Updated on 2025-05-22 GMT+08:00

RES14-01 Fool-proofing Check for Changes

Fool-proofing is when you put systems in place to prevent equipment operators from making mistakes. The goal is to eliminate product defects by preventing, correcting, or drawing attention to human errors as they occur.

  • Risk level

    High

  • Key strategies

    The following constraints and checks can help reduce configuration errors:

    • Role constraints: Permissions management limits the configuration scope for different roles, preventing errors due to unauthorized changes.
    • Separation of query and modification: Configuration options are organized into distinct layers via the product interface, with query and modification functions kept separate to minimize the risk of accidental configuration changes.
    • Configuration validation: A validation mechanism ensures that necessary checks are performed before applying any configuration changes, preventing invalid settings from being applied.
    • Deletion protection: Protective measures are implemented to prevent accidental deletion of resources. Examples include pre-deletion status checks, resource locking, and a recycle bin.