Discussion: CMMS risk management method (RSKM)

Source: Internet
Author: User
Document directory
  • Risk management methods
Risk management method 1. establish risk management processes and policies

1. Establish a policy: the risk management policy is described in our organizational process policy.

2. creation process: the project process definition is obtained based on the organization process flow, cropping guide, and project feature cropping, which includes the risk management process.

2. Planning the risk management process

3. Planning risk management process: the risk management process is planned in the Project master plan and progress plan.

4. Resource Acquisition: The project master plan describes the personnel and software and hardware resources required to carry out risk management activities. The company provides system support.

5. clear responsibilities: the Organization's team building Guide clarifies the roles and responsibilities of the personnel in the project; the Project Master Plan and quality assurance plan describe the roles, responsibilities, and tasks of the project participants.

6. Training: we attended the organizational process training, including the risk management process training.

Iii. implement risk management

7. Determining the risk source and category: the Organization's risk management procedures define the source and category of risk management. This project complies with the definition of the company's source and category. (Three categories: product engineering, development environment, and project constraints)

8. define risk parameters: the Organization's risk management procedures define risk parameters, including the possibility, impact, risk value, priority, and risk lifecycle.

9. establish Risk Management Policies: Based on the project monitoring and risk management procedures, we have developed risk management policies; and: identifies and handles risks every week, every milestone, and when a risk event is triggered, for high-risk events, we need to re-develop countermeasures. Strategies are embodied in the main plan.

10. Risk Identification: The project is identified and handled at the project initiation, weekly, and milestone points. The risk identification references the risk Library at the organization level, and the project risk identification checklist is compiled. The Risk Management table is regularly maintained. The maximum risk value in the risk management table is the maximum risk.

11. Evaluate, sort, and classify risks: on the risk management point, the project team assigns a new value to the risk parameters and sorts risks by their priority.

12. Develop a risk avoidance plan: We have drawn up a plan to adopt countermeasures only for high risks.

13. Risk Monitoring: supervises and manages risks on a weekly basis, at each milestone, and at any time of event based on the risk management plan and risk management form.

Iv. Monitoring Risk Management

14. Add the risk identification checklist and risk management table to the Configuration Management Library Based on the configuration management plan.

15. ensure stakeholders participate in risk management: Based on the Project Master Plan and risk management plan, we will check stakeholder participation.

16. Monitoring Plan Completion: Based on the Project master plan and progress plan, we will check the completion status at that time.

17. Audit Process: Project QA audits the risk management process and products in progress of the project according to the quality assurance plan.

V. Reporting

18. Report: The project manager reports the project to the middle-level personnel through weekly reports and milestone reports. If major problems occur, they should work with the middle-level personnel to resolve them.

19. Collection of lessons learned: each milestone of the project has some lessons learned. EPG collects improvement suggestions for lessons learned in the project team and records them in the process improvement suggestions table.

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.