Skip to main content

GAMP5 Category 5 Validation Strategy — Git-Based Quality System

This document defines the validation strategy for GatherSystemTech's FDA 21 CFR Part 11 compliant software, using Git + GitHub + Linear as the core quality management tools.

1. Scope

ItemDescription
Applicable ProjectsJope-SMB (Simulated Moving Bed Control System) and all software projects requiring FDA 21 CFR Part 11 compliance
GAMP5 ClassificationCategory 5 — Custom/Bespoke Software
Regulatory BasisFDA 21 CFR Part 11 — Electronic Records; Electronic Signatures

2. Quality Management Tool Suite

2.1 Tool Mapping

Quality ActivityToolDescription
Requirements ManagementLinear IssueEach requirement maps to an Issue with description, priority, and status tracking
Change ManagementGit + GitHub PRAll code changes go through the PR workflow with review and approval
Version ControlGitComplete change history, tamper-proof (with Branch Protection)
Code ReviewGitHub PR ReviewReviewer approve = formal review record
Test ManagementGit commit + Test AgentTest results recorded in commits and PRs
Traceability ChainLinear → Git → GitHub → TestEnd-to-end traceability
Document Version ControlGit repo (markdown)Validation documents managed in version control as markdown
Document ReviewGitHub PR ReviewDocument changes also go through the PR review workflow

2.2 FDA Part 11 Requirements Already Met by Git

FDA Part 11 RequirementGit/GitHub EquivalentCoverage
Audit Trailgit log, git blame — records who, when, and what changedFully met
Change ControlPR review + approve workflowFully met
Code ReviewPR review comments, approve records permanently retainedFully met
TraceabilityCommit → PR → Linear Issue complete traceability chainFully met
AttributableEach commit includes author + timestampFully met

2.3 Areas Requiring Reinforcement

FDA Part 11 RequirementGapSolutionComplexity
Electronic SignatureGit commit does not equal a regulatory-defined electronic signatureGPG signed commits + Branch Protection requiring signaturesMedium
System ValidationGit/GitHub itself is not a validated systemWrite IQ/OQ/PQ validation documentsMedium
Access ControlNeed to demonstrate that permission management is controlledGitHub Branch Protection Rules + documented permission matrixLow
Prevent Record Deletiongit push --force can tamper with historyDisable force push + Branch ProtectionLow
Reason for Change"Why changed" is not always recordedRequire commit messages to include Issue IDLow
Closed SystemGitHub is a cloud serviceWrite security control documentation defining access scopeLow

3. Git Workflow (Compliant Version)

3.1 Merge Strategy

Squash Merge is the standard strategy used when merging all feature branches into master/develop.

AdvantageDescription
1:1 MappingOne commit on master = one PR = one Linear Issue
Easy RevertRolling back a feature only requires reverting one commit
Clean Historygit log --oneline master serves directly as the version changelog
Audit-FriendlyEach commit is a complete, traceable change unit

3.2 Branch Lifecycle

Feature branch created → Development → PR created → Review + Approve → Squash Merge → Delete branch
  • Feature branches must be deleted after merging to avoid branch clutter
  • Development history is preserved in the GitHub PR (all original commits, diff, and review discussions are permanently retained)
  • Branch deletion does not affect any historical records

3.3 Traceability Chain

git log                  →  View "what changed" (each commit includes PR number)
GitHub PR (#N) → View "how it was developed" (original commits, diff, review)
Linear Issue (JOP-XXX) → View "why it was done" (requirements, development instructions, discussion)

3.4 Branch Protection Rules (Must Be Enabled)

RuleSetting
Require pull request reviewsAt least 1 reviewer approve
Require signed commitsGPG signing (electronic signature substitute)
Do not allow force pushesPrevent history tampering
Do not allow deletionsPrevent deletion of protected branches

4. Validation Document Architecture

4.1 Document List

Document IDDocument NameDescriptionStatus
VP-001Validation PlanValidation strategy, scope, tools, role definitionsPending
SOP-001Software Development SOPSoftware development lifecycle procedure (including Git workflow)Pending
SOP-002Change Control SOPChange control procedure (including PR review workflow)Pending
SOP-003Testing SOPTesting strategy and proceduresPending
RA-001Risk AssessmentRisk assessment (FMEA method)Pending
RTM-001Requirements Traceability MatrixRequirements traceability matrixPending
IQ-001Installation QualificationInstallation qualification reportPending
OQ-001Operational QualificationOperational qualification reportPending
PQ-001Performance QualificationPerformance qualification reportPending
VSR-001Validation Summary ReportValidation summary reportPending

4.2 Document Storage Location

{validation-repo}/
├── sop/
│ ├── SOP-001-software-development.md
│ ├── SOP-002-change-control.md
│ └── SOP-003-testing.md
├── validation/
│ ├── VP-001-validation-plan.md
│ ├── RA-001-risk-assessment.md
│ ├── RTM-001-traceability-matrix.md
│ └── reports/
│ ├── IQ-001-installation-qualification.md
│ ├── OQ-001-operational-qualification.md
│ ├── PQ-001-performance-qualification.md
│ └── VSR-001-validation-summary.md
├── templates/
│ └── (document templates)
└── .github/
└── workflows/
└── pdf-export.yml ← markdown → PDF automation (for audit submission)

4.3 Document Management Workflow

1. Write/modify document (markdown in Git)

2. Create PR → Reviewer approve (= formal document sign-off)

3. Squash Merge (signed commit = electronic signature)

4. CI auto-generates PDF (for audit submission)

5. RTM (Requirements Traceability Matrix)

5.1 Purpose

The RTM proves that each requirement has corresponding implementation and tests. Auditors can use it to confirm nothing is missing.

5.2 Format

Requirement (Linear Issue)Design SpecImplementation (PR)Test MethodTest ResultStatus
JOP-99: Recipe Version ControlRecipe Version Control DesignPR #14Unit test + Integration testPassed
JOP-101: Alarm/InterlockAlarm Classification DesignPR #12Unit test + Integration testPassed
JOP-102: Backup/RecoveryBackup System DesignPR #13Unit test + Integration testPassed

5.3 Automation Plan

The existing toolchain has the prerequisites for automated RTM generation:

Linear Issue (Requirements)
↓ Issue ID recorded in commit message
Git commit / PR (Implementation)
↓ PR contains test results
Test Report (Testing)

Script auto-matches → generates RTM table

The automation script can collect data from the following sources:

  1. Linear API — Fetch all Issues (requirements list)
  2. Git log — Match which Issues have corresponding commits/PRs
  3. Test report — Match test results
  4. Auto-generate RTM — Flag requirements missing implementation or tests

6. Electronic Signature Strategy

6.1 GPG Signed Commits

ItemDescription
PurposeProve that a commit comes from a specific developer and cannot be forged
MechanismEach developer generates a GPG key pair; commits are automatically signed
VerificationGitHub displays a "Verified" badge
SOP DefinitionDefine in SOP-001 that "GPG signed commit = electronic signature"

6.2 PR Approve as Sign-Off

RoleActionEquivalent To
DeveloperGPG signed commitDeveloper signature
ReviewerPR approveReviewer sign-off
MergerSquash merge (signed)Approval for release

7. Current Project Compliance Status

Jope-SMB (Primary Compliance Project)

Compliance ItemImplementation StatusDescription
User Management✅ DoneGST.Plugin.UserManagement (GST-14)
Audit Trail✅ DoneGST.Plugin.AuditTrail
Electronic Signature✅ Done (Application Layer)In-app electronic signature mechanism
Session Idle Timeout✅ DoneSessionIdleService (GST-11)
NTP Time Sync✅ DoneNTP time synchronization (GST-10)
Recipe Version Control✅ DoneJOP-99
Backup/Recovery✅ DoneJOP-102
Alarm/Interlock✅ DoneJOP-101
Data Export⬜ BacklogJOP-100
Device Validation⬜ BacklogJOP-103
Validation Documents⬜ Not StartedDocument architecture defined in this document

8. Next Steps

PriorityItemDescription
1Enable Branch ProtectionDisable force push, require PR review, require signed commits
2Set Up GPG Signed CommitsAll developers generate GPG keys and configure auto-signing
3Write SOP-001 ~ SOP-003Formally document the current Git workflow
4Write VP-001 Validation PlanDefine validation strategy and scope
5Create RTM-001Generate initial traceability matrix from existing Linear Issues
6Write RA-001 Risk AssessmentFMEA risk assessment
7Execute IQ/OQ/PQInstallation/Operational/Performance Qualification
8Write VSR-001Validation summary report compiling all evidence
9Build PDF Export PipelineCI/CD markdown → PDF automation
10RTM Automation ScriptLinear + Git → auto-generate traceability matrix

Document Version: v1.0 Created: 2026-03-16 Last Updated: 2026-03-16 Owner: PM Agent