工厂安全

P. Karulkar
{"title":"工厂安全","authors":"P. Karulkar","doi":"10.1109/ugim.2012.6247080","DOIUrl":null,"url":null,"abstract":"It is very common to encounter the topic of security while running day-to-day operations of a fabrication facility (Fab. Recently, this topic came up because of a request for information posted on an e-mail based community bulletin board. Other occasions involve general awareness resulting from something in the news, scouting or starting a new project, sponsor/customer inquiries, reaction to a specific local situation, and, most importantly, audits evaluating the compliance with federal, state and local regulations. Independent of its origin, the so called \"Fab Security Plan\" tends to be a patchwork of rules and requirements because of the poor understanding of its importance, resource limitations, conflicting program requirements, dynamic local situations, and inability to anticipate future needs. Usually, finalizing and documenting one's security posture turns out to be a challenging task. But it is critical for every fab to have a functional security plan. Giving numerous examples of practical situations, this presentation will discuss development of a security posture. The list of topics that would be emphasized includes but is not limited to: (1) Understanding the importance of the security posture, (2) Devil in the detail: analyzing security situations, (3) Understanding the law, rules, policies, and requirements, (4) Knowing customer needs: current and anticipated, (5) Knowing your business, (6) Knowing existing commitments, (7) Flushing out local environment, (8) Flushing out stake holder requirements, (9) Know what you can afford, (10) Comprehensiveness within limits, (11) Developing security procedures, (12) Reconciling with safety & environmental codes, and other local policies, (14) Iterative reviews, approvals, (15) Trial implementations, roto-rooting, and revisions, (16) Finalizing, adoption, and acceptance, (17) Training, briefing, debriefing, reporting, corrective actions and recourses for violations, and appeals, (15) Dos, don'ts and common mistakes, (14) Understanding that practical situations have a lot of gray but security postures tend to be black and white for a reason. Balancing gray with black & white requires a bottom up approach combined with a lot of training. Security plan is a \"live\" document but should not be subject to rapid change or perpetual tweaking. About the Author: Dr. Pramod C Karulkar has held engineering, program management and senior management positions in micro-nano programs involving R&D and custom manufacturing that have successfully produced cutting edge, high performance components/systems for field applications. He has been a major contributor to establishing, expanding, equipping, bringing on line, and qualifying fab facilities for deliverable products. His contributions to R&D, engineering, and fab management work have been commended by customers. Addressing fab security successfully has played a key role in the success of his projects in government contract environment. Dr. Karulkar received Ph.D. from University of Wisconsin Madison and has held positions at MIT Lincoln Laboratory, Microelectronics Research Lab in Columbia Maryland, Rockwell International, Hughes Aircraft Company, and University of Alaska.","PeriodicalId":347838,"journal":{"name":"2012 19th Biennial University/Government/Industry, Micro/Nano Symposium (UGIM)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Fab Security\",\"authors\":\"P. Karulkar\",\"doi\":\"10.1109/ugim.2012.6247080\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"It is very common to encounter the topic of security while running day-to-day operations of a fabrication facility (Fab. Recently, this topic came up because of a request for information posted on an e-mail based community bulletin board. Other occasions involve general awareness resulting from something in the news, scouting or starting a new project, sponsor/customer inquiries, reaction to a specific local situation, and, most importantly, audits evaluating the compliance with federal, state and local regulations. Independent of its origin, the so called \\\"Fab Security Plan\\\" tends to be a patchwork of rules and requirements because of the poor understanding of its importance, resource limitations, conflicting program requirements, dynamic local situations, and inability to anticipate future needs. Usually, finalizing and documenting one's security posture turns out to be a challenging task. But it is critical for every fab to have a functional security plan. Giving numerous examples of practical situations, this presentation will discuss development of a security posture. The list of topics that would be emphasized includes but is not limited to: (1) Understanding the importance of the security posture, (2) Devil in the detail: analyzing security situations, (3) Understanding the law, rules, policies, and requirements, (4) Knowing customer needs: current and anticipated, (5) Knowing your business, (6) Knowing existing commitments, (7) Flushing out local environment, (8) Flushing out stake holder requirements, (9) Know what you can afford, (10) Comprehensiveness within limits, (11) Developing security procedures, (12) Reconciling with safety & environmental codes, and other local policies, (14) Iterative reviews, approvals, (15) Trial implementations, roto-rooting, and revisions, (16) Finalizing, adoption, and acceptance, (17) Training, briefing, debriefing, reporting, corrective actions and recourses for violations, and appeals, (15) Dos, don'ts and common mistakes, (14) Understanding that practical situations have a lot of gray but security postures tend to be black and white for a reason. Balancing gray with black & white requires a bottom up approach combined with a lot of training. Security plan is a \\\"live\\\" document but should not be subject to rapid change or perpetual tweaking. About the Author: Dr. Pramod C Karulkar has held engineering, program management and senior management positions in micro-nano programs involving R&D and custom manufacturing that have successfully produced cutting edge, high performance components/systems for field applications. He has been a major contributor to establishing, expanding, equipping, bringing on line, and qualifying fab facilities for deliverable products. His contributions to R&D, engineering, and fab management work have been commended by customers. Addressing fab security successfully has played a key role in the success of his projects in government contract environment. Dr. Karulkar received Ph.D. from University of Wisconsin Madison and has held positions at MIT Lincoln Laboratory, Microelectronics Research Lab in Columbia Maryland, Rockwell International, Hughes Aircraft Company, and University of Alaska.\",\"PeriodicalId\":347838,\"journal\":{\"name\":\"2012 19th Biennial University/Government/Industry, Micro/Nano Symposium (UGIM)\",\"volume\":\"18 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2012-07-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2012 19th Biennial University/Government/Industry, Micro/Nano Symposium (UGIM)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ugim.2012.6247080\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 19th Biennial University/Government/Industry, Micro/Nano Symposium (UGIM)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ugim.2012.6247080","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

在运行制造设施(Fab)的日常操作时,遇到安全问题是非常常见的。最近,这个话题出现了,因为一个基于电子邮件的社区公告板上发布了一个信息请求。其他场合包括从新闻中获得的一般意识,寻找或开始一个新项目,赞助商/客户询问,对特定当地情况的反应,以及最重要的,评估对联邦,州和地方法规的遵从性的审计。独立于其起源,所谓的“工厂安全计划”往往是一个拼凑的规则和要求,因为它的重要性认识不足,资源限制,冲突的项目需求,动态的当地情况,以及无法预测未来的需求。通常,最终确定和记录一个人的安全状态是一项具有挑战性的任务。但对于每个晶圆厂来说,制定功能安全计划至关重要。本演讲将给出许多实际情况的例子,讨论安全态势的发展。要强调的主题列表包括但不限于:(1)了解安全态势的重要性;(2)细节问题:分析安全情况;(3)了解法律、规则、政策和要求;(4)了解客户需求;当前的和预期的,(5)了解你的业务,(6)了解现有的承诺,(7)了解当地环境,(8)了解利益相关者的需求,(9)了解你能负担得起的,(10)在限制范围内的全面性,(11)制定安全程序,(12)与安全和环境规范和其他当地政策相协调,(14)迭代审查,批准,(15)试验实施,轮换,和修订,(16)最终确定,采用和接受,(17)培训,(15)该做、不该做和常见错误;(14)了解实际情况有很多灰色地带,但安全姿态往往是非黑即白的,这是有原因的。平衡灰色与黑白需要一个自下而上的方法结合大量的培训。安全计划是一个“实时”文档,但不应该受到快速更改或永久调整的影响。作者简介:Pramod C Karulkar博士在涉及研发和定制制造的微纳米项目中担任工程、项目管理和高级管理职位,成功生产了用于现场应用的尖端、高性能组件/系统。他一直是建立、扩大、装备、上线和合格的可交付产品晶圆厂设施的主要贡献者。他在研发、工程和晶圆厂管理方面的贡献得到了客户的好评。成功解决晶圆厂安全问题对他在政府合同环境下的项目成功起到了关键作用。Karulkar博士在威斯康星大学麦迪逊分校获得博士学位,并在麻省理工学院林肯实验室、马里兰州哥伦比亚微电子研究实验室、罗克韦尔国际公司、休斯飞机公司和阿拉斯加大学担任职务。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Fab Security
It is very common to encounter the topic of security while running day-to-day operations of a fabrication facility (Fab. Recently, this topic came up because of a request for information posted on an e-mail based community bulletin board. Other occasions involve general awareness resulting from something in the news, scouting or starting a new project, sponsor/customer inquiries, reaction to a specific local situation, and, most importantly, audits evaluating the compliance with federal, state and local regulations. Independent of its origin, the so called "Fab Security Plan" tends to be a patchwork of rules and requirements because of the poor understanding of its importance, resource limitations, conflicting program requirements, dynamic local situations, and inability to anticipate future needs. Usually, finalizing and documenting one's security posture turns out to be a challenging task. But it is critical for every fab to have a functional security plan. Giving numerous examples of practical situations, this presentation will discuss development of a security posture. The list of topics that would be emphasized includes but is not limited to: (1) Understanding the importance of the security posture, (2) Devil in the detail: analyzing security situations, (3) Understanding the law, rules, policies, and requirements, (4) Knowing customer needs: current and anticipated, (5) Knowing your business, (6) Knowing existing commitments, (7) Flushing out local environment, (8) Flushing out stake holder requirements, (9) Know what you can afford, (10) Comprehensiveness within limits, (11) Developing security procedures, (12) Reconciling with safety & environmental codes, and other local policies, (14) Iterative reviews, approvals, (15) Trial implementations, roto-rooting, and revisions, (16) Finalizing, adoption, and acceptance, (17) Training, briefing, debriefing, reporting, corrective actions and recourses for violations, and appeals, (15) Dos, don'ts and common mistakes, (14) Understanding that practical situations have a lot of gray but security postures tend to be black and white for a reason. Balancing gray with black & white requires a bottom up approach combined with a lot of training. Security plan is a "live" document but should not be subject to rapid change or perpetual tweaking. About the Author: Dr. Pramod C Karulkar has held engineering, program management and senior management positions in micro-nano programs involving R&D and custom manufacturing that have successfully produced cutting edge, high performance components/systems for field applications. He has been a major contributor to establishing, expanding, equipping, bringing on line, and qualifying fab facilities for deliverable products. His contributions to R&D, engineering, and fab management work have been commended by customers. Addressing fab security successfully has played a key role in the success of his projects in government contract environment. Dr. Karulkar received Ph.D. from University of Wisconsin Madison and has held positions at MIT Lincoln Laboratory, Microelectronics Research Lab in Columbia Maryland, Rockwell International, Hughes Aircraft Company, and University of Alaska.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信