550 likes | 649 Views
This guide explores best practices and traps in risk management, with a focus on software development. It includes strategies, tools, and techniques for identifying, assessing, and mitigating risks in projects. Learn about tailoring risk management training for different team levels and addressing specific software risks. Gain insights on software risk taxonomy, handling strategies, and metrics. Understand the differences between commercial and government perspectives on risk management and how to tailor practices to program needs.
E N D
Traps, Alarms & Escapes • From Navy Best Practices • Traps - think have risks covered by following procedures • Alarms – assumptions that cause trouble • Consequences – if nothing is done
Why RM Training is Needed • Weak backgrounds in risk management • Mistaken concepts • Assessment is RM – skip planning & monitoring • Mitigation is only handling strategy • All risk can be eliminated • Focus on performance, omit cost & schedule
Tailoring RM Training • Adjust to different project team groups • Sr. management • Working level engineers • Address issues each group is likely to face • Address tailoring RM activities to meet program needs – not one-size fits all
SW Risk as a Special Case • Virtual • Can’t physically touch/feel to assess • History of latent defects • Many interfaces • Hardware-to-software • Operating system-to-operating code • Incompatible combinations • Update frequency • Multiple versions • Upward/downward compatibility
Identification Strategies • Review Schedule & Networks • Review Cost Estimation Parameters • Perform Interviews • Revisit Lessons Learned • Develop a Risk taxonomy • Brainstorm and play “what if” • Re-sort the watch list (e.g., by source)
Identification- Schedule Risks • Use the planning or baseline schedule • Evaluate the activity network view • Look for nodes with: • High fan-in (many activities terminate at a single node) • High fan-out (many activities emanate from a single node) • No predecessors
ID- Cost Risk Drivers • Consider specific areas of concern that can lead to problems: • Personnel experience, availability • Requirement complexity, firmness • Scheduling and prediction of task and partition times • Hardware requirements, interfaces, constraints
SW Risk Handling • Avoidance - de-scoping objectives • Assumption – latent defects • Control – user acceptance testing • Transfer – from software to firmware or hardware
Commercial vs. Gov’t Perspective • Different market conditions • Different best practices • Different likelihoods for similar issues As always, tailor RM to program needs
Market Differences • How is risk impacted?
SW Development Best Practices • How is risk impacted?
Overview of Risk Management Tools
Cautions in Tool Selection • A good tool for one organization may not be a good match for another • Tailor RM to the program needs • The tool should never dictate the process • Define process, then choose compatible tool • Be compatible with program culture
Effective Use of a Tool • RM is more than using a RM tool • Tool must efficiently & effectively integrate into program • Resources required • Level of detail, complexity • Focus of tool – e.g., program phase
RM Data Base Considerations • Provide sufficient configuration control • Accessible to all team members • Ability to accept anonymous comments • Support program needs • Reporting • Monitoring • Captures lessons learned • Fulfills contractual requirements • Balance costs/value
Tools Comparison • @Risk & Crystal Ball – licensed software • Monte Carlo simulation add-in for Excel • Select desired distribution function & define parameters • Provide data and generate a plausible distribution function • Provides statistics and graphical output • User provides risk analysis structure
Probability-Consequence Screening • Developed by the Air Force • Risk events assigned a probability & consequence for performance, schedule & cost • Position in consequence screening matrix determines risk score • User assigns Hi, Med, Low ranges • Generates reports and graphical output • www.pmcop.dau.mil
Risk Matrix • Excel – based model • Collects inputs in watch list format • Uses best practices (ordinal) breakout for probability & consequence • Orders events by Borda rank & assigns risk level • Generates action plan reports and graphical output • www.mitre.org
Risk Radar • Access – based, licensed software • Can establish standard values for risk categorization • Manual or automatic risk prioritization • Complies with ISO, SEI CMMI & Government standards • Generates detailed, summary & metrics reports • Demo available: www.iceincusa.com/products_tools.htm
TRIMS Technical Risk ID & Mitigation • Knowledge-based system • Utilizes SEI & Navy Best Practices to collect data on past experiences • Measures technical risk rather than cost & schedule • Most applicable to design efforts • Can tailor categories, templates & questions • Generates status, next action & overdue action reports • www.bmpcoe.org