix: WO System

Date: 2026-02-13 | Classification: Compliance — Engineering & QA
Scope: FDA 21 CFR Part 11, HIPAA Technical Safeguards, SOC 2 Type II


1. FDA 21 CFR Part 11 — Electronic Records & Signatures

§11.10 Controls for Closed Systems

RequirementCFR ReferenceWO FeatureImplementationStatus
System access limited to authorized individuals§11.10(d)RBAC model (7 roles)Role-per-entity permissions, tenant isolation via RLS✅ Ready
Use of authority checks§11.10(g)Approval gate guardsState machine guards check role + permission before transition✅ Ready
Device checks for validity of data input§11.10(h)Schema validationJSON Schema + DB constraints + optimistic locking (version field)✅ Ready
Ability to discern invalid or altered records§11.10(c)Append-only audit trailDB trigger prevents UPDATE/DELETE on audit_trail table✅ Ready
Operational system checks to enforce sequencing§11.10(f)State machine transitionsDeterministic transition map with guard functions; DAG dependency validation✅ Ready
Audit trail documentation§11.10(e)AuditTrail entityCaptures entity_type, entity_id, action, performed_by, timestamp, previous_value, new_value✅ Ready
Retention of electronic records§11.10(c)PostgreSQL + archive policyAppend-only table; partitioned by tenant + date; configurable retention✅ Ready
Use of secure computer-generated timestamps§11.10(e)Server-side timestampsperformed_at DEFAULT now() — not client-supplied✅ Ready
Protection of records for accuracy and integrity§11.10(c)Immutable audit eventsAppend-only + version field + optimistic concurrency✅ Ready

§11.50 Signature Manifestations

RequirementCFR ReferenceWO FeatureImplementationStatus
Signed record includes name of signer§11.50(a)(1)ElectronicSignature.signerId → Person.nameForeign key to Person entity with display_name✅ Ready
Date and time of signature§11.50(a)(2)ElectronicSignature.signedAtsignedAt DateTime @default(now()) — server timestamp✅ Ready
Meaning associated with signature§11.50(a)(3)ElectronicSignature.meaningFree text: "Approval of Work Order {id}", "QA Review of {id}"✅ Ready
Signature bound to record§11.50(b)Approval.signatureId FKOne-to-one binding: Approval → ElectronicSignature; immutable after creation✅ Ready

§11.70 Signature/Record Linking

RequirementCFR ReferenceWO FeatureImplementationStatus
Signatures linked to records to prevent falsification§11.70Cryptographic bindingHash of (WO version + signer_id + timestamp + meaning) stored in signature record⚠️ Partial
Signatures not excised, copied, or transferred§11.70Immutable signature recordsAppend-only table; no UPDATE/DELETE allowed; referential integrity constraints✅ Ready

§11.70 Gap: Cryptographic hash binding is specified in the architecture but requires implementation of the hash generation function and storage field. Estimated effort: 2 days.

§11.100 General Requirements for Electronic Signatures

RequirementCFR ReferenceWO FeatureImplementationStatus
Each signature unique to one individual§11.100(a)Person entity + authMethodsignerId FK to Person; authMethod captures credential type✅ Ready
Identity verified before establishing signature§11.100(b)Re-authentication flowFrontend re-auth prompt; backend validates session + credential⚠️ Requires Vault
Signatures administered by organization§11.100(c)Tenant-scoped signature configPer-tenant approval chain configuration; admin-managed signer assignments✅ Ready

2. HIPAA Technical Safeguards (45 CFR §164.312)

Access Controls

RequirementHIPAA ReferenceWO FeatureImplementationStatus
Unique user identification§164.312(a)(2)(i)Person entity + tenant scopingPerson.id unique per tenant; enforced via RLS✅ Ready
Emergency access procedure§164.312(a)(2)(ii)Break-glass escalationAdmin override with enhanced audit logging + justification required⚠️ Design Only
Automatic logoff§164.312(a)(2)(iii)Session managementSession timeout configurable per tenant; signature window timeout⚠️ Frontend
Encryption and decryption§164.312(a)(2)(iv)Data-at-rest encryptionPostgreSQL TDE + GCP Cloud SQL encryption; Vault for secrets✅ Ready

Audit Controls

RequirementHIPAA ReferenceWO FeatureImplementationStatus
Hardware, software, procedural mechanisms for recording access§164.312(b)AuditTrail + OTELEvery WO operation logged to append-only audit trail; OTEL spans for system-level tracing✅ Ready

Integrity Controls

RequirementHIPAA ReferenceWO FeatureImplementationStatus
Mechanisms to authenticate ePHI§164.312(c)(1)Version field + checksumsOptimistic locking prevents silent overwrites; integrity validated on read✅ Ready
Electronic mechanisms to corroborate ePHI not altered§164.312(c)(2)Append-only audit + hash chainEach audit event references previous event hash (chain of custody)⚠️ Partial

Transmission Security

RequirementHIPAA ReferenceWO FeatureImplementationStatus
Integrity controls for transmitted ePHI§164.312(e)(1)TLS 1.3All API communication over HTTPS; mTLS for inter-service✅ Ready
Encryption of ePHI in transit§164.312(e)(2)(ii)TLS + encrypted event busNATS TLS; GCP internal encryption; no plaintext transmission✅ Ready

PHI Detection Gap

GapSeverityMitigation
WO detail/summary fields may contain PHI (patient names, device serial numbers linked to patients)HighImplement PHI scanner on WO creation and update; flag for review if detected; encrypt flagged fields at application layer
Job Plan work instructions may reference patient-adjacent dataMediumPHI classification metadata on JobPlan; automated scanning before storage
TimeEntry records may capture provider-identifiable informationLowAlready scoped to Person entity; access controlled via RBAC

3. SOC 2 Type II Trust Service Criteria

CC6 — Logical and Physical Access Controls

CriterionSOC 2 ReferenceWO FeatureImplementationStatus
Restricts logical accessCC6.1RBAC (7 roles, entity-level permissions)Role → Permission matrix; tenant RLS isolation✅ Ready
New access provisioned/modified/removedCC6.2Admin role manages Person + Team assignmentsAssignment audit trail; role changes logged✅ Ready
Authenticates usersCC6.3SSO + re-auth for signaturesElectronicSignature.authMethod captures method; session binding✅ Ready
Restricts access to information assetsCC6.6Tenant isolation + entity-level permissionsPostgreSQL RLS; Vendor role restricted to own WOs✅ Ready

CC7 — System Operations / Monitoring

CriterionSOC 2 ReferenceWO FeatureImplementationStatus
Detects and reports failuresCC7.1Circuit breaker + observabilityThree-state circuit breaker per agent worker; Prometheus alerting✅ Ready
Monitors system componentsCC7.2OTEL + Grafana dashboardsDistributed tracing (wo.transition, wo.approval spans); custom metrics✅ Ready
Evaluates security eventsCC7.3AuditTrail + event analysisAudit events streamed to SIEM; anomaly detection on transition patterns⚠️ Partial
Responds to identified vulnerabilitiesCC7.4Incident response integrationWO system can generate incident WOs from security events⚠️ Design Only

CC8 — Change Management

CriterionSOC 2 ReferenceWO FeatureImplementationStatus
Authorizes, designs, develops, configures, documents, tests, approves, and implements changesCC8.1Core WO lifecycleThe WO system IS the change management system — every change to a validated system requires a WO with planning, execution, review, approval, and documentation✅ Primary

CC8.1 is CODITECT's strongest SOC 2 alignment. The WO module is not merely compliant with change management requirements — it implements them as the primary mechanism.

CC9 — Risk Mitigation

CriterionSOC 2 ReferenceWO FeatureImplementationStatus
Identifies and assesses risksCC9.1Priority field + regulatory flag + dependency graphWO risk classification at creation; DAG analysis for cascade risk✅ Ready
Risk management policiesCC9.2Checkpoint framework + approval chainsConfigurable per-tenant approval policies; mandatory checkpoints for regulated changes✅ Ready

4. Compliance Readiness Summary

FrameworkTotal Requirements✅ Ready⚠️ Partial/Design❌ GapCoverage
FDA 21 CFR Part 1116133081%
HIPAA §164.3121073070%
SOC 2 Type II (CC6–CC9)1183073%
Total37289076%

Path to 100% — Remaining Work

ItemEffortBlocking?Framework
Cryptographic hash binding for §11.702 daysNoFDA
Vault integration for re-authentication (§11.100)1 weekYesFDA
PHI scanner for WO content fields3 daysNoHIPAA
Break-glass emergency access procedure2 daysNoHIPAA
Session timeout enforcement (frontend)1 dayNoHIPAA
Audit event hash chain (integrity proof)3 daysNoHIPAA
SIEM integration for security event analysis1 weekNoSOC 2
Incident WO generation from security events3 daysNoSOC 2
Security event evaluation automation1 weekNoSOC 2

Total effort to 100%: ~5 weeks engineering (parallelizable across 2 engineers)


5. Validation Documentation Requirements

For FDA-regulated deployment, the WO module requires:

DocumentPurposeStatus
IQ (Installation Qualification)Verify system installed per specificationsTemplate needed
OQ (Operational Qualification)Verify system operates within parametersTest suite maps to requirements
PQ (Performance Qualification)Verify system performs under real-world conditionsRequires production pilot data
Validation PlanMaster plan for IQ/OQ/PQ activitiesDraft from SDD/TDD
Traceability MatrixMap requirements → design → tests → resultsAutomatable from test suite
Risk AssessmentFMEA or equivalent for system risksADR-based risk register exists
Computer System Validation (CSV) SummaryExecutive summary for auditorsTemplate needed

CODITECT's agent architecture can automate generation of the Traceability Matrix and CSV Summary from existing ADRs, test results, and audit trail data — a significant time and cost savings for customers.