Skip to main content
Back to Blog
Regulatory Compliance12 min read

21 CFR Part 11 Electronic Signature Validation: IQ OQ PQ Step-by-Step Guide

A practical guide to IQ, OQ, and PQ validation for 21 CFR Part 11 e-signature systems, including CSA's risk-based approach, specific test cases for each Part 11 control, and what FDA investigators look for.

C
Certivo Team

When an FDA investigator walks into a data integrity inspection and asks for your system qualification file, they're not looking for a vendor brochure. They want protocols, executed test scripts with actual results, deviation records where tests failed, and a traceability matrix that ties every Part 11 requirement to a specific test and a specific configuration setting.

If your e-signature system has never been through IQ, OQ, and PQ validation, or if the validation was done years ago and the system has changed since, that's a significant gap. It's also one of the most consistently cited findings in FDA 483 observations related to electronic records systems.

This guide covers what IQ, OQ, and PQ actually look like for a 21 CFR Part 11 e-signature system in 2026: the protocols, the specific test cases that cover Part 11 controls, the CSA risk-based approach that FDA finalized in September 2025, and the documentation your team needs to retain.

Key Takeaways

  • Section 11.10(a) requires validation of closed electronic record systems, but does not specify how. CSA, finalized September 2025, allows risk-based scoping while still requiring full testing of core Part 11 controls.
  • IQ confirms correct installation (environment, software version, configuration baseline, integrations, backup). It is short, signed, and dated, not a 40-page document that was never executed.
  • OQ tests every Part 11 control with explicit test cases for §11.10 audit trail, §11.50 signature manifestation, §11.70 record binding, §11.200 re-authentication at signing, and §11.10(d) access control.
  • PQ verifies real users in real workflows. UAT across roles, signature meaning coverage, audit trail review workflow, and SOP-to-system alignment are the key PQ deliverables.
  • The traceability matrix is what an investigator pulls first. Every §11.10, §11.50, §11.70, and §11.200 requirement maps to a configuration setting, a test case, and a sustaining SOP.

Why IQ/OQ/PQ Validation Is Non-Negotiable Under Part 11

Section 11.10(a) of 21 CFR Part 11 states plainly that closed electronic record systems must be "validated to ensure accuracy, reliability, consistent intended performance, and the ability to discern invalid or altered records." That's the statutory basis. Everything else in the IQ/OQ/PQ process flows from that single sentence.

What the regulation doesn't specify is how to validate. For decades, the industry interpreted this through the lens of traditional Computer System Validation (CSV), a highly scripted, document-heavy approach where every function was tested against a formal protocol, every result was compared to an expected outcome, and deviation from expectation triggered a formal deviation report. This approach worked, but it generated enormous paper burdens and created perverse incentives: teams tested what they could pass rather than what mattered.

FDA's Computer Software Assurance (CSA) guidance, finalized in September 2025 for medical devices and pharmaceutical quality systems, changes the standard. Not by reducing what you must prove (you still need to demonstrate that the system works as intended and that Part 11 controls operate correctly), but CSA explicitly says the depth of testing should match the risk. A high-risk system used to generate and sign regulated records gets thorough, scripted testing. A low-risk reporting tool that doesn't generate records gets a lighter touch.

For an e-signature platform used in clinical trials, GMP batch records, or regulatory submissions, the risk classification is unambiguous: high. The system generates records that go to FDA. The signatures on those records are the legal equivalents of handwritten signatures. If the system fails to enforce 2FA at signing, or if the audit trail can be modified without detection, the integrity of every record signed in that system is in question.

You can use CSA framing (risk-based, least-burdensome documentation), but you can't use it to reduce testing of the core Part 11 controls. Those test fully, every time.

Installation Qualification (IQ): What It Covers

IQ answers one question: is the system installed correctly in the intended environment?

For an e-signature platform, IQ documentation typically covers:

Environment verification.Document the server environment, operating system versions, database version, and network configuration. If it's a cloud-hosted SaaS platform, this means confirming that the vendor's infrastructure matches the validated configuration baseline, and that you have documentation from the vendor confirming the deployed environment.

Software version confirmation.The exact software version installed must match the version that the vendor has validated. This sounds obvious, but it's a common gap: the vendor validates version 4.2 and you're running 4.3 because auto-updates were enabled. Any version change after initial installation requires a change control assessment and, if Part 11 controls were affected, re-validation of the impacted functions.

Configuration baseline. Document every configuration setting that affects Part 11 controls: session timeout values, password complexity rules, 2FA method (authenticator app vs. SMS), audit trail retention period, role definitions, and signature meaning options. This baseline becomes the reference point for every subsequent change control assessment.

Integration points.If the e-signature system integrates with other systems, an eTMF, a CTMS, an LMS for training records, document each integration and verify it's configured correctly. Integration points are a common source of audit trail gaps: if a signature event in system A triggers a record in system B, the audit trail in both systems needs to capture the full event.

Data retention and backup.Confirm that electronic records and audit trails are backed up on a schedule that matches your retention requirements. Under Part 11, you need to be able to retrieve records for the full retention period defined by the relevant predicate rule. For GCP records, that's typically two years after marketing approval or study termination.

IQ documentation doesn't need to be long. It needs to be complete and signed. A one-page IQ protocol with executed results, a signature, and a date is better than a 40-page document that was never actually executed.

Operational Qualification (OQ): Testing Every Part 11 Control

OQ is where the actual Part 11 compliance work happens. This phase tests that every system function operates as designed under normal and boundary conditions. For an e-signature system, the OQ protocol needs explicit test cases for every requirement in §11.10 (closed system controls) and §11.200 (electronic signature requirements).

Here's what those test cases look like in practice:

Audit Trail Tests (§11.10(e))

The audit trail is the most frequently tested, and most frequently deficient, Part 11 control. OQ test cases should cover:

  • Creation event. Create a new record. Verify the audit trail captures: user ID, timestamp with time zone, record type, and the initial field values.
  • Modification event.Modify a field in an existing record. Verify the audit trail captures: user ID, timestamp, field name, old value, and new value. The old value is critical. If it's not captured, you can't reconstruct the record history.
  • Deletion attempt. Attempt to delete a record. If deletion is permitted, verify the audit trail records it. If the system prevents deletion, verify it does so and documents the attempt.
  • Admin access test.Log in as a system administrator and attempt to modify an audit trail entry directly. The system must prevent this. An administrator with database-level access shouldn't be able to alter audit trail records without detection.
  • Timestamp integrity.Verify that timestamps reflect the actual server time, not the user's local machine time. A system that lets users set their own clock can backdate entries.

Electronic Signature Tests (§11.50, §11.70, §11.200)

  • Required elements.Execute a signature and verify the record captures: full printed name, date and time of signing, and the meaning of the signature (e.g., "Approved," "Reviewed," "Authored"). All three elements are required under §11.50. Missing even one is a finding.
  • Re-authentication at signing. This is the test that general-purpose e-signature tools often fail. Under §11.200(a), each electronic signature event must require the user to re-enter their credentials, even within an active session. Test this by: logging in, performing other activities in the system, then initiating a signature. The system must prompt for credentials again before the signature is executed.
  • Single-period signing. If a user signs multiple documents in a single controlled session, §11.200(a)(1) allows the first signing to use both components (ID and password) and subsequent signings to use only one, but only within that single period of controlled access. Test this flow explicitly and document it.
  • Signature binding. Under §11.70, electronic signatures must be permanently linked to their associated records. Test this by attempting to detach a signature from its record or move a signed record to a different location. The system should prevent it or detect the modification.
  • Unique user IDs. Verify that the system enforces unique user IDs and that no two users share an account. Attempt to create a duplicate user and verify the system rejects it.

Access Control Tests (§11.10(d))

  • Create a user with role A and verify they cannot access functions restricted to role B.
  • Verify that terminated/deactivated accounts cannot log in.
  • Verify that access control changes themselves appear in the audit trail.
  • Test the password complexity rules by attempting to set passwords that violate the policy.

System Availability and Recovery (§11.10(b))

  • Verify that the system produces accurate and complete copies of records on demand. The export function needs to produce a complete, human-readable record including the full audit trail.
  • If your SLA includes a disaster recovery provision, document the recovery time objective and verify the backup restoration process.

Every OQ test case needs: a test ID, the regulatory requirement being tested, the procedure, the expected result, the actual result, pass/fail determination, the tester's initials, and the date. Deviations, where the actual result doesn't match the expected result, need formal deviation reports and resolution documentation before OQ can close.

Performance Qualification (PQ): Real Users, Real Workflows

PQ moves from controlled testing to real operational conditions. Where OQ tests functions in isolation, PQ tests them in the context of your actual business workflows, with your actual user population, in your production (or production-equivalent) environment.

For an e-signature platform, PQ typically covers:

User acceptance testing across roles. Have representatives from each user role, author, reviewer, approver, read-only, execute realistic workflows. A CRA completes and signs a monitoring visit report. A supervisor reviews and countersigns. A QA lead performs a periodic audit trail review. Document each workflow execution with test results.

Concurrent user load. If your environment has many users, PQ should include tests of the system under realistic concurrent load. Performance degradation under load that affects timestamp accuracy is a Part 11 concern, not just an IT concern.

Signature meaning coverage. Verify that every signature meaning configured in the system (Approved, Reviewed, Authored, and any custom meanings) displays correctly on the signed record and in the audit trail.

Audit trail review workflow.Part 11 requires that audit trails be reviewed, but it's PQ where you test that the review workflow actually works end-to-end. The audit trail reviewer should be able to filter by date range, user, record type, and action; export a complete audit trail report; and document the review completion. If the system can't support a documented, repeatable audit trail review process, that's a PQ failure.

SOP alignment verification.During PQ, verify that the system's actual behavior matches what your SOPs describe. If your SOP says "users must re-authenticate before each signature," and you've written an OQ test case that confirms re-authentication is required, PQ is where you confirm that real users in real workflows actually experience that requirement. Gaps between SOPs and system behavior are a common 483 observation.

The Traceability Matrix

Every Part 11 validation package needs a traceability matrix. It's a single document, often a spreadsheet, that maps each regulatory requirement to three things: the configuration setting that implements it, the test case in the OQ/PQ protocol that verifies it, and the SOP that sustains it.

For an e-signature system, the traceability matrix runs through every requirement in §11.10, §11.50, §11.70, and §11.200. A requirement that doesn't map to a test case is a gap. A test case that doesn't tie back to a regulatory requirement is potentially wasted effort.

During an FDA inspection, the traceability matrix is what an investigator uses to assess whether your validation is complete. They'll pick a requirement, say, §11.10(e) audit trail protection, find it in the matrix, pull the corresponding OQ test case, and look for the executed protocol with actual results. If any link in that chain is missing, the finding writes itself.

CSA in Practice: What Changes for Your 2026 Validation

Under the September 2025 CSA guidance, the biggest practical change for e-signature validation is the shift toward risk-based scoping and away from scripted testing of every system function.

What this means concretely:

You don't need to script-test every menu item, every UI element, or every configuration option the system has. You need to test what matters for Part 11 compliance and for your intended use. Features that don't affect regulated records or electronic signatures can be covered through unscripted exploratory testing with documented outcomes.

But CSA also encourages continuous monitoring as a supplement to point-in-time validation. For an e-signature system, this means your periodic audit trail reviews, your annual system reviews, and your change control process aren't just administrative tasks. They're part of your ongoing assurance that the system remains fit for its intended use.

One practical implication: if your vendor provides a pre-built validation package (often called an "Installation Qualification / Configuration Qualification" or IQ/CQ package), CSA allows you to accept vendor testing as part of your assurance evidence. You don't have to re-execute tests the vendor has already executed and documented, provided you review the vendor's test evidence and verify it's applicable to your configuration. This is the "leveraging vendor-provided testing" provision in CSA. It doesn't eliminate your responsibility, but it reduces duplication.

What FDA Investigators Actually Look For

In practice, the most common validation gaps FDA investigators find in e-signature systems are:

No executed protocols.A validation plan exists, protocols were written, but there's no executed evidence. No actual results, no tester initials, no dates. The plan is not the validation.

OQ missing Part 11-specific test cases. A general software OQ tests that buttons work and workflows complete. A Part 11 OQ tests that audit trail entries capture old values, that re-authentication fires before each signature, that the system prevents admin modification of audit trail entries. These test cases are often absent.

Validation not updated after system changes. The system was validated in 2019, the vendor released four major updates since then, and no change control assessments were done. Every material change to a validated system requires an impact assessment and, where Part 11 controls are affected, re-execution of the relevant protocols.

Audit trail review not documented. The system has a complete audit trail. Nobody has ever formally reviewed it. Under §11.10(e), audit trails must be reviewed by QA. The review schedule, the review procedure, and the review completion records all need to exist.

SOPs not aligned with system behavior.The SOP says one thing; the system does another. Both are wrong, but the investigator can only cite what's documented.

A Note on Vendor Validation Packages

For organizations choosing an e-signature platform, the vendor's validation package matters enormously. A purpose-built Part 11 platform should provide:

  • A completed IQ/OQ protocol with executed evidence for the standard configuration
  • A traceability matrix mapping each Part 11 requirement to test cases and configuration settings
  • A configuration qualification package you can review and extend for your specific environment
  • Change control documentation for every version released since the initial validation

Your organization's role is to review the vendor's package, execute any site-specific PQ testing for your workflows and user population, and retain the completed package as the system qualification file.

If a vendor can't provide this documentation, the validation burden falls entirely on you. That's not impossible, but it's a significant resource investment, and a gap in any link of the chain becomes your finding during an inspection.

For more on what a full Part 11 platform technical stack looks like, see the Certivo compliance page. The FDA inspection readiness and audit trail checklist covers what investigators pull during a data integrity inspection. And the GxP electronic signature requirements post covers the specific signature requirements across GMP, GLP, and GCP contexts that should inform your OQ test case design.

Certivo provides a pre-built IQ/OQ validation package with every deployment, including executed test evidence, a Part 11 traceability matrix, and change control documentation for every software release. Contact us to review the validation package before you commit.

Ready for Compliant E-Signatures?

Start your free trial and see how Certivo meets compliance requirements for your regulated industry.