Asset Criticality Analysis
Deploy ACA for the First Time
Before You Begin
The following tables outline the steps that you must complete to upgrade this module to the latest version of Predix Essentials .
These tasks may be completed by multiple people in your organization. We recommend, however, that the tasks be completed in the order in which they are listed.
Results
Step | Task | Notes |
---|---|---|
1 | Assign Security Users to one or more of the ACA Security Groups and Roles. | This step is required. |
2 | Optional: Configure Criticality Definition records to use a Checklist as the Criticality Assessment method instead of the Risk Matrix. | To configure to use a Checklist, select the Use Checklist field and select the desired family from the Checklist Family field. To associate a Criticality Definition record with a Site, link the Criticality Definition record to a Site Reference record. The Criticality Checklist family datasheet and Before Insert Family Policy can be configured to implement the desired assessment input fields and criticality value calculation logic. |
Upgrade ACA
Before You Begin
The following table outlines the steps that you must complete to deploy and configure this module for the first time.
These tasks may be completed by multiple people in your organization. GE Digital recommends, however, that the tasks be completed in the order in which they are listed.
Procedure
This module will be updated to the latest version of Predix Essentials automatically. No additional steps are required.
ACA Security Groups
The following table lists the baseline Security Groups available for users within this module, as well as the baseline Roles to which those Security Groups are assigned. In Predix Essentials, Roles are assigned to Security Users through permission sets.
Security Group | Roles |
---|---|
MI ACA Administrator | MI Foundation Admin |
MI ACA Member |
MI Foundation Admin MI Foundation Power MI Foundation User MI APM Viewer |
MI ACA Owner |
MI Foundation Admin MI Foundation Power |
The baseline family-level privileges that exist for these Security Groups are summarized in the following table.
Family | MI ACA Administrator | MI ACA Member | MI ACA Owner |
---|---|---|---|
Entity | |||
Asset Criticality Analysis | View, Update, Insert, Delete | View | View, Update, Insert, Delete |
Asset Criticality Analysis Has System | View, Update, Insert, Delete | View | View, Update, Insert, Delete |
Asset Criticality Analysis System | View, Update, Insert, Delete | View | View, Update, Insert, Delete |
Consequence | View, Update, Insert, Delete | View | View |
Consequence Modifier | View, Update, Insert, Delete | View | View |
Criticality Mapping | View | View | View |
Equipment | View | View | View |
Functional Location | View | View | View |
Analysis Has Human Resource | View, Update, Insert, Delete | View | View, Update, Insert, Delete |
Human Resource | View, Update, Insert, Delete | None | View, Update, Insert, Delete |
General Recommendation | View, Update, Insert, Delete | View | View, Update, Insert, Delete |
Mitigates Risk | View, Update, Insert, Delete | View | View, Update, Insert, Delete |
Notification | View, Update, Insert, Delete | View | View, Update, Insert, Delete |
Probability | View, Update, Insert, Delete | View | View |
Protection Level | View | View | View |
RCM FMEA Analysis | View | None | None |
Reference Document | View, Update, Insert, Delete | View | View, Update, Insert, Delete |
Risk | View, Update, Insert, Delete | View | View, Update, Insert, Delete |
Risk Assessment | View, Update, Insert, Delete | View | View, Update, Insert, Delete |
Risk Category | View, Update, Insert, Delete | View | View, Update, Insert, Delete |
Risk Matrix | View, Update, Insert, Delete | View | View, Update, Insert, Delete |
Risk Threshold | View, Update, Insert, Delete | View | View |
Safety Analysis Has Equipment | View, Update, Insert, Delete | View | View, Update, Insert, Delete |
Site Reference | View | View | View |
System Strategy | View | None | None |
Relationship | |||
Equipment Has Equipment | View | View | View |
Functional Location Has Equipment | View | View | View |
Functional Location Has Functional Location | View | View | View |
Has Criticality Mapping | View | View | View |
Has Functional Location | View, Update, Insert, Delete | View | View, Update, Insert, Delete |
Has RCM FMEA Analysis | View | None | None |
Has Recommendations | View, Update, Insert, Delete | View | View, Update, Insert, Delete |
Has Reference Documents | View, Update, Insert, Delete | View | View, Update, Insert, Delete |
Has Reference Values | View, Update, Insert, Delete | View | View |
Has Risk | View, Update, Insert, Delete | View | View, Update, Insert, Delete |
Has Risk Category | View, Update, Insert, Delete | View | View, Update, Insert, Delete |
Has Risk Matrix | View, Update, Insert, Delete | View | View, Update, Insert, Delete |
Has Site Reference | View, Update, Insert, Delete | View | View, Update, Insert, Delete |
Has Strategy | View | None | None |