Vicky's PageVicky's Page
Vivian
Recipe
Tools
English
Semester 3
Vivian
Recipe
Tools
English
Semester 3
  • Main Pages

    • Basic
    • General
    • Block Chain
  • CyberDefense Pro - 1.0 Introduction

    • 1.1 Introduction to TestOut CyberDefense Pro
  • CyberDefense Pro - 2.0 Vulnerability Response, Handling, and Management

    • 2.1 Regulations and Standards
    • 2.2 Risk Management
    • 2.3 Security Controls
    • 2.4 Attack Surfaces
    • 2.5 Patch Management
    • 2.6 Security Testing
  • CyberDefense Pro - 3.0 Threat Intelligence and Threat Hunting

    • 3.1 Threat Actors
    • 3.2 Threat Intelligence
    • 3.3 Threat Hunting
    • 3.4 Honeypots
  • CyberDefense Pro - 4.0 System and Network Architecture

    • 2.1 Regulations and Standards
    • 4.2 Network Architecture
    • Section 4.3 Identity and Access Management (IAM)
    • 4.4 Data Protection
    • 4.5 Logging
  • CyberDefense Pro - 5.0 Vulnerability Assessments

    • 5.1 Reconnaissance
    • 2.1 Regulations and Standards
    • 5.3 Enumeration
    • 5.4 Vulnerability Assessments
    • 5.5 Vulnerability Scoring Systems
    • 5.6 Classifying Vulnerability Information
  • CyberDefense Pro - 6.0 Network Security

    • 2.1 Regulations and Standards
    • 6.2 Wireless Security
    • 6.3 Web Server Security
    • 2.1 Regulations and Standards
    • 6.5 Sniffing
    • 6.6 Authentication Attacks
    • 6.7 Cloud Security
    • 6.8 Email Security
    • 2.1 Regulations and Standards
    • 6.10 Industrial Computer Systems
  • CyberDefense Pro - 7.0 Host-Based Attacks

    • 7.1 Device Security
    • 7.2 Unauthorized Changes
    • 27.3 Malware
    • 7.4 Command and Control
    • 2.1 Regulations and Standards
    • 7.6 Scripting and Programming
    • 2.1 Regulations and Standards
  • CyberDefense Pro - 8.0 Security Management

    • 8.1 Security Information and Event Management (SIEM)
    • 8.2 Security Orchestration, Automation, and Response (SOAR)
    • 8.3 Exploring Abnormal Activity
  • CyberDefense Pro - 9.0 Post-Attack

    • 9.1 Containment
    • 2.1 Regulations and Standards
    • 9.3 Post-Incident Activities
  • A.0 CompTIA CySA+ CS0-003 - Practice Exams

    • A.1 Prepare for CompTIA CySA+ Certification
    • A.2 CompTIA CySA+ CS0-003 Domain Review (20 Questions)
    • A.3 CompTIA CySA+ CS0-003 Practice Exams (All Questions)
  • B.0 TestOut CyberDefense Pro - Practice Exams

    • Section B.1 Prepare for TestOut CyberDefense Pro Certification
    • B.2 TestOut CyberDefense Pro Exam Domain Review
  • Glossary

    • Glossary
  • CYB400

    • Chapter 01
    • Chapter 02
    • Chapter 03
    • Chapter 04
    • Project 01
  • CYB402

    • lab
    • essay
  • CYB406

    • lab 01
    • lab 02
    • lab 03
    • lab 04
    • lab 05
    • lab 06
  • CYB300 Automobility Cybersecurity Engineering Standards

    • Schedule
    • Tara PPT
    • MidTerm Notes
    • Questions
  • ISO 21434

    • Introduction
    • Forward
    • Introduction
    • Content
  • CYB302 Automobility Cybersecurity

    • Week 01
    • Week 02
    • Week 03
    • Week 04
    • Chapter 5 - AUTOSAR Embedded Security in Vehicles
    • Chapter 6
    • Chapter 7
    • Chapter 8
    • How to Write
    • Review 5
  • CYB304 Project Management For Cybersecurity In Automobility

    • Unit 1 Introduction
    • Unit 1 Frameworks
    • Unit 1 Methodologies
    • Unit 1 Standards
    • Unit 1 Reqirements
    • Unit 2 Scheduling
    • Unit 2 Scheduling 2
    • Unit 2 Trends
    • Unit 2 Risk
    • Unit 2 Project Monitoring & Controlling
    • Unit 2 Budgeting
    • Unit 2 Closure
  • Project Manager

    • Resource
    • Gantt Charts
    • Intrduction
    • First Things
    • Project Plan
    • Project Schedule
    • Agile
    • Resource
  • CYB306 Cyber-Physical Vehicle System Security

    • Chapter 1
    • Chapter 2
    • Chapter 3
    • Chapter 4
    • Chapter 5
    • Chapter 6 - Infrastructure for Transportation Cyber-Physical Systems
    • Chapter 7
    • Chapter 8
    • Chapter 9
    • Chapter 10
    • Chapter 11
    • Case 3
    • Case 4
    • Discussion 4
    • Discussion 5
  • CYB308 Cybersecurity System Audits

    • Week 01
    • Week 02
    • Week 03
    • Week 04
    • Week 05
    • C 4
    • C 5
    • C 5 Business Resilience
    • C 6
    • C 6-2
    • Review
    • Questions
  • CYB308 TextBook

    • CHAPTER 1 Becoming a CISA
    • CHAPTER 2 IT Governance and Management
    • CHAPTER 3 The Audit Process
    • CHAPTER 4 IT Life Cycle Management
    • Input Controls
    • CHAPTER 5 IT Service Management and Continuity
    • Business Resilience
    • CHAPTER 6 Information Asset Protection
    • Encryption
    • Appendix A
    • Appendix B
    • Appendix C

Project Closure

Project Closure

Definition:

  • Project Closure is the final stage of the project lifecycle in which a project is formally completed and handed over.
  • It involves finalizing all project activities, ensuring that objectives have been met, lessons learned are documented, and resources are released.
  • The goal is to confirm that the project has achieved its scope and quality requirements within the defined constraints.

Project Closure (PMBOK)

  • Project Closure is the final phase of the project lifecycle, as defined in the Project Management Body of Knowledge (PMBOK).
  • It is a critical stage that formally concludes all project activities, ensuring that all deliverables are completed, accepted, and transitioned appropriately.
  • PMBOK's Structured Stage
    • Project Closure is part of the Closing Process Group, the last of the five process groups.
    • Consists of processes performed to formally complete or close a project, phase, or contract.
    • Often overlooked but has significant impact on the organization's future due to the documentation of lessons learned and storage of reports for future reference.

  • Key Components:
    • Formal Acceptance: Gaining sign-off from stakeholders.
    • Final Deliverables: Ensuring all deliverables meet quality and contractual requirements.
    • Documentation: Archiving project records for future reference.
    • Lessons Learned: Facilitating post-mortem meetings to improve future projects.
    • Release of Resources: Freeing project team members and assets.

Regulatory Compliance

  • ISO/SAE 21434
    • This standard for cybersecurity in road vehicles requires that project closure includes comprehensive security validation and documentation.
    • The closure process must ensure that all cybersecurity requirements have been met, and that proper handover of security-related information occurs.
  • UNECE WP.29
    • These regulations mandate a Cybersecurity Management System (CSMS) for vehicle manufacturers.
    • Project closure under WP.29 must include verification that all cybersecurity measures are in place and that the vehicle type approval process is complete.
  • ISO 31000
    • This risk management standard influences project closure by requiring a final risk assessment and documentation of risk management strategies implemented throughout the project lifecycle.

Agile v. Waterfall Methodologies

  • Waterfall Methodology
    • Project Closure is a distinct, rigidly defined, final phase that occurs after all other phases are complete.
    • Involves sequential verification of deliverables.
    • Involves formal sign-offs, comprehensive documentation, and a clear handover process.
  • Agile Methodology
    • Agile projects have a more iterative approach to closure. While there is still a final closure phase, many closure activities may occur throughout the project at the end of each sprint or iteration.
    • Focus is on delivering incremental value.
    • The final closure in Agile focuses more on retrospectives and continuous improvement.

Waterfall Methodology

Project Closure is a distinct, rigidly defined, final phase that occurs after all other phases are complete. Involves sequential verification of deliverables. Involves formal sign-offs, comprehensive documentation, and a clear handover process. Agile Methodology Agile projects have a more iterative approach to closure. While there is still a final closure phase, many closure activities may occur throughout the project at the end of each sprint or iteration. Focus is on delivering incremental value. The final closure in Agile focuses more on retrospectives and continuous improvement.

Automotive Project Management Models

  • Toyota
    • Uses the Toyota Production System (TPS), which emphasizes Lean principles and continuous improvement (Kaizen 改善).
    • Project closure in TPS involves extensive analysis of lessons learned and future process improvements.
  • Ford
    • Employs the Global Product Development System (GPDS), incorporating stage-gated reviews for product lifecycle phases, including project closure.
    • Closure in GPDS would align with specific vehicle program milestones and include formal handovers to production teams.
  • General Motors:
    • Utilizes the Global Vehicle Development Process (GVDP).
    • Emphasizes documentation and lessons learned during closure.
    • Closure in GVDP would involve final quality checks and transition to manufacturing.

  • Volkswagen
    • Implements the Modular Transverse Toolkit (MQB) strategy.
    • Closure focuses on ensuring standardization across models and platforms.
    • Implements robust risk management and quality control processes, ensuring compliance with regulatory standards during project closure.
  • Honda
    • Known for its "Three Reality Principle," which emphasizes hands-on experience.
    • Project closure involves extensive real-world testing and validation.
  • Mazda
    • Uses the "Monotsukuri Innovation" approach, which integrates development and production.
    • Closure involves seamless transition from development to manufacturing.

  • Tata
    • Implements the "Horizonext" strategy, focusing on customer-centric innovations.
    • Closure involves extensive customer feedback analysis.
  • Volvo
    • Known for its focus on safety and sustainability.
    • Project closure involves rigorous safety testing and environmental impact assessments.
  • BYD
    • As a leader in electric vehicles, their closure process emphasizes battery technology validation and charging infrastructure integration.

Scenario 1: Cybersecurity Risk Mitigation

  • A leading EV manufacturer undertakes a project to implement cybersecurity measures for over-the-air (OTA) software updates.
  • During the project closure phase, the team ensured all deliverables met ISO/SAE 21434 standards.
  • Key Activities in Project Closure:
    • Conducted a final compliance audit against UNECE WP.29.
    • Prepared cybersecurity assurance reports for homologation authorities.
    • Facilitated a lessons learned session, identifying gaps in early threat modeling phases.
    • Created a knowledge repository to improve future cybersecurity engineering efforts.
  • Outcome:
    • The project achieved full regulatory compliance and provided valuable insights into managing third-party risks in the supply chain.

Scenario 2: Supply Chain Security Management

  • A project at a multinational automaker aimed to strengthen supply chain security by incorporating ISO 31000 risk management practices.
  • Key Activities in Project Closure:
    • Compiled a risk assessment report, focusing on Tier 1 and Tier 2 supplier vulnerabilities.
    • Conducted a final retrospective to evaluate the integration of Agile sprints in supply chain risk management.
    • Finalized contractual agreements with suppliers to include cybersecurity compliance clauses.
  • Outcome:
    • The project closure ensured seamless integration of risk controls, boosting supplier accountability and setting a precedent for future collaborations.

Scenario 3: Cross-functional Collaboration

  • A cross-functional team has managed a project to develop a cybersecurity framework for connected vehicles.
  • Key Activities in Project Closure:
    • Created a project summary report detailing the framework's alignment with UNECE WP.29 and ISO/SAE 21434.
    • Conducted a review session to identify continuous improvement opportunities.
    • Hosted a project handover workshop for operational teams, ensuring effective transition.
  • Outcome:
    • The structured closure process minimized operational disruptions and strengthened inter-departmental collaboration.

Templates for Project Closure

  • Content:
    • Checklist: Key closure tasks
    • Lessons Learned Template: Observations, impacts, recommendations
    • Retrospective Questions: Insights for improvement
    • Compliance Report Outline:
      • Summary
      • Status
      • Risk management
      • Recommendations

Key Activities

  • Obtain final acceptance of project deliverables
  • Complete procurement closure
  • Gain formal acceptance from stakeholders
  • Complete final performance reporting
  • Index and archive project records
  • Update lessons learned documentation
  • Hand over the completed product or service
  • Release project resources

Conclusion

  • Project closure in the automotive industry, especially considering cybersecurity and regulatory compliance, requires meticulous attention to detail.
  • It ensures that all project objectives have been met, all deliverables have been accepted, and that the project's outcomes are properly documented and transitioned for ongoing support and future reference.
Last Updated:
Prev
Unit 2 Budgeting