You are on page 1of 171

MATERIAL DO CURSO

ITIL
FOUNDATION

- Janeiro 2004 -
Material do Curso de ITIL

Índice
Introduction .....................................................................................................................................................................................6
IT Service Management...................................................................................................................................................................8
IT Service Management – Background.......................................................................................................................................8
Services and Quality............................................................................................................................................................10
Quality Assurance...............................................................................................................................................................11
ISO-9000.............................................................................................................................................................................13
Organisational Maturity.......................................................................................................................................................14
CMM...................................................................................................................................................................................15
Organisation and Policies..........................................................................................................................................................16
Vision, objectives and policies............................................................................................................................................16
Planning Horizon.................................................................................................................................................................17
Culture.................................................................................................................................................................................18
Human Resource Management............................................................................................................................................19
IT Customer Relationship Management..............................................................................................................................20
Processes..................................................................................................................................................................................21
Processes and departments...................................................................................................................................................22
IT Service Management.......................................................................................................................................................23
Introduction to ITIL.......................................................................................................................................................................24
Background...............................................................................................................................................................................24
Advantages to the Customer/End User:...............................................................................................................................25
Advantages to the IT Organisation:.....................................................................................................................................25
Potential disadvantages:.......................................................................................................................................................26
Organisations............................................................................................................................................................................26
OGC (CCTA)......................................................................................................................................................................26
ITSMF.................................................................................................................................................................................27
EXIN and ISEB...................................................................................................................................................................27
The ITIL Books........................................................................................................................................................................28
ITIL (IT Infrastructure Library)...........................................................................................................................................28
Business Perspective............................................................................................................................................................29
Service Delivery..................................................................................................................................................................31
Service Support...................................................................................................................................................................33
IT Infrastructure Management.............................................................................................................................................35
Applications Management...................................................................................................................................................36
Management and Organisation............................................................................................................................................36
Planning and Implementation..............................................................................................................................................37
Service Desk
.......................................................................................................................................................................................................38
Introduction..............................................................................................................................................................................38
Objective ..................................................................................................................................................................................39
Process Description ..................................................................................................................................................................39
Activities ..................................................................................................................................................................................39
Activities.............................................................................................................................................................................40
Incident control....................................................................................................................................................................40
Roles ........................................................................................................................................................................................41
Relationships ...........................................................................................................................................................................41
Benefits ....................................................................................................................................................................................42
Summary.............................................................................................................................................................................43
Common Problems ..................................................................................................................................................................43
Metrics .....................................................................................................................................................................................45
Service Desk Structure - Best Practice......................................................................................................................................45

Structure of a Service Desk.................................................................................................................................................45


Centralised Service Desk.....................................................................................................................................................46
Virtual Service Desk............................................................................................................................................................47
Essential Terms.........................................................................................................................................................................48
Incident Management
.......................................................................................................................................................................................................49
Introduction..............................................................................................................................................................................49
Objective ..................................................................................................................................................................................50
Process Description ..................................................................................................................................................................50
Activities ..................................................................................................................................................................................51
Incident detection and recording..........................................................................................................................................51
Classification and initial support..........................................................................................................................................52
Investigation and diagnosis..................................................................................................................................................52
............................................................................................................................................................................................53

-2-
Material do Curso de ITIL
Resolution and recovery......................................................................................................................................................53
Incident closure ..................................................................................................................................................................53
Incident ownership, monitoring, tracking and communication............................................................................................53
Roles ........................................................................................................................................................................................53
Relationships ...........................................................................................................................................................................54
Benefits ....................................................................................................................................................................................55
Common Problems ..................................................................................................................................................................56
Metrics .....................................................................................................................................................................................56
Number of Incidents per time period...................................................................................................................................57
Number of Incidents per category........................................................................................................................................57
Number of Incidents per priority level.................................................................................................................................57
Incident resolution performance against service levels........................................................................................................57
Number of closed Incidents per time period........................................................................................................................57
Best practice.............................................................................................................................................................................57
Incident Management tools:.................................................................................................................................................57
Different types of escalation................................................................................................................................................57
Essential Terms.........................................................................................................................................................................58
Problem Management....................................................................................................................................................................59
Introduction..............................................................................................................................................................................59
Objective ..................................................................................................................................................................................59
Process Description ..................................................................................................................................................................60
Activities ..................................................................................................................................................................................62
Problem Control .................................................................................................................................................................62
Error Control.......................................................................................................................................................................63
Proactive Problem Management..........................................................................................................................................64
Completion of Major Problem reviews................................................................................................................................64
Roles ........................................................................................................................................................................................65
Relationships ...........................................................................................................................................................................65
Benefits ....................................................................................................................................................................................66
Common Problems ..................................................................................................................................................................67
Metrics .....................................................................................................................................................................................68
Best practices............................................................................................................................................................................69
Essential Terms.........................................................................................................................................................................70
Introduction..............................................................................................................................................................................70
Objective ..................................................................................................................................................................................71
Process Description ..................................................................................................................................................................72
Activities ..................................................................................................................................................................................73
Recording............................................................................................................................................................................73
Accepting (Rejecting)..........................................................................................................................................................73
Classifying...........................................................................................................................................................................73
Planning..............................................................................................................................................................................73
Coordination........................................................................................................................................................................74
Evaluating............................................................................................................................................................................74
Roles ........................................................................................................................................................................................75
Change Manager..................................................................................................................................................................75
Change Advisory Board (CAB)..........................................................................................................................................75
Change Advisory Board/Emergency Committee (CAB/EC) ..............................................................................................75
Relationships ...........................................................................................................................................................................75
Benefits ....................................................................................................................................................................................76
Common Problems ..................................................................................................................................................................77
Metrics .....................................................................................................................................................................................77
Best practices............................................................................................................................................................................78
Essential Terms.........................................................................................................................................................................78
Configuration Management
.......................................................................................................................................................................................................79
Introduction..............................................................................................................................................................................79
Objective ..................................................................................................................................................................................79
Process Description ..................................................................................................................................................................80
Activities ..................................................................................................................................................................................81
Planning:.............................................................................................................................................................................82
Identification:......................................................................................................................................................................82
Status accounting.................................................................................................................................................................83
Verification and audit..........................................................................................................................................................84
Roles ........................................................................................................................................................................................84
Relationships ...........................................................................................................................................................................85
Benefits ....................................................................................................................................................................................85
Common Problems ..................................................................................................................................................................86
Metrics .....................................................................................................................................................................................87
Key performance indicators.................................................................................................................................................87
Best practices............................................................................................................................................................................88

-3-
Material do Curso de ITIL
The CMDB..........................................................................................................................................................................88
Interesting Websites............................................................................................................................................................89
Essential Terms ........................................................................................................................................................................89
Release Management
.......................................................................................................................................................................................................90
Introduction..............................................................................................................................................................................90
Objective ..................................................................................................................................................................................91
Process Description ..................................................................................................................................................................92
Activities ..................................................................................................................................................................................92
Roles ........................................................................................................................................................................................96
Relationships ...........................................................................................................................................................................96
Benefits ....................................................................................................................................................................................97
Common Problems ..................................................................................................................................................................98
Metrics .....................................................................................................................................................................................99
Best practices............................................................................................................................................................................99
Interesting web sites..........................................................................................................................................................101
Essential Terms.......................................................................................................................................................................101
Introduction..................................................................................................................................................................................102
Objective ................................................................................................................................................................................103
Process Description.................................................................................................................................................................104
Activities ................................................................................................................................................................................106
Roles.......................................................................................................................................................................................108
Benefits ..................................................................................................................................................................................110
Common Problems ................................................................................................................................................................111
Metrics ...................................................................................................................................................................................113
Best practices..........................................................................................................................................................................113
Essentials (terminology) ........................................................................................................................................................114
Financial Management.................................................................................................................................................................115
Introduction............................................................................................................................................................................115
Objective ................................................................................................................................................................................116
Process Description.................................................................................................................................................................118
Activities ................................................................................................................................................................................119
Roles ......................................................................................................................................................................................123
Relationships .........................................................................................................................................................................124
Benefits ..................................................................................................................................................................................124
Common Problems.................................................................................................................................................................125
Metrics ...................................................................................................................................................................................126
Best practices..........................................................................................................................................................................127
Essentials (terminology) ........................................................................................................................................................127
Availability Management.............................................................................................................................................................128
Introduction............................................................................................................................................................................128
Objective ................................................................................................................................................................................129
Process Description ................................................................................................................................................................130
Activities.................................................................................................................................................................................132
Roles ......................................................................................................................................................................................134
Relationships .........................................................................................................................................................................135
Benefits ..................................................................................................................................................................................136
Common Problems ................................................................................................................................................................137
Metrics ...................................................................................................................................................................................137
Best practices..........................................................................................................................................................................138
Capacity Management..................................................................................................................................................................140
Introduction............................................................................................................................................................................140
Objective ................................................................................................................................................................................140
Activities ................................................................................................................................................................................142
Roles ......................................................................................................................................................................................144
Relationships .........................................................................................................................................................................145
Benefits...................................................................................................................................................................................147
Common Problems.................................................................................................................................................................147
Metrics ...................................................................................................................................................................................148
Best practices..........................................................................................................................................................................149
Essentials (terminology).........................................................................................................................................................150
IT Service Continuity Mgt...........................................................................................................................................................151
Introduction............................................................................................................................................................................151
Objective ................................................................................................................................................................................151
Process Description ................................................................................................................................................................152
Activities ................................................................................................................................................................................154
Roles.......................................................................................................................................................................................158
Relationships .........................................................................................................................................................................158
Common Problems ................................................................................................................................................................160
Metrics ...................................................................................................................................................................................161

-4-
Material do Curso de ITIL
Best practices..........................................................................................................................................................................162
Essentials (terminology) ........................................................................................................................................................162
Security Management...................................................................................................................................................................164
Introduction............................................................................................................................................................................164
Objective ................................................................................................................................................................................165
Process Description ................................................................................................................................................................166
Activities ................................................................................................................................................................................166
Roles.......................................................................................................................................................................................167
Relationships .........................................................................................................................................................................168
Benefits ..................................................................................................................................................................................168
Common Problems ................................................................................................................................................................169
Metrics ...................................................................................................................................................................................169
Best practices..........................................................................................................................................................................170
Essentials (terminology) ........................................................................................................................................................170
Conclusion...................................................................................................................................................................................171

Further reading........................................................................................................................................................................171

-5-
Material do Curso de ITIL

Introduction

In recent decades IT developments have changed the way that most businesses
operate. The changes are most evident in the various business processes of any
organisation. Examples of business processes are "the sales process" (eg. Marketing
generates leads and sends through to Sales, Sales develops relationships and prepares
proposals, Administration prints and sends the material to the client and ensures that there
is an action against the sales person to follow up the proposal, etc. etc.). All of these
business processes rely a great deal on computer based tools and the underlying
technology.

Since the introduction of the PC, LAN, client/server technology and the Internet,
organisations can bring their products and services to markets faster than ever before.
These developments are responsible for the transition from the industrial to the information
age. In the information age, everything has become faster and more dynamic.

Traditional hierarchical organisations often find it difficult to respond to rapidly


changing markets, and therefore there is now a trend towards less hierarchical and more
flexible organisations. The emphasis is now on horizontal processes, and decision-making
authority is increasingly granted to personnel at a lower level. IT Service Management
operating & tactical processes were developed against this background - where the process
is paramount and the focus moves away from the "silo" departmental or functional
structure.

In the 1980s, the quality of the IT services provided to the British government lead
the CCTA (Central Computer and Telecommunications Agency as it was referred to - now
the Office of Government Commerce, OGC) was instructed to develop an approach for
efficient and financially effective use of IT resources by ministries and other British public
sector organisations. The aim was to develop a framework/methodology/approach that was
vendor/supplier independent. This resulted in the Information Technology Infrastructure
Library™ (ITIL). ITIL v1 grew from a collection of best practices observed in the IT service
industry.

The ITIL framework provides a detailed description of a number of important IT


practices, with comprehensive checklists, tasks, procedures and responsibilities which can
be tailored to any IT organisation. Where possible, these practices have been defined as
processes covering the major activities of IT service organisations. The broad subject area

-6-
Material do Curso de ITIL
covered by the ITIL publications makes it useful to refer to them regularly and to use them
to set new improvement objectives for the IT organisation. The organisation can grow and
mature with them.

A number of other IT Service Management frameworks have been developed on the


basis of ITIL, generally by commercial organisations. This is one of the reasons why ITIL
has become the de facto standard for describing a number of fundamental processes in IT
Service Management.

Special note: The most widely known "other frameworks" that have been
based on ITIL is the Microsoft Operations Framework. Microsoft do not try
and conceal their proprietary framework has it's basis in ITIL. They in fact
praise ITIL as an excellent starting point for organisations with Microsoft
Environments. What Microsoft have done however, is extend ITIL and create
a series of other processes and specific concepts.

ITIL is often referred to as Best Practice, although the relatively new term of "good
practice" is starting to be widely used.

Note: The term "best practice" will often spark heated debate among some
IT professionals. If you are not certain then the term "good practice" may be
a safer option to use. The ITIL material claims that it is Best Practice.

The broader adoption of ITIL has been hampered by the lack of a basic, but effective
introductory textbook. This course is the electronic version of this missing text. The course
is beneficial for anyone involved in IT Service Management.

This edition of this Course is based upon The Art of Service's Course material,
developed as an introduction to IT Service Management. That work was based on
management summaries and descriptions in official ITIL publications. Given the desire for a
broad consensus in the ITIL field, new developments, additional material and contributions
from ITIL professionals are welcome. They will be discussed by the editors and where
appropriate incorporated into new editions.

Given the rapid changes in this field, the ITIL books do not always describe the latest
developments. This is because ITIL is primarily a collection of best practices taken from a
variety of people in a wide cross section of industry. When writing this Course we aimed to

-7-
Material do Curso de ITIL
incorporate current developments in the field, without substantially diverting from the ITIL
publications.

Therefore the course can be used both to prepare for the official ITIL Service
Management Foundation exam and as a general introduction to the broader area of IT
Service Management.

This course does not address the planning and implementation of ITIL processes. In
chapter 2 ‘IT Service Management’ it does however address, in a more general way,
relevant matters in IT Service Management, in terms of quality, processes and policies.

Before you begin: Thank you for making the choice to study with us. This
course is prepared and supported by experienced and fully qualified IT
Service Managers. You can ask for help and explanations at any time. We
have set tests throughout the material to ensure that you are getting the
best value for the money you pay.

We know that you will enjoy the journey you are about to begin. We hope to
hear from you in the future. We like to get the stories about how this
learning exercise helped you to make significant improvements in your own
IT Service Management challenges.

IT Service Management

IT Service Management – Background


In this section we will look at services, quality, organisation, policy and process
management. All these topics provide the background for the development of a systematic
approach to IT Service Management.

The IT Service Management processes described in this course (also referred to as IT


Management) are best understood against the background of the concepts about
organisations, quality and services which influenced the development of the discipline.
Familiarity with these terms also helps to understand the links between the various
elements of the IT Infrastructure Library (ITIL). ITIL is by far the best known description of
IT Service Management and is therefore used as the foundation for this Course.

The Objective Tree

The objective tree is used to help all members of the organisation understand
the benefits of ITSM. Starting at the top of the tree, the most important consideration for
any business is that the Organisation's Objectives are met (eg. Increased market share,
lower costs and higher customer satisfaction).

Failure to meet the overall objectives means that the organisation ceases to function
(no matter how well the IT department is run). In order for the organisation's objectives to
be met, there must be a series of business departments working together in Business

-8-
Material do Curso de ITIL
Processes. An example of a business process is the "enrollment process" in a University.
The "enrollment process" involves Admissions (to capture basic student details), Security
(to issue id-card), Library (to provide required book lists), etc.

Each of these business processes needs a variety of services (IT Service Provision in
our Objective Tree) in order to work. In our University example the Admissions department
has a Student system, Security has it's Security system and the Library has a Library
system (hopefully all share a common repository of student information, but they all exist
for a different reason).

The next branch of the Objective Tree is Service Management. It is at this layer that
IT professionals must consider how they need to manage all the infrastructure (including
hardware, software, tools, etc.) in order to make the required Services available, to the
Business Processes so that the Organisation Objectives can be met.

Getting this right earns everyone a medal!

This chapter introduces the following subjects:

• The section on the provision of services and quality addresses the relationship
between the quality experienced by the customer's organisational end users, and
quality management by the provider of the IT services.
• The section on organisation and policies addresses concepts such as vision,
objectives, and policies and discusses issues such as planning, corporate culture
and Human Resource Management. This section also discusses the coordination
between the business processes of a company and the IT activities.
• The section on process management looks at the control of IT service processes.

-9-
Material do Curso de ITIL

Services and Quality


Organisations are often highly dependent on their IT services and expect the IT
services not only to support the organisation, but also to present new options to achieve the
objectives of the organisation. Furthermore, the high expectations of customers on IT
Services tend to change significantly over time (usually in a downgrading of expectations).

Providers of IT services can no longer afford to focus on technology. They now have
to consider the quality of the services they provide and focus on the relationship with their
customers.

The provision of IT services refers to the full management of the IT infrastructure.


Hardware, software, tools and relationships.

Before buying a product in a shop, we normally assess the quality such as


the appearance, usefulness for the task and robustness. In a shop, the customer has few
opportunities to influence the product quality. This is because the product is produced in a
factory. By effectively controlling the production plant, the manufacturer will try to deliver a
fairly constant quality. In this example, manufacture, sales and consumption of the product
are quite separate.

However, services are provided through interaction with the customer. Services
cannot be assessed in advance, but only when they are provided. The quality of a service
depends to some extent on the way in which the service provider and the customer interact.
In contrast to the manufacturing process, customer and provider can still makes changes
when the services are being delivered. How the customer perceives the service and what
the provider thinks they supply, both depend largely on their personal experiences and
expectations.

The process of providing a service is a combination of production and use, in which


the provider and customer participate simultaneously.

The perception of the customer is essential in the provision of services. Customers


will generally use the following questions to assess the quality of the service:

• Does the service align with my expectations?

• Can I expect a similar service the next time?

• Is the service provided at a reasonable cost?

Whether or not the service fulfils the expectations depends primarily on how
effectively the deliverables were agreed on in the first place, even more so than on how well
the supplier provides the service.

A continuing dialogue with the customer is essential to refine the services and to
ensure that both the customer and the supplier know what is expected of the service. In a
restaurant, the waiter will first explain the menu, and ask if everything is all right when
serving a new course.

The waiter actively coordinates supply and demand throughout the meal. This
experience with customers is then used to improve future customer contact.

- 10 -
Material do Curso de ITIL

The quality of a service refers to the extent to which the service fulfils the
requirements and expectations of the customer. To be able to provide quality, the supplier
should continuously assess how the service is perceived and what the customer expects in
the future.

Another customer may well consider what one customer considers normal as a
special requirement.

Eventually a customer will get used to something considered special at the start. The
results of the assessment can be used to determine if the service should be modified, if the
customer should be provided with more information, or if the price should be changed.

Quality is the totality of characteristics of a product or service that bear on its ability
to satisfy stated and implied needs (ISO-8402).

Reasonable costs may be considered as a derived requirement. Once it has been agreed
on what is to be expected of the service, the next step is to agree on what it may cost. At
this stage the service provider has to be aware of the costs they incur, and the current
market rates for comparable services.

A customer will be dissatisfied about a service provider who occasionally exceeds the
expectations but disappoints at other times. Providing a constant quality is one of the
most important, but also one of the most difficult aspects of the service industry.

For example, a restaurant will have to purchase fresh ingredients, the chefs will have
to work together to provide consistent results, and hopefully there are no major differences
in style among the waiting staff. A restaurant will only be awarded three Michelin Stars
when it manages to provide the same high quality over an extended period. This does not
often happen: there are changes among the waiting staff, a successful approach may not
last, and chefs leave to open their own restaurants. Providing a constant high quality also
means that the component activities have to be coordinated: the more efficiently the
kitchen operates, the more quickly the guests can be served.

Therefore, when providing a service, the overall quality is the result of the quality of
a number of component processes that together form the overall service. These component
processes formed a chain; a series of linked activities. Effective coordination of the
component processes requires not only high quality at each stage, but also consistent
quality.

Quality Assurance
Supplying products or services requires activities. The quality of the product or
service depends largely on the way in which these activities are organised. Deming’s quality
life cycle provides a simple and effective model to address quality. The model assumes that
to provide appropriate quality, the following steps must be undertaken repeatedly:

- 11 -
Material do Curso de ITIL

• Plan: Who should do what, when, how, using what?

• Do: Implementation of the planned activities.

• Check: Determine if the activities provided the expected result.

• Act: Adjust the plans based on information gathered while checking.

To be able to make use of this life-cycle approach, the activities of supplying products and
services must be divided into processes, each with their own plans and opportunities for
conducting checks. It must be clear who is responsible in the organisation and what
authority they have to change plans and procedures, not for only for each of the activities,
but also for each of the processes.

Quality management is the responsibility of everyone working in the organisation


providing the service. Every employee has to be aware of how their contribution to the
organisation affects the quality of the work provided by their colleagues, and eventually the
services provided by the organisation as a whole. Quality management also means
continuously looking for opportunities to improve the organisation and implementing quality
improvement activities.

Quality assurance is a policy matter within the organisation. It is the whole of the
measures and procedures, which the organisation uses to ensure that the services provided,
continue to fulfill the expectations of the customer and the relevant agreements. Quality
assurance ensures that improvements resulting from quality management are maintained.

A quality system is the organisational structure related to responsibilities, procedures and


resources for implementing quality management.

The ISO 9000 series of standards is often used to develop, define, assess and improve
quality systems.

- 12 -
Material do Curso de ITIL

Dr. Edward Deming was an American statistician brought to Japan by general


Douglas MacArthur after the Second World War to help rebuild the destroyed economy. He
had developed theories about the best possible use of expertise and creativity in
organisations in the United States in the 1930s, but because of the Depression his ideas
were not accepted in the US. However, his optimisation methods were successfully adopted
in Japan.

Some of Deming’s typical statements:

• ‘The customer is the most important part of the production line.’


• ‘It is not enough to have satisfied customers, the profit comes from returning
customers and those who praise your product or service to friends and
acquaintances.’
• ‘The key to quality is to reduce variance.’
• ‘Break down barriers between departments.’
• ‘Managers should learn to take responsibility and provide leadership’
• ‘Improve constantly.’
• ‘Institute a vigorous program of education and self-improvement.’
• ‘Institute training on the job.’
• ‘The transformation is everybody's job.’

ISO-9000
Some organisations require their suppliers to hold an ISO 9001 or ISO 9002
certificate. Such a certificate proves that the supplier has an adequate quality system whose
effectiveness is regularly assessed by an independent auditor.

ISO is the International Standards Organisation. A quality system that complies with
the ISO standard testifies that the supplier has taken measures to be able to provide the
quality required by their customers;

- 13 -
Material do Curso de ITIL
• the management regularly assesses the operation of the quality system, and uses
the results of internal audits to implement improvement measures where necessary;
• the suppliers’ procedures are documented and communicated to those affected by
them;
• customer complaints are recorded, dealt with in a reasonable time, and used to
improve the service where possible;
• the supplier controls the production processes and can improve them.

An ISO certificate does not provide an absolute guarantee about the quality of the
service provided, however, it does indicate that the supplier takes quality assurance
seriously and is prepared to discuss it.

The new ISO 9000 series of standards, ISO-9000-2000, puts even greater emphasis
than the previous standard on the ability of an organisation to learn from experience and to
implement continuous quality improvement.

Organisational Maturity
Experience with improving the quality of IT services has shown that it is rarely
sufficient to simply define current practices. The causes of a mismatch between the service
provided and the customer’s requirements are often related to the way in which the IT
organisation is managed. A permanent quality improvement focus demands a certain
degree of maturity of the organisation.

The European Foundation for Quality Management (EFQM) model can be useful in
determining the maturity of an organisation. It identifies the major areas to be considered
when managing an organisation.

Deming’s Quality Life-Cycle is incorporated in the EFQM model. Based on the


outcomes from "result areas" actions are taken (strategy, policies). These actions serve to
underpin the planning (e.g. the structure of the processes), that should lead to the desired
results. The EFQM identifies nine areas.

In 1988 fourteen large European companies, with the support of the European
Commission, set up the European Foundation for Quality Management.

- 14 -
Material do Curso de ITIL
The objective of the EFQM is to promote Total Quality Management, aimed at
excelling in customer satisfaction, employee satisfaction and appreciation by society, and
performance results.

The EFQM ‘Model of Business Excellence’, generally known simply as the EFQM
model, is widely accepted as the major strategic framework for managing an organisation
aimed at the balanced, continuing improvement of all aspects relevant to the business.

Over 600 European businesses and research organisations have now joined the
EFQM. For further information: http://www.efqm.org.

CMM

In the IT industry, the process maturity improvement process is best


known in the context of the Capability Maturity Model (CMM). The Software
Engineering Institute (SEI) of Carnegie Mellon University developed this
process improvement method. CMM is concerned with improving the
maturity of a software creation processes. CMM includes the following levels:

• Initial - the processes occur ad hoc.


• Repeatable - the processes have been designed such that the service quality should
be repeatable.
• Defined - the processes have been documented, standardised and integrated.
• Managed - the organisation measures the results and consciously uses them to
improve the quality of its services.
• Optimising - the organisation consciously optimises the design of its processes to
improve the quality of its services, or to develop new technology or services.

Maturity models based on the CMM levels of maturity have also been developed for
IT Service Management.

When assessing the maturity of an organisation, we cannot restrict ourselves to the


service provider. The level of maturity of the customer is also important. If there are
large differences in maturity between the supplier and the customer, then these will have to
be considered to prevent a mismatch in the approach, methods and mutual expectations.

Specifically, this affects the communication between the customer and the supplier.
It is advisable to bring both organisations to the same level of development, and to operate
at that level, or to adjust the communication in line with the lower level.

- 15 -
Material do Curso de ITIL

Organisation and Policies


We know that service quality is closely associated with the quality of an
organisation and its policies.

This section will discuss several important aspects of the organisation and policies
that are relevant to process management.

Vision, objectives and policies

An organisation is a form of cooperation between people. Any organisation, from a


darts club to a multinational company, depends on a concept of why it is worth cooperating
in the organisation. The shared vision might be that you can make money selling or you
can improve the environment. However, to be attractive to all stakeholders (e.g. customers,
investors, personnel) as an organisation it has to be communicated to clients why they
should do business with you. For example because you are the best, cheapest or most fun.
You will want to build up a suitable image. Think of the things that stick in your mind – “Just
Do It” (Nike).

To communicate the vision, the organisation creates a Mission Statement. The


mission statement is a short, clear description of the objectives of the organisation and the
values it believes in.

The objectives of the organisation describe in greater detail what it wants to


accomplish. Good objectives have five essential elements: they have to be Specific,
Measurable, Appropriate, Realistic and Time-bound (SMART).

The policy of the organisation is the combination of all decisions and measures
taken to define and realise the objectives. In its policies, the organisation will prioritise
objectives and decide how the objectives will be reached. Of course, priorities may change
over time, depending on the circumstances. The clearer the organisation’s policies are to all
stakeholders, the less needs to be defined about how personnel are supposed to do their
work. Instead of detailed procedures, personnel can independently use the policies as their
guideline. Clearly formulated policies contribute to a flexible organisation, as all levels in the
organisation can respond more quickly to changing circumstances.

Implementing policies in the form of specific activities requires planning. Plans are
usually divided into stages to provide milestones where progress can be monitored. For
example, the policies can be used to draw up an annual plan, which is then used to develop
the budgets. An organizational annual plan can be further developed into greater detail as
departmental plans, quarterly plans or project plans. Each of these plans contains a number
of elements: an activity schedule, the required resources, and agreements about the quality
and quantity of the products or services to be delivered.

Realisation of the planned activities requires action. Actions are allocated to


personnel as tasks, or outsourced to external organisations.

- 16 -
Material do Curso de ITIL
When translating the mission of the organisation into objectives, policies, planning
and tasks, there is the risk that after some time, the mission, objectives or policies are
forgotten. It is therefore important that at every stage we measure if the organisation is
still moving in the right direction, and remedial action is taken where necessary.

We have to measure if the organisation or processes fulfil the objectives, and there
are various methods available for this. One of the most common methods in business is the
Balanced Score Card, or BSC. In this method, the objectives of the organisation or
process are used to define Critical Success Factors (CSF). CSFs are defined for a number
of areas of interest or perspectives: customers/market, business processes,
personnel/innovation and finance. The parameters used to measure if the CSFs meet the
standards are known as Key Performance Indicators (KPI). Where necessary, these can
be subdivided into Performance Indicators (PI).

Key performance indicators, or KPIs, are parameters for measuring progress relative
to key objectives or Critical Success Factors (CSF) in the organisation.

The outcome of the measurements and changing circumstances can lead to


modification of the processes, tasks, plans, and policies, and even to a change in the
objectives, mission and vision of the organisation. The more mature an organisation is, the
better it deals with such changes.

If the IT department supports the interests of the business, the objectives of the IT
department will be derived from the business objectives. The IT department, for example,
might have the following objective: ‘To contribute to the competitive strength of the
business’. The specific objectives of the IT department will then be developed on the basis
of this general objective.

Depending on the nature of the business, objectives will be defined for the IT
department with respect to safety, accessibility, response speed, technical sophistication
and so on.

Planning Horizon

When considering the policies and planning of an IT department, we should be aware


of the links between planning for the business as a whole and the application systems and
the technical infrastructure used by the business. When planning the network and
applications of a business, the IT department will have to stay ahead of the overall planning
to ensure that the business has an IT infrastructure in which it can develop and grow into.
The figure below gives an example of the links between the various plans.

- 17 -
Material do Curso de ITIL

Technical infrastructure has the longest planning horizon and in its support
role it has fewer clear links with the substantive business activities. It takes time to develop
a technical infrastructure and the fact that information systems and the business depend on
the technical infrastructure, limits the speed at which changes can be implemented.
Furthermore, developing a technical infrastructure demands significant investment and the
period over which it can be depreciated has to be considered.

The planning horizon is shorter for applications as they are designed for specific
business purposes. Application life cycle planning is primarily based on the business
functions to be provided by the system, after which the underlying technology is considered.

Business plans, based on the organisation’s strategy, normally cover one calendar or
financial year. Budgets, planning and progress reports all fall within this period. In some
markets, the planning cycle time has become even shorter as the cycle time for product
development has also decreased.

Planning should address four elements:

• Time - this is the easiest factor to determine. It is defined by a starting date and ending
date, and is often divided into stages.

• Quantity - the objectives have to be made measurable to monitor progress. Terms such
as ‘improved’ and ‘quicker’ are insufficient for planning purposes.

• Quality - the quality of the deliverables (results) should be appropriate for the objective.

• Costs and revenues - the deliverables must be in proportion to the expected costs,
efforts and revenues.

Differences between the planning horizons occur not only between areas, but also
between the various levels of activities and processes (strategic, tactic and operational).

Culture

Organisations that want to change (for example to improve the quality of their
services) will eventually be confronted with the current organisational culture. The
organisational culture, or corporate culture, refers to the way in which people deal with each

- 18 -
Material do Curso de ITIL
other in the organisation; the way in which decisions are made and implemented; and the
attitude of employees to their work, customers, suppliers, superiors and colleagues.

Culture, which depends on the standards and values of the people in the
organisation, cannot be changed, but it can be influenced. Influencing the culture of an
organisation requires leadership in the form of a clear and consistent policies and a
supportive personnel policy.

The corporate culture can have a major influence on the provision of IT services. This
is due to the fact that businesses value innovation in different ways. In a stable
organisation, where the culture places little value on innovation, it will be difficult to adjust
the IT services in line with changes in the organization. If the IT department is unstable,
then a culture that values change can pose a serious threat to the quality of its services. In
that case, a free for all can develop where many uncontrolled changes lead to a large
number of faults.

Human Resource Management

Personnel policy plays an important and strategic role in fulfilling the long-term
objectives of an organisation (see also the EFQM model). It can also be used as an
instrument to change the corporate culture. The objective of modern personnel
management is to optimise the performance of all personnel in the organization. A variety
of instruments such as recruitment and selection, training and career development,
motivation and reward are used.

Human Resource Management (HRM) is the major form of modern personnel


management.

Human Resource Management is based on two premises:

• Personnel management should contribute to the objectives of the organisation. If


organisations have to respond better and more quickly in an environment which changes
ever more quickly, then this will affect the deployment, quality and number of personnel.

• Giving employees in the organisation the opportunity to develop and use their skills will
benefit the organisation.

There are three approaches to HRM:

• The hard approach sees human resources as means of production, which have to be
organised as effectively and efficiently as possible. As the corporate strategy is determined
by economic, technical and market factors, the same applies to personnel policy. This
approach places different values on employees. Some core employees are strategically
more important than peripheral employees who are easily replaceable. For example, a
company might choose to permanently employ only core personnel, and for the rest use a
pool of flexible personnel.

• The soft approach emphasises that making the best possible use of human potential and
opportunities will benefit the business. Modern employees are highly educated, ambitious
and prepared to invest a lot in their work. For this reason, their potential must be identified
early and developed continuously (career development, training policy). When selecting its
strategy and policy, the business must base its choices on the talent and potential of its
employees.

- 19 -
Material do Curso de ITIL
• The integrated approach looks at the shared interests of personnel and management in
an organisation. To reach the objectives of the organisation there will have to be good
inflow, movement and outflow of personnel. Changes in the market and the organisation
(e.g. developments in technology) lead to constant changes in the need for skills.

All aspects of personnel policy have to be carefully coordinated. The movement of


employees in the organisation, determining and developing skills (competence) and
promoting mobility in the internal labour market is becoming increasingly important in
organisations.

The quality of service provided by an organisation benefits if the best use is made of the
potential of its employees. This facilitates continuous improvement. Instruments for quality
management in personnel policy include:

• Policy Deployment - communicating to each employee how and to what extent their
task contributes to realising the objectives of the organisation. An important condition for
the success of policy deployment is that it also extends to all layers of management.

• Empowerment - giving employees the opportunity to organise and implement their task
in consultation with the organisation. The degree of empowerment determines the extent to
which employees can be held responsible for the quality of the work they provide.

• Accountability - which may be the result of policy deployment and empowerment. If an


employee has had an explanation of what is expected of them, and if they have had the
opportunity to arrange and implement the task as they wanted, then they can be held
accountable for it.

This could be used as a basis for assessing and rewarding employees. The reward
may be material (salary) or immaterial, for example appreciation, new opportunities for
development and career opportunities.

• Competence Management - this is both a method to use the competency available in an


organisation as effectively as possible, and as a way to systematically develop the
competence the organisation needs. This approach charts the competence required by the
processes and projects as well as the competence of the employees. When organising
employees, the focus is not only on obtaining a good match between the required and
available competence, but also on the opportunities to develop competence, transfer
expertise, and learn skills. Mentors or coaches may support employees. Setting up skills
groups can also support the exchange of experience and encourage the development of new
competence.

IT Customer Relationship Management

The quality of IT services largely depends on good relationships with the customers
of the IT organisation. These relationships provide the basis for making and updating
agreements. IT Customer Relationship Management addresses maintaining a relationship
with customers and coordinating with customer organisations, at the strategic, tactic and
operational levels.

In IT Customer Relationship Management, the major challenge is to ensure that


there are good and effective relationships between the IT organisation and the customer
organisation at all levels. However, the extent of IT Customer Relationship Management will
be different at each level. One of the elements in customer relationships is the Service
Desk, and the control of the Service Levels can be based on Service Level Management. In
these areas, IT Customer Relationship Management will primarily play a supportive role, for

- 20 -
Material do Curso de ITIL
example, by organising surveys among customers and users, providing information, and
so forth.

The user is the person behind the PC, the employee who uses IT services for their
routine activities.

The customer is the person who is authorised to conclude an agreement with the IT
organisation about the provision of IT services (for example a Service Level Agreement,
SLA) and who is responsible for ensuring that the IT services are paid for.

IT Customer Relationship Management plays an important role in developing the


Strategic Alignment between the IT organisation and the organisation purchasing the IT
services. In practice, this is primarily a matter of staying in touch with the customer
organisation, and exploring the options for linking the strategic objectives of both
organisations. This can provide the basis for a long-term relationship, in which the IT
organisation focuses on the customer and proposes IT solutions that the help the customer
reach their business objectives.

Given the dynamic nature of both the customer organisation and the IT organisation,
the rate of change in both organisations should also be coordinated.

The agreements with the customer about the services to be provided are then
developed into service level proposals through Service Level Management. For example, if
the customer wants to introduce an intranet, then the availability, user support,
implementation of change requests and cost all have to be agreed. These agreements are
laid down in a Service Level Agreement (SLA).

If the customer organisation wants changes (expansion or modification) to the IT


services that fall within the agreements laid down in the SLA, then a Request for Change
will be submitted. Change Management then processes the request. Changes outside the
current agreements are introduced into the Service Level Management process.

In most cases, users can contact a Service Desk for operational requests and
questions, and to report problems.

Coordination at a strategic level has a planning horizon of several years. Service


Level Management concerns agreements at the tactical level, with a planning horizon of
approximately one year. Change Management, Service Desk and Incident Management all
concern the operational level, with a planning horizon of months or even weeks.

Processes
When arranging activities into processes, we do not use the existing allocation of
tasks, or any existing departmental (functional) divisions. This is a conscious choice. By
opting for a process structure, we can often show that the certain activities in the
organisation are uncoordinated, duplicated, neglected, or unnecessary.

A process is a logically related series of activities for the benefit of a defined


objective.

Instead, we look at the objective of each process and its relationships with other
processes. A process is a series of activities carried out to convert an input into an output.
We can label the input and output of each of the processes with quality characteristics
and standards (that is, what is expected to go into and what is expected to come out of
the particular process). These characteristics and standards provide information about the

- 21 -
Material do Curso de ITIL
results expected of the process. We end up with linked chains of processes, which show
what goes into the organisation and what the result is. As well as this we can describe
monitoring points in the chains to assess the quality of the products and services provided
by the organisation.

The standards for the output of each process have to be defined so that the complete
chain of processes meets the corporate objective/s, if each process complies with its
process standard. If the result of a process meets the defined standard, then the process
can be said to be effective. If the activities in the process are also carried out with the
minimum required effort and cost, then the process can be called efficient. The aim of
process management is to use planning and control to ensure that all processes are
effective and efficient.

We can study each process separately to optimise its performance. The process
owner is responsible for the process results. The process manager is responsible for the
realisation and structure of the process, and reports to the process owner. The process
operatives are responsible for defined activities, and report to the process manager.

The logical combination of activities results in clear points where the quality of
processes can be monitored. In a restaurant for example, we can separate responsibility for
purchasing and cooking; chefs may not have the authority to purchase anything as
experience may show that they tend to spend too much on fresh ingredients that do not add
value.

The management of the organisation can exercise control on the basis of the quality of the
process as demonstrated by data from the results of each process. In most cases, the
relevant performance indicators and standards will already be agreed. The day-to-day
control of the process can then be left to the process manager. The process owner will
assess the results based on a report of performance indicators and whether they meet the
agreed standard.

Without clear indicators, it would be difficult for a process owner to determine


whether the process is under control, and if planned improvements are being implemented.

Processes are often described using procedures and work instructions.

A procedure is a description of logically related activities, and who they are carried
out by. A procedure may include stages from different processes. A procedure defines who
does what, and varies depending on the organisation.

A set of work instructions defines how one or more activities in a procedure should
be carried out.

Processes and departments

Most businesses are organised in a hierarchy. They have departments, which are
responsible for a group of employees. There are various ways of structuring departments,
for example by customer, product, region or discipline. IT services generally depend on
several departments, customers or disciplines. In a hierarchical organisation if there is an IT
service to provide users with access to an accounting program on a central computer it will
generally involve several departments.

In this example, the computer centre has to make the program and database accessible,
the data and telecommunications department has to make the computer centre accessible,
and the PC support department has to provide users with an interface to access the
application.

- 22 -
Material do Curso de ITIL
Processes that span several departments can monitor the quality of a service by monitoring
certain aspects of quality, such as availability, capacity, cost and stability. A service
organisation will then try to match these quality aspects with the customer’s demands. The
structure of such processes can ensure that good data is available about the provision of
services, so that the planning and control can be improved.

IT Service Management

IT Service Management is primarily known as the process and service-focused


approach of what was initially known as IT Management. In this chapter we have explained
that processes should always have a defined objective. The objective of IT Service
Management processes is to contribute to the quality of the IT services. Quality
management and process control form part of the organisation and its policies.
In a process-focused approach we also have to consider the situation within an
organisation (policies, culture, size, etc.).
ITIL, the best known approach to IT Service Management, does not dictate how an
organisation should be structured. ITIL cleverly describes the relationships between the
activities in processes, which are relevant to any organisation. ITIL also provides a
framework that allows experiences to be shared in different organisations, as it is a common
language.

- 23 -
Material do Curso de ITIL

Introduction to ITIL
This chapter describes the structure and objectives of the IT Infrastructure Library
(ITIL) and the organisations that contribute to maintaining ITIL as the best practice
standard for IT Service Management.

Background
ITIL was developed due to the fact that a growing number of organisations are
becoming increasingly dependent on IT to help fulfill their corporate objectives. This
increasing dependence has resulted in a growing need for IT services of a quality
corresponding to the objectives of the organisation, and which meet the requirements and
expectations of the customer. Over the years, the emphasis has shifted from the
development of IT applications to the management of IT services. An IT application
(sometimes referred to as an information system) only contributes to realising corporate
objectives if the system is available to users and, in the event of fault or necessary
modifications; it is supported by maintenance and operations.

In the overall life cycle of IT products, the operations phase expenditure amounts to
about 70 to 80% of the overall time and cost, the rest is spent on product development (or
procurement). Effective and efficient IT Service Management are essential to the success of
IT applications.

This applies to any type of organisation, large or small, public or private, with
centralised or decentralised IT services, with internal or outsourced IT services. In all cases,
the service has to be reliable, consistent, of a high quality, and at an acceptable cost.

IT Service Management addresses the provision and support of IT services tailored to


the needs of the organisation. ITIL was developed to disseminate IT Service Management
best practices systematically and cohesively. The approach is based on service quality and
developing effective and efficient processes.

ITIL offers a common framework for all the activities of the IT department, as part of
the provision of services, based on the IT infrastructure. These activities are divided into
processes, which provide an effective framework for further enhancement of IT Service
Management. Each of these processes covers one or more tasks of the IT department, such
as service development, infrastructure management, and supplying and supporting the
services.

This process approach makes it possible to describe the IT Service Management best
practices independently from the actual organisational structure of the department.

Many of these best practices are clearly identifiable and are indeed used, to some
extent, in most IT organisations. ITIL presents these best practices coherently. The ITIL

- 24 -
Material do Curso de ITIL
books describe how these processes (which have sometimes already been identified) can be
optimised, and how the coordination between them can be improved. The books also
explain how the processes can be formalised within an organisation. They provide a frame
of reference within the organisation for the relevant terminology, and help to define the
objectives and to determine the required effort.

By using a process approach, ITIL primarily describes what must be included in IT


Service Management to provide IT services of the required quality. The structure and
allocation of tasks and responsibilities between functions and departments depends on the
type of organisation, and these structures often change. The description of the process
structure can help maintain the quality of IT services during and after reorganisations.

The list below identifies some advantages and disadvantages of ITIL. It does not
claim to be a definitive list. Any attempt to supplement it often leads to an interesting
discussion about the advantages of disadvantages of ITIL and about the way in which
organisations actually use ITIL.

Advantages to the Customer/End User:

• The provision of IT services becomes more customer-focused and agreements about


service quality improve the relationship.

• The services are better described, and in greater detail.

• The quality and cost of the services are managed better.

• Communication with the IT organisation is improved by agreeing on the points of contact.

Advantages to the IT Organisation:

• The IT organisation develops a clearer structure, becomes more efficient, and more
focused on the corporate objectives.

• The management is more in control and changes become easier to manage.

• An effective process structure provides a framework for the effective outsourcing of


elements of the IT services.

• Following the ITIL best practices encourages a cultural change towards providing service,
and supports the introduction of a quality management system based on the ISO-9000
series.

- 25 -
Material do Curso de ITIL
• ITIL provides a uniform frame of reference for internal communication, standardisation
and identification of procedures.

Potential disadvantages:

• The introduction can take a long time and significant effort, and requires a change of
culture in the organisation. An over ambitious introduction can lead to frustration because
objectives are never met.

• If process structures become an objective in themselves, the service quality may be


adversely affected. In that case, procedures become bureaucratic (obstacles that are
avoided where possible).

• There is no improvement due a lack of understanding about what processes should


provide, what the performance indicators are, and how processes can be controlled.

• Improvement in the provision of services and cost reductions are not visible.

• A successful implementation requires the involvement and commitment of personnel at all


levels in the organisation. Leaving the development of the process structures to a specialist
department may isolate that department in the organisation and it may set a direction that
is not accepted by other departments.

• If there is insufficient investment in support tools, the processes will not be done justice
and the service will not be improved. Additional resources and personnel may be needed if
the organisation is already overloaded by routine IT Service Management activities.

ITIL was obviously developed to capitalize on the advantages. It is appropriate to


recognise and acknowledged that there can be problems with an adoption of ITIL practices.
However, the ITIL Framework itself provides a lot of suggestions on recognizing and
therefore preventing such problems, or how to solve them should they occur.

Organisations

OGC (CCTA)

ITIL was originally a CCTA product. CCTA was the Central Computer and
Telecommunications Agency of the British government. On the 1st April 2001, the CCTA was

- 26 -
Material do Curso de ITIL
amalgamated with the OGC (Office of Government Commerce), which is now the new
"owner" of ITIL. The objective of the OGC is to help its customers in the British public sector
update their procurement activities and improve their services by making the best possible
use of IT and other instruments. ‘OGC aims to modernise procurement in government, and
deliver substantial value for money improvements.’ The OGC promotes the use of ‘best
practices’ in many areas (e.g. project management, procurement and IT Service
Management). The OGC publishes several series (libraries) of books written by British and
international experts from a range of companies and organisations.

Library consists of a number of clear and thorough ‘Codes of Practice’ to promote and
provide efficient and effective IT services.

ITSMF

The Information Technology Service Management Forum (ITSMF), originally known


as the Information Technology Infrastructure Management Forum (ITIMF), was set up in the
UK in 1991. The Dutch ITSMF (ITSMF Netherlands) was the next chapter, set up in
November 1993. In 2001 it had over 500 members organisations, both suppliers and user
groups. There are now ITSMF chapters in countries such as South Africa, Belgium,
Germany, Austria, Switzerland, the United States, and Australia, who participate in the
ITSMF International group.

The itSMF promotes the exchange of information and experiences that enable IT
organisations to improve the services they provide. It organises symposiums, congresses,
special subject evenings, and other events about current IT Service Management subjects.

Working parties also contribute to the development of the subject. The association
publishes a newsletter and operates a web site with information about its activities
(http://www.itsmf.com).

EXIN and ISEB

The Dutch foundation EXameninstituut voor INformatica (EXIN) and the UK


Information Systems Examination Board (ISEB) jointly developed a professional certification
system for ITIL. This was done in close cooperation with the OGC and ITSMF. EXIN and
ISEB are nonprofit organisations which cooperate to offer a full range of ITIL qualifications
at three levels:

• Foundation Certificate in IT Service Management

• Practitioner Certificate in IT Service Management

• Manager Certificate in IT Service Management

The certification system is based on the requirements for effectively fulfilling the
relevant role within an IT organisation. To date, certificates have been awarded to over
30,000 IT professionals in over 30 countries.

- 27 -
Material do Curso de ITIL
The Foundation Certificate is intended for all personnel who have to be aware of the
major tasks in the IT organisation, and the connections between them. After obtaining the
Foundation Certificate, the Practitioner and Manager exams can be taken. Practitioners are
trained to undertake specific ITIL processes or tasks in such processes, such as Incident
Management, Change Management and/or Service Level Management. Managers are
trained to be able to control these processes, to advise about the structure and optimisation
of the processes, and to implement them.

By now, ITIL represents much more than a series of useful books on IT Service
Management.

The framework of best practice in IT Service Management is promoted and further


developed by consultants, trainers and tool suppliers. Since the 1990s, ITIL has stood not
just for the framework, but also the approach and philosophy shared by those using ITIL
best practices in their work. A range of organisations are now cooperating internationally to
promote ITIL as the de facto standard in IT Service Management.

The ITIL community also allows for organisations involved to provide feedback so
that the reality of current best practice is quickly reflected and incorporated into the ITIL
theory.

Furthermore, extensions and alternatives have been developed, some of which may
be considered as IT Service Management methods in their own right. These alternatives
often address the needs of certain groups or organisations whose specific problems are not
adequately covered by ITIL.

The unique aspect of ITIL is that it offers a generic framework based on the practical
experience of a global infrastructure of professional users.

The ITIL Books

ITIL (IT Infrastructure Library)

ITIL is a series of books. As the name suggests it is a Library (IT Infrastructure


Library). This section will describe the various components of the library.

Each of the ITIL books addresses part of the overall ITIL framework. For the ITIL
purist we acknowledge that ITIL is a library of many books. This course is centred on the
Service Delivery and Service Support books. We use ITIL as the description of these two
books throughout the course.

ITIL defines the objectives and activities, and input and output of each of the
processes found in an IT organisation. However, ITIL does not give a specific description of
how these activities should be implemented, as this will be different in every organisation.
The emphasis is on an approach that has been proven in practice, but (depending on the
circumstances) may be implemented in a number of ways. ITIL is not a method, instead it
offers a framework for planning the most common processes, roles and activities, indicating
the links between them and what lines of communication are necessary.

ITIL is based on the need to supply high-quality services, with an emphasis on


customer service and relationships. The IT organisation has to fulfill "customer"
requirements, which means maintaining good relationships with them and associated
partners such as suppliers.

- 28 -
Material do Curso de ITIL
Part of the ITIL philosophy is based on quality systems, such the ISO-9000 series,
and Total Quality frameworks, such as that of the EFQM. ITIL supports such quality systems
with a clear description of the processes and best practices in IT Service Management. This
can significantly reduce the time required to obtain ISO certification.

Originally, ITIL consisted of a large number of sets of books, each of which described
a specific area of the maintenance and operation of IT infrastructure. Ten books describing
Service Support and Service Delivery were considered as the core of ITIL. There were
approximately 40 other books on complementary subjects related to IT Service
Management, from cabling to managing customer relationships. However, the original series
of books in the Infrastructure Library mostly approached IT Service Management from the
IT perspective.

The Business Perspective Set was introduced to bridge the divide between the
business and the IT organisation. Even so, certain aspects of ITIL still had a slightly dated
approach.

The "core" ITIL books have now been revised and published as two books, one on
Service Support, and one on Service Delivery. This has eliminated significant overlap and
occasional inconsistencies in the earlier series and has improved cohesion. They also
support the vision of IT Service Management more thoroughly.

The ITIL puzzle shows the main elements addressed by the ITIL books. Each of these
elements interfaces with the others, and overlaps them to some extent.

The elements are:

· The Business Perspective

· Service Delivery

· Service Support

· ICT Infrastructure Management

· Applications Management

. Planning to Implement Service Management

In this chapter, we will introduce the ITIL series of publications using the main
elements of the ITIL puzzle. By the end of 2002 the original set of books, each on a specific
aspect of IT Service Management, should have been replaced by six new ITIL books, as
have the books on Service Support and Service Delivery. However, many of the best
practices to be described in the new books are also included in the current ITIL series. For
more information www.itil.co.uk

Business Perspective

The ITIL books in the Business Perspective Set describe many issues related to
understanding and appreciating IT services as an integrated aspect of managing a business.

- 29 -
Material do Curso de ITIL
The Business Perspective Set, and the Business Perspective book, which will
eventually replace the set, addresses:

• Business Continuity Management

• Partnerships and outsourcing

• Surviving changes

• Adapting the business to radical changes

Other ITIL books address some of these topics, in addition to those in the Business
Perspective Set.

Managing Facilities Management

"Managing Facilities Management" addresses the management of contracts between the IT


organisation and Facilities Management companies. The Facilities Management suppliers
may be responsible for the operation of all or part of the IT infrastructure. However, the IT
organisation bears the ultimate responsibility for the services provided to the customer. This
book describes what measures the IT organisation can take to accept responsibility for
agreements about Service Levels and how to monitor the services provided by the facilities
suppliers.

Managing Supplier Relationships

To some extent, "Managing Supplier Relationships" is similar to Customer Relationship


Management, but now covering the relationship between the IT organisation and its
suppliers. A good relationship with suppliers is not just a matter of contractual agreements
and contacts. The primary concerns are business like forms of cooperation that contribute to
the current and future provision of IT services and fulfilling the objectives of the IT
organisation.

Relationships with suppliers can be characterised by the nature and content of the contacts.
These may be to discuss the long-term prospects of existing relationships, to promote
communication, or to investigate the range offered by various suppliers.

The major tasks of the Managing Supplier Relationships process include selecting suppliers,
assessing the performance of suppliers, and determining the way in which the IT
organisation handles supplier contracts.

- 30 -
Material do Curso de ITIL
Service Delivery

As indicated above, Service Support and Service Delivery are considered to be at the
heart of the ITIL framework for IT Service Management. The ITIL book on Service Delivery
describes the services the customer needs, and what is needed to provide these services.

The following subjects are addressed:

• Service Level Management

• Financial Management for IT Services

• Capacity Management

• Availability Management

• IT Service Continuity Management

• Security Management (with reference to the ITIL book on Security Management)

There is continual reference to how these areas also integrate the essential element
of Client Relationship Management.

The complex interrelationship between the processes described in the books on


Service Support and Service Delivery is almost impossible to show in a diagram. We will
briefly describe each of these areas now:

IT Customer Relationship Management

Most organisations appreciate the need to apply cohesion and structure to


relationships within the customer organisation at several levels. The IT Customer
Relationship Management activities involve several processes. The Service Desk is the first
point of contact for most "users". However, the "customer", who has commissioned and
paid for the service, will initially contact IT Customer Relationship Management. IT
Customer Relationship Management provides a bridge between the IT organisation, which
has traditionally taken a technical approach, and the customers who want to fulfill their
business objectives.

Service Level Management

The objective of Service Level Management is to make clear agreements with the
customer about the IT services required, and to implement these agreements.
Consequently, Service Level Management needs information about the customer needs,
facilities provided by the IT organisation, and the financial resources available.

Service Level Management addresses the service provided to the customer


(Customer Focus).

By analysing the information needs of the customer (Information Pull) rather than what is
technically feasible (Technology Push), the IT organisation can improve customer
satisfaction.

The chapter on Service Level Management in the Delivery book describes:

How, by clearly defining, a Service Level Agreement can optimise the IT


services at a cost that can be justified to the customer.

- 31 -
Material do Curso de ITIL
How the service can be monitored and discussed.

Underpinning Contracts support the service with sub-suppliers/sub-


contractors.

Financial Management for IT Services

Financial Management addresses the prudent provision of IT services. For example,


Financial Management provides information about the costs incurred while providing IT
services. This enables a proper consideration of costs and benefits (price and performance)
when deciding on changes to the IT infrastructure or IT services. The identification,
allocation, forecasting and monitoring of the costs, as discussed in the chapter on Financial
Management in the Service Delivery book, are all covered by the term ‘costing’. These
activities support cost awareness (what cost is incurred where?) and can also be used in
drawing up budgets. With respect to the revenue stream of the IT organisation, this ITIL
book describes various charging methods.

Capacity Management

Capacity Management is the process of optimising the deployment of IT resources, to


support the agreements made with the customer. Capacity Management addresses resource
management, performance management, demand management, modeling, capacity
planning, load management and application sizing. Capacity Management promotes
planning to ensure that the agreed Service Levels can also be fulfilled; now and in the
future.

Availability Management

Availability Management is the process of ensuring the appropriate deployment of resources


to support the availability of IT services agreed with the customer. Availability Management
addresses issues such as optimising maintenance, and design measures to minimise the
number of incidents.

IT Service Continuity Management

This process addresses the preparation and planning of disaster recovery measures for IT
services. Other common names are Contingency Planning and Disaster Recovery Planning.
The starting emphasis for IT Service Continuity Management is the requirement to
safeguard the continuity of the customer organisation in the event of a disaster (this means
that the IT organisation must be aware of the "Business Continuity Plan"). IT Service
Continuity Management is the process of planning and coordinating the technical, financial
and management resources needed to ensure continuity of service after a "disaster", as
agreed with the customer.

Security Management

The objective of Security Management is to protect the IT infrastructure against


unauthorised use (such as unauthorised access to data). This is based on security
requirements laid down in Service Level Agreements, contractual requirements, legislation,
and policy. When updating the Service Delivery part of ITIL it was decided that the recently
published book on Security Management did not have to be replaced. The ITIL book on
Service Delivery does not address security management directly but refers to the Security
Management book.

- 32 -
Material do Curso de ITIL

Service Support

The ITIL book on Service Support describes how a customer can get access to the
appropriate services to support their business.

This book covers the following subjects:

• Service Desk

• Incident Management

• Problem Management

• Configuration Management

• Change Management

• Release Management

Service Desk

The Service Desk is the initial point of contact with the IT organisation for users. Previously,
the ITIL books referred to it as the Help Desk. The major task of the Help Desk was
recording, resolving and monitoring problems. A Service Desk can have a broader role (for
example receiving Requests for Change) and it can carry out activities belonging to several
processes.

The new book on Service Support now distinguishes between the Service Desk (i.e. as a
function or organisational unit), and processes such as Incident Management,
Configuration Management and Change Management.

Incident Management

The distinction between "incidents" and "problems" is possibly one of the best-known
discussion points in the ITIL field. There are clear differences and by understanding both
processes the reasons become very clear.

Although the difference may be confusing there is a major advantage in that a distinction is
made between the rapid return of the service (the goal of incident management) and
identifying and remedying the cause of an incident (the goal of problem management)

- 33 -
Material do Curso de ITIL
Incident Management aims to resolve the incident and restore service quickly.

Incidents are recorded, and the quality of the incident records determines the effectiveness
of a number of other processes.

Problem Management

If a problem is suspected within the IT infrastructure, Problem Management aims to identify


the underlying cause. A problem may be when there are multiple occurring and seemingly
related incidents. The intention of problem management is to eliminate these re-occurring
incidents.

Once the cause of a series of re-occurring incidents has been identified (Known Errors), a
business decision is taken whether to make permanent improvements to the infrastructure
to prevent new incidents. Submitting a Request for Change makes this improvement.

By creating the Incident Management process in the Service Support book, Problem
Management is neatly split off and is not a part of solving incidents.

Note that your end users may still refer to what they experience as a "problem". It may not be
appropriate to educate your users that what they are experiencing is in fact an "incident". This is
a classic example of when the framework needs to be interpreted sensibly.

Configuration Management

Configuration Management addresses the control of a changing IT infrastructure


(standardisation and status monitoring), identifying configuration items (inventory, mutual
links, verification and registration), collecting and managing documentation about the IT
infrastructure and providing information about the IT infrastructure to all other processes.

Change Management

Change Management addresses the controlled implementation of changes to the IT


infrastructure. The objective of the process is to determine the required changes, and how
they can be implemented with a minimum adverse impact on the IT services, by effective
consultation and coordination throughout the organisation. Changes are made in
consultation with the status monitoring activities of Configuration Management, the
customer organisation, Problem Management and several other processes. Changes are
implemented by following a path of definition, planning, building and testing, accepting,
implementing and evaluating.

Release Management

The actual implementation of changes is often carried out through Release Management
activities. Both hardware and software (central processing, data communications and
clients) changes are often planned on the basis of releases. The main objective of Release
Management is to control the distribution of hardware and software, including integration,
testing and storage.

Release Management ensures that only tested and correct versions of authorised software
and hardware are provided. Release Management is closely related to Configuration
Management and Change Management activities.

- 34 -
Material do Curso de ITIL
IT Infrastructure Management

Eventually, technical operational management processes will be addressed in a new


ITIL book on IT Infrastructure Management. This book will cover:

• Network Service Management

• Operations Management

• Management of Local Processors

• Computer Installation and Acceptance

• Systems Management

IT Infrastructure Management also includes Environmental Management.

Network Services Management

The Network Services Management process addresses planning and controlling


communications networks. These include telephone systems, LAN and WAN
networks.

The ITIL module for Network Services Management also addresses the long-term
communications needs of the organisation. In essence, it describes how the ITIL best
practices can be applied in a network environment.

Operations Management

Computer Operations Management (Computer Operations) addresses the


management of computer hardware and systems software, including mainframes
and midrange systems, but also file servers, to ensure that the agreed Service
Levels are provided. The ITIL book of the same title concentrates on production
tasks in an environment of large computer systems.

Management of Local Processors

The Management of Local Processors process addresses management operations at


decentralised sites. The objective is to support the provision of IT services at the
user site. This specifically includes making agreements about the activities of various
processes (especially the processes to support IT services) when IT services are
provided at multiple locations. A good definition of responsibilities is important to
optimise the service.

Computer Installation and Acceptance

Computer Installation and Acceptance primarily concerns guidelines for planning the
acceptance, installation and eventual removal of large computer hardware in the IT
infrastructure. These guidelines are a development/extension of the activities in the
Change Management and Release Management processes.

- 35 -
Material do Curso de ITIL
Systems Management

To date, the ITIL Books have not covered Systems Management. In future a new
book on IT Infrastructure Management will cover it.

Environmental Management

Environmental Management concerns managing the environment of the IT


infrastructure (power supply, cooling, etc.). One of the tasks of this process is to set
up and maintain climate controlled computer and network rooms.

Applications Management

The ITIL book on Applications Management will address the relationship between
management and the software lifecycle. This includes issues such as Software Lifecycle
Support and testing IT services. A major issue in Applications Management is effectively
responding to changes in the business. Clearly defining the requirements and implementing
a solution that meets the needs of the customer organisation is paramount.

Software Lifecycle Support

Software Lifecycle Support aims to define the approach for supporting the entire
software lifecycle, in consultation with those responsible for software development.
The way in which software is designed, built, tested, introduced, operated,
maintained, and eventually decommissioned, is extremely important in IT services.
In every stage of the software lifecycle, there have to be agreements between those
developing and those operating the IT infrastructure. The selection of Software
Lifecycle models can have a significant impact on the IT services.

Testing an IT Service for Operational Use

The objective of testing an IT Service for Operational Use is to ensure that the
proper operation of new or modified IT services is tested before they enter
operations. A system test, installation test and acceptance test are undertaken to
determine if the developed application works, is correctly installed, interfaces with
the rest of the IT infrastructure, and offers the "users" the functions agreed with the
"customer".

Management and Organisation

The ITIL series also includes some books on subjects at the strategic level, the
Managers Set.

Developing policies and long-term planning of IT services are specifically addressed


in the books on Quality Management, IT Service Organisation and Planning and Control for
IT Services.

Quality Management for IT Services

Quality Management for IT Services addresses setting up and maintaining a coherent


quality system, based on the IT Service Management processes described in other
ITIL books. This book describes the introduction of a quality management system

- 36 -
Material do Curso de ITIL
(based on the ISO-9000 series of standards) in an IT organisation, and the
evaluation of an existing quality management system. The relationship between the
ISO standards and ITIL modules is also identified.

Quality Management activities include defining and implementing the quality policy
and managing the quality system, including audits.

IT Services Organisation

IT Services Organisation addresses the structure of the IT organisation. This ITIL


book describes how the organisation can be analysed and assessed, particularly in
terms of tasks, authority and responsibility. A framework is provided for dealing with
organisational changes, based on the process descriptions in the other ITIL books.
Major activities in this process include determining and defining the organisational
structure and role and function descriptions.

Planning and Control for IT Services

Planning and Control for IT Services aims to provide a coherent system of planning,
reporting and control for the IT organisation, to ensure that the organisation fulfils
the objectives and requirements based on the business strategy and the strategy of
the IT organisation. This includes coordinating the planning and reporting of the
various IT Service Management processes (for example in the form of annual plans
and quarterly reports).

Planning and Implementation

There is now much experience throughout the world with planning and implementing
programmes to optimise IT Service Management. A recent ITIL book is devoted to this
subject.

In essence, the concept of planning and implementing changes in IT Service


Management processes is shown in the process improvement model. In practice, the
situation illustrated by this model is often obscured by the way in which important decisions
are taken in organisations, which may be affected by historical and political issues. It is
therefore necessary for management to commit to the improvement programme
(Management Commitment), and for them to understand the organisational culture. You
should also be aware that there will generally already be processes that meet the needs of
the organisation, albeit only partly.

Lack of commitment will create resistance from the very people needed to align
these processes with the business needs. And alignment is at the very heart of benefits
gained in a process driven approach for IT Service Management.

- 37 -
Material do Curso de ITIL
Analysing the needs of the organisation and implementing the required solution could
require the creation of a temporary organisation. This could be considered as a one project,
or as a series of projects in an improvement programme. One advantage is that it will
provide the organisation with clear decision points where it can decide to terminate,
continue, or modify the project. In this context, the ITIL books recommend the adoption of
PRINCE2 (Projects IN Controlled Environments) as a Project Management methodology.

Each project is based on an analysis of the current situation, the desired situation,
and the path in between. In most cases, the alternatives will be compared on the basis of:

• Advantages to the organisation

• Risks, obstacles and potential problems

• Transition costs and long-term costs

• Costs of continuing the current approach

Identifying the potential alternatives may well be a project in itself.

You should be aware that ITIL is no magic formula. Do not expect miracles. You
should be particularly wary of so-called ITIL implementation projects that have a hidden
agenda, such as a reorganisation or merger. ITIL describes the best practice for improving
IT Service Management; it is not an organisational handbook. ITIL primarily provides a
frame of reference for process structures in the IT organisation and, to a much lesser
extent, a guideline for the structure of that organisation. If a project aims to improve the IT
organisation along these lines, then it is wise to seek out experts in this field (a good
starting point is outside consultants who are certified IT Service Managers (according to the
certification requirements laid down by Exin or the ISEB).

A baseline measurement or health check can provide a good start for process
improvements. Such an assessment of the IT Service Management processes can help
identify the strengths and weaknesses of the organisation, and define clear objectives for an
improvement project.

After some time the measurement can be repeated to show the progress of the
project or programme.

Service Desk

Introduction

Here is a familiar situation.....

You have just started a complicated job, which requires all your concentration. The
phone rings....Someone is facing computer difficulty!!! The printer is not working. You solve
the issue and just when you are back into the job …

Someone walks into your office asking when his or her expected upgrade will be done.

1 hour later you still haven’t started your job…..

- 38 -
Material do Curso de ITIL
Wouldn’t it be great if you could complete this job without interruption?

It is the role of the Service Desk to act as the single contact point between the
customer and the IT Service Provider.

They will handle all incoming calls and only direct them through to the second or
third level support when necessary. For the customer the advantage is that they don’t have
to ring around, before finding the right person to solve their problem and for IT personnel it
means that they only have to deal with issues that are related to their skills or area of
responsibility.

Objective

The Service Desk offers "first line" support to users. Users need help if they are not
sure how to behave in a specific situation when using IT services or when they need
assistance to solve a particular issue involving IT.

As well, the Service Desk is the central point of contact where incidents or
inaccuracies in IT systems can be reported. The Service Desk is the face of the IT
department to the clients. Furthermore, the Service Desk is an important source of
management information.

Objectives of the Service Desk:

• To provide a single point of contact for Customers

• To facilitate the restoration of normal operation service with minimal business impact on the
Customer within agreed service levels and business priorities

Process Description

The Service Desk is not regarded as a process within ITIL but as a function.

As IT has become a greater part of business over the years the role of the Service Desk has
become crucial. Businesses relies on there IT service to stay on top of the market and be
competitive. The service provided by the Service Desk tends to be broader then just the IT
part of business hence the change in name from Helpdesk (which was more IT related) into
Service Desk.

It plays a vital role in IT Service management as from a customer point of view the service
desk is the IT Service Provider and therefore plays a critical part in how the customers
perceives the IT organisation as a whole.

Among the activities performed by the Service Desk are Incident recording and Incident
Control. This used to be part of the Helpdesk Process but is now included in the process
called Incident Management (covered in a later module).

Activities
The Service Desk has a number of primary responsibilities. These are:

- 39 -
Material do Curso de ITIL
• To provide a single point of contact for the customers;
• To facilitate the restoration of normal operational service (with minimal business
impact on the Customer) to the agreed service levels and according to the business
priorities.

Activities

1. Keep users informed by....

2. Providing information, in the form of:

• The status of their incident

• Planned changes in IT Service

• Likely disruptions in the IT Service

• Any changes or additions in the services that are provided


or the service levels.

The obvious benefits in proactively providing service information is that:

If the customers know before hand that a specific service (e.g.


email) will be unavailable during the lunch hours you (a)
reduce the amount of calls being received but also (b) reduce
the impact of the disruption. The end result will be fewer angry
or annoyed customers.

3. Provide management information

By logging all calls the Service desk can provide information to


Management about, the amount off calls per category, the
amount of calls as a result of a change etc. But also in case of a
disruption in the IT Service they are likely to be the first to
know. This makes the Service Desk an excellent First Point of
contact for users, customers and management alike.

The objective is to produce reports from which management can make decisions
and measure performance based on agreed service levels and deliverables.

4. Conduct customer satisfaction analysis and surveys

5. Recording and controlling of incidents

Incident control

The Service Desk is responsible for recording all incidents and then controlling them. The
Service desk can use different ways in recording the incidents:

• Phone
• E-mail
• Internet
• Fax
• Personal visit

- 40 -
Material do Curso de ITIL
By making use of different ways of recording incidents and even automating the solution
then the workload of the service desk will be reduced and by association so will the costs.

Think about how much time it costs to reset a password for a user and how often that is
required. If by sending an email a set of actions would be started including: creating the
incident, resetting the password, informing the customer and closing the incident a great
deal of time could be saved.

Roles

The new Service Desk tends to be more then the just the place to lodge calls related to IT.
It has a role to provide and improve the service to the business in general. The changing
role is that the Service Desk is a more customer focused, whereas the traditional Help Desk
tended to be more technical in nature.

As there are different types of Service Desk models the skills required by the Service Desk
staff also must be carefully analysed.

Interpersonal skills are one of the more important ones. Technical skills become more
important when the Service Desk becomes more skilled and aims to solve most of the
incidents without rerouting them to higher levels of support.

Relationships
Being the single point of contact for IT Service, the Service Desk has a link with all
processes within ITIL. With some processes the link is a clearer than others.

The Service Desk is, in fact, an operational aspect of the important process of Incident
Management, e.g. incident control. The Service Desk registers and "controls" Incidents.

Incidents can be related to Configuration Items. If this link is supported by software, a


powerful aid in mapping/identifying weak links in the IT infrastructure evolves.

This allows the Service Desk staff the to quickly solve incidents by searching on a
Configuration Item, category and/or error code and applying a previously used solution.
- 41 -
Material do Curso de ITIL
Note: A Configuration Item (or C.I.) is discussed in the Configuration Management process
section. A C.I. is an item that we want to store information about.

In some cases the Service desk does some minor changes and so has a link with Change
Management and Release Management.

The link between the Service Desk and Service Level Management can be illustrated
as a result of the Service Desk monitoring Incident levels and reporting whether the IT
service is restored within the limits defined in Service Level Agreements (SLA's). Service
Desk will report to Service Level Management if IT Service is not restored within time
frames and escalation procedures are properly defined and adhered to.

Benefits
The benefits from a properly implemented Service Desk flow across Users, Customers, IT
Staff and the business as a whole.

Note: The difference between a Customer and a User should be explained. A Customer is the person who may often
be the representative of the business for the service provided and/or the person who funds the service. The user is
the ultimate end user of the service provided.

Benefits for the Customer

• Easily defined metrics for measuring performance

Benefits for Users

- 42 -
Material do Curso de ITIL
• Single point for all queries
• Better informed
• Quicker turn around of request, queries and incidents

Benefits for IT staff

• Being able to focus more on the job


• Greater efficiency
• Better use of the skills the staff has resulting in motivated personnel
• Improved team work

Benefits for the business

• Source of useful management information


• Internal cost savings and productivity efficiencies
• Meet customers business support requirements with responsiveness at all times
when and wherever it is needed
• Better use of available resources

Summary

An effective Service Desk will deliver overall cost reduction and increases in staff
morale, service reliability and identification of business opportunities. All this leads to
increases in Customer satisfaction ratings, with the associated improvement in perception
this brings.

Common Problems
There is no doubt in denying that along with any move towards improvement there will
be problems and barriers to success. Recognising this in advance goes a long way to solving
the problem when (not "if") it comes up.

• Users do not call the Service Desk, but try to go around it to the person they know,
the one who helped them so well the last time.

- 43 -
Material do Curso de ITIL
The Service Desk needs to be easily accessible, easy to
remember phone number, out of office process established,
after hours process established, low waiting times and different
ways of communicating/interfacing. Processes for dealing with
different levels of staff within the organisation (eg. creating a
group of "Critical Users") will also ensure that Service Desk
staff realistically deal with those in highly critical roles as a top
priority.

All Customers must be redirected to the Service Desk if they


try to contact someone directly. This can be done politely and
does not have to be used as a threat (eg. "if you don't contact
the Service Desk, we won't help you" versus "if you can contact
the Service Desk it will mean that we properly track and fix
your problem").

Users who wish to circumvent the proper procedure will be annoyed and cause
disruption. However, this short term problem should be ridden out, rather than
"giving in". In time, all users will become accustomed to change and eventually
start to accept and see the benefits (refer to SD Benefits).

• Not aware what the needs of the business and/or users are.

If the Service provided by the Service Desk (IT Service


Provider) is not the one needed by the business or the user
then it matters little that the service is perfect.

If a business is only operating between 9


am and 4 pm, having a Service Desk that’s is
open 24 hours a day, is not very useful and
might result in under staffing of the Service Desk
during the business hours.

• Not all parties involved are informed about the Service provided and the Service
Levels agreed upon, resulting in unrealistic expectations.

This is a simple case of communication and making sure that


that all procedures, Service levels etc are well documented and
available to all parties involved. Also periodically revisiting and
re-educating involved staff, BEFORE issues arise.

This is not to say that staff will use this information against users who require
service, it simply means that users approach the Service Desk with realistic
expectations. Naturally, everyone's problem is critical when it happens - when a
user is irate or stressed it is not appropriate to point out that the agreed service
levels allow for a 48 hour response. This highlights the people skills that Service
Desk staff need to have.

A well-marketed Service Desk is only half the job.


Involve key customers in the process of implementing the Service Desk and reap the
rewards from having their support in times of crisis.

- 44 -
Material do Curso de ITIL

Metrics
Metrics are essential in monitoring any IT Service provided. The Service Desk as a
service for users is no different in this regard.

Day to day reports can provide information on Calls and Incidents. For instance;

• How many and what kinds of incidents (classifications) the Service Desk solves at
first point of call.
• How long calls last, how many there are and how long the waiting time is before a
call is answered. This information can be extracted from appropriate tools or from
PABX records.

If standards are set before the Service Desk starts operating one can monitor the
progress of the Service Desk. The crucial factor is in defining what it is that should be
measured. It is realistic to start with a very simple set of metrics and possibly this is a
better approach as it means that there is no time lost in creating a long series of reports
that add no value to a customer.

The easiest way to begin to define what metrics are required is to look to the Service Level Agreements
(SLA's) that should define the response times, etc. for the Service Desk from the Customer perspective.

However, even if all Service Levels are met the most important measurement for any
Service organisation is the perception of the Customers of the service provided. Therefore
Customer satisfaction should be measured regularly.

Service Desk Structure - Best Practice

Structure of a Service Desk

A Service desk can be structured in one of three ways:

• The Local Service Desk


• Centralised Service Desk
• Virtual Service Desk

The "hybrid" model is also a genuine Service Desk structure that uses a combination of
two or more Service Desk structures.

Local Service Desk

Very "visible" to the organisation. The Service Desk is most probably in the same
building or locality as the users of the IT Services. The advantage of this concept is the fact
that Service Desk staff are very well versed with the local situation and local conditions.

However, be aware of the fact that, if the organisation is spread out over various
locations with their own local service desks (ie multiple "local"), a high standard of process
adherence should be apparent. All Service Desk staff should follow the same processes and
procedures to prevent differences between the different Service Desk operations.

- 45 -
Material do Curso de ITIL

Centralised Service Desk

A centralised Service Desk is a physical point in one location. All users from the different
sites contact this one Service Desk.

- 46 -
Material do Curso de ITIL
This model leads to a reduction in operational costs, easier management of the IT Service
and better use of Resources.

Virtual Service Desk

Due to advanced network and telecom technologies it is now possible to have a


Service Desk that has no physical location as far as the user is concerned. It might be
staffed in different locations at different times during a day resulting in a 24 hour Service
Desk.

The issue to consider is the need for a physical engineer at the various locations to
solve local incidents. Also time differences have to be taken in consideration when setting
up Service Level Agreements.

- 47 -
Material do Curso de ITIL

Virtual Service Desk

Hybrid models combine two or more of these particular structures into a customised
solution for a particular organisation. This is a genuine structure as the ITIL Framework
provides guidelines only for structure and is not a prescriptive solution book.

Interesting websites:

 http://openview.hp.com/products/servicedesk/
 http://www.interpromusa.com/hdicerti.htm
 http://www.interpromusa.com/The Integrated Service Desk.pdf
 http://www.itilworld.com/n-america/service-support_helpdesk.htm
• http://www.itil-service-support-management.com/Pages/Service support/Service
Desk/Service_Desk_scope.htm
 http://www.itil.co.uk/online_ordering/serv_supp_graphs/serv_desk.htm

Essential Terms
Escalation:
When the time limit for resolving an incident has passed, the incident escalates into a
problem (depending on the priority and impact of the incident) and a different level of
support (Problem Management) comes into force and this:

• Edits the problem if necessary


• Determines the impact on the service delivery and with that, the priority. The
Service Desk continually informs clients about the progress of their calls.

- 48 -
Material do Curso de ITIL
Routing:
An incident is deposited at the second line support because no specialist knowledge for the
solution is available at the Service Desk

Incident:
An incident is every operational event that is not part of the standard operation of an IT
service. An incident influences the service delivery, although it can be small and in some
cases even transparent (not noticeable) for the user.

Problem:
A problem is the as yet unknown cause of the occurrence of one or more incidents.

Known error:

This is the situation where a successful diagnosis of a problem has shown what the cause is
and which CI is at fault. A possible solution may also be found as to how the problem can be
avoided.

Expert or Super user:

Some organisations may use “expert” users to solve some first line support queries,
depending on the structure of the organisation. This can solve some short term people
resource issues.

Call
Each time the user contacts the service desk.

Incident Management

Introduction
The Incident Management process contains activities that are aimed at restoring an
IT service following a disruption. The Service Desk is usually the owner for this process
however all support groups across an IT organisation will play their part.

Disruption of an IT service, questions about the functionality of an application or


requests for advice are all regarded as Incidents that are dealt with by this process.

Requests for Change are handled in a similar way as Incidents so they can also fall
under Incident Management. A business may decide however to describe the handling of
RFC’s in a special procedure in order to keep the Incidents and RFC’s separated.

Note: An RFC is a Request for Change and will be dealt with in the Change Management
process area. An RFC is the "trigger" that begins the Change Management process.

- 49 -
Material do Curso de ITIL

Objective
The objective of Incident Management is to restore normal operations as quickly as
possible with the least possible impact on either the business or the user, and at a cost-
effective price.

The definition of how quickly is quickly should not subject to interpretation. The
timeframes for Incident resolution should be defined in the Service Level Agreements
(SLAs) that exist between the IT Department and the customer.

The speed of resolution will affect the cost. It is this cost-to-speed ratio that is often
forgotten when a user faces problems. Issues that are low priority during negotiations are
"somehow" escalated to the status of requiring high levels of attention when the issue
occurs.

Often support staff will simply respond to user pressure in such situations and
immediately the expectation is adjusted and anything less than immediate response to this
otherwise low priority issue is considered as poor service (the IT Support dilemma!).

Process Description
As with every process there is an Input and an Output.

The main input to this process are incidents. As shown in below Incidents can come
from many sources like users, management Information or infrastructure monitoring tools.

The Input for Incident Management mostly comes from users, but can have other
sources as well like management Information or Detection Systems.

The outputs of the process are RFC’s, resolved and closed Incidents, management
information and communication to the customer.

This concept is illustrated in the following diagram. The centre diamond shows the
activities of Incident Management.

- 50 -
Material do Curso de ITIL

Activities
The activities included in Incident Management are:

• Incident detection and recording


• Classification and initial support
• Investigation and diagnosis
• Resolution and recovery
• Incident closure Incident ownership, monitoring, tracking and communication

Incident detection and recording

Throughout an Incident lifecycle specialist IT groups will handle the incident at


different stages. To do this efficiently and effectively a formal approach is required, which
will facilitate the timely restoration of service following an incident.

As shown incidents come from many sources. The Service Desk (more commonly
known as a Help Desk) is the primary point for recording incidents, although other IT staff
can play this role as well. The Service Desk is the single point of contact between service
providers and users, or their representatives, on a day-to-day basis and typically the owner
of the Incident Management process.

Incident tracking is highly recommended. Information about incidents should be held


in the same Service Management tool as problem, known error and change records. Records
should be cross-linked to eliminate the need for re-keying data. This improves information
interfaces and makes data interrogation and reporting far easier.

Incident priorities and escalation procedures need to be agreed as part of the Service
Level Management process and documented in SLAs.

- 51 -
Material do Curso de ITIL

Classification and initial support

Incidents should be classified according to three criteria (Priority, Impact & Urgency).

Priority
One of the important aspects of managing an Incident is to define its priority. How
important is it and what is the impact on the business? The responsibility for this definition
lies with the Service Level Management process. The priority with which Incidents need to
be resolved, and therefore the amount of effort put into the resolution of and recovery from
Incidents, will depend upon:

o The impact on the business


o The urgency to the business
o The size, scope and complexity of the Incident
o The resources availability for coping in the meantime and for correcting the
fault.

Impact
'Impact' is a measure of the business criticality of an Incident or Problem. Often this
equates to the extent to which an Incident can lead to degradation of agreed service levels.
Impact is often measured by the number of people or systems affected. Criteria for
assigning impact should be set up in consultation with the business managers and
formalised in SLAs.

When determining impact, information in the Configuration Management Database (CMDB)


should be assessed to detect how many users will suffer as a result of the technical failure
of, for example, a hardware component. The Service Desk should have access to tools that
enable it rapidly to:

o Assess the impact on users of significant equipment failures


o Identify users affected by equipment failure
o Establish contact to make them aware of the issue
o Give a prognosis
o Alert second-line (specialist) support groups, if appropriate

Urgency
'Urgency' is about the necessary speed in solving an Incident of a certain impact. A high-
impact Incident does not, by default, have to be solved immediately. For example a User
having operational difficulties with his workstation (impact 'high') can have the fault
registered with urgency 'low' if he is leaving the office for a fortnight's holiday directly after
reporting the Incident.

Urgency is seen as to what degree the service is affected (stopped, partially affected,
functionally changed). If a user calls with an Incident and they can’t work (service stopped)
then it is of greater urgency than a user calling to request a functionality change.

Investigation and diagnosis

Once logged the activity of investigation and diagnosis will take place. If the Service
Desk can’t solve an Incident it will be assigned to other support levels. They will then
investigate the Incident using the available skills sets and tools such as a knowledge base of
Known errors etc, and diagnose the problem. It is important that all parties that work on
the Incident keep record of their actions by updating the Incident record.

- 52 -
Material do Curso de ITIL

Resolution and recovery

Once a "work-around" or a solution to the incident is found it will be implemented. If


a change is needed an RFC will be submitted to Change Management.

Incident closure

For the Incident Management process to be effective it is necessary that the Incidents
closure be done properly. This step includes:

o Updating Incident details


o Communication with the user about solution

To ensure the solution provided meets the user needs they are the only person that
can give the authority to close an Incident. The Incident record in the Service Desk tool
should be ‘closed’ so that accurate reporting can be carried out.

An Incident will be closed as soon as the agreed service is restored.

In some cases the Incident record is closed but a Problem record is still open (Refer
to Problem Management for more information about a Problem record).

Incident ownership, monitoring, tracking and communication

Whilst an Incident may be passed across different IT groups during investigation and
diagnosis the Service Desk remain the owner of the Incident (in terms of tracking through
to closure). They will monitor the progress of the Incident in light of service levels and
maintain/manage communication with the user. If the Incident is not progressing
appropriately then the Service Desk may trigger either a functional or hierarchical
escalation. These different types of escalation are covered in the Best Practices section.

Roles
The role of Incident Manager in most organisations is assigned to the Service Desk
Manager.

The Incident Manager role includes responsibility for:

• Monitoring the effectiveness and efficiency of the process


• Controlling the work of the support groups
• Making recommendations for improvement
• Developing and maintaining the Incident Management system
• Reporting to management and other process areas

Support roles:

- 53 -
Material do Curso de ITIL
First line support will be done by the Service Desk and includes the recording, classifying,
matching, routing, resolving and closing incidents.

Second and third level support is responsible for in investigation, diagnosis, and
recovery from incidents.

Relationships
Incident Management has a close relationship with other ITIL processes. Some of
these inter-process relationships are described here.

Configuration management:

Every Incident is connected to a Configuration Item (C.I.) stored in the CMDB. An


incident will typically involve more than one C.I.

The CMDB provides information about CI’s and the parent/child relationships
between them. This helps to determine the cause, solution and routing of an incident by
tracing a fault back through the C.I. relationships. For example, if a user cannot access the
Internet, by looking back through the parent/child relationships of that users PC could find
that a Hub that the user connects to (parent of the child PC) is a potential C.I. that should
be investigated.

Problem Management

Incidents with unknown causes are routed to Problem Management where they are
processed.
Known Errors, Work-arounds, Quick Fixes is given to Incident Management by
Problem Management.

Change Management

This process can be the cause of Incidents if a Change is not implemented correctly.
Therefore it is very important that Incident Management knows all planned changes so they
can relate Incidents to a change and notify the Change Management process so that roll-
back plans can be implemented if necessary.
On the other hand some Incidents will be solved by a Change, as will be the case when
faulty equipment is replaced.

Service Delivery Processes

Incident Management provides and gets information from all the Service Delivery
processes. Service Level Management, for example, is responsible for establishing service
levels that relate to work done within the Incident Management process. The Service Desk
will then report against these service levels.

- 54 -
Material do Curso de ITIL

Benefits
A well implemented Incident Management process will have easily visible benefits.
Unlike some other ITIL processes where benefits may be hard for end users to identify, the
benefits of good incident management will be felt by them directly.

For customers

• Quick restoration of Service following an Incident


• Incidents are not lost or forgotten
• Up to date status of their Incident provided

For IT Organisation

• Remove the problem of duplication of effort (once an Incident is solved the


resolution will be easily found and can be applied to future incidents if the re-occur
or the resolution can be a starting point for a different but related incident).
• Clear view of the status and priorities of the Incidents
• Possibility to measure performance against SLA’s.
• Higher user and customer satisfaction

For the business

• Prioritisation - the high impact, high urgency, incidents are the ones that jump to the
front of the queue. Resulting in the least possible impact on the business activities.
• Quicker resolution of Incidents leading (productivity gains).
• Management information is provided.

Defining benefits is relatively easy. Realising benefits is difficult as during times of


incident a lot of end users will not want to be convinced that their incident is not a high

- 55 -
Material do Curso de ITIL
impact/high priority task and that there are other incidents demanding attention ahead of
them.

This is where the communication skill of IT Staff must be at it's highest (and most
tactful). Carefully selecting the words used to convey this message can be learnt. For
instance acknowledging the frustration they are facing and providing a very brief overview
of the things ahead of them in the queue. This way the person can (hopefully) understand
that there are more pressing issues ahead of theirs. Not dismissing their call as
"unimportant" or "I'm busy with other people" or "You'll have to wait".

Common Problems
We know there are many benefits of a good incident management process. Likewise,
there can be some real "show stoppers". The following major obstacles if not dealt with will
mean the process will be inefficient and ultimately unsuccessful.

Critical Success factors for successful Incident Management:

• A CMDB needs to be set up before Incident Management is implemented. This makes


the determination of impact and urgency a lot faster. The CMDB will ideally be an
electronic system, but it can be a manual system.

Note: The CMDB is the Configuration Management Data Base. The CMDB is
covered in the Configuration Management process chapter. The CMDB holds
information about C.I.'s (Configuration Items).

• A knowledge database. This database will hold Known errors, work arounds and
resolutions. This will help Incidents to be resolved much faster and with less effort.

• An Incident Management tool to record and monitor Incidents easily. (Preferably this
tool is part of a complete Service Management tool that integrates the tools from all
processes).

The challenge in the implementation of these tools and databases is not to let the work
of setting up the system stand in the way of making progress.

Any ITIL process can be started in a very simple form. The biggest challenge facing
IT professionals is that it takes "discipline" to use the tools and procedures. The sooner
the discipline of logging information, searching for solutions rather than re-working
solutions can begin, the better.

If people start to use the tools and start to see benefits in doing so, then so the
proper "habits" are formed. It is then a relatively easy task to modify behaviours to use a
different tool or introduce new features/functionality as tool development or tool selection
progresses.

Metrics
Many metrics can be obtained from this process, some of the more notable and useful are:

- 56 -
Material do Curso de ITIL
Number of Incidents per time period
Number of Incidents per category
Number of Incidents per priority level
Incident resolution performance against service levels
Number of closed Incidents per time period

Best practice
Incident Management tools:

There are many Service Management tools on the market that now align and provide functionality to support ITIL
processes. These tools have many features, which assist in automating the process such as:

• Quick Call Logging (one click to log a call)


• Auto population of data
• Automated alerts from infrastructure devices and applications that automatically
generate an Incident record
• Advanced knowledge bases
• Customisable reporting

Different types of escalation

In a functional escalation environment, the physical escalation of an incident usually takes


place because of either a lack of expertise at a specific level or due to service levels being
breached.

Hierarchical escalation occurs usually more proactively (e.g. when the service desk
identifies early that there is the likelihood of a breach and escalates manually rather than
waiting for the time lapse).

Incident life Cycle

The following diagram shows the activities throughout the Incident Management
process and the status that each activity can be set at. Throughout the activities the
continual issue surrounding ownership, monitoring and tracking must also be considered.

- 57 -
Material do Curso de ITIL

Interesting Websites

• http://www.helpdeskinst.com/publications/practices.asp
• http://www.itil-service-support-management.com/Pages/Service support/Incident
management/Incident_mgmt.htm
• http://www1.worldcom.com/au/resources/whitepapers/pdf/WorldCom_White_Paper_
On_eCRM.pdf
• http://www.itil.co.uk/online_ordering/serv_supp_graphs/incident_mngt.htm
• http://tools2manage-it.com/serv_mgt.php

Essential Terms
Incident

"Any event that deviates from the (expected) standard operation of a system."
An incident is often simply a user requesting help for something that is not working. For
example “I can’t see my network drive”, “I can’t access the Internet”, “I can’t send email”.
It is any situation where something does not work and the specific details are not known.

Work around
It is possible for Problem Management to identify “work-around” in the investigation of
problems. These should be made known to Incident Management so that they can be
passed to the user until the permanent fix is implemented.

- 58 -
Material do Curso de ITIL

Problem Management
Introduction
Problems have a tendancy to always happen !!. No matter how well things are
running. Even with the most reliable IT, the service delivery will be troubled by disruptions
that cannot always be avoided.
We have learnt that an incident is a deviation from standard operation. This means
that users can face many incidents and a lot of the time they will face the same incident
many times.
A user calls with an "incident" - the Service Desk captures the call and gives great
Incident Management support : "re-boot your PC and see if that fixes it". It does. The user
is happy. The next day the same user calls with the same incident, with the same great
incident support. "Re-boot your PC". On the third day the user does not call again, they just
re-boot their PC and start to live with the issue. Then they start to tell other users - just re-
boot your PC that'll fix it. All of a sudden we have a plague of PC re-booting users !!!

So how do we avoid the plague? By introducing Problem Management. The first


incident that was fixed by re-booting the PC should have been passed to Problem
Management.

An example where Problem Management can make a difference:


In an organisation a user calls the Service Desk with the complaint that his
document is not printing. The Service Desk investigates the incident and sees that the print
queue has the status ‘On Hold’. The Service Desk releases the queue, the document is
printed and the Incident closed. A few minutes later another users calls the Service Desk …
Their document is not printing .. As this is a different person answering the phone he
investigates the Incident and sees that the queue is on Hold, releases the queue and the
incident is closed..

In the mean time users print their documents over and over again as they think
they’ve done something wrong. The next day users still call with the same problem, the
document still not printing … The Service Desk releases the queue when applicable, the
document is printed and Incident is closed.

If Problem Management were in place a problem would have been identified and
recorded. The "Known Error" related to this problem would be found in the configuration of
the Printer. The solution, to reconfigure the printer so the queue is automatically released,
would be found and implemented. The stream of Incidents regarding this printer would
cease.

The releasing of the queue by the Service Desk would be used as a workaround to
restore the IT service in the event of the printer facing a similar issue in the future.

Objective
The objective of Problem Management is to minimise the total impact of problems on the
organisation. Problem Management plays an important role in the detection and repair of
problems to prevent their reoccurrence.

The following slide says this in a different way but also introduces the crucial element of
proactive problem management.

- 59 -
Material do Curso de ITIL

Process Description

The Problem Management process is focused on finding weaknesses in the IT


infrastructure and through the use of Change Management removing them so that future
disruptions do not occur.

The process focuses on finding patterns between incidents, problems and known errors.
These three areas are key things to understand in this "root cause analysis". The basic principle is
starting with many possibilities and narrowing down to a final root cause.

Note: "Root Cause analysis" is often used interchangeably with Problem Management.
The ITIL Framework doesn't prescribe what a process area should be called and Root
Cause Analysis is fine. However, Root Cause Analysis is typically a reactionary exercise.
ITIL's Problem Management caters for reactive work, but more importantly recognises
the value of proactive problem management. We use Root cause analysis
interchangeably with Problem Management.

Incidents:

An incident is defined as a deviation from the standard expected operation of a service. It is a


general description of something that has gone wrong. It is not known what the exact cause is at
this stage. For example users will call a Help Desk and say, “I can’t print”, “I can’t access the
Internet”, “I can’t see my network drive”. They expected to be able to do these things yet could
not, so these are "incidents".

Problem:

A problem is the “unknown underlying cause of one or more incidents”. This is the second
stage of "root cause analysis"/problem management. From the general incidents, more

- 60 -
Material do Curso de ITIL
investigation will uncover an underlying cause of these incidents. A “network problem” is a
good example of a problem definition in this case. Users don't call saying I have a "network
problem", they call and say "I can't save to my H: drive" or "I can't print or surf the web". IT
staff then piece all these incidents together and identify that we are facing a "network problem".

Root cause analysis has taken us closer to finding the root cause but not completely. A problem
is then a more specific definition.

Known Error:

A Known Error is the final step in the root cause analysis process. A Known Error can be
defined as, “when the root cause of the problem is known”. In our network problem example it
is where the faulty equipment or system has been identified.

This is the end of the root cause analysis process. Following the above example the Known error
would be “Router x is faulty”.

From the above we see the initial general issues being faced through to the final definition of the
root cause. The following diagram illustrates this flow.

The process of Problem Management requires the following inputs:

• Incident records and details about Incidents


• Known Errors
• Information about C.I.’s from the CMDB
• Information from other processes (eg. Service Level Management provides
information about required timeframes, Change Management provides information
about recent changes that may be part of identifying the known error).

- 61 -
Material do Curso de ITIL
The outputs of the process are:

• RFC’s (Request for Change) to start the change process to solve the Known Errors.
• Management Information
• Work arounds
• Known Errors
• Update Problem records and solved problems records if the known error is solved.

The following picture summarises this. The center diamond highlights the Problem Management
activities which we will look at in the next module.

Activities
The ITIL Problem Management has four primary activities as follows:

• Problem Control
• Error Control
• Proactive Problem management
• Completion of Major Problem Reviews

Problem Control

The Main activities within Problem Control are:

• Identification and recording of Problems


o Some problems can be identified by processes outside
Problem Management (eg. Capacity Management).

- 62 -
Material do Curso de ITIL
o It is also wise to note that the time, effort and cost that
goes into fixing problems must be weighed up against the
benefits of doing so. If costs outweigh benefits a simple
Problem record can be created that links all affected C.I.'s,
RFC's and Incidents.

• Classification of Problems
o This activity centres on understanding what the impact
on agreed service levels is of the problem. Classification of
problems is similar to Incident classification (impact, urgency,
priority).

• Investigation and diagnosis of Problems


o This is the step where we get to understand what it is
that is causing the problem. This step is vastly different from
Incident Management investigation where the focus is "rapid
restoration" of service.

Error Control

Error Control is the process in which the Known Errors are researched and corrected. The
request for change comes from this sub-activity and is submitted to Change Management and
then following approval the change is actioned.

- 63 -
Material do Curso de ITIL

Proactive Problem Management

The best problems are the ones that never happen. !

Proactive Problem Management focuses the analysis of data gathered from other
processes and the goal is to define “Problems”. These problems are then passed off to
Problem and Error Control procedures, as if they had happened.

The activity includes:

• Trend analysis
• Using data to highlight potentially weak components.
• Targeting preventative action
• Trend analysis can lead to identifying general problem areas.

The aim of proactive Problem Management is to redirect efforts away from always being
reactive, to proactively preventing incidents occurring in the first place.

Completion of Major Problem reviews

At the end of a major problem cycle, there should be a review to learn:

1. What things were done right?


2. What things should we have done differently?

- 64 -
Material do Curso de ITIL
3. What lessons do we take away from solving this problem?

Roles
Problem Manager role

The role of Problem Manager is responsible for:

• Developing and maintaining Problem Control and Error Control


• Assessing the efficiency and effectiveness of Problem Control and Error Control
• Providing management information
• Managing Problem Management personnel
• Obtaining the resources for the required activities
• Developing and improving Problem Control and Error Control systems
• Analysing and evaluating the effectiveness of Proactive Problem Management

Problem Support role

The Problem Support team is responsible for:

• Identification of Problems
• Investigation of Problems leading to the Known Errors
• Monitoring the Process of eliminating Known Errors
• Raise RFC’s when necessary
• Identify trends
• Communicate Work arounds and quick fixes to Incident Management

Relationships

The Problem Management process has a close connection with the following ITIL processes"

Incident Management:

A very close and obvious link as we have learnt. Problem management aims to solve the
root cause for the Incidents that are recorded by Incident Management. It is important that
Incident Control provides accurate information so that Problem Control can solve the Known
Errors easier.

Problem management will supply Incident Management with workarounds and quick fixes
where possible.

Change Management:

If Problem Management finds the solution to a Known Error they have to submit a RFC for
the Change. Change Management is responsible for the implementation of the Change.
When it is implemented they, together with Problem Management, review the Problem to
verify that it is solved by the Change. This is called a Post Implementation Review after
which Problem Management can close the problem record.

- 65 -
Material do Curso de ITIL
Configuration Management:

The information that is provided by Configuration Management is important in diagnosing


problems. It includes information about C.I.’s and relationships with other C.I.’s.

Other processes:

Service Level management, Configuration Management and Availability management all


provide Problem Management with information, which help to define and determine the
impact of problems. In return Problem Management provide these and the other process
with relevant information, for example, to SLM if a problem causes a IT Service to operate
outside the Agreed Service levels or to Capacity Management if a certain hard disk is the
cause of a Problem.

Benefits

Problem Management improves the IT service quality by resolving the root cause of
incident(s). This leads to lower amounts of Incidents - benefiting users, customers, the
organisation and the IT department:

Advantages are:

• Better quality of IT Service Management


• Reliable IT Service results in a better reputation of the IT service
• Ability to learn from the past
• IT staff will be more productive

- 66 -
Material do Curso de ITIL
• Higher resolution rate for Incidents at the Service Desk first time around
• Less Incidents

Common Problems

Common problems for Problem Management include:

1. Incident Management and Problem Management don’t have well defined interfaces
with each other.
2. Known Errors are not communicated to Service Desk/Incident Management
3. No Commitment from Management
4. Unrealistic expectations of the Problem Management process.

The following slide raise these and other points of attention that have to be considered.

- 67 -
Material do Curso de ITIL

Metrics

Successful Problem Management can be measured by:

• Reduction in Incidents because the underlying causes are removed


• The time that is needed to resolve Problems
• The other costs that are incurred associated with the resolution

Within Problem management there is lot that can be measured. It depends on the scope of
Problem management as to what is relevant.

Some examples are:

• Time spent per organisational unit fixing problems


• Number of RFC's raised
• Ratio of proactive to reactive problem management

- 68 -
Material do Curso de ITIL

Best practices
Considerations for Problem Management, a high-pressure area for IT.

The variety, complexity, volume and difficulty of problems facing Support teams
today compared to the "early days" (those of a decade ago) seem child's play. Why?
Increases in user demand have led to vast numbers of PCs; distributed Client/Server
networks; multi-site, multi-platform systems; cheap but complex software packages; all in
addition to the traditional mainframe systems, and all needing the same high levels of
technical support, and all to be delivered with a sensitive 'customer care' attitude.

This increasing workload is threatening the whole stability of IT. If we don't find a
lateral solution for managing it, demand will simply continue to grow at its present rate. The
result? Support functions will soon dwarf the rest of IT in terms of number of personnel,
running costs, and quality of expertise. And ignoring the problem, in the vain hope that it
will go away, is even worse.

Demand must be managed down, resources re-allocated, recurring problems


eliminated, and difficulties anticipated and addressed before they become problems.
Aggressive, effective and financially viable Problem Management is an integral step in
achieving this. Otherwise IT will simply grind to a halt, grid locked and unable to function.

Note: the following web links provide some additional research material. The Kepner-
Tregoe link is an interesting one. KT Analysis is a long serving tool that can be very
useful in carrying out the Problem Management process activities.

Interesting Websites

• http://www.itilworld.com/n-america/service-support_probmanage.htm

- 69 -
Material do Curso de ITIL
• http://www.kepner-tregoe.com
• http://www.itil-service-support-management.com/Pages/Service support/Problem
management/Problem_mgmt.htm
• http://www.itil.co.uk/online_ordering/serv_supp_graphs/problem_mngt.htm

Essential Terms
Work Around:

A "quick-fix" solution to an incident, which will produce an acceptable outcome for a limited
period.

Proactive Problem Management:

Activities aimed at removal of errors while the errors are in a state of inactivity.

Key success factors in Problem Management:

• Automated registration of incidents with correct classification.


• Setting attainable objectives of the Process. Depending on the size of the operation,
not even treating this as a full time role.
• Good inter-process co-operation (especially Incident and Change).

Change Management

Introduction
As organisations become more dependent on IT services and technology changes
rapidly succeed one another, the need for proper management and control of change grows
with it. Many problems in the quality of IT Service Support emerge from changes in existing
IT systems. The ITIL Change Management process is designed to act as a planning and
control process. Proper planning and control ensures the implementation of change can take
place without interrupting the operational IT service delivery.

It is Monday July 1st. End of financial year. For many organisations it is the time of
the year to close out and get final figures for the previous 12 months. Lots of reports being
run, lots of heavier than normal requests on systems, lots of printing, etc.

Imagine then a Service Desk where the phones start ringing at the start of the day.
“My report is not showing any figures.” “I can’t find any details of last year.” “All figures for
last year are lost.”

Mild panic quickly escalates to all out concern as no-one really knows what has
happened. They all individually try and solve the incident of each user by investigating the
software etc. Nothing seems to be wrong, with the system functionality, it's just that the
reports are all blank !

- 70 -
Material do Curso de ITIL
By now the IT Director is looking for some answers from his staff. He has to report to
the business manager on what has happened and why should he keep his job !

Then one of the Service Desk staff strolls in. He's had a late start as he worked back
last night. He notices the panic and asks what is wrong. When he hears the story he turns
red and tells them about the change they made the night before. You can hear a pin drop !

He thinks he may have caused the problem. They look into it and it seems it is the
problem so the staffer is asked to roll-back the change. Only trouble is no-one seems to
have kept a copy of the configuration prior to the change. So, the only way to solve this
issue is to correct the problem in the change. At the end of the day the problem is fixed
and the figures for last year are back. Things start to go back to normal at the Service
Desk …

But the IT Director stills feels the wrath of the business people, along with the known
business cost of the lost hours of productivity and still considers finding another role !

This is a situation that you want to avoid and with a good Change Management
process it is possible!

In our example, with ITIL Change Management in place:

• The Service Desk would have known about a change being done the night before so
they could have made the connection between problem and change a lot earlier.
• The change wouldn’t be scheduled prior to such an important day in this organisation
because of the risks involved.
• The Change would have been tested properly so the whole issue might have been
avoided.
• A proper roll-back would be in place resulting in a quicker solution of the problem.

Objective
For an effective and efficient IT service delivery it is necessary to have the capability
to implement many changes correctly. Changes in reality often lead to (implementation)
problems.

The created problems are subsequently resolved by the implementation of a change,


which in turn leads to more problems. Breaking this negative spiral is an important task for
Change Management.

ITIL's goal statement for Change Management is...

"Assuring that standardised methods and procedures are in use for the efficient
and timely implementation of all changes, in order to minimise the impact of
change related problems on the quality of the IT service delivery".

The goal also build an internal understanding of the "how and why" for the process
(how = standardised methods and procedures, why = to minimise impact).

Remember....

"Not every Change is an improvement but every improvement requires a change"

- 71 -
Material do Curso de ITIL

Process Description
The common trigger for Change Management is a Request for Change (RFC). RFC's
come from within the IT organisation as well as from the Customers.

Another trigger for change can be the Forward Schedule of Changes (FSC). This
schedule is drawn up in advance in agreement with the customer. The FSC documents
known change events or agreed windows of change, that can be used for unforeseen (non-
urgent) changes.

Other inputs for the process is CMDB information about the affected Configuration
Items (C.I.’s) and the relationships that exist between the affected CI's. This vital
information contributes to the assessment that the Change Management process has to
make about the impact (potential or otherwise) or a proposed change.

The output of the process includes reports regarding the changes, triggers for
Configuration Management to change the CMDB, triggers for Release Management to
release, develop or implement new software or hardware and Change Advisory Board (CAB)
agenda and planned actions.

Note: The CMDB (Configuration Management Data Base) is discussed in the


Configuration Management chapter. Change records can be held in the CMDB, which
allows them to be "linked" to affected CI's or Configuration Items.

The Scope of Change Management is determined along with defining the scope of
Configuration Management.

If the Configuration Management process is to track details of hard disks and floppy
drives, then replacing a hard disk counts as a change (albeit a "minor change").

- 72 -
Material do Curso de ITIL
Determining the scope is a dynamic activity, as the scope can change and therefore
the need for information needed from the CMDB can change as well. Reviewing the scope
on a regular basis is important.

It is not necessary that not all changes are controlled by the Change Management
process. For example minor changes, such as resetting a password etc can be done by the
Service Desk (following set procedures) but doesn’t need to be controlled by Change
Management. To do so, would lead to increased workload, frustration and "by-passing" the
process.

Activities
The Change Management process includes the following activities:

• Recording
• Accepting
• Classifying
• Planning
• Co-ordination of activities
• Implementing
• Evaluating

Recording

Although this activity is not carried out by Change Management itself, it is the responsibility
of Change Management to make sure all Changes are recorded correctly.

Accepting (Rejecting)

At this stage RFC’s will be reviewed and accepted or rejected. Any rejection should always
be communicated and explained. A reason for the rejection of an RFC might be that it is
incomplete or illogical. Accepted RFC's then be classified.

Classifying

In this stage the RFC will be categorised and a prioritised. The category depends on
the impact the change has and the resources needed to do the change.

The priority is derived form the urgency and the impact of the change, along with
knowledge that the Change Management process may have from other process areas, that
the change requestor is not aware of.

Planning

The change will be planned and put on the Forward Schedule of Change (FSC), if
appropriate. The Change Advisory Board (CAB) meets to review the FSC. The FSC will
consist of:

- Planning in time, people, and budget


- Indication of consequences for other changes
- Advice on whether the change should be a go or no-go

- 73 -
Material do Curso de ITIL
Coordination

If approved the change must be built, tested and implemented. Change Management
doesn't do this work, but it co-ordinates the activities to ensure progress is made. Change
Management will also verify that a back out plan has also been developed and submitted for
approval.

Evaluating

Each change (except minor standard changes) should be evaluated to see if the
changes had the desired effect. The effort put into a post change evaluation will be
dependant on the size of the change and the impact it had on the organisation (good or
bad, what lessons can be learnt).

- 74 -
Material do Curso de ITIL

Roles

Change Manager

The Change Manger is responsible for:

• Processing of the RFC’s, including filtering, accepting and classifying them.


• Planning, coordinating (with all parties) and the implementation of the Changes.
• Closure of RFC's
• Authorisation, after advice from the CAB or the CAB/EC
• Where appropriate, to obtain authority for Changes to proceed (the level of authority
required will depend on the impact that the change is expected to have, it's cost and
it's urgency).
• To issue the FSC's (Forward Schedule of Changes) via the Service Desk

Change Advisory Board (CAB)

This board should to be made up of representatives from all areas within IT and
representatives from business units. The CAB can have an element of flexibility so if there
are no changes on the Agenda that effect a specific business perhaps they don’t have to be
present at the CAB Meeting.

The CAB assess and plans the major changes.

Change Advisory Board/Emergency Committee (CAB/EC)

A sub-set of the CAB that can meet at short notice to consider Emergency changes.

Relationships
The Change Management process depends on the accuracy of the configuration data to
ensure the full impact of making changes is known. There is a very close relationship
between Configuration Management, Release Management and Change Management.

The following diagram illustrates some of the major process relationships.

- 75 -
Material do Curso de ITIL

Advising the Service Desk of changes is crucial. Changes are nearly always first
"discovered" in the Incident Management process, via the Service Desk.

Also the Problem Management process can submit RFC’s to solve Known Errors and
sometimes this can cause a snow-ball effect, if the Configuration Management process is
unable to explain what the affected components will be as a result of the change (including
hardware, software, SLA's).

Note: SLA's (Service Level Agreements) are discussed in the Service Level
Management process. It is possible to store information about an SLA in the
Configuration Management Database (CMDB). By doing this relationships can be
created between hardware or software components and the SLA. So when a change
is proposed to a component the linked SLA can be investigated to determine if the
change will breach the SLA.

The others processes are also linked to Change Management in the sense that they either
request changes (Availability Management) or they will be consulted to determine the
impact of changes (IT Service Continuity Management, Service Level Management and
Capacity Management).

Benefits
Change Management is one of the ITIL processes that can often be not really liked. IT Staff
have a tendancy to think that "it's only a small change, no-one will be affected".

It is in these situations that most damage is often done. Discipline is required to adhere to
the process. As an IT support person if you are told to implement the change without

- 76 -
Material do Curso de ITIL
following the process, ask for the directive in writing, that way there can be no mis-
understanding when problems come up.

Remember that low impact, low risk changes can be covered by creating a change request
that is open-ended and approved. For example, hard disk archiving. Provided the change is
documented, the affected parties listed and the RFC is closed, reviewed and re-opened on a
periodic basis then there is no need to create a seperate RFC every time the change is
required.

The concrete advantages of Change Management are:

• Less impact of changes on the quality of the IT service delivery and the Service Level
Agreements (SLA's).
• Through structured planning, the cost of a change can be estimated more accurately
• Fewer changes need to be reversed, but if the need arises it is a simpler process
• Collection of management information is possible on changes.
• Increase in productivity of the user because of a reduction of service interruptions.
• Increase in productivity of IT staff (less time lost of fixing changes).

Common Problems
Along with the benefits of the any process, we have to acknowledge the inherent problems
as well. Change Management is a highly visible process, both within the IT Department and
the business users and business customers.

Note: The distinction between Customer and User is straightforward. The customer is
the one paying for the service. The User is the ultimate end-user of the service.

Tool Selection

You need an appropriate tool to support the Change Management process. Ideally, a single
tool will be able to accommodate the activities of a number of ITIL processes. With Change
Management, it would be almost essential that the same tool be used as the Configuration
Management Data Base.

Defining the Scope

If the changes that are controlled by Change Management are too wide (eg it includes
password rests) the workload will become to high and people will try to bypass the process.

Commitment

IT staff might be reluctant to follow procedures because Change Management will be


involved in so many aspects. It is important to make the IT Staff aware of the positive
effect the Change Management process will have on the IT Service as a whole. It is also
necessary to ensure that the team designing the process do not over engineer a solution.
Start simple and build up complexity if it's (a) necessary and (b) value-adding.

Metrics
The beauty of all ITIL processes is that they can be measured. Measurement allows baseline
setting and targets to be set for improvement.

- 77 -
Material do Curso de ITIL
Change Management is no different in this regard and the following indicators are common
for measuring this process.

• Number of Incidents recorded as a result of a change


• Time taken to implement a change successfully
• Number of Changes that required a roll-back
• Number of Urgent/Emergency changes
• Number of RFC's submitted for consideration
• RFC rejection count
• Change back-log
• Changes by business unit/areas/department

Best practices
The following list of sites provide some excellent background reading on Change Management.

Interesting websites

• http://www.itil-service-support-management.com/Pages/Service%20support/Change
%20management/Change_mgmt.htm
• http://www.itilworld.com/n-america/service-support_changeman.htm
• http://www.infra.com.au/TuDelft.htm
• http://www.itil.co.uk/online_ordering/serv_supp_graphs/sschange.htm
• http://www.microsoft.com/technet/treeview/default.asp?
url=/technet/itsolutions/ecommerce/maintain/operate/rmdotcom.asp
• http://www.atlsysguild.com/
• http://www.guild.demon.co.uk/SpecTemplate8.pdf
• http://www.guild.demon.co.uk/SpecTemplate8.rtf..zip
• http://www.atlsysguild.com/GuildSite/Robs/Template.html

Essential Terms
Change

Change to a system or service.

CAB

Representative group of stakeholders, who assess the change requests. The Change
Advisory Board advises the change manager on whether the change should be accepted or
rejected.

Request for Change (RFC)

All requests for modification of the managed infrastructure that are not Service Requests.

Service Request

Fully defined and approved changes, which are individually recorded, but not individually
assessed by Change Management. These changes are made routinely.

- 78 -
Material do Curso de ITIL
Forward Schedule of Change (FSC)

A change schedule, which contains all the planned changes for a certain period of time.

Configuration Management

Introduction

Through the storage and management of data regarding the IT infrastructure the
Configuration Management process gives the IT organisation greater control over all the IT
assets. The more dependent on their IT systems organisations become, the more important
Configuration Management becomes.

It is, therefore, necessary to keep a register of all Configuration Items (C.I.'s) (IT Assets)
within the IT infrastructure. Configuration Management aims to provide a "logical model" of
the IT infrastructure by identifying, controlling, maintaining and verifying the versions of all
C.I.'s.

Objective

The main objectives of the Configuration Management process are to:

• provide IT Management with greater control over the C.I.s (IT Assets) of the
organisation.

- 79 -
Material do Curso de ITIL
• provide accurate information to other ITIL processes.

• create and maintain a reliable Configuration Management Database (CMDB).

Note: The keyword in the following slide that defines the


difference between asset management and configuration
management is "relationships". Traditional asset management
provides a list of items (typically hardware and software).
Configuration Management defines relationships between all
C.I.'s.

Note: In the earlier Change Management process chapter we


discussed the importance of getting accurate information from
the Configuration Management process.

Process Description

The Configuration Management Process could almost be considered as a pivotal process for
all other (especially the Service Support) processes. Configuation Management is considered
central and supportive to the other ITIL processes by providing information about the IT
Infrastructure.

Reminder Note:

• Service Support processes = Incident, Problem, Change, Configuration, Release


• Service Delivery processes = Service Level Management, Availability, Capacity,
Financial, Continuity

- 80 -
Material do Curso de ITIL
o Service Desk is a function and Security Management has an active part in all
processes.

A major input into the Process is from Change Management either requesting information
about items that will be affected or advising the status of changed items.

The process starts with the design, populating and implementing of the CMDB
(Configuration Management Data Base)

It is the responsibility of Configuration Management to maintain the CMDB. Populating the


CMDB can be a costly and lengthy exercise depending on the scope of IT infrastructure that
is to be managed and the depth of detail about each item required (automated tools can
play a large part here).

The Outputs of the Process are reports to IT management and also the constant availability
of Information that can be supplied from the CMDB to other processes.

Activities
The activities of the Configuration Management process are:

• Planning
• Identification
• Control
• Status accounting
• Verification and Audit

- 81 -
Material do Curso de ITIL
Planning:

This includes setting up the process "boundaries" like the goal, scope, objectives, policies,
procedures and interaction expected with other processes.

It is the task of the Configuration Manager to determine what can be achieved, at what cost
- balanced against the business requirements. This combination affects the level of detail
and how many C.I.'s will be specified.

Scope:

The scope of the process must be decided. This essentially answers the question: What will
and will not be included within the process? For example some IT organisations will
manage the PABX and phone systems, in this case these infrastructure items would be
within the scope of the process.

CI Level:

The CI Level refers to the amount of detail that will be captured for each CI. For example is
a PC considered enough detail or is it necessary to capture the hard disk, network card and
memory details. The decision about the level of detail required should depend upon how
the information will be used. A lot of detail requires extra work to keep updated, while too
little detail defeats the purpose of the process and does not contribute towards good
decision making.

Identification:

The identification activity involves the gathering of all C.I. information within the scope of the
process. C.I. information is gathered either manually and/or by the use of automated tools. At
the time of gathering this data each CI should be labeled for reference and control purposes.

- 82 -
Material do Curso de ITIL
Note: The labeling of IT Infrastructure can be incorporated into the Security Management
process. Labeling techniques include visible labels, that include common contact
numbers (eg. Service Desk), reference numbers and even hidden labeling (security paint
that shows up under "black lights" and microchip identifiers that are not visible to the
human eye).

The information gathered will be governed by the scope, C.I. level and attributes decided upon.

Note: The attributes of a C.I. are the "things" about that C.I. that we want to record
(eg. the attributes of a Personal Computer can be hard disk size, processor type,
processor speed, Operating system version).

Values are the quantifiable measurement of attributes (eg. the value of a hard disk
size can be 3Gig or 8Gig, the value of a processor speed can be 1 GigaHertz or 10
GigaHertz)

Before gathering any information control procedures and the Change Management
process should be in place so that after information is gathered and populated into
the CMDB changes to the infrastructure don’t make it redundant.

Note: The gathering of data can take several weeks or months.

Control

Before the CMDB is populated control procedures should be in place. It is vital that changes
to the CMDB and the CI’s within are only made with the proper authorisation. Procedures
need to be set up so that all changes are always documented, for example with authorised
RFC’s. We can start to see the very strong relationship that Change and Configuration
Management share.

Status accounting

Status accounting is the activity that records the current and historical states of a C.I. so
every change to a C.I. is traceable. Status levels can be defined as part of the planning
process (eg. On order, In use, Out of order, Under repair, Retired).

- 83 -
Material do Curso de ITIL

Verification and audit

By conducting regular audits an organisation can verify that all C.I.’s are recorded correctly.

The first audit should be held right after the CMDB has been implemented to be make sure
it is a correct representation of the actually IT infrastructure.

Other times for audits can be after disasters, major changes and following a pre-defined
timetable.

The degree of audit will again need to take into consideration the value that will be derived
from the audit and the size (and therefore cost) of doing the audit. Partial audits, spot audit
checks are all feasible strategies to "get a feeling" about the level of C.I. accuracy.

Roles

The Configuration Manager will assist in determining the scope and level of detail
required in the process, implement procedures for interaction with other processes and take
responsibility for the planning and population of the CMDB.

The Configuration Librarian is the person who controls access to master copies of
software and documentation. Like any librarian the focus is on physical items. These items
will be held in the "definitive software library" (DSL).

Note: In small organisations the role of the Configuration Manager and the Change
manager can be combined.

- 84 -
Material do Curso de ITIL

Relationships

As indicated, the IT infrastructure forms the foundation of the IT organisation. All processes
within ITIL therefore have links with Configuration Management or retrieve information from
the Configuration Management Database.

Change Management and Release Management however, have the closest relationship to
Configuration Management and could even be considered as an integral part of it. The flow
chart shows the relationships between the 3 processes and how the flows between the
processes occur at every stage.

Benefits

Some of the benefits that come from implementing Configuration Management include:

• ability to provide Information to the other processes about C.I.’s and the
relationships that exist between them.

• contribution to IT Service Continuity planning

• control of the IT Infrastructure. Knowing where a C.I. is and who’s responsible for it.

• efficient and effective Problem management

• efficient and effective processing of Changes

• as an insurance that legal obligations are being met

- 85 -
Material do Curso de ITIL
• optimal support on security issues

The following slide restates some of these benefits and introduces some new ones.

Common Problems
Problems that can prevent an effective implementation of Configuration Management are:

• Level of detail for the CI’s is not right. If the level is too deep too much information
is recorded which will take to much time, money and effort to maintain. However, if
the level of detail is not detailed enough parts of a C.I. can be changed without
anyone knowing. This can result in increased incidents and problems due to the
difficulty in tracing the faulty component.

• Urgent Changes. Emergency changes often happen outside normal hours of


operation. There may be no authorised person to record the changes in the CMDB.
This can be combated through a solid procedure of post-change updating. Otherwise
the overall reliability of the CMDB is compromised.

• Commitment: There needs to be a firm commitment from Management to implement


this process, as it can be a high activity process. Discipline is required from IT Staff
to ensure that changes to the infrastructure follow the appropriate steps to keep the
CMDB accurate.

• Interaction with other processes. As Configuration Management relies on Change and


Release Management to a large degree it is wise to implement these processes at
the same time. Failing to do so might result in a non-reliable CMDB and an
ineffective process.

• Control. There needs to be a process in place that secures the validity of the CMDB.
For example users who can purchase software themselves via the Internet may

- 86 -
Material do Curso de ITIL
create incidents that are difficult to solve due to unknown configuration changes (the
typical "I didn't change anything !!")

Metrics

Key performance indicators

The measurement of the Configuration Management process has many potential KPI's that
can be analysed. To measure the effectiveness of Configuration management, realistic
targets should be set. The targets can be changed over time to ensure improvement of the
process.

• Result of audits. Number of unauthorised C.I.’s, C.I.’s not in use

• Number of changes that due to wrong Configuration information cause incidents or


problems

• RFC’s that were not completed successfully because of poor impact assessment,
incorrect data in the CMDB, or poor version control

• The time a change takes from start to finish

• Software licences that have been wasted or not put into use

Other Indicators could include:

• The amount of calls per month that are solved whilst the User is on the phone using
information from the CMDB.

• Reduction in Incidents and problems over time and the change in impact they have
on the business

- 87 -
Material do Curso de ITIL
• Improvement in the time needed to resolve Incident and Problems that can’t be fixed
immediately

• The number of changes to the CMDB per month because of identified errors in the
CMDB.

• Time needed to record a C.I.

Best practices

The CMDB

Most organisations already use some sort of CMDB, in a spreadsheet or paper based. In
most cases the CMDB is based on database technologies, which makes gathering
information more user friendly. Information that can be gathered from a CMDB include:

• Information about C.I.'s


• List of C.I.s affected by a scheduled a Change
• All Requests for Change relating to one C.I.
• The history of a particular C.I.
• List of change and problem records associated with a C.I.
• List of C.I.'s affected by a Problem.

A CMDB also contains information on relationships between Incidents, Problems, Known


Errors, Changes, Releases and C.I.'s. The CMDB can aid as a support tool in the creation
and on-going maintenance of legal contracts.

Note: Examples of "relationships" that can be defined are:

• Relies on....
o SLA "Provision of Banking Services" relies on Server 2
o SLA "Provision of Banking Services" relies on Printer 9
• Is part of....
o Hard disk 12 is part of Server 2
• Affects....
o SLA "Provision of Banking Services" affects Customer 11
o SLA "Provision of Banking Services" affects Customer 12
• Is linked to...
o Banking system is linked to Admin system
• Had ......
o Printer 9 had RFC 0013 applied
o Printer 9 had RFC 0035 applied

An additional bonus is the use of the CMDB to cover the legal aspects associated with the
maintenance of licences and contracts.

The Definitive Software Library (DSL) is a storage place where all software versions are kept
secure. New releases will be built on copies of the software from the DSL, not from the
software that is being used in the production environment. The DSL is plays an important
part in the Release management process and is discussed in more detail in that chapter.

- 88 -
Material do Curso de ITIL
Interesting Websites

• http://www.itilworld.com/n-america/service-support_configman.htm
• http://www.itil-service-support-management.com/Pages/Service
support/Configuration management/Configuration_mgmt.htm
• http://www.itil.co.uk/online_ordering/serv_supp_graphs/ssconfiguration.htm

Essential Terms
IT infrastructure:

All parts of importance to the provision of IT services. These include: hardware, software,
network and components, documentation, manuals, procedures, air-conditioning, cooling,
organisation etc etc. Staff, however, is not a C.I. (according to ITIL, many organisations
choose to include staff into their CMDB as soon as the organisation is mature enough to
handle this).

Configuration item (CI):

The IT infrastructure is built from components. Every component of the infrastructure,


under the management of the IT organisation, is called configuration item (C.I.). A C.I. may
have any form of complexity or size and may vary from a complete mainframe to, for
instance, a PC as well as a monitor, keyboard or a floppy disk drive.

Attribute:

An attribute is a characteristic that is recorded about a C.I. Examples of this are:


identification number, colour, type, size, manager, user, price, depreciation, supplier, serial
number, version, status, etc.

Values:

A value is the quantifiable part of an attribute. (examples of values are "red", "10", "E9",
"critical")

Links/Relations:

All relationships are normally recorded in a hierarchical structure (such as a parent-child


relation). Other relationships are "is linked to" or "is used by". These relationships should
be made between C.I.s in the CMDB.

Configuration Control:

Ensures C.I.’s are only changed with the appropriate documentation and that C.I.’s are
tracked from procurement to disposal.

Asset Management:

The difference between Asset Management and Configuration Management is that Asset
Management has a list of assets and Configuration Management has a database with
relationships between C.I.s.

Configuration baseline

- 89 -
Material do Curso de ITIL
A Configuration baseline is the configuration of a product or system established at a specific
point in time, which captures both the structure and details of a configuration. It serves as
reference for further activities.

Release Management

Introduction
With the increasing complexity of systems and a greater need for IT organisations to provide a
stable environment, the release of new software and hardware into the business must be closely
controlled. Quite often however a poor release strategy leads to the very thing that others in the
IT organisation are working hard to avoid; downtime and loss of infrastructure stability.

The "Catch 22" however is that there in an ever increasing pressure to “have the release sooner”,
as it will deliver immediate “benefits” to the organisation. External forces often drive the
demand to get the latest hardware of software into production as businesses strive to be
first to market or to help them gain a competitive edge.

This process within ITIL aims to provide a structured approach to the management of
releases into the infrastructure from release planning through to actual installation. The
relationships with Change Management and Configuration Management are key for this
process as all three are very closely related.

Release Management provides the physical management of software and hardware.


Information about the software and hardware components of the IT and their relationships
with one another are stored in the Configuration Management Database (CMDB). Release
Management manages the planned and applied changes to software and hardware in the IT
infrastructure.

To support Change Management and Configuration Management, Release Management


utilises the Definitive Software Library (DSL) and the Definitive Hardware Storage (DHS).

These secured libraries provide the physical storage location of all software Configuration
Items (CI's) (DSL) and spare parts for hardware (DHS).

Software comes in various forms such as source codes, loads, libraries and executables.
The different versions of the same software held in the DSL have been through
authorisation and quality controls and are used for the construction and implementation of
releases.

Spare hardware held will be dependant on a risk assessment (looking at the assets of the
organisation and then the threats and vulnerabilities), as well as third party involvement
regarding support contracts (Underpinning Contracts). Changes to the production hardware
environment must flow through to the DHS, so that any held spares can be compatible with
latest production hardware.

- 90 -
Material do Curso de ITIL

Objective
Release Management is the process that "protects" the live or production environment.
Protection comes in the form of formal procedures and extensive testing regarding proposed
changes to software or hardware within the production environment.

Note: The use of the term "Production Environment" conjures up images of a factory
or manufacturing facility. However, it is a generic term applied to all areas of
infrastructure in use that contribute towards the realisation of organisational
objectives.

Note: It is the use of this term Production Environment that probably provides an
answer to a question that gets raised a lot regarding the ITIL framework. Can the
(ITIL) framework be used in other business areas, other than IT ?

The answer is most definitely yes. The framework is not a prescriptive set of
processes that lack flexibility. They are a set of generic guidelines that, with the right
perspective, can be applied just as easily to manufacturing & engineering disciplines.

Objectives of Release Management process include:

• To manage, distribute and implement approved hardware and software items.

• Provision for physical and secure storage of approved hardware and software items
in the Definitive Hardware Store (DHS) and Definitive Software Library (DSL)

• Ensuring that only authorised and quality controlled software & hardware versions
are used in the test and production environments.

Note: Even the test environment can be subject to the Release Management
process. Many businesses have a very high reliance on their test centres and
cannot afford uncontrolled actions, simply because the environment is not the
front line of the business.

- 91 -
Material do Curso de ITIL

Process Description
The main components controlled under a good Release Management process include:

• In-house developed applications,


• Purchased software and custom built software,
• Utility applications,
• Software provided by suppliers for use on specialist systems,
• Hardware and hardware rollouts
• Instructions and user manuals

Release Management manages all software and hardware from purchase or development
until testing and the eventual migration into production.

The process starts with the planning of a new release, be it for hardware or software and
ends with a well documented, securely stored, implemented new release with the lowest
possible impact on the organisations day-to-day activities.

The following diagram illustrates some of the basic before and after situations surrounding
the Release Management process.

Activities
The following diagram shows the activities of Release Management and their relationships
with the Configuration Management Database (CMDB):

- 92 -
Material do Curso de ITIL

In a list format the activities described in the picture include:

• Planning and describing the Release Policy of a Release

• The design, building and configuration of Releases

• Testing and signing off of new releases

• Planning the rollout of releases

• Communication, preparation and training

• Release, distribution and the installation

Planning and describing the Release Policy

The Release Policy will document how the organisation will approach the release of new
hardware and software in to the infrastructure. Specified in this policy will be items such
as:

• The frequency of releases that is acceptable to the business

• A policy on how to issue emergency releases

• A policy on testing and subsequent release into production

- 93 -
Material do Curso de ITIL
• The scope of the Release Management process ie. What level of control and what
parts of the infrastructure will be under the control of the process

• Naming conventions for releases

Preparation for any release requires a structured planning approach to increase the chance
of success. The use of a formal project management methodology like PRINCE2 will assist
in this to define items such as:

• Contents of the Release

• A release schedule

• Resource requirements

• Roles and responsibilities

• Project Approach

• Definition of the release components

• Back up plan

• Quality plan

• Acceptance plan

Note: PRINCE2 is an acronym for PRojects IN Controlled Environments. Like ITIL


PRINCE2 is a methodology or framework, not a tool for Project Management.

PRINCE2 is published by the same body that publishes ITIL (the Office of
Government Commerce (OGC) in the UK). And like ITIL it is a widely accepted
framework for best practice.

You can find extra information on PRINCE2 at: http://www.ogc.gov.uk/prince/

The Design, Building and Configuration of Releases

This activity within Release Management can be considered as the technical stage of the
process. All the actions associated with designing, configuration and building are completed
by relevant staff, in a "controlled" manner.

Note: The term "controlled" is not intended to create an image of bureaucracy.


Controlled environments are reproducible and that is the critical issue here.

At the end of this stage a Back-Out Plan should also have been created. Back-Out plans can
be aimed at restoring all services to their state before any change OR to restore as close to
the pre-change state as is feasible given the nature of the change.

The suitability and content of the Back-Out plan will be assessed during the Change
Management process.

The output of this activity should be a release complete with instructions on its installation,
a test plan and a backout plan.

- 94 -
Material do Curso de ITIL
Testing and Signing-Off of New Releases

Lack of adequate testing is the most common cause of failure of all (changes) releases.

Testing should not only be done on the release expected end result but also on the
implementation activities and the back out procedure.

Representatives of the Business should test for expected functionality. This is referred to as
"User Acceptance Testing" (UAT). IT staff perform technical tests including the test of the
installation (ideally the test staff will not be the build staff).

Each of these stages should be signed off separately.

Release acceptance should be performed in a controlled test environment that can be reset
to known configurations of both software and hardware. These configurations should be
described in the Release definitions and stored in the CMDB, along with any other related
CI’s.

Planning the Rollout of Releases

The overall release plan that was originally created must now be enhanced with detailed
information on the rollout of the release. This will include:

• Task list and resources needed for the task

• A list of all the CI’s to be installed and decommissioned

• In case of multiple sites: action plans for the separate sites taking local differences
into consideration.

• Communications to all involved (users, IT staff)

• Plans for the release rollout purchases (if any)

• Acquiring hardware and software. The rollout plan should include the procedures to
be followed for their secure storage prior to rollout and the mechanisms to trace
their deployment during the implementation.

• Scheduling meetings for managing staff and groups involved in the Release.

Communication, Preparation and Training

It is important to communicate with all parties involved in order to increase the acceptance
and success of the release. This might involve several meetings/training sessions with user
groups, IT staff and Managers.

The timing of any training and/or communication must be planned in accordance with the
expected actual release date.

The Service Desk is a key area that must be informed about the release, any known issues
(or workarounds) that have been established during testing and generally how the new
release should be supported.

The release plan should be made public in case of a large release so users know what to
expect and when.

- 95 -
Material do Curso de ITIL
Release, Distribution and the Installation

Release Management will be responsible for the process of purchase, storage, transport,
delivery, and hand-over of hardware and/or software.

Distribution and installation are seen as different activities. Often a release will be
distributed and (in the case of software) not "go live" until a log-on script is changed and
the release activated.

Following the distribution of the release installation will take place making it available to the
user community.

Release Management must work closely with the other processes (mainly Change
Management and Configuration Management) to maximise the success of the release.

The CMDB should be updated with the new Release details and all old C.I.s should be
decommissioned and appropriately marked in the CMDB (retired, decommissioned, etc.)

Roles
The main role within the Release Management process is that of the Release Manager.

This person is responsible for defining and maintaining the definition of the release policy
and controlling the activities within the process. The Release Manager will have a good
technical background and a good knowledge regarding latest utilities and support tools.

The combination of roles is permissible for certain ITIL processes. In smaller IT


organisations the combination of the Release Manager, Change Management and
Configuration Management processes is realistic.

Release Management staff will need to receive technical training for development,
software maintenance and hardware build skills.

Project Management is another essential characteristic that is evident in a Release


Management environment.

Relationships
Release Management is very closely linked with Change Management and Configuration
Management. Change Management controls all the changes and determines when a new
release will be implemented and what changes will be in any release. In most major
organisations a representative for the Release Management process will have a
representative in the Change Advisory Board (CAB).

Note: The CAB is the authorising body for changes to proceed. Can you remember
the term given to the group of people who approve Emergency Changes?

Configuration Management needs to be informed by Release Management about every


change to a Configuration Item (C.I.) so they can update the CMDB. They also need to
make sure that new versions of software and hardware are being stored in the DSL or DHS.
Release Management will use Configuration Management to get information about C.I.'s
that may be affected by a new release and importantly their relationship with other C.I.s.

- 96 -
Material do Curso de ITIL

Benefits

Implementation of the ITIL Release Management process provides the following


advantages:

• Software is being released for testing and production in a controlled manner,


reducing the chance of errors.

• The software (source, loads and executables) of the organisation is held in a secure
location (the Definitive Software Library (DSL)).

• Ability to implement many concurrent changes in the software being used in the
production environment without adversely affecting the quality of the IT
environment.

• Software in remote locations can be managed effectively and economically from a


central point.

• The possibility of the use of illegal copies is dramatically reduced.

• The impact of new hardware is tested prior to installation in the infrastructure.

• With end users more informed of new releases and involved in testing the new
releases the risk of resistance will be reduced significantly.

- 97 -
Material do Curso de ITIL

Common Problems
In order for Release Management to be successful the following issues need to be taken in
consideration as they may cause problems:

• Lack of Commitment: End Users might be reluctant at first to be told by this process
how to act in case of a new release. The advantage of this process needs to be
communicated before the process is implemented.

• Urgent fixes. Procedures need to be in place to make sure that they are dealt with
correctly and don’t compromise the accuracy of the CMDB, DSL or DHS.

• Testing. A proper tests environment needs to be available in order to assess the


impact and reduce the risk of a new release.

• Bypassing of the process my cause illegal software or viruses to enter the IT


Infrastructure. Regular audits can help to minimise this potential issue.

- 98 -
Material do Curso de ITIL

Metrics
In order to assess the effectiveness of the Release Management process a number of key
performance indicators (KPI’s) should be monitored.

Examples of possible indicators are:

• Releases built and implemented on schedule, and within budgeted resources

• Number of Releases that result in a back out due to unacceptable errors

• Number of Incidents caused by the release

• Outcome of audits of the DSL and the DHS. Security - all software can be accounted
for etc.

• Proper use of the DSL for software development

• Compliance with all legal restrictions relating to purchased software

• Accurate and timely recording of all build, distribution and implementation activities
within the CMDB

Best practices
Different Types of Releases

ITIL defines three different release types as described.

- 99 -
Material do Curso de ITIL
Delta release

Includes only those CI’s within the release unit that have actually changed or are new since
the last full or package release. For example: In a word processing package the help file
has a bug and requires an update. Only the help file module is updated whilst the rest of
the program remains the same. The same analogy could be used with the word processing
package as a part of the whole office automation suite.

Full release

In a full release all components of the release are updated. For example: An update is
made to the whole office automation suite including the word processing package,
spreadsheet database etc.

Package release

The Package release includes all previous delta and full releases. These releases are
generally implemented less frequently and therefore allow for longer periods of stability for
the live environment. An example of a Package Release might be an SOE (Standard
Operating Environment) for a desktop PC that includes the hardware, office automation and
business applications.

Types of relevant environments

• Development. Only here can new software be developed. Newer versions will be
based on a copy of the software in the DSL. Each new version will cause an
increased version number.

• Testing. Should be a replication of the live environment in order to reduce risks of


the implementation. Developers do not work in this area.

• Production. Where the software/hardware is in production. Developers do not work in


this area.

• Archiving. Old release versions that are no longer in use

- 100 -
Material do Curso de ITIL

Interesting web sites


• http://www.itil-service-support-management.com/Pages/Service support/Release
management/Release_mgmt.htm
• http://www.itil.co.uk/online_ordering/serv_supp_graphs/release_mngt.htm
• http://www.microsoft.com/technet/treeview/default.asp?
url=/technet/itsolutions/ecommerce/maintain/operate/rmdotcom.asp

Essential Terms
Definitive Software Library:

A library, which stores in their definitive, accepted form, all the versions of software
configuration items that have been accepted from the developer or supplier. This logical
library can be physically present in several locations.

Definitive Hardware Store:

A physical secure storage of definitive hardware spares. These are spare components and
assemblies that are maintained at the same level as the comparative systems within the live
environment.

Release:

A software CI introduced into the test environment and subsequently into the production
environment. In most cases documentation and accompanying hardware also are part of
the release.

Release Unit:

A Release Unit includes the CI’s that can be released together.

Type of Releases:

Full Release: all components of a release unit are built, tested, distributed and implemented together.

Delta Release: or partial release, only those CI's in the Release Unit that have actually changed since the
last delta or full release.

Package Release: combination of full releases and delta releases (helps to reduce the risk of incompatible
releases, by changing many systems concurrently).

- 101 -
Material do Curso de ITIL

Service Level Management


Introduction

Imagine the following situation:

The Managing Director (MD) announces to the Chief Information Officer (CIO) that the
company is thinking about outsourcing the IT Organisation. Over the last two years there
have been numerous and major complaints about the current IT services by the business.
The customers say it doesn’t do what it should, it is not working properly etc.

The CIO is puzzled to say the least. He had no idea that they were doing so badly. They
actually thought they were doing well. The services were up and running for most of the
time. They resolve incidents quickly and didn’t get many complaints from the users that
they were aware of.

His staff have been putting in an enormous amount of effort to upgrade the server that the
payroll system has been running on.

How could we have done any better?

See the problem?

1. The IT Organisation thinks it is delivering services of a high standard but they have
no figures to back that up. The loosely defined "up and running most of the time"
didn't take into account the outages during critical times.
2. The effort on upgrading the server is commendable, but of no benefit as the
business recently decided to outsource the company payroll activities.
3. There probably is no official procedure in place to ask for the Customers opinion or a
how to make a complaint so how could they have know about the perception of the
customer regarding there services?

- 102 -
Material do Curso de ITIL
Implementing the Service Level Management process will solve the main problems in this
situation. The most widely known element of Service Level Management are Service Level
Agreements (SLA's). SLA's allow the IT organisation and the customer to come to
agreement about which services are been provided, the availability required of them and
their costs. These levels would be measurable so both sides can verify if the levels are being
met.

Service Level Management is the process that forms the link between the IT organisation
and the customers. Implementing Service Level Management can only be completely
successful when the other ITIL processes are implemented as well.

The main aim of SLM is to ensure the quality of the IT services provided, at a cost
acceptable to the business.

Note: There are some who feel that Service Level Management is the single most important
process within ITIL. This is a difficult argument to defend. By its very nature of processes
within ITIL are of equal standing. It is true that SLM has more of a 'customer focus' than
most other processes, but without those other processes, there is nothing to see the
customer about!

Objective

The Service Level Management process manages the quality of IT service delivery according
to a written agreement between the users and IT department called the Service Level
Agreements (SLAs).

The goal for SLM is to maintain and improve on service quality through a constant cycle of
agreeing, monitoring, reporting and improving the current levels of service. It is
strategically focused on the business and maintaining the alignment between the business
and IT.

- 103 -
Material do Curso de ITIL

Process Description

In order to understand the Service Level Management process it is necessary to understand


some basic concepts that are used, we will be explaining them here so the process is easier
to understand.

Service Level Requirements (SLR)

This is a document that contains customer requirements regarding which IT services they
want and the availability/performance they need for those services. This is the starting
point of setting up the Service Level Agreements.

Service Specifications

The IT organisation draws up the Service Specifications based on the SLR. This is the
translation of the customer requirements into "how" the IT organisation is going to provide
these services. What are the technical needs? It also will show relationships between the
SLAs, the third parties and IT the organisation itself.

Service Level Agreement (SLA)

The SLA is a document that defines agreed service levels between the customer and
provider, i.e. between IT and the business. SLAs should be written in language that the
business understands (clear, concise and free of jargon). SLAs should not include detailed
procedure diagrams for other processes or content such as technical information that the
business will not understand.

Underpinning Contracts (UPCs or UCs)

With the an external supplier or third party is involved in the delivery of IT Services then a
contract has to be drawn up to ensure that they provide their service within a certain

- 104 -
Material do Curso de ITIL
agreed time, cost, level, etc. The IT organisation passes through the business requirements
to external suppliers.

This document will be reflective of the service levels defined in SLAs. For example, if the
SLA states a fix of a printer in 5 days then the UC with the third party should support this
i.e. Fix printer and return to organisation in 3 days.

Operational Level Agreement (OLA) or Service Provisioning Agreement (SPA)

Some IT services depend on other service being provided from within the IT organisation.
For example a service to provide a program that runs via the network depends on the
availability of the network. Agreements about the availability of the network will be drawn
up in an Operational Level Agreement or SPA. As with the UPC these internal "contracts"
will support the SLAs in the same manner except the focus is towards the internal IT
organisation.

Service Quality Plan (SQP)

This plan will contain information about performance indicators for the IT organisation to
measure the Services. It will contain performance indicators for each of the processes that
are implemented in the organisation. It is important to also include the performance
indicators in the UCs and OLAs as they contribute to the IT service as a whole.

Service Catalogue

This is a document that contains all the Services that are provided, a description of the
service, service levels, cost of the service, the customer and the person/department
responsible for the maintenance of the service. The content of a Service Catalogue will vary
depending on the requirements of the IT organisation.

Service Specification sheets often form part of the Service Catalog.

Note: Be sure to understand the principal difference between an Underpinning Contract and
an Operational Level Agreement.

- 105 -
Material do Curso de ITIL

Activities

The main activities of Service Level Management consist of:

• Composing a Service Catalogue

• Negotiating with clients over the possibilities and price of automation and drafting

• Securing and maintaining the Service Level Agreement (SLA).

This is done trough a continuous cycle of the following actions:

• Identifying

• Defining

• Negotiating

• Monitoring

• Reporting

• Reviewing

Identifying

Within this activity the IT organisation will need to define the services it provides within a
Service Catalogue. The Service Catalogue is like a menu of services that will clarify for IT
what is on offer and the components of these services.

- 106 -
Material do Curso de ITIL
In this stage the relationship between the IT organisation and the customer is built or
maintained. The aim is to find out the customer requirements with regard to IT services. As
part of this activity the SLR document is written documenting the customer requirements.
This document should be signed off by both parties to ensure that a clear understanding is
achieved by IT and the business regarding requirements.

Defining

The results of this activity the first time around will be the delivering of the SLR, the service
specs and the SQP.

On an ongoing basis this activity will include taking the SLRs as well as the content of the
Service Catalogue and defining a draft SLA that aligns both into acceptable service levels.
During the creation of this document consideration of the UCs and OLAs is critical as these
documents support the SLA.

Later on the needs of the customer and the specs need to be verified on a regular basis as
they might change. The needs of the customer might change due to a change in the
business procedures and the specs made need changing as a result of the changed
Requirements or the introduction of advanced technology.

Negotiating

Once the draft SLA is formulated negotiation is carried out to gain agreement, acceptance
and a signature for the following documents.

• Service Level Agreement

• Underpinning Contracts

• Operational Level Agreements

It is critical that the above documents are negotiated and signed off.

Monitoring

If service levels cannot be measured and monitored their value is substantially reduced.
Why set service levels if you do not know if they are being met?

In order to be able to measure the service levels they need to be clear and have to be
objective.

It is not enough to define how much time a service can be unavailable, one also needs to
define when a service is said to be available again. Is it when the IT organisation restored
the service or when the users are aware of it?

In order to monitor the performance, availability and support service levels other processes
such as Capacity, Availability and Incident Management should be in place. These
processes will manage and report on service levels reporting back to the Service Level
Management process.

- 107 -
Material do Curso de ITIL

Reporting

The reports should show the figures about the service levels that are required and the
actually measured service levels.

Subjects that can be included are:

• Time needed to resolve Incidents

• Down time of the network and any other occasion where the service levels have not
been met.

• Time needed for a change.

• All major disruptions to the IT service in detail.

• Use of the capacity (minimum and maximum)

• Amount of interactions with various services

Reviewing

Reviewing the Service with the Customers on a regular basis will help discover
opportunities to improve the IT service that is provided. With the help of a Service
Improvement Plan (SIP) this can be achieved.

Once the Service Level Agreements are documented is it not end of the process it is the
start!

It is also important to regularly review how the process itself operates and update where
necessary.

Roles
Service Level Manager Role

The Service Level Manager is responsible for the implementing of the process and
maintaining or improving the Service Levels by initiating improvement actions. The role
requires a position that allows the person to negotiate the service levels with the customers
on behalf of the IT organisation.

The Service Level Manger oversees the steps that result in the following official documents:

• Service Level Requirements

• Service Specs

- 108 -
Material do Curso de ITIL
• Service Level Agreement

• Underpinning contract

• Operational Level Agreements

• Service Quality plan

• Service Improvement plan

Relationships

Service Level Management is at once the basis and, the result of, the implementation of
Service Management processes. Service Level Management is related to every other module
within Service Management.
You can’t implement Service Level Management to a full maturity without the other nine
processes and the Service Desk function, due to the holistic approach required for Service
Management.

The Service Support processes - Incident and Problem and the Service Desk - aim to restore
the services as soon as possible when there is a breach within the Service Levels. They
provide SLM with valuable information as the customer’s perception of the Service Levels.

The Service Delivery processes are more focussed on keeping the services running within
the parameters defined in the SLAs. They get information from SLM about the required
levels and give information about the actual levels and advice about the impact of new or
changed services.

- 109 -
Material do Curso de ITIL
Note: Remember the Service Support Processes are:

o Incident Management
o Problem Management
o Change Management
o Release Management
o Configuration Management

Benefits

Introducing Service Level Management will have the following benefits for the Business and
the IT organisation:

• The IT service will be of a higher quality and will cause less interruption. Hence the
productivity of the IT customers will improve as well.

• The resources of IT staff will be used more efficiently.

• The IT organisation will provide services that meet the expectations of the
customers.

• The service provided can be measured.

• The perception of the IT organisation will improve.

• Cost reduction.

- 110 -
Material do Curso de ITIL
• The services provided by the third parties is more manageable with the underpinning
contracts in place and therefore any possibility of negative influence on the IT
service provided is reduced.

• Monitoring the service make it possible to identify week spots that can be improved.

Common Problems

- 111 -
Material do Curso de ITIL

The following issues need to be addressed in order to ensure a successful Service Level
Management process:

• The service levels set out in the SLAs must be achievable for the IT Organisation in
the first place.

• UCs and or OLAs much be set up properly otherwise external suppliers or internal
parties may inadvertently create a breach of the agreed Service Levels.

• The services need to be measurable and objective for IT Customers and the IT
organisation.

• There needs to be a commitment to negotiate the Service Levels required and in the
drawing up Service Level Agreements. This must be backed with a commitment to
conduct regular reviews and not simply let the agreements get outdated.

Note: A useful acronym when thinking about Service Level Agreements (or any contract) is
SMART

• Simple
• Measurable
• Achievable
• Realistic
• Time driven

- 112 -
Material do Curso de ITIL

Metrics

The following question will help determine if the Service Level Management process is
effective and efficient:

• Are all services covered by SLAs?

• Do the services within the SLAs have the necessary UCs and or OLAs?

• Is there an improvement in the Service Levels?

• Are the actual Service Levels measured?

• Is the perception of the IT organisation improving?

Best practices
Interesting websites:

Assessment

http://www.itil.co.uk/online_ordering/serv_del_graphs/servlevel_mngt.htm

White papers

http://www.interpromusa.com/SLA Challenges for ASPs.pdf

- 113 -
Material do Curso de ITIL
Books

http://www3.gartner.com/1_researchanalysis/focus/entmgmt013002.html

More theory

http://www.microsoft.com/technet/treeview/default.asp?
url=/TechNet/prodtechnol/windows2000serv/maintain/opsguide/cfgmgtog.asp

Essentials (terminology)
Service Level Management:

The process of negotiating, defining, drafting, securing and revising a demanded and cost
justified level of service delivery to the user.

Service Level Requirements

Business demands and requirements for service levels. Examples are: downtime, availability
% and opening hours of the helpdesk. Together with the service catalogue they can be
input for the SLA negotiations.

Service Catalogue

Overview of all current services as delivered by IT. May have a price list attached.

SIP = Service Improvement Program / Plan

Actions, phases and due dates for the improvement of the services

SQP = Service Quality Program / Plan

A document that contains all the information for the managers, including the Performance
Indicators for the other ITIL processes.

- 114 -
Material do Curso de ITIL

Financial Management
Introduction
Over recent years modern businesses have become more and more dependent on IT to
operate their business processes efficiently. As a consequence the number of end users
drastically increased and so did the total amount of money spent on IT (the IT budgets).

All too often customers of IT organisations and senior managers often perceive that there is
too much money spent on IT. This has, therefore, led to a demand for increasingly higher
quality and cost-effectiveness of the provided services.

The IT organisation on the other hand is often under the impression that they are doing ‘a
good job’, but find it very difficult to clearly explain in business language what the real costs
and benefits are of the provided IT Services.

Organisations (the Customers and senior managers) are reluctant to spend money on
improving IT services if they don’t have a clear picture of the costs involved and the
benefits it has for the business. Financial Management for IT Services can make the costs
clear, set up a charging method and give customers an idea about the quality / price
relation. In other words, Financial Management for IT Services promotes the running of IT
Services as a business operation.

The slide below shows some common thoughts and remarks often heard in organisations
through out the world.

- 115 -
Material do Curso de ITIL

Objective

- 116 -
Material do Curso de ITIL

The objective of the Financial Management for IT Services process for an in-house IT
organisation should be:

• ‘to provide cost-effective stewardship of the IT assets and resources used in


providing IT Services.’

In a commercial environment, there may be additional statements that reflects the profit-
making and marketing aims of the organisation, but for any IT Services organisation the
objectives should include:

• ‘to be able to account fully for the spend on IT Services and to attribute these costs
to the services delivered to the organisation’s Customers.’

• ‘to assist management decisions on IT investments by providing detailed business


cases for Changes to IT Services.’

The main focus of this process, therefore, is on understanding the costs involved in
delivering IT Services (by attributing the costs to each specific IT Service and Customer).
This awareness of costs improves the quality of all decisions made in regards to IT
expenditure. Charging (notional or by sending real bills) the costs to the Customers is
optional.

- 117 -
Material do Curso de ITIL

Process Description

Financial Management for IT Services consists of the following three sub-processes:

Budgeting (mandatory)

Budgeting is the process of predicting and controlling the spending of money within the
organisation and consists of a periodic negotiation cycle to set budgets (usually annual) and
the day-to-day monitoring of current budgets.

Budgeting ensures that the correct finance is available for the provision of IT Services and
that during the budget period they are not over-spent. All organisations have a periodic
(e.g. annual) round of negotiations between the business departments and the IT
organisation covering expenditure plans and agreed investment programs which ultimately
sets the budgets for IT.

IT Accounting (mandatory)

IT Accounting is the set of processes that enable the IT organisation to account fully for the
way its money is spent (particularly the ability to identify costs by Customer, by service and
by activity). It is in this regard more important to understand the costs than to know up to
the dollar cent how much something costs.

Charging (optional)

Charging is the set of processes required to bill Customers for


the services supplied to them. This requires sound IT
Accounting and needs to be done in a simple, fair and accurate
way.

Within organisations there are two distinct cycles associated


with Budgeting, IT Accounting and Charging:

• A planning cycle (annual) where cost projections and workload forecasting form a
basis for cost calculations and price setting.

• An operational cycle (monthly or quarterly) where costs are monitored and checked
against budgets, bills are issued and revenue collected.

All these processes are discussed in more detail in the following chapter.

- 118 -
Material do Curso de ITIL

Activities
Each of the three sub-processes of Financial Management for IT Services consist of a set of
activities, which will be discussed in this chapter.

Budgeting

• Determine the budget method:


o Incremental budgeting
Last year’s figures are used as the foundations for this year’s budget
o Zero-based budgeting
A fresh start: Called the Zero base. The purpose and need of every expense
needs to be determined, together with the actual amount.

• Determine the budget period

In most cases this will be the period of a financial (fiscal) year which can we
subdivided in smaller periods.

• Set up the budget

Determine all the categories available and estimate the costs for the next
budget period. Take in consideration that demand might increase over time.
Some costs might need to be estimated.

- 119 -
Material do Curso de ITIL

IT Accounting

IT Accounting aims to provide the information about what the money was spent on. All
Configuration Items necessary to deliver an IT Service to the Customer bear a certain cost.
These costs together add up to the total costs necessary for IT Service delivery. In order to
understand costs we need to discuss costs in a general way.

Direct or Indirect costs.

Direct costs are costs that can be assigned to specific services. For example the cost of a
printer that is used by one department only can be seen direct costs. Indirect costs are
costs that can’t be related to a certain service. For example the electricity of the IT
department they are also called shared costs.

Capital versus Operational costs

Capital costs are costs involved with the purchasing of items that will be used over a few
years and need to be depreciated. (The depreciation amount is part of the total costs).
Operational costs are those resulting from the day-to-day running of the IT Services
organisation (e.g. staff costs, electricity, hardware maintenance) and relate to repeating
payments whose effects can be measured within a short timeframe (usually less than 12
months).

- 120 -
Material do Curso de ITIL

Fixed or variable costs

Fixed costs are costs that stay the same regardless. The rent of a building is an example of
fixed costs. Variable costs change with the use of the service. If you take a telephone
service as an example the line rental costs are fixed, as they will be the same each month
regardless how many calls you make. The costs for the calls are variable costs as they
depend on the amount of calls are made.

Cost types

Cost types need to be determined (they are also used in the budgeting activity). The main
cost types are Hardware, Software, People, Accommodation, Transfer and External Service
costs.

Depreciation methods

Capital costs are depreciated over the useful live of the fixed asset (e.g. desktops in three
years, the mainframe in ten years). There are three methods of depreciation:

Straight-line method.
An equal amount is written off the value of the asset each year.

Reducing balance method.


A percentage of the capital cost is written off the net book value each year.

• Depreciation by usage
The Depreciation is written-off to the extent of usage during a period.

In most cases there already will be an accounting model in place for the rest of the
business. It is important to define a Cost Model that complies with the overall business
accounting model.

- 121 -
Material do Curso de ITIL

Charging

In a Profit Centre the objective is to recover, through Charging, an amount greater than the
costs incurred. For an in-house IT organisation the aim could be to recover the costs back in
a fair and simple way. But it could also be just to influence the behaviour of the Customers
and end users. That is, via Charging the IT organisation can influence the demand and
actual usage of IT Services, and the way the service are provided.

Before Charging can take place a few decisions need to be made regarding the Charging
policy, Cost Units and Pricing.

A Charging policy needs to be chosen:

Communication of information
Only the actual costs will be calculated, reported and charged to the customer (plus specific
amounts, if this is agreed with the customer).

Pricing flexibility
Establish and charge the prices each year. This method gives the option to influence
excessive use.

Notional charging
All costs are invoiced, but the customer doesn’t have to pay the physical dollars. This
method is used to gain experience and eliminate mistakes.

In order to be able to charge the costs to the IT customers Cost Units or chargeable items
need to be set up. These have to be clear, so they can be checked and are understood by
the Customer. Examples would the PC they use, the amount of print jobs they request.

Pricing moves the budget responsibility from the IT department to the user organisation. A
good pricing system gives the client the sense that they get value for their money.

- 122 -
Material do Curso de ITIL
A pricing method (or a combination) need to be chosen:

Cost price

Cost price plus (to cover expenses made for R&D and overhead)

Market prices, the price that is charged for the service on an outside market

Going rate. Rate that is also used in similar organisation or other departments within the
business.

Fixed price. The price is negotiated with the customer beforehand

Roles
The IT Finance Manager can be a person from the IT organisation or the Finance
department. An alternative would be that the tasks, associated with this role, are shared
between both. The main responsibilities are:

• To oversee the implementation of the Financial Management for IT Services process


and their sub processes (Budgeting, IT Accounting and Charging).

• Assist in setting up the budgets and the accounting plans.

- 123 -
Material do Curso de ITIL
• To work, at an appropriate level, with representatives of the organisation
management and the Finance Department, to develop the policies of Budgeting, IT
Accounting and Charging.

If the IT Finance Manger is from the IT organisation maintaining a close relationship with
the Finance Department becomes one of the responsibilities.

Relationships
Financial Management for IT Services provides (depending on which pricing system has
been chosen within the organisation), important information to Service Level Management
about the introduced costing, pricing and charging strategies.

As well as this the Financial Management process analyses which level of service delivery is
technically cost realistic for the business.

Financial Management for IT services can, together with Capacity Management and
Availability Management, develop pricing strategies. These strategies can realise an optimal
spread of the workload within an organisation, which will result in optimal use of resources.
It can also use asset and cost information from Configuration Management to analyse
different scenarios of equipment (different costs for different configurations).

Benefits
The benefits of implementing the Financial Management for IT Services process include:

• Increased confidence in setting and managing budgets.

• A more efficient use of IT resources throughout the organisation.

• Higher satisfaction of Customers as they know what they are paying for.

• Investment decisions can be made on accurate information.

• Increased professionalism of staff within the IT organisation.

Divided per sub process the benefits will be:

For budgeting:

• Ability to estimate the total costs needed to run the IT organisation.

• Reducing the risk of spending more money then is available.

• The ability to verify if the actual costs compare to the estimate costs.

- 124 -
Material do Curso de ITIL
• The guarantee that the money resources are available to run the IT organisation
within the agreed Service Levels.

For IT Accounting:

• Availability of management information on the costs of providing IT Services.

• IT and Business managers make better decisions, which ensures that the IT Services
organisation runs in a cost-effective manner.

• Ability to accurately account for all the expenses made by the IT organisation.

• Demonstrate under- or over-consumption of services in financial terms.

• Maximising the value for money of the provided IT services.

• The possibility to determine the costs of NOT making a specific investment.

• Form the basis to implement Charging.

For Charging:

• Providing a sound business method of balancing the shape and quantity of IT


Services with the needs and resources of the Customer.

• The ability to recover IT costs in a fair manner.

• Influence the demand for the provided IT Services; hence influence the behaviour of
the Customer.

Common Problems
In order for the process to work effective and efficiently the following issues should be
addressed as they are typical areas that can cause problems in this process area;

• Cost Models that are used for IT Accounting are too detailed, creating too much
administrative overhead.

• Not enough commitment from senior IT and Business management.

• Financial Management for IT Services is not in alignment with the way the overall
organisation manages its finances.

• Charging policies are not well communicated to customers possibly causing


unwanted behaviour (eg. actions by users/customers to try to avoid incurring
charges).

- 125 -
Material do Curso de ITIL
Note: The area of Financial Management for IT Services is often glossed over. Typically, customers agree to charges at a point in
time, but when the actual charges are levied the challenges begin. To offset this, it is wise to quite often ensure that your
customer has had their expectations set, so that levied charges do not come as a shock.

Metrics
Key performance indicators to report on the process are:

• Accurate cost–benefit analysis of the services provided


• Customers consider the charging methods reasonable
• The IT organization meets its financial targets
• The use of the services by the customer changes
• Timely reporting to Service Level Management

Other issues that can be reported on are:

• Creditor / Debtor management


• Other specialised accounting measurements (eg. liquidity of assets)

Note: Accountancy is a respected profession around the world. It is very unlikely that this
process can be properly implemented without some specific expertise in accounting.

- 126 -
Material do Curso de ITIL

Best practices

Interesting websites:

Assesment

http://www.itil.co.uk/online_ordering/serv_del_graphs/financial_mngt.htm

White paper

http://www.interpromusa.com/IT Cost Charging Challenges.pdf

More theory

http://www.microsoft.com/technet/treeview/default.asp?
url=/TechNet/prodtechnol/windows2000serv/maintain/opsguide/cfgmgtog.asp

Essentials (terminology)
Financial Management for IT services:
The implementation of Financial Management for IT services is the foundation for an
independent IT organisation, which is not only aware of costs, but is also oriented on future
investments.

Budgeting:
The process of predicting and controlling the spending of money within the organisation and
consists of a periodic negotiation cycle to set budgets and the day-to-day monitoring of the
current budgets.

IT Accounting:
The set of processes that enables the IT organisation to account fully for the way its money
is spent.

- 127 -
Material do Curso de ITIL
Cost Model:
A framework in which all known costs can be recorded and allocated to specific Customers,
activities, or other category. Most Cost Models are based on calculating the cost for each
Customer, but other models can be developed to show the cost for each service or the cost
for each location. The calculation of Costs-by-Customers is the usual start-point if a
Charging system is to be introduced.

Depreciation:
The measure of the wearing out, consumption or other reduction in the useful economic life
of a fixed asset, whether from use, passage of time, or obsolescence through technological
or market changes.

Charging:
The set of processes required to bill customers for the service supplied to them. This
requires sound IT accounting.

Pricing:
Pricing is just one element of the marketing quartet – ‘product, pricing, promotion, place’.
Deciding upon the appropriate charge/price is, therefore, not merely a question of cost
recovery but also of its impact upon the demand for the product.

Billing:
Passing on charging information to managers to make them aware of the cost of the
resources used by their business. This can be done with a real transfer of money (Full
Charging) or without (No Charging or Notional Charging).

TCO
Total Cost of Ownership, a method of calculating the cost of a product or service as
promoted by Gartner.

ROI
Return on investment (= average increase in profit / investment)

ROCE
Return on capital employed (= net profit before tax and interest / total assets less current
liabilities)

Availability Management
Introduction
Organisations are increasingly dependent on IT services, when they are unavailable, in
most cases the business stops as well. There is also an increasing demand for 7 days per
week 24 hrs a day availability of IT services.

It is therefore vital for the IT organisation to manage and control the availability of the IT
Services. This is done by defining the requirements from the business regarding the
availability of the IT services and then matching them with the possibilities of the IT
organisation.

- 128 -
Material do Curso de ITIL

Objective

The objective of Availability Management is to get a clear picture of business requirements


regarding IT Services availability and then optimise infrastructure capabilities to align with
these needs.

Or one can put it this way:

To ensure the highest availability possible of the IT services as required by the business to
reach its goals.

- 129 -
Material do Curso de ITIL

Process Description

Availability Management depends on a lot of inputs to be able to function well.

Among the inputs are:

• The requirements regarding the availability of the business

• Information regarding reliability, maintainability, recoverability and serviceability of


the CI’s

• Information from the other processes, Incidents, Problems, SLAs and achieved
service levels

The outputs of the process are:

• Recommendation regarding the IT infrastructure to ensure the resilience of the IT


infrastructure

• Reports about the availability of the services

• Procedures to ensure availability and recovery are dealt with for every new or
improved IT service.

• Plans to improve the Availability of the IT services

- 130 -
Material do Curso de ITIL
Key terminology and actions that form the basis of this process are:

Availability:
The availability and flexibility of components of the infrastructure. This is expressed in the
following formula:

A = (ST - DT)/ST x 100, whereby A - Availability, ST = agreed Service Time and DT =


Down Time.

Availability is defined as:

“Availability of a IT Service or component to perform its required function at a stated


instant or over a stated period’ (ITIL Service Delivery Book, OGC,2001)

Reliability:
The reliability of components of the infrastructure. In this case the Mean Time Between
Failures (MTBF) can be used as a measuring tool.

Reliability is defined as:

“…freedom from operational failure” (ITIL Service Delivery Book, OGC, 2001)

Resilience is a key aspect of reliability

Resilience is defined as:

“The ability of an IT component to continue to operate even though one or more of its sub
components has failed”

Maintainability:
The capability to maintain or restore a service or component of the infrastructure at a
certain level, so that the required functionality can be delivered. Some services or indeed
components of the infrastructure are easier to maintain and/or restore to service in the
event of a failure. For example, an application has been developed that requires daily
housekeeping to ensure its operation and a highly qualified Database Administrator can only
do this. This application is not easy to maintain. The maintainability of C.I.'s within the
infrastructure is an important consideration as the speed of recovery and the ease of
maintenance will impact the uptime and hence availability of services.

Operational Level agreements (OLA's) within the Service Level Management process tie in
here.

Note: Remember that C.I. = Configuration Item

Serviceability:
Serviceability refers to the agreements that are held with third parties providing services to
the IT organisation. These contracts will define how these external parties will perform to
ensure the availability of the services they interface with. For example, how will they
ensure resilience, how will they maintain the infrastructure they are responsible for.

Underpinning Contracts within Service Level Management tie in here.

Security:
This is divided into confidentiality, integrity and availability (CIA). It can be desirable (for
security reasons, which might endanger the availability) not to make certain components of
the infrastructure available, logically or physically.

- 131 -
Material do Curso de ITIL
Security is of great concern to most organisations these days and it is important to ensure
that IT services are made available to the organisation in a secure way. That means that
services and information is available to the right people. It is also important to ensure that
services are not so secure that it impedes that ability of the organisation to use these
services.

Activities

The activities within the process can be divided in three main activities, which will be
discussed in detail in the remainder of this chapter:

• Planning

• Improving

• Measuring and reporting

Planning

Planning involves the following activities:

Determine the Availability Requirements

It is important not only to find out the requirements but also to find out if and how the IT
organisation can meet these requirements. The Service Level Management process
maintains contact with the business and will be able to provide the availability expectations

- 132 -
Material do Curso de ITIL
to the Availability Management process. The business may have unrealistic expectations with
respect to availability without understanding what this means in real terms.

For example, they may want 99.9% availability yet not realise that this will cost five times
more than providing 98% availability, for their organisations infrastructure. It is the
responsibility of Service Level Management and the Availability Management process to
manage expectations.

Design

When considering the design of the infrastructure the IT organisation can either design for
“availability” or “recovery”.

Design for Availability

When the business cannot afford for particular service/s to have downtime for any length of
time designing the infrastructure for availability should be the approach. In this instance
the IT organisation will need to build resilience into the infrastructure and ensure that
preventative maintenance can be performed to maintain services in operation. In many
cases building “extra availability” into the infrastructure is an expensive task that must be
justified by business need.

Designing for Availability is considered a pro-active approach to avoiding downtime in IT


services.

Design for Recovery

When the business can tolerate some downtime of services or the cost justification cannot
be made for building in additional resilience into the infrastructure then designing for
recovery is the appropriate approach. In this approach the infrastructure will be designed
such that in the event of a service failure recovery will be as fast as possible. Spare part for
example will assist in the speedy of infrastructure components that fail.

Designing for recovery can be seen as more reactive management of availability.

The processes (like Incident Management) need to be in place to recover as soon as


possible in case of a service interruption.

Other Considerations

• Security issues

Define the security areas and the impact they might have on the availability of services.
Make sure it is clear who has access to what and where.

• Maintenance management

This is a maintenance window that is agreed upon and known to the customers in which the
IT organisation can do the maintenance and repairs. This way the impact on the IT service
of the maintenance and repairs will be reduced.

Improving

Developing the Availability Plan

- 133 -
Material do Curso de ITIL
The Availability Plan will look into the future (for example 12 months) and document what
measures will be put in place to ensure that the infrastructure and IT services will be
available to meet business requirements.

Input from monitoring and other processes, such as Service Level Management, will provide
the basis for decisions on what “availability” measures will be put in place. All plans must
be cost justifiable and aligned with business needs.

Measuring and reporting

This involves reporting about the availability of each service, the down times and recovery
times. These reports will often go to the Service Level Management process to use in
reporting comparisons (planned versus actual) on service levels back to the customer.

It is also important to measure and report on the perception of the customers on the
availability of the IT service.

You can use many ways to identify (un-) availability and potential problems. The following
are a few mentioned by the OGC:

CFIA
Component Failure Impact Assessment can be used to predict and evaluate the impact on
IT Service arising from component failures within the IT infrastructure.

FTA
Fault Tree Analysis is a technique that can be used to determine the chain of events that
causes a disruption to IT services.

CRAMM
CCTA Risk Analysis and Management Methodology can be used to identify new risks and
provide appropriate countermeasures associated with any change to the business
availability requirements and revised IT infrastructure design.

SOA
Systems Outage Analysis is a technique designed to provide a structured approach to identifying
the underlying causes of service interruption to the user.

Roles
The Availability Manager

The Availability Manager has a guiding role and has a general, yet sound knowledge of the
IT infrastructure. They will assemble and analyse data from processes like Problem
Management, Change Management, Service Desk and Capacity Management to assist in
management and planning with regard to availability.

Using the results of this data they steer other Service Management processes in order to
guarantee the agreed availability, thus helping to prevent problems. For example they may
attend Change Advisory Board meetings within Change Management.

- 134 -
Material do Curso de ITIL
The Availability Manager communicates their findings to the Service Level Manager and,
through that, makes an important contribution to the establishment of the SLAs. They
implement the policies of Security Management in relation to the security of data.

Relationships
The introduction of Availability Management without the other processes in place is likely to
fail, as without the support of the other processes it can’t deliver the agreed availability.

Incident Management and Problem Management provide a key input to ensure the
appropriate corrective actions are being progressed.
The measurements and reporting of IT availability ensures that the level of availability
delivered, meets the Service Level Agreement (SLA). Availability Management supports the
Service Level Management process in providing measurements and reporting to support
service reviews.

- 135 -
Material do Curso de ITIL

Benefits

The main benefit is:

Optimal use of the capability of the IT Infrastructure and delivering the availability of the IT
services that is according the agreed requirements of the customers.

Other benefits include:

• Constant striving to improve the availability

• Higher Customer Satisfaction

• In case of a disruption corrective action will be undertaken

• Higher availability of the IT service

- 136 -
Material do Curso de ITIL

Common Problems

As with every process there are some issues that need to be addressed as they can make or
break the success of the process.

For Availability management they are:

• Unclear requirements from the business regarding the availability expected of the IT
service

• No official contract is drawn up to specify the agreed availability of each service.


(Risk of conflict and arguments at a later stage)

• Commitment to the process

The business and the IT organisation must share a common understanding on the definition
of availability and the definition of downtime.

Metrics
By reporting on the following items the effectiveness and efficiency of the process can be
measured:

• The total downtime per service

- 137 -
Material do Curso de ITIL
• Time it takes to recover from an incident

• The availability of the services

• The improvement of the availability of the IT services

Note: Check the AV Essentials section for defined availability terms (eg. MTBF, MTTR, etc.)

Best practices
Interesting websites:

Assesment

http://www.itil.co.uk/online_ordering/serv_del_graphs/avail_mngt.htm

Essentials (terminology)

Down time:
The total period during which an IT service is not operational within the agreed service times.

Mean Time Between Failures (MTBF):


The average period between the first moment the service is fully operational and the moment that
this service is no longer operational.

- 138 -
Material do Curso de ITIL
Mean Time To Repair (MTTR):
The average period between commencement of an incident and its solution.

Mean Time to Restore Services (MTRS):


The average period between the commencement of an incident and the restoration of the service
delivery.

Fault, Failure:
The moment at which a functional unit no longer provides the required function.

High Availability
A characteristic of the IT Service that masks the effects of IT component failure to the user.

Continuous Operation
A characteristic of the IT operation that masks the effects of planned downtime to the user.

Continuous Availability
A characteristic of the IT Service that minimises or masks the effects of all failures and
planned downtime to the user.

- 139 -
Material do Curso de ITIL

Capacity Management
Introduction

The Capacity Management process is designed to ensure that the capacity of the IT
infrastructure is aligned to business needs.

The main purpose of Capacity Management is to understand and maintain the required level
of service delivery (via the appropriate capacity) - at an acceptable cost.

Through gathering business and technical capacity data this process plans for and delivers
the, cost justified, capacity requirements of the business. The Capacity plan is the core
document that describes how this will take place over the coming period.

Objective
The main objective of Capacity Management is to understand the business’s capacity
requirements and deliver against them both in the present and the future.

Capacity Management is also responsible for understanding potential advantages new


technology could have and assessing its suitability for the organisation.

- 140 -
Material do Curso de ITIL

Process Description

The Capacity Management process breaks down into three sub-processes listed below:

Business Capacity Management

This sub process has the focus on the long term. It is responsible for ensuring that the
future business requirements are taken into consideration then planned and implemented as
necessary.

Service Capacity Management

Is responsible for ensuring that the performance of all current IT services falls within the
parameters detailed as targets within SLA’s.

Resource Capacity Management

Is responsible for the management of the individual components within the infrastructure.
Resource capacity management has more of a technical focus.

- 141 -
Material do Curso de ITIL

Activities

Each of the sub process mentioned before involve, to a higher or lesser degree, the
following activities:

- 142 -
Material do Curso de ITIL
• Iterative Activities
• Storage of Capacity Management Data
• Demand management
• Application Sizing
• Modeling
• Capacity Plan
• Reporting

Iterative Activities

The following iterative activities take place within Capacity Management:

• Monitoring; checking if all the service levels are being met.


• Analysis; the data collected by monitoring needs to be analysed and predictions been
made for the future
• Tuning; implement the outcomes and results of the 2 previous steps to ensure
optimal use of the infrastructure for now and in the future.
• Implementation; to actual implement new capacity or changed capacity with Change
Management.

Storage of Capacity Management Data


The Capacity Database (CDB) is the cornerstone of the process. It is used to form the basis
of the reports for this process and contains technical, business and relevant information for
capacity Management. As well, the information contained here provides the other processes
with the data necessary for their analysis.

Demand management:
Demand Management is responsible for the management or workload in the infrastructure
to better utilise the current capacity rather than increasing capacity. User behaviour is
influenced to shift workload, for example to another time of the day to relieve capacity
shortages.

Application Sizing:
Application Sizing related to the assessment of the capacity requirements of applications
during their planning and development. The capacity requirements of a new application will
be understood and the infrastructure can be tuned as necessary to meet the new
requirements.

Modeling:
By simulation or with assistance of mathematical models modeling allows for the prediction
of future capacity requirements. The results from this can be used as an input into the
Capacity Plan.

Capacity Plan

Capacity Plan, this plan is drafted on the basis of data from the CDB (Capacity Database),
financial data, business data, technical data, etc. The plan is future oriented and covers a
period of at least 12 months.

Reporting

Reporting entails the reporting of capacity performance over any given period. Reporting
for example could be (but not limited to) against the capacity metrics in SLAs.

- 143 -
Material do Curso de ITIL

Roles

The Capacity Manager

The main responsibilities of the capacity manager are:

• To develop and maintain the Capacity plan


• Manage the process
• Make sure the Capacity database is up to date.

To do this, the manager must be involved in evaluating all changes, to establish the effect
on capacity and performance. This should happen both when changes are proposed and
after they are implemented. They pay particular attention to the cumulative effect of
changes over a period of time. The cumulative effects of single changes can often cause
degraded response times, file storage problems, and excess demand for processing
capacity.

Other roles within Capacity Management are the roles of the network manager, application
and system manger. They are responsible for translating the business requirements in to
required capacity to be able to meet these requirements and to optimise the performance.

- 144 -
Material do Curso de ITIL

Relationships
Capacity Management is part of Service Delivery and is directly related to the business
requirements. It is not simply about the performance of the system’s components,
individually or collectively.

Service Desk, Incident Management and Problem Management.

These processes will provide Capacity Management with information about incidents and
problems related to Capacity. Capacity Management will support the processes with solving
the incidents and or problems and also provide them with information about the capacity
performance.

Change Management and Release Management

Capacity Management activities will raise Request for Changes (RFC's) in order to ensure
that the appropriate capacity is available. These are subject to the Change Management
process, and implementation may affect several Configuration Items (C.I.'s), including
hardware, software and documentation, and will require effective Release Management.

Availability Management

The link between Capacity Management and Availability Management is strong, as the
availability that is needed requires a certain amount of capacity within the configuration
items. Without enough capacity, you will never have enough availability. Furthermore, the
values measured by Capacity Management are of importance to Availability Management in
relation to availability and reliability.

Service Level Management

Both Capacity Management and Availability Management need to provide the service level
manager with input for effective SLA negotiations. Capacity Management informs Service
Level Management about the result levels that can be provided to the client.

Financial Management

The drafted capacity plan delivers important input for Financial Management, which on this
basis can draft a very accurate investment plan capacity Management gets information in
return about the available budget.

IT Service Continuity Management

Capacity Management provide ITSCM with the information about the minimum required
Capacity needed for recovery. It is important to consider the impact (for needed capacity)
of changes to the IT services on the ITSCM procedures.

- 145 -
Material do Curso de ITIL

- 146 -
Material do Curso de ITIL

Benefits

Implementation of Capacity Management offers the following benefits:

• An actual overview of the current capacity in place

• The possibility to plan capacity in advance.

• Being able to estimate the impact of new applications or modifications

• Cost savings

• Better service that is in tune with the requirements of the Business.

Common Problems

Common problems that can be encountered while the process is already implemented
include:

- 147 -
Material do Curso de ITIL
• Capacity information from suppliers is not available or is too general and can be
misleading for infrastructure components.

• The expectation to what Capacity Management can do is over estimated. If an


application is poorly designed, more capacity won’t fix the problem.

• The detail of monitoring can be to deep causing the process to be too expensive.

• Information is difficult to obtain. It is not always easy to predict what future capacity
is required before you build an application.

Note: This final point is important. All too often end users and customers are interviewed at
length about their expected capacity requirements, only to demand more as soon as the
new application goes live. It is up to the IT professionals to have built in the ability for the
application to scale to match any new requirements.

Metrics

To verify if the process is operating within it goals one should check:

• If the forecast is in line with the actual demand at that time?

• If the Capacity plan is correct?

- 148 -
Material do Curso de ITIL
• Are the requirements being met?

• Is capacity not a cause for the breach of Service Levels, Incidents or Problems?

• Are ad hoc expenses being reduced because better planning is in place?

• Performance against SLAs

Best practices

Why a Capacity Plan?

With cheap hardware prices, capacity planning may seem unimportant; you can always
upgrade later. A simple guess of the capacity requirements should be sufficient, right? Why
give this subject any more thought?

There are two main issues that make capacity planning critical.

The first is the rate of technical change. We now measure progress in "Internet years" --
equivalent to about 90 days of a calendar year.

The second is with Internet/Intranet at the helm. Today’s systems are primarily being
developed within a 3-tier architecture. This rapid change, coupled with the increase in
complexity of 3-tier architecture, is causing system designers to pay closer attention to
capacity. Five years ago, a designer could roll out a new system with a rough estimate of
capacity and performance. The system could then be tuned or more capacity added before
all of the users had been converted to the new system. The process was reasonable
because the systems were typically not mission-critical.

Today, there’s no time for this approach. Once systems are in place they become an
integral part of the overall design. Downing the system for upgrades becomes increasingly
expensive in both time and resources. In addition, the added complexity of the environment
typically requires more care, due to the interdependency between various application
components.

Capacity planning is driven purely by financial considerations. Proper capacity planning can
significantly reduce the overall cost of ownership of a system. Although formal capacity
planning takes time, internal and external staff resources, software and hardware tools, the
potential losses incurred without capacity planning are staggering. Lost productivity of end
users in critical business functions, overpaying for network equipment or services and the
costs of upgrading systems already in production more than justify the cost of capacity
planning.

Interesting websites:

http://www.capacityplanning.com/

Assessment

- 149 -
Material do Curso de ITIL
http://www.itil.co.uk/online_ordering/serv_del_graphs/capacity_mngt.htm

White Papers

http://www.interpromusa.com/ASPs and Application Performance Mgmt.pdf

http://www.iccmforum.com/iccm.asp?r=Capacity&s=CPUResource

Tools

http://regions.cmg.org/regions/cmgarmw/shortarm.html

http://www.iccmforum.com/iccm.asp?r=Tutorial&s=Benchmarks&t=Standard

http://www.iccmforum.com/iccm.asp?r=Tutorial&s=Benchmarks&t=ZiffDavis

Essentials (terminology)

Capacity Plan,

A plan that is drafted on the basis of data from the CDB, financial data, business data, technical data, etc. The plan is
future oriented and looks forward for a period of at least two years.

Performance Management

This is the monitoring of results, signaling of trends, analysis of information and tuning (e.g. by spread of
workloads).

Workload Management

The identification and registration of use of resources of each workload and the detection of peaks and patterns.

Resource Management

The optimisation of the use of resources.

- 150 -
Material do Curso de ITIL

IT Service Continuity Mgt


Introduction

There are still quite a few managers that see IT Service Continuity Management (ITSCM) as
a luxury for which they do not have to allocate any resources. However, statistics show that
disasters regularly occur. Causes of such disasters are events like fire, lighting, flood,
burglary, vandalism, power failure or even terrorist attacks. Thinking about - and actually
establishing - a Business Continuity Plan could have saved affected companies a lot of
troubles or even their business itself.

As businesses are becoming increasingly dependent on IT, the impact of the unavailability
of IT Services has drastically increased. Every time the availability or performance of a
service is reduced, the users cannot continue with their normal work. This trend towards
dependency on IT will continue and will increasingly influence users, managers and
decision-makers. That is why it is important, that the impact of a total or partial loss of the
IT Services is estimated and Continuity Plans established to ensure that the business will
always be able to continue.

Objective
The objective of the ITSCM process is to support the overall Business Continuity
Management (BCM) process by ensuring that the required IT technical and services facilities
can be recovered within required and agreed business time-scales.

- 151 -
Material do Curso de ITIL

Process Description
ITSCM is concerned with managing an organisation’s ability to continue to provide a pre-
determined and agreed level of IT services to support the minimum business requirements,
following an interruption to the business. This includes:

• Ensuring business survival by reducing the impact of a disaster or major failure.

• Reducing the vulnerability and risk to the business by effective risk analysis and risk management.

• Preventing the loss of Customer and User confidence.

• Producing IT recovery plans that are integrated with and fully support the organisation’s overall Business
Continuity Management (BCM) Plan.

ITSCM should be closely aligned with and driven by the overall BCM process, as a sub-set of
this process. BCM manages risks to ensure that the organisation can continue to operate at
a specified minimum level in case of a disaster. ITSCM is focused on the IT Services and
ensures that the minimum of IT Services can be provided in case of disaster. One won’t
work with out the other.

If the BCM process has a solid plan to evacuate part of the business process and continue
to work in a separate building, but there is no IT infrastructure ready, the plan is of no use.
The same apply if you do have plans which enable the IT organisation to provided the IT
Service elsewhere if the business process can’t be continued because there’s is no
contingency plan in place for that.

- 152 -
Material do Curso de ITIL

The process can be divided in 4 stages, which will be described in the next chapter in detail:

• Initiation

• Requirements and strategy

• Implementation

• Operational Management

- 153 -
Material do Curso de ITIL

Activities

Each of the stages has its own activities, which will be described in more detail throughout this
chapter.

Initiation

• Initiate BCM

The initiation process covers the whole of the organisation. The policies around BCM and
ITSCM are defined, the scope of the process and the terms of reference determined,
resources allocated and a project plan established.

Requirements and strategy

• Business Impact Analysis

The impact of a disaster on the business will be investigated. Questions that can be asked
are: Can the business still operate in case of a disaster? For how long can it survive? Does it
rely on the IT services to be able to operate?

How much the organisation stands to lose as a result of a disaster or other service
disruption and the speed of escalation of these losses will be assess by:

o Identifying the critical business processes

- 154 -
Material do Curso de ITIL
o Identifying the potential damage or loss that may be caused to the
organisation as a result of a disruption to critical business processes.

• Risk Assessment

This activity analyses the likelihood that a disaster or other serious service disruption will
actually occur. This is an assessment of the level of threat and the extent to which an
organisation is vulnerable to that threat. Risk Assessment consists of two parts:

o Risk Analysis is focused on identifying the risks by analysing the


vulnerabilities of and the threats to all critical assets.

o Risk Management is about identifying countermeasures to keep those risks


under control. These can either be actions to reduce the impact or likelihood
of the risk, or the development of plans (Recovery Plans), which detail how to
handle when the risk eventuates.

• Business Continuity Strategy

An appropriate strategy needs to be developed with contains an optimal balance of risk


reduction and recovery options. The actual balance will very much depend on the nature of
the business and the dependency on IT Services (e.g. a stockbroker will focus on risk
reduction, while the local bakery can probably afford the time involved in recovering a failed
system).

In case of a Recovery Plan decisions have to made on how to recover. The options are:

- 155 -
Material do Curso de ITIL
o No contingency.
This choice can be made if a risk analysis suggests that the failure of (a part
of) the IT service delivery does not irretrievably affect business. It may be
sensible however, to confirm in writing, that in case of a calamity no concrete
contingency plan is available.

o Administrative procedures.
If the infrastructure is no longer available, a switch is made to administrative
procedures. Disadvantage is, that when the availability of the IT
infrastructure is restored a catch-up activity must be performed.

o Fortification strategy.
In this approach, one chooses a security method where, in fact, nothing can
happen. The costs of such are high and if, despite this, something does go
wrong, no alternatives are available.

o Reciprocal agreements.
In the case of a calamity, organisations make (parts of the) infrastructure
available to each other. Disadvantage is reciprocal dependency and
confidentiality of data.

o Gradual Recovery (Cold stand-by) permanent or portable.


In this strategy the organisation itself has a space available with
infrastructure such as electricity, telephone connections and air-conditioning,
where appliances can be "brought in", after which the service level can be
restored. This space could also be located or erected on site (Porto cabin).

o Intermediate Recovery (Warm stand-by) internal/external/mobile.


In this scenario a completely fitted evacuation facility is available, hired, or
brought in. Examples are the Computer Evacuation Centre or the IBM truck.
The last option is only feasible for mid range systems. The internal warm start
means having an evacuation facility available within the organisation.

o Immediate Recovery (Hot stand-by).


This is normally an extension of the Intermediate Recovery options provided
by third party suppliers. This usually covers extremely critical services that
can affect the survivability of the organisation or, at least such an impact that
would stop the organisation from making money or other significant long-
term effects.

Implementation

• Organisation and implementation planning

Several plans need to be set up in order to be able to Implement the ITSCM process. These
plans address issues like, emergency procedures, damage assessment, what to do with
data, recovery plans etc.

• Implement stand-by arrangements and risk reduction measure

The risk reduction measures need be implemented. In most cases this will be done with
help of the Availability process. Also stand-by procedures will have to be put in place. For

- 156 -
Material do Curso de ITIL
example setting up an agreement with a third party to supply goods in case of a disaster
without having to go through the proper channels.

• Develop ITSCM plans and procedures

The Recovery Plan (or Continuity plan) has to be set up. The plan should cover at least the
following subjects:

o How it is going to be updated

o Routing list to specify which section has to go to which group?

o Recovery initiation

o Specialist sections to cover the actions and responsibilities of these sections


individually. Sections are Administration, IT infrastructure, personnel,
security, recovery sites and restoration.

• Perform initial testing

Testing is a critical part of the overall ITSCM process and is the only way of ensuring that
the selected strategy, stand-by arrangements, logistics, business recovery plans and
procedures will work in practice.

Operational Management

• Education, training and awareness

These are essential issues that need to be taken care of in order for the ITSCM process to
be successful. This ensures that all staff are aware of the implications of Business Continuity
and of IT Service Continuity and consider these as part of their normal working routine and
budget.

• Review and audit

It is necessary to review and audit the plans on a regular basis to make sure they are still
up to date.

• Testing

By testing on a regular basis not only can the effectiveness of the plan be tested but also
people will know what happens, where the plan is and what is in it.

• Change Management

- 157 -
Material do Curso de ITIL
Following tests and reviews and in response to day-to-day Changes, there is a need for the
ITSCM plans to be updated. ITSCM must be included as part of the Change Management
process to ensure that any Changes to the IT infrastructure are reflected in the contingency
arrangements provided by IT or third parties.

• Assurance

The quality of the process is verified to assure that the business requirements can be met
and that the operational management processes are working satisfactorily.

Roles
A distinction can be made in roles and responsibilities in and outside crisis times. Different
levels within this process can be defined, starting with the board followed by senior
management, management, team leaders and their team members. It is vital to document
the responsibilities of each and every role.

The main responsibilities of the ITSCM manager include:

• Develop and manage the ITSCM Plan to ensure that, at all times, the recovery
objectives of the business can be achieved.

• Ensure that all IT Service areas are prepared and able to respond to an invocation of
the Continuity Plans.

• Maintain a comprehensive IT testing schedule.

• Communicate and maintain awareness of ITSCM objectives within the business areas
supported and the IT Service areas.

• Manage the IT Service delivery during times of crisis.

Relationships
ITSCM has a close relationship with all the other ITIL processes and the business in general.
The relationship with some of the processes is described in more detail.

Service Level Management

Service Level Management provides the ITSCM process with information about the required
service levels.

Availability Management

Availability Management has more a supportive role and helps the ITSCM process to prevent
and reduce the risk of disasters by delivering / implementing risk reduction measures.

- 158 -
Material do Curso de ITIL
Configuration Management

Configuration Management provides information about Configuration Items that are needed
in order to be able to restore the IT service after a disaster.

Change Management

Change Management needs to make sure that the ITSCM is aware of the impact of the
Changes on the Continuity and Recovery Plans, so the plans are updated if necessary.

Capacity Management

Capacity Management makes sure the appropriate infrastructure can support the business
requirements.

Service Desk & Incident Management

Service Desk in combination with Incident Management provides the ITSCM process with
historical data (statistics).

Benefits

- 159 -
Material do Curso de ITIL

ITSCM supports the BCM process and delivers the required IT Infrastructure and Services to
enable the business to continue to operate following a service disruption. The main benefits
of implementing the ITSCM process are:

• Management of risk and the consequent reduction of the impact of failure.

• Potentially lower insurance premiums

• Fulfillment of mandatory or regulatory requirements

• Improved relationships between the business and IT through IT becoming more


business focused, and more aware of business impacts and priorities.

• Increased Customer confidence, possible competitive advantage and increased


organisational credibility.

In case of an actual disaster the process has the following benefits:

• Reduced business disruption, with an ability to recover services efficiently in business


priority order.

• Recovery will take place in less time

• More stable IT infrastructure and a higher availability of the IT Services

Common Problems
A few of the problems one can encounter while implementing the ITSCM process are:

• Not enough resources to set up and run the process properly.

- 160 -
Material do Curso de ITIL
• The ITSCM is not based on the BCM.

• No enough commitment from senior IT and business management.

• Overlooking critical components, applications, and dependencies, and misinterpreting


business impacts.

• Recovery isn’t working,due to lack of testing.

• Lack of awareness and support of the users and the IT personnel causing the process
to fail in case of a disaster.

Metrics

During normal operation one can report on:

• The results of testing the plan

• Costs of the process

- 161 -
Material do Curso de ITIL
During/after a disaster one can report on:

• Weaknesses in the plan

• Time that it took to recover versus estimate time

• Losses due to the disaster

Best practices

Interesting websites:

http://www.globalcontinuity.com/

http://www.microsoft.com/technet/itsolutions/idc/oag/oagc20.asp

http://www.iccmforum.com/iccm.asp?r=Tutorial&s=Benchmarks&t=ZiffDavishttp://www.disasterrecoveryworld.com/

Whitepages

http://www.interpromusa.com/IT Service Continuity Mgmt.pdf

Assesment

http://www.itil.co.uk/online_ordering/serv_del_graphs/itserv_cont.htm

Essentials (terminology)

Business Continuity Management (BCM)


BCM is concerned with managing risks to ensure that at all times an organisation can
continue operating to, at least, a pre-determined minimum level. The BCM process involves
reducing the risks to an acceptable level and planning for the recovery of business
processes should a risk materialise and a disruption to the business occur.

IT Disaster
The unavailability for a longer period of time of IT Service provision which makes in
necessary to switch to an alternative system and for which the actions to be taken are not
part of a daily routine.

Business Recovery Plans


Documents describing the roles, responsibilities and actions necessary to resume business
processes following a business disruption.

Disaster Recovery Planning


A series of processes that focus only upon the recovery process, principally in response to
physical disasters that are contained within BCM.

- 162 -
Material do Curso de ITIL
Gradual Recovery (Cold Stand-by)
This is applicable to organisations that do not need immediate restoration of business
processes an can function for a period of up to 72 hours, or longer, without a re-
establishment of full IT facilities.

Intermediate Recovery (Warm Stand-by)


Typically involves the re-establishment of the critical systems and services within a 24-72
hour period, and is used by organisations that need to recover IT facilities within a
predetermined time to prevent impacts to the business process.

Immediate Recovery (Hot Stand-by)


Provides for the immediate restoration of services following any irrecoverable incident.

Stand-by arrangements
Arrangements to have available assets which have been identified, as replacements should
primary assets be unavailable following a business disruption. Typically, these include
accommodation, IT systems and networks, telecommunication and sometimes people.

Vulnerability
A weakness of the system and its assets, which could be exploited by threats.

- 163 -
Material do Curso de ITIL

Security Management

Introduction

Everyone has heard about the impact a virus can have on a business.

Names as the Kournikova virus, Nimda and the Trojan Horse does ring bells about the
vulnerability of our Business and the reliability of the businesses on IT services,

The following example of a different nature occurred recently in The Netherlands.

A national event would take place, which would attract a lot of attention. The event was
the life chat session with Prince Willem Alexander and his fiancé Maxima on the Internet.
The main telecom provider in the Netherlands provided it and they bragged about how they
could ensure the availability and the high performance of the event.

A group of activists thought this was the time to show the country how vulnerable even the
big companies are by hacking in to the systems, causing the servers to go down and so
interrupting the life chat session for a period of time.

In this case no harm was done but if they had bad intentions they could have easily caused
a lot of damage

In both cases there is a risk of information being damaged or misused due to a breach in
security or lack thereof.

- 164 -
Material do Curso de ITIL
The security of Information is a key management concern in the modern, electronic
business world. In order for companies to maintain their competitive edge, business
decisions must be based on accurate, complete and accessible information.

According to BS 7799, Security of information refers to the preservation of:

 Confidentiality - Ensuring that information is accessible only to those authorised


to have access.

 Integrity- Safeguarding the accuracy and completeness of information and


processing methods.

 Availability– Ensuring that authorised users have access to information and


associated assets when required.

The degree to which these aspects are preserved must be based on the business
requirements for security. This can be properly understood through accurate risk and impact
analysis. Security management is concerned with addressing activities that are required to
maintain risks at a manageable level.

Objective

The objective of Security Management is twofold:

• To ensure that it complies with the external requirements of, legislation regarding
privacy, insurance policies, and the SLA’s.
• To create a secure environment regardless of the external requirements

- 165 -
Material do Curso de ITIL

Process Description

The process of Security Management is a flexible one and needs to be reviewed continuously to ensure that it is still
up to date. It therefore should, plan, do, check and act in a continuous cycle.

The activities of Security Management are undertaken either by the process itself or by
other processes under the control of Security Management.

Activities

- 166 -
Material do Curso de ITIL
The following activities are part of the security management process:

o Control
o Plan
o Implement
o Evaluate
o Maintenance
o Reporting

Control

In this process the basics for the Security Process are laid out. This includes among others; describing the roles and
responsibilities, description of the sub processes, the Security plan and the implementation thereof and selecting the
tools.

Plan

This sub process will plan the security sections of the SLA’s with Service Level Management. It also includes
addressing the Security sections in the Under Pinning Contracts (UPCs) and the operational level agreements.

Implement

Implementation of all the security measures is the aim of this sub process.

Evaluate

It is necessary to evaluate the implementation of the security measures to see if they are
effective. Regular audits also need to be done to ensure that the process is working
efficiently en effectively.

Maintenance

The maintenance of the security aspects of the SLA’s and the maintenance of the security
plan are the responsibilities of this sub process.

Reporting

Main things that will be reported are:

• Security incidents
• Results of audits
• Performance of security tests
• Identification of incident trends

Roles
In most cases there will be only the Security Manager however in very large organisation
there may be more persons involved in the process.

The security manager is responsible for implementing and maintaining the process. The
Security Manager has close ties with the Business Information Security officer

- 167 -
Material do Curso de ITIL

Relationships
The Security Management process has links with all the ITIL processes. Each process
carries out one or more of the activities of Security Management. Although the
responsibilities for these actions are still within the separate processes Security
management provides the input for the activities.

Service Level Management provides information about the required service levels and
receives input about the achieved levels.

Configuration management: The CMDB contains the information about the C.I.’s. Every
C.I. should be classified indicating the required availability, integrity and confidentiality,
which will determine the level of security that is required.

Incident and Problem Management: Incident Management records incidents regarding a


breach of security levels and the cause is investigated and resolved by Problem
Management.

Change Management implements the changes, which ensure security or enhance it. On
the other hand they need to address the security issues for every change. In most cases the
Security Manager will be part of the CAB.

Availability Management is supported by Security Management in the way that the


measures to increase security result in a higher availability of the IT services.

Benefits

Benefits of implementing Security management are:

• Information that is vital to the business is kept secure


• Higher availability of the Information
• Quality of information that goes outside the business is increased.

- 168 -
Material do Curso de ITIL

Common Problems

The following issues may cause problems:

• Commitment: extra rules and regulations are most likely to generate resistance
rather than appealing to end users.
• Attitude. Most security issues are caused by human errors. Quite often this is due to
complacency.
• Verification. It needs to be possible to check if the security measures are working if
they are there for the right reasons
• Changes. Over time the security aspect of changes might not get as much attention
as is needed.
• Awareness. As with every other process it is important to communicate with the
organisation to gain the cooperation of the business.

Metrics
The metrics of this process are similar to the ones of Service Level Management but focus on the security aspect.

• Is the security aspect covered of the services in the SLA’s?


• Do the services within the SLA’s have the necessary security aspects covered in the
UPC’s and or OLA’s?
• Is there an improvement in the Security levels?
• Are the actual Security Levels measured?
• Is the perception of the IT organisation improving?

- 169 -
Material do Curso de ITIL

Best practices
http://www.securitymanagement.com/

http://www.ismanet.com/

Also....To Outsource or not to outsource?

The challenge to meet security requirements, to prevent such disastrous impacts, is


becoming more overbearing to organisations. Outsourcing security management could offer
the solutions.

The key questions faced by any organisation are:

 Should they keep the responsibilities of information security in-house?

 Should they develop and train their own IT staff?

 Should they develop their own security policies?

Or

Should they contract such services to an outsourcing specialist who is using the latest
available technology, tools and expertise to offer the most efficient service?

The decision to outsource Security Management needs to be weighed carefully as this highly
debatable decision has both pros and cons.

Essentials (terminology)
Confidentiality

Ensuring that information is accessible only to those authorised to have access.

Integrity

Safeguarding the accuracy and completeness of information and processing methods.

Availability

Ensuring that authorised users have access to information and associated assets when
required

Privacy

Confidentiality and integrity of information relating to individuals

- 170 -
Material do Curso de ITIL

Verifiability

Being able to verify that the information is used correctly and that the security measures
are effective.

Conclusion
In recent years, IT Service Management has developed into a field in its own right.
Organisations are now so dependent on the automation of large parts of their business
processes that the quality of IT services and the synchronisation of these services with the
needs of the organisation are now essential to their survival.
This introduction to IT Service Management aims to provide a thorough introduction to the
field. It not only provides a convenient introduction to the books in the IT Infrastructure
Library (ITIL), but also serves as the first step to prepare for the Foundation Certificate
exam in IT Service Management.

It contains a wealth of practical experience collected by the editorial board. It is based on


the latest edition of the ITIL books on Service Support and Service Delivery.

This course aims to provide an effective introduction to the dynamic area of IT Service
Management, and will be useful even for those not preparing for the exam. However, it does
not pretend to have the answers to all the questions that arise in a field so multifaceted as
IT Service Management. Instead, it aims to encourage discussions and to compare the best
practices with the learner's own experience.

We expect that this course will fulfill a clear need, and it deserves not just to be read and
studied, but also to be used wisely in practice.

Gerard Blokdijk, Managing Director The Art of Service

Further reading

There are a wide variety of topics available as additional reading in this area. Searching
using any internet search engine for topics like "ITIL" and "IT Service Management" will
return good results.

Also, visit the ITIL Bookstore:


https://secure3.websitecomplete.com/itsmdirect/shop/showDept.asp?dept=22

ITIL web sites

OGC/CCTA http://www.ogc.gov.uk
EXIN http://www.exin-exams.com
ITSMF http://www.itsmf.com
ITIL http://www.itil.co.uk3

- 171 -

You might also like