Module: Solution Prioritization
This action reviews each screened solution to understand how it could reduce risk by reducing consequence or vulnerability. This information is then used to model potential risk reduction. The semi-quantitative method in the TRN provides a prioritized list of resilience-enhancing solutions.
Data Inputs Needed
- Completed TRN Risk Assessment from the Risk Assessment Module
- List of screened solutions from Action 1 of the Solution Prioritization Module
Outputs of This Action
- Input to Solution Prioritization tool:
- For those working offline, input into Tab 2 of the TRN Solution Prioritization Excel workbook.
- For those working offline, input to Risk Assessment Excel workbook (calculated automatically within online tool):
- Input into Tab 7, Tab 8, Tab 9, Tab 10, and Tab 11 of the TRN Risk Assessment Excel workbook, which is copied into Tab 2 of the TRN Solution Prioritization Excel workbook, to obtain the risk reduction potential of each solution.
The description in this action is broken into two steps. First, the user is guided through completing the Solution Prioritization Action 2 Worksheet: Solution Risk Reduction. Next is guidance for offline users about how to input this information into the relevant Excel workbooks (online users enter data into the Solution Prioritization worksheet directly). Note that this action focuses on collecting data that will be used in the Solution Prioritization tool; for offline users, it is entered in either the Risk Assessment Excel workbook (Tabs 7–11) or in the Solution Prioritization Excel workbook (Tab 2), so it may be helpful to have these workbooks available to reference if necessary.
Complete the Solution Prioritization Action 2 Worksheet: Solution Risk Reduction
To begin the prioritization process, users map solutions to the critical loads they address and determine which risk component they reduce: consequence or vulnerability. From there, users describe how the solution addresses the risk component; for example, how does the solution reduce consequence? Could the solution duplicate the function served by the critical load faster than before? For example, allowing staff to work offsite would result in a lower consequence of outage. If the solution reduces vulnerability, would it address all components of vulnerability or only one or two components?
In this action, document how each solution would reduce either consequence or vulnerability in the Solution Prioritization Action 2 Worksheet: Solution Risk Reduction. In the first table, identify what scenarios, either outage duration or dual-impact hazard or threat, are impacted by the solution, as well as whether the solution addresses the energy and/or water systems. In the second table, record whether the solution addresses consequence and/or vulnerability. Refer to TRN Resource: Mapping Solution Types to Risk and Resilience for guidance on determining the risk component addressed by the proposed solution.
Instructions for Data Entry
The information collected in the Solution Prioritization Action 2 Worksheet: Solution Risk Reduction references information from the Risk Assessment module. For offline users it will then be added to the Risk Assessment Excel workbook starting on Tab 7 to model how well each solution could reduce risk. For online users solution risk reduction potential will be modeled directly in the worksheet. Offline users will need to copy results from this modeling into the Solution Prioritization Excel workbook (Tab 2) to serve as a basis for prioritization of screened solutions.
Once the impact of each solution has been described in the first table of Solution Prioritization Action 2 Worksheet: Solution Risk Reduction, document each solution and its anticipated impact. For offline users complete the yellow outlined section of the Solution Prioritization Excel workbook Tab 2 and copy it into the yellow outlined section of the Risk Assessment Excel workbook Tab 7.
Update the consequence information, the responses to the vulnerability questions, or the vulnerability category as appropriate for each solution (for offline users, document this in the Risk Assessment Excel workbook). For example, if a critical load was found to not have critical function duplication capability nor a redundant energy system in the Risk Assessment module, and a proposed solution was to develop work-from-home capabilities, as well as installing a backup generator, users would update the responses to the Solutions – Critical Load Characterization table (offline users can find this information in the Risk Assessment Excel sheet on Tab 8) to change the response to the question “Capability to restore critical missions without critical load” from “No” to “Yes” and provide details on expected initiation time, as well as attest that this capability will be documented and exercised. Similarly, in the Solutions – Vulnerabilities table (offline users can find this information in the Risk Assessment Excel sheet on Tab 9), the response to the first vulnerability question “Is there a service or system redundant to the primary service” would change from “No” to “Yes,” and subsequent vulnerability questions could be answered.
For offline users, once all solutions have been modeled, copy the original weighted risk and new weighted risk values outlined in red in the Risk Assessment Excel workbook Solution Evaluation sheet (Tab 7) back into the Solution Prioritization Excel workbook (Tab 2). Online users will have information available within the Solution Prioritization Action 2 form. This information will provide a value for the potential risk-reduction efficacy of the solution, which will be weighted alongside other non-risk criteria in the final prioritization of solutions.