Incident Management Mission Diagnostic Method, Version 1.0 - Cert
Incident Management Mission Diagnostic Method, Version 1.0 - Cert
Incident Management Mission Diagnostic Method, Version 1.0 - Cert
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
DECISION MAKING<br />
GROUND RULES<br />
Prior to the performing the IMMD, you need to establish ground rules<br />
for making decisions. For example, you could require unanimous<br />
agreement when making a decision. Alternatively, your decisions<br />
could be based on majority opinion, or you could use a team decisionmaking<br />
technique, such as multi-voting. Establishing decision-making<br />
ground rules ahead of time will facilitate execution of the techniques<br />
embodied in this method.<br />
TAILORING MISSION<br />
DRIVERS<br />
The ten drivers in this method can be tailored to accurately reflect the<br />
specific needs, concerns, or attributes of a given IMC or organization.<br />
Whenever you tailor drivers for a specific application, you need to<br />
make sure that the key drivers of success and failure are represented.<br />
You must make sure that the drivers you select minimally address the<br />
following:<br />
• problems inherent in an IMC<br />
• an inadequate workflow or process design<br />
• inadequate execution of tasks and activities<br />
• issues related to the operational environment<br />
• unexpected or unpredictable events<br />
For example, adherence to specific regulations or standards may be<br />
important enough to become a driver.<br />
ADDITIONAL ANALYSIS<br />
This is a basic evaluation for quickly assessing an IMC’s potential for<br />
success. Because this technique uses drivers to estimate an IMC’s<br />
likely outcome rather than a direct analysis, it provides a “ballpark”<br />
estimate of whether or not an IMC will likely be successful. For some<br />
IMCs with critical issues, a more detailed analysis technique could be<br />
used in addition to this technique. For example, a security audit or<br />
financial review may be used for a deeper investigation of security or<br />
budget issues.<br />
16 | CMU/SEI-2008-TR-007