The Project Plan Part 2 – The Operations Plan

Planning

The Operations Plan describes how day-to-day operations will occur when the solution is in place and the project is over. The planning principle is to “begin with the end in mind”. This definition of the end state will help you complete the identification of the Stakeholders and verify that you have the complete list of Project Objectives in the Project Charter. It provides guidance to the organization on how to successfully maintain the solution over time.

Here is a list of some things to consider (this is not necessarily the complete list of considerations; your project may have more):

• Operations Infrastructure – a comprehensive description of the environment into which the solution will be deployed and supported (including incident management).

• Service Level Agreement (SLA) – addresses up-time, performance, redundancy and disaster recovery

• Reporting Model – describes generally who will receive reports, what information they will get and on what schedule, and what source data will be used to generate the reports.

• Organization Skill and Time Requirements – identifies the job roles, associated skill requirements and work time necessary to operate the solution. This information could be placed in a matrix that identifies 1) types of operational functions, 2) the job roles that work within each function, 3) the skill requirements for each job role, and 4) the frequency and time required (i.e. “3 hours per month”). This information can be used to identify organizational impact for your Organizational Change Management Plan (more on that in future posts). Make sure you identify the Administrators and their functions.

• Software and Data Updates and Refreshes from External Sources; how often and how it will be tested and verified.

• Backup/Recovery; how often backups will occur and the process to order a restore.

• Scheduled Maintenance Times; when and how often will the system be unavailable for maintenance

• Monitoring; who is responsible for monitoring system performance; what tools will be used.

• Security – requests to add access, remove access or change roles

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s