Академический Документы
Профессиональный Документы
Культура Документы
It is s set of best practises for IT service management related to managing IT services and used by many
organizations around the world, it is a descriptive framework that has been drawn from both public and private
sector internationally. It focuses on aligning It services with business needs and provides systematic process-based
approach supported by producers.
It provides guidance on strategic tactical and operational management of IT services to service provider on
provision of quality IT services and describes how IT resource should be organized to deliver business value
documenting the processes function and roles of ITSM.
Sources are something which basically show what to do and Enabler tell you how to go about doing things.
Sources Enablers
Standard Technologies – Adopted and used tech within the firm
Industry practise Advisors -- Guides and show how to do things
Academic research Suppliers – Valuable information and direction
Training and education Customer – Tell how they want things to be done
Internal experience Employees – Make things happen, how to do
It is based on best practical experience and not vague or theoretical ideas. It is modular and used according to
organization need.
ITIL is vendor neutral, represent best practise and non-prescriptive (not super specific in action)
1. Service Strategy
2. Service Design
3. Service Transition
4. Service Operation
5. Continual Service Improvement
Service lifecycle model
SERVICE TRANSITION: how to transition the newly designed system to the production environment?
Process
It is a structured set of activities designed to accomplish a specific set of objectives. It involves taking one or more
defined inputs and turns them into specific outputs.
Process control: It shows the required control for process to take place. It is for planning and regulating with
objective of performing a process in an effective and efficient and objective manner.
Output produce must meet the requirements as specified by the business objective.
Business objective will set out the standard and norms for the output and output has been configured as
achieving their requirement the process can be declared as effective.
And activities can be carried with minimum resources we can also declare the process as efficient.
Process enablers it includes process resources and capability.
Characteristic of PROCESS
1. Processes can be measured in a relevant manner as based on the performance of the activates to deliver
a specific output. Measurement is performance driven, different perspective for the actives need a
different measurement
2. The reason a process exists is the deliver a specific result, result must be individually accountable and
identifiable for it to have any measurable output
3. Every process delivers its primary result to a customer or stakeholder, they may be internal or external to
organization but the process must meet their expectations.
Process: measurable, specific result, customer, respond to a trigger are characteristic of process, process do not
define people, functions or teams. Process are simply set of activities in order to set desired results.
Function
Functions are units or organization specialized to perform certain types of work and responsible for specific
outcomes. It defines the people group or teams that perform process activities.
Characteristics of function
Self-contained
Types of function
Service desk
Technical management
Application management
IT operation management
RACI model
It identifies interaction between people (function) and process have end to end accountability and fill-in the gaps
in responsibility with proper workflow and communication.
Its example of the model that can used to assign roles and responsibility for the activities within a process.
R-RESPONSIBLE – execute process and activities, the person or people whoa actually get the job done. Their must
be one R allocated to an activity.
A-ACCOUNTABLE – ownership of quality or end result of the process lies with this person with accountable only
one person can be accountable foreach task
C-CONSULTED - people who are consulted and whose opinion are sought. Involvement through input of the
knowledge and information their can be as many people consulted as necessary having no consulted is also fine.
I-INFORMED – these are the people that are kept up to date on the progress receiving information about the
process execution and quality. There can be as many people as necessary and having no one involved is also fine.
SERVICE
A service is a means of delivering value to customer by facilitating outcomes customer want to achieve without the
ownership of specific cost and risk.
OUTCOME
An outcome is the result of carrying out an activity, following a process, or delivering a service.
Characteristic of Services
Perishable nature of service output and service capacity. Once issue is over the communication is over and service
is no more.
Service Management
It is set of specialized organizational capabilities for providing value to customer in the form of services. It enables
the service provider to understand the services it is providing. It ensures that the value of services to its customers
and to understand and manage all costs and risk associated with those services.
IT Service Management
The implementation and management of quality IT Service that meets the neds of business.
Service provider: An organization supplying services to one to more internal or external customer
TYPE 1 – Internal service provider exists within organization to deliver service to one specific business unit.
TYPE 2 – Shared service provider services multiple business units in the same organization.
TYPE 3 – External service provider operates as an external service provider serving multiple external customers.
Types of customer
INTERNAL CUSTOMER: Customer who work for the same business as IT service Provider.
EXTERNAL CUSTOMER: Customer who work for different business that the IT service provider.
Types of services
Core Services: Services that deliver the basic outcomes required by one or more customers, that provide value the
customer wants for which they are willing to pay.
Enabling Services: Services needed to ensure that the core services can be delivered successfully.
Enhancing Services: Additional service that enhance the core services making it more attractive or appealing to the
customer
Internal services: IT services delivered between departments or business units within the same organization, that
directly supports a business process managed by another business unit. e.g. Sales reporting services and enterprise
resource management
External services: IT services delivered toe external customer an external customer facing services is available to
external customers and is offered to meet business objective defines in the organization’s strategy. e.g. internet
access at an airport
Stakeholder
Stakeholders have an interest in an organization, project or service etc. and may be interested in the
activities, targets, resources or deliverables from service management. Within the service provider organization
there are many different stakeholders including the functions, groups and teams that deliver the services. There
are also many stakeholders external to the service provider organization.
Resource refers to IT infrastructure, people, money or anything else that might help to deliver an IT services. “the
things we have to work with”.
Capability ability of an organization, person, process, application or other configuration item to carry out an
activity. “The way we do things”.
SERVICE
CAPABILITIES RESOURCE
Management Capital
Organization Infrastructure
Process Applications
Knowledge Information
SERVICE ASSETS
SERVICE STARTEGY
The purpose of the service strategy stage of the service life cycle is to define the perspective, position, plans and
patterns that a service provider needs t be able to execute to meet an organization’s business outcomes.
Its basically asking why we are doing something before how we do it.
Perspective: It talk about vision and mission of IT service provider., What the organization is, what it does, who it
does it for, how it works.
Position: how do you position yourself as IT service provider to what segment of customers, Variety based, needs
based, access based, demand based.
Plans: Actual specific action step in order to achieve perspective and attempt your position. It is about strategy
implementation in order to align IT service with actual business needs to achieve the outcome.
Pattern: how to from a strategic plan we establish specific patter which repeats over a period of time. It includes
Ongoing action, organizational hierarchy, process, services, inter department collaboration, These establish patter
help us in developing the plan strategy of IT Service provider.
An understanding of what service is, it is clear identification of the definition of services and the customers who use
them. Which sector it belong.
The ability to define how value is created and delivered. A means to identify opportunities to provide services and
how to exploit them.
A clear service provision model articulates hoe services will be delivered and funded and to whom they will be
delivered and for what purpose.
It is defining a strategy whereby a service provider will deliver service to meet a customer’s business outcomes,
defining a strategy for how to manage those services.
How best create value for customer by leveraging your resource and capability. So that your services will be choose
over your competitors, it provides guideline foe setting policies and objectives.
Characteristics of Value
It is defined by customers, it is affordable mix of services, it focuses on achievement of objectives, Value may
change over time and circumstances.
Value is subjective
Preference are influence by attributes of the services, present or prior experience of similar attribute and relative
capability of competitor’s and peers.
Customer has preference influence by their perceptions. It affects how differentiable value of one service provider
over another.
Value of service
It is UTILITY + WARRANTY
UTILITY: It is functionality offered of a product or service to meet a particular need. “what is does”
WARRANTY: It is a promise or guarantee that a product or service will meet its requirement. “How well it does it”
STRATEGY MANAGEMNET FOR IT SERVCIES: produces and maintains all strategy plans and ensures they are
translated in tactical operational plan, takes into account any changes that I business environment and ensure
service strategy remain relevant.
Its purpose is to ensure that strategy is defined and achieve it purpose. It has 3 sub processes:
Strategic Service Assessment: asses present situation of service provider within current market space.
Assessment of current service offering, customer needs and competing offer from other service provider
Strategic Service Definition: it defines overall goal IT service provider, that t should pursue in this development
into identifying what service will offered to the customers based on result of Strategic Service Assessment
Strategic Service Execution: in this sub process it defines and plans the strategic initiatives and ensure the
implementation of those initiatives.
SERVICE PORTFOLIO MANAGEMENT: making decision regarding services
The service portfolio is used to manage the entire lifecycle of all services, it consists of 3 part.
Service portfolio is a tool used to represent services and an organization investment in them in terms of business
value. It allows the business and IT to prioritize investment in services across the enterprise and manage them for
values.
Its purpose is to ensure that service provide has right mix of services to balance the investment in IT with ability to
meet business outcomes.
Service Catalogue: All existing service (live and operation, ready for deployments. Build and tested)
FINANCIAL MANAGEMENT FOR IT SERVICES: managing finance, manage the service provider’s budgeting.
Accounting and charging requirement.
Its every process owners’ job is to report on process effectiveness, efficiency and cost.
Its purpose is to secure the appropriate level of funding to Designs, Develop and Deliver services.
It provides business and IT with quantification of terms for the value of IT services, the value of asset underlying
the provisioning of those services a quantification of those services and qualification of operational forecasting.
1. Budgeting: activity of predicting and controlling the spending of money, it consists of periodic negotiation
cycle. To set budget (annually) and day to day monitoring of budget.
2. Accounting (IT accounting): process responsible identifying action cause of delivering IT services and
comparing it with budgeted cost and managing variances form the budget assigned.
It is decision support and planning tool that projects likely consequences (quotative and qualitative dimensions) for
business action.
DEMAND MANAGEMENT: Understand, anticipate and influence customer demand for services.
It works with the Capacity Management to ensure that the service provider has sufficient capacity to meet the
required demand. It also seeks to eliminate excess capacity.
These are workload profiles describing the demand for particular services. PBS’s are an important tool used by
Demand Management for anticipating and influencing service demand.
Service cannot be created in advance so process of ensure market demand and company capability is same and
scalable.
Its purpose is t design IT services, together with the governing IT practices, processes and policies, to realize the
service provider’s strategy and to facilitate the introduction of these services into supported environment ensuring
quality service delivery, customer satisfaction and cost-effective provision.
Identifying defining and aligning the IT solution with the business requirement
1. Improve IT governance
2. Improve Effectiveness of service management
3. Improve alignment with customer values and strategies
4. Improve information and decision making
5. Easier implementation of new or changes service
6. Improve quality and consistency of service
7. Reduce total cost of ownership
PATTERN: the fundamental way of doing things, patter in decision and action over time.
Service Design Package: Service design package include everything necessary form design, build, test and
deployment of the service (new or changed). It is the major output of service design into service transition includes
Design Coordination
It has two parts: Activates related to the overall service design lifecycle stages and Activities related to each
individual design.
Contains details of all operational services being provided fr being prepared for transition
Service catalogue Management Purpose: to provide single source of consistent information on all of the agreed
upon services and ensure that it is widely available to those that are Approved to access it.
Managing the information and ensuring availability and accuracy of Service Catalogue and ensure that catalogue
meets the evolving information needs of other processes.
To ensure that all planned IT Services are delivered to agreed achievable targets.
1. Define document, agree, monitor measure and report the level of IT survives and instigate corrective
ensure when appropriate
2. Work with the BRM to provide and improve the relationship with the business
3. Ensure that specific and measurable target and developed for all IT services
4. Monitor and improve customer satisfaction
5. Ensure clear and unambiguous expectation of the level of service to be delivered
6. Ensure proactive cist effective continual improvement
Service Level Requirement (SLR): it is customer requirement from an aspect of an IT service
Service Improvement Plan (SIP): it is formal plan to implement improvement to a process or ITS
Service Level Agreement Monitoring (SLAM): It is a chart used to help monitor and report achievement against
Service Level Target
Service Level Agreement (SLA): it is an agreement between ITSP and customer. It focusses on business
performance.
Service based SLA – covers one service for all customer of that service
Multi-level SLA - Multilevel structure of SLA avoid duplication and reduces the need for frequents SLA.
Supplier Management
Supplier Management deals with maintaining good relationship between suppliers and the partners to ensure
quality IT services.
Outsourcing arrangement
Outsourcing, co-sourcing, Multi sourcing, Business process outsourcing, knowledge process outsourcing.
Supplier
3rd party responsible to supplying goods and services that are required to deliver IT services
Underpinning Contract
Service Provider
Availability Management
Availability Management aims to define, analyze, plan, measure and improve all aspects of the availability of IT
services. It is responsible for ensuring that all IT infrastructure, processes, tools, roles etc are appropriate for the
agreed availability targets
Its purpose is to ensure the level of availability delivered I all ITS meet the agreed availability needs and service
level targets in a cost effective and timely manner for current and future availability needs of the business.
IT Service Availability
IT Component Availability
Reactive activities: Monitoring, measuring, analysis, management of all events, incident and problem of
unavailability, it is performed as apart of operational roles.
Proactive activities: Planning, design and improvement of availability, it is performed as part of design and planning
roles.
Availability: ability of a service component to perform its agreed function when required.
Reliability: measure of how long service component can perform its agreed function without interruption
Maintainability: how fast and effectively service can be restored to normal working after a failure
Serviceability: ability of 3rd party supplier to meet the terms of their contract
Capacity Management
It ensures that the capacity of IT services and the IT infrastructure meets the agreed capacity and performance
related requirement in s cost effective and timely manner for both current and future capacity needs of the
business.
Business Capacity Management: focused on the current and future business requirement,
Used to translate the business needs into IT requirements. It also ensures that future capacity and performance
needs can be fulfilled. Business Capacity Management should predict changing requirements for capacity demand
and manage such demand on a tactical level. For example, offices are not reducing the usage of papers & replacing
the paper with softcopy documents, which sequentially requires purchasing of more Desktops and Laptops.
Service Capacity Management: focused on the delivery of existing services that support the business, used to
manage, control and predict the performance and capacity of operational services. This includes initiating proactive
and reactive action to ensure that the performances and capacities of services meet their agreed targets.
This target meeting is achieved by measuring performance and comparing it to requirements that are set in Service
Level Agreements (SLAs) or Service Level Requirements (SLRs). Such as if the company is increasing the number of
Desktops and Laptops, then they must also consider hiring more IT support Engineers
Component Capacity Management: focused on individual technology component that underpin the service
provision,
Used to manage, control and predict the performance, utilization, and capacity of IT resources and individual IT
components. This sub-process requires in-depth knowledge of each individual component and their contribution
towards service performance.
The goal is to reduce the total amount of service downtime by monitoring current performance and predicting future
performance.
Capacity Plan
A Capacity Plan is used for planning & managing the resources required for delivering IT services.
The Capacity plan contains the prediction of required resources and their costs for different business scenarios to
achieve the agreed service level targets.
Capacity Report
The Capacity Report provides information about the services, their resource utilization, and current performance.
This report is then used as an input to other Service Management processes and IT Management
Capacity Manager:
This role is the Process Owner of ITIL Capacity Management process. Capacity Manager role is responsible for
ensuring that services and infrastructure are having adequate capacity and can deliver the agreed performance
targets in a cost-effective and timely manner. The span of control of Capacity Manager role includes all resources
required to deliver the service and is also responsible for planning according to short, medium and long-term
business requirements.
Capacity Management Information System: It hold the all information need by all the capacity Management like
Business Data, Service Data, Component utilization Data, Financial Data
1. Designing a service so that it meets Service Level agreement (SLA) targets after its implementation.
5. Creating and maintaining a capacity plan that aligns with the organization’s strategic plans.
6. Gathering and evaluating data regarding service usage, and document new requirement if any.
ITIL Information Security Management Process describes the approach and controls the measure of IT security
inside an organization.
The primary goal of Information Security Management, ITIL V3 Process, is to efficiently control the access to
organizational information.
Information Security Management (ISM) is used to align IT security with business security and ensures that
information security is effectively managed in all services and Service Management activities.
ISM has a strong relationship with other ITIL Processes such as availability management and IT service continuity
management for doing resource and contingency planning.
It also coordinates with incident management to check for any occurrence of security-related incidents. Further, it
coordinates with change management process to check and validate all the proposed changes from the point of
organizational security.
The Primary objective of ITIL Information Security Management Process (ITIL ISM) is to align IT security with business
security and ensure that information security is effectively managed in all service and IT Service Management
activities.
It also ensures the confidentiality, integrity, availability, and role-based accessibility of an organization’s assets,
information, data and IT Services are maintained.
Security Management process has four major activities performed under it:
Plan: The objective of this activity is to devise and recommend the appropriate security measures, based on an
understanding of the organization’s requirement.
In this stage, information security management coordinates with service level management to understand the
security requirements defined under SLA.
Implement: This key element ensures that appropriate procedures, tools, and controls are in place to support the
ITIL Information Security Management Policy. It also ensures that the security measures are implemented according
to the defined plan.
Evaluation: This phase is responsible for measuring the success of the security implementation. For doing this it
carries out regular technical security audits of IT systems. It also checks the compliance of security implementation
with IT security policy and security requirements defined in SLAs and OLAs.
Maintain: This phase takes the security evaluation results and suggests improvements on security implementation,
and on security agreements as specified in, for example, SLAs and OLAs.
Derives all security activities, it refers to specific underpinning security policies and must have support of top
management.
ITSCM prepares the organization to recover from disasters and major emergencies to maintain the business
continuity. It helps the organization in two ways (i) by doing preventive planning for disasters and emergencies,
and (ii) by doing periodic exercises for the handling of disasters and emergencies.
ITIL IT Service Continuity Management (ITSCM) focuses only on those events that the business identifies as
significant enough to be treated as a Disaster. Any less significant events are taken care of by the incident
management process.
ITIL ITSCM process is tightly bound with other ITIL processes, such as Availability Management, Capacity
Management, Service Level Management to access and plan for the resources required to maintain the desired
service level.
ITIL Continuity Management also works closely with Risk Management and Information Security Management to
access the potential threats to the service continuity and take preventive actions.
Moreover, in case of occurrence of any major incidents, ITSCM has to coordinates with Incident Management to
ensure that proper steps are being taken to resolve the issue as quickly as possible
It is a process responsible for managing risk that could seriously impact business.
It is activity in BCM that identifies Vital business functions and their dependencies
Business Continuity Plan: It refers to the plan defining the steps required to restore Business Processes Following
disruption.
SERVCIE TARNSITION
Focuses on how to ensure that requirement developed in service strategy and set out service design successfully
built and tested implemented for use in business operation.
Its purpose is to ensure the new modifies or retired service met the expectation’s I the business as documented in
the service strategy and service design stages of the lifecycle.
Plan and coordinate the resources to ensure that the requirement of service strategy encoded in service design
Are realized in Service Operation. It identifies managers and controls any disruptions when transitioning new or
changed service into thee live environment.
Its purpose is to provide overall planning for service transition and to coordinate the resource that they require.
Transition Planning and Support Objective
Change Management
The purpose of the change management process is to control the lifecycle of all changes enabling a beneficial
change to be made with minimum disruption to IT Services.
Emergency changes: Reserved for changes to prevent loss to the business, review by ECAB
SRERVICE CHANGE: it refers to the modification of authorized planned or supported service or served component
and its associated documentation.
REQUEST FOR CHANGE: it is a form upon which the changes is written with all detail information with respect to
the changes.
POST IMPLEMENTATION REVIEW: a meeting had after change is implemented to determine its success.
CHANGE MODEL: it is process model that predefines steps that should be taken to handle a type of changed in an
agreed way.
Change Management Activities
It spans across ITIL lifecycle, it manages service asset and configuration items in order to support other service
management processes.
Its purpose is to ensure that the assets required to deliver services are properly controlled and that accurate and
reliable information about those assets is available when and where it is needed.
Configuration Item
Any configuration or other service asset that needs to be managed in order to deliver an IT service.
Service CI
Organizational CI
Internal CI
External CI
Interface CI
Scam Objectivesbk
Scam Activities
It is single logical storage area all definitive and approved versions of all electronic media configuration items that
include official versions of documentation, software licenses, activation keys are securely stored.
Configuration Item (CI)
CMDB is set of one or more connected database that provide a logical model of the IT infrastructure.
Configuration Baseline
It is single logical storage area all definitive and approved versions of all electronic media configuration items that
include official versions of documentation, software licenses, activation keys are securely stored
Definitive Spares
Includes tools for collecting, storing, managing, updating and presenting data about all configuration items and
their relationship.
Its purpose is to plan, schedule and control the builds and test deployment release and to deliver new functionality
required by the business while protecting the integrity of existing services.
Release and Deployment Management Objectives
A release unit describes the portions f a service or IT infrastructure that is normally released together according to
the organizations release policy.
Knowledge Management.
The primary role of Knowledge Management is to improve the quality of decision making by ensuring that
accurate, reliable and trustworthy information is available throughout the Service Lifecycle.
In order to achieve this, effective sharing of knowledge in most scenarios requires the development and ongoing
support of a Service Knowledge Management System (SKMS). This repository should be accessible to all parties
who wish to obtain information.
There are often four stages to knowledge:
• Information - combining this with context, experience and interpretation becomes knowledge
• Knowledge - having the above enables correct decisions to be made which in turn is perceived as wisdom
The SKMS is made up of various data source, namely the Configuration Management System (CMS) and
the Configuration Management Database (CMDB) as the following simplistic diagram illustrates:
The SKMS can also hold other information such as staff skills, organizational and user behaviour and supplier
information.
• Knowledge Transfer
Identifying the knowledge gap between person or department and those in need of obtaining that
knowledge. A communication or transfer plan may be required.
• Information Management
Establishing data and information, defining the architecture and finally establishing process and procedures
for operational use and also improvement of the process
There are many users of knowledge but the main gathers are Operational Staff, 1st and 2nd line support, with the
main users of the knowledge are the Problem Management team.
Knowledge Management Objective
The primary objective of ITIL Knowledge Management Process is to collect, analyse, store and share knowledge and
information within an organization. It also reduces the need for rediscovering knowledge, hence improves the service
efficiency.
This process is also responsible for maintaining the service knowledge management system (ITIL SKMS), which
symbolizes the total body of knowledge within the organization. Here the objective is to capture, arrange, classify,
and store every bit of organizational knowledge and made them available where needed.
Benefits
1. Reductions the amount of time that must be spent on training employees. Since your team will consistently
receive precise and up-to-date information, they will require fewer formal training to meet the performance
expectations.
2. Decreases the number of errors that are made by team members. If your team has the adequate source of
knowledge that is needed to take formal decisions, then they are far less likely to go outside the track.
3. Implementation of the ITIL Knowledge Management process cuts down the effort to complete any steps of
the service process more than once. When everyone would have process awareness, it is less likely that a
known step will be performed incorrectly.
4. Availability of instant knowledge allows the IT professionals to respond to customer demands faster and
more effectively.
It is the central repository of the data, information, and knowledge that the IT organization requires, to manage the
lifecycle of its services.
Usually, The SKMS is not comprised of a single system and formed by combining multiple discrete systems & data
sources. The main purpose of ITIL SKMS is to store, analyse, and present the service provider's data, information,
and knowledge in a structured manner.
As described in ITIL, SKMS is a set of databases and tools that are used to manage information and knowledge. All
assets, components, services, databases, documentation, applications etc falls under the purview of it.
SKMS (ITIL V3) symbolizes the total body of knowledge within the service management Lifecycle. ITIL advises us to
take necessary actions to capture and organize the information, parse that information to knowledge, and make that
knowledge available to use when required.
The SKMS is comprised of all the other data retention/categorization mechanism used by service management,
including but not limited to:
1. Service Portfolio
2. Configuration Management System (CMS)
3. Configuration Management Database (CMDB)
4. Supplier and Contract Management Information System (SCMIS)
5. Availability Management Information Systems (AMIS)
6. Capacity Management Information Systems (CMIS)
7. Security Management Information Systems (ISMIS)
8. CSI Register
SERVICE OPERATION
It is where strategy and design has been transitioned into operational environment.
Service Operation Overview
Coordinate and carry out the activity and process required to deliver and manage services at agreed level. It is
where value of service is realized and organizational strategies are executed.
Ensure that access to agreed T services is only provided to authorized to receive those services.
Maintain business satisfaction in IT through effective and efficient delivery of support to agreed IT services.
Value to business
It describes the process, function, organization and tools used to underpin the ongoing activities required to deliver
and support services
Service themselves
Technology
People
Role of communication in Service Operation: good communication is important within services IT teams and
department with users and internal and external customers and within IT teams and departments.
Event Management
Event: an event is any detectable or discern able occurrence that has significance for the management of the IT
infrastructure.
Alert: An alert is a warning that a threshold has been reached something has changed or a failure has occurred.
Its purpose is the ability to detect event and make sense of them and determine the appropriate control action
that is provide by event management. It the basis of operational monitoring and control.
It also provides a way to compare the actual standard against the designed standards. Which becomes input for CI
phase
1. Detect changes of the state that are significant for the management
2. Determine the appropriate control action provide the entry point for the execution of many services
operations process
3. Provide the means to compare actual performance against design
4. Provide a basis for service assurance and reporting and service improvement.
Any aspect of service management that needs to be controlled and automated, which includes configuration items,
environment conditions, Software licence monitoring security, normal activity.
Types of Event
Incident Management
The purpose of incident management is to restore the service operation as quickly as possible, minimize the
adverse impact on business operations, Ensure the best possible level of service quality and availability are
maintained.
It Include any event which disrupt or which could disrupt a service, it includes events communicated directly by
users through the service desk or from event management.
1. detect and resolve incidents which result in lower downtime to the business
2. Identification of potential improvement to service.
Functional Escalations: It is transferring an incident, problem or changes to a technical team with higher level of
expertise.
Hierarchic Escalation: itis informing senior levels of management to assist with a n incident, problem or change.
Incident models: Predefinition of commonly occurring incidents with predefined steps, responsibility, timescales
and escalations.
Major Incidents: Incidents that have immediate and significant interruption to business
P1
P2
P3
P4
P5
Escalation
Request Fllfilment
SERCICE REQUEST: it is a request from a user for information, advice or standard changes to an IT services.
SERVICE CATALOUGE: it is a database or structured document with infiration about all live IT services, including
those available for deployment.
REQUEST MODELS: some service requests will occr frequently and will required handling consistently in order to
meet agreed service levels.
Problem Management
It is a process which deals with lifecycle of the problems and minimise it effect on business
Reduced expenditure on workarounds or fixes that don’t work and in handling or resolving repeat incidents.
WROKAROUND: It is reduction or elimination of the impact of an incident or problem for which a full resolution is
not yet available
KNOWN ERROR: Error which has documented root cause and workaround.
Access Management
ACCESS: is the level and extend of a service functionality or data that a user is entitled to use
IDENTITY: it refers to the information about an individual that distinguishes one individual for another and verifies
their status within the organization
To grant authorized users the right to use a service while preventing access to non-authorized users. It is also
known as identity or rights management.
1. Manage access to service based on policy and action defined in Information security management
2. Efficiently respond to request of granting access to services, changing access rights or restrict access.
3. Oversee access to services.
1. Enables the management of confidentiality availability and integrity of data and intellectual property
2. Access management does not define the access policies but enforces them
3. Executes the policies u=in information security management.
Access Management Activities
REQUEST ACCESS, VERIFICATION, PROVIDE RIGHTS, CHECK AND MONIOTR, LOG & TRACK ACCESS, REMOVE OR
RESTRICT RIGHTS.
Service Desk
It serves is as a single point contact for the users to get information to and from IT.
Technical Management
Application Management
It is the custodian of application knowledge and expertise related to managing applications. It provides resources
to support the IT service management lifecycle.
It is made up of 2 components
Continual Service Improvement affects all stages of service management. It aims to improve the overall service in
an organization in a continual manner
It aligns IT service to meet the changing business needs. It identifies and implement the improvement to IT services
that support business processes.
Service Measurement
▪ Measurements are critical to the success of continual improvement
▪ all processes must be measurable in an objective way
▪ role of measurements:
1. assessment of the current status
2. identification of improvement areas
3. assessment of the improvements made
▪ types of measurements
1. availability
2. reliability
3. performance
▪ [definition] Critical Success Factor (CSF) is something that must happen if an IT service, process, plan, process,
or other activity is to succeed
▪ no more than two to five CSFs per process for manageable results
▪ Key Performance Indicators (KPI) are used to measure whether the critical success factors are achieved
1. no more than five KPIs, two to three KPIs in the early stage when maturity level is low
2. can be quantitative (e.g. cost) or qualitative (e.g. customer satisfaction)
3. check whether a KPI is fit for use – relevant, accurate and useful
▪ Types of Metrics
1. [definition] a metric is a scale of measure that allows you to define what is to be measured
2. e.g. percentage reduction of unsuccessful changes, average cost of testing a change
3. Technology Metrics – associated with managing service components using monitoring systems,
e.g. availability and performance
4. Process Metrics – captured in terms of the CSFs and KPIs, to assess quality, performance, value,
and compliance of the process
5. Service Metrics – a measure of the end-to-end service performance, results from technology and
process metrics
Business process be placed in a continuous feedback loop so that managers could identify and change the parts of
the process that needs improvements.
CSI MODEL
To define and manage the steps needed to identify, define, gather, process, analyse, present and implement
improvements
▪ Purpose
▪ to define and manage the steps required to implement improvements successfully
1. identify and define the measurements and metrics
2. gather, analyze and report the data
3. manage the implementation
▪ Objectives
1. identify improvement opportunities in cost and quality with financial justification (a business case
if more complex)
2. identify the measurements and metrics
3. continually review services to ensure they are aligned with business objectives
▪ Scope
1. analyze performance and capabilities throughout the lifecycle (maturity)
2. make the best use of latest technology
3. improve organizational structures
SERVICE MEASUREMENT
Why are we monitoring and measuring? When od we stop, is anyone using the data, do we still need this?
TYPES OF METRIC
REASON TO MEASURE
Baselines
CSI REGISTER
▪ CSI Registry
▪ record all individual improvements as improvements may be made concurrently
▪ is a service asset managed by the service knowledge management system (SKMS)
▪ includes: ID, Relative size, Timescale, Description, Priority, KPI metric and Justification
▪ Improvement Program Documentation