Skip to main content

A good example of a major incident report

This report, BP GRANGEMOUTH, SCOTLAND, 29th MAY - 10th JUNE, is non-IT, but it it a great example of a incident report and a format that can readily be adopted. It also contains excellent visualizations using diagrams and pictures. This type of report should be constructed by BA for T5.

The report contains a description of the following:
  • The three incidents that occurred at the BP Grangemouth Complex between 29th May 2000 and 10th June 2000;
  • The immediate response of BP following the incidents (this includes the investigation carried out by the BP Task Force);
  • The series of investigations carried out by the Competent Authority in the aftermath of the incidents;
  • The subsequent findings of the Competent Authority investigations.
The report also summarises the following:
  • BP.s learnings from these incidents and the actions taken by BP;
  • The key lessons for major accident hazard sites;
  • Wider messages for industry.


Comments

Popular posts from this blog

easywall - Web interface for easy use of the IPTables firewall on Linux systems written in Python3.

Firewalls are becoming increasingly important in today’s world. Hackers and automated scripts are constantly trying to invade your system and use it for Bitcoin mining, botnets or other things. To prevent these attacks, you can use a firewall on your system. IPTables is the strongest firewall in Linux because it can filter packets in the kernel before they reach the application. Using IPTables is not very easy for Linux beginners. We have created easywall - the simple IPTables web interface . The focus of the software is on easy installation and use. Access this neat software over on github: easywall

No Scrubs: The Architecture That Made Unmetered Mitigation Possible

When building a DDoS mitigation service it’s incredibly tempting to think that the solution is scrubbing centers or scrubbing servers. I, too, thought that was a good idea in the beginning, but experience has shown that there are serious pitfalls to this approach. Read the post of at Cloudflare's blog: N o Scrubs: The Architecture That Made Unmetered Mitigation Possible

Should You Buy A UniFi Dream Machine, USG, USG Pro, or Dream Machine Pro?