reaching-consensus
Reaching Consensus
Consensus vs. Voting
Voting: Majority wins, minority loses Consensus: Everyone can support the decision
Consensus Levels
| Level | Meaning |
|---|---|
| 1 | Fully support |
| 2 | Support with minor concerns |
| 3 | Can live with it |
| 4 | Have serious concerns |
| 5 | Cannot support |
Goal: Everyone at level 3 or better.
Techniques
Fist of Five
Quick check on support:
- 5 fingers: Fully support
- 4 fingers: Support
- 3 fingers: OK with it
- 2 fingers: Concerns
- 1 finger: Strong concerns
- Fist: Block
Gradients of Agreement
- Enthusiastic Yes
- Supportive Yes
- Willing Yes
- Reservations
- Stand Aside
- Block
Proposal-Based
- Present proposal
- Clarifying questions
- Quick reactions
- Amendments
- Check for consensus
- Iterate if needed
When Stuck
Disagree and Commit
- Debate thoroughly
- Make decision
- Everyone commits
- Review later
Time-Boxing
- Set decision deadline
- If no consensus, fallback option
- Owner makes final call
Smaller Group
- Delegate to experts
- Report back
- Full group ratifies
Facilitation Tips
- Ensure everyone speaks
- Summarize positions
- Find common ground
- Address concerns directly
- Document the decision
- Include dissenting views
More from nguyenhuuca/assessment
requirements-analysis
Analyze and refine product requirements. Use when clarifying scope, identifying gaps, or validating requirements. Covers requirement types and analysis techniques.
16security-review
Conduct security code reviews. Use when reviewing code for vulnerabilities, assessing security posture, or auditing applications. Covers security review checklist.
13cloud-native-patterns
Apply cloud-native architecture patterns. Use when designing for scalability, resilience, or cloud deployment. Covers microservices, containers, and distributed systems.
12incident-management
Handle production incidents effectively. Use when responding to outages, conducting post-mortems, or improving reliability. Covers incident response and blameless culture.
11application-security
Secure applications against common vulnerabilities. Use when reviewing code for security, implementing security controls, or hardening applications. Covers OWASP Top 10.
11deploy-aws-ecs
Deploy containerized applications to AWS ECS/Fargate. Use when deploying containers to AWS, managing ECS services, or setting up Fargate tasks. Covers task definitions and ECR.
11