Skip to main content

Root cause analysis - Fault Tree Analysis

Root Cause Analysis (RCA) - A structured evaluation method that identifies the root causes for an undesired outcome and the actions adequate to prevent recurrence. Root cause analysis should continue until organizational factors have been identified, or until data are exhausted.
Steps
  1. Identify and clearly define the undesired outcome (outage).
  2. Gather data.
  3. Create a timeline.
  4. Place incidents and conditions on an event and fault tree.
  5. Using the fault tree identify all potential causes.
  6. Break down system failures to a basic events or conditions (further describe what happened).
  7. Identify specific failure modes (immediate causes).
  8. Continue asking “WHY” to identify root causes (five times).
  9. Check your logic and your facts. Eliminate items that are not causes or contributing factors.
  10. Generate solutions that address both proximate causes and root causes.
Timeline template
Example

Proximate Cause(s) (Direct Cause)The event(s) that occurred, including any condition(s) that existed immediately before the undesired outcome, directly resulted in its occurrence and, if eliminated or modified, would have prevented the undesired outcome.
Root Cause(s)One of multiple factors (events, conditions or organizational factors) that contributed to or created the proximate cause and subsequent undesired outcome and, if eliminated, or modified would have prevented the undesired outcome. Typically multiple root causes contribute to an undesired outcome.

https://www.linkedin.com/pulse/my-top-10-posts-pulse-ronald-bartels/

Comments

Popular posts from this blog

LDWin: Link Discovery for Windows

LDWin supports the following methods of link discovery: CDP - Cisco Discovery Protocol LLDP - Link Layer Discovery Protocol Download LDWin from here.

easywall - Web interface for easy use of the IPTables firewall on Linux systems written in Python3.

Firewalls are becoming increasingly important in today’s world. Hackers and automated scripts are constantly trying to invade your system and use it for Bitcoin mining, botnets or other things. To prevent these attacks, you can use a firewall on your system. IPTables is the strongest firewall in Linux because it can filter packets in the kernel before they reach the application. Using IPTables is not very easy for Linux beginners. We have created easywall - the simple IPTables web interface . The focus of the software is on easy installation and use. Access this neat software over on github: easywall

Using OpenSSL with Ed Harmoush 1/6 Generating Public & Private Keys