Vulnerability Assessment and Analysis (VAA) Overview
-
Upload
arms-reliability -
Category
Technology
-
view
504 -
download
3
description
Transcript of Vulnerability Assessment and Analysis (VAA) Overview
![Page 1: Vulnerability Assessment and Analysis (VAA) Overview](https://reader034.fdocuments.net/reader034/viewer/2022042607/5597d7fb1a28abab468b466a/html5/thumbnails/1.jpg)
VULNERABILITY
ASSESSMENT AND
ANALYSIS (VAA)
![Page 2: Vulnerability Assessment and Analysis (VAA) Overview](https://reader034.fdocuments.net/reader034/viewer/2022042607/5597d7fb1a28abab468b466a/html5/thumbnails/2.jpg)
What is VAA?
Decision support methodology to help identify and prioritize vulnerabilities which may cause major losses.
What is VAA?
![Page 3: Vulnerability Assessment and Analysis (VAA) Overview](https://reader034.fdocuments.net/reader034/viewer/2022042607/5597d7fb1a28abab468b466a/html5/thumbnails/3.jpg)
Identifies key
vulnerabilities
to deliver safe
and reliability
operations
What is VAA?
![Page 4: Vulnerability Assessment and Analysis (VAA) Overview](https://reader034.fdocuments.net/reader034/viewer/2022042607/5597d7fb1a28abab468b466a/html5/thumbnails/4.jpg)
Establishes a prioritized defect
list for subsequent functional
review and remediation
What is VAA?
![Page 5: Vulnerability Assessment and Analysis (VAA) Overview](https://reader034.fdocuments.net/reader034/viewer/2022042607/5597d7fb1a28abab468b466a/html5/thumbnails/5.jpg)
How does VAA work?
Based on a
Hazop style
brainstorming
approach
![Page 6: Vulnerability Assessment and Analysis (VAA) Overview](https://reader034.fdocuments.net/reader034/viewer/2022042607/5597d7fb1a28abab468b466a/html5/thumbnails/6.jpg)
How does VAA work?
Involves small
groups of
engineering and
operating staff,
plus individual
interviews
![Page 7: Vulnerability Assessment and Analysis (VAA) Overview](https://reader034.fdocuments.net/reader034/viewer/2022042607/5597d7fb1a28abab468b466a/html5/thumbnails/7.jpg)
How does VAA work?
Produces a
substantial
amount of
information
![Page 8: Vulnerability Assessment and Analysis (VAA) Overview](https://reader034.fdocuments.net/reader034/viewer/2022042607/5597d7fb1a28abab468b466a/html5/thumbnails/8.jpg)
What’s the purpose of VAA?
To analyze, categorize, and
prioritize vulnerabilities
![Page 9: Vulnerability Assessment and Analysis (VAA) Overview](https://reader034.fdocuments.net/reader034/viewer/2022042607/5597d7fb1a28abab468b466a/html5/thumbnails/9.jpg)
It takes a team
VAA uses the
perceptions, and
experience, of those
involved with
maintaining and
operating the facility
to assess and
categorize the
vulnerability of key
assets to the potential
of mal-operation or
malfunction.
![Page 10: Vulnerability Assessment and Analysis (VAA) Overview](https://reader034.fdocuments.net/reader034/viewer/2022042607/5597d7fb1a28abab468b466a/html5/thumbnails/10.jpg)
And then what happens?
More detailed
information is
obtained in
subsequent
studies
FMEARCM
Fault Trees
SIL
RCALevel of
Protection Analysis
![Page 11: Vulnerability Assessment and Analysis (VAA) Overview](https://reader034.fdocuments.net/reader034/viewer/2022042607/5597d7fb1a28abab468b466a/html5/thumbnails/11.jpg)
An over-arching methodology
VAA can be
used on any
process during
any phase
![Page 12: Vulnerability Assessment and Analysis (VAA) Overview](https://reader034.fdocuments.net/reader034/viewer/2022042607/5597d7fb1a28abab468b466a/html5/thumbnails/12.jpg)
An integrated approach
When
vulnerabilities
are discovered
that are not
immediately
manageable
…the action
items flow into
the appropriate
secondary
methodology
![Page 13: Vulnerability Assessment and Analysis (VAA) Overview](https://reader034.fdocuments.net/reader034/viewer/2022042607/5597d7fb1a28abab468b466a/html5/thumbnails/13.jpg)
Hazop, PHA, Maintainability, Spares,
Production Data,Operability,
Design Review,Availability Analysis
Team of senior representatives
e.g. design, project, operating staff
Understanding of the process under study, condition of
equipment & consequences of
failure
VAA is a blend
![Page 14: Vulnerability Assessment and Analysis (VAA) Overview](https://reader034.fdocuments.net/reader034/viewer/2022042607/5597d7fb1a28abab468b466a/html5/thumbnails/14.jpg)
Typical output
![Page 15: Vulnerability Assessment and Analysis (VAA) Overview](https://reader034.fdocuments.net/reader034/viewer/2022042607/5597d7fb1a28abab468b466a/html5/thumbnails/15.jpg)
Methodology
1) Pre-Assessment
2) Facilitated Assessment & Analysis
3) Post Assessment Phase
![Page 16: Vulnerability Assessment and Analysis (VAA) Overview](https://reader034.fdocuments.net/reader034/viewer/2022042607/5597d7fb1a28abab468b466a/html5/thumbnails/16.jpg)
Pre-Assessment
- Identifying the VAA objectives
-Determining measures of success
- Finalizing what elements of the
methodology will be included
-Ensuring access to information
-Developing an assessment schedule
![Page 17: Vulnerability Assessment and Analysis (VAA) Overview](https://reader034.fdocuments.net/reader034/viewer/2022042607/5597d7fb1a28abab468b466a/html5/thumbnails/17.jpg)
Pre-Assessment
Objectives and
measures of
success must be
tailored to the
organization
and its needs
![Page 18: Vulnerability Assessment and Analysis (VAA) Overview](https://reader034.fdocuments.net/reader034/viewer/2022042607/5597d7fb1a28abab468b466a/html5/thumbnails/18.jpg)
Possible objectives could include:
- Identify all critical vulnerabilities
- Identify and rank all key assets based on a
common “vulnerability maturity matrix”
- Develop the business case for making
vulnerability reduction investments
- Enhance awareness / make VAA an
integral part of business strategy
![Page 19: Vulnerability Assessment and Analysis (VAA) Overview](https://reader034.fdocuments.net/reader034/viewer/2022042607/5597d7fb1a28abab468b466a/html5/thumbnails/19.jpg)
Facilitated Assessment and Analysis
VAA starts with the
fullest description of
the system /
process and then
questions every
part of it
![Page 20: Vulnerability Assessment and Analysis (VAA) Overview](https://reader034.fdocuments.net/reader034/viewer/2022042607/5597d7fb1a28abab468b466a/html5/thumbnails/20.jpg)
Post Assessment
- Ranking vulnerabilities by risk category
- Prioritizing assessment recommendations
- Developing an action plan
- Capturing lessons learned and best
practices
- Conducting periodic assessments to report
progress
![Page 21: Vulnerability Assessment and Analysis (VAA) Overview](https://reader034.fdocuments.net/reader034/viewer/2022042607/5597d7fb1a28abab468b466a/html5/thumbnails/21.jpg)
Post Assessment
Risk mitigation
activities that are
low cost or result in
cost savings
should get special
attention
![Page 22: Vulnerability Assessment and Analysis (VAA) Overview](https://reader034.fdocuments.net/reader034/viewer/2022042607/5597d7fb1a28abab468b466a/html5/thumbnails/22.jpg)
Post Assessment
Other vulnerabilities
might require further
assessment using
quantitative methods
in order to identify
appropriate risk
reduction actions
![Page 23: Vulnerability Assessment and Analysis (VAA) Overview](https://reader034.fdocuments.net/reader034/viewer/2022042607/5597d7fb1a28abab468b466a/html5/thumbnails/23.jpg)
Deliverables
The VAA process
delivers a
comprehensive
report documenting
the study, resulting
assessment and
identified actions
![Page 24: Vulnerability Assessment and Analysis (VAA) Overview](https://reader034.fdocuments.net/reader034/viewer/2022042607/5597d7fb1a28abab468b466a/html5/thumbnails/24.jpg)
Deliverables
A typical report may include:
- Visual vulnerabilities map.
- Listing system or area
- Vulnerability by category
- Prioritized action list
- Action by type
![Page 25: Vulnerability Assessment and Analysis (VAA) Overview](https://reader034.fdocuments.net/reader034/viewer/2022042607/5597d7fb1a28abab468b466a/html5/thumbnails/25.jpg)
![Page 26: Vulnerability Assessment and Analysis (VAA) Overview](https://reader034.fdocuments.net/reader034/viewer/2022042607/5597d7fb1a28abab468b466a/html5/thumbnails/26.jpg)
![Page 27: Vulnerability Assessment and Analysis (VAA) Overview](https://reader034.fdocuments.net/reader034/viewer/2022042607/5597d7fb1a28abab468b466a/html5/thumbnails/27.jpg)
![Page 28: Vulnerability Assessment and Analysis (VAA) Overview](https://reader034.fdocuments.net/reader034/viewer/2022042607/5597d7fb1a28abab468b466a/html5/thumbnails/28.jpg)
Summary
VAA is an over-
arching methodology
designed to expose
and discover
vulnerabilities across
a wide segment of
possible impacts
![Page 29: Vulnerability Assessment and Analysis (VAA) Overview](https://reader034.fdocuments.net/reader034/viewer/2022042607/5597d7fb1a28abab468b466a/html5/thumbnails/29.jpg)
Summary
FMEA, Risk Assessment, HAZOP Faultree and
RCM have a purpose at design stage.
Once a facility is operating traditional
analytical methods are not as effective in
identifying vulnerabilities across different
groups and changing situations.
![Page 30: Vulnerability Assessment and Analysis (VAA) Overview](https://reader034.fdocuments.net/reader034/viewer/2022042607/5597d7fb1a28abab468b466a/html5/thumbnails/30.jpg)
Summary
VAA delivers broad focus incorporating
dynamics of a production facility from all
parts of the organization, picking up
informal “work-arounds”, changes to
operating practices, changes in
equipment condition, and tribal
knowledge of people involved in day to
day activities.
![Page 31: Vulnerability Assessment and Analysis (VAA) Overview](https://reader034.fdocuments.net/reader034/viewer/2022042607/5597d7fb1a28abab468b466a/html5/thumbnails/31.jpg)
About ARMS Reliability
Since 1995, ARMS Reliability has been at the forefront
of proactive asset management strategies for a range
of blue chip companies throughout the world
Through a unique blend of consulting, education and
software solutions, we enable our clients to make
better decisions to improve their reliability.
www.armsreliability.com