Browse Prior Art Database

Permit to operate vulnerability management kit

IP.com Disclosure Number: IPCOM000250290D
Publication Date: 2017-Jun-22

Publishing Venue

The IP.com Prior Art Database

Related People

Krishna Kumar Kezhakkevetil: INVENTOR [+3]

Abstract

Permit to Operate package/kit consists of PTO application that host the PTO framework, permit to operate controls, composite program index measurement and reporting. This is a 360 degree vulnerability management kit on the program lifecycle. The objective of the Application is to host the PTO model through which business units can ensure complex Transformations & Transitions land first time right. The Permit to operate Framework covering all project rhythms – Service transition, Standalone transformation, Large Transition and Transformation (ITO).

This text was extracted from a PDF file.
This is the abbreviated version, containing approximately 16% of the total text.

1

Permit to operate vulnerability management kit

Krishna Kumar Kezhakkevetil, Siva Kameswara Sridhar Kesiraju, SM Lalitha

Abstract

Permit to Operate package/kit consists of PTO application that host the PTO framework, permit to operate controls, composite program index measurement and reporting. This is a 360 degree vulnerability management kit on the program lifecycle. The objective of the

Application is to host the PTO model through which business units can ensure complex Transformations & Transitions land first time right. The Permit to operate Framework covering all project rhythms – Service transition, Standalone transformation, Large Transition and Transformation (ITO).

Introduction:

Need for the present method evolved due to the following aspects.

a. No standard methodologies and approaches to plan and schedule the major phases of the project lifecycle covering all 3 project rhythms.

b. No common measurement and reporting across various rhythms of projects c. Lack of segregation of duties between Executor and Assessor d. Absence of controls related to operations engineering practices, industry standard

quality assurance and Day 1 readiness.

e. Excel based review of the project lifecycle which is error prone and takes more time f. No standard tool for execution and review of the project status and publishing the

metrics instantly

Background:

Permit to Operate vulnerability management kit consists of PTO application that host the PTO framework,permit to operate controls, composite program index measurement and reporting.The permit to operate has been designed by understanding the forces driving infrastructure services requirements and placing the toll gates appropriately based on fact

and/or logic. The toll gates cover the entire lifecycle of the project including the pursuit phase covering all project rhythms and it is detailed to the minute to cover all controls. Permit to operate helps in cutting through the discord associated with subjectivity and supports in problem solving and informed decision making in projects.

The permit to operate model is implemented via PTO assessment application. The application brings the following salient features:

Execution based Features

2

 Persona based execution model – executor elements aligned to role and technology/program selection

 Go No Go decision based on composite program index

 Notification rules defined for Phase Exit, Milestone slippage , Toll gate failure, Risk profile threshold and quality assurance slippage

Project Administration Features

 Project/user creation and allocation

 Activity Defer, Override and Hold functionality

 Notification and Approvals

Governance and Reporting based Features

 Real time progress, quality and risk reporting dashboard

 Risk invocation basis criticality and completion from both Execution and Review process

1. Permit to Operate Application:

 Friendly user interface and easy navigation

 Enables easy and rapid project profiling and specific variation...