What is Critical Chain Project Management?

What is Critical Chain Project Management?

Eshna Verma

Last updated July 27, 2017

Critical Chain Project Management

A Brief Overview

Critical Chain Project Management was developed and publicized by Dr. Eliyahu M. Goldratt in 1997. Followers of this methodology of Project Management claim it to be an alternative to the established standard of Project Management as advocated by PMBOK® and other Standards of Project Management. This article attempts to provide a brief overview of the Principals of Critical Chain Project Management and its applicability to manage Projects across all organizations and verticals.

PMP® Certification

The Critical Chain Method has its roots in another one of Dr. Goldratt’s inventions, namely, The Theory of Constraints (TOC). This Project Management Method comes into force after the initial Project Schedule is prepared, which includes establishment of the task dependencies. The evolved Critical path is reworked based on the Critical Chain Method. To do so, the methodology assumes constraints related to each task.

A few of these constraints are listed out below:

  • There is a certain amount of uncertainty in each task
  • Task durations are often overestimated by the Team Members or Task Owners. This is typically done to add a safety margin to the task so as to be certain of its completion in the decided duration.
  • In most cases, the tasks should not take the time estimated, which includes the safety margin, and should be completed earlier.
  • If the Safety Margin assumed is not needed, it is actually wasted. If the task is finished sooner,it may not necessarily mean that the successor task can start earlier as the resources required for the successor task may not be available until their scheduled time. Hence, the saved time cannot be passed on to finish the Project early. On the other hand, if there are delays over and above the estimated schedules, these delays will most definitely get passed on, and, in most cases, will exponentially increase the Project Schedule.

With the above assumptions, the Critical Path Methodology of Project Management recommends pooling of the task buffers and adding them at the end of the Critical path

Critical Path Methodology

The Critical Path Project Management defines three types of Buffers - 

  1. Project Buffer -  The total pooled buffer shown above (Fig 1.1) is referred to as the Project Buffer.
  2. Feeding Buffer - In a Project Network, there are path/s which feed into the Critical path. The pooled buffer on each such path represents the Feeding Buffer to the Critical Path(Fig1.2) resulting in providing some slack to the critical Path.
  3. Resource Buffer- This is a virtual task inserted just before critical chain tasks that require critical resources. This acts as a trigger point for the resource, indicating when the critical path is about to begin.

CCPM Methodology

As the Progress of the Project is reported, the Critical Chain is recalculated. In fact, monitoring and controlling of the Project primarily focuses on utilization of the Buffers. Hence the Critical Chain Method considers the basic Critical Path based Project Network and Schedule to derive a completely new Schedule.

The Critical Path Project Management Methodology is very effective in organizations which do not have evolved Project Management Practices.

However, the methodology does not advocate multi-tasking, and in Projects with complex Schedule Networks, the results of implementing the Critical path Methodology have proven to be deterrent to the overall Project Schedule. In addition, there is no standard method for calculating and optimizing the Project Buffers. The Critical Path Project Management Methodology has had a fair amount of success in manufacturing domains though it has not achieved any noteworthy success in the IT Sector.

Along similar lines, the Event Chain Methodology of Project Management focuses on determining the uncertain events and the chain Reactions they propagate. It is a method of modelling uncertainties and is based on Monte Carlo Analysis, Bayesian Believe Network, and other established simulation methodologies. When they occur, events can cause other events, triggering an Event Chain, which will effectively alter the course of the Project. Events and Event Chains are identified and a Quantitative Analysis is performed to determine the extent of the uncertainty and the probable impact of the same on the Project. From this exercise, Critical Event Chains are derived, which have the potential to impact the project significantly. Event Chain diagrams are visual representations of Events, Event Chains, and their impact.

It is clear that neither the Critical Path Project Management Methodology nor the Event Chain Methodology can be considered as alternatives to the standard Methodology for project Management as advocated by PMBOK®. While the Critical Path Project Management Methodology can be at best used as a tool for deriving Project Schedule networks, the Event Chain Methodology for Project Management can be used as a tool for Quantitative Risk Analysis.

Loved the article? Looking to learn more about Project Management? Visit our free resources library for more lessons!

Watch this video on Introduction To PMP® Certification Training

Find our CAPM Certification Training at your nearby cities:

Bangalore  Manila  Toronto  Los Angeles  San Diego  Boston  Seattle  Ahmedabad  Plano

Find our PMP® Certification Training Course at your nearby cities:

Bangalore  Chennai  Hyderabad  Pune  Mumbai  Delhi  Abu Dhabi  Manila  Riyadh  Dubai
Singapore  Jeddah  Jakarta  Noida  Kuala Lumpur

PMP and PMBOK are registered trademarks of the Project Management Institute, Inc.

About the Author

Eshna writes on PMP, PRINCE2, ITIL, ITSM, & Ethical Hacking. She has done her Masters in Journalism and Mass Communication and is a Gold Medalist in the same. A voracious reader, she has penned several articles in leading national newspapers like TOI, HT, and The Telegraph. She loves travelling and photography.


... ...



Published on {{detail.created_at| date}} {{detail.duration}}

  • {{detail.date}}
  • Views {{detail.downloads}}
  • {{detail.time}} {{detail.time_zone_code}}



About the On-Demand Webinar

About the Webinar

Hosted By





About the E-book

View On-Demand Webinar

Register Now!

First Name*
Last Name*
Phone Number*

View On-Demand Webinar

Register Now!

Webinar Expired

Download the Ebook

{{ queryPhoneCode }}
Phone Number {{ detail.getCourseAgree?'*':'(optional)'}}

Show full article video

About the Author


About the Author