Use When
- -Information cannot be trusted
- -Outcomes are inconsistent
- -Responsibility or causality is unclear
- -Model behavior is unreliable or hard to verify
Deliverables
- -Investigation report
- -System map and dependency diagram
- -Risk register and evidence index
Entry Criteria
What must be in place before this engagement begins.
- -Access to relevant systems or records
- -Agreement on scope and chain of custody
Process
01
Intake and scope definition
Minimal, verified movement.
02
Constraint mapping and system baseline
Minimal, verified movement.
03
Decision path design and trade-off review
Minimal, verified movement.
04
Client execution with oversight, or hands-on implementation when access allows
Minimal, verified movement.
05
Verification, controls, and stabilization
Minimal, verified movement.