ITIL gives a detailed description of a number of important IT practices with
comprehensive checklists, tasks and procedures that any IT organization can tailor to its needs.
V 1.0, 13-Jul-2009 - Map created in Freemind 1.0.0,by Mike Peckar Fognet Consulting, (c) 2009 All Rights Reserved
V 2.0 13-Feb-2018 - Modified in Freemind v1.0.1 for XHTML export
ITIL is the Information Technology (IT) Infrastructure Library
ITIL gives a detailed description of a number of important IT practices with
comprehensive checklists, tasks and procedures that any IT organization can tailor to its needs.
ITIL Promotes a quality approach to achieving business effectiveness and efficiency in the use of information systems.
ITIL is not a standard, it is a set of practices, but it has been incorporated into other standards such as:
ITIL is published in a series of books, each of which covers an IT management topic.
ITIL Versions:
What is now called ITIL V1 was developed during the 1980s under the auspices of the CCTA and was titled
"Government Information Technology Infrastructure Management Methodology" (GITMM)
and over several years eventually expanded to 31 volumes, but was not widely adopted.
ITIL V2 is based on the series of books on ITIL published in 1989 by the Office of Government Commerce (OGC).
The Core V2s Books were:
In 2007, the OGC published new books as part of an "ITIL refresh" commonly known
as ITIL V3 which includes five core texts:
These books correspond to the main spokes off central node of this mindmap
There are three certiciation levels: Foundations, Intermediate and Expert.
Each level's test earns the candidate's credits that are used to advance to the expert level.
Only Individuals can obtain certification. Organizations and management systems cannot be certified as "ITIL-compliant".
An organization that has implemented ITIL guidance in IT Service Management (ITSM), may however,
be able to achieve compliance with and seek certification under ISO/IEC 200000.
The foundations exam is a time mutliple-choice exam of 40 questions.
26/40 of the question must be answered correctly in order to pass.
Students are given one hour to complete the test
Exam Checklist:
There are two intermediate modules: Lifecycle and capability.
"Managing across the lifecycles" is a special exam that requireres 17 ITI V3 credits to take.
Intermediate Level
There are two streams in the Intermediate level. Both assess an individual's ability to
analyse and apply the concepts of ITIL. Candidates are able to take units from either
of the Intermediate streams, to gain credits towards the Expert Level.
Intermediate Lifecycle Stream - this stream includes 5 individual certificates built around the five core OGC titles, as follows:
The focus of these modules is on the introduction and implementation of the specific
Lifecycle phase, and coverage of the principles, processes and related activities.
Intermediate Capability Stream - this stream includes 4 individual certificates loosely based
on the V2 Clustered Practitioner qualifications, but broader in scope in line with the updated
V3 content, focussing on detailed process implementation and management within cluster groupings:
22 Credits from any module or combination of modules are all that is required to earn ITIL Expert Certification
Master level is under development as of the summer of 2009
APMG-UK is the OGC's official firm that accredits ITIL Training materials. This Syllabus defines
what is required to be taught in accredited ITIL Foundations training courses.
Not surprisingly, this syllabus maps very closely to the materials tested for in the certification exams
and therefore are a great resource to review during preparation for the exams.
The references in the listings refer to the ITIL book and section within that book.
Foundation Syllabus The syllabus will guide the design, development and use of training materials as well as training aimed at raising individual’s understanding of, and competence in, IT Service Management as described in the ITIL Service Strategy, ITIL Service Design, ITIL Service Transition, ITIL Service Operation, ITIL Continual Service Improvement, ITIL Introduction and ITIL Glossary publications. The syllabus has been designed with ease of reference, extensibility and ease of maintenance in mind. Candidates for the ITIL Foundation certificate in IT Service Management have to complete all units and successfully pass the corresponding examination to achieve certification. Training providers are free to structure and organize their training in the way they find most appropriate, provided the units below are sufficiently covered. It is strongly recommended that training providers do not structure their courses by simply following the order of the training units as described in this document. It has been designed to be flexible so that training providers can add value as appropriate. The units cover the topics listed. The terms emphasized in italics are defined in the ITIL Glossary. ITILFND01 Service Management as a practice The purpose of this unit is to help the candidate to define Service and to comprehend and explain the concept of Service Management as a practice. Specifically, candidates must be able to: 01-1. Describe the concept of Good Practice 01-2. Define and explain the concept of a Service 01-3. Define and explain the concept of Service Management 01-4. Define and distinguish between Functions and Processes 01-5. Explain the process model and the characteristics of a process ITILFND02 The Service Lifecycle The purpose of this unit is to help the candidate to understand the value of the Service Lifecycle, how the processes integrate with each other, throughout the Lifecycle and explain the objectives and business value for each phase in the lifecycle Specifically, candidates must be able to: 02-2. Describe the structure, scope, components and interfaces of the ITIL® Library 02-3. Account for the main goals and objectives of Service Strategy 02-4. Account for the main goals and objectives of Service Design 02-5. Briefly explain what value Service Design provides to the business 02-6. Account for the main goals and objectives of Service Transition 02-7. Briefly explain what value Service Transition provides to the business 02-8. Account for the main goals and objectives of Service Operations 02-9. Briefly explain what value Service Operation provides to the business 02-10. Account for the main goals and objectives of Continual Service Improvement ITILFND03 Generic concepts and definitions The purpose of this unit is to help the candidate to define some of the key terminology and explain the key concepts of Service Management. Specifically, candidates must be able to define and explain the following key concepts: 03-1. Utility and Warranty 03-2. Resources, Capabilities and Assets 03-3. Service Portfolio 03-4. Service Catalogue (Business Service Catalogue and Technical Service Catalogue) 03-5. The role of IT Governance across the Service Lifecycle 03-6. Business Case 03-7. Risk 03-9 Service Provider 03-10 Supplier 03-11. Service Level Agreement (SLA) 03-12. Operational Level Agreement (OLA) 03-13. Contract 03-14. Service Design Package 03-15. Availability 03-16. Service Knowledge Management System (SKMS) 03-17. Configuration Item (CI) 03-18. Configuration Management System 03-19. Definitive Media Library (DML) 03-20. Service Change 03-21. Change types (Normal, Standard and Emergency) 03-22. Release Unit 03-23. Seven R’s of Change Management 03-24. Event 03-25. Alert 03-26. Incident 03-27. Impact, Urgency and Priority 03-28. Service Request 03-29. Problem 03-30. Workaround 03-31. Known Error 03-32. Known Error Data Base (KEDB) 03-33. The role of communication in Service Operation 03-35 Release Policy ITILFND04 Key Principles and Models The purpose of this unit is to help the candidate to comprehend and account for the key principles and models of Service Management and to balance some of the opposing forces within Service Management. Specifically, candidates must be able to: Service Strategy 04-2.Describe basics of Value Creation through Services Service Design 04-3. Understand the importance of People, Processes, Products and Partners for Service Management 04-4. Discuss the five major aspects of Service Design:
Continual Service Improvement 04-8. Discuss the Plan, Do, Check and Act (PDCA) Model to control and manage quality 04-9. Explain the Continual Service Improvement Model 04-10. Understand the role of measurement for Continual Service Improvement and explain the following key elements:
ITILFND05 Processes The purpose of this unit is to help the candidate understand how the Service Management processes contribute to the Service Lifecycle, to explain the high level objectives, scope, basic concepts, activities and challenges for five of the core processes and to state the objectives and some of the basic concepts for thirteen of the remaining processes including how they relate to each other. The list of activities to be included from each process is the minimum required and should not be taken as an exhaustive list. Specifically, candidates must be able to: Service Strategy 05-1. State the objectives and basic concepts for: • Demand Management
• Financial Management
Service Design 05-3. Explain the high level objectives, scope, basic concepts, process activities, key metrics (KPI’s), roles and challenges for: Service Level Management (SLM) Service-based 05-4. State the objectives, basic concepts and roles for: • Service Catalogue Management • Availability Management
• Information Security Management (ISM)
• Supplier Management
Capacity Management
IT Service Continuity Management Business Continuity Plans Service Transition 05-5. Explain the high level objectives, scope, basic concepts, process activities, key metrics, roles and challenges for: Change Management
Service Asset and Configuration Management (SACM)
05-6. State the objectives and basic concepts for: 05-61 Release and Deployment Management
Service Operation 05-7. Explain the high level objectives, scope, basic concepts, process activities, metrics, roles and challenges for:
05-8. State the objectives, basic concepts and roles for: • Event Management • Request Fulfillment • Access Management ITILFND06 Functions The purpose of this unit is to help the candidate to explain the role, objectives, organizational structures, staffing and metrics of the Service Desk function and to state the role, objectives and overlap of three other functions. Specifically, candidates must be able to: 06-1. Explain the role, objectives, organizational structures, staffing and metrics of: • The Service Desk function 06-2. State the role, objectives and organizational overlap of: • The Technical Management function • The Application Management function • The IT Operations Management function (IT Operations Control and Facilities Management) ITILFND07 Roles The purpose of this unit is to help the candidate to account for the role and to be aware of the responsibilities of some of the key roles in Service Management. Specifically, candidates must be able to: 07-1. Account for the role and the responsibilities of the • Process owner • Service owner 07-2. Recognize the RACI model and explain its role in determining organizational structure. ITILFND08 Technology and Architecture The purpose of this unit is to help the candidate to: 08-2. Understand how Service Automation assists with integrating Service Management processes ITILFND09 ITIL® Qualification scheme The purpose of this unit is to help the candidate to: 09-1. Explain the ITIL® Qualification scheme, distinguish between the purposes of the two intermediate streams, mention the included certificates and diplomas, and understand the different options ITILFND10 Mock ExamThe purpose of this unit is to help the candidate to pass the ITIL Foundation exam. Specifically candidates must: 10-1. Sit a minimum of one ITIL Foundation Mock Exam |
There are some significant differences between ISO/IEC20000 and ITIL Version 3
IT - Information technology
ITIL - IT Infrastructure Library
CSI - Continual Service Improvement
SS - Service Strategy
SD - Service Design
SO - Service Operation
ST - Service transition
Aligning and realigning IT services to changing business needs (because standstill implies decline).
The goal of Continual Service Improvement is to align and realign IT Services to changing business
needs by identifying and implementing improvements to the IT services that support the Business
Processes. The perspective of CSI on improvement is the business perspective of service quality,
even though CSI aims to improve process effectiveness, efficiency and cost effectiveness of the IT
processes through the whole lifecycle. To manage improvement, CSI should clearly define what
should be controlled and measured.
CSI needs to be treated just like any other service practice. There needs to be upfront planning,
training and awareness, ongoing scheduling, roles created, ownership assigned,and activities
identified to be successful. CSI must be planned and scheduled as process with defined activities,
inputs, outputs, roles and reporting.
Also: IT Service Managment or ITSM
The implementation and management of quality IT services that meets the needs of
the business
Best Practice was a common term in V2 parlance to describe ITIL's practices.
With V3, a distinction is made between best practice and good practice
A best practice is an innovation
“Flavor of the day”
A good practice is
A best practice that has endured the test of time
A generally accepted principle
Example: The use of seatbelts in automobiles
A best practice that has become a good practice
These are essential issues that need to be taken care of in order for the ITSCM
process to be successful. This ensures that all staff are aware of the implications
of Business Continuity and of IT Service Continuity and consider these as part of their
normal working routine and budget.
Activities/objectives for Continual Service Improvement (CSI) include:
Creating the set of services that help achieve business objectives
As the center and origin point of the ITIL Service Lifecycle, the Service Strategy volume provides
guidance on clarification and prioritization of service provider investments in services. More
generally, Service Strategy focuses on helping IT organizations improve and develop over the
long term. In both cases, Service Strategy relies largely upon a market-driven approach. Key
topics covered include service value definition, business case development, service assets,
market analysis, and service provider types. Processes covered include service portfolio
management, demand management, and IT financial management.
Activities that understand and influence Customer demand for Services
and the provision of Capacity to meet these demands
At a Strategic level Demand Management can involve analysis of Patterns of Business Activity
and User Profiles
At a Tactical level it can involve use of
Differential Charging to encourage Customers to use IT Services at less busy times
Demand management is tied closely to Service Portfolio management and exchanges data with the Capacity Management Process.
Patterns of Business Activity (PBA)
User Profiles (UP)
Differntial Charging simply means charging more for services at times when capacity is most scarce and charging less when capacity not an issue.
The Function and Processes responsible for managing an IT Service Provider’s Budgeting, Accounting, and Charging Requirements
The objectives of the Financial Management for IT Services process:
provide cost-effective stewardship of the IT assets and resources used in providing IT Services
Costs, which are clearly attributable to a single customer.
Costs incurred on behalf of all or a group, which have to be apportioned.
Any indirect costs, which cannot be apportioned fairly
Costs, which vary with some factor such as time or usage.
the division of cost types into subsets, for example hardware broken down into Servers, Desktops, Laptops etc.
costs applying to physical substantial assets of the company. To qualify these costs must be larger than a minumn sum and last for longer than on financial year.
costs resulting from day-to-day running of the IT services, related to repeating payments whose effects can only be measured for a short timeframe, usually less than 12 months
costs that do not vary even when resource usage varies
Hardware, Software, People, Accommodation, Transfer Cost, External
The costs of a product or service over its whole lifecycle
Average increase in profits (over a specific period) divided by the investment
Return on capital employed (= net profit before tax and interest / total assets less current liabilities)
Cost Units are usually things that can be easily counted, such as staff numbers,
software licences or things easily measured, such as filestore usage, CPU usage,
network packets sent
Cost Units are the basic items of resource for which Customers are held accountable
i.e. provide the method of apportioning Indirect Costs or calculating the actual cost of Variable Costs
the cost of each Cost Unit must be determined. Following the example of CPU-seconds,
if a business’s IT organisation knows the total cost of the necessary Capacity, the average
unit cost of a CPU-second can be calculated and apportioned to each Customer as it is
used, in the same manner that an electricity company calculates the consumption of each
of its Customers in KWh
A framework in which all known costs can be recorded and allocated to specific Customers,
activities, or other category. Most Cost Models are based on calculating the cost for each
Customer, but other models can be developed to show the cost for each service or the
cost for each location. The calculation of Costs-by-Customers is the usual start-point if a
Charging system is to be introduced.
The measure of the wearing out, consumption or other reduction in the useful economic
life of a fixed asset, whether from use, passage of time, or obsolescence through
technological or market changes.
Financial management for IT Services provides (depending on which pricing system has been
chosen within the organization), important information to Service Level Management about the
introduced costing, pricing and charging strategies.
As well as this the Financial Management process analyses which level of service delivery is
technically cost realistic for the business.
Financial Management for IT services can, together with Capacity Management and Availability
Management, develop pricing strategies. These strategies can realize an optimal spread of the
workload within an organization, which will result in optimal use of resources. It can also use
asset and cost information from Configuration Management to analyze different scenarios of
equipment (different costs for different configurations).
Accounting
IT Accounting aims to provide the information about what the money was spent on. All Configuration
Items necessary to deliver an IT Service to the Customer bear a certain cost. These costs together
add up to the total costs necessary for IT Service delivery. In order to understand costs we need to
discuss costs in a general way.
Budgeting
The Activity of predicting and controlling the spending of money
Consists of a periodic negotiation cycle to set future Budgets (usually annual) and the day-to-day monitoring and adjusting of current Budgets
Activities:
Determine the budget method:
Determine the budget period (financial (fiscal) year)
Set up the budget
Charging - Requiring payment for IT Services
Charging policy considerations:
Pricing methods:
Key performance indicators to report on the process are:
Other issues that can be reported on are:
Service Portfolio Managment is the process of building out and maintaining the Service Portfolio which is
used to manage the entire Lifecycle of all Services.
The following activities lead to building the Service Portfolio:
The complete set of Services that are managed by a Service Provider
The Service Portfolio is developed during the Service Strategy Lifecycle and is
used to manage the entire Lifecycle of all Services. It includes three Categories/databases:
A database listing IT Services that are under consideration or development, but are not yet available to customers.
The database containing information about all live IT Services, including those available for deployment.
The Service Catalog is the only part of the Service Portfolio published to customers.
A database listing IT Services that are no longer available to customers.
This simply means keeping focus on value as perceived by customers.
A Business Case is an explanation of the reasons it makes sense to spend money on something.
A well-formed Business Case tells us whether or not the market exists for a given service.
If the market exists to support the service, an IT provider would be well advised to develop and offer the service.
If the market does not exist, offering the service is likely to detract from rather than support the success of the organization.
A Business Case is commonly structured around concepts such as Return On Investment (ROI) or
Value On Investment (VOI) which quantify the total costs and benefits associated with an investment.
Resource - Direct inputs for Production
A generic term that includes IT Infrastructure, people, money, or anything else that might help to deliver an IT Service
Resources are considered to be Assets of
an Organization
Capabilities - Ability to deploy resources
The ability of an Organization, person, Process, Application, Configuration Item, or IT Service to carry out an Activity
Capabilities are intangible Assets of an Organization
Type I – Internal Service Provider
Serves customers in their own organization.
Type II -- Shared Service Provider
Serves multiple business units or customers within their own organization.
Type III -- External Service Provider
Serves customers outside of their own organization.
Utility: Fit for Purpose
Warranty: Fit for Use
A set of responsibilities, activities, and authorities granted to a person or team
A role is defined in a Process
One person or team may have multiple roles
For example, the roles of Configuration Manager and Change Manager may be carried out by a single person
A team or group of people and the tools they use to carry out one or more processes
or activities
For example, the Service Desk
Someone who buys goods or Services
The Customer of an IT Service Provider is the person or group that defines and agrees the Service Level Targets
The term Customers is sometimes used informally to imply Users
For example “this is a Customer focused organization”
A means of delivering value to customers by facilitating outcomes customers want to achieve,
without the ownership of specific costs and risks
Designing services, from technical and business perspective:
Design within ITIL is understood to encompass all elements relevant to service delivery, rather
than focusing solely on design of the technology itself. As such, Service Design addresses
how a planned service solution interacts with the larger business and technical environments,
service management systems required to support the service, processes which interacts with
the service, technology, and architecture required to support the service, and the supply chain
required to support the planned service. Within ITIL, design work for an IT service is aggregated
into a single Service Design Package (SDP). Service Design Packages, along with other
information about services, are managed within the service catalog.
The five major aspects of Service Design are:
Purpose: To provide a single source of consistent information on all of the
agreed services, and ensure it's widely available to those who are approved to
access it.
Goal: To ensure that a Service Catalog is produced and maintained, containing
accurate info on all operational services and those preparing to be run
operationally.
Objective: to manage the information contained within the Service Catalog and
to ensure that it is accurate and reflects the current details, status,...
This is a document that contains all the Services that are provided, a description of the service, service levels,
cost of the service, the customer and the person/department responsible for the maintenance of the service.
The content of a Service Catalogue will vary depending on the requirements of the IT organization. S
ervice Specification sheets often form part of the Service Catalog.
The Business Service Catalog contains details of all the IT services delivered to the customer,
together with relationships to the business units and the business process that rely on the
IT services.
This is the customer view of the Service Catalogue.
The Technical Service Catalog contains details of all the IT services delivered to the customer,
together with relationships to the supporting services, shared services, components, and
CIs necessary to support the provision of the service to the business. This should underpin
the Business Service Catalogue and not form part of the customer view.
Some organizations only maintain either a Business Service Catalogue or a Technical Service
Catalog. The preferred situation adopted by the more mature organizations maintains both aspects
within a single Service Catalogue, which is part of a totally integrated Service Management
activity and Service Portfolio.
Activities in process require assuring the following outcomes:
Service Catalog Management is a sub-process of Service Level Management and therefore
is related to all other processes.
The Process responsible for managing Risks that could seriously affect IT Services
ITSCM ensures that the IT Service Provider can always provide minimum agreed Service Levels, b
y reducing the Risk to an acceptable level and Planning for the Recovery of IT Services
ITSCM should be designed to support Business Continuity Management
Managing risks to ensure that at all times the business can conutine to operate to, at least, a pre-determined minimum level
An unplanned situation in which it is expected that the period during which one or more IT services will be unavailable will exceed threshold values agreed to with the customer.
BIA is the Activity in Business Continuity Management that identifies Vital Business Functions and their dependencies. These dependencies may include Suppliers, people, other Business Processes, IT Services, etc. BIA defines the recovery requirements for IT Services. These requirements include Recovery Time Objectives, Recovery Point Objectives, and minimum Service Level Targets for each IT Service.
Business impact analysis
critical business processes
Risk Assessment
Identify risks – i.e. risks to particular IT Service components (assets) that support the business process which cause an interruption to service
A Plan defining the steps required to Restore Business Processes following a disruption. The Plan will also identify the triggers for Invocation, people to be involved, communications, etc. IT Service Continuity Plans form a significant part of Business Continuity Plans.
Risk Reduction Measures
Most organisations have to adopt a balanced approach where risk reduction and recovery are complementary and both are required
a comprehensive backup and recovery strategy, including off-site storage
the elimination of single points of failure such as a single power supply into a building
outsourcing services to more than one provider
resilient IT systems and networks constantly change-managed to ensure maximum performance
greater security controls such as a physical access control system using smartcards
better controls to detect local service disruptions such as fire detection systems coupled with suppression systems
improving procedures to reduce the likelihood of errors or failures such as Change control
Recovery Options
+ - Do Nothing
Few, if any, organisations can function effectively without IT Services. Even if there is a requirement for stand-alone PC processing, there is still a need for recovery to be supported
+ - Manual Work-around
might be an options of some business processes. For example for paying employees the previous months bank transactions could be repeated and errors corrected later
+ - Reciprocal Agreement
Entering into an agreement with another organisation using similar technology used to be an effective contingency option when the computing workload was essentially batch processing
+ - Gradual Recovery (Cold, 72hrs+)
This option (sometimes referred to as ‘cold stand by’) is applicable to organisations that do not need immediate restoration of business processes and can function for a period of up to 72 hours, or longer, without a re-establishment of full IT facilities
+ - Intermediate Recovery (‘warm stand by’, 24-72 hrs)
This option (sometimes referred to as ‘warm stand by’) is selected by organisations that need to recover IT facilities within a predetermined time to prevent impacts to the business process. This typically involves the re-establishment of the critical systems and services within a 24 to 72 hour period
+ - Immediate Recovery ('hot standby', < 24hrs)
This option (sometimes referred to as ‘hot stand by’) provides for immediate restoration of services and is usually provided as an extension to the intermediate recovery provided by a third party recovery provider
It is important to distinguish between the previous definition of ‘hot stand by’ and ‘immediate recovery’. Hot stand by typically refers to Availability of services within a short timescale such as 2 or 4 hours whereas immediate recovery implies the instant Availability of services
Recovery options need to be considered for:~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~People and accommodation – including alternative premises either owned, leased or through agreement with a third party; reciprocal arrangements with other organisations; and rapid procurement of alternative premises or refurbishment of existing premises. Consideration should also be given to the respective location of the proposed premises, the mobility of the staff who will be supporting the recovered business operations including IT staff and the total number of staff required to support the business process. IT systems and networks – ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~these options need to be identified and agreed by the IT Manager responsible for ITSCM and include recovery of IT systems, hardware, applications, software and networks, and the data used within these systems and facilities. This relies on the Availability of effective backups to enable restoration of the service and needs to be performed in collaboration with Availability Management. This strategy should also include the implementation of Continuity mechanisms to support local disruption/interruption of IT Services supporting critical business processes, such as disk mirroring, UPS or dual power supplies, dual communication links, etc. * Critical services such as power, telecommunications, water, couriers and post. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~* Critical assets such as paper records and reference material. ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Organization / Implementation Planning
Executive – including senior management/executive board with overall authority and control
Co-ordination – typically one level below the Executive group and responsible for co-ordinating
Recovery – a series of business and service recovery teams representing the critical business functions and the services that need to be established to support these functions. Each team is responsible for executing the plans within their own areas and for liaison with staff, Customers and third parties
Stand-by arrangements
negotiating for third party recovery facilities and entering into a contractual arrangement
purchasing and installing stand-by computer systems
preparing and equipping the stand-by accommodation
negotiating with external service providers on their ITSCM plans and undertaking due diligence if necessary
this should cover the organisation and in particular, the IT organisation, for Service
Continuity-specific items. This ensures that all staff are aware of the implications of
Business Continuity and of Service Continuity and consider these as part of their
normal working routine and budget.
regular review of all of the deliverables from the ITSCM process needs to be undertaken to ensure that they remain current. With respect to IT this is required whenever there is a major Change to the IT Infrastructure, assets or dependencies such as new systems or networks or a change in service providers, as well as when there is a change in business direction, business strategy or IT strategy. As organisations typically have rapid change, it is necessaryto invest in an ongoing review programme and incorporate ITSCM into the organisational business justification processes. New requirements will be implemented in accordance with the Change control process.
following the initial testing it is necessary to establish a programme of regular testing to ensure that the critical components of the strategy are tested at least annually or as directed by senior management or audit. It is important that any changes to the IT Infrastructure are included in the strategy, implemented in an appropriate fashion and tested to ensure that they function correctly within the overall provision of IT Services.
KPIs
Relationships
Service Level Management– understanding the obligations of IT Service Delivery
Configuration Management – defining the core Infrastructure
Capacity Management – ensuring that business requirements are fully supported through appropriate IT hardware resources
Change Management – ensuring the currency and accuracy of the Continuity Plans through established processes and regular reviews
Availability Management – delivering risk reduction measures to maintain ‘business as usual’
Service Desk/Incident Management – utilising historical data (statistics).
The Capacity Management process is designed to ensure that the capacity of the IT infrastructure
is aligned to business needs.
The main purpose of Capacity Management is to understand and maintain the required level of
service delivery (via the appropriate capacity) - at an acceptable cost.
Through gathering business and technical capacity data this process plans for and delivers the,
cost justified, capacity requirements of the business. The Capacity plan is the core document that
describes how this will take place over the coming period.
Modeling method include:
Application sizing has a finite life-span. It is initiated at the Project Initiation stage for a new
application or when there is a major Change of an existing application, and is completed
when the application is accepted into the operational environment.
The primary objective of application sizing is to estimate the resource requirements to
support a proposed application Change or new application, to ensure that it meets its
required service levels. To achieve this application sizing has to be an integral part of the
applications lifecycle.
It is important that the utilisation of each resource and service is monitored on an on-going
basis to ensure the optimum use of the hardware and software resources, that all agreed
service levels can be achieved, and that business volumes are as expected
Part of the monitoring activity should be of thresholds and baselines or profiles of the normal
operating levels. If these are exceeded, alarms should be raised and exception reports produced.
These thresholds and baselines should have been determined from the analysis of previously
recorded data
The data collected from the monitoring should be analysed to identify trends from which
the normal utilisation and service level, or baseline, can be established. By regular monitoring
and comparison with this baseline, exception conditions in the utilisation of individual
components or service thresholds can be defined, and breaches or near misses in the SLAs
can be reported upon
The analysis of the monitored data may identify areas of the configuration that could be
tuned to better utilise the system resource or improve the performance of the particular
service
Timely resource requirement forecasts
Accurate forecasts of trends
Breached SLAs because of old technology
Performance and throughput measures of all services
Reduction in panic buying
Accurate forecasts of planned expenditures
Reduction in incidents
Act on recommendations
Relationships
Incident Management keeps Capacity Management informed of Incidents related to Capacity and performance
Capacity Management supports the Incident Management process by resolving and documenting Capacity related Incidents
Capacity Management provides a specialist support role to identify, diagnose and resolve Capacity related Problems
Capacity Management is represented on the Change Advisory Board, to assess the impact of Changes on existing Capacity and to identify additional Capacity requirements
Capacity Management helps determine the distribution strategy, particularly where the network is used for distribution. Factors such as network bandwidth, host and target Capacity, distribution window and number of targets need to be considered as part of the distribution strategy
Conceptually the Capacity DB forms a subset of the Configuration Management Database ( CMDB ). The technical, service, utilisation, financial and business data all pertain to attributes of CIs (CIs) maintained in the CMDB. Without this information on individual CIs, Capacity Management cannot function effectively.
Capacity Management supports Service Level Management ( SLM ) to ensure that performance
and Capacity targets for new or changed requirements can be achieved
Performance is dependent on a given workload, therefore both are required in an SLA with
specific performance targets
there may be a requirement for Capacity Management to assist SLM in drafting and reviewing
Operational Level Agreements and external contracts where Capacity or performance issues are involved
Capacity Management is concerned with economic provision of services
Financial justification and efficiency gains are demonstrated with the assistance of Financial Management
A cost summary should be provided as part of the Capacity Plan
Procurement recommendations included in the Capacity Plan should be compared with budget forecasts and actuals before purchase
Capacity Management determines the Capacity required for all recovery options used. The minimum hardware and software configurations required are defined to provide the required performance and throughput levels following an invocation
Performance and Capacity Problems result in Unavailability i.e. unacceptably slow performance is effectively the same as Unavailability
Therefore Capacity and Availability Management share common goals and complement each other
The Capacity Plan documents the current levels of resource utilisation and service performance and
forecasts the future requirements for resource to support the IT Services that underpin the business activities
The Capacity Plan uses information gathered by the sub-processes.This Sub-section therefore should contain details of how and when this information was obtained, for example business forecasts obtained from business plans, workload forecasts obtained from Customers, service level forecasts obtained by the use of modelling tools
This sub process has the focus on the long term. It is responsible for ensuring that the future
business requirements are taken into consideration then planned and implemented as necessary.
The Service Capacity Plan s responsible for ensuring that the performance of all current IT services falls within the parameters detailed as targets within SLA’s.
The Component Capacity Plan Is responsible for the management of the individual components
within the infrastructure. Component capacity management has more of a technical focus.
Resource and Component are synonymous however the Resource Capacity Plan is an
ITIL V2 term whereas Component Capacity Plan is an ITIL V3 term
The Process responsible for ensuring that all Contracts with Suppliers support the needs
of the Business, and that all Suppliers meet their contractual commitments
When the sourcing decision includes utilizing outside vendors, then those suppliers
must be managed. That is the responsibility of the Supplier Management process.
A Third Party responsible for supplying goods or Services that are required to deliver IT Services
Examples of suppliers include commodity hardware and software vendors, network and telecom
providers, and outsourcing organizations
A legally binding Agreement between two or more parties
In order to achieve consistency and effectiveness in the implementation of the policy, a Supplier and
Contracts Database (SCD) should be established, with clearly defined roles and responsibilities.
Ideally the SCD should form an integrated element of a comprehensive CMS or SKMS, recording all
supplier and contract details, together with details of the type of service(s) or product(s) provided by
each supplier, and all other information and relationships with other associated CIs. The services
provided by suppliers will also form a key part of the Service Portfolio and the Service Catalogue.
The relationship between the supporting services and the IT and business services they support
are key to providing quality IT services.
This information within the SCD will provide a complete set of reference information for all Supplier
Management procedures and activities:
The first two elements within the above list are covered within the Service Design stage.
The third element is part of Service Transition, and the last two are part of the Service Operation stage.
The following activities supprt this process:
The Process that ensures the Confidentiality, Integrity, and Availability of an Organization’s
Assets, information, data and IT Services
Information Security Management usually forms part of an Organizational approach to
Security Management that has a wider scope than the IT Service Provider, and includes
handling of paper, building access, phone calls, etc., for the entire Organization
Information Security Management balances Confidentiality, Availability, and Integrity of information,
and implements justifiable controls to ensure continued IT Service within secure parameters.
The Information Security Management process and framework will generally consist of:
protecting sensitive info from unauthorised disclosure
safeguarding the accuracy and completeness of info
ensuring that information and vital IT services are availble when required
the confidentiality of data that can be linked to one person
the confidentiality of a user's identity
the possibility of veryfying that information is used properly and of demonstrating that the security measures is working properly
Information security works because of discipline, and only when supported by clear documentation and procedures. In order to achieve effectiveness, motivation is absolutely necessary. The degree of effort required for informing and educating employees depends on the national and organisational culture. However, making security work always involves an investment
is part of security incident control. Part of incident control is knowing whether similar incidents have occurred in the past and what solutions were used at the time. Security incident registration is also used to determine which part of the organisation experiences more security incidents (of a certain type) than others. This will be an indication that certain measures have to be enforced more rigorously or that different types of measures are in order. Security incident registration and handling, or, for short, security incident control, is part of the incident control process.
The handling of security incidents has to be dealt with appropriately. Front doors that have been forced open cannot be left till another day. A rapid reaction is especially required when the consequences of security incidents cross organisational boundaries. Co-ordination with neighbouring organisations may be essential to locate the cause and origin of the incident
Evaluate
Internal audits (reviews performed by internal Electronic Data Processing (EDP) auditors)
External audits (performed by external independent EDP auditors)
Self assessments (performed within the line-organisation itself)
Evaluation, and in particular the information about the effectiveness of the measures provides the feedback that creates a closed-loop control system. Such a system is able to maintain and improve itself. Such a system is needed to be ‘in control’
evaluation takes place based on the reported security incidents. These security incidents are passed to the Problem Management process for aggregation and trend analysis
Reports -> Output
Objective: - To provide the customers with relevant information on information security.
Senior management of the customer has to be aware of the efficiency of the resources spent on security measures and the effectiveness of the measures
Not only the status of implementation, but also the impact of the measures has to be reported. Security incident handling can form a starting point for impact reports
status of information security like implemented measures, education and reviews including self assessments and risk analyses
overview of security incidents and the reaction to these incidents – this compared to a previous time frame
status of awareness programs
trends on incidents per system, per process, per department, etc.
for certain security incidents, the Incident Control/Help Desk and the Security Manager do have a direct channel to the customer’s representative. This goes beyond the normal reporting procedures
CSFs & KPIs
Relationships
SLM makes a distinction between a number of connected activities that have to be examined from the security point of view
Security is classifying the CIs by linking them to a particular set of security measures or procedures
if a 'problem' arises from security incidents, it may be that separate procedures have to be followed
first, consider the people who may be involved or who may know about the security incident. Knowledge of a possible security leak should also be kept to the minimum to prevent misuse or exploitation
second, consider the people whom it is essential to involve in finding a soluition for the security incident
third, always ensure that no new security problems arise from the implemtation of the solution
resource management: assessing new technologies from the viewpoint of security
modeling: make it possible to set up a number of security scenarios and make various 'what if' scenarios
it is important that all software, hardware and documentation enter the organisation through this process in a controlled manner. this process ensures that: * the correct CIs (software, hardware and doco) are used * the CIs are tested in advance * the introduction is authorised in the correct manner (by means ofa n approved RFC) * the CI's are legal (especially software) * the software is virus and spyware free and remain so when distributed * the version numbers are known (and registered in the CMDB) * the roll-out process is tested in advance * it is possible to back-out and tho go back ot hte old situation * controlled introduction is possible
The Process responsible for defining, analyzing, Planning, measuring, and improving all
aspects of the Availability of IT Services
Availability Management is responsible for ensuring that all IT Infrastructure, Processes,
Tools, Roles, etc. are appropriate for the agreed Service Level Targets for Availability
Availability Management should ensure the agreed level of availability is provided. The
measurement and monitoring of IT availability is a key activity to ensure availability levels
are being met consistently.
Availability Management should look to continually optimize and proactively improve
the availability of the IT infrastructure, the services and the supporting organization, in
order to provide cost effective availability improvements that can deliver business and
customer benefits.
Ability of an IT service or component to perform its required function at a stated instant or over a stated period of time.
Freedom from operational failure.
Maintenance done on systems from an internal focus.
Maintenance done on systems from an external focus.
Redundancy, to allow IT's continued operation despite the incorrect functioning of one of more of its subsystems.
The element of a business process considered business critical.
CCTA Risk Analysis Managment Methodology
describes the means of identifying justifiable countermeasures to protect CIA of the IT Infrastructure.
Fault Tree Analysis
Systems Outage Analysis
is a technique designed to provide a structured approach to identify end-to-end availability improvement opportunities that deliver benefits to the user. Many of those activities are closely aligned with those of Problem Management.
Component Failure Impact Analysis
a relatively simple technique that can be used to identify SPOFs. During the 'design for availability' activities it is necessary to predict and evaluate the impact on IT service availability arising from component failure
Technical Observation Post
a pre-arranged gathering of specialised technical support staff brought toghether to focus on specific aspects of the IT infrastructure. Its purpose is to identify life events, reale time as they occur, with the specific aim to identify improvement opportunities or bottlenecks that exist within the current IT Infrastructure
Activities
The introduction of Availability Management without the other processes in place is likely to fail, as without the support of the other processes it can't deliver the agreed availability.
Incident Management and Problem Management provide a key input to ensure the appropriate corrective actions are being progressed.
The measurements and reporting of IT availability ensures that the level of availability delivered, meets the Service Level Agreement (SLA). Availability Management supports the Service Level Management process in providing measurements and reporting to support service reviews
Key Performance Indicators
The Process responsible for negotiating Service Level Agreements, and ensuring that these are met
SLM is responsible for ensuring that all IT Service Management Processes, Operational Level Agreements,
and Underpinning Contracts, are appropriate for the agreed Service Level Targets
SLM monitors and reports on Service Levels, and holds regular Customer reviews
SLM provides a consistent interface to the business for all service-related issues. It provides the business
with the agreed service targets and the required management information to ensure that those targets have
been met. Where targets are breached, SLM should provide feedback on the cause of the breach and details
of the actions taken to prevent the breach from recurring. Thus SLM provides a reliable communication
channel and a trusted relationship with the appropriate customers and business representatives.
Service Level Agreement
An Agreement between an IT Service Provider and a Customer.
The SLA describes the IT Service, Service Level Targets, and specifies the responsibilities of the IT Service Provider and the Customer.
A single SLA may cover multiple IT Services or multiple customers.
Contractual Elements:
customer determines the security requirements
Describes the security baseline (standard security measures)
general information policy, list of authorised personnel, asset protection measures, restrictions on copying data etc.
Types
The requirements that are the basis for building SLAs. In general, the more specifc the requirements,
the more successful the SLA will be.
Agreement between two internal IT areas / departments, e.g. Network Management and Service Desk.
Contract with an external supplier providing services to IT.
Defines services available to the customer from IT. See Service Portfolio management
Formal project undertaken within Service Level Management to improve processes or IT Services,
focusing on customer/staff satisfaction.
A listing of clients' service requirements that form the basis for SLAs.
Keep SLA simple -
Specific, Measurable, Agreed, Realistic, Timely
Using the Service Catalogue as an aid, SLM must design the most appropriate SLA structure
to ensure that all services and all customers are covered in a manner best suited to the
organization’s needs.
This is where an SLA covers one service, for all the customers of that service.
For example, an SLA may be established for an organization's e-mail service, c
overing all of the customers of that service.
This may appear fairly straightforward. However, difficulties may arise if the specific r
equirements of different customers vary for the same service, or if characteristics of the
IT infrastructure mean that different service levels are inevitable (e.g., head-office staff
may be connected via a high-speed LAN while local offices may have to use a lower
speed leased line). In such cases, separate targets may be needed within one agreement.
Difficulties may also arise in determining who should be the signatories to such an agreement.
This is an agreement with an individual customer group, covering all the services its members use.
For example, agreements may be reached with an organization's finance department covering the
finance system, accounting system, payroll system, billing system, procurement system, and
any other IT systems that they use.
Customers often prefer such an agreement, because all of their requirements are covered in a
single document. Only one signatory is normally required, which simplifies this issue.
Some organizations have chosen to adopt a multi-level SLA structure. For example, a three-layer structure as follows:
Key Performance Indicator (KPI): A Metric that is used to help manage a Process, IT Service, or Activity
Many Metrics may be measured, but only the most important of these are defined as KPIs
and used to actively manage and report on the Process, IT Service, or Activity
KPIs should be selected to ensure that Efficiency, Effectiveness, and Cost Effectiveness are all managed.
Key Performance Indicators (KPIs) and metrics can be used to judge the efficiency and effectiveness of the SLM
activities and the progress of the SIP. These metrics should be developed from the service, customer and
business perspective and should cover both subjective and objective measurements
Critical Success Factor (CSF): Something that must happen if a Process, Project, Plan, or IT Service is to succeed.
KPIs are used to measure the achievement of each CSF. For example a CSF of “protect IT Services when making Changes”
could be measured by KPIs such as “percentage reduction of unsuccessful Changes,” “percentage reduction in Changes causing Incidents,” etc.
The key activities within the SLM process should include:
Set Requirements
Monitor Service Performance
Improve Customer Satisfaction
Produce service reports
Review agreements
Maintain Relationships
Log Cheers and Jeers
Inform Management
Set SLM Standards
Service Level Management is at once the basis and, the result of the implementation
of Service Management processes. Service Level Management is related to every
other module within Service Management.
KPIs
percentage reduction in SLA targets missed
percentage reduction in SLA targets threatened
percentage increase in Customer perception of SLA achievements via CSS responses
percentage reduction in SLA breaches caused because of third party support contracts (Underpinning Contracts)
percentage reduction in SLA breaches caused because of internal Operational Level Agreements (OLAs).
RACI identifies four basic relationships that different roles in an organization may have to a given task, process, activity, etc.
Responsible
Who performs the task, activity, process, etc? There may be more than one role responsible.
Accountable
Ultimately, who answers for the task, activity, process, etc? There may be one and only one person/role accountable.
Consulted
Whose input must be taken into account for the task, activity, etc. in question?
Informed
Who must be informed about a task, activity, etc?
Occasionally an expanded version of RACI is used, called RACI-VS, with two further roles as follows:
Verifies
The person or group that checks whether the acceptance criteria have been met.
Signs off
The person who approves the V decision and authorizes the product hand-off. This could be the A person.
Many designs, plans, and projects fail through a lack of preparation and management. The implementation of ITIL Service Management as a practice is about preparing and planning the effective and efficient use of the four Ps: The People, the Processes, the Products (services, technology and tools) and the Partners (suppliers, manufacturers and vendors).
When designing a service, you may find that your organization lacks the capabilities
necessary to deliver the service
Sourcing Approaches:
Insourcing: This approach relies on utilizing internal organizational resources in the design,
development, transition, maintenance, operation, and/or support of new, changed, or revised
services or data center operations.
Outsourcing: This approach utilizes the resources of an external organization or organizations in
a formal arrangement to provide a well defined portion of a service’s design, development,
maintenance, operations, and/or support. This includes the consumption of services from
Application Service Providers (ASPs) described below.
Co-sourcing: Often a combination of insourcing and outsourcing, using a number of outsourcing
organizations working together to co-source key elements within the lifecycle. This generally involves
using a number of external organizations working together to design, develop, transition, maintain,
operate, and/or support a portion of a service.
Partnership or multi-sourcing: Formal arrangements between two or more organizations to work
together to design, develop, transition, maintain, operate, and/or support IT Services. The focus here
tends to be on strategic partnerships that leverage critical expertise or market opportunities.
Business Process Outsourcing (BPO): The increasing trend of relocating entire business functions
using formal arrangements between organizations where one organization provides and manages the
other organization’s entire business processes or functions in a low-cost location. Common examples
are accounting, payroll, and call center operations.
Application Service Provision: Involves formal arrangements with an Application Service Provider (ASP)
organization that will provide shared computer-based services to customer organizations over a network.
Applications offered in this way are also sometimes referred to as on-demand software/applications.
Through ASPs, the complexities and costs of such shared software can be reduced and provided to
organizations that could otherwise not justify the investment.
Knowledge Process Outsourcing (KPO): The newest form of outsourcing, KPO is a step ahead of BPO
in one respect. KPO organizations provide domain-based processes and business expertise rather than j
ust process expertise, and require advanced analytical and specialized skills.
A process is always organized around a set of objectives. The main outputs from the
process should be driven by the objectives and should always include process
measurements (metrics), reports, and a plan for process improvement.
Processes, once defined, should be documented and controlled. Once under control,
they can be repeated and become manageable. Degrees of control over processes can
be defined, and then process measurement and metrics can be built into the process
to control and improve the process.
There are four types of metrics that can be used to measure the capability and performance of processes
Service Knowledge Management System
Developed during the Service Strategy lifecycle, the SKMS is the set of tools and databases
that are used to manage knowledge and information about IT services.
The SKMS stores, manages, updates, and present all information that an IT Service Provider
needs to manage the full lifecycle of IT Services.
The SKMS is a wrapper for all the databases used to manage IT services
Configuration Management Database
The CMDB is built during the Transition lifecycle phase, but is critical to All ITIL Processes. Most organizations
already use some sort of CMDB, in a spreadsheet or paper based. In most cases the CMDB is based on
database technologies, which makes gathering information more user friendly. Information that can be
gathered from a CMDB include:
A CMDB also contains information on relationships between Incidents, Problems, Known Errors, Changes, Releases and C.I.'s.
The CMDB can aid as a support tool in the creation and on-going maintenance of legal contracts (Compliance Management).
Examples of "relationships" that can be defined are:
Relies on....
Is part of....
Affects....
Is linked to...
Had ......
Known Error Database
This database is created withing the Problem Management process of the Service Operation Lifecycle
The Known Error Database stores historical knowledge of incidents and problems and how they were overcome
The complete set of Services that are managed by a Service Provider
The Service Portfolio is developed during the Service Strategy Lifecycle and is
used to manage the entire Lifecycle of all Services. It includes three Categories/databases:
A database listing IT Services that are under consideration or development, but are not yet available to customers.
The database containing information about all live IT Services, including those available for deployment.
The Service Catalog is the only part of the Service Portfolio published to customers.
A database listing IT Services that are no longer available to customers.
A process is a structured set of activities designed to accomplish a specific objective
A Process takes one or more defined inputs and turns them into defined outputs
A Process may include any of the roles, responsibilities, tools, and management controls required to reliably deliver the outputs
A process may define policies, standards, guidelines, activities, and work instructions if they are needed
Processes:
The structure of a system or IT Service, including the relationships of components to each other and to the environment in which they exist
Architecture also includes the standards and guidelines that guide the design and evolution of the system
A number of related things that work together to achieve an overall objective
For example:
Day-to-day IT business, operating. A place to start if you are new to ITIL
A guide to develop practices involved in the management of Service Operations.
The framework provides methods to stabilize services and allow changes.
Proactive and reactive control perspectives are illustrated and management is
given the information to make wise decisions to optimize the service lifecycle.
The Process responsible for managing Events throughout their Lifecycle
Event Management is one of the main Activities of IT Operations
A change of state that has significance for the management of a Configuration Item or IT Service
The term Event is also used to mean an Alert or notification created by any IT Service, Configuration Item, or Monitoring tool
Events typically require IT Operations personnel to take actions, and often lead to Incidents being logged
Once an Event Notification has been generated, it will be detected by an agent running on the same system,
or transmitted directly to a management tool specifically designed to read and interpret the meaning of the Event.
The purpose of filtering is to decide whether to communicate the Event to a management tool or to ignore it.
If ignored, the Event will usually be recorded in a log file on the device, but no further action will be taken.
ITIL suggests the following levels of significance:
Informational - No action required
Warning - Requires investigation
Exception - Requires action
Event Correlation is the decision making process on the significance of events.
Many event management tools incorporate Event Correlation Engines that apply
Business Rules to perform event correlation automatically.
Event Correlation Engines are typically state aware, that is, they maintain an awareness of
events over time in order to relate events and make decisions based on the flow over events,
for example:
A change of state that has significance for the management of a Configuration Item or IT Service
The term Event is also used to mean an Alert or notification created by any IT Service, Configuration Item, or Monitoring tool
Events typically require IT Operations personnel to take actions, and often lead to Incidents being logged
Event managment Process Activities:
Trigger
This is most frequently and automated response from an Event Management tool, such as a threshold violation,
but an event can be manually detected, as in a warning light on some piece of hardware
Event Logged
Once of many good reasons for ogging events is that a single event may not require action, but a thousand might.
Response Selection
At this point in the process, there are a number of response options available. It is important to note that the response options can be chosen in any combination. For example, it may be necessary to preserve the log entry for future reference, but at the same time escalate the Event to an Operations Management staff member for action.
Review Actions
With thousands of Events being generated every day, it is not possible to formally review every individual Event. However, it is important to check that any significant Events or exceptions have been handled appropriately, or to track trends or counts of Event types, etc. In many cases this can be done automatically, for example polling a server that had been rebooted, using an automated script to see that it is functioning correctly.
Close Event
Some events will remain open until a certain action takes place; for example, an event that is linked to an open Incident. However, most events are not “opened” or “closed.”
Event management interfaces with any process that requires monitoring and control, primarily
Incident Management, Problem management and Change Management.
Capacity and Availability Management are critical in defining what events are are significant
Configuration Management interfaces with Event Management with respect to CI status
Asset Management may use Event Management to determine lifecycle status
Example Event Management KPIs include:
The Process responsible for managing the Lifecycle of all Incidents
The primary Objective of Incident Management is to return the IT Service to Customers as quickly
as possible and to restore normal service operation as quickly as possible and minimize the
adverse impact on business operations, thus ensuring that the best possible levels of service
quality and availability are maintained
“Normal service operation” is defined here as service operation within SLA limits
Incident Management also requires access to the CMS. This will help it to identify the CIs affected by the incident and also to estimate the impact of the incident. The Known Error Database provides valuable information about possible resolutions and workarounds.
An unplanned interruption to an IT Service or reduction in the Quality of an IT Service
Failure of a Configuration Item that has not yet affected Service is also an Incident
For example Failure of one disk from a mirror set
Part of the initial logging must be to allocate suitable incident categorization coding so that the exact type of the call is recorded. This will be important later when looking at incident types/frequencies to establish trends for use in Problem Management, Supplier Management, and other ITSM activities.
Multilevel categorization is available in most tools – usually to three or four levels of granularity. For example an incident may be categorized as:
Or:
Measure of the business criticality of an Incident. Often equal to the extend on the amount of damage or distortion of agreed and expected service levels.
Impact + Urgency = Priority
Impact is a measure of the business criticality of an incident or problem, and is often equal to the extent to which an
incident leads to degradation of agreed service levels. Impact can be measured by the number of people or
systems affected. Specific criteria for assigning impact should be included in the SLA, after consulting with
the business managers.
The determination of impact should be based on information from the CMDB to detect how many users will
suffer as a result of the technical failure of, for example, a hardware component.
The Service Desk should have access to tools that enable it to rapidly perform the following tasks:
measure of the business criticality of an incident or problem based on the impact on and on the business needs of the customer.
Impact + Urgency = Priority
Urgency is the necessary speed of solving an incident of a certain impact. All high-impact incidents do not, by default,
have to be solved immediately. For example, a user having operational difficulties with a workstation (“high” impact)
can have the fault registered with a “low” urgency if they are leaving the office for an extended holiday right after reporting the incident.
Sequence in which an incident or problem needs to be resolved, based on impact and urgency.
Impact + Urgency = Priority
Priority is the defined Sequence in which an Incident or Problem needs to be resolved, based on impact and urgency.
Incident Models predefine the necessary steps for dealing with a particular incident and
ensure standard incidents are handled in a predefined path within predefined timescales
Incident Models within the Incident Management Process define:
The Incident Model should include:
A separate procedure, with shorter timescales and greater urgency, must be used for ‘major’ incidents. A definition of what
constitutes a major incident must be agreed and ideally mapped on to the overall incident prioritization system – such that
they will be dealt with through the major incident process.
Agree on timescales for all incident-handling stages:
Make all support groups aware of these timescales
Use Service Management tools to:
Inputs
Outputs
Detection and Recording
Inputs
Actions:
Outputs
Initial Classificaton & Support
Classification:
One of the most important aspects of Incident Management andone of the most difficult to get right.
The classifcation is used to:
Inputs
Outputs
Assigning impact and urgency, and thereby defining priority
When determining impact, information in the CMDB should be accessed to detect how many users will suffer as a result of
the technical failure of a component or service. The SD should have access to tools that enable it rapidly to:
Investigation and diagnosis by a support group is required in cases where classification matching is
unsuccessful or the resolution process is complex. Even when an incident is handed over to another
group for resolution, the Service Desk should retain ownership and manage it until the user is satisfied.
Once the incident has been assigned to a specialist support group, they should:
Inputs
Actions:
Outputs
Reaching Resolution and Recovery
Resolution activities include:
After successful incident resolution (or some circumvention activity), service recovery can begin and recovery actions carried out.
This phase often involves specialist staff (i.e., second- or third-level support).
The Incident Management system records events and actions during the resolution and recovery activity.
Inputs
Actions:
Outputs
Obtaining Closure
After an incident is resolved, the Service Desk should ensure:
The incident closure routine should have restricted access and should be controlled by the Service Desk Manager.
If a service provider and a user disagree about the validity of closure, the above details will be essential to resolving the dispute.
Inputs
Actions:
Outputs
KPIs
The Process responsible for managing the Lifecycle of all Service Requests
Objectives:
A request from a User for information or advice, or for a Standard Change or for Access to an IT Service
For example to reset a password, or to provide standard IT Services for a new User
Service Requests are usually handled by a Service Desk, and do not require an RFC to be submitted
Activities:
The primary interfaces with Request Fulfillment include:
Service Desk/Incident Management where Service Requests should be initiated.
There is also a strong link to Release Management and Asset and Configuration Management
Servie Requests may also be related to Problem Management
The Process responsible for managing the Lifecycle of all Problems
The primary objectives of Problem Management are to prevent Incidents from happening, and to minimize
the Impact of Incidents that cannot be prevented
The Problem Management process is focused on finding weaknesses in the IT infrastructure and through
the use of Change Management removing them so that future disruptions do not occur.
The process focuses on finding patterns between incidents, problems and known errors. These three
areas are key things to understand in this "root cause analysis". The basic principle is starting with many
possibilities and narrowing down to a final root cause.
Note: "Root Cause analysis" is often used interchangeably with Problem Management. The ITIL Framework
doesn't prescribe what a process area should be called and Root Cause Analysis. However, Root Cause
Analysis is typically a reactionary exercise. ITIL's Problem Management caters for reactive work, but more
importantly recognizes the value of proactive problem management. We use Root cause analysis
interchangeably with Problem Management.
Problem management Lifecycle:
Error - Incident - Problem - Known Error - RFC
Error - Incident - Problem - Known Error - RFC
The cause is not usually known at the time a Problem Record is created, and the Problem
Management Process is responsible for further investigation
A problem is the “unknown underlying cause of one or more incidents”.
This is the second stage of "root cause analysis"/problem management.
From the general incidents, more investigation is required for Problems. A “network problem” is a
good example of a problem definition in this case. Users don't call saying I have a "network
problem", they call and say "I can't save to my H: drive" or "I can't print or surf the web".
IT staff then piece all these incidents together and identify that we are facing a "network problem".
Root cause analysis has taken us closer to finding the root cause but not completely.
A problem is then a more specific definition.
Error - Incident - Problem - Known Error - RFC
A Known Error is the final step in the root cause analysis process.
A Known Error can be defined as, “when the root cause of the problem is known”.
In our network problem example it is where the faulty equipment or system has been identified.
This is the end of the root cause analysis process. Following the above example the Known error would be “Router x is faulty”.
The Known Error database:
Each Known Error record minimally includes:
Method of avoiding an incident or problem, either from a temporary fix or from a technique that
means that the customer is not reliant on a particular aspect of a service that is known to have a problem.
The Main activities within Problem Control are:
Error Control is the process in which the Known Errors are researched and corrected.
The request for change comes from this sub-activity and is submitted to Change Management and then
following approval the change is actioned.
The Objective of Error Control is to change IT components to remove known errors thus to prevent and
recurrence of Incidents related to these errors. This requires:
Error Resolution Steps:
The best problems are the ones that never happen!
Proactive Problem Management focuses the analysis of data gathered from other processes and
the goal is to define “Problems”. These problems are then passed off to Problem and Error Control
procedures, as if they had happened.
The activity includes:
The aim of proactive Problem Management is to redirect efforts away from always being reactive, to proactively preventing incidents occurring in the first place
Major problem review
KPIs
The Problem Management process has a close connection with the following ITIL processes:
Incident Management:
A very close and obvious link as we have learned. Problem management aims to solve the root
cause for the Incidents that are recorded by Incident Management. It is important that Incident
Control provides accurate information so that Problem Control can solve the Known Errors easier.
Problem management will supply Incident Management with workarounds and quick fixes where
possible.
Change Management:
If Problem Management finds the solution to a Known Error they have to submit a RFC for the Change.
Change Management is responsible for the implementation of the Change. When it is implemented they,
together with Problem Management, review the Problem to verify that it is solved by the Change. This is
called a Post Implementation Review after which Problem Management can close the problem record.
Configuration Management:
The information that is provided by Configuration Management is important in diagnosing problems.
It includes information about C.I.’s and relationships with other C.I.’s.
Other processes:
Service Level management, Configuration Management and Availability management all provide Problem
Management with information, which help to define and determine the impact of problems. In return
Problem Management provide these and the other process with relevant information, for example, to
SLM if a problem causes a IT Service to operate outside the Agreed Service levels or to Capacity
Management if a certain hard disk is the cause of a Problem.
The Process responsible for allowing Users to make use of IT Services, data, or other Assets
Access Management helps to protect the Confidentiality, Integrity, and Availability of Assets by ensuring that only authorized Users are able to access or modify the Assets
Access Management is sometimes referred to as Rights Management or Identity Management. Access Management provides the right for users to be able to use a service or group of services. It is therefore the execution of policies and actions defined in Security and Availability Management.
Terms:
Main activities include:
Access Management is an execution of Information Security Management Process
There are also ties to Availbility Management and to Request Fulfillment and/or Change Management
Example KPI's:
Technical and Application Management are functions that apply to many processes across all lifecycle phases, but are introduced in the ITIL SO book in the context of the Event and Access Management processes.
Technical Management is the Function responsible for providing technical skills in support of IT Services and management of the IT Infrastructure
Technical Management defines the Roles of Support Groups, as well as the tools, Processes, and Procedures required
Technical Management Dual Role
By performing these two roles, Technical Management ensures that the organization has access to the right type and level of human resources to manage technology and meet business objectives
Role 1: Oversees technical knowledge and expertise related to managing the IT Infrastructure
Ensures the knowledge required to manage IT services exists
Role 2: Provides the actual resources to support the ITSM Lifecycle
Ensures that resources are effectively trained and deployed to operate technology required to deliver and support IT services
Application Management is the Function responsible for managing Applications throughout their Lifecycle
Application Management Dual Role
Application Management is to applications what Technical Management is to the IT Infrastructure
Role 1: Oversees technical knowledge and expertise related to managing applications
Ensures the knowledge required to manage IT services exists
Role 2: Provides the actual resources to support the ITSM Lifecycle
Ensures that resources are effectively trained and deployed to operate technology required to deliver and support IT services
Service Automation is considered to improve the utility and warranty of services. It may offer advantages in many areas of opportunity, including the following:
The Function within an IT Service Provider that performs the daily Activities needed to manage
IT Services and the supporting IT Infrastructure
IT Operations Management includes IT Operations Control and Facilities Management
IT Operations Control
Facilities Management
Facilities Management, which refers to the management of the physical IT environment, typically a Data Centre or computer
rooms and recovery sites together with all the power and cooling equipment. Facilities Management also includes the
coordination of large-scale consolidation projects (e.g., Data Centre consolidation or server consolidation projects).
In some cases the management of a data centre is outsourced, in which case Facilities Management refers to the
management of the outsourcing contract.
The Single Point of Contact between the Service Provider and the Users
A typical Service Desk manages Incidents and Service Requests,
and also handles communication with the Users
Objective: To provide a single point of contact for CustomersTo facilitate the restoration of normal operational
service with minimal business impact on the Customer within agreed service levels and business priorities
A Service Desk is a functional unit made up of a dedicated number of staff responsible for dealing with a variety of service events,
often made via telephone calls, Web interface, or automatically reported infrastructure events. The Service Desk is a vitally
important part of an organization’s IT Department and should be the single point of contact for IT users on a day-by-day basis –
and will handle all incidents and service requests, usually using specialist software tools to log and manage all such events.
The value of an effective Service Desk should not be underrated
The Service Desk provides advice, guidance and rapid restoration of normal service provision to customers.
A request from a User for information or advice, or for a Standard Change or for Access to an IT Service
For example to reset a password, or to provide standard IT Services for a new User
Service Requests are usually handled by a Service Desk, and do not require an RFC to be submitted
The Process responsible for managing the Lifecycle of all Service Requests
Objectives:
Only define groups for a very small number of key services where call rates justify a specialized service
Service Desks are physically close to the community they serve
The local service desk is practical for smaller organizations with lower volumes of service requests
Considerations:
Service Desk appears central but personnel are located in any number of locations
The physical location of the service desk and the associated services are immaterial.
The "Virtual Service Desk" can be situated and accessed from anywhere in the world.If your organisation has
multiple locations, having a single global support service has major business benefits, including:
Considerations when setting up a Virtual Service Desk:
In this arrangement, all service requests are logged to a central physical location.
If the orgnisation has mulitple locations, having a central supportservice has major benefits:
Combines global Service Desks to provide 24-hr service
Points to consider:
The following should be considered when considering outsourcing:
Common Tools and Processes
If the Service Desk is outsourced, care must be taken that the tools are consistent with those still being used in the customer organization. Outsourcing is often seen as an opportunity to replace outdated or inadequate tools, only to find that there are severe integration problems between the new tool and the legacy tools and processes.
SLA targets
The SLA targets for overall incident-handling and resolution times need to be agreed with the customers and between all teams and departments – and OLA/UC targets need to be coordinated and agreed with individual support groups so that they underpin and support the SLA targets.
Good communications
The lines of communication between the outsourced Service Desk and the other support groups need to work very effectively.
Ownership of data
Clear ownership of the data collected by the outsourced Service Desk must be established. Ownership of all data relative to users, customers, affected CIs, services, incidents, Service Requests, changes, etc. must remain with the organization that is outsourcing the activity – but both organizations will require access to it. Data that is related specifically to performance of employees of the outsourcing company will remain the property of that company, which is often legally prevented from sharing the data with the customer organization. This may also be true of other data that is used purely for the internal management of the Service Desk, such as head count, optimization activities, Service Desk cost information, etc. All reporting requirements and issues around ownership of data must be specified in the underpinning contract with the company providing the outsourcing service.
The Service Desk is often an “entry-level” position
Advantage: Excellent starting point for an ITSM career
Disadvantage: Novice staff may not understand the business or technology
Suggestions
Staffing Level Considerations
Skill levels
An organization must decide on the level and range of skills it requires of its Service Desk staff – and then ensure that these skills are available at the appropriate times. A range of skill options are possible, starting from a ‘call logging’ service only – where staff need only very basic technical skills – right through to a ‘technical’ Service Desk where the organization’s most technically skilled staff are used. In the case of the former, there will be a high handling but low resolution rate, while in the latter case this will be reversed.
The decision on the required skills level will often be driven by target resolution times (agreed with the business and captured in service level targets), the complexity of the systems supported and ‘what the business is prepared to pay.’ There is a strong correlation between response and resolution targets and costs – generally speaking, the shorter the target times, the higher the cost because more resources are required.
Once the required skill levels have been identified, there is an ongoing task to ensure that the Service Desk is operated in such a way that the necessary staff obtain and maintain the necessary skills – and that staff with the correct balance of skills are on duty at appropriate times so that consistency is maintained.
Training
It is vital that all Service Desk staff are adequately trained before they are called upon to staff the Service Desk. A formal induction programme should be undertaken by all new staff, the exact content of which will vary depending upon the existing skill levels and experience of the new recruit, but is likely to include many of the required skills as described above.
Where possible, a business awareness programme, including short periods of secondment into key business areas, should be provided for new staff who do not already have this level of business awareness.
Staff retention
It is very important that all IT Managers recognize the importance of the Service Desk and the staff who work on it, and give this special attention. Any significant loss of staff can be disruptive and lead to inconsistency of service – so efforts should be made to make the Service Desk an attractive place to work.
Ways in which this can be done include proper recognition of the role with reward packages recognizing this, team-building exercises, staff rotation onto other activities (projects, second-line support, etc.).
The Service Desk can often be used as a stepping stone into other more technical or supervisory/managerial roles. If this is done, care is needed to ensure that proper succession planning takes place so that the desk does not lose all of its key expertise in any area at one time. Also, good documentation and cross-training can mitigate this risk.
Super Users
Many organizations find it useful to appoint or designate a number of ‘Super Users’ throughout the user community, to act as liaison points with IT in general and the Service Desk in particular. Super Users can be given some additional training and awareness and used as a conduit for communications flow in both directions. They can be asked to filter requests and issues raised by the user community (in some cases even going as far as to have incidents or requests raised by the Super User) – this can help prevent ‘incident storms’ when a key service or component fails, affecting many users. They can also be used to cascade information from the Service Desk outward throughout their local user community, which can be very useful in disseminating service details to all users very quickly.
It is important to note that Super Users should log all calls that they deal with, and not just those that they pass on to IT. This will mean access to, and training on how to use, the Incident logging tools. This will help to measure the activity of the Super User and also to ensure that their position is not abused. In addition, it will ensure that valuable history regarding incidents and service quality are not lost.
It may also be possible for Super Users to be involved in:
Pre-Go Live requirements
an up-to-date service catalogue
Service availability schedules
an up-to-date pricelist if charging is in place
up-to-date processes, procedures and documentation
details of related 3rd party support organisations and the contractual agreements and support request procedures accessible
escalation procedures in place and known
training of SD staff to the level required
support staff skill list
customers are informed, in advance, of procedures for reportingnew Incidents with the new service and the direct benefits to them
SLAs and OLAs have been agreed bby SD management (after baslines are known)
required 2nd line support checklist and Known Error list
Involved 3rd parties are aware of all procedures and processes in place
Implementation Guidelines
As a single point of contact, it is important that the Service Desk provides the Customer with, at a minimum,
a status update on service availability and any request being managed by the service team, including
the Incident number for use in future communication
Status update information might include:
Knowledge and procedures review
Auditing for complicance
Being the single point of contact for IT Service, the Service Desk has a link with all
processes within ITIL. With some processes the link is a clearer than others.
The Service Desk is, in fact, an operational aspect of the important process of Incident
Management, e.g. incident control. The Service Desk registers and "controls" Incidents.
Incidents can be related to Configuration Items. If this link is supported by software, a
powerful aid in mapping/identifying weak links in the IT infrastructure evolves.
This allows the Service Desk staff the to quickly solve incidents by searching on a
Configuration Item, category and/or error code and applying a previously used solution.
Note: A Configuration Item (or C.I.) is discussed in the Configuration Management
process section. A C.I. is an item that we want to store information about.
In some cases the Service desk does some minor changes and so has a link with Change
Management and Release Management.
The link between the Service Desk and Service Level Management can be illustrated as a
result of the Service Desk monitoring Incident levels and reporting whether the IT service is
restored within the limits defined in Service Level Agreements (SLA's). Service Desk will
report to Service Level Management if IT Service is not restored within time frames and escalation
procedures are properly defined and adhered to.
CSFs & KPIs
How to change live production infrastructure, implementing the needed services.
Service transition relates to the delivery of services required by the business into live/operational use,
and often encompasses the "project" side of IT rather than "BAU" (Business As Usual). This area
also covers topics such as managing changes to the "BAU" environment. Topics include Service
Asset and Configuration Management, Transition Planning and Support, Release and deployment
management, Change Management, Knowledge Management, as well as the key roles of staff
engaging in Service Transition.
The Process responsible for controlling the lifecycle of all Changes
The primary objective of Change Management is to enable beneficial
Changes to be made, with minimum disruption to IT Services
An action that results in a new status for one or more IT infrastructure CIs.
Change types:
Standard (pre-authorized)
Normal
Emergency
The addition, modification or removal of authorized, planned or supported service or service component and its associated documentation
A formal proposal for a Change to be made
An RFC includes details of the proposed Change, and may be recorded on paper or electronically
The term RFC is often misused to mean a Change Record, or the Change itself
A schedule that contains details of all changes approved and their proposed implementation dates.
A Document that identifies the effect of planned Changes on agreed Service Levels, based on the Forward Schedule of Change (FSC).
A group of people that advises the Change Manager in the Assessment, prioritization, and scheduling of Changes
This board is usually made up of representatives from all areas within the IT Service Provider,
representatives from the Business, and Third Parties such as Suppliers
A subset of the Change Advisory Board that makes decisions about high-impact Emergency Changes
Membership of the ECAB may be decided at the time a meeting is called, and depends on the nature of the Emergency Change
A Document that identifies the effect of planned Changes, maintenance Activities, and Test Plans on agreed Service Levels
Endorses major changes before passing back to the CAB for scheduling and implementation.
Top FIve Risk Indicators are:
Process Steps: RFC Initiated - Recording - Evaluating - Authorizing
Tasks:
•Planning and controlling changes
•Scheduling changes and releases
•Communicating
•Making change related decisions and authorizing changes
•Ensuring there are remediation plans
•Measuring and controlling changes
•Reporting to management
•Understanding the impact of a change
•Initiating continual improvement
The Change Management process depends on the accuracy of the configuration data to ensure
the full impact of making changes is known. There is a very close relationship between
Configuration Management, Release Management and Change Management.
Advising the Service Desk of changes is crucial. Changes are nearly always first "discovered" in
the Incident Management process, via the Service Desk.
Also the Problem Management process can submit RFC’s to solve Known Errors and sometimes
this can cause a snow-ball effect, if the Configuration Management process is unable to explain
what the affected components will be as a result of the change (including hardware, software, SLA's).
Note: SLA's (Service Level Agreements) are discussed in the Service Level Management process.
It is possible to store information about an SLA in the Configuration Management Database (CMDB).
By doing this relationships can be created between hardware or software components and the SLA.
So when a change is proposed to a component the linked SLA can be investigated to determine if
the change will breach the SLA.
The others processes are also linked to Change Management in the sense that they either request
changes (Availability Management) or they will be consulted to determine the impact of changes (IT
Service Continuity Management, Service Level Management and Capacity Management).
Key Performance Indicators
Release Management
The Process responsible for Planning, scheduling, and controlling the movement of Releases to Test and Live Environments
The primary Objective of Release Management is to ensure that the integrity of the Live Environment is protected and that the correct Components are released
Deployment Management
The Activity responsible for movement of new or changed hardware, software, documentation, Process, and such, to the Live Environment
Objectives of Release and Deployment Management process include:
Release Management is very closely linked with Change Management and Configuration
Management. Change Management controls all the changes and determines when a new
release will be implemented and what changes will be in any release. In most major
organizations a representative for the Release Management process will have a representative
in the Change Advisory Board (CAB).
Note: The CAB is the authorizing body for changes to proceed. Can you remember the term
given to the group of people who approve Emergency Changes?
Configuration Management needs to be informed by Release Management about every
change to a Configuration Item (C.I.) so they can update the CMDB. They also need to make
sure that new versions of software and hardware are being stored in the DSL or DHS.
Release Management will use Configuration Management to get information about C.I.'s
that may be affected by a new release and importantly their relationship with other C.I.s.
A secure software compound where all authorized versions of software are kept.
A library, which stores in their definitive, accepted form, all the versions of software configuration items
that have been accepted from the developer or supplier. This logical library can be physically present in several locations.
An area set aside for the secure storage of hardware spares.
A physical secure storage of definitive hardware spares. These are spare components and assemblies that are
maintained at the same level as the comparative systems within the live environment.
A software CI introduced into the test environment and subsequently into the production
environment. In most cases documentation and accompanying hardware also are part of the release.
Full release
In a full release all components of the release are updated. For example: An update is made to the
whole office automation suite including the word processing package, spreadsheet database etc.
Package release
The Package release includes all previous delta and full releases. These releases are generally
implemented less frequently and therefore allow for longer periods of stability for the live environment.
An example of a Package Release might be an SOE (Standard Operating Environment) for a desktop
PC that includes the hardware, office automation and business applications.
Delta release
Includes only those CI’s within the release unit that have actually changed or are new since the last full or package release. For example: In a word processing package the help file has a bug and requires an update. Only the help file module is updated whilst the rest of the program remains the same. The same analogy could be used with the word processing package as a part of the whole office automation suite.
Push and pull
A push approach is used where the service component is deployed from the centre and pushed out to the target
locations. In terms of service deployment, delivering updated service components to all users – either in
Big Bang or Phased form – constitutes ‘push’, since the new
or changed service is delivered into the users’ environment at a time not of their choosing. A pull approach is
used for software releases where the software is made available in a central location but users are free to pull t
he software down to their own location at a time of their choosing or when a user workstation restarts. The use
of ‘pull’ updating a release over the Internet has made this concept significantly more pervasive. A good example
is virus signature updates, which are typically pulled down to update PCs and servers when it best suits the
customer; however at times of extreme virus risk this may be overridden by a release that is pushed to all known
users. In order to deploy via ‘push’ approach, the data on all user locations must be available. Pull approaches do
not rest so heavily on accurate configuration data and they can trigger an update to user records. This may be
through new users appearing and requesting downloads or expected users not doing so, triggering investigation
into their continued existence. As some users will never ‘pull’ a release it may be appropriate to allow a ‘pull’
within a specified time limit and if this is exceeded a push will be forced, e.g. for an anti-virus update.
Automation vs. manual
Whether by automation or other means, the mechanisms to release and deploy the correctly configured service
components should be established in the release design phase and tested in the build and test stages.
Automation will help to ensure repeatability and consistency. The time required to provide a well-designed and
efficient automated mechanism may not always be available or viable. If a manual mechanism is used it is
important to monitor and measure the impact of many repeated manual activities as they are likely to be
inefficient and error-prone. Too many manual activities will slow down the release team and create resource
or capacity issues that affect the service levels.
Development. Only here can new software be developed. Newer versions will be based on a copy of the software in the DSL. Each new version will cause an increased version number.
Testing. Should be a replication of the live environment in order to reduce risks of the implementation. Developers do not work in this area.
Production. Where the software/hardware is in production. Developers do not work in this area.
Archiving. Old release versions that are no longer in use
Release acceptance
In order to assess the effectiveness of the Release and Deployment Management process a number of key performance indicators (KPI’s) should be monitored.
In ITIL V3, Asset and Configuration management processes are combined into the Service Asset and Configuration Management (SACM) Process
Configuration Management
The Process responsible for maintaining information about Configuration Items required to deliver an IT Service, including their Relationships
This information is managed throughout the Lifecycle of the CI. The Configuration Management Process could almost be considered as a
pivotal process for all other (especially the Service Support) processes. Configuration Management is considered central and
supportive to the other ITIL processes by providing information about the IT Infrastructure.
Asset Management
Asset Management is the Process responsible for tracking and reporting the value and ownership of financial Assets throughout their Lifecycle
general guidance is that if a CI can be regarded as slightly different from another related CI, and Problems affecting one are likely to affect the other, or Changes mad to the one will probably have to be made to the other, then a suse of a variant should be considered; otherwise, a different CI should be used
A set of tools and databases that are used to manage an IT Service Provider’s Configuration data
The CMS also includes information about incidents, problems, known errors, changes, and releases
It may also contain data about employees, suppliers, locations, business units, customers, and users
The CMS includes tools for collecting, storing, managing, updating, and presenting data about all Configuration Items and their Relationships
The CMS is maintained by Configuration Management and is used by all IT Service Management Processes
The CMS contains Configuration Baselines
A database used to store Configuration Records throughout their Lifecycle
The Configuration Management System maintains one or more CMDBs,
and each CMDB stores Attributes of CIs, and Relationships with other CIs
One or more locations in which the definitive and approved versions of all software Configuration Items are securely stored
Any Component that needs to be managed in order to deliver an IT Service
Information about each CI is recorded in a Configuration Record within the Configuration
Management System and is maintained throughout its Lifecycle by Configuration Management
CIs are under the control of Configuration Management
CIs typically include IT Services, hardware, software, buildings, people, and formal documentation such as Process documentation and SLAs
Details that uniquely identify CIs such as location, version number, serial number, etc.
A value is the quantifiable part of an attribute. (examples of values are "red", "10", "E9", "critical")
The range of responsibility covered by Configuration Management.
A configuration / product / system established at a specific point in time, whichcaptures both the structure and the details of that product / configuration / system.It serves as a reference for further activites and provides the ability to change orrebuilt a specific version at a later date.It is also a "snapshot" or a position that is recorded and remains fixed as the originalstate and available to be compared with the current position.
A configuration baseline maybe created for the following reasons:
Includes hardware, software and any associated documentation.
A database which holds a record of all CIs associated with IT infrastructure (Configuration Management Database).
The activities of the Configuration Management process are:
Selection of Configuration Managment tool
make sure the tool supports all the platform of the organisation
understand the functionality to avoid any overlaps or gaps
some tools only support two levels of CI and this can be very restrictive
the ability to control software automatically can save time and reduce errors
the length of identifyers is crucial with software because there are often duplicate filenames in different parts of a structure
The following considerations should be considered when defining Configuration Items (CIs):
- CI naming convention
- Decide on the CI-Level
- Classifying CI's into Types / Lifecycles, define Attributesand also roles that can promote CI's in their life-cycles
- The relationships between CIs should be stored so as to provide dependency information
Planning:
This includes setting up the process "boundaries" like the goal, scope, objectives, policies, procedures and interaction expected with other processes.
It is the task of the Configuration Manager to determine what can be achieved, at what cost - balanced against the business requirements.
This combination affects the level of detail and how many C.I.'s will be specified.
CI Level is a key part of the Planning activity. The CI Level refers to the amount of detail that will be captured for each CI.
Identification:
The identification activity involves the gathering of all CI information within the scope of the process.
C.I. information is gathered either manually and/or by the use of automated tools.
The information gathered will be governed by the scope, C.I. level and attributes decided upon.
Before gathering any information control procedures and the Change Management process should be in place so that
after information is gathered and populated into the CMDB changes to the infrastructure don’t make it redundant.
Control
Before the CMDB is populated control procedures should be in place. It is vital that changes to the CMDB and the
CI’s within are only made with the proper authorization. Procedures need to be set up so that all changes are always
documented, for example with authorized RFC’s. We can start to see the very strong relationship that Change and
Configuration Management share.
Status accounting
Status accounting is the activity that records the current and historical states of a C.I. so every change to a C.I. is
traceable. Status levels can be defined as part of the planning process (eg. On order, In use, Out of order,
Under repair, Retired).
Verification and audit
By conducting regular audits an organization can verify that all C.I.’s are recorded correctly.
The first audit should be held right after the CMDB has been implemented to be make sure it is a correct
representation of the actually IT infrastructure.
Other times for audits can be after disasters, major changes and following a pre-defined timetable.
The degree of audit will again need to take into consideration the value that will be derived from the audit
and the size (and therefore cost) of doing the audit. Partial audits, spot audit checks are all feasible strategies
to "get a feeling" about the level of C.I. accuracy.
To measure the effectiveness of Configuration management, realistic targets should be set.
The targets can be changed over time to ensure improvement of the process.
Critical Success Factors & KPIs
Reduced percentage of change failures as a result of inaccuate configuration data
Improved incident resolution time due to the availability of complete and accurate configuration data
more accurate results from Risk Analysis Audits due to available and accurate asset information
As indicated, the IT infrastructure forms the foundation of the IT organization. All processes
within ITIL therefore have links with Configuration Management or retrieve information from
the Configuration Management Database.
Change Management and Release Management however, have the closest relationship to
Configuration Management and could even be considered as an integral part of it. The flow
chart shows the relationships between the 3 processes and how the flows between the
processes occur at every stage.
Configuration Management Database
The CMDB is built during the Transition lifecycle phase, but is critical to All ITIL Processes. Most organizations
already use some sort of CMDB, in a spreadsheet or paper based. In most cases the CMDB is based on
database technologies, which makes gathering information more user friendly. Information that can be
gathered from a CMDB include:
A CMDB also contains information on relationships between Incidents, Problems, Known Errors, Changes, Releases and C.I.'s.
The CMDB can aid as a support tool in the creation and on-going maintenance of legal contracts (Compliance Management).
Examples of "relationships" that can be defined are:
Relies on....
Is part of....
Affects....
Is linked to...
Had ......
The Service V Model is a model for building and testing a service capability.
The X axis represents the different configuration levels and the Y Axis represents their respective
lifecycle relationships.
The Left side represents the Service Design phase tasks in a waterfall fasion and
the Right shows show Transition phase tasks and their depencies and reliance on SD tasks.
The V Model is a generalized approach for develping service capabilities, but it is introduced in the ITIL books
under the Release and Deployment sections and is often associated with that process.
PRINCE2 is an acronym for PRojects IN Controlled Environments. Like ITIL PRINCE2 is a methodology or framework, not a tool for Project Management.
PRINCE2 is published by the same body that publishes ITIL (the Office of Government Commerce (OGC) in the UK). And like ITIL it is a widely accepted framework for best practice.
You can find extra information on PRINCE2 at: http://www.ogc.gov.uk/prince/
Preparation for any release requires a structured planning approach to increase the chance of success.
The use of a formal project management methodology like PRINCE2 will assist in this to define items such as: