You are on page 1of 11

RAID Log - Risks, Assumptions, Issues & Decisions

Assumptions &
Risks Action Items

Decisions &
Issues Delays

Modify Settings
s & Decisions

tions &
Items

ons &
ays
Risk Log <project name>

Risk ID Risk Description Likelihood Impact Risk Rating


R1 Hackers can steal the passwords Negligible Medium 3
R2 <risk> High High 16
Management Strategy Comments
<project name> - Assumptions & Action Items

# Assumptions / Action Item Type Priority Open Date Open By


1 User name check fails Assumption Low Jul/12 User 1
Close Date Close By Comments
Jul/15 User 2
<project name> - Issue Tracker Sheet

# Issue Type of Issue Priority Open Date Open By


1 User name check fails Issue 1 Low Jul/12 User 1
Close Date Close By Comments
Jul/15 User 2
<project name> - Decisions & Delays

# Decisions / Delays Type Priority Record Date Decision Made by


1 User name check fails Decision Low Jul/12 User 1
Comments
Change these values to update data validations in various tracker sheets

Issue Log, Assumptions & Action


Risk Log
Items, Decisions & Delays

Risk Likelihoods Risk Impacts Types of IssueUsers Priorities


Negligible Negligible Issue 1 User 1 Low
Low Low Issue 2 User 2 Medium
Medium Medium Issue 3 User 3 High
High High User 4
User 5
User 6
User 7
User 8

You might also like