ITIL Version3 Foundation Presentation V3

Download Report

Transcript ITIL Version3 Foundation Presentation V3

ITIL® VERSION 3
FOUNDATION
New Horizons CLC of South Florida
Glen Victor
ITIL, MCITP (SA), MCTS, MCDBA, MCSE, MCSA, CCISP
Module 1:
Review of ITSM & ITIL
• Course Agenda
• Course Design
• Introductions
• Review of ITIL
• ITIL Review
• ITIL V2 Books Review
• Why ITIL for Service Management
• Complementary Guidance
• Qualification Scheme
• Exin Accredited
• More Complementary Material
Course Agenda
• Introductions
• Review of IT Service Management (ITSM) and IT
Infrastructure Library (ITIL)
• ITIL v3, a look at the Lifecycle
• Service Lifecycle Approach
• Service Strategy
• Service Design
• Service Transition
• Service Operations
• Continual Service Improvement
Introductions
• Where do you work?
• What is your Title and Key Responsibilities?
• What is your IT experience?
• What is your Service Management experience?
• What expectations do you have for this class?
Course Design
• Coverage of Service Lifecycle strategy within ITIL v3
• Lecture
• Simulation Case Study
• Practice Exams
• Foundations Certification Exam (Optional)
Review of ITIL
• Conceived in Mid 1980’s
• Centralized  distributed computing
• Geographically distributed resources
• Led to inconsistent process delivery & support
• OGC: UK Office of Government Commerce
• CCTA (Central Computer and Telecommunications Agency)
• Evolution
• V1: 30 Titles
• V2: 7  9 Titles
• SM broke into Service Support & Service Delivery
• V3: 5 titles
• Standard for Service Management
• Best Practice across many industries
• itSMF (IT Service Management Forum)
ITIL v2 Books Review
2001: v2
2007: v3
SAM & Security Mgt Added Later
Mostly used for Service Desks
Why ITIL for Service Management?
• Best Practices
• Non-Proprietary/Non-Prescriptive
• Guidance, not regulations
Examples:
Just In Time Delivery
Automatic Updates
Blogging/SEO/SEM
Software
Web Design
UN Best Practices
Can you name any?
• Innovative
Best Practices
Lead to Good
Practices
Good Practices
Lead to Best
Practices
Complementary Guidance
Commonly known frameworks and
standards that have synergy with ITIL:
• COBIT
• Project Management
• ISO/IEC 20000
• CMMI
• ISO/IEC 15504
• 6 Sigma
• ISO/IEC 19770:2006
• Other ITSM
• Management of Risk
Publications
• ITIL Live
• MOF
This Course is EXIN accredited:
• Independent exams in IT, based
•
•
•
•
on standards and best practices
Worldwide recognition, in over 125
countries
40 years of experience, involving
experts
High quality, web-based
technology
Partner with The APM Group
Limited (APMG) who won the
rights to administer the ITIL
accreditation, certification and
examination needs for the OGC
International certification
for IT Standards
•ITIL®
•ISO/IEC 20000:SQM
•MOF
•ASL
•BiSL
•Tmap®
More Complementary Material
• Pocket Guides
• itSMF (updated May 2009)
• Foundation Handbook
• Standards Alignment with ISO
• Knowledge and Skills
• information on the experience and
knowledge needed to exploit (and
gained through) ITIL
• Case Studies
• Scalability
• How to scale service management
• Quick Wins
• Details of potential quick wins and
benefits that can be obtained from the
adoption of ITIL practices
• Qualifications
• A set of qualifications based around the
core publications and their use within
the industry
• Templates
• Study Aids
• Additional guides that can be used by
students studying ITIL, particularly on
implementation for specific
accredited training courses
organizations, such as very small or
very large businesses update service: • Specialty Topics
a web-based service providing regular
• Specific areas of interest, such as
updates
outsourcing
Benefits of ITIL
• Alignment with business needs. ITIL becomes an asset to the business when IT can proactively
•
•
•
•
•
recommend solutions as a response to one or more business needs. The IT Strategy Group recommended
in Service Strategy and the implementation of Service Portfolio Management gives IT the opportunity to
understand the business’ current and future needs and develop service offerings that can address them.
Negotiated achievable service levels. Business and IT become true partners when they can agree upon
realistic service levels that deliver the necessary value at an acceptable cost.
Predictable, consistent processes. Customer expectations can beset and are easier to meet with
through the use of predictable processes that are consistently used. As well, good practice processes are
foundational and can assist in laying the groundwork to meet regulatory compliance requirements.
Efficiency in service delivery. Well-defined processes with clearly documented accountability for each
activity as recommended through the use of a RACI matrix can significantly increase the efficiency of
processes. In conjunction with the evaluation of efficiency metrics that indicate the time required to perform
each activity, service delivery tasks can be optimized.
Measurable, improvable services and processes. The adage that you can’t manage what you cannot
measure rings true here. Consistent, repeatable processes can be measured and therefore can be better
tuned for accurate delivery and overall effectiveness. For example, presume that a critical success factor
for incident management is to reduce the time to restore service. When predictable, consistent processes
are used key performance indicators such as Mean Time To Restore Service can be captured to determine
whether this KPI is trending in a positive or negative direction so that the appropriate adjustments can be
made. Additionally, under ITIL guidelines, services are designed to be measurable. With the proper metrics
and monitoring in place, IT organizations can monitor SLAs and make improvements as necessary.
A common language – terms are defined.
Module 2: Lifecycle
•
•
•
•
•
•
•
•
•
•
•
•
•
•
Overview of ITIL Key Concepts
Five Core Books
Lifecycle: Terms of Interest
Capabilities and Resources
Value Creation
Lifecycle: Five Phases
Benefits of ITIL to the IT Provider
Benefits of ITIL to the Customer
RACI and Organizational Structure
Governance
Continual Service Improvement
Process Model
The 4 P’s of Design
Review Questions
Overview of ITIL Key Concepts
• ITIL (IT Infrastructure Library) provides a framework of
Best Practice guidance for IT Service Management and
since its creation, ITIL has grown to become the most
widely accepted approach to IT Service Management in
the world.
• A Framework for IT governance
5 Core Books
Service Management Lifecycle Phases
• Service validation and testing
• Service Strategy
• Transition planning (Release 
• Understanding who the IT customers are
Production)
• The service offerings that are required to
• Users
meet the customers’ needs
• Support personnel
• The IT capabilities and resource that are
• Production environment
required to develop these offerings
• The requirements for executing successfully
• Service Operation
• Cost of delivery is consistent with the value
• Delivers the service
delivered.
• Service Design
• Assures new and change services are
designed effectively
• Technology and architecture
• Processes required to manage services
• Service management systems and tools
• Monitor and support
• Measuring service levels
• Service Transition
• The design is built, tested and moved into
production
• Manage changes
• Control assets and configuration items
• Overall day-to-day health
• Manage disruptions
•
•
•
•
•
Rapid restoration
Determine the root cause
Detect trends
Handle daily routine end user requests
Manage service access
• Continual Service Improvement
• Measure and improve efficiency &
effectiveness
• Service levels
• Technology
• Processes
Lifecycle
Terms of Interest
• Service Management
• Service
• Service Owner
• Process
• Process Owner
• Function
• Capability
• Resource
• Service Asset
Continual Service Improvement
Business Service Examples
• Telecommunications
• Telephone
• Pager
• Voice mail
• Intranet paging
•
• Resource Scheduling
• Conference rooms
• Equipment
• Training rooms
•
• Finance/Accounting
• General ledger
• Accounting functions
• Decision support
• Reporting
• Budgeting
• Revenue
• Travel
• Meeting Requests
• Expense Reports
• Procurement/Supply Chain
Management
•
•
•
•
Requisitioning
Purchase orders
Warehouse
Inventory control
Reporting
Dispensing?
• Human Resources
•
•
•
•
•
•
•
Payroll
Job Postings
Benefits
Professional
Development/Education
Time & Attendance
Staff Scheduling
Performance Management
• System Access (Security)
• Grant, Request, biometric
• IT Training
• Desktop
• System
• Service Desk
•
Shrink wrapped
• Incidents & Service Requests
• Remote Access
• VPN
• Remote Desktop
• Tokens
• End User Tech
• Install Hw/Sw
• Move Hw
• Change Sw
• Network Access (Physical)
• Mobile devices
• Disposal
• Lifecycle
Technology Service Examples
•
Network
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
Data transport – Network equipment:
switches/routers
Data transport – Network equipment
Data transport – Network equipment
Network monitoring
Network management
Secure access to external and internal
resources
Secure access to and from Internet
Data transport - wired network
•
installation
Data transport - wired network
maintenance
Data transport - wired network
decommissioning
Data transport - wireless network
installation
Data transport - wireless network
maintenance
Data transport - wireless network
decommissioning
Cable Head In - Maintenance and
Repair
Cable Head In – Administration
Cable Relocates (Physical)
Cable TV Fiber Setup/Teardown
•
Database
•
•
•
•
•
•
•
•
•
Database installation
Database tuning
Database backup/restore
Database account management
Database schema changes
Database consulting
Database management
Database monitoring
Research
Server
•
•
•
•
•
•
•
•
•
Account management
Server management
Server monitoring
SAN Enterprise Storage Area
management
SAN Enterprise Storage Area
configuration
Internet Security and Connection
service
Active Directory management
Server provisioning
Infrastructure application maintenance
Applications Development
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
Application Development (Design,
Development, Documentation)
Incident management
Consulting (Internal Software
Evaluations)
Implementation coordination
Money Transfers
Report Development (Crystal Reports,
batch, etc.)
Web Development and Administration
GIS Development and Administration
Web Content Management
Research
Application Monitoring
Application Management (maintenance,
patch management)
Training (early life support)
Access Database Development
Testing
Requirements Gathering
Forms Development
Continual Service Improvement
Capabilities & Resources
Capabilities
Resources
Management
Organization
Processes
Knowledge
Financial Capital
Infrastructure
Applications
Information
People
People
Value Creation
Lifecycle:
5 Phases
• Strategy
• Working with the business to plan appropriately for both Long and Short
term service needs
• Design
• Planning and architecting services that fall within the business’s strategy
• Transition
• Moving planned business initiatives to live status
• Retiring old services no longer of value to the business
• Improving services to keep the business at or above required competitive
levels
• Operation
• Manage the services currently utilized by the business
• Continual Service Improvement
• Implemented as part of every process
Benefits of ITIL to the IT Provider
• Service Management Best Practices
• Lifecycle Approach
• Better management of services
• Better Integration among
• Business services
• IT Services
• IT Functions
• Focus on Value of Service
Benefits of ITIL Whitepaper
“
• From a business perspective, the adoption of ITIL practices by IT service providers – whether in-
house providers or external suppliers – ensures many benefits, including:
•
•
•
•
•
•
•
IT services which align better with business priorities and objectives, meaning that the business achieves more in terms of its
strategic objectives
Known and manageable IT costs, ensuring the business better plans its finances
Increased business productivity, efficiency and effectiveness, because IT services are more reliable and work better for the
business users
Financial savings from improved resource management and reduced rework
More effective change management, enabling the business to keep pace with change and drive business change to its
advantage
Improved user and customer satisfaction with IT
Improved end-customer perception and brand image.
• Real organizations have benefited from ITIL practices in a number of ways – for example:
•
•
•
•
A nationwide retail organization made savings in excess of £600,000 per annum by adopting service strategy practices for its
financial management.
An organization identified that most of the cost of delivering IT support came from resolving customer issues. By adopting ITIL
approaches to knowledge-based information and self-help, it was able to reduce costs of support by over 75% while at the same
time increasing user satisfaction with the service, and improving user productivity.
A medium-sized IT service organization invested e2.6m in a two-year program to improve its IT service management. It
recouped the investment within the first year, and achieved annual savings of e3.5m mainly through rationalizing unused and
under-used resources (people, software licenses, IT hardware etc). It also reduced IT incident resolution times and improved
customer satisfaction by over 11%.
A large multinational company made annual savings of £5m by introducing ITIL service design practices to its IT supplier
management
From whitepaper: “Executive Briefing: The Benefits of ITIL” by Maggie Kneller, Independent Consultant
Benefits of ITIL to the Customer
• Focus on Business Needs
• Services Aligned to Business Activity
• Services Designed to Meet Business Requirements
RACI and Organizational Structure
• RACI Model
• Responsible
• What needs to be done and by whom
• Accountable
• Who are the owners of the results
• Consult
• Who has ability to assist, guide?
• Inform
• Who needs/desires to know
Typical Steps in RACI Process
• Identify all Processes
• Identify all Roles
• Fill in chart, identifying RACI for each Process
RACI Example
Governance
Enterprise Governance
Corporate Governance
Business Governance
Ie. Conformance
Ie Performance
Accountability
Assurance
Value Creation
Resource Utilization
IT Governance
IT Governance is the
responsibility of the
Board of Directors and
Executive Management
IT Governance
IT Governance
Process Model
• Measureable
• Deliver specific Results
• Customers/Stakeholders
expectations must be met
• Respond to event or
trigger
Process Model
The 4 P’s of Design
People, Process, Products, Partners
People
Products/
Tech
Processes
Partners/
Suppliers
Process by Lifecycle
Process by Lifecycle (SS)
Process by Lifecycle (SD)
Process by Lifecycle (ST)
Process by Lifecycle (SO)
Process by Lifecycle (CSI)
Service Lifecycle Stages
Sample Questions
Module 3: Service Strategy
•
•
•
•
•
•
•
•
•
•
•
•
•
•
Service Strategy
Service Strategy Key Concepts
Strategy Key Activities
Strategy Terms of Interest
Utility and Warranty = Value
Service Provider Types
Service Strategy Processes
Financial Management
Service Value
Service Justification: Business Case
Service Portfolio Management
Demand Management
Demand and Capacity
Review Questions
Service Strategy
• ITSM Starting Point
• Explore Business Needs,
Plans
• Align IT Strategies to
Business Strategies
• Focus on Services
as “Value” to business
• Source Appropriately
How do you become “not optional”? – William D Green, CEO Accenture
Service Strategy Key Concepts
• Business Service
Management
• Who, What, When
Where & How
• Who are the
Stakeholders/Customers
• What are the Services,
Infrastructure, ROI/VOI
• When will they be delivered
• Where will they be delivered
(Marketspace)
• How to implement, operate,
feedback to improve
Strategy Key Activities
• Define the Market
• Competition and Marketspace
• Develop the Offerings
• Service Value (Assets, Networks, Creation & Capture)
• Develop Strategic Assets
• Technical, Business, Informal/Formal
• ITIL
• Prepare for Execution
• Securing Financial Management
• Integrate into Service Portfolio Management
Strategy Terms of Interest
• Warranty
• Usability of a service
• Is it user-friendly?
• “Fit for Use”
• Utility
• Functionality of a service
• It does what it was designed to do
• “Fit for Purpose”
• Open-loop Systems
• Perform activity regardless of environment conditions, ie Backup scheduled
• Closed-loop Systems
• Monitor environment and respond to changes, ie load balancing
• Trigger
• Event that launches a process, ie a call to the Service Desk begins Incident
Management Activities
• Used for Closed-Loop Systems
Open-Looped vs. Closed-Looped
Difference:
Capacity Management via over/under provisioning
vs.
Load Balancer detecting congestion/failure and redirecting traffic
Warranty & Utility = Service Value
Service Models
Service Provider Types
• Type I
• Internal
• Type II
• Shared Services (Internal)
• Type III
• External Provider
Service Provider Decision Matrix
From/To
Type I
Type II
Type III
Type I
Functional
Reorganization
Disaggregation
Outsourcing
Type II
Aggregation
Corporate
Reorganization
Outsourcing
Type III
Insourcing
Insourcing
Value Net
Reconfiguration
Choosing Provider Type
• Does the activity require assets that are highly specialized?
• Will those assets be idle or obsolete if that activity is no longer performed?
(If yes, then disaggregate.)
• How frequently is the activity performed within a period or business
cycle?
• Is it infrequent or sporadic? (If yes then disaggregate.)
• How complex is the activity?
• Is it simple and routine?
• Is it stable over time with few changes? (If yes, then disaggregate.)
• Is it hard to define good performance? (If yes, then aggregate.)
• Is it hard to measure good performance? (If yes, then aggregate.)
• Is it tightly coupled with other activities or assets in the business?
• Would separating it increase complexity and cause problems of
coordination? (If yes, then aggregate.)
Service Strategy Processes
• Financial Management
• Service Portfolio Management
• Demand Management
Financial Management
• Service Valuation
• ROI (and VOI)
• Funding (Budgeting)
• Accounting
• Chargeback
Elements of Financial Management
• Service Valuation
• Demand Modeling
• Service Portfolio Management
• Service Provisioning Optimization
• Planning Confidence
• Service Investment Analysis
• Accounting
• Compliance
Business case structure
• Introduction
• Presents the business objectives addressed by the service
• Methods and assumptions
• Defines the boundaries of the business case, such as time period,
whose costs and whose benefits
• Business impacts
• The financial and non-financial business case results
• Risks and contingencies
• The probability that alternative results will emerge
• Recommendations
• Specific actions recommended.
Service Portfolio Management
• The Provider’s collection of Services available to the
Customer
• Services defined in terms of business value
• Repository detailing information about the services throughout the
lifecycle
• Means for comparing service competitiveness
• Why should a customer buy from this provider?
• What is a fair rate for the service?
• What are the strengths, weaknesses, priorities, risks?
Service Portfolio
Management Methods
Service Portfolio 1
Service Portfolio 2
Demand Management
Demand and Capacity
User Profiles
User Profile
Applicable Patterns of Business Activity (PBA)
PBA Code
Senior
executive
(UP1)
Moderate travel-domestic and overseas; highly sensitive information;
zero latency on service requests; high need for technical assistance;
need to be highly available to the business
45F
45A
35D
Highly mobile
executive
(UP2)
Extensive travel-domestic and overseas; sensitive information; low
latency on service requests; moderate need for technical assistance;
high customer contact; need to be highly available to customers
45A
35D
22A
Office-based
staff
(UP3)
Office-based administrative staff; low travel-domestic; medium latency
on service requests; low need for technical assistance; full-featured
desktop needs; moderate customer contact; high volume of
paperwork; need to be highly productive during work hours
22A
14B
3A
Payment
processing
system
(UP4)
Business system; high volume; transaction-based; high security
needs; low latency on service requests; low seasonal variation;
mailing of documents by postal service; automatic customer
notification; under regulatory compliance; need for low unit costs;
need to be highly secure and transparent (audit control)
12F
Customer
assistance
process
(UP5)
Business process; moderate volume; transaction-based; moderate
security needs; very low latency on service requests; medium
seasonal variation; mailing of replacement parts by express; automatic
customer notification; need to be highly responsive to customers
24G
10G
Module 4: Service Design
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
Service Design
Service Design Key Concepts
Service Design Terms of Interest
Business Change Process
Design Management
5 Aspects of Service Design
4 P’s
Design Constraints
Service Design Processes
Service Catalog Management
Service level Management
Availability Management
Capacity Management
IT Service Continuity Management
Information Security Management
Supplier Management
Service Design
• Design of Services to meet
Business Needs
• Design of Processes to
maximize Service
Management
• Design of Measurements
and Metrics to assist in
Service Management and
Improvement
Service Design Quote
• The common mistake that people make when trying to
design something completely foolproof is to
underestimate the ingenuity of complete fools
--Douglas Adams
Service Design Key Concepts
• The Main purpose of Service Design stage is the design
of new or changed services for introduction into the live
environment.
Service Design Terms of Interest
• Service Provider
• Service Level Agreement
• Operational Level Agreement
• Contract
• Service Design Package
• Availability
• Supplier
Operational Level Agreement
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
Support Service Description
Scope of Agreement
Service Hours
Service Targets
Contact Points & Escalation
Service Desk & Incident Response Times & Responsibilities
Problem response times and Responsibilities
Change Management
Release Management
Configuration Management
Information Security Management
Availability Management
Service Continuity Management
Capacity Management
Service Level Management
Supplier Management
Business Change Process
Role of Project Team
Design Management
5 Aspects of Service Design
• Design of Service Solutions
• Design of Service Management Systems & Tools
• Especially the Service Portfolio
• Design of Technology Architectures and Management
Systems
• Design of Processes
• Design of Measurement methods and Metrics of the
Service
Design of Service Solution
• Focus on Business Needs
• Designed to meet Functional Requirements
• Development of Resources and Capabilities
Design of Service Portfolio
Service Portfolio Content
• Service Name
• SLR references
• Service Description
• Supporting Services
• Service Status
• Supporting Resources
• Classification & Criticality
• OLAs, Contract &
• Applications used
agreements
• Costs
• Metrics
• Data used
• Business processes
supported
• Business owners
• Business Users
• IT owners
Services
• Email
• Calendaring
• Conference Room
• Printing & Scanning
• Security (via CCTV)
• Fire
• Physical
• Access
• Iprotect
• Logical
• Encryption
• Access
• Telecommunication
• Phone
• Landlines
• Mobile
• Fax
• File Storage & Maintenance
• Desktop Maintenance
• Supporting Apps
• Data Protection
• BU
• DR
• Clustering
• Bus Continuity
• Content Mgt/Collaboration
• Db
• Tuning
• Hosting
• Admin
• App Support / Admin
• Policy & Guidelines
• Risk Assessment
• Governance
• Compliance
• Records Management
Design of Technology Architectures and
Management Systems
Architectural Relationships
Design of Process
Design of Measurement Methods and
Metrics of Service
Design Constraints
Service Design Processes
• Service Catalog Management
• Availability Management
• Capacity Management
• IT Continuity Management
• Service Level Management
Service Catalog Management
• Dependent on Service Portfolio
• Details of all LIVE and APPROVED-FOR-LIVE services
• 2 versions
• Business Service Catalog
• Technical Service Catalog
Service Design
The Big Picture
Service Catalog
Service Level Management
• Design SLA framework
• Gather, Document SLR’s
• Monitor Performance against SLA’s
• Produce appropriate reports
• Conduct Reviews (could lead to SIP)
• Manage contacts and relationships
“Agree, Monitor, Report, Review”
Scope of SLM
• Service Level Agreements
• Service Level Requirements
• Availability Targets
• Operational Level Agreements
• Contracts
• Reporting and Reviewing
• Service Improvement
SLA Structures
• Service-based SLA
• Covers 1 service and all
customers
• Common service levels for all
customers
• Customer-based SLA
• Covers 1 customer group and
all services
• Customer prefers this
• Only 1 signature
• Multi-level SLA
• Corporate
• All customers and all services
• Customer
• All SLM issues to 1 customer
• Service
• All SLM issues for 1 service to 1
customer
Availability Management
• Produce Availability Plan
• Provide Guidelines on Availability Issues
• Ensure Availability Targets
• Assist on Availability Incidents and Problems
• Assess Change Plans
• Proactive Improvements of Availability
Availability Management Responsibilities
Availability Management Key
Components
• Service Availability
• Component Availability
• Reliability
• Maintainability
Availability Management Process
• Monitor using events, alarms, escalation and scripts for
recovery
• Availability
• MTBF: Mean Time between Failure
• Uptime
• Reliability
• MTBSI: Mean Time between Service Incident
• Average Reliability
• Maintainability
• MTTR: Mean Time between Repair/Replace/Recovery/Resolve
• MTRS: Mean Time between Restore Service
• Downtime
Availability Management Calculations
Availability Management
Calculation Example
• A situation where a 24x7 service has been running for a
period of 5,020 hours with only 2 breaks
• 1x 6 hours
• 1x 14 hours
• Availability = (5,020-(6+14))/5,020 x 100 = 99.6%
• Reliability (MTBSI)= 5,020/2 = 2,510 Hours
• Reliability (MTBF) = 5,020 – (6+14) / 2 = 2,500
Hours
• Maintainability (MTRS) (6+14) /2 = 10 Hours
Vital Business Functions
• High Availability
• Masks effects of failure
• Fault Tolerance:
• Service, component or CI to operate correctly after failure of
component part
• Continuous Operations
• Eliminate planned downtime
• CIs may be down, but not service
• Continuous availability
• No planned downtime
Measurements
• Impact by user minutes lost
• Duration of downtime x no. of users impacted
• Impact by business transaction
• No. of transactions that could NOT be processed during downtime
Availability Activities & Methods
• Identify Vital Business
•
•
•
•
•
•
•
Functions
Component Failure Impact
Analysis
Modeling
SPOF
Fault Tree Analysis
Management_of_Risk
Testing & Maintenance
Produce Projected Service
Outage Document
• Unavailability Analysis
• Plan & Design for
new/changed services
• Redundancy
• High Availability
• Monitor, Measure, Analyze,
Report, Review on
Component Availability
• Expanded Incident Lifecycle
• Service Failure Analysis
(SFA)
Capacity Management
• Business Capacity Management
• Service Capacity Management
• Component Capacity Management
• Capacity Management Information System
• Capacity Plan
Capacity Management Responsibilities
• Capacity Plan
• Guidance and Assistance on Capacity-related issues
• Ensure Capacity Targets
• Ensure Proactive Improvements
Capacity Management
• Provides information on current and planned resource
utilization of individual components to enable organization
to decide, with confidence:
• Which components to upgrade
• More memory, faster storage/processors, more bandwidth
• When to upgrade
• Not too early (over capacity)
• Not too late (bottlenecks)
• How much upgrade will cost
Capacity Management IS
Continuity Management
• Service Continuity Plans
• Business Impact Analysis
• Guidance on Continuity and Recovery
• Ensure Continuity and Recovery Measures in Place
• Assess Impact of Change on Continuity Plans
• Ensure Proactive Measures
• Negotiate with Suppliers for Continuity Needs
ITSCM Lifecycle
Initiation
• Policy Setting
• Terms of Reference and Scope
• Allocate Resources
• Define Project organization and control structure
• Agree Project and quality plans
Risk Profile Example
Information Security Management
• IT Information Security Policy (ISP)
• Ensure Security Requirements
• Document & Implement Security Controls
• Manage Supplier Access to Systems
• Manage Security Breaches and Security-related incidents
• Proactive Improvements of Security
• Integrate Security Aspects within other ITSM processes
5 Elements of Security Framework
Information Security Key Concepts
• Passwords (Access Management)
• Email
• Virus Control
• Encryption
• Remote Access
• Information Security Management System
Supplier Management
• Supplier Policy
• Obtain Value from Suppliers
• Ensure Supplier Contracts are Business-aligned
• Manage Supplier Relationships and Performance
• Negotiate Supplier Contracts and Manage them through
their Lifecycle
• Supplier and Contract Database
Supplier Management Components
Supplier Management
Partner Relationships
• Strategic alignment
• Integration
• Information Flow
• Mutual Trust
• Shared Risk/Reward
• Openness
• Collective Responsibility
Supplier Management
Partner Relationship Example
Supplier Categorization
• Strategic
• Partnering relationships
• Senior Management
• Tactical
• Commercial Activities
• Middle Management
• Operational
• ISP, CoLo
• Junior Level
• Commodity
• Paper, Printer consumables
The Supplier and Contract Db
Service Transition
• Service Transition
• Service Transition Key Concepts
• Service Transition Terms of Interest
• Service Transition Processes
• Change Management
• Assets & Configuration Management
• Knowledge Management
• Release & Deployment Management
• Transition Planning & Support
• Validation and Testing
• Evaluation
Service Transition
• Enable Effective Business
Change
• Manage Change & Risk
• Guide New IT Service into
Operation
• Ensure Service Quality
• Minimize adverse impact of
Change
Service Transition Purposes
• Plan & Manage resources required to package, build, test and
•
•
•
•
deploy a release into production
Evaluate service capability and risk profile prior to new or
changed service is release or deployed
Provide good-quality knowledge and information so Release &
Deployment Management can expedite effective decisions
through test environment and into production
Provide efficient repeatable build and installation mechanisms
to deploy releases to test and production environments and
rebuild/restore if necessary
Goals
• Set Customer Expectations as to the use and performance
• Reduce variations
• Reduce Known Errors
• Objectives
• Meet predicted cost, quality and time estimates
Service Transition Key Concepts
Service Transition Terms of Interest
• Service Knowledge Management System
• Configuration Item
• Configuration management System
• Definitive Media Library
• Change
• Normal, Standard, Emergency
• Seven R’s of Change Management
• Release Unit
• Release Policy
Service Transition Processes
• Complete Lifecycle
• Change Management
• Asset & Configuration management
• Knowledge Management
• Within ST
• Transition Planning and Support
• Release and Deployment Management
• Service Testing and Validation
• Evaluation
Change Management
• Focus on Changes to assets and Cis across whole
lifecycle
• Change Activities
• Planning and Controlling Changes
• Change & Release Scheduling
• Communications
• Change Decisions and Authorizations
• Measurement & Reporting
Change Scope
Change Management
Roles & Resources
• Request for Change
• Change Advisory Board (CAB)
• Emergency Change Advisory Board (ECAB)
• Schedule of Change (SC)
• Projected Service Outage Document (PSO)
• Post Implementation Review (PIR)
Example Types of Request
Type of Change
Doc work Proc
SS
S
D
ST
SO
CSI
RFC Service Portfolios
-New item
-Predicted Scope, Bus Case,
Baselining
-Service Pipeline
Service Change
Management
X
RFC to Service or Service
Definition
-Existing or planned attributes
-Impacts SD
-Service Improvement
Service Change
Management
X
X
X
X
X
Project Change Proposal
-Business Change
-No Impact on Service
Project Change
Management
Procedure
X
X
User Access Request
User Access
Procedure
X
Operational Activity
Tuning
Local Procedure
PreAuthorized
X
X
Normal Change
Standard Change
7 Rs of Change
• Who RAISED the Change?
• What is the Reason for the Change?
• What is the Return required from the Change?
• What are the Risks involved in the Change?
• What Resources are required to deliver the change?
• Who is Responsible for the Build, test and Implementation
of the Change?
• What is the Relationship between this change and other
changes?
Change Impact & Risk Matrix
Asset & Configuration Management
• Asset Management Focus:
• Service Assets during Service Lifecycle
• Configuration Management Focus:
• Manage Logical Model of Infrastructure
• Show how Assets and Components interrelate
Asset and Configuration Management
Key Components
• Configuration Items
• Configuration Management Systems
• Configuration Management Databases
• Definitive Media Library
• Configuration Baseline
• Configuration Model
Configuration Model
Asset Management
• Manage / Details
• Inventory of Assets
• Owner / Responsible party for Asset
• Lifecycle steps form Acquisition to Disposal
• Financial Information
Configuration Management Information
Systems
• Logical Model of the IT Infrastructure
• Data from multiple sources or federated CMDBs
• References Definitive Media Libraries, Spares Store and
Asset Stores (staging area)
Knowledge Management
• Service Knowledge Management System (SKMS)
Right Information to the right people at the right time
Knowledge Sharing
Release and Deployment Management
• Deliver Change faster, at lower cost, with reduced risk
• Assure the changed or new service supports the business
and its customers
• Ensure consistency in implementing changes
• Ensure traceability
Release and Deployment Activities
• Planning
• Preparation
• Build and test
• Service and Pilots
• Plan and Prepare for Deployment
• Transfer. Deploy/ Retire
• Verify
• Early Life Support
• Review and Close Deployment
• Review and Close Transition
Transition Planning and Support
• Determine Capacity and Resources
• Support transition teams
• Ensure integrity of Assets
Validation and Testing
• Validation
• Is the change fit for purpose (Utility)?
• Is the change fit for use (Warranty)?
• Testing
• Is the change going to achieve its intended result (Utility)?
• Is the change going to work without adverse effects (Warranty)
Evaluation
• Determines a means of answering these two questions
• What was the expected result?
• Did the change succeed?
Module 6: Service Operations
• Service Operation
• Service Operation Key Concepts
• Service Operation Terms of Interest
• Service Operations Processes
• Incident Management
• Problem Management
• Event Management
• Request Fulfillment
• Access Management
• Service Operations Function
Service Operations
• Manage Day to Day
Activities
• Operations
• Provide Value to Customer
• Communication
• Support
Service Operation Key Concepts
• Services that are operational
• Services that are utilized
• Technology used to deliver services
• And processes
• People
Service Operations
• An interesting daily dichotomy
• Services vs. Components (External vs. Internal)
• Manage the customer desires and needs (external) while
working with an ever changing IT architecture (internal).
• Stability vs. Responsive
• Attempt to keep the environment stable while at the same
time being responsive to user needs
• Quality vs. Cost
• Managing expectations within a finite budget
• Reactive vs. Proactive
• Balance hard to achieve if environment routinely
undergoes massive change
Service Dichotomies
Service Operation Terms of Interest
• Incident
• Alert
• Event
• Service Request
• Problem
• Known Error
• Workaround
• Impact, Urgency, Priority
Service Operation Processes
• Incident Management
• Problem Management
• Event Management
• Access Management
• Request Fulfillment
Incident Management
• Restore Service as Soon as Possible
• Standard Incident Model
• Assist in speedy Incident Management
• Major Incident Management
• Problem Management may be asked to assist
Incident Management Workflow
Information Needed
• Unique reference number
• Call-back method (telephone,
• Incident categorization (often
•
•
•
•
•
•
•
broken down into between two
and four levels of sub-categories)
Incident urgency
Incident impact
Incident prioritization
Date/time recorded
Name/ID of the person and/or
group recording the incident
Method of notification (telephone,
automatic, e-mail, in person, etc.)
Name/department/phone/location
of user
•
•
•
•
•
•
•
•
•
mail, etc.)
Description of symptoms
Incident status (active, waiting,
closed, etc.)
Related CI
Support group/person to which
the incident is allocated
Related problem/Known Error
Activities undertaken to resolve
the incident
Resolution date and time
Closure category
Closure date and time.
Incident Level Matrices
Impact
Urgency
High
Medium
Low
High
1
2
3
Medium
2
3
4
Low
3
4
5
Priority Code
Desc
Target Resolution
1
Critical
1 Hour
2
High
8 Hours
3
Medium
24 Hours
4
Low
48 Hours
5
Planning
Planned
Incident Closure
• Closure Categorization
• User satisfaction survey
• Incident documentation
• Ongoing or recurring?
• Formal closure
• Auto
• Manual
Incident Management interfaces with
• Problem Management
• Change Management
• Incidents are caused by problems
• Workaround or resolution
• Report problems to Problem
• Logged as RFC
Management
• Configuration Management
• Assist in finding faulty equipment
• PM detects and resolves incidents
arising from failed changes
• Capacity Management
• Impact assessment
• IM provides trigger for
• Hold information about which
performance monitoring
• Workarounds
categories should be assigned to
which support group
• Availability Management
• Audit infrastructure as comparison
• Relies on IM for availability of
• SLM
services and improvement paths
• Helps define measurable response • Release & Deploy Management
• Helps identify weak services
Event Management
• Scope focused on specific events vs. general monitoring
• Early detection – Preventative
• Basis for key automated operations
• Detect
• Make sense of
• Act on
• Classifications
• Informational
• Warning
• Exceptions
Request Fulfillment
• Handles non-incident requests
• Service Requests
• RFC’s (Standard Changes)
• Request Models
• Self-Help Opportunities
Event Management Scope
• CI
• Constant State
• Switches/Routers
• Status changes
• Updating file server
• Environmental conditions
• Fire/smoke detection
• Sw licensing monitoring
• Security Intrusion
• Normal Activity
• Application usage
• Server Performance
Access Management
• Access Rights
• Verification of Legitimacy of requests
• Monitoring Identity Status
• Logging and Tracking access
• Granting/Removing/Restricting
• Privileges predetermined (Availability & Security
• Physical Access control NOT within scope
• Facilities
Value to Business
• Maintain Confidentiality of Information
• Reduces errors by unskilled users
• Audit services to trace abuses
• Revoke access when needed
• Regulatory compliance (SOX, HIPAA)
Requesting Access
• Standard Request
• Request for Change
• Service Request
• Pre-Authorized Script
• Filling form to download application
Service Operation Functions
• Service Desk
• Technical Management
• Application Management
• IT Operations
Service Desk
• Single Point of Contact for User Community
• Manages Incidents and Service Requests
• First level support
• Escalate as agreed
• Keeps users informed
• Closes
• Conducts Satisfaction Surveys
• Communicates with Users
• Update CMS
Service Desk Organizational Structures
• Local Service Desk
• Centralized Service Desk
• Virtual Service Desk
• May be structured as “Follow the Sun” Service Desk
Local Service Desk
• Reasons for having
Local desk when call
volumes don’t justify it
• Language, Cultural,
•
•
•
•
Political
Time zones
Specialized group
Specialized services
VIP/critical user status
Centralized Service Desk
• Advantages
• Costs are reduced.
• Resources are optimized.
• Management is simplified.
• Disadvantages
• Users are spread across
several geographical
locations, with different
languages, products and
services.
• Maintenance services need
to be delivered on site.
Virtual Service Desk
• Knowledge is centralized.
• Unnecessary duplication
is avoided, with the
consequent cost savings.
• A "local service" can be
offered without incurring
extra costs.
• The quality of service is
uniform and consistent.
Service Desk Metrics
• First Line Resolution Rate
• Average time to resolve an incident
• Average time to escalate incident
• Average cost of handling an incident
• Specific to Service Desk
• Percentage of user updates as agreed by SLA
• Average time to review and close a resolved call
• Average number of calls per day and per week
Technical Management
• Custodian of Technical Knowledge
• Provides the Resources to support the ITSM Lifecycle
• Starts in SS
• Expands in SD
• Executed in SO
• Ongoing in CSI
• Activities
• Documentation of skills (current and future)
• Design training
• Defined in SD, executed in SO
• Recruiting/contracting people with skills
• Define standards used in Design of new Architectures (SO/SD)
• Design Performance Standards
Application Management
• Assists in application sizing and workload forecasts
• Assists in identifying ongoing operational costs of
•
•
•
•
applications
Assists in determining support skills required
Assists in determining costs of customization
Assists in determining to build or buy
Assists in data access requirements
Application Management Lifecycle
IT Operations Management
• Operations Control
• Console Management
• Job Scheduling
• Back-up and Restore
• Print & Output Management
• Maintenance Activities
• Facilities Management
• IT Environment
• Ie Data Center
Continual Service Improvement
• Continual Service Improvement
• Continual Service Improvement Key Concepts
• Continual Service Improvement Key Terms
• Continual Service Improvement Activities
• Constant Improvement: Deming
• Seven Steps of Improvement
• CSI Model
• Role of Measurements
• Focus on Business Needs
• Methods & Techniques of Continual Service Improvement
Continual Service Improvement
• Continual Re-
Alignment of IT to meet
Business
Requirements
• Improve Services
• Assist/Guide growth &
maturity of Service
Management
Processes
• Manage, Analyze,
Review
Continual Service Improvement
Key Concepts
• Main Areas
• Overall Health of ITSM
• Continual alignment of Service Portfolio to Business Needs
• Maturity of IT Processes
• Guiding principles
• You cannot manage what you cannot control
• You cannot control what you cannot measure
• You cannot measure what you cannot define
Continual Service Improvement
Key Terms
• Baseline
• 7 Steps of Improvement
• CSI Model
• Metrics
• Technology
• Process
• Service
Continual Service Improvement Activities
Key Activities
Key Roles
Collect data and analyze trends compared to baselines, targets, SLAs
and benchmarks. This would include output from services and service
management processes
CSI Manager, Service
Manager, Service Owner, IT
Process Owner
Set targets for improvement in efficiency and cost effectiveness
throughout the entire service lifecycle
CSI Manager, Service
Manager
Set targets for improvements in service quality and resource
Utilization
CSI Manager, Service
Manager, Service Owner,
Business Process
Consider new business and security requirements
CSI Manager, Service
Manager, Business Process
Owner
Consider new external drivers such as regulatory requirements
CSI Manager, Service
Manager,
Business Process Owner
Create a plan and implement improvements
CSI Manager, Service
Manager,
Service Owner, Process
Owner
Provide a means for staff members to recommend improvement
opportunities
CSI Manager, Service
Manager
Constant Improvement: Deming
7 Steps of Improvement
CSI Model
Role of Measurements
Focus on Business Needs
Methods & Techniques of CSI
• Assessments
• Gap Analysis
• Balanced Scorecard
• SWOT
• Deming Cycle
• Plan
• Do
• Check
• Act
Demand and Capacity
Pattern of Business Activity (PBA)