Title 21 CFR Part 11
Best for: Any organization that creates, modifies, maintains, or transmits electronic records under FDA-regulated processes: pharmaceutical manufacturers, biotech firms, medical device companies, CROs, clinical laboratories, and food producers subject to FDA oversight. No revenue or size threshold applies. If your QMS, MES, LIMS, or clinical trial platform runs under FDA jurisdiction, Part 11 applies. AWS-hosted GxP workloads fall under this requirement.
| Mandatory? | Mandatory for FDA-regulated industries using electronic records |
| Who validates? | FDA inspection; no formal certification |
| Renewal | No fixed cycle; ongoing compliance |
| Scope | Electronic records and signatures in FDA-regulated industries |
๐ U.S. Food and Drug Administration (FDA), Department of Health and Human Services ยท 21 CFR Part 11 (1997, amended 2003) Official source โ
Get Started
module "..." {
source = "cfrpart11.compliance.tf/terraform-aws-modules/<module>/aws"
version = "<version>"
}What Compliance.tf Covers vs. What You Handle
What Compliance.tf automates
- Audit Trail Completeness: 9 controls validating CloudTrail and API Gateway logging configuration. Checks multi-region trail enablement, S3 object-level read/write event logging, CloudWatch integration, and security trail configuration. Gaps where regulated record changes would go unlogged surface as findings.
- Encryption at Rest: 3 controls covering API Gateway cache encryption, backup recovery point encryption, and CloudTrail log encryption. Verifies that KMS customer-managed keys are in use for trail encryption rather than default AWS-managed keys.
- Encryption in Transit: Flags deprecated SSL/TLS protocol versions and missing SSL certificates on API Gateway stages across 3 controls covering CloudFront and API Gateway TLS configuration.
- Backup and Record Retention: 3 controls checking backup retention minimums, recovery point encryption, and deletion protection. Backup plans below the 35-day baseline and recovery points exposed to manual deletion both generate findings.
- Access and Network Controls: 2 controls: AWS Organizations membership and public IP exposure on compute resources. Validates centralized account governance and that launch configurations do not assign public IPs by default.
What you handle
- Audit Trail Completeness: Application-level audit trails within GxP systems (LIMS, MES, ERP) must capture old and new values and operator identity per Section 11.10(e). You also need to identify which S3 buckets hold regulated records, map them to predicate rules, and maintain documented audit trail review procedures with qualified reviewers.
- Encryption at Rest: KMS key rotation policy, key access policy reviews, and documented rationale for key management decisions. Encryption must also extend to all data stores holding regulated records (RDS, EBS, DynamoDB) beyond the controls sampled here.
- Encryption in Transit: Defining minimum TLS version policy at the organizational level, performing periodic cipher suite reviews, and documenting encryption-in-transit controls for system validation packages (IQ/OQ/PQ documentation).
- Backup and Record Retention: Determining actual retention requirements based on predicate rules (e.g., 21 CFR 211.180 requires batch production records for at least 1 year past expiry). Retention periods in production GxP environments typically need to be configured well beyond 35 days. Testing restore procedures and documenting restore validation results is also on you.
- Access and Network Controls: Implementing IAM policies, role-based access control, and unique user identification per Section 11.10(d). Establishing procedures for electronic signature management per Subpart C (Sections 11.100, 11.200, 11.300). Periodic access reviews and documentation of authority checks.
Controls by Category
Audit Trails - Section 11.10(e) (3 controls)
The most common findings under Section 11.10(e) are gaps in regional trail coverage, missing object-level S3 logging for GxP data buckets, and CloudTrail logs not forwarded to CloudWatch. The requirement is specific: secure, computer-generated, time-stamped trails that capture old and new values and the identity of the person behind each change. Assessors will also verify that trails cannot be modified or deleted by the same operators whose actions they record.
Encryption at Rest - Section 11.10(c) (2 controls)
Assessors verify that backups, cached API responses, and audit trail logs are encrypted with customer-managed KMS keys, not AWS default service keys. The distinction matters under Section 11.10(c) because customer-managed keys give the organization documented control over access to regulated records. Unencrypted backup recovery points are a frequent gap, particularly when teams assume encryption is inherited from the source volume.
Encryption in Transit - Section 11.10(c) (1 control)
The first thing an assessor checks is whether deprecated SSL/TLS protocols (SSLv3, TLS 1.0, TLS 1.1) are still in use. CloudFront distributions configured with legacy origin SSL protocols and API Gateway stages missing client SSL certificates for backend authentication are the two most common findings. Evidence should include TLS configuration documentation and vulnerability scan results confirming no weak cipher suites are active.
Record Retention and Protection - Section 11.10(b) (1 control)
Configuration showing recovery points cannot be manually deleted is the primary evidence auditors request here. Section 11.10(b) requires the ability to produce accurate, complete copies of records suitable for FDA inspection, which means those records cannot be subject to casual deletion by operators. The 35-day retention check is a floor, not a target: most GxP record types under predicate rules such as 21 CFR 211.180 require retention well beyond that, often tied to product expiry dates.
Additional Controls (92)
AWS CloudTrail (1)
AWS CodeBuild (2)
AWS Database Migration Service (1)
AWS IAM (7)
AWS Lambda (2)
AWS Secrets Manager (1)
Amazon CloudWatch (1)
Amazon CloudWatch Logs (1)
Amazon DynamoDB (3)
Amazon EBS (2)
Amazon EC2 (6)
Amazon EFS (2)
Amazon ElastiCache (1)
Amazon Kinesis (1)
Amazon OpenSearch Service (5)
Amazon RDS (13)
Amazon Redshift (8)
Amazon S3 (15)
Amazon SageMaker (4)
Elastic Load Balancing (8)
Related Frameworks
HIPAA Omnibus Rule 2013 โ ๐ก Medium overlap (40%)
HIPAA and 21 CFR Part 11 share requirements around access controls, audit logging, encryption, and integrity verification. Organizations in pharma or biotech that handle both clinical trial data and protected health information often address both frameworks simultaneously. HIPAA is broader in its privacy requirements, while Part 11 is more prescriptive about audit trail content and electronic signature controls.
NIST 800-53 Rev 5 โ ๐ก Medium overlap (50%)
NIST 800-53 Rev 5 provides the most comprehensive control catalog that maps to Part 11 requirements. AU (Audit and Accountability) controls align with Section 11.10(e), SC (System and Communications Protection) controls map to Section 11.10(c), and IA (Identification and Authentication) controls cover Sections 11.10(d) and 11.300. Many organizations use NIST 800-53 as the technical implementation backbone for their Part 11 compliance program.
SOC 2 โ ๐ก Medium overlap (35%)
SOC 2 Trust Services Criteria for Security, Availability, and Processing Integrity partially overlaps with Part 11 technical controls around access management, logging, and encryption. Cloud service providers hosting GxP workloads often present SOC 2 Type II reports as supporting evidence during FDA inspections, though a SOC 2 report alone does not demonstrate Part 11 compliance.