Skip to main content

Grading the resouces involved in major incidents

It is recommended that the resources that are involved in handing a major incident are graded as part of a continuous improvement program. This is a means of doing that grading.
The maximum possible score is 32 and the grading is calculated by totaling up the scores from the eight different areas and representing it as a percentage of the maximum. The eight areas are:
  • Identification and business impact – have the resources correctly identified the major incident and described in the correct level of detail what happened. Has the correct service impacted been identified from the service catalogue? Was the business impact obtained or measured?
  • Conditions – what were the business, IT or environmental conditions present during the incident and did the resources describe these to a suitable level of detail.
  • Expanded Incident Lifecycle – are all the times in the expanded incident lifecycle recorded and are they realistic. Were these recorded in the incident reference at the service desk.
  • Resolution/ Workaround – how suitable was the resolution and was a workaround implemented to reduce the time the service was unavailable.
  • Classification – have the resources correctly classified the impact to the company and was the incident handled with the correct level of prioritization.
  • Outage – have the resources recorded and classified the outage times correctly.
  • Risk – has a suitable risk assessment of the service, asset and process been conducted?
  • Escalations/ Communications – did the resources escalate the incident and was communicate during the process suitable.
Each area scores a maximum of 4 points with a minimum of 0.

Read further about the MIP process here.


Popular posts from this blog

easywall - Web interface for easy use of the IPTables firewall on Linux systems written in Python3.

Firewalls are becoming increasingly important in today’s world. Hackers and automated scripts are constantly trying to invade your system and use it for Bitcoin mining, botnets or other things. To prevent these attacks, you can use a firewall on your system. IPTables is the strongest firewall in Linux because it can filter packets in the kernel before they reach the application. Using IPTables is not very easy for Linux beginners. We have created easywall - the simple IPTables web interface . The focus of the software is on easy installation and use. Access this neat software over on github: easywall

No Scrubs: The Architecture That Made Unmetered Mitigation Possible

When building a DDoS mitigation service it’s incredibly tempting to think that the solution is scrubbing centers or scrubbing servers. I, too, thought that was a good idea in the beginning, but experience has shown that there are serious pitfalls to this approach. Read the post of at Cloudflare's blog: N o Scrubs: The Architecture That Made Unmetered Mitigation Possible

Should You Buy A UniFi Dream Machine, USG, USG Pro, or Dream Machine Pro?