Asset Criticality Analysis
Deploy ACA for the First Time
Before You Begin
The following tables outline the steps that you must complete to upgrade this module to V4.6.10.0.0. These instructions assume that you have completed the steps for upgrading the basic APM system architecture.
These tasks may be completed by multiple people in your organization. We recommend, however, that the tasks be completed in the order in which they are listed.
Results
Step | Task | Notes |
---|---|---|
1 | Assign Security Users to one or more of the ACA Security Groups and Roles. | This step is required. |
2 | Review the ACA data model to determine which relationship definitions you will need to modify to include your custom equipment and location families. Via Configuration Manager, modify the relationship definitions as needed. | This step is required only if you store equipment and location information in families other than the baseline Equipment and Functional Location families. |
3 | Optional: Configure Criticality Definition records to use a Checklist as the Criticality Assessment method instead of the Risk Matrix. | To configure to use a Checklist, select the Use Checklist field and select the desired family from the Checklist Family field. To associate a Criticality Definition record with a Site, link the Criticality Definition record to a Site Reference record. The Criticality Checklist family datasheet and Before Insert Family Policy can be configured to implement the desired assessment input fields and criticality value calculation logic. |
Upgrade or Update ACA to V4.6.10.0.0
Before You Begin
The following table outlines the steps that you must complete to deploy and configure this module for the first time. These instructions assume that you have completed the steps for deploying the basic system architecture.
These tasks may be completed by multiple people in your organization. GE Vernova recommends, however, that the tasks be completed in the order in which they are listed.
Procedure
ACA Security Groups
The following table lists the baseline Security Groups available for users within this module, as well as the baseline Roles to which those Security Groups are assigned.
Security Group | Roles |
---|---|
MI ACA Administrator | MI Foundation Admin |
MI ACA Member |
MI Foundation Admin MI Foundation Power MI Foundation User MI APM Viewer |
MI ACA Owner |
MI Foundation Admin MI Foundation Power |
The baseline family-level privileges that exist for these Security Groups are summarized in the following table.
Family | MI ACA Administrator | MI ACA Member | MI ACA Owner |
---|---|---|---|
Entity | |||
Asset Criticality Analysis | View, Update, Insert, Delete | View | View, Update, Insert, Delete |
Asset Criticality Analysis Has System | View, Update, Insert, Delete | View | View, Update, Insert, Delete |
Asset Criticality Analysis System | View, Update, Insert, Delete | View | View, Update, Insert, Delete |
Consequence | View, Update, Insert, Delete | View | View |
Consequence Modifier | View, Update, Insert, Delete | View | View |
Criticality Mapping | View | View | View |
Equipment | View | View | View |
Functional Location | View | View | View |
Analysis Has Human Resource | View, Update, Insert, Delete | View | View, Update, Insert, Delete |
Human Resource | View, Update, Insert, Delete | None | View, Update, Insert, Delete |
General Recommendation | View, Update, Insert, Delete | View | View, Update, Insert, Delete |
Mitigates Risk | View, Update, Insert, Delete | View | View, Update, Insert, Delete |
Notification | View, Update, Insert, Delete | View | View, Update, Insert, Delete |
Probability | View, Update, Insert, Delete | View | View |
Protection Level | View | View | View |
RCM FMEA Analysis | View | None | None |
Reference Document | View, Update, Insert, Delete | View | View, Update, Insert, Delete |
Risk | View, Update, Insert, Delete | View | View, Update, Insert, Delete |
Risk Assessment | View, Update, Insert, Delete | View | View, Update, Insert, Delete |
Risk Category | View, Update, Insert, Delete | View | View, Update, Insert, Delete |
Risk Matrix | View, Update, Insert, Delete | View | View, Update, Insert, Delete |
Risk Threshold | View, Update, Insert, Delete | View | View |
Safety Analysis Has Equipment | View, Update, Insert, Delete | View | View, Update, Insert, Delete |
Site Reference | View | View | View |
System Strategy | View | None | None |
Relationship | |||
Equipment Has Equipment | View | View | View |
Functional Location Has Equipment | View | View | View |
Functional Location Has Functional Location | View | View | View |
Has Criticality Mapping | View | View | View |
Has Functional Location | View, Update, Insert, Delete | View | View, Update, Insert, Delete |
Has RCM FMEA Analysis | View | None | None |
Has Recommendations | View, Update, Insert, Delete | View | View, Update, Insert, Delete |
Has Reference Documents | View, Update, Insert, Delete | View | View, Update, Insert, Delete |
Has Reference Values | View, Update, Insert, Delete | View | View |
Has Risk | View, Update, Insert, Delete | View | View, Update, Insert, Delete |
Has Risk Category | View, Update, Insert, Delete | View | View, Update, Insert, Delete |
Has Risk Matrix | View, Update, Insert, Delete | View | View, Update, Insert, Delete |
Has Site Reference | View, Update, Insert, Delete | View | View, Update, Insert, Delete |
Has Strategy | View | None | None |