DoD Risk MGT Guide v7 Interim Dec2014
DoD Risk MGT Guide v7 Interim Dec2014
DoD Risk MGT Guide v7 Interim Dec2014
Department of Defense Risk Management Guide for Defense Acquisition Programs, 7th Edition
(Interim Release)
Citation:
Department of Defense Risk Management Guide for Defense Acquisition Programs, 7th ed. 2014.
(Interim Release). Washington, D.C.: Office of the Deputy Assistant Secretary of Defense for Systems
Engineering.
Deputy Assistant Secretary of Defense
Systems Engineering
3030 Defense Pentagon
3C167
Washington, DC 20301-3030
Email: [email protected]
Website: www.acq.osd.mil/se
Distribution Statement A: Approved for public release.
Contents
PREFACE ........................................................................................................................................................ 1
1
INTRODUCTION...................................................................................................................................... 3
1.1
Purpose ......................................................................................................................................... 3
1.2
Scope ............................................................................................................................................ 4
1.3
2.3
2.4
2.5
Executive Level.................................................................................................................... 13
Management Level ............................................................................................................... 13
Working Level ..................................................................................................................... 15
Government and Contractor Relationship ............................................................................ 16
Contents
6
APPENDIX A. RISK MANAGEMENT CONSIDERATIONS DURING ACQUISITION LIFE CYCLE PHASES ........ 61
1.
Pre-Materiel Development Decision .......................................................................................... 62
2.
3.
4.
5.
6.
7.
3.
4.
5.
6.
7.
APPENDIX C. SAMPLE TEMPLATES: REPORTING MATRICES FOR RISKS, ISSUES AND OPPORTUNITIES ... 84
1.
Sample Risk Register ................................................................................................................. 84
2.
3.
4.
5.
APPENDIX D: BETTER BUYING POWER INITIATIVES AND THE RISK MANAGEMENT GUIDE .................... 89
ACRONYMS ................................................................................................................................................. 90
REFERENCES ............................................................................................................................................... 92
DoD Risk Management Guide for Defense Acquisition Programs, 7th Edition (Interim Release)
iv
Contents
FIGURES
Figure 1-1. Overview ................................................................................................................................... 3
Figure 1-2. Risk Management Process ........................................................................................................ 5
Figure 2-1. Risk, Issue, and Opportunity Relationship ................................................................................ 6
Figure 2-2. Sample Risk ManagementRelated Battle Rhythm ................................................................ 11
Figure 2-3. Roles and Responsibilities Tiering.......................................................................................... 12
Figure 3-1. Risk Management Process ...................................................................................................... 19
Figure 3-2. Risk Identification ................................................................................................................... 22
Figure 3-3. Risk Taxonomy ....................................................................................................................... 23
Figure 3-4. Risk Analysis .......................................................................................................................... 25
Figure 3-5. Risk Reporting Matrix............................................................................................................. 30
Figure 3-6. Prioritized Risk Matrix ............................................................................................................ 31
Figure 3-7. Alternative Risk Reporting Matrix.......................................................................................... 32
Figure 3-8. Risk Register ........................................................................................................................... 33
Figure 3-9. Risk Mitigation........................................................................................................................ 33
Figure 3-10. Sample Program Tier 1 Risk Reporting Matrix .................................................................... 34
Figure 3-11. Risk Burn-Down ................................................................................................................... 37
Figure 3-12. Risk Monitoring .................................................................................................................... 39
Figure 3-13. Risk Monitoring Matrix ........................................................................................................ 40
Figure 4-1. Example of WBS Levels ......................................................................................................... 41
Figure 4-2. Government and Contractor WBS Relationship ..................................................................... 42
Figure 4-3. IMP/IMS Creation and Implementation .................................................................................. 42
Figure 4-4. Sample Schedule Health Characteristics Assessment ............................................................. 44
Figure 4-5. Schedule Risk Assessments .................................................................................................... 46
Figure 5-1. Issue Management Process...................................................................................................... 48
Figure 5-2. Issue Reporting Matrix ............................................................................................................ 49
Figure 5-3. Issue Tracking Matrix ............................................................................................................. 50
Figure 6-1. Opportunities Help Deliver Should Cost Objectives .............................................................. 51
Figure 6-2. Opportunity Management Process .......................................................................................... 52
Figure 6-3. Opportunity Reporting Matrix ................................................................................................ 53
Figure 6-4. Sample Opportunity Tracking Matrix ..................................................................................... 54
DoD Risk Management Guide for Defense Acquisition Programs, 7th Edition (Interim Release)
v
Contents
Figure 7-1. Notional Synchronization from the SEP Outline .................................................................... 57
Figure 7-2. Tracking Interdependency Risks ............................................................................................. 59
Figure A-1. Acquisition Life Cycle ........................................................................................................... 61
Figure A-2. Materiel Solution Analysis Phase Risk Touch Points ............................................................ 64
Figure A-3. Technology Maturation and Risk Reduction Phase Touch Points ......................................... 66
Figure A-4. Engineering and Manufacturing Development Phase Risk Touch Points .............................. 69
Figure A-5. Production and Deployment Phase Risk Touch Points .......................................................... 71
TABLES
Table 3-1. Levels of Likelihood Criteria ................................................................................................... 25
Table 3-2. Levels and Types of Consequence Criteria .............................................................................. 27
Table 7-1. Notional Table of Required MOAs from the Acquisition Strategy Outline ............................. 57
DoD Risk Management Guide for Defense Acquisition Programs, 7th Edition (Interim Release)
vi
Preface
In his September 24, 2013, white paper, Better Buying Power 3.0, the Department of Defense
(DoD) Under Secretary of Defense for Acquisition, Technology, and Logistics (USD(AT&L))
emphasized his priority to improve leaders ability to understand and mitigate technical risk. He
stated, Most of product development revolves around understanding and managing risk. Risk
management is an endeavor that begins with requirements formulation and assessment, includes the
planning and conducting a risk reduction phase if needed, and strongly influences the structure of the
development and test program. All this is necessary to minimize the likelihood of program disruption
and to maximize the probability of fielding the desired product within reasonable time and cost.
Effective risk management is proactive; it goes well beyond merely identifying and tracking risk.
This revised edition of the Department of Defense Risk Management Guide for Defense Acquisition
Programs reflects revisions to emphasize risk management as a proactive tool to assist programs to
better understand and mitigate risk throughout the acquisition lifecycle.
This guide is one of several policy and guidance documents the Department is updating to address
the USD(AT&L) Better Buying Power initiatives. The documents contain a common thread in
emphasizing risk. Although a Risk Management Plan (RMP) is not mandatory, Program Managers
(PM) are responsible for managing risk in accordance with the mandatory requirements contained in
the DoD Instruction (DoDI) 5000.02, Operation of the Defense Acquisition System, and are
required to outline their risk management strategy in accordance with the Systems Engineering Plan
(SEP) Outline (2011). DoDI 5000.02 requires PMs to identify top program risks and associated risk
mitigation plans in the program acquisition strategy and to present that status at all relevant decision
points and milestones. Acquisition professionals may debate the best approach for managing risk,
but they agree that effective qualitative and quantitative risk, issue, and opportunity management are
critical to a programs success.
This guide asserts that risk management should be forward-looking, structured, continuous, and
informative. The risk, issue, and opportunity management approach presented should be tailored to
the scope and complexity of each programs individual needs.
This guide is organized as follows:
Chapter 1: Introduces the scope and changes in this revised edition of the DoD risk management
guide.
Chapter 2: Discusses how to document the programs risk management approach in the SEP, the
Systems Engineering Management Plan (SEMP), the Acquisition Strategy, and the Risk Management
Plan (RMP). Specifically, it discusses the organization and techniques for establishing an effective
and systemic risk management approach before implementing a risk management process. Risk
planning is the process to develop and document the approach that lays out the methods and
responsibilities for executing risk management to include selecting the appropriate risk management
tools.
DoD Risk Management Guide for Defense Acquisition Programs, 7th Edition (Interim Release)
1
Preface
Chapter 3: Provides step-by-step guidance for developing a risk management process. It discusses
the four steps in the risk management process: identification, analysis, mitigation, and monitoring of
risks.
Chapter 4: Discusses proactive risk management through integrating with other program
management tools such as the Work Breakdown Structure (WBS), Integrated Master Schedule
(IMS), Integrated Master Plan (IMP); and techniques such as Schedule Risk Assessments (SRA) and
Cost Risk Assessment Techniques.
Chapter 5: Seeks to define the issue management process as a distinct and important management
process. An issue is an event or situation with negative consequences that has already occurred.
Because issues have negative impacts on the program, they are often inappropriately managed as
risks.
Chapter 6: Discusses the application of opportunity management including the similarities and
differences to risk management. The opportunity management process is examined for
undertaking potential enhancements to a program so the PM and functional leads can identify and
implement initiatives to yield improvements in the programs cost, schedule, and/or performance
baseline. Opportunity management enables achieving should versus will costs discussed in
Better Buying Power 2.0 (USD(AT&L) 2012).
Chapter 7: Highlights considerations to manage risks related to internal and external interfaces with
interdependent programs. It discusses the different priorities of interdependent programs and
techniques to manage and control cross-program risks.
Most sections contain a text box with expectations that warrant foot-stomping, or emphasizing, to
improve the planning and execution of risk management processes and techniques.
DoD Risk Management Guide for Defense Acquisition Programs, 7th Edition (Interim Release)
2
1 INTRODUCTION
1.1 Purpose
This guide seeks to inform Department of Defense (DoD) stakeholders regarding the effective use of
the DoD risk management process to pinpoint and avoid potential program risk. It promotes the DoD
process to identify, analyze, mitigate, and monitor risks, issues, and opportunities. Proactively
addressing not only risks but also issues and opportunities can help programs achieve cost, schedule,
and performance objectives at every stage of the life cycle.
For the purposes of understanding this guide, the terms risk, issue, and opportunity are defined as:
Risk: Risks are future uncertainties relating to achieving program technical performance goals
within defined cost and schedule constraints. Defined by (1) the probability of an undesired
event or condition and (2) the consequences, impact, or severity of the undesired event, were it to
occur
Issue: Issues are current problems (realized risks) that should be addressed with action plans,
resourced and resolved
Opportunity: Opportunities are events that may or may not occur that have the potential for
improving the program in terms of cost, schedule, and performance. PMs should use opportunity
management to identify, analyze, plan, implement, and track initiatives that can yield
improvements in the program's cost, schedule, and/or performance baseline by reallocating
program resources. Defined by (1) a likelihood of the future event occurring and (2) a benefit
associated with the future event.
Figure 1-1 displays the technical, programmatic, and business events that can lead to opportunities,
risks, or issues that have cost, schedule, or performance consequences.
The DoD risk management process is fundamental to acquisition program success. The PM is
responsible for implementing effective risk management in accordance with DoDI 5000.02,
Enclosures 2 and 3. This guide will assist DoD and contractor PMs, Chief or Lead Systems
DoD Risk Management Guide for Defense Acquisition Programs, 7th Edition (Interim Release)
3
1 Introduction
Engineers, program offices, Integrated Product Teams (IPT), working groups, and others involved in
implementing risk management starting with a programs inception and continuing through disposal.
PMs are encouraged to apply the fundamentals presented here to improve the management of their
program.
This guide should be used in conjunction with related directives, public law (Title 10 and the
Weapon Systems Acquisition Reform Act of 2009), DoDI 5000.02 (Operation of the Defense
Acquisition System), Defense Acquisition Guidebook (DAG) Chapter 4 (Systems Engineering),
Military Department guidance, instructions, policy memoranda, and regulations issued to implement
risk management in DoD acquisition programs.
1.2 Scope
This guide provides a basic understanding of risk management concepts as well as methods of
implementation, so programs can select the appropriate mitigation for their situation. The practice of
risk management draws from many management disciplines, including but not limited to program
management, systems engineering, earned value management, production planning, quality
assurance, logistics, and requirements definition. The risk management approach and process should
be tailored to fit the regulatory, statutory, and program requirements depending on where a program
is in the life cycle.
DoD clearly distinguishes mandatory policy from recommended guidance. This document serves
solely as guidance for risk management approaches for DoD acquisition programs. The management
concepts presented encourage the use of risk-based management practices along with a detailed
process for risk, issue, and opportunity management. This guide does not attempt to address the
requirements to prevent and manage environment, safety, and occupational health (ESOH) hazards.
The reader should refer to MIL-STD-882E, Standard Practice for System Safety, for guidance
regarding ESOH hazards.
This revision emphasizes areas that have emerged during Office of the Secretary of Defense (OSD)
program reviews as potential areas for improvement across the range of DoD programs:
Issue management
Opportunity management
Risks and proactive control activities throughout the acquisition life cycle phase
DoD Risk Management Guide for Defense Acquisition Programs, 7th Edition (Interim Release)
4
1 Introduction
be programmatic or technical, and either internal or external to the program. Although a future event
may include positive opportunities, risk is considered to be the potential for a negative future event.
Risk management should be fully integrated with the systems engineering and program management
process and should be applied beginning with the Analysis of Alternatives (AoA). Properly
implemented and resourced, risk management enhances program management effectiveness and
equips PMs with the tools needed to reduce life cycle costs (LCC) and increase the programs
likelihood of success. Without effective risk management planning and implementation, the program
office could find itself conducting high-stakes crisis management.
Through the risk management process, a program assesses the likelihood or probability of a future
event and evaluates the consequences or severity of the event should it occur. The program identifies
the origin of the risks in order to mitigate them before they become issues. Successful risk
management requires early planning, resourcing, and aggressive implementation. Through risk
management, program teams identify risk events that could prevent the program from achieving
objectives. The program is able to make decisions with a full awareness of the likelihood and
consequence of the risks involved.
The DoDI 5000.02 and Better Buying Power 2.0 both emphasize risk management. The objective is
to provide a repeatable process throughout all acquisition phases. It is essential that programs define,
implement, and document an appropriate risk management approach that is organized,
comprehensive, and iterative by addressing the following questions:
1. Risk Identification: What can go wrong?
2. Risk Analysis: What is the likelihood and consequence of the risk?
3. Risk Mitigation: Should the risk be accepted, avoided, transferred, or controlled?
4. Risk Monitoring: How has the risk changed?
Figure 1-2 illustrates the risk management process.
Risk Identification
What can go wrong?
Risk Monitoring
How has the risk
changed?
Communication
and Feedback
Risk Analysis
What is the likelihood
and consequence of the
risk?
Risk Mitigation
Should the risk be
accepted, avoided,
transferred or controlled?
DoD Risk Management Guide for Defense Acquisition Programs, 7th Edition (Interim Release)
5
Technical
Technology
Engineering
Integration
Manufacturing
Etc.
Risk
Management
Programmatic
Schedule
Staffing
Communication
Contract structure
Estimates
Etc.
What has
gone
wrong?
Business
Laws
Dependencies
Resources
Customer
Etc.
Issue
Management
Opportunity
Management
How the risk management processes are integrated with the contractor(s) processes
How the program plans for, implements (including funding), and tracks risk control
Key roles and responsibilities from working groups, through the IPT structure up to the
executive level
Risk tool(s) that the program office and contractor use to perform risk management
Define the goals, objectives, and the program offices risk management processes
Document an approach to identify, analyze, mitigate, and monitor risks across the program
DoD Risk Management Guide for Defense Acquisition Programs, 7th Edition (Interim Release)
7
Help the program plan for adequate resources, including personnel, schedule, and budget
Although not mandated by DoD policy, the RMP explains how the program manages risks to achieve
future cost, schedule, and performance goals. For example, the RMP should outline how the
program office resources the risk, issue, and opportunity management activities and subsequent risk
mitigation plans to be effective. The program office should establish the basic approach and working
structure it will use, and document that approach in an RMP. A comprehensive and consistent
approach ensures all aspects of the program are examined for risk. As a program transitions through
developmental and operational testing and sustainment, the program team should update the RMP to
identify, assess, and control risks that have an impact on overall program cost, schedule, and/or
performance. Following is an example of an RMP outline:
Program Summary Brief description of the program including the connection between the
Acquisition Strategy, program management strategy, and technical strategy.
Definitions DoD definitions and definitions specific to the program to be used throughout
the guide.
o Criteria used to determine if a risk submitted for consideration will become a risk
or not (typically, criteria for probability and consequence)
o Adding/modifying risks
o Closing/retiring a risk
Risk Management Process and Procedures Description of the program risk management
process, methodology, meeting battle rhythm, and guidance for implementing the plan,
according to the tailorable four-step DoD process:
o Risk Identification
o Risk Analysis
o Risk Mitigation
o Risk Monitoring
Risk Management Tools List of the risk tool(s) the program (program office and
contractor(s)) use to perform risk management. (If the program office and contractor(s) use
DoD Risk Management Guide for Defense Acquisition Programs, 7th Edition (Interim Release)
8
different risk tools, this section would include a description of how the information will be
transferred between them. NOTE: In general, the same tool should be used. If the
contractors tool is acceptable, then this merely requires the contractor to provide
Government access).
Risk Assessment Techniques Summary of the cost, schedule, and performance assessment
processes, including procedures for assessing risks:
o Overview and scope of the assessment process
o Sources of information
Typically, program offices define the documentation and reporting procedures as part of the risk
management planning before contract award. The program office may add or modify this planning
during contract execution as long as the efforts remain within the scope of the contract or are
approved as part of a contract change. The program office should periodically review the RMP and
revise it, if necessary. Events that may drive the need to update it include an upcoming acquisition
milestone decision, following a system-level technical review, a change to the Acquisition Strategy
after a contract award, or after program re-baselining.
Expectations
The Government requires an RMP, IMP, and IMS in the Request for Proposal (RFP).
The Government includes a copy of the risk, top-level schedule, WBS, and SEP in the
proposal to inform the development of the contractors proposal. The contractors
SEMP, provided with the proposal, provides the contractors aligned approach to risk
management.
A SEP, SEMP, and RMP include a detailed plan of action for the management and
identification of who, what, where, when, and how. These approved documents
empower the lead systems engineer to execute the programs technical planning,
including its risk management program.
The Government and contractor team (prime and subcontractors) establish common risk
management processes and definitions. The program office, prime contractor, and
subcontractors also establish a joint risk management database.
DoD Risk Management Guide for Defense Acquisition Programs, 7th Edition (Interim Release)
9
Accessibility Will the tool be accessible to all users, perhaps remotely, including certain
tool licensing requirements?
Integration Does the tool aid in the integration with other program management tools and
processes?
Expectations:
The Government program offices and contractors select and use a common risk
management tool to collectively identify, analyze, mitigate, and monitor risks, issues,
and opportunities. Access to the risk management tool is available through an Integrated
Data Environment. When practical, key subcontractors and external programs employ
the same risk management tool and processes.
If multiple contractors are competing during an acquisition phase, firewalls are
established in the tool to prevent contractors from viewing one anothers data regarding
technical and programmatic risks.
DoD Risk Management Guide for Defense Acquisition Programs, 7th Edition (Interim Release)
10
For example, a firm fixed priced contract is usually employed on programs with mature designs or
when the technical risks are minimal and can be predicted with an acceptable degree of certainty. On
firm fixed priced contracts, PMs should reach an agreement with contractors on what key risks must
be mitigated, when progress will be measured, and any appropriate contract options. Other than
these agreed-to risks, prime contractors selectively resource risk mitigation activities that they feel
are warranted to support delivering a system on time which meets the requirements in the
specification.
On the other hand, cost type contracts are employed on programs where the inherent technical risks
are less clear and potentially undefined so programs need to allocate sufficient resources to mitigate
emerging risks. The sufficiency of funds available to address emerging risks should be reevaluated
during budget cycle reviews as well as prior to acquisition milestones and the award of follow-on
contracts. With both types of contracts, there is a defined process for allocating scarce resources to
mitigate identified risks based on their likelihood and consequences (cost, schedule, and/or
performance).
Communicating and reviewing the status of each risk is key to ensuring all personnel involved in risk
management have a clear understanding of the progress being made in controlling risks. It involves
presenting and sharing the current likelihood and consequence, along with an assessment of the
current status of the mitigation plan chosen. This allows straightforward knowledge of delayed,
missed, or failed mitigation actions. Figure 2-2 shows a sample of routine program-related meetings
that are candidates for discussing risk status.
DoD Risk Management Guide for Defense Acquisition Programs, 7th Edition (Interim Release)
11
Organizing and training the team to follow a disciplined, repeatable process for conducting risk
management is critical, since major program decisions during the program life cycle need the support
of periodic assessments. Experienced teams do not necessarily require extensive training, but team
members should review lessons learned from earlier programs. The programs risk manager, or an
outside expert, may train the team, focusing on the programs risk management planning documented
in the SEP, SEMP, Acquisition Strategy, and RMP. A risk management training package for the
core team and SMEs is often beneficial and could be accomplished at the start-of-work meeting.
This package typically includes the risk management approach, analysis criteria, documentation
requirements, team ground rules, and a program overview.
Figure 2-3 displays the hierarchy typically involved in risk management. These core groups and
individuals all play a part in the risk management process to identify, analyze, and report risks to the
next higher level when they exceed that levels ability to mitigate. These groups provide an array of
expertise in areas such as systems engineering, logistics, manufacturing, test, schedule analysis,
contracting, cost control/estimating, earned value management, and software development.
MDA
Executive Level
PEO
Program Manager
Program Risk Management
Board
IPT Risk Management
Board
Risk Manager
Integrated Product Team
Sub-Integrated Product Team
Working Group
Risk Owner
Team Members
Management Level
Working Level
Many impediments exist in implementing risk management, but it is the responsibility of everyone
on the risk management team to work together to overcome obstacles that may prevent program
success. The following responsibilities are recommended for inclusion in the RMP:
DoD Risk Management Guide for Defense Acquisition Programs, 7th Edition (Interim Release)
12
Tailors program strategies and oversight, based on the specifics of the product being acquired
including complexity, risk factors, and required timelines to satisfy validated requirements.
Approves programs proceeding into the next acquisition phase based on an understanding of
the technical, cost, and schedule risks of acquiring the product, and the adequacy of the plans
and programmed funding to mitigate those risks.
Considers the risks that could result from fielding incremental capabilities or features that
provide military utility to the warfighter on schedule and within the allocated funding.
Provides direction regarding management and control of cross-Service (external) programlevel or special interest risks and issues.
Ensures the programs planned risk activities, such as risk reduction and competitive and risk
reduction prototyping during the Technology Maturation and Risk Reduction (TMRR) phase,
are sufficient to reduce technology, engineering, integration, and life cycle cost risks to
support authorizing a program to transition from development to production.
Assesses the use of opportunity management to aid in proactive cost control throughout the
acquisition life cycle and achieve should versus will costs.
Ensures program Statement of Objectives (SOO), Statements of Work (SOW), and Contract
Deliverable Requirements Lists (CDRL) include provisions to support a defined program
RMP and process.
Approaches risk management not only from an individual program perspective, but also from
a portfolio and system-of-systems perspective.
Works with other Program Executive Offices (PEO) to identify shared concern, opportunities
for leverage, and areas to optimize programs by identifying gaps and redundancies within
portfolios.
Executes program oversight by monitoring and assessing program-level and special interest
risks and execution of risk mitigation plans.
Provides direction regarding management and control of cross-PEO (external) and PEO
portfolio (internal) program-level or special interest risks and issues.
DoD Risk Management Guide for Defense Acquisition Programs, 7th Edition (Interim Release)
13
Establishes and executes an integrated risk management process with the contractor and key
subcontractors.
Ensures the appropriate disciplines are involved in the program risk management process
(program management, engineering, contracting, legal, financial management, EVM (cost
account managers and cost schedule analyst), logistics, manufacturing, test and evaluation,
quality assurance, system safety).
Forms and chairs a program RMB to include Deputy PMs, IPT chairpersons, risk
management coordinator, chief or lead systems engineer, program logistician, budget and
financial manager, contracting officer, legal, prime contractor, and other members relevant to
the program strategy, phase, and risks.
Communicates program-level and special interest risk status, using the programs approved
risk reporting format, during stakeholder meetings (Defense Acquisition Board (DAB),
Overarching Integrated Product Team (OIPT), PEO review, user exchange meeting),
program reviews, technical reviews, risk review board meetings, and other appropriate battle
rhythm meetings.
Assigns responsibility for risk management activities, monitors progress, and includes
stakeholders in the formulation and acceptance of risk mitigation plans.
Ensures the risk management process is executed in accordance with the programs approved
RMP, and risk management efforts at the working level are integrated.
Reviews identified risks, approves proposed risk mitigation plans, to include adequacy of
resources, and any changes to the approved plan.
Monitors the status of risk mitigation efforts, inclusive of resource expenditures and
quantitative assessment of risk reduction.
Continually assesses the program for internal and external risks and changes in program
strategy that might introduce new risks or change existing risks.
Reports risk information, metrics, and trends using the programs approved risk reporting
format, to senior management personnel (PM/PEO/MDA) and other stakeholder personnel.
Determines which risks are managed at the program or special interest level and which are
managed at the IPT or working group levels.
DoD Risk Management Guide for Defense Acquisition Programs, 7th Edition (Interim Release)
14
Approves risk closure for IPT level risks and notifies the program RMB of closure.
Risk Manager
Manages the risk process and tools for effective use by teams.
Prepares risk briefings, reports, and documents required for program reviews.
Develop and implement the risk planning outlined in the SEP, SEMP, Acquisition Strategy,
and/or RMP, and support the program PM and RMB as required.
Identify internal and external risks in accordance with the procedures documented in the
programs approved RMP. Recommend to the PM and RMB which risks should be tracked
as program level or special interest risks.
Identify risks that impact multiple IPTs, coordinate risk management efforts with affected
IPTs, and recommend to the RMB which IPT should take the lead in managing the risk.
Continually assess risks using documented risk assessment criteria. Conduct tailored
program risk assessment for each of the applicable technical reviews and for each key
program decision point.
DoD Risk Management Guide for Defense Acquisition Programs, 7th Edition (Interim Release)
15
Report risk status to the PM and RMB using the reporting requirements documented in the
programs approved RMP.
Assist the PM, as required, in reporting risk status to senior management personnel
(PM/PEO/MDA) and other stakeholder personnel.
Periodically revisit previously identified risks to verify the risk level is still accurate as the
program progresses or changes over time.
Support engineering trade-off analyses to ensure risk elements are considered during
performance, cost, and schedule trade space excursions.
Risk Owner
Develops the mitigation options and control plan for the risk item and a fallback plan for
high-level risks.
Develops cost consequence and mitigation strategy costs should the risk be realized.
Presents changes to the baseline mitigation plan to the program or IPT RMBs, as appropriate,
for approval.
Team Members
Involve the contractor as early as possible so that effective risk management can occur.
Include contract provisions that foster contractor flow down of risk management
requirements to subcontractors.
Recognize that the contractor may treat risk differently from the Government due to
differences in Government and contractor business and program viewpoints.
Address with the contracting officer any subtleties in contract provisions that could affect the
success of the risk management program, including applicable incentives for effective risk
management as manifested by accomplishment of defined program objectives (known
challenging design or integration tasks accomplished within constrained resources).
Ensure systems engineering trade-off analyses show results of capability excursions around
expected design performance points to highlight risk elements that can be used to establish
cost and schedule trade space.
Reflect program design and development considerations in acquisition planning and cost,
schedule, and performance trade-space activities to manage risks.
Evaluate the results of competitive and risk reduction prototyping to assess the risk related to
design maturity and achieving program objectives.
Conduct Schedule Risk Assessments of offerors proposals to support the source selection
decision process.
Reflect the effectiveness of the contractors risk management effort in the Contractor
Performance Assessment Report System evaluation.
Develop an internal risk management program and work jointly with the Government
program office to develop an overall risk management program; include the risk management
approach in the proposal.
Conduct risk identification and analysis during all phases of the program, including proposal
development, and apply appropriate risk mitigation strategies and plans.
Maintain a joint risk management tool and database; provide remote access to Government
counterparts.
DoD Risk Management Guide for Defense Acquisition Programs, 7th Edition (Interim Release)
17
Support, as required, Government risk management efforts, such as the RMB; reporting to
senior management personnel and other stakeholders; and risk management training of IPT
personnel.
Report risk status to company management and Government personnel during program
reviews, technical reviews, and other appropriate recurring meetings.
Jointly conduct Integrated Baseline Reviews (IBR) with the Government team to reach
mutual understanding of risks inherent in the program baseline plans.
Conduct schedule risk analyses at key points during all phases of the program, including
proposal development.
Incorporate risk control activities into IMS and program budgets as appropriate.
Synthesize and correlate the status of new and ongoing risk elements in the IMS, Contract
Performance Report, risk control plans, estimates at completion, technical status
documentation, program status reviews, and other sources of program status.
DoD Risk Management Guide for Defense Acquisition Programs, 7th Edition (Interim Release)
18
Risks Monitoring
How has the risk
changed?
Communication
and Feedback
Risk Analysis
What is the likelihood
and consequence of the
risk?
Risk Mitigation
Should the risk be accepted,
avoided, transferred or
controlled?
In order to identify and manage risks, all personnel involved with the program should have a clear
understanding of the programs requirements, goals, plans, and supporting analysis.
An
understanding of the following program-related documents helps the program personnel identify
sources of potential risk:
Acquisition Strategy
Early communication between the user requirements community and the acquisition community in
the development of Joint Capabilities Integration and Development System (JCIDS) documents helps
requirements leaders and acquisition leaders to identify poor requirements and technical risks for
potential cost-performance trade-off decisions. Changes to a Key Performance Parameters (KPP)
and Key System Attributes (KSA) introduce risk that could jeopardize a programs affordability,
performance, and military utility.
The following activities are excellent opportunities to identify technical, business, and programmatic
risks by Government and/or contractor program teams:
Review of the lessons learned, including risks or issues on predecessor or similar programs
AoAs, which evaluate the merits and risks of each technically feasible alternative
DoD Risk Management Guide for Defense Acquisition Programs, 7th Edition (Interim Release)
20
Independent assessments:
o Red Teams, Non-Advocate Reviews, Program Support Assessments; technology and
manufacturing assessments
o Nunn-McCurdy and Critical Change Review assessments on Major Defense
Acquisition Programs (MDAP) and Major Automated Information System (MAIS)
programs, respectively
Trends in Technical Performance Measures (TPM), schedules, budgets, and other metrics:
o Progress toward meeting KPPs and KSAs
o Assessments of the performance to plan of TPMs, including an assessment of the
reasons for deviation
o Progress against the programs critical path
o Schedule Health Checks and SRA
o Earned Value Management System
External influences:
o Changes in user requirements threats, Concept of Operations (CONOPS), and
requirements creep
o Externally driven cost and/or schedule constraints
o Service or congressional changes to funding levels
o Synchronization with critical external programs under development (e.g., schedule
alignment, technology maturity assessment, technical issues, and funding priorities)
o Synchronization of legacy systems availability and restrictions
o Other interagency requirements or interests (e.g., FAA)
o New Service or DoD policies and guidance
Production:
o Make-buy decisions, changes to suppliers, parts obsolescence, product delivery issues
DoD Risk Management Guide for Defense Acquisition Programs, 7th Edition (Interim Release)
21
Many risks can threaten program success in terms of meeting cost, schedule, and performance
objectives. Figure 3-2 sites a few resources to use when identifying program risks.
Risk
Identification
Risk Monitoring
How has the risk
changed?
Communication
and Feedback
Risk Mitigation
Should the risk be
accepted, avoided,
transferred or
controlled?
Risk Analysis
What is the
likelihood and
consequence of the
risk?
SOW requirements
Brainstorming sessions with SMEs
Interviews with IPT leads, Systems
Command/Center competencies
Review of similar/historical programs
Trade studies
Review analysis of Technical Performance
Measurements, resource data, life cycle cost
information, WBS/IMS/EVM data trends,
and progress against critical path
Review Systems Engineering Technical
Reviews Checklists
In DoD, risks can be broadly grouped into three categories: technical, programmatic, and business
(Figure 3-3). Top-level categories are defined as follows:
Technical Those risks that may prevent the end item from performing as intended or
failing to meet performance expectations. Technical risks can be internally or externally
generated.
They typically emanate from areas such as requirements, technology,
engineering, integration, test, manufacturing, quality, logistics, and training.
Programmatic Those risks that are generally within the control or influence of the PM or
PEO. Programmatic risks can be associated with program estimating (including cost
estimates, schedule estimates, staffing estimates, facility estimates, etc.), program planning,
program execution, communications, and contract structure.
Business Those risks that generally originate outside the program office, or are not within
the control or influence of the PM. Business risks can come from areas such as program
dependencies, resources (funding, people, facilities, suppliers, tools, etc.), priorities,
regulations, stakeholders (user community, acquisition officials, etc.), market, and weather.
DoD Risk Management Guide for Defense Acquisition Programs, 7th Edition (Interim Release)
22
Technical
Programmatic
Business
Requirements
Estimates
Dependencies
Technology
Program Planning
Resources
Program Execution
Priorities
Communication
Regulations/Laws
Contract Structure /
Provisions
Market
Engineering
Integration
Test
Manufacturing
Customer
Quality
Weather
Logistics
Training
Among the predominant technical risks, the areas of technology, engineering, integration, and
manufacturing are reflected in policy and guidance and are routinely discussed during
OUSD(AT&L) program engagements and outreach events. These areas are defined as follows:
Technology Those risks associated with the transition of technical advances out of the
laboratory, through prototyping, and into engineering. Technology risks include those
associated with research, development, prototyping, and validation in laboratory/operational
environments. Risks can also arise from an organizations first-time use of a technology.
Integration Those risks associated with the engineering and management activities to
interface system elements within systems (internal integration) as well as systems with other
systems (external integration). Integration risks include those associated with both functional
and physical interface requirements, interface design, and management and control.
DoD Risk Management Guide for Defense Acquisition Programs, 7th Edition (Interim Release)
23
Requirements Those risks associated with achieving and delivering a needed capability.
Requirements risks include those relating to the realization of KPPs, KSAs, TPMs, and other
system attributes in the context of design, production, operation, and support constraints.
Poor requirements definition at inception, requirements rigidity, and instability can lead to
inefficiencies and sometimes program failure.
Figure 3-4 depicts the how risks should be analyzed and what impact areas to quantify.
DoD Risk Management Guide for Defense Acquisition Programs, 7th Edition (Interim Release)
24
Risk
Identification
What can go wrong?
Communication
and Feedback
Risk Analysis
What is the
likelihood and
consequence of the
risk?
RDT&E Costs
Procurement Costs
O&S Costs
Risk Mitigation
Performance thresholds
Schedule thresholds
Create traceability between risk events and
IMS/IMP/WBS
Identify and separately track issues and
opportunities
Conduct analysis periodically to support cost
and schedule risk assessments
Program analysis integrates the technical performance assessment, schedule assessment, and cost
estimates using established risk evaluation techniques. Likelihood and consequence analysis gives
the PM insight into the detailed implications of risks from a quantitative perspective. It also
provides a basis for prioritizing efforts and allocating resources to mitigate risks.
3.2.1 Likelihood
Risk likelihood is the assessed probability that a risk event will occur given existing conditions. It is
important that the likelihood of the risk be tied to a specific risk event. Table 3-1 provides general
criteria for establishing the likelihood of a risk occurring. The use of the predefined likelihood and
consequence criteria provides a consistent means for evaluating risks so a program can make
objective comparisons of risks. Risks can be characterized as high, moderate, or low based on rating
thresholds.
Table 3-1. Levels of Likelihood Criteria
Level
Likelihood
Probability of Occurrence
Not Likely
~10%
Low Likelihood
~ 30%
Likely
~ 50%
Highly Likely
~ 70%
Near Certainty
~ 90%
DoD Risk Management Guide for Defense Acquisition Programs, 7th Edition (Interim Release)
25
3.2.2 Consequence
When analyzing risks, each risk should be rated in terms of impact to the program.(i.e., effect of the
item on program technical performance, schedule, and/or cost). Risk consequence is measured as a
deviation against the program performance, schedule, or cost baseline. While the Government and
contractor may have a different perspective on sources of risk and priorities, they should seek to have
a common framework for risk consequence analysis. Risk statements should be clearly written to
define the potential event that could adversely affect the ability of the program to meet cost,
schedule, and performance thresholds. Consequence levels should be defined and included in the
SEP, SEMP, and RMP.
The consequence criteria in Table 3-2 may aid a program in distinguishing the type of technical
performance, schedule, and cost (Research Development Test and Evaluation (RDT&E),
Procurement, or Operations and Maintenance (O&M)) consequences. When assessing the
consequence magnitude, the program team evaluates each risk as if it were going to occur. The
impact is assessed qualitatively on a scale of 1 to 5, using the guidelines in the table.
PMs are encouraged to carefully consider their programs performance, schedule, and cost thresholds
and to use these thresholds to set meaningful consequence criteria tailored to their program. For
example, KPP and Acquisition Program Baseline (APB) thresholds should trigger Level 5
consequences. Lower-level consequences may serve as incremental warning points in the areas of
performance, schedule, and cost. If employed properly, this approach can be effective in linking
program management parameters with the risk management approach.
Typically risk control activities reduce the likelihood of the risk event occurring but do not affect the
level of consequence (cost, schedule, or performance impact) if the risk event is realized. In
addition, as part of risk control activities, the program may reduce the risk level if the systems
design architecture changes or if the program addresses constraints, such as budget limitations,
inflexible schedule, or inability to change requirements as part of the risk control activities.
DoD Risk Management Guide for Defense Acquisition Programs, 7th Edition (Interim Release)
26
Technical Performance
Minimal or no
impact
Minimal or no impact
< $A or _% of budget
Minimal or no impact
< $A or _% of budget
Minimal or no impact
< $A or _% of budget
Schedule
RDT&E
Procurement
DoD Risk Management Guide for Defense Acquisition Programs, 7th Edition (Interim Release)
27
Operations &
Maintenance
It can sometimes be difficult to determine whether a risk is a performance risk, a schedule risk, or a
cost risk. The following paragraphs clarify some of the distinctions.
3.2.2.1
Programs should first determine whether a risk has a direct performance consequence or impact. If
so, the risk should be noted as a performance risk even though it may also have attendant schedule or
cost implications. Performance risks have adverse consequences to capabilities, operations, user
needs, or any derived requirements to effectiveness or suitability. Performance consequences can be
manifested by performance shortfalls in a technical baseline artifact (specification, drawing, etc.),
performance of a test article, or operational system performance.
3.2.2.2
If the risk is judged not to have a performance impact, programs should next ask, Is there an impact
to schedule and to what extent? If the risk affects the critical path, then it has an impact on both
schedule and cost but should be carried as a schedule risk.
Program teams should analyze the impact of the risk to the IMS and the critical path(s), to:
Incorporate technical assessment dates and schedule uncertainties into the program schedule
Perform schedule analysis on the program IMS, incorporating the potential impact and
off-ramps from all contract schedules
Quantify schedule excursions reflecting the effects of cost risks, including resource
constraints
Provide a Government schedule assessment for cost analysis and fiscal year planning,
reflecting the technical foundation, activity definition, and inputs from technical and cost
areas
Document the schedule basis and risk impacts for the risk assessment
Project an independent forecast of the planned completion dates for the SETRs and major
milestones
Conduct Schedule Health Checks and SRA to aid in the identification of schedule
consequences
3.2.2.3
Programs should examine whether a risk has a cost consequence by asking, Does the risk affect the
RDT&E, procurement, or O&M costs? If so, with no performance or schedule impacts, the risk is a
cost risk and may have an impact on program efforts to:
DoD Risk Management Guide for Defense Acquisition Programs, 7th Edition (Interim Release)
28
Derive life cycle cost estimates by integrating technical assessment and schedule risk impacts
on resources.
Determine whether the adequacy and phasing of funding supports the technical and
acquisition approaches.
Provide program life cycle cost excursions from near-term budget execution impacts and
external budget changes and constraints.
Note: Cost and funding are not the same. Cost is related to the amount of money necessary to
acquire and sustain a commodity; funding is the amount of money available to acquire and sustain
that commodity.
Expectations:
Predefined likelihood and consequence criteria are used to provide a consistent means
for evaluating risks so objective comparisons of risks can be made. Risks can be
characterized as high, moderate, or low based on rating thresholds.
Risk statements identify events that could adversely affect the ability of the program to
meet performance, schedule, and cost thresholds or objectives.
Trade studies inform risk mitigation activities, technology off-ramps, and the adjustment
of requirements during Knowledge Point reviews and Configuration Steering Boards.
Risk analysis is a snapshot in time and may change significantly during the program.
Program teams conduct risk analyses periodically to align and support other program
management activities such as technical, IMS (including critical path), and EVM
reviews. All aspects of risk management are iterative.
If the analyzed likelihood is at or near 100 percent, the program teams address the
problem as an issue rather than a risk.
This
The program should revisit and update the matrix on a regular basis. Once the analysis of likelihood
and consequence is complete, program teams should then use the risk reporting matrix shown in
DoD Risk Management Guide for Defense Acquisition Programs, 7th Edition (Interim Release)
29
Figure 3-5. This risk reporting matrix allows the combination of likelihood and consequence to form
an overall risk level for each risk: low (green), moderate (yellow), or high (red). Program teams can
then use this rating level to more effectively communicate the level of risk and the urgency of
program actions to control those risks.
Likelihood
Probability of
Occurrence
Not Likely
~10%
Low Likelihood
~ 30%
Likely
~ 50%
Highly Likely
~ 70%
Near Certainty
~ 90%
High
Likelihood
Level
2
1
Moderate
Low
1
2
3
4
Consequence
Risk ID Number:
Risk Driver:
Risk Mitigation Action:
- Cost: $
Closure Date:
Cost Impacts:
- RDTE: $ or %
- Production: $ or %
- O&M: $ or %
Performance Impacts:
Schedule Impacts:
- Months:
Cost
Level
Technical Performance
Schedule
RDT&E
Procurement
Operations &
Maintenance
Minimal or no impact
Minimal or no impact
< $A or _% of budget
Minimal or no impact
< $A or _% of budget
Minimal or no impact
< $A or _% of budget
Risk reporting documents should include recording, maintaining, and reporting of risk identification,
risk analyses, risk mitigation approach, and tracking results. Risk reporting is performed as part of
technical reviews, risk review board meetings, or periodic program reviews. Documentation includes
all plans and reports for the PM and decision authorities, as well as reporting forms that may be
internal to the program office. Predefined likelihood and consequence criteria should be used to
provide a consistent means for evaluating risks so objective comparisons can be made.
Once the risks have been categorized by likelihood and severity of consequence, the risks can be
prioritized onto the risk reporting matrix. This graphical representation of the analyzed risks offers
some structure to risk management decisions that are often complex. The matrix focuses on the most
logical and critical risks as demonstrated in Figure 3-6.
Risks can be characterized as high, moderate, or low based on rating thresholds. A risk level of high,
moderate or low is calculated for each risk and serves as the means to rank the program risk. This
difficult but important step in the risk management process helps the program determine resource
allocation and the appropriate mitigation strategy. As implementation proceeds and additional risks
DoD Risk Management Guide for Defense Acquisition Programs, 7th Edition (Interim Release)
30
are identified, different scenarios may be used to analyze their impact on the programs cost,
schedule, and performance requirements. This process allows the management of individual risks to
be prioritized in terms of their impact.
Prioritizing risks is important during all acquisition phases, but especially when there has been a
significant change in the Acquisition Strategy and prior to milestone reviews. Since every project is
unique, the priorities of certain risks will vary. Risks also can be prioritized based on their
relationship to other external risks. Risks that are high and have the most critical impact on program
execution can be given the most priority. Figure 3-6 depicts a sample prioritized program risk matrix
that summarizes the program risk picture.
80 Risks Tracked in Risk Register
14 Red
29 Yellow
37 Green
Programs should use the risk tracking methodology that best suits them and might integrate a risk
reporting matrix with risk control activities as outlined in Figure 3-7. This figure shows an example
of an alternative approach for presenting the risk, performance, schedule, and cost (RDT&E,
procurement, or O&M) consequences. This alternative risk reporting matrix also facilitates assessing
performance to plan relative to risk control activities.
DoD Risk Management Guide for Defense Acquisition Programs, 7th Edition (Interim Release)
31
Expectations:
Risk statements are clearly written to define the potential root risk event that could adversely
affect the ability of the program to meet cost, schedule, and performance thresholds.
o The risk driver, mitigation activities, and closure are identified on the risk reporting
matrix.
o The magnitude and type of cost consequence (RDT&E, procurement, or O&M) are
quantified on the risk reporting matrix.
o The costs of control activities are shown on the risk reporting matrix.
o Programs ensure that the risk consequences are based on the cost and schedule criteria
defined in the SEP, SEMP, Acquisition Strategy, and RMP.
3.2.4 Risk Register
A risk register is a tool commonly used as a central repository for all risks identified by the program
team and approved by the RMB. A risk register should be developed once the project and RMP have
been approved. It provides a mechanism for maintaining awareness of the number and type of risks.
The risk register records details of all risks identified throughout the life of the project. It includes
information for each risk such as risk category, likelihood, consequence, planned mitigation or
control measures, the risk owner, and, where applicable, expected closure dates. Figure 3-8 shows a
sample format for a risk register. Risks should be linked to the appropriate WBS/IMS activities.
Programs should regularly update and maintain the risk register as the status of risks change due to
risk mitigation strategies. New risks should be added to the risk register when identified.
DoD Risk Management Guide for Defense Acquisition Programs, 7th Edition (Interim Release)
32
3.2.2
II
Risk
Event
Excessive
number
of priority
1 and 2
software
defects
may
cause a
delay to
the start
of IOT&E
Likelihood /
Risk
Consequence Reporting
Rating
Matrix
3/4
Yellow
Risk
Mitigation
Strategy
Submitted
Date
Board
Review
Planned
Closure
Expected
Plan
Risk
Status
Rating
Green
(1-4)
On
track
Risk Monitoring
Communication
and Feedback
Risk Analysis
What is the
likelihood and
consequence of the
risk?
Risk Mitigation
Should the risk be
accepted, avoided,
transferred or
controlled?
Avoid Risk
Transfer Risk
Control Risk
DoD Risk Management Guide for Defense Acquisition Programs, 7th Edition (Interim Release)
33
Through risk mitigation the program identifies, evaluates, and selects options to set risk at acceptable
levels given program constraints and objectives. For each risk, program teams should select the most
appropriate program approach from the four mitigation options listed and document the planned
approach in a risk mitigation plan.
The level of detail in planning depends on the program life cycle phase and the nature of the risks to
be addressed. However, there should be enough detail to allow an estimate of the effort required and
technical scope needed based on system complexity. Figure 3-10 provides a sample risk reporting
matrix that highlights the details that should be addressed when quantifying the impact of risks.
Risk ID Number: 31
Risk Driver:
Risk Mitigation Action:
- Cost: $
Closure Date:
Cost Impacts:
- RDT&E: $ or %
- Production: $ or %
Schedule Impacts:
- Months:
Performance Impacts:
- Only achieves XX% of
aaa KPP performance
Risk ID Number: 22
Risk Driver:
Risk Mitigation Action:
- Cost: $
Closure Date:
Cost Impacts:
- Production: $ or %
- O&M: $ or %
Schedule Impacts:
- Months:
Risk ID Number: 4
Risk Driver:
Risk Mitigation Action:
- Cost: $
Closure Date:
Cost Impacts:
- Production: $ or %
Schedule Impacts:
- Months:
Performance Impacts:
- May trade xyz
performance
Risk ID Number: 99
Risk Driver:
Risk Mitigation Action:
- Cost: $
Closure Date:
Cost Impacts:
- RDT&E: $ or %
- Production: $ or %
- O&M: $ or %
Schedule Impacts:
- Months:
Performance Impacts:
- Only YY% of abc KSA
performance
Risk ID Number: 18
Risk Driver:
Risk Mitigation Action:
- Cost: $
Closure Date:
Cost Impacts:
- RDT&E: $ or %
- Production: $ or %
Schedule Impacts:
- Months:
When formulating the mitigation approach, the RMB should compile a list of criteria that answers
questions such as:
Are the expectations realistic in effectively reducing program risk to an acceptable level?
What impact will the mitigation approach have on the technical performance of the system?
DoD Risk Management Guide for Defense Acquisition Programs, 7th Edition (Interim Release)
34
Successful mitigation requires the Government and the contractor to communicate all program risks
for mutual adjudication. Both parties may not always agree on risk likelihood/consequence, but the
RMB is the mechanism for risk definition and assignment. Programs often fall into the trap of
identifying ongoing program activities as risk mitigation actions, without making changes to the
planning, requirements, budget, or the program budget/resource allocation. This approach of not
changing the planning, requirements, budget or program allocation typically is not sufficient to
adequately address the identified risks. In most situations, relying on previously planned program
activities without modifying them will not control the risk but may result in the programs simply
accepting the risk and its consequence, as part of the program approach. It is important for programs
to recognize this distinction when communicating risk mitigation approaches to higher program and
technical authority.
If the risk changes significantly, the program team should adjust the risk mitigation approaches
accordingly. If the risks are lower in severity than previously assessed, then the program team can
reduce or cancel the specific risk mitigation approach and consider using the resources for other uses.
If risks are higher in severity or new events are found, appropriate risk mitigation efforts should be
implemented. Notwithstanding the actions taken, the rationale for the changes to the risk (and
control implementation) should be documented and maintained in a history file.
DoD Risk Management Guide for Defense Acquisition Programs, 7th Edition (Interim Release)
35
Directing the teams to execute the defined and approved risk control plans
Outlining the risk reporting requirements for ongoing monitoring, to include trip wires
which warrant elevating the risk to the next management level
It is also possible that throughout the system life cycle there may be a need for different near-term
and long-term control approaches. Programs should avoid the tendency to select control as the risk
mitigation approach without seriously evaluating acceptance, avoidance, and transfer.
DoD Risk Management Guide for Defense Acquisition Programs, 7th Edition (Interim Release)
36
IMS tasks
DoD Risk Management Guide for Defense Acquisition Programs, 7th Edition (Interim Release)
37
Expectations:
Risks are either:
o Accepted: The program assumes responsibility for potential consequences.
o Avoided: The program eliminates the risk event or condition by taking an
alternate path.
o Transferred: The program assigns risk responsibility to another entity.
Programs should not transfer a risk to another program unless the receiving
organization accepts it and has the resources to control it.
o Controlled: The program develops, resources, and monitors control plans.
The risk register captures the risk mitigation approach (Accept, Avoid, Transfer,
Control) for each risk.
Risks that are assessed as High or Moderate have resourced risk control plans.
o Due to potential adverse impact to the program, risks assessed as High and
remaining such for longer than 3 months require fallback or alternative plans.
o Risks that are assessed as Low do not require control plans but, upon further
review by management, may have elements that require monitoring. If so, risk
control plans may be formally or informally implemented.
Typically risk control activities reduce the likelihood of the risk event occurring, not
the consequences (cost, schedule, or performance impact).
DoD Risk Management Guide for Defense Acquisition Programs, 7th Edition (Interim Release)
38
Risk
Identification
What can go wrong?
Risk Monitoring
How has the risk
changed?
Communication
and Feedback
Risk Analysis
What is the
likelihood and
consequence of the
risk?
Risk Mitigation
Should the risk be
accepted, avoided,
transferred or
controlled?
Program offices and contractors should establish a regular schedule for reviewing risks, issues, and
opportunities. At a top level, periodic program management reviews and technical reviews provide
much of the information used to identify any performance, schedule, readiness, and cost barriers to
meeting program objectives and milestones. Therefore, throughout the program, the program office
should reevaluate known risks on a periodic basis and examine the program for new events by:
Displaying risk management dynamics by tracking risk status within the risk reporting matrix
and risk register reports/updates
Citing those risks that can be retired due to program progress or control
Reviewing retired risks on a periodic basis to ensure they have not relapsed
The key to risk monitoring is to establish a management indicator system over the entire program.
The PM uses this indicator system to evaluate the status of the program throughout the life cycle. A
risks likelihood and consequence may change as the acquisition process proceeds and updated
information becomes available. Program teams should use the management indicator system to
DoD Risk Management Guide for Defense Acquisition Programs, 7th Edition (Interim Release)
39
provide an early warning when the likelihood of occurrence or the severity of consequence exceeds
pre-established thresholds/limits or is trending toward exceeding preset thresholds/limits. Risk
monitoring allows the program team to take timely management actions to control these problems.
Figure 3-13 illustrates the results of risk control actions against established metrics throughout the
acquisition process. The plotted position on the risk reporting matrix should show the PMs current
assessment of the risks likelihood and the estimated severity of its effect on the program if control
fails. Figure 3-13 also provides an example of changed risk status after risk mitigation. As risk
control succeeds in a program, a yellow or red risks position on the risk reporting matrix migrates in
successive assessments from its current location toward the green. Therefore, the program office
should reexamine risk assessments and risk control approaches concurrently and feed information
back to the other risk activities of identification, analysis, and mitigation.
Expectations:
The program team conducts regular status updates to monitor risks for any changes to
likelihood or consequence as a result of program progress. Program offices and
contractors establish a regular schedule for reviewing risks, issues, and opportunities.
The team alerts management when risk mitigation plans should be implemented or
adjusted.
Managers alert the next level of management when the ability to mitigate a risk exceeds
the lower levels authority or resources.
The program team tracks implementation of risk control against the plan.
The program establishes a management indicator system over the entire program to
monitor risk activity.
The program reviews closed risks periodically to ensure their risk level has not changed.
DoD Risk Management Guide for Defense Acquisition Programs, 7th Edition (Interim Release)
40
Level 2
Level 3
Level 3: Sub-elements
subordinate to level 2
Developmental Test
and Evaluation
The program should use the WBS as a basis for identifying and analyzing risk, for monitoring risks
at their respective levels (primarily for impact on cost and schedule performance), and for assessing
the resulting effect of risks on the overall program or product. Following risk mitigation planning,
the program should update the WBS as needed to reflect selected mitigation options.
Figure 4-2 provides examples of a program and contractor WBS relationship. See MIL-STD-881 for
more details on preparing, understanding, and presenting the program WBS and contractor WBS.
The IMS is critical as the program develops what-if scenarios to assess the likelihood and
consequence of each risk. Using the IMS, the program should identify risk drivers to gain a better
understanding of the risks and therefore identify the best mitigation strategy. In order to better track
progress in controlling risk, the program should reflect resources in the IMS.
DoD Risk Management Guide for Defense Acquisition Programs, 7th Edition (Interim Release)
42
Logic: A good schedule identifies and links all work package elements in the order they
should be executed using predecessors and/or successors.
Type of Relationship: Relationships establish the order in which each task should be
completed. The finish-to-start relationship is the preferred method as established by auditing
agencies and is the default for many scheduling tools. A good schedule establishes a finishstart hierarchy, with few exceptions.
Hard Constraints: Hard constraints fix a tasks finish date and prevent tasks from moving
as their dependencies finish, thereby preventing the schedule from being logic-driven. The
critical path and any subsequent analysis may be adversely affected. Good schedules will not
have any hard constraints.
High Duration: Any unfinished task with a baseline duration greater than 44 working days
(2 months) is considered high duration. Good schedules will break down tasks that have
durations greater than 44 days into smaller, more manageable efforts that provide better
insight into cost and schedule performance.
Leads: A lead is an overlap between tasks that have a dependency. For example, if a task
can start when its predecessor is half finished, the program can specify a finish-to-start
dependency with a lead time of the applicable number of days for the successor task.
Programs should minimize leads as they can distort the critical path and cause resource
conflicts.
Lags: Any duration between a tasks completion and its predecessors start date is defined as
a lag. Lags should be avoided because they can adversely affect the critical path and any
subsequent analysis.
High Float: Float (or slack) is the amount of time a task can be delayed without causing a
delay to subsequent tasks. A task with float more than 44 working days is considered high
float and may be a result of missing predecessors and/or successors. If the percentage of
tasks with high float exceeds 5 percent, the critical path may be unstable and will not be
logic-driven. Good schedules avoid high float.
Negative Float: Any task with negative float (less than zero) may indicate that the
forecasted date (start-to-finish) is unrealistic and will affect the schedules overall realism.
Good schedules will have a corrective action plan (get-well plan) to mitigate the negative
float and its impact.
Invalid Dates: If a status to actual start/finish dates reflects a future beyond the current
status date, it is considered invalid. Tasks that have actual start and/or actual finish dates that
meet these criteria indicate that the IMS has not been properly statused. Accurate, updated
actual start and finish dates are necessary for program management decisions and for
calculating a valid critical path.
Resources: Tasks that have durations of one or more days require the allocation of resources
(hours/dollars) to complete the assigned work. Good schedules use resource allocations to
DoD Risk Management Guide for Defense Acquisition Programs, 7th Edition (Interim Release)
43
assist the PM in ensuring the scheduled efforts are executable as planned and increase
effectiveness of schedule risk assessments.
Missed Tasks: Tasks that do not finish as planned are considered missed tasks. An
excessive amount of missed tasks indicates that the program is performing poorly to the
baseline plan and may be a result of inadequate resources and/or unrealistic planning. Good
schedules provide advanced warning to the PM, helping to minimize the impact.
Critical Path Test: Properly established schedules map tasks in a sequential order. The
schedule of sequential tasks with zero float creates a critical path. A failed critical path test
indicates broken logic somewhere in the schedule. Good schedule management ensures the
critical path remains intact.
Critical Path Length Index (CPLI): The CPLI measures the schedules efficiency to finish
on time. The CPLI uses the negative float in a schedule to calculate the longest, continuous
sequence of tasks/activities through the schedule from contract start (or current status date) to
contract completion. A CPLI of 1.00 or greater indicates there is no negative float in the
schedule. Good schedules approach a CPLI of 1.00.
Baseline Execution Index (BEI): The BEI is the efficiency with which actual work has
been accomplished when measured against the baseline plan. This efficiency measure is an
indication of how well the program is executing to plan. Well-executed schedules have a
calculated BEI not less than 0.95 with a target of 1.00.
As displayed in Figure 4-4, the designation of a red assessment is not synonymous with failure, but
rather an indicator of potential lower schedule quality.
DoD Risk Management Guide for Defense Acquisition Programs, 7th Edition (Interim Release)
44
DoD Risk Management Guide for Defense Acquisition Programs, 7th Edition (Interim Release)
45
DoD Risk Management Guide for Defense Acquisition Programs, 7th Edition (Interim Release)
46
performance risks; therefore, the validity of the cost data used to construct the cost risk assessments
is critical. Collecting good data is the most critical part of the cost assessment process.
A number of analytical tools can be used to perform cost risk assessments. As with SRAs, Monte
Carlo simulation can be used to determine the cost probability distributions for a program. This
technique is often chosen for its quick results and fairly accurate estimates.
Expectations:
Programs integrate risk management with other management tools (WBS, IMP, IMS,
EVM, as applicable) during all phases of the program.
Programs establish traceability between risk management activities and the WBS, IMP,
and IMS.
DoD Risk Management Guide for Defense Acquisition Programs, 7th Edition (Interim Release)
47
Issue
Identification
What has gone wrong?
Issue
Monitoring
How has the issue
changed?
Communication
and Feedback
Issue
Analysis
What is the
consequence of the
issue?
Issue
Handling
Should the issue be
accepted, resolved, or
transferred?
Figure 5-1. Issue Management Process
DoD Risk Management Guide for Defense Acquisition Programs, 7th Edition (Interim Release)
48
Issues are best identified before the beginning of a new project or contract and should be updated and
reviewed periodically throughout the life cycle of the program. Unlike opportunities and risks, there
is no assessment of their likelihood because issues have either already occurred or are in the process
of occurring. The issue management matrix in Figure 5-2 provides a graphical representation of the
issue status. Issues are mapped according to their consequences. The yellow, orange, and red
regions on the matrix indicate areas of low, moderate, and high issues, respectively.
Once an issue has been analyzed for severity and urgency, the program should develop and
implement a corrective action plan. The program monitors issues using the following mitigation
options:
Assume Accepting the issue based on results of cost-benefit analysis that displays a benefit
in accepting the consequences of the issue.
Resolve Implementing a strategy to undertake the issue by correcting the issue at hand and
ensuring that it does not recur.
The program should track the resolution of issues against the POA&M. Figure 5-3 shows a sample
issue tracking matrix.
DoD Risk Management Guide for Defense Acquisition Programs, 7th Edition (Interim Release)
49
Issue
Consequence
Type
T/B/P
Closure Activities
Activity 1
Tech (T)
Activity 2
Activity 3
Expectations:
Do not confuse issues with risks. Both have consequences, but issues have already
occurred. Therefore, programs should have an issue management process separate and
distinct from the risk management process.
A program should develop a POA&M for all issues and should review the POA&M
during the program office and contractors battle rhythm of meetings (see Figure 2-2).
Programs track cost, schedule, and performance issues and report to the appropriate
management level based upon the level of the consequence impacts.
DoD Risk Management Guide for Defense Acquisition Programs, 7th Edition (Interim Release)
50
Amount ($)
$420K
$2.1M
Risk
Management
Opportunity
Management
Opportunities drive
should cost
PMs should use opportunity management (OM) to identify, analyze, plan, implement, and track
initiatives that can yield improvements in the programs cost, schedule, and/or performance baseline
by reallocating program resources. Identifying opportunities starts with forecasting potential
enhancements within the programs technical mission, stakeholder objects, and contract extensions.
By focusing on the downside of risk, programs may overlook opportunities that provide possibilities
for innovation. As opportunities emerge, the program can shift focus toward understanding how to
take advantage of opportunities while continuing to manage risks. Opportunity management
measures program improvement in terms of likelihood and benefits. Figure 6-2 shows the
opportunity management process.
DoD Risk Management Guide for Defense Acquisition Programs, 7th Edition (Interim Release)
51
Opportunity
Identification
What can be improved?
Opportunity
Monitoring
Communication
and Feedback
Opportunity
Analysis
What is the likelihood
and benefit of the
opportunity?
Opportunity
Handling
Should the opportunity
be pursued, monitored
or rejected?
The program should consider the following while outlining the OM process:
Opportunities should be assessed for both advantages and disadvantages. Through the OM process,
the program identifies potential enhancements to pursue cost, schedule, and performance benefits
that enable the program to perform better than planned. Program teams should seek out
opportunities across the entire system life cycle. For example, important sources of opportunities
include system and program changes that yield reductions in total ownership cost. These reductions
can be in any aspect of life cycle cost, including research and development, production, personnel,
training, spares, and operations and maintenance. Each of these elements of life cycle cost should be
considered for reduction opportunities early on and throughout the program life cycle.
During production, the program should continuously analyze opportunities for design changes that
yield reductions in production costs. Design changes to production configurations (and the product
baseline) may take the form of Value Engineering Change Proposals within the context of ongoing
production contracts. These do not change the system performance, but they may change the design
to yield production or support cost reductions.
Although there is an upside to pursuing the desired benefits of OM, there are also downsides
resulting from changes in the baseline plan and scope of the program. The program should perform
DoD Risk Management Guide for Defense Acquisition Programs, 7th Edition (Interim Release)
52
a cost-benefit analysis to justify the added cost or schedule that may be needed to achieve the
intended benefit. Next, the program should weigh the benefit with the cost and likelihood of
achieving it. Figure 6-3 illustrates the progression of the opportunity management process.
Opportunity #: 03
Description: Procure Smith Rotor
blades instead of Jones rotor blades
Cost of Opportunity: $2M procurement
per year
Potential Cost Benefits:
- O&M: $7M per year fuel savings
due to greater lift capacity
Potential Performance Benefits:
- 400lbs of lift capacity
Opportunity Closure Date: June 2015
Opportunities can be discovered before program execution and throughout the life of the program.
These events should help improve the technical capabilities, ease schedule restrictions, and decrease
costs. Once the opportunities are identified, the next step is to analyze the likelihood of occurrence
and the benefit of pursuing the opportunities. In arranging the strategy to pursue opportunities, the
program should assess the potential benefit and achievability as follows:
DoD Risk Management Guide for Defense Acquisition Programs, 7th Edition (Interim Release)
53
can be selected, and then either rejected (because it is not feasible), monitored, or taken into
consideration in the revised baseline plan. Common opportunity-handling options include:
Reject Intentionally ignore an opportunity due to cost, technical readiness, resources, and
schedule burden.
Example: If using a new technology and lighter materials could lower a ships weight, the program
may have an opportunity to add other capabilities such as increased armament and increased speed.
The program may opt to monitor the opportunity and revisit improving the product after Low-Rate
Initial Production (LRIP).
Once there is a plan in place to reject, monitor, or pursue the opportunity, the program office
should continue to observe the opportunity for a status change. The program should conduct
a cost-benefit assessment regularly and report the results to decision makers. Figure 6-4
shows a sample opportunity tracking matrix.
Opportunity
1. Opportunity 1: Procure
Smith Rotor blades instead of
Jones rotor blades
2. Opportunity 2 (describe the
opportunity in terms of what it
will provide the program, the
benefit to the program, and
the cost to the program)
3. Opportunity 3 (describe the
opportunity in terms of what it
will provide the program, the
benefit to the program, and
the cost to the program)
Likelihood
Cost
Benefit
RDT&E Procurement O&M Schedule
6 month
$7M margin
$2M
$15K
4% greater
lift
Expected
Activity
Closure
Summarize the
activity to realize the
June 2016
opportunity
$1.1
M
$25K
$211K
Performance
$0.4M
May 2015
4 months less
$3.6 long lead time
M
needed
High
Medium
Low
DoD Risk Management Guide for Defense Acquisition Programs, 7th Edition (Interim Release)
54
Expectations:
Risk, issue, and opportunity management is reviewed during a defined battle rhythm of
meetings.
DoD Risk Management Guide for Defense Acquisition Programs, 7th Edition (Interim Release)
55
Seek program champions within the Service(s) and OSD who can:
o Exert strong management control over critical interfaces with external programs.
o Align funding and priorities (funding, schedule, form factors requirements, etc.) of
external programs.
o Instill in subordinates a sense of urgency in the systems development and fielding.
Ensure interface management is in place to meet cost, schedule, and performance
requirements.
o Ensure internal and external interface requirements are documented in the Interface
Control Documents and Interface Requirement Specifications.
o Establish an Interface Control Working Group to identify and resolve interface issues
at the lowest possible level.
o Develop a time-phased, fast-track issue identification and resolution process that
raises issues sequentially to the PM, PEO, Service acquisition level, and Defense
Acquisition Executive in order to align priorities and resources. For example, if an
issue is not resolved within a specified period such as 2 weeks, it should be elevated
to the next management layer until it is resolved.
Develop Memorandums of Agreements (MOA) with all external programs to identify and
manage critical interfaces. These MOAs should be documented in the Acquisition Strategy
and SEP.
o MOAs between interdependent programs establish roles and responsibilities
associated with dependency. They should include agreements on cost, schedule,
performance, and details (or planning) of any functional and/or physical interfaces.
The status of required MOAs is covered by a mandated table in each programs SEP.
o The MOAs should contain cost/schedule and performance tripwires that require a
program to inform other programs within the family of systems/system-of-systems of
any significant (nominally > 10%) variance in performance, schedule, or cost.
o The contractors should establish Associate Contractor Agreements to facilitate
working relationships.
DoD Risk Management Guide for Defense Acquisition Programs, 7th Edition (Interim Release)
56
Table 7-1 is an example of a notional table of required MOAs from the Acquisition Strategy Outline.
Table 7-1. Notional Table of Required MOAs from the Acquisition Strategy Outline
REQUIRED MEMORANDA OF AGREEMENT
Interface
Cooperating
Agency
Interface
Control
Authority
Required By Date
Impact if Not
Completed
Develop and maintain a synchronized schedule that shows prototyping, technical reviews,
integration and test activities, and acquisition milestones for associated programs. Assess
schedule performance to plan on a regular basis to inform risk identification activities.
Figure 7-1 is an example synchronization schedule from the SEP Outline.
Develop an integration plan that tracks interdependent program touch points, identifies risks,
and institutes a plan to mitigate them. The integration plan should:
o Document the approach to identify interface requirements.
o Define the interface products.
DoD Risk Management Guide for Defense Acquisition Programs, 7th Edition (Interim Release)
57
Hold periodic meetings with all program, contractor, Service, and/or OSD stakeholders to
review cross-program progress, risks, and issues. Build alliances to garner support in the
event of unforeseen risks and issues.
Establish a tiered, regular schedule of meetings with external programs and associated
contractors to promote collaboration and information exchanges. Examples include program
team meetings, risk review boards, Program Management Reviews, meetings among the
PMs, PEOs, and/or the Service Acquisition Executives as issues warrant, etc.
o At a minimum, the meetings should address the synchronization of program schedule
activities, the results of a schedule risk assessment, and the technical, business, and
programmatic risks. The meetings should track performance to plan of planned
maturation activities, as well as any deviations from plans in order to inform risk
control activities; integration and test activities; the adequacy of resources (funding
and personnel); and a review of risks, issues, and opportunities.
o Programs with key external dependencies should have representatives attend each
others technical reviews and meetings with Service and OSD leadership (OIPT,
DAB, and Defense Acquisition Executive Summary meetings, etc.) as interface
issues warrant.
o Programs with key external dependencies with other programs in development should
consider inserting liaisons into one anothers program offices to facilitate
coordination, as well as assess progress and risks.
o To maintain visibility into the health of the interfaces between programs, the
traditional interdependency chart can depict program health and challenges. Figure
7-2 shows an example of a programs tracking of the cost, performance, schedule,
technology, and system-of-systems management with external programs.
DoD Risk Management Guide for Defense Acquisition Programs, 7th Edition (Interim Release)
58
AH-1Z Weapons:
Complementary Systems:
C P S T So Hellfire
C P S T So
AIM-9
AH-1W
C P S T So
UH-1N
C P S T So JAGM APKWS II
AIM-9X
Air-Capable Ships:
LHD C P S T So
LHA
C P S T So LHA(R)
LPD-17
Communication:
SATCOM
VHF/UHF
C P S T So
VMF
C P S T So
Other:
C2
C3/ISR:
MACCS
TACP
GCE
C P S T So
C P S T So
C P S T So
GPS IIF/R
SAASM
C P S T So
JMPS
C P S T So
Solid denotes current system
Expectations:
There is collaboration and a sense of shared destiny between programs with critical
dependencies.
Programs are bound by the agreements documented in MOAs.
o External programs know and accept their space, weight, power, cooling, and
performance allocations.
o Programs that are critically dependent on others agree to provide early warning to
associated programs if their systems exceed the cost, schedule, and/or performance
tripwires established in the SEP and MOAs.
The program schedule reflects sufficient time for integration and test, as well as
corrective actions.
Senior managers implement external risk management, which includes cross-program
risks and risks that the program may be generating for other programs.
DoD Risk Management Guide for Defense Acquisition Programs, 7th Edition (Interim Release)
59
MDD
ICD
MS A
Materiel
Solution
Analysis
MS B
Technology
Maturation and Risk CDD
Reduction
Draft
RFP
MS C
Engineering and
Manufacturing
Development
CPD
FRP/FD
Production and
Deployment
O&S
Draft
RFP
Expectations:
Programs continuously use DoDI 5000.02 acquisition phase entry criteria, ADM
requirements, and entry/exit criteria for upcoming SETRs as a framework for the
programs risk management process.
Risk management is included in RFP formulations, evaluation criteria and the offerors
proposed SOW including tasks and processes to be employed for risk management. Risk
management processes and reporting requirements are flowed down to subcontractors
and suppliers.
DoD Risk Management Guide for Defense Acquisition Programs, 7th Edition (Interim Release)
61
Does the ICD describe the attributes of the desired capabilities in terms of desired outcomes?
Does the ICD contain broad descriptions of desired outcomes help ensure that the required
capabilities are addressed without constraining the solution space to a specific, and possibly
limited, materiel system?
If a materiel approach is recommended, does the ICD contain rationale for the recommended
best solution? Does the ICD make a recommendation on the type of materiel approach
preferred for each capability gap: information system approach, evolutionary development of
an existing capability, or a transformational approach?
Does the ICD describe the capability gaps clearly? Are the capability gaps and the attributes
of the desired capabilities described in terms of desired effects? Are the desired effects
general enough so as not to prejudice decisions in favor of a particular solution?
Are the ICD parameters for the capability attributes stated in measurable terms with measures
and metrics with defined criteria so that the AoA can identify and assess a broad range of
alternatives including near-term options?
Is the expected environment and operating condition of the capability clearly stated in the
definitions of the measures of effectiveness and suitability?
In preparing for the AoA, the acquisition community should assist the sponsoring Service in drafting
the AoA guidance to assess the cost and feasibility of potential solutions to meet identified capability
gaps. In so doing, the acquisition community helps to ensure the AoA identifies risks for each
potential solution being considered, including relative risks between alternatives. The AoA guidance
should require the AoA team to:
Provide early assessment of the risks and acquisition impacts of alternatives under
consideration
Include a requirement for in-depth analysis of cost, schedule performance, and risk with each
proposed alternative.
DoD Risk Management Guide for Defense Acquisition Programs, 7th Edition (Interim Release)
62
Ensure all cost and schedule drivers for alternative solutions and requirements are clearly
identified.
Consider possible tradeoffs among risk, life cycle cost, schedule, and performance objectives
(including mandatory Key Performance Parameters) for each alternative considered
Require an assessment of whether the military requirement can be met in a manner consistent
with the cost and schedule objectives recommended by the requirements validation authority
Consider affordability analysis results and affordability goals if established by the MDA
The acquisition community should expect to support early systems engineering analyses and conduct
an assessment of how the proposed candidate materiel solution approaches are technically feasible
and have the potential to effectively address capability gaps, desired operational attributes, and
associated external dependencies. Because the acquisition community is likely familiar with the
alternatives being considered for the AoA, it can draft effective acquisition approaches for the
different alternatives prior to the MDD. Developing notional schedules for each alternative based on
analogous programs, assessing the technical feasibility of each alternative in areas of software
development, integration, manufacturing, and reliability helps identify risks to be mitigated.
DoD Risk Management Guide for Defense Acquisition Programs, 7th Edition (Interim Release)
63
MDD
AoA
Study
Plan
ICD
RFP
ASR
Draft
CDD
MS A
Govt
Reqts
Review
Plans are made for an AoA to support the selection of a materiel solution by the Service sponsor.
The plans include AoA Guidance and an AoA Study plan. Cost, schedule, technical, and
programmatic risk should be assessed as part of any AoA. This is necessary to inform the available
trade space and to inform the cost benefit analysis that is used to shape affordable technical
development initiatives. DoDI 5000.02 identifies risks as a core element of AoA assessments.
While all known sources of risk should be considered, the program should focus on the following:
Uncertainty (or confidence level) associated with each alternatives schedule estimate,
proposed performance and associated technical risks. Each of these aspects should be
assessed for realism relative to prior analyses and related systems (Engineering and Schedule
Risk).
Interfaces and dependencies that involve other programs. Consideration should be given to
program maturity and risks associated with the interfaces themselves (Integration Risk).
Critical technologies required for each alternative. What is the present maturity of each?
What are the risks associated with bringing the critical technologies to the needed levels of
maturity in a timely and cost effective manner (Technology Risk)?
Key to reducing risk early in the lifecycle is good communications between the requirements
community and the acquisition community in the development of system requirements in JCIDS
documents. The USD(AT&L) BBP 2.0 memo states, acquisition leaders must work with
requirements leaders early and effectively throughout the lifecycle of a product. Poor requirements
definition at inception, requirements rigidity, and instability invariably lead to inefficiencies and
sometimes to program failure. Acquisition leaders need to understand user priorities, and
requirements leaders need to understand cost performance trade-offs and technical risk implications.
Descriptions of activities by phase presented here emphasize risk management. Comprehensive descriptions of
program phases are in the Defense Acquisition Guidebook, Chapter 4 (15 May 2013).
DoD Risk Management Guide for Defense Acquisition Programs, 7th Edition (Interim Release)
64
The SETR conducted during the MSA phase to assess and mitigate risk is the Alternative System
Review (ASR). Following the selection of the preferred materiel solution, the program should hold
an ASR. One purpose of the ASR is to ensure technical risk items are identified and analyzed, and
appropriate control plans are in place. This is an extension of the work begun during the AoA, but
now focused on a single materiel solution. The previous list covers those risks that need to be dealt
with explicitly at this stage. Other sources of risk, peculiar to the chosen solution, should also be
included in the analysis. During the MSA phase, risks of achieving phase exit criteria, as well as
achieving the ASRs entry and exit criteria should be assessed and identified as part of Risk
Identification.
The program needs to plan for the TMRR phase as part of the Milestone A decision. The TMRR
phase is intended to mature an understanding of achievable requirements and develop a sufficient
understanding of the materiel solution to support sound investment decisions at the pre-Engineering
and Manufacturing Development (EMD) Review and at Milestone B. Specific outputs from the
Milestone A decision include an assessment of technical risk and an understanding of the unique
program interdependencies, interfaces, and associated MOAs. Specific risks should be identified for
risk reduction, with exit criteria to be assessed at the end of TMRR. These risks should be captured
in the RFP, inform the development of the program cost and schedule, and inform the acquisition
strategy and any risk reduction prototyping plans.
Expectations:
Programs explicitly assess integration, engineering, schedule, and technology risks
related to alternative materiel solutions.
Programs that depend on products and/or services from other programs are aware of the
risks posed by changes that can occur in the complementary programs schedule and
technical plans. Portfolio managers are aware of the risk of cascading events across the
portfolio.
Programs use the ASR risk assessment checklist to help identify and analyze risks.
MSA phase outputs include a technical strategy that addresses the reduction of technical
risk during the TMRR phase.
Interim DoD Instruction 5000.02, Operation of the Defense Acquisition System, November 25, 2013.
DoD Risk Management Guide for Defense Acquisition Programs, 7th Edition (Interim Release)
65
Risk reduction prototyping (at the system level or at the technology, subcomponents, or
components level if appropriate) if they materially reduce engineering and manufacturing
development risk at an acceptable cost.
Systems engineering trade-off analyses prior to the Requirements Decision Point to show
how cost varies as a function of the major design parameters and support the assessment of
final requirements in the Capability Development Document (CDD).
Preliminary design activities (for example functional analysis, functional allocation, and
preliminary design) up to and including a Preliminary Design Review (PDR) prior to source
selection for the EMD phase.
Figure A-3 displays the risk touch points during the Technology Maturation and Risk Reduction
phase. The SETRs conducted during the TMRR phase to assess and mitigate risk are the System
Requirements Review (SRR), the System Functional Review (SFR), and the PDR. Throughout the
TMRR phase, the program team is expected to conduct a rigorous assessment of technical risk,
determine risk mitigation plans, and work with the PM to resource the mitigation plans.
MS A
Requirements
Decision
Reqts Definition
& Analysis
SRR
TRA
Functional Analysis
SFR
SE Trade-off Analysis
Final
CDD
Dev RFP
Release
Decision
TRA
PDR
Functional Allocation
MS B
PDR
Assessment
Detail
Design
Figure A-3. Technology Maturation and Risk Reduction Phase Touch Points
The program can reduce technology risk by maturing the program critical technologies,
demonstrations in a relevant environment, and assessment of demonstration results against
requirements and stakeholder expectations. The character of risk reduction expected during the
TMRR phase was explained in the directive memorandum for USD(AT&L) initiative Better Buying
Power 2.0 and captured in DoDI 5000.02 as follows:
Technology Readiness Levels, . should he used to benchmark technology risk during this
phase; however, these indices are rough benchmarks, and not conclusive about the degree of risk
mitigation needed prior to development. Deeper analysis of the actual risks associated with the
preferred design and any recommended risk mitigation must be conducted and provided to the
MDA. [(November 26, 2013)]
DoD Risk Management Guide for Defense Acquisition Programs, 7th Edition (Interim Release)
66
During competitive and risk reduction prototyping, risks of achieving SRR entry criteria should be
identified as part of Risk Identification.
The SRR confirms that the user requirements have been translated into system specific technical
requirements, critical technologies are identified, required technology demonstrations are planned,
risks are well understood, and mitigation plans are in place. The SRR ensures that the system under
review is ready to proceed into end-item development, functional analysis, and development of the
system functional baseline with acceptable risk.
The System Functional Baseline is established at the SFR. The SFR ensures that the system under
review is ready to proceed into preliminary design, and that all system requirements and functional
performance requirements derived from the system/subsystem specification (S/SS) are defined,
aligned with the external environment (systems and infrastructure) and consistent with cost (program
budget), schedule (program schedule), acceptable technical risk, and other system constraints. Risk
items associated with functional requirements are identified and analyzed, and control plans put in
place. This checklist can also assist in identifying technical risks associated with the Milestone B
decision.
The PDR occurs following completion of functional allocation and preliminary design. The PDR
confirms that all functions and performance requirements derived from the system specification and
functional baseline are fully decomposed to their lowest level, inclusive of the operational, training,
and support systems, aligned with the external environment (systems and infrastructure) and
consistent with cost (program budget), schedule (program schedule), and other system constraints.
The PDR supports the Milestone B decision and ensures that the system under review is ready to
proceed into detail design (development of manufacturing drawings, software code-to documentation
and other fabrication documentation) with acceptable risk.
The risk-related outputs of the TMRR phase are:
Assessment of whether TMRR phase risks were adequately mitigated. Confirmation at the
end of TMRR phase that critical technologies have been demonstrated in a relevant
environment.
Determination that system requirements, as documented in the CDD are achievable as shown
by fully traceable allocation to CIs and a completed allocated baseline.
Risk control in connection with the unique program interdependencies, interfaces, and
associated MOAs.
DoD Risk Management Guide for Defense Acquisition Programs, 7th Edition (Interim Release)
67
Beyond the structure of a risk management process, it is important that programs establish a viable
means of addressing emerging risks that recognizes the realities of funding allocations on work
priorities. Since emerging risk control alternatives often require additional resources, the outcome
can be inaction or accepting the risk. Accordingly, good risk management practices should include
consideration of contingency funding tailored to the program nature and circumstance.
Expectations:
During the TMRR phase the program team conducts rigorous and persistent assessments
of technical risk, determines risk mitigation plans, and works with the Program Manager
to resource the control plans.
The SFR and PDR risk assessment checklists are used to help identify and analyze risks.
Risks related to completion of each of the artifacts comprising the Functional and
Allocated Baselines were addressed.
The IMS is regularly updated to help manage risks and link identified risks to a specific
task traceable to the IMP and WBS.
Competitive and risk reduction prototyping focused on reducing the specific technical
risks in the design for the actual product to be built and tested in EMD.
All sources of risk have been adequately controlled to support a commitment to design
for production. This includes technology, engineering, integration, manufacturing,
sustainment, and cost risks.
The technical, cost, and schedule risks of acquiring the product are understood, and have
adequate plans and programmed funding to mitigate those risks prior to Milestone B.
Requirements, technology, engineering, integration, manufacturing, logistics, and life
cycle cost risks are addressed to the point that a decision to contract for Engineering and
Manufacturing Development can be made with confidence in successful program
execution for development, production, and sustainment.
Interim DoD Instruction 5000.02, Operation of the Defense Acquisition System, November 25, 2013.
DoD Risk Management Guide for Defense Acquisition Programs, 7th Edition (Interim Release)
68
product baseline for all configuration items, future production or fielding decision. EMD completes
the design process to include defining system
Figure A-4 illustrates the risk touch points during the EMD phase. The SETRs conducted during the
EMD phase to assess and mitigate risk are the Critical Design Review (CDR), the System
Verification Review (SVR), the Functional Configuration Audit (FCA), and the Production
Readiness Review (PRR). The risk management activities turn from a focus on technology
maturation to transition from development to production. The program identifies risks related to
critical manufacturing process and key product characteristics. Specific risk areas are:
Requirements Stability
Manufacturing
Supply Chain
Final
CPD
MS B
IBR
CDR
Detail Design
CDR
Assessment
TRR
SVR
MS C
PRR
Initial Fabrication
Figure A-4. Engineering and Manufacturing Development Phase Risk Touch Points
As in the TMRR phase, consideration of risk and risk control are important components of the
successive technical reviews. Following Milestone B and during the detail design work effort, risks
of achieving CDR entry criteria should be identified.
The CDR confirms that all functions and performance requirements derived from the system
specification, functional baseline, and allocated baseline are captured in the initial product baseline
(build-to documentation), inclusive of the operational, training, and support systems, aligned with the
external environment (systems and infrastructure) and consistent with cost (program budget),
schedule (program schedule), and other system constraints. The CDR ensures that the system under
review is ready to proceed into hardware fabrication and software coding with acceptable risk.
Following CDR and during the initial fabrication work effort, risks of achieving SVR, FCA, and
PRR entry criteria should be identified.
The SVR confirms that all tests and verification of functions are complete, and establishes and
verifies final product performance. The SVR ensures that the system under review can proceed into
LRIP with acceptable risk.
DoD Risk Management Guide for Defense Acquisition Programs, 7th Edition (Interim Release)
69
A FCA may also be conducted concurrently with the SVR. The FCA is the formal examination of
the as-tested characteristics of a configuration item (hardware and software) with the objective of
verifying that actual performance complies with design and interface requirements in the functional
baseline. A successful FCA typically demonstrates that the EMD product is sufficiently mature for
entrance into Low-Rate Initial Production (LRIP).
The PRR reviews the readiness of the manufacturing processes, the quality system, the availability of
materials, and the production planning (facilities, tooling and test equipment capacity, personnel
development and certification, process documentation, inventory management, supplier management,
etc.). Successful completion of the PRR establishes that the system requirements are fully met in the
final production configuration and that production capability forms a satisfactory basis for
proceeding into LRIP with acceptable risk.
The SVR, the FCA, and the PRR, are sometimes held concurrently. These SETRs have as a single
goal, from the risk perspective, to be an assessment of the product and processes to ensure the system
under review can proceed to validation and LRIP and full-rate production within cost, schedule, risk,
and other system constraints. Success in these reviews reduces the risk in operational test and
evaluation.
Expectations:
Programs use the CDR risk assessment checklists to help identify and analyze risks.
Risks related to completion of each of the artifacts comprising the Initial Product
Baseline are addressed.
The program completes a technical risk assessment for entering into fabrication of
hardware and software configuration items with a determination of acceptable risk for
full commitment to fabrication, construction/coding, and/or purchase.
Programs use the SVR/FCA/PRR risk assessment checklists to assist in identifying
and analyzing technical risks for Milestone C.
Programs assess the maturity of critical manufacturing processes to ensure they are
affordable and executable.
DoD Risk Management Guide for Defense Acquisition Programs, 7th Edition (Interim Release)
70
Identifying acceptable risks and mitigation plans for achieving Initial Operational Capability
(IOC) and Full Operational Capability (FOC)
MS C
IBR
OTRR
FRP/FD
PCA
Production
Following Milestone C and during Production, the risks of successfully completing Initial
Operational Test and Evaluation and achieving the Physical Configuration Audit (PCA) should be
identified as part of Risk Identification. The PCA, which may be conducted during the P&D phase,
is a formal audit of the verification and validation results against the Product Baseline and the
Capability Production Document. One exit criterion is the determination of acceptable technical risk
for fielding and sustainment.
Expectations:
The program team conducts rigorous production risk assessments and puts in place plans
and resources to effectively mitigate any unacceptable risks.
Programs use the PCA risk assessment checklists to help identify and analyze risks.
IOC and FOC risks are acceptable.
The RMP is updated to include assessment of sustainment related risks.
For mission-critical functions and components, the program obtains an analysis of
supply chain risk.
Prior to the production decision, the program ensures that all unacceptable
manufacturing risks are addressed and that applicable manufacturing processes are under
statistical process.
DoD Risk Management Guide for Defense Acquisition Programs, 7th Edition (Interim Release)
71
Expectations:
The program team continuously monitors service usage, problem reports, parts
availability/obsolescence, engineering modifications, technology insertions, and
operational hazards.
When necessary, program teams implements plans and resources to effectively mitigate
any identified unacceptable risks.
DoD Risk Management Guide for Defense Acquisition Programs, 7th Edition (Interim Release)
72
Program Schedule technical assessments have found 42% of program schedules are not
realistic and 28% of programs are not likely to achieve the planned schedule
Budget 38% of program budgets are not sufficient for the effort required
Acquisition Strategy assessments have found 32% of programs need restructuring of the
programs acquisition strategy
Reliability Performance 26% of programs have not established a reliability growth plan
Risk Management 25% of programs do not have sufficient risk management tools or do not
use appropriate risk management methodologies
Requirements Development Requirements are vague, poorly stated, or not defined in 25%
of programs
DoD Risk Management Guide for Defense Acquisition Programs, 7th Edition (Interim Release)
73
Develop design concepts to assess the state of the possible and inform requirements, RFP,
and source selection activities.
Hold a Government only requirements review to ensure the proper translation of the user
requirements into the performance specification.
To facilitate the success of the program, ensure that it is guided by a small set of key
requirements (e.g., minimize the number of KPPs and KSAs per CJCSI 3170 to preclude
impacting the contractors trade space).
Ensure that the Government and bidding contractors have a complete and common
understanding of the requirements:
o Solicit Industry feedback regarding the feasibility of requirements, unit costs, and
maturity of envisioned technologies via industry days, individual meetings with
prospective bidders, and requests for information.
o Provide a crosswalk between the performance specification and draft CDD in the
Request for Proposal.
Establish the requirement in the performance specification for an open systems architecture
which enables a cost effective and rapid development of systems that are interoperable in the
joint battle space. Open systems architecture contains vendor-independent, non-proprietary
system or device design based on official and/or popular standards. It allows all vendors (in
competition with one another) to create add-on products that increase a systems (or devices)
flexibility, functionality, interoperability, potential use, and useful life.
DoD Risk Management Guide for Defense Acquisition Programs, 7th Edition (Interim Release)
74
Conduct systems engineering trade-off analysis to assess their affordability and technical
feasibility. The systems engineering trade-off analysis should:
o Depict the relationship between life cycle cost, system performance requirements,
design parameters and delivery schedules.
o Show how cost varies and a function of system requirements (including Key
Performance Parameters, major design parameters and schedule.
o Identify affordability drivers to the MDA and how the program meets affordability
constraints.
o Be reassessed over the acquisition life cycle as system requirements, design,
manufacturing, test, and logistics activities evolve and mature.
For trade studies affecting KPP/KSAs, a defined decision hierarchy should be developed to
timely mitigate technical risks and their potential impact on the schedule.
o If trade study decisions are not made within 2 weeks after the completion of the trade
study, they need to be continually escalated to the next level until a binding decision
is made.
o To ensure timely decisions, the PM should be empowered to make decisions on all
requirements below the KSA level.
Prototyping activities conducted during the TMRR phase should be representative of the
planned end item design in order to have merit in informing trade-studies and mitigating
integration, technology, technical and/or engineering risks.
o Ensure stable requirements to preclude requirements changes which negate the
relevance of prototyping and associated investments.
Prepare a post Milestone SEP update (Service Approved) that reflects the contractor(s)
technical planning (e.g., detailed schedule, TPMs, the contractors organization, etc.). This
establishes the baseline for assessing performance to plan in order to inform risks and
required risk mitigation activities.
o Interim values for TPMs should be developed and reviewed during the normal battle
rhythm of program activities to inform areas of potential risk.
EMD Phase
Avoid requirements creep. All new requirements should be pushed to the next increment
resultant to mitigate resultant performance, cost, and schedule risks.
DoD Risk Management Guide for Defense Acquisition Programs, 7th Edition (Interim Release)
75
Hold annual Configuration Steering Board (CSB) meetings to ensure technical performance
requirements are balanced with the allocated schedule and funding.
o CSBs and/or Knowledge Point reviews should include the requirements community
and assess: problematic requirements; Systems engineering trade-off analysis; cost
and schedule driving requirements; and the sensitivity of requirements.
o In accordance with BBP 2.0, CSBs should be highly visible to and coordinated with
the JROC , particularly when required changes to KPPs or KSAs could jeopardize a
programs military utility or affordability
In order to mitigate technology, technical, integration, or performance risks; work with the
user to define a capabilities roadmap that facilitates fielding the initial increment of capability
within the allocated schedule and funding.
Based on insights from the critical design review and testing, ensure that the final CDD
reflects low risk achievable requirements to reduce performance risks during the OT&E.
Plan for contingencies and technical risk mitigation activities, by establishing schedule,
performance and cost margins.
Allocate SWAP-C requirements to all components and systems, and ensure that realistic
growth margins are established to accommodate growth as the program progresses through
development and transitions into production.
Limit the number of critical technologies (<Technology Readiness Level (TRL) 6).
o Structure TMRR phase activities to confirm during the hardware build, integration,
and test activities that performance at TRL 6 or higher can been demonstrated by MS
B.
Ensure that the TMRR phase RFP requires the contractors TMRR phase proposals to:
o Include an assessment of the maturity of proposed technologies.
o Identify mature alternative technologies for any technology that is assessed to be less
that TRL 6.
o Identify resourced off-ramps in the Integrated Master Schedule (IMS), submitted with
the contractors proposal, for technologies that are not maturing as planned.
DoD Risk Management Guide for Defense Acquisition Programs, 7th Edition (Interim Release)
76
Ensure that the IMS includes resourced off-ramps for technologies that are not maturing as
planned; Execute off-ramps as planned to mitigate performance and schedule risks.
Develop a competitive and risk reduction prototyping strategy is focused on burning down
technical risk areas in order to give the program a clear understanding of technical risks (e.g.,
technology, engineering and integration).
Solicit an integration plan, IMS through prototype delivery, and drawings/models in the
TMRR phase Request for Proposal to assess the bidding contractors understanding of the
technical associated with developing the systems effort and required planning to execute it.
This precludes the discovery of serious design issues late in the development
process which can delay a program at a great expense due to the delays in the
contractor teams efforts.
These activities prior to the commitment to EMD can make all the difference
between a successful EMD and one that experiences massive overruns.
DoD Risk Management Guide for Defense Acquisition Programs, 7th Edition (Interim Release)
77
o Reflects a full set of event driven developmental test activities across the programs
acquisition lifecycle (e.g., hardware in the loop testing in system integration
laboratories, environmental stress screening at the subsystem level, reliability growth
testing and software testing in emulators) to support risk reduction, design validation,
and requirements verification.
Is structured to provide program management and technical leadership insights into the
technical, technology, and integration risks, which may impact the systems compliance with
user and specification requirements4.
Ensure that the RFP contains a requirement for the winning contractors to perform
shakedown testing with defined success criteria to facilitate resolving integration activities
and early failures modes prior to the start of Government testing.
EMD Phase
Burn down integration risks through the use of a combination of component/subsystem hot
benches, Systems Integration Labs (SIL), high value test assets, early prototypes and full
prototypes.
Utilize early prototypes as part of the normal integration process for complex systems to:
o Facilitate the integration of major subsystems and infrastructural components; as well
as the discovery/resolution of subsystem-level interaction issues.
o Provide evidence of systems integration maturity and risk burn down through the
Government check out of the system prior to full prototype build and qualification
testing.
o Provide the first exposure of the system to stressing environments.
o Provide early feedback of the system design to inform the Critical Design Review.
o Help mitigate technical, cost and schedule risks associated with full prototypes.
Examples of technical issues uncovered by early prototypes:
Mechanical fit, alignment and interface issues between subsystems or with
structures.
Assembly/maintenance access issues.
Shielding and grounding issues with cables and boxes.
Communications issues such as boxes not responding as expected or signal
noise caused by impedance mismatches, shielding and grounding
Frank Kendall, Perspectives on Developmental Test and Evaluation, March 2013 https://acc.dau.mil/adl/enUS/653463/file/72222/March_2013_ITEA_Journal_Kendall_Dev_Test.pdf
DoD Risk Management Guide for Defense Acquisition Programs, 7th Edition (Interim Release)
78
Fault thresholds set too tight that contribution to the unnecessary shutdown of
boxes or subsystem
The EMD phase schedule reflects the completion of qualification testing prior to the Low
Rate Initial Production decision.
Develop a low risk program schedule early in the program. The schedule should:
o
o
o
o
o
o
Assess the contractors Integrated Master Schedule during source selection to assess the
contractors understanding of the technical effort and required phasing of the work package.
Avoid the urgency of schedule need outweighing good engineering and program
management.
Ensure that the program schedule reflects realistic and event-driven phasing for systems
engineering, integration, and test activities, to include sufficient time for integration activities
and corrective actions.
The program has Tier 2 and below schedules that show technical and integration activities
such as:
o Technical reviews, program management reviews, technical interchange meetings
which address technical and integration efforts reflected.
o Stand-up of system integration laboratories and contractor and/or Government
facilities.
o Integrated system performance of full-up prototype prior to MS C.
o Development, integration, and test activities with external programs.
DoD Risk Management Guide for Defense Acquisition Programs, 7th Edition (Interim Release)
79
Program management control efforts include the linkage between the Integrated Master Plan
(IMP), Integrated Master Schedule (IMS), Technical Performance Measures, risk
management, and earned value management.
o The IMS depicts a likely progression of effort and work through the remaining
activities and events in the acquisition phase.
o The IMS contains activities to perform all integration activities (e.g., modeling &
simulation, hardware and software integration, distributed simulation, component,
subsystems, system, Family of Systems and/or system-of-system-level integration).
The IMS reflects:
Resourced off-ramps related to high risk technologies and integration
challenges.
The integration of schedules with key subcontractors and suppliers.
Delivery schedules and integration activities with external programs.
Conduct Schedule Risk Assessments on a regular basis to assess risks and inform mitigation
activities associated with achieving the next systems engineering technical review, major test
event, and acquisition milestones.
To mitigate program execution risks, garner and sustain the support of senior leadership from
within the acquiring command and user.
o Build and maintain a robust external senior leader stakeholder group.
Establish an empowered working group with representatives from each
organization.
Pull in every organization that could possibly support/derail the program.
Ensure stakeholders understand the basis for the technical requirements, so they own and
support them.
Ensure they understand the need to control requirements creep.
o Track key leader turnover in each organization; brief the new leadership on the
importance of the program.
DoD Risk Management Guide for Defense Acquisition Programs, 7th Edition (Interim Release)
80
Build alliances with all stakeholders who can provide support in mitigating inevitable
technical, programmatic, and business risks.
o Ensure transparency with Service, user, OSD, and Congressional stakeholders by
providing them with progress of ongoing efforts (e.g., competitive and risk reduction
prototyping, systems engineering trade-off analysis, and knowledge point reviews) on
a regular basis and the impact of any proposed funding reductions.
o Hold Working Integrated Product Team (WIPT) meetings (e.g., systems engineering,
acquisition, test and evaluation, etc.) with the Office of the Secretary of Defense and
Service staff engineers on a regular basis to the assess system maturation (e.g.,
performance to plan of Technical Performance Measures) as well as any associated
risks, issues, and/or opportunities.
When the fielding of a new system that is critically dependent on other programs outside of the PEOs
portfolio or from another Service, the following activities can aid in the management and alignment
of activities:
Seek program champions within the Service(s) and Office of the Secretary of Defense who
can:
o Exert strong management control over critical interfaces with external programs.
o Align funding and priorities (funding, schedule, form factors requirements, etc.) of
external programs.
o Instill in subordinates a sense of urgency in the systems development and fielding.
DoD Risk Management Guide for Defense Acquisition Programs, 7th Edition (Interim Release)
81
Develop Memorandums of Agreements (MoA) with all external programs in order to identify
and manage the critical interfaces. These MOAs should be documented in the Acquisition
Strategy and SEP.
o MOAs between inter-dependent programs establish roles and responsibilities
associated with dependency. They should include agreements on cost, schedule,
performance, and details (or planning) of any functional and/or physical interfaces.
The status of required MOAs is covered by a mandated table in each programs SEP.
o The MoAs should contain cost/schedule and performance tripwires that require a
program to inform other programs within the Family of Systems/System-of-systems
of any significant (nominally > 10%) variance in cost, schedule, or performance.
o Associate Contractor Agreements should also be put in place between the contractors
to facilitate working relationships between them.
Develop and maintain a synchronized schedule that shows prototyping, technical reviews,
integration and test activities, and acquisition milestones for associated programs. Assess
schedule performance to plan on a regular basis to inform risk identification activities.
Develop an integration plan which tracks interdependent program touch points, identifies
risks, and institutes a plan to mitigate them. The integration plan should document the
approach to identify interface requirements, interface products, candidate integration
sequences, a coordinated delivery of verified Configuration Items, along with the integration
test approach and facilities.
To mitigate integration risks, promote strong communication and teamwork between the
PMs of external programs, and the Contractors.
Hold periodic meetings with all program, contractor, Service and/or Office of the Secretary
of Defense stakeholders to review cross program progress, risks and issues. Build alliances
to garner support in the event of unforeseen risks and issues.
Establish a tiered battle rhythm of meetings with external programs and associated
contractors (e.g., meetings at the IPT level, as well as PM and PEO levels) to promote
collaboration and information exchanges. Examples include IPT meetings, risk review
boards, Program Management Reviews, meetings between the PMs, PEOs and /or the
Service Acquisition Executives as issues warrant; etc.).
o At a minimum, the meetings should address the synchronization of program schedule
activities; results of schedule risk assessments; technical, business and programmatic
risks; the performance to plan of planned maturation activities as well as any
deviations from plans in order to inform risk control activities; integration and test
activities; and the adequacy of resources (funding and personnel); and a review of
risks, issues and opportunities.
o Programs with key external dependencies should have representatives attend each
others technical reviews, and meetings with Service and OSD leadership
DoD Risk Management Guide for Defense Acquisition Programs, 7th Edition (Interim Release)
82
Establish a funding instability risk in the risk register to be prepared to substantiate the impact of any
proposed funding reductions, including any resultant technical, technology, integration and/or
engineering risks.
Keep the cost team busy with quantifying the technical impact of what if funding cut
scenarios, such as 5%, 10%, 15%, etc. reductions.
o Understand the impacts and mitigations before the question is asked.
Solicit information from the requirements sponsors who know the capability priorities which
cannot be deferred.
Dont mask the impacts of proposed realized funding reductions. Ensure that leadership fully
understands the implications of the funding cut. On the other hand, dont overstate the
impact either since program credibility is on the line.
DoD Risk Management Guide for Defense Acquisition Programs, 7th Edition (Interim Release)
83
8231
Linked
WBS/IMS
ID#
3.2.2
Owner
Mr.
Bill
Smith
Type of
Risk
Technical
Status
Open
Tier
Risk Event
II
Excessive
number of
priority 1
and 2
software
defects
may
cause a
delay to
the start
of IOT&E
Likelihood
Rating
Consequence
Rating
Risk
Reporting
Matrix
Risk
Mitigation
Strategy
Yellow
Submitted
Date
Board
Review
Planned
Closure
8/23/2013
1/14/2014
2/12/2014
DoD Risk Management Guide for Defense Acquisition Programs, 7th Edition (Interim Release)
84
Expected
Risk
Rating
Plan
Status
Green
(1-4)
ontrack
2. Risk Cube
Risk ID Number: 31
Risk Driver:
Risk Mitigation Action:
- Cost: $
Closure Date:
Cost Impacts:
- RDT&E: $ or %
- Production: $ or %
Schedule Impacts:
- Months:
Performance Impacts:
- Only achieves XX% of
aaa KPP performance
Risk ID Number: 22
Risk Driver:
Risk Mitigation Action:
- Cost: $
Closure Date:
Cost Impacts:
- Production: $ or %
- O&M: $ or %
Schedule Impacts:
- Months:
Risk ID Number: 4
Risk Driver:
Risk Mitigation Action:
- Cost: $
Closure Date:
Cost Impacts:
- Production: $ or %
Schedule Impacts:
- Months:
Performance Impacts:
- May trade xyz
performance
Risk ID Number: 99
Risk Driver:
Risk Mitigation Action:
- Cost: $
Closure Date:
Cost Impacts:
- RDT&E: $ or %
- Production: $ or %
- O&M: $ or %
Schedule Impacts:
- Months:
Performance Impacts:
- Only YY% of abc KSA
performance
Risk ID Number: 18
Risk Driver:
Risk Mitigation Action:
- Cost: $
Closure Date:
Cost Impacts:
- RDT&E: $ or %
- Production: $ or %
Schedule Impacts:
- Months:
DoD Risk Management Guide for Defense Acquisition Programs, 7th Edition (Interim Release)
85
DoD Risk Management Guide for Defense Acquisition Programs, 7th Edition (Interim Release)
86
Issue
Type
Consequence
T/B/P
Closure Activities
Activity 1
Tech (T)
Activity 2
Activity 3
DoD Risk Management Guide for Defense Acquisition Programs, 7th Edition (Interim Release)
87
Amount ($)
$420K
$2.1M
Opportunity
1. Opportunity 1: Procure
Smith Rotor blades instead of
Jones rotor blades
2. Opportunity 2 (describe the
opportunity in terms of what it
will provide the program, the
benefit to the program, and
the cost to the program)
3. Opportunity 3 (describe the
opportunity in terms of what it
will provide the program, the
benefit to the program, and
the cost to the program)
Cost
Benefit
RDT&E Procurement O&M Schedule
6 month
$7M margin
$2M
$15K
4% greater
lift
Expected
Activity
Closure
Summarize the
activity to realize the
opportunity
June 2016
$1.1
M
$25K
$211K
Performance
$0.4M
4 months less
$3.6 long lead time
M
needed
High
Medium
Low
DoD Risk Management Guide for Defense Acquisition Programs, 7th Edition (Interim Release)
88
May 2015
1.0
1.0
2.0
3.0
2.0
1.0
2.0
3.0
1.0
2.0
3.0
2.0
3.0
3.0
3.0
3.0
th
DoD Risk Management Guide for Defense Acquisition Programs, 7th Edition (Interim Release)
89
ACRONYMS
APB
Cost
CDD
CDR
COTS
commercial-off-the-shelf
CPD
CPR
DAB
DAES
DAG
DAP
DAU
DoD
Department of Defense
DoDD
DoDI
EAC
Estimate at Completion
ESOH
EVM
FAA
IBR
ICD
IMP
IMS
IOT&E
IPT
JCIDS
KPP
KSA
LCC
LCCE
LCSP
LRIP
DoD Risk Management Guide for Defense Acquisition Programs, 7th Edition (Interim Release)
90
Acronyms
MAIS
MDAP
M&S
MDA
MDD
OIPT
O&M
O&S
OSD
OUSD(AT&L) Office of the Under Secretary of Defense for Acquisition, Technology, and
Logistics
P
Performance
PDR
PEO
PM
Program Manager
PMR
RFP
RM
Risk Management
RMB
RMP
SE
Systems Engineer
SEMP
SEP
SME
SRA
TDS
TEMP
TES
TPM
TRA
WBS
DoD Risk Management Guide for Defense Acquisition Programs, 7th Edition (Interim Release)
91
REFERENCES
Department of Defense Directive (DoDD) 5000.01. 2003. The Defense Acquisition System.
Washington, D.C.: Under Secretary of Defense for Acquisition, Technology, and Logistics.
Interim Department of Defense Instruction (DoDI) 5000.02. November 25, 2013. Operation of the
Defense Acquisition System. Washington, D.C.: Under Secretary of Defense for Acquisition,
Technology, and Logistics.
MIL-STD-881C. 2011. Work Breakdown Structures for Defense Materiel Items. Washington,
D.C.: Office of the Assistant Secretary of Defense for Acquisition, Performance Assessments,
and Root Cause Analysis.
https://acc.dau.mil/CommunityBrowser.aspx?id=482538
Public Law 111-23, 111th Cong. (May 22, 2009.) Weapon Systems Acquisition Reform Act of 2009.
Principal Deputy Under Secretary of Defense for Acquisition, Technology, and Logistics
(PDUSD(AT&L)). 2011. Document Streamlining Document StreamliningProgram
Strategies and Systems Engineering Plan (SEP). Memorandum (April 20). Washington, D.C.:
PDUSD(AT&L).
http://www.acq.osd.mil/se/docs/PDUSD-ATLMemo-Expected-Bus-Practice-TDS_AS_SEP20Apr11.pdf
http://www.acq.osd.mil/se/docs/PDUSD-Approved.SEP_Outline-04-20-2011.docx
Under Secretary of Defense for Acquisition, Technology, and Logistics (USD(AT&L)). 2012.
Better Buying Power 2.0: Continuing the Pursuit for Greater Efficiency and Productivity in
Defense Spending. Memorandum (November 13). Washington, D.C.: USD(AT&L).
DoD Risk Management Guide for Defense Acquisition Programs, 7th Edition (Interim Release)
92
References
Resources
Best Manufacturing Practices Center of Excellence
http://www.bmpcoe.org/
Circular No. A11 , Part 7, Planning, Budgeting, Acquisition, and Management of Capital Assets
http://www.whitehouse.gov/sites/default/files/omb/assets/a11_current_year/s300.pdf
Defense Acquisition Guidebook
https://dag.dau.mil/Pages/Default.aspx
Defense Acquisition Portal
https://dap.dau.mil/Pages/Default.aspx
DoDD 5200.01, DoD Information Security Program
http://www.dtic.mil/whs/directives/corres/pdf/520001p.pdf
DoDD 5200.39, Critical Program Information (CPI) Protection Within the Department of Defense
http://www.dtic.mil/whs/directives/corres/pdf/520039p.pdf
DoDI 8510.01, Risk Management Framework (RMF) for DoD Information Technology (IT)
http://www.dtic.mil/whs/directives/corres/pdf/851001_2014.pdf
DoD Earned Value Management
http://www.acq.osd.mil/evm/
DoD Earned Value Management Implementation Guide (EVMIG)
https://acc.dau.mil/CommunityBrowser.aspx?id=386074
MIL-STD-882E, Standard Practice for System Safety
http://acqnotes.com/acqnote/tasks/mil-std-882e-system-safety
Program Managers Guide to the Integrated Baseline Review Process
https://acc.dau.mil/CommunityBrowser.aspx?id=37635
Risk Management Community of Practice
https://acc.dau.mil/CommunityBrowser.aspx?id=17607
DoD Risk Management Guide for Defense Acquisition Programs, 7th Edition (Interim Release)
93
Department of Defense Risk Management Guide for Defense Acquisition Programs, 7th Edition
(Interim Release)
Deputy Assistant Secretary of Defense
Systems Engineering
3030 Defense Pentagon
3C167
Washington, DC 20301-3030
Email: [email protected]
Website: www.acq.osd.mil/se
Distribution Statement A: Approved for public release.