RSC Colour: Primary Blue

  • Can MES support supplier scorecards and performance reviews?

    Short answer

    MES can support supplier scorecards and performance reviews, but usually as a data source and workflow participant, not as the primary system of record for supplier management. In most regulated, brownfield environments, the scoring logic, approvals, and official supplier status live in ERP, QMS, or a supplier relationship management (SRM) tool. MES is strongest at capturing plant-floor evidence (defects, line stops, material holds, rework) that should feed into those scorecards through validated integrations.

    What MES can realistically do for supplier performance

    MES is well suited to capturing how supplier performance manifests inside production: nonconformances traced to incoming material, rework and scrap rates, line interruptions tied to material issues, and special handling or deviations required for certain lots. This data can be structured so it is traceable back to vendor, material number, and lot or batch. When configured properly, MES can calculate tactical indicators such as defect rate by supplier-lot, first-pass yield impacted by specific suppliers, and the frequency of holds or quarantines.

    In many plants, MES can also trigger workflows when supplier-related issues occur, such as automatic creation of nonconformance records or corrective action requests that reference the supplier. These workflows become input to supplier reviews even if the formal review is executed elsewhere. The key is ensuring that MES events are consistently coded (e.g., root cause, supplier ID, defect codes) so the data can be reliably rolled up into scorecards.

    What typically belongs outside MES

    Most organizations managing complex, regulated supply chains rely on ERP, QMS, PLM, or dedicated SRM platforms as the system of record for supplier master data, commercial terms, and official performance ratings. These systems usually own supplier approval status, audit outcomes, commercial risk evaluations, and controlled scorecard templates. Attempting to shift all of this into MES often creates duplication of master data, conflicting versions of supplier status, and additional validation burden without clear benefit.

    Scorecard dimensions such as on-time delivery, lead-time adherence, pricing, contract compliance, and financial risk are generally driven by ERP and procurement systems, not MES. Audit findings, regulatory history, and broader quality system effectiveness measures often sit in QMS. MES, by comparison, is primarily focused on what happens once material crosses the plant gate and how it behaves in the process. Treating MES as a feeder system to these upstream tools usually better reflects system strengths and real-world integration constraints.

    Integration and traceability considerations

    To make MES data usable in supplier scorecards, you need reliable linkage between shop-floor events and supplier identifiers maintained in higher-level systems. That typically requires clean master data alignment (supplier IDs, material numbers, and lot/batch conventions) and validated interfaces between MES, ERP, and QMS or SRM. If material is repacked, relabeled, or kitted internally without robust traceability, supplier-level metrics derived from MES may be incomplete or misleading.

    In regulated environments, any automated extraction and aggregation of MES data into supplier scorecards must be subject to change control and, where required, validation. Changes in defect coding, routing logic, or lot tracking can silently alter trend lines if not properly controlled. Audit trails and versioned configuration are important so you can explain why a supplier’s performance trend changed and distinguish true improvement from data or logic changes.

    Tradeoffs in extending MES into supplier scorecards

    Using MES as the primary platform for supplier scorecards can centralize shop-floor quality and performance data, but it also expands MES scope into areas that ERP, QMS, or SRM already handle. This can increase complexity of MES upgrades, add validation overhead, and entangle critical production systems with procurement and commercial workflows. In brownfield environments, this often leads to brittle integrations and conflicts between existing scorecard processes and new MES-driven ones.

    On the other hand, not leveraging MES at all for supplier evaluations means supplier reviews may rely on lagging, aggregated data and anecdotal feedback from the plant. A balanced approach is to let MES compute and expose well-defined, production-centric KPIs by supplier (e.g., defect PPM, quality-related downtime, rework rate) while leaving multi-dimensional scorecards, approvals, and final ratings to systems already governing supplier management. The tradeoff is another integration to maintain, but it limits the risk of turning MES into an overloaded, quasi-ERP.

    Why full MES-based replacement of supplier management often fails

    Replacing ERP-, QMS-, or SRM-based supplier management with a MES-centric solution is rarely successful in aerospace-grade and similarly regulated environments. Supplier qualification, audit records, commercial contracts, and regulatory dossiers are tightly linked to existing enterprise systems, and migrating them into MES brings high validation effort, change control workload, and downtime risk for both IT and operations. Many plants cannot accept disruptions to supplier approval and sourcing workflows that underpin revenue-critical programs.

    Long equipment and tool lifecycles make it difficult to re-platform supplier-related logic tied to process qualifications and part approvals. Integration complexity also increases when MES is forced to manage both operations and commercial supplier processes, leading to unclear ownership between operations, procurement, and quality. As a result, organizations typically keep supplier master data and formal scorecards in ERP/QMS/SRM and use MES to enhance, not replace, those views with high-fidelity operational data.

    Practical approach in brownfield environments

    In a brownfield context, the pragmatic path is to define a narrow, validated set of MES-derived metrics that are important for supplier performance reviews, and expose them in a controlled way to ERP, QMS, or SRM. This may be through data warehouse feeds, APIs, or reports consumed during periodic supplier review meetings. The organization should document how each metric is defined, where it originates, and who owns its configuration to maintain consistency over time.

    Governance should make clear that MES is not the authoritative system for supplier status or commercial decisions, but it is a critical evidence source when quality or delivery issues arise. This separation of responsibilities reduces the risk of conflicting master data and allows MES changes (e.g., routing updates, station additions) to proceed without constantly revalidating supplier management logic. Over time, incremental improvements to coding, traceability, and analytics can increase the value of MES data in supplier scorecards without committing to an all-or-nothing platform shift.

  • Do I need to implement every 800-53 control to be aligned with NIST CSF?

    No. You do not need to implement every NIST SP 800-53 control to be aligned with the NIST Cybersecurity Framework (CSF). The two documents serve different purposes and operate at different levels of detail.

    How NIST CSF and NIST SP 800-53 relate

    NIST CSF is a high-level framework organized around Functions, Categories, and Subcategories. It describes cybersecurity outcomes (“what” you need to achieve), not specific technical configurations. It is commonly used for strategy, communication with leadership, and roadmap planning.

    NIST SP 800-53 is a detailed catalog of security and privacy controls (“how” you might achieve those outcomes). It was written primarily for U.S. federal information systems, but many organizations in regulated manufacturing use it as a control library or reference set.

    NIST provides mappings between CSF Subcategories and 800-53 controls, but these mappings are not a mandate to implement the entire 800-53 catalog.

    What “alignment with NIST CSF” usually means

    In practice, “aligned with NIST CSF” typically means:

    • You have defined your cybersecurity scope (e.g., OT networks, MES, QMS, ERP interfaces, engineering workstations).
    • You have assessed yourself against CSF Functions/Categories/Subcategories and rated current and target profiles.
    • You can show which policies, technical controls, and procedures support each relevant CSF Subcategory.
    • You manage changes and improvements through documented governance and risk management processes.

    Many organizations use 800-53 as one of the control sources mapped into the CSF, alongside other standards (for example IEC 62443 for OT, ISO 27001 for corporate IT, or vendor-specific baselines).

    Using 800-53 selectively under NIST CSF

    For most industrial and regulated environments, the workable approach is:

    1. Define scope and constraints. Identify which systems and data are in scope (for example production networks, historians, MES, QMS, PLM, engineering laptops) and what regulatory regimes apply (for example export controls, customer cybersecurity clauses, federal contracts).
    2. Perform a CSF-based assessment. Rate your current state vs. CSF outcomes, specifically considering OT risk factors like safety impacts, downtime cost, and long equipment lifecycles.
    3. Select a control baseline. Choose a subset of 800-53 controls (and possibly IEC 62443 or other OT-focused standards) that address the risks and obligations in your environment. This is often a “tailored” or “lightweight” baseline versus the full federal catalog.
    4. Map controls to CSF. Document how selected controls support specific CSF Subcategories, and where you are intentionally not implementing certain 800-53 controls because they are inapplicable or disproportionate given OT constraints.
    5. Document risk acceptance and gaps. For controls you choose not to implement, record rationale, compensating controls (if any), and risk acceptance decisions. In regulated manufacturing, this traceability is often more scrutinized than the choice of standard itself.

    Why you typically do not implement all 800-53 controls

    Implementing the full 800-53 catalog is usually impractical for brownfield industrial plants, especially where OT assets have long lifecycles and limited upgrade paths. Common constraints include:

    • Legacy OT and vendor limits. Many PLCs, DCSs, and legacy HMIs cannot support modern security agents, strong authentication, or frequent patching. Some 800-53 controls will be technically infeasible without major retrofits or system replacement.
    • Qualification and validation burden. In regulated manufacturing, each change to validated systems (for example MES, QMS, SCADA tied to batch records) may require re-validation, documentation updates, and downtime. Implementing every potential control is not risk- or cost-effective.
    • Downtime and safety risk. For production-critical OT systems, aggressive hardening or re-architecture can create more operational risk than it removes if not carefully staged and tested.
    • Integration complexity. Plants often have mixed vendors and partially integrated stacks. Some 800-53 controls assume homogeneous identity, logging, and network segmentation that take years to build in practice.

    Because of these factors, organizations usually prioritize controls that best reduce real risk while preserving safety, product quality, and availability. Alignment with CSF focuses on achieving the intended outcomes and being able to demonstrate rational, risk-based decisions rather than exhaustive implementation of every catalog control.

    What auditors and customers usually expect

    In many aerospace, defense, and life sciences environments, auditors and customers generally look for:

    • A consistent framework, such as NIST CSF, for organizing your cybersecurity program.
    • Evidence that you used a recognized control set (like 800-53 and/or IEC 62443) to inform specific measures.
    • Clear mappings between CSF outcomes, implemented controls, and plant-level procedures.
    • Change control, testing, and validation for cybersecurity changes affecting regulated systems.
    • Documented risk acceptance where you do not implement some catalog controls due to technical, safety, or operational constraints.

    They generally do not expect a one-to-one implementation of all 800-53 controls unless a specific contract or regulation explicitly requires it.

    Key takeaways for industrial environments

    • NIST CSF alignment does not require full implementation of all NIST SP 800-53 controls.
    • You should use 800-53 (and OT-appropriate standards) as a control library, then tailor based on risk, plant realities, and regulatory drivers.
    • For long-lifecycle and validated systems, rigorous documentation, mapping, and change control are often more feasible than full catalog coverage.
    • Make sure your decisions, gaps, and compensating controls are traceable, especially where safety, quality, or export-controlled data are involved.
  • Which MES KPIs best indicate inventory accuracy in aerospace?

    Core KPIs for measuring inventory accuracy in MES

    In aerospace environments, no single MES KPI reliably captures inventory accuracy; you need a small, consistent set. A common starting point is **inventory record accuracy (IRA)** by location and material, measured as the percentage of items where on-hand quantity in MES (or ERP/MRP as the system of record) matches the verified physical or cycle-counted quantity within a defined tolerance. This KPI is more meaningful when reported by storage type (raw, WIP, line-side, tool crib) and by ABC class, because errors cluster in specific areas. The limiting factor is data quality and counting discipline; poor cycle count processes will hide issues regardless of MES dashboards.

    A second core KPI is **location accuracy**, the percentage of lots or serialized units that MES shows in the correct storage or WIP location when physically verified. This is particularly relevant for kitted components, high-value parts, and critical serialized hardware subject to regulatory traceability. Location accuracy often surfaces weaknesses in move transactions, scanning discipline, and workarounds when systems are slow or unavailable. Because aerospace routes are long and complex, even minor location drift can create major search time, rework, and investigation overhead. This KPI only works if MES is the authoritative WIP location system and operators are required to transact every move.

    KPIs tied to traceability and serial/lot integrity

    In aerospace, inventory accuracy is inseparable from traceability, so lot and serial integrity KPIs are essential. One key measure is **traceability completeness**, such as the percentage of produced units that have a complete and consistent genealogy in MES (all required component lots/serials issued, no missing links, no orphan lots). Gaps here signal that materials have been physically consumed but not fully recorded, a common driver of inventory discrepancies. Another useful KPI is **duplicate or conflicting serials**, tracking the number of instances where the same serial appears in multiple locations or in multiple WIP states, which indicates serious master data or transaction errors.

    You can also monitor **traceability exception rate**, counting how often manual overrides, backdated issues, or forced closures are used to reconcile material records in MES. High rates usually reflect process workarounds, inadequate scanning, or poorly designed transactions that encourage skipping steps. In regulated aerospace environments, these exceptions often trigger investigations or nonconformances, so they provide a strong proxy for underlying inventory inaccuracy. The tradeoff is that some exceptions are legitimate, so process definitions must distinguish acceptable corrections from problematic behavior.

    Transaction-related KPIs that reveal hidden inventory issues

    MES can surface inventory accuracy problems through **issue, backflush, and return-to-stock error rates**. Measuring the percentage of material transactions that fail validation, require rework, or are manually adjusted after posting highlights instability in how materials are consumed and recorded. Frequent rejections or overrides for material issues often point to wrong units of measure, outdated BOMs, or incorrect substitution practices, all of which create misalignment between physical and system inventory. The same applies to backflush mismatches, where standard consumption does not match actual use.

    Another helpful KPI is **late or missing material transaction rate**, tracking how often production steps are completed in MES while related material issues are backdated or posted days later. This time lag creates windows where system inventory is inaccurate even if it eventually reconciles. In aerospace, investigations and audits frequently rely on time-accurate records, so these gaps are more than bookkeeping noise. The effectiveness of these KPIs depends on integration between MES and ERP/MRP and on operators not working from parallel manual logs.

    WIP-specific KPIs for complex aerospace flows

    For aerospace, **WIP inventory accuracy** deserves dedicated KPIs because assemblies sit in process for long periods, often across multiple shifts, bays, or sites. One key measure is the percentage of WIP orders where MES WIP quantities and locations match physical reality and routing status, validated via periodic WIP audits. This can be broken down by work center or product family to pinpoint problem areas. Another measure is **WIP age anomalies**, tracking orders or lots whose actual WIP duration far exceeds planned norms, suggesting that items may be scrapped, cannibalized, or misplaced without proper transactions.

    You can also track **reconciliation effort for WIP**, such as the number of WIP records requiring manual cleanup, forced closure, or engineering/quality sign-off per period. High reconciliation overhead usually signals deeper issues in material staging, move transactions, or partial builds. Because large structures, harnesses, and composite assemblies are not easily moved or recounted, WIP accuracy KPIs depend heavily on disciplined transaction capture and good visual controls at the cell. The main tradeoff is cost: more frequent WIP audits improve accuracy but consume scarce engineering and production bandwidth.

    Aligning MES KPIs with ERP, MRP, and QMS data

    In most aerospace plants, the formal system of record for inventory is ERP or MRP, not MES, so inventory accuracy KPIs must be reconciled across systems. A practical high-level metric is **MES–ERP inventory alignment**, the percentage of materials and lots where quantities and key statuses match across systems within tolerance. Large or persistent mismatches usually point to interface delays, failed messages, or manual transactions in one system only. However, this KPI is only as good as your integration monitoring and error-handling processes.

    Quality systems also contribute important signals, such as **inventory-related nonconformance rates** and **MRB cycle times**, which often correlate with poor stock identification, wrong revision at point of use, or mixed-status inventory. Combining these with MES KPIs builds a fuller picture than MES alone. The downside is analytical complexity and the need for robust data warehousing or reporting layers, which many brownfield sites lack. In such environments, it is better to start with a narrow, validated set of joined metrics rather than a broad, fragile dashboard.

    Practical constraints and failure modes in aerospace environments

    In aerospace-grade regulated environments, MES KPIs around inventory accuracy are only reliable if underlying processes are validated and followed consistently. Long equipment lifecycles, mixed vendor stacks, and partial MES rollouts mean that some materials will always sit outside clean MES coverage. For example, tooling, calibration spares, or low-value hardware may be managed in separate systems or spreadsheets, making any global “inventory accuracy” figure misleading. It is important to be explicit about scope whenever you publish these KPIs.

    Full system replacement to “fix” inventory accuracy rarely works due to qualification effort, validation cost, and downtime risk. Instead, most plants evolve their KPIs incrementally while tightening transaction discipline, barcoding/RFID coverage, and integration reliability. Common failure modes include operators bypassing MES because screens are slow or poorly designed, post-hoc data entry at shift end, and conflicting business rules between MES, ERP, and QMS. To keep KPIs meaningful, you will likely need periodic data quality reviews, clear ownership for each metric, and documented change control whenever you adjust logic or definitions.

  • Should suppliers be asked about ISO 27002 as well as ISO 27001?

    In regulated industrial and manufacturing contexts, it is usually not enough to ask suppliers only about ISO 27001. You should also probe how they use ISO 27002 to select and implement specific security controls, particularly where they handle your designs, manufacturing data, or regulated product information.

    How ISO 27001 and ISO 27002 differ for supplier assessments

    • ISO 27001 defines the requirements for an information security management system (ISMS): governance, risk assessment, objectives, and continual improvement. Certification is against ISO 27001.
    • ISO 27002 is a catalogue of controls and implementation guidance. It helps answer: which controls were selected, why, and how they are applied in practice.

    An ISO 27001 certificate alone does not tell you which controls are actually in place, how strong they are, or how well they align to your specific manufacturing, IP protection, or regulatory obligations.

    What to ask suppliers in practice

    Instead of asking only “Are you ISO 27001 certified?”, extend your due diligence to include ISO 27002 by asking for:

    • ISO 27001 status: Certification scope, sites covered, and certificate validity. Confirm if key production or data-processing sites are actually in scope.
    • Statement of Applicability (SoA): A list of controls derived from ISO 27002 (or equivalent) with justification for inclusion or exclusion. This is critical; it shows how they translated ISO 27002 guidance into their control set.
    • Key control coverage: Evidence or description of how specific ISO 27002 controls are implemented for:
      • Access control for design and process data
      • Network segregation between OT and IT where relevant
      • Backup and recovery of production and quality data
      • Change management around manufacturing and quality systems
      • Logging and incident response processes
    • Risk-based tailoring: How they use risk assessment to decide which ISO 27002 controls are strengthened or relaxed for critical manufacturing and regulated data.

    Where depth of questioning should increase

    It is especially important to go beyond a simple ISO 27001 question when suppliers:

    • Host or operate your MES, QMS, PLM, or related cloud services.
    • Have remote access into your OT network, equipment, or plant data.
    • Process export-controlled, safety-critical, or highly sensitive design data.
    • Provide long-life equipment where software and firmware updates will continue for many years.

    In these cases, you should align on specific ISO 27002 control expectations and on how evidence will be provided over time, not just at onboarding.

    Brownfield and coexistence realities

    In mixed environments with legacy MES/ERP/PLM and external suppliers, your questions about ISO 27001 and ISO 27002 should acknowledge that:

    • Some suppliers may have partial ISO 27001 coverage (for example, office IT but not OT or hosted platforms).
    • Controls guided by ISO 27002 may be implemented differently across plants, systems, and vendors, especially where legacy assets or integration constraints exist.
    • Full replacement of non-compliant systems is often impractical due to validation burden, downtime risk, and qualification of new platforms. You may need compensating controls and stronger oversight instead.

    Because of this, questions should focus on how ISO 27002-based controls coexist with legacy systems, how changes are controlled, and how traceability and validation evidence are maintained.

    How to phrase requirements without overcommitting

    In contracts and supplier questionnaires, you can:

    • Reference ISO 27001 certification as a baseline expectation where proportionate to risk.
    • Require a Statement of Applicability aligned to ISO 27002 or an equivalent control framework.
    • Specify which ISO 27002 control areas are most critical for your use case (for example, access control, operations security, supplier relationships, and system acquisition and development).
    • Request periodic updates and evidence when major changes are made to systems processing your data, tying back to change control and validation requirements.

    Bottom line

    You should not stop at asking whether a supplier is ISO 27001 certified. For regulated and long-lifecycle manufacturing environments, you also need to understand how they apply ISO 27002 in practice: which controls are in scope, how those controls coexist with legacy and OT systems, and how they maintain traceability, validation, and change control over time.

  • What is the difference between MES and SAP?

    In most industrial environments, MES and SAP solve different parts of the operations problem and must coexist. SAP is typically the enterprise resource planning (ERP) and sometimes product lifecycle or quality backbone. MES sits closer to the shop floor and controls, guides, and records execution.

    Core purpose and scope

    MES (Manufacturing Execution System) typically focuses on:

    • Work execution on specific lines, cells, and machines (dispatching, sequencing, start/stop, holds).
    • Operator guidance via digital work instructions, data collection, and enforcement of process steps.
    • Real-time data from machines, test stands, and automation (cycle times, states, alarms).
    • Traceability and genealogy at unit, lot, or serial number level (materials, tools, parameters used).
    • Nonconformance capture at the point of occurrence (defects, rework routes, deviations).

    SAP (as ERP and related modules) typically focuses on:

    • Planning (MRP, capacity planning, production orders, demand and supply balancing).
    • Materials and inventory (material master, BOM, inventory valuation, batch/lot management).
    • Commercial and financial flows (sales orders, purchasing, costing, GL, controlling).
    • High-level production status (order released, in process, technically complete, delivered).
    • Quality and maintenance at a business-process level where QM/PM are deployed.

    Typical level in the stack

    MES usually operates between the ERP layer and the automation layer:

    • Above PLCs, SCADA, test benches, and machine controllers.
    • Below SAP and other enterprise systems (PLM, QMS, APS).

    SAP usually does not talk directly to machines or operators in real time. MES fills this gap, translating production orders and routings into executable tasks, enforcing process logic, and returning granular results.

    Data granularity and timing

    MES data is typically:

    • Real time or near real time (seconds to minutes).
    • High granularity (per unit/serial, per operation, per tool, per parameter read).
    • Operationally focused (who did what, how, where, with which resources).

    SAP data is typically:

    • Transactional and periodic (planning cycles, confirmations, goods movements).
    • Aggregated (per order, per batch, per cost center, per plant).
    • Financially and logistically focused (cost, availability, lead time, service level).

    This difference matters in regulated environments: MES holds the rich execution history and evidence, while SAP often holds the canonical view of orders, materials, and inventory.

    Regulated environment considerations

    In aerospace, medical, semiconductor, and other regulated sectors, MES is usually the primary system of record for:

    • Detailed traceability (material lots and serials, process parameters, test results).
    • Enforced workflows (required checks, sign-offs, e-signatures where deployed).
    • Device history records or build records, often exported or synchronized to QMS/PLM.

    SAP is usually the system of record for:

    • Material master, BOMs, routings and high-level change control around them.
    • Inventory, costing, and order status that drive external commitments and reporting.
    • Quality notifications and CAPA at the business level if SAP QM is in use.

    The boundary between MES and SAP QM or other SAP modules is often blurred. Where that boundary sits is a design and governance decision, and it varies by plant, maturity, and validation strategy.

    Integration and coexistence in brownfield plants

    In most brownfield environments, replacing SAP with MES or vice versa is not realistic. Instead, the challenge is defining and operating clear interfaces:

    • SAP to MES: planned orders, routings, BOMs, work centers, material masters.
    • MES to SAP: operation confirmations, scrap, consumption, yield, status, sometimes quality results.

    Key constraints and risks include:

    • Integration debt: legacy interfaces, custom IDocs/BAPIs, point-to-point scripts, and fragile data mappings.
    • Validation burden: any change to MES/ERP integration may require revalidation, updated test evidence, and change control.
    • Downtime risk: misaligned cutovers can interrupt material flow, cause inventory errors, or break traceability links.
    • Data ownership ambiguity: unclear “system of record” decisions lead to conflicts between MES and SAP data.

    Well-defined contracts for master data, order lifecycle, and event timing are more important than the labels “MES” or “SAP.” Plants with clear responsibilities and versioned integration specifications tend to avoid repeated rework.

    Can SAP replace MES?

    SAP has modules and add-ons that cover some traditional MES functions (e.g., SAP ME, SAP MII, SAP DM, SAP QM, PP confirmations). However, in high-complexity, high-regulation environments, relying on SAP alone as “the MES” is usually constrained by:

    • Machine connectivity: direct shop-floor integration and near-real-time data handling are typically better-covered by MES vendors or custom middleware.
    • Usability at the station: operator UIs, offline behavior, and station-level workflows often need more flexibility than standard SAP transactions provide out of the box.
    • Local variations: plants often have specific routing logic, repair loops, or data-collection requirements that are harder to standardize globally inside SAP.
    • Qualification and validation cost: making SAP the single system of record for all execution details can increase the scope of every change and upgrade.

    Some organizations do run SAP-centric architectures with only light MES or no MES at all, especially in lower-mix or less regulated operations. In aerospace-grade or device-grade contexts this is less common, because the depth of traceability and process enforcement required is high.

    Why full replacement strategies often fail

    Efforts to “replace MES with SAP” or “rip out SAP once we have MES” frequently stall due to:

    • Qualification burden: changing the system of record for execution or materials often requires large validation efforts, protocol updates, and auditor education.
    • Integration complexity: SAP is typically deeply entangled with finance, supply chain, and reporting. MES is deeply entangled with machines and operators. Untangling either side introduces risk.
    • Downtime and cutover risk: switchover windows are short; data migration errors or interface defects can impact product release and customer deliveries.
    • Traceability and change control: losing historical linkages or misaligning versioned work instructions, BOMs, and routing changes across systems is a real compliance and recall risk.

    For these reasons, mature organizations typically clarify boundaries and interfaces between MES and SAP rather than attempting wholesale replacement, especially in long-lifecycle product environments.

    Practical way to think about the difference

    A practical mental model in regulated manufacturing is:

    • SAP: “What should be built, with which materials, by when, and at what cost?”
    • MES: “How exactly was it built, by whom, on which equipment, under which conditions, with which evidence?”

    The exact split will depend on how your organization configures SAP, which MES capabilities you deploy, and how far you push each system toward the other’s territory. The more overlap you create, the more important it becomes to manage data ownership, validation scope, and change control explicitly.

  • Can I add custom KPIs to ISO 22400 categories?

    Yes. You can add your own KPIs alongside the ISO 22400 categories, but you should not redefine or rename the standard KPIs if you want to retain traceability to ISO 22400.

    What you can safely do

    In most plants, ISO 22400 is used as a reference model, not a complete catalog. Typical patterns that are compatible with the standard are:

    • Add plant-specific KPIs that sit “under” or “next to” a standard category (for example, adding a composite “Rework Impact Index” under quality-related KPIs).
    • Use ISO 22400 KPIs as a core set for benchmarking and reporting to leadership, and keep more detailed or experimental KPIs in a secondary layer.
    • Map custom KPIs to ISO 22400 categories for structure (e.g., linking a custom shift-variance KPI to the availability/performance-related group).

    This approach lets you extend the model without breaking comparability or confusing auditors or customers who understand ISO 22400 terminology.

    What you should avoid

    • Renaming or changing formulas of ISO 22400 KPIs while still calling them “ISO 22400 OEE” or similar. If you modify the calculation, label it explicitly as a variant.
    • Collapsing multiple ISO KPIs into one opaque metric and then claiming compliance. Composite metrics are fine, but they should be traceable back to the underlying standard KPIs.
    • Using ISO labels for legacy KPIs that only roughly match the definitions. Either adjust the KPI or keep the legacy name and treat the ISO KPI as a separate item.

    Governance in regulated and brownfield environments

    In regulated or long-lifecycle operations, adding custom KPIs is less about the math and more about governance, traceability, and coexistence with existing systems:

    • System coexistence: You will likely have KPIs already embedded in MES, ERP, data historians, and homegrown reporting. Replacing these wholesale with a new ISO 22400 set is risky and often fails due to re-validation effort, integration complexity, and operator pushback. A layered approach is usually safer: keep existing KPIs, introduce ISO 22400 KPIs where feasible, then add new custom metrics where they add clear value.
    • Source of truth: Decide where KPI definitions live (MES, data warehouse, KPI catalog). Custom KPIs should reference data elements and logic that are under change control.
    • Validation and change control: Treat KPI additions and changes as controlled configuration, especially if metrics drive release decisions, batch disposition, or regulatory reporting. Document formulas, data sources, and calculation logic and subject them to your standard review and approval process.
    • Traceability: For each KPI, record whether it is ISO 22400-native, an ISO-aligned extension, or a local/custom-only metric. This avoids confusion during audits and internal reviews.
    • Long equipment lifecycles: Many machines and legacy systems will not natively support the full ISO 22400 data set. Custom KPIs sometimes need to adapt to what data is realistically available. Make gaps explicit rather than forcing a nominally “standard” KPI built on weak or proxy data.

    Practical implementation approach

    A pragmatic way to extend ISO 22400 in a brownfield plant:

    1. Anchor on a small ISO 22400 subset (for example OEE, availability ratio, performance ratio, quality ratio) as non-negotiable core KPIs.
    2. Inventory existing KPIs in your current MES/BI reports and map them to ISO 22400 categories where possible.
    3. Identify gaps where ISO 22400 does not capture a critical local concern (e.g., NPT due to engineering holds, certification-related downtime, ITAR-driven handling delays). These gaps are candidates for custom KPIs.
    4. Define custom KPIs with explicit documentation: formula, units, data source, refresh cadence, owner, and mapping to an ISO 22400 group.
    5. Pilot and validate the new KPIs in one line or cell before enforcing them plant-wide. Check that numbers reconcile with legacy reports and that operators and supervisors understand them.
    6. Standardize naming conventions (for example: prefix ISO KPIs with “ISO22400_” and customs with “PLANT_” or similar) in your data models and reports.

    Constraints and tradeoffs

    How far you can go with custom KPIs without losing value from ISO 22400 depends on:

    • Integration quality: If your data model is fragmented across MES, ERP, and spreadsheets, over-proliferating custom KPIs can increase confusion and reconciliation effort.
    • Process maturity: Plants early in performance management often benefit from sticking close to the standard and adding only a few, well-justified custom KPIs.
    • External expectations: If customers or regulators expect reporting aligned with a known standard, keep the ISO 22400 KPIs intact and use custom KPIs mainly for internal decision support.
    • Maintenance cost: Every additional KPI needs maintenance when data sources change, systems are upgraded, or routes are restructured. Over-customization can become a hidden IT and quality burden.

    In summary, you can and often should extend ISO 22400 with custom KPIs to reflect plant-specific realities, but treat ISO 22400 as a stable reference layer. Keep standard KPIs untouched, clearly label and document extensions, and manage them through the same change control and validation discipline you apply to other operationally significant configurations.