Skip to content

Title 21 CFR Part 11

Best for: Any organization that creates, modifies, maintains, or transmits electronic records under FDA-regulated processes: pharmaceutical manufacturers, biotech firms, medical device companies, CROs, clinical laboratories, and food producers subject to FDA oversight. No revenue or size threshold applies. If your QMS, MES, LIMS, or clinical trial platform runs under FDA jurisdiction, Part 11 applies. AWS-hosted GxP workloads fall under this requirement.

Mandatory?Mandatory for FDA-regulated industries using electronic records
Who validates?FDA inspection; no formal certification
RenewalNo fixed cycle; ongoing compliance
ScopeElectronic records and signatures in FDA-regulated industries

๐Ÿ› U.S. Food and Drug Administration (FDA), Department of Health and Human Services ยท 21 CFR Part 11 (1997, amended 2003) Official source โ†’

Get Started

module "..." {
  source  = "cfrpart11.compliance.tf/terraform-aws-modules/<module>/aws"
  version = "<version>"
}

What Compliance.tf Covers vs. What You Handle

  • What Compliance.tf automates

    • Audit Trail Completeness: 9 controls validating CloudTrail and API Gateway logging configuration. Checks multi-region trail enablement, S3 object-level read/write event logging, CloudWatch integration, and security trail configuration. Gaps where regulated record changes would go unlogged surface as findings.
    • Encryption at Rest: 3 controls covering API Gateway cache encryption, backup recovery point encryption, and CloudTrail log encryption. Verifies that KMS customer-managed keys are in use for trail encryption rather than default AWS-managed keys.
    • Encryption in Transit: Flags deprecated SSL/TLS protocol versions and missing SSL certificates on API Gateway stages across 3 controls covering CloudFront and API Gateway TLS configuration.
    • Backup and Record Retention: 3 controls checking backup retention minimums, recovery point encryption, and deletion protection. Backup plans below the 35-day baseline and recovery points exposed to manual deletion both generate findings.
    • Access and Network Controls: 2 controls: AWS Organizations membership and public IP exposure on compute resources. Validates centralized account governance and that launch configurations do not assign public IPs by default.
  • What you handle

    • Audit Trail Completeness: Application-level audit trails within GxP systems (LIMS, MES, ERP) must capture old and new values and operator identity per Section 11.10(e). You also need to identify which S3 buckets hold regulated records, map them to predicate rules, and maintain documented audit trail review procedures with qualified reviewers.
    • Encryption at Rest: KMS key rotation policy, key access policy reviews, and documented rationale for key management decisions. Encryption must also extend to all data stores holding regulated records (RDS, EBS, DynamoDB) beyond the controls sampled here.
    • Encryption in Transit: Defining minimum TLS version policy at the organizational level, performing periodic cipher suite reviews, and documenting encryption-in-transit controls for system validation packages (IQ/OQ/PQ documentation).
    • Backup and Record Retention: Determining actual retention requirements based on predicate rules (e.g., 21 CFR 211.180 requires batch production records for at least 1 year past expiry). Retention periods in production GxP environments typically need to be configured well beyond 35 days. Testing restore procedures and documenting restore validation results is also on you.
    • Access and Network Controls: Implementing IAM policies, role-based access control, and unique user identification per Section 11.10(d). Establishing procedures for electronic signature management per Subpart C (Sections 11.100, 11.200, 11.300). Periodic access reviews and documentation of authority checks.

Controls by Category

Audit Trails - Section 11.10(e) (3 controls)

The most common findings under Section 11.10(e) are gaps in regional trail coverage, missing object-level S3 logging for GxP data buckets, and CloudTrail logs not forwarded to CloudWatch. The requirement is specific: secure, computer-generated, time-stamped trails that capture old and new values and the identity of the person behind each change. Assessors will also verify that trails cannot be modified or deleted by the same operators whose actions they record.

Encryption at Rest - Section 11.10(c) (2 controls)

Assessors verify that backups, cached API responses, and audit trail logs are encrypted with customer-managed KMS keys, not AWS default service keys. The distinction matters under Section 11.10(c) because customer-managed keys give the organization documented control over access to regulated records. Unencrypted backup recovery points are a frequent gap, particularly when teams assume encryption is inherited from the source volume.

Encryption in Transit - Section 11.10(c) (1 control)

The first thing an assessor checks is whether deprecated SSL/TLS protocols (SSLv3, TLS 1.0, TLS 1.1) are still in use. CloudFront distributions configured with legacy origin SSL protocols and API Gateway stages missing client SSL certificates for backend authentication are the two most common findings. Evidence should include TLS configuration documentation and vulnerability scan results confirming no weak cipher suites are active.

Record Retention and Protection - Section 11.10(b) (1 control)

Configuration showing recovery points cannot be manually deleted is the primary evidence auditors request here. Section 11.10(b) requires the ability to produce accurate, complete copies of records suitable for FDA inspection, which means those records cannot be subject to casual deletion by operators. The 35-day retention check is a floor, not a target: most GxP record types under predicate rules such as 21 CFR 211.180 require retention well beyond that, often tied to product expiry dates.

Additional Controls (92)

AWS CloudTrail (1)

AWS CodeBuild (2)

AWS Database Migration Service (1)

AWS IAM (7)

AWS KMS (1)

AWS Lambda (2)

AWS Secrets Manager (1)

Amazon CloudWatch (1)

Amazon CloudWatch Logs (1)

Amazon DynamoDB (3)

Amazon EBS (2)

Amazon EC2 (6)

Amazon EFS (2)

Amazon EMR (1)

Amazon ElastiCache (1)

Amazon Kinesis (1)

Amazon OpenSearch Service (5)

Amazon RDS (13)

Amazon Redshift (8)

Amazon S3 (15)

Amazon SNS (1)

Amazon SageMaker (4)

Amazon VPC (1)

Elastic Load Balancing (8)

Other (4)

Frequently Asked Questions

Does 21 CFR Part 11 apply to my organization if we use cloud-hosted systems?

Yes. Part 11 follows the records, not the infrastructure. If your FDA-regulated processes produce electronic records in AWS or any other cloud platform, you are responsible for demonstrating Part 11 compliance for those records. The FDA's 2003 guidance on scope and application did not exempt cloud environments. You need to qualify your cloud service provider (typically via a shared responsibility model and SOC 2 reports) and validate the application layer yourself.

What is the difference between Part 11 and predicate rules?

Predicate rules are the underlying FDA regulations that require records to be maintained (e.g., 21 CFR 211 for drug cGMP, 21 CFR 820 for device quality systems). Part 11 specifies how those records must be managed when they are in electronic form. You cannot comply with Part 11 in isolation: first identify which predicate rules apply to your products, then determine which records under those rules are electronic, and then apply Part 11 controls to those records.

How does the FDA's enforcement discretion guidance affect what I need to implement?

Treat the September 2003 enforcement discretion guidance as prioritization, not exemption. The FDA indicated it would exercise discretion on certain requirements, including validation, audit trails, record retention, and legacy systems, but did not waive them. Recent warning letters confirm active enforcement of audit trail and access control requirements. Section 11.10(e) audit trails for predicate-rule records are still expected, regardless of the 2003 guidance.

How long does it take to achieve Part 11 compliance in an AWS environment?

It depends on the number of GxP systems and their current state. Infrastructure-level controls (encryption, logging, access management) can be configured and validated in 4 to 8 weeks using Terraform and policy-as-code. Application-level validation (IQ/OQ/PQ) for each GxP system typically takes 3 to 6 months. A full program covering infrastructure, applications, SOPs, and training for a mid-size pharma company usually runs 6 to 12 months from kickoff to inspection readiness.

Are the 50 controls in this benchmark sufficient for full Part 11 compliance?

No. These 50 controls cover infrastructure-level technical requirements: audit trails, encryption, access restrictions, and backup retention. Part 11 also requires procedural controls that infrastructure checks cannot address, including system validation documentation (Section 11.10(a)), signed agreements with electronic signature users (Section 11.10(j)), unique user identification (Section 11.10(d)), and the biometric/non-biometric signature requirements in Subpart C. This benchmark is one layer in a broader compliance program that must also include SOPs, training records, and application-level validation.