ITIL Defined and documented five core books
of the Service Lifecycle Stages.
Achieving effectiveness and efficiency
in the delivery of and support of services.
Ensuring Value to customers.
Development and Improvement of
capabilities for transitioning new and
changed services into operation.
1. Define the Market
2. Develop the Offerings
3. Develop Stategic Assets
4. Prepare for Execution
Functions are organizational units that
perform certain types of work and are
responsible for specific outcomes.
Structured set of activities to accomplish
a specifice set of Objectives.
The 4 P's of Service Design
People
Processes
Products/Technologies
Partners
Favorable outcomes when compared to a before state. Benefits
are achieved gains, ROI as a percentage improvement,
Increase the Value of Investment. Continual alignment of
IT Services with the business, maturity of the IT Processes in
each Service Lifecycle. Key Performance Indicators, Critical
Success Factors, and activity metrics per process and overall.
Service metrics measure end-to-end performance of a service.
7-Step Improvement Process for creating and maintaining Value.
Ensures that service requirements are identified
and documented in SLA's. Negotiate and agree
to OLA. Assist in Service Portfolio/Catalog generation.
Measure, record, analyze, and improve
customer satisfaction.
Manage Vital Business Functions and their
High Availability, Fault Tolerence, Continuous
Operation, Continuous Availability. Measure
and report reliability, maintainability, and
serviceability. Manage the Availability Management
Information System. Designed in from the begining
is a proactive approach to continuous availabilty.
Ensures adaquet IT capacity, monitoring,
performance testing and focal point for all
performance issues.
Performs business impact analysis, risk assesment and
management, ensures organizational preparedness.
Negotiate and manage contracts with thrid party vendors.
Define markets, identify and develop assets
and capabilites to deliver the service. Develop the
offering. Build the Configuration Management System
composed of one or more Configuration Management
Databases. Insure Business is Securely conducted, documents
are secure and payments are secure. PCI Compliance.
Organization and RACI.
Governs investments in Services and manages them
for value. Define, Analyze, Approve, Charter.
Includes three main Catalogs:
Service Pipeline
Services Catalog
Retired Services
Strategic Analysis + Differencial Charging,
Evaluates new services and changes
based on demand.
Demand Modeling, Optimzing Services,
Variable cost dynamics, Compliance for
accounting methods and activities including
security and audit trails. SOX Compliance.
The Info Security Manager Builds and Maintains the
Supplier and Contractor Database and builds and maintains
Information systems for the entire IT organization. External
Access procedures for outsourced suppliers are provided in
a Service Level Agreement. Internal controls for access to information
are established in Operational Level Agreement.
The Service Desk will know what to do in the event of
a security related alarm, will be aware of security
implications of any alarm or alert as established and
communicated by the Information Security Manager.
The Information Security Manager is responsible
to build and maintain the storage of information
for effective use by Operations. KEDB, Incident Reports,
Alarms and Alerts, etc.
Predefined procedures are put in place that
identify exactly who will respond and what
actions will be taken. Relationships to Change
Management, Capacity Management, Availability
Management, and Service Level Management.
Security needs to be built into
all Services from the design stage
consistent with Security Policies.
Monitoring, measuring, alerting, auditing
and security reporting needs to be integrated
in a "good practices" standard format to be
manageable and effective. V-Model
A planned and organized approach
to changes, reconfiguration,
and upgrades aid in maintaining
effective security measures.
Negotiates Info Security Services with all Process owners that
establish and maintain SLA's and OLA's in a clear manner and
establish monitoring and auditing procedures. Ensures Confidentiality,
Integrity, Availability, and Autenticity across all processes.
Single point of contact for all Security issues in IT.
Incident management activities are established to
maintain availability. Assist in business impact analysis and
identifies vital business functions. Helps to define recovery
requirements for IT Services.
Senior Management Provides:
Business goals and objectives
Overriding Business Security Policy
Sign off on Reports (ie.SOX HIPPA etc)
-Requires CIO to provide AAA
the Authentication, Authorization and
Audit Trails for the Information
Provided in the SOX Report
(and other regs.)
Centralized access controls need to established by
the Security Manager and logging and audit trails
need to be saved and accessible for any range of time.