You are on page 1of 84

ITIL Essentials for

IT Service Management

1
The Philosophy of Service
Management

IT is the business
And
The business is IT

2
Triple P

To let the philosophy work, we


need:
• People
– Customers, Users, IT Staff & Top
-Management
• Processes
– ITIL
• Products
– Tools and IT technology

3
IT Process

Decision Making Level: ITIL definition (s)

Objective Result

Activities

Operational Level

Department X Department Y Department Z

Input Output
Process

4
Deming Quality Circle

Maturity Continuous
Step by step
improvement
Act Plan

Check Do Plan (Project Plan)


Do (Project)
Check (Audit)
lity Act (New actions)
a
Qu

Time Scale

5
The Objective of Service
Management
• Align IT services in such a way that
they will always meet the business/
organization needs which will change
in time
• Quality Improvement of the IT
services Provided
• Reduce long-term costs of the IT
services provided
Service Management: is the delivery of customer-focused IT
services, by using a process-oriented approach/ Method
6
ITIL (CCTA’s) Reference Model

IT Customer Release Management


Service Support
Relationship
Management Change Management
Problem Management
Configuration Management
Incident Management

Capacity Management
Service Level Management

Financial Management IT Service Service


for IT Services Continuity Management Desk

Availability Management
Service Delivery
Security Management

7
ITIL Certification Program

Service
Delivery
Serv ic e
Case
Mg t. 2 Studies
Service
Service Mgt. 1 Support

ITIL Pr act itio ner s :


-Configuration Management
-Service Desk + Exam
-Problem Management
-Change Management
-Capacity Management
-Availability Management
-Financial Management For IT Services
-Service Level management

IT IL Fou nd ati on (3 -d ay
Cour se)

8
ITIL in a Nutshell (1)
Bridge

IT Business

GAP

9
ITIL in a Nutshell (2)
Bridge =SLM Bridge =SLM

Supplier IT Business
UC’S OLA’s SLA’s

GAP GAP

10
ITIL in a Nutshell (3)
Bridge =SLM Bridge =SLM
$ Pricing Service

Supplier IT Business
UC’S OLA’s SLA’s

GAP GAP
$ Charging
Service
Service
11
ITIL in a Nutshell (4)
Bridge =SLM Bridge =SLM
$ Pricing
$
Service

Profit

Supplier IT Business
UC’S OLA’s SLA’s

GAP GAP
$ Charging
Service
Service
12
ITIL in a Nutshell (5)
Bridge =SLM Bridge =SLM
Service
$ Pricing Service

Profit

Supplier IT Business Suppliers


UC’S OLA’s SLA’s

GAP GAP $
$ Charging Pricing
Service
Service
13
 Goals of Configuration
Management

• Is to Provide information on the total IT


Infrastructure for:
– ITIL processes
– (IT) Management
• Keep in control of the IT infrastructure by
monitoring, maintaining and updating
information on:
– All the resources needed to deliver
services
– Status and history of the
Configuration Items(=CI’s)
– Relationships of the CI’s 14
Configuration Item (CI)

•A Configuration Item is:


– needed to deliver service
– uniquely identifiable
– subject to change
– Can be managed

15
Assets versus Configuration
Items
• Asset
– Element/ part of a business/ Organization
process
• Configuration Item (CI)
– Element/ part of an IT infrastructure - or an
item associated with an IT infrastructure
which is under the control of Configuration
Management
• Configuration Management Database (CMDB)
– A database, which contains all relevant
details of each CI and details of the important
relationships between CI’s
NOTE:
A CMDB contains RELATIONSHIPS
BETWEEN CI’s , DOCUMENTATION and
goes much further than an Asset DB
Tool 16
Configuration management
Process

Plannin
g Configuration
Identification/
verification Items =(CI’s)
Register & Recoding of CI’s
Service
Status s
Environmen
Accounting t
Controlling & HW/ SW
Updating
Auditin Detail
Documentatio
g
(Attributes) CMDB n
Procedure
s
Processes
Contract
Scope s
SLA’s, OLA’s UC’s
(Category) WI (= Work
Instructions)
Manuals
Relationships between
CI’s
Baseline Models
17
How to Determine IMPACT of
Incidents through the
Relationships between the
CI’s
Po ea
br
w k
er

DB

Virus Scanners

Backup Security

os
18
Baseline

• Configuration Baseline
– Configuration of a product or system
established at a specific moment in time,
which captures both the structure and details
of the product or system

– A snapshot or a position, which is recorded.


Although the position may be updated later,
the baseline remains unchanged and available
as a reference of the original state and as a
comparison against the current position

19
Detail of the CMDB

Pl
a nn
ed

O
rd
er
ed
In
Te
st

In
Pr
od
uc
ti o
Br n
Status of CI’s

ok

Scope of the CMDB


e
Do
w
n
In
M
ai
nt
Life Cycle of a CI

en
an
In ce
Re
pa
… ir



Ar .
20

ch
iv
ed
 Goals of Incident Management

• To restore the normal service operation(s)


as quickly as possible according to the
agreed SLA’s
• Minimize the impact on business operations
• Ensuring that the best possible levels of
service quality and availability are
maintained according to the existing SLA’s
• Managing Incidents and Service Request’s
from beginning till end and communicate
about them till the moment they can be
closed
21
Service Desk in an ITIL
Environment
• A more structured approach to controlling
incidents
• Single Point Of Contact (=SPOC)
• The face of the IT organization
• Not a process but a functionality in the ITIL
Methodology
• Initiating escalation procedures
• Reports of different types arrive at the Service
Desk (= Service Requests & Incidents)
• Responsible for supplying first-line support and
assistance in daily use of IT Services
• Local, Centralized & Virtual Service Desk(s)=
Structures!
22
Terminology
• Incident
Any event / interruption, which is not
part of the standard operation of a
Service or causes a reduction in the
quality of that service
• Work-Around
Method/ temporary solution of avoiding
an Incident, so that the normal standard
operation can continue
• Service Request
Every Incident not being a failure in the
IT Infrastructure (=Password
redefinition) 23
Incident Management (=IM)
Process
Incident/ SRQ

Incident Management
Service Users
Desk =SPO
Incident Detection and recording
C
Classification of Incident(s) & Service Request(s)
- Impact
- Urgency
Prioritization
* High
* Medium CMDB Knowledge out of
* Low Configuration Management
Categorization
- Hardware
- Software
24
Service Requests are dealt within SRQ
procedures
Outstanding Incidents DB Knowledge out of
Matching of Incidents
K.E. / Workarounds DB Problem Management
Problem DB
Routing Incidents
1st Line-Support
2nd Line-Support
3rd Line-Support

Escalation

Inform / Support
(vertical Service
Desk
escalation)

Knowledge (functional/horizontal escalation)


25
 Goals of Problem Management

• To make sure that we minimize the


operational impact of Incidents and
Problems, which are caused by errors
within the IT Infrastructure

• To prevent repeated Incidents from


happening again, which are related to
errors

• To Improve productive use of (IT)


resources, by knowing how to use them
(Knowledge DB)
26
Terminology
• Problem
– When the root cause (=underlying
cause) of one or more incidents is not
known
• Known Error
– A condition that exists after the
successful diagnosis of the root cause
of an Incident or Incidents, when it is
confirmed that a CI is at fault. (We
can remove the error by
implementing a change)

27
Problem Management Process
(1)
Service
Escalation of
Incidents Desk

Problem
Management

Recording Escalated Incident(s)


Assign Resources

Establish Workaround first

Problem Record through PM Sub-


Processes
28
Sub-Processes Problem
Management (2)
Escalation Escalation

1 Problem
Record 2 Known
Error
Record

Identification and Error


Problem Control registration Error Control Identification and
Recording

Classification

Fi Solu
Error Assessment

nd
Fi

Assigning

“B n
Resources
nd use

Recording Error
RFC
Ca

Resolution (RFC)
ES
tio
Ro

Investigation
and Diagnosis T” Successful completion
ot

Error (Record) Closure


Establish
Known Error

29
From Reactive  Proactive
Problem Management Prevention of
problems
on/ in IT-
Infrastructure

Monitor
Change
Managemen
t

Initiating
changes:
• Fix Incidents
• Control RFC

Identify trends/ trend


analysis

Problem
identification
& diagnosis

Delivering
(2nd) & 3rd
line support

30
 Goals of Change
Management

To implement changes which are


approved and authorized by change
management and which are proven
efficient & effective, so that they can
be implemented with
acceptable risk in the existing
IT-Infrastructure, or to the new IT
Service(s)

31
Terminology
• Change
The addition of…, the modification of…,
or the removal of…, approved and
supported CI’s or baseline CI’s
• Request for Change
Form use to record details of a request
for a change to any CI; can be submitted
from each single ITIL Process
• Forward Schedule of Changes
Schedule that contains details of all the
Changes authorized for implementation
and their proposed implementation
dates. It also shows the dependency of
each change!!!
32
Impact of a Change

• Standard
The change may be executed without contacting the
Change Manager (Manual with standard Changes)

• Category 1
Small Business impact on the Services. The Change
Manager is entitled to authorize this RFC

• Category 2
Medium Business Impact on the services. The RFC must
be discussed in the CAB. The Change Manager
requests advice on authorization and planning

• Category 3
Large Business Impact on the services. Management is
involved in the decision process
33
Priority of a Change

• Urgent
Change necessary immediately, approval by
CAB/Emergency Committee (CAB/CEC)

• High
Change needed as soon as possible

• Medium
Change will solve annoying errors or missing
functionalities (can be scheduled)

• Low
Change leads to minor improvements (which is not
contractually necessarily)
34
Change Management Process

Entering
Projec Change
t Managemen
t Process
Change Manager does Registration & RFC’s
Classification of RFC’s

Verification

Approval /Refusal Built Phase


by CAB (Change
Planning &
Advisory Board)
Controlling
the Project

Roll Out Test Phase


Back- of Roll
Implementa Authorization /Refusal for Back &
Out
tion Implementation by the Change Project
35
Manager
Periodic Audit within Change
Management

P.I.R

Audit Carried out by External


(independent) Organization

36
The Change Advisory Board
(CAB)

Change Manager (Chair Service Level


Release Manager Man) Manager

A
A R
A
Financial Manager

Incident
Manager

Business
Representation
User /Dept.
Problem Manager Configuration Manager
Manager

37
Clarification

Change
Manager
Release
Manager

38
 Goals of Release Management

• Plan and Manage the rollout of SW & HW


• Design and implement efficient & effective
procedures
• Manage customer expectations during
rollout
• Agree upon the content and rollout plan for
a release
• To implement new software & hardware
releases into the production environment
• Secure all software masters in the
definitive software library
• Use the configuration management process
to ensure that all hardware and licensed
software which has been rolled out is 39
changed in the CMDB, secured & traceable
Definitive Software Library
(DSL)
Protection
of all Authorized
Software Versions

Base for
Releases One or More
Physical
File Stores
DSL
Linked Logical
with CMDB Storage

Distribution

40
Definitive Hardware Store
(DHS)
Protection
of Hardware
Spares and
Components
Spares for
Recovery

DHS
Linked
One or More
with CMDB
Physical
File Storages
Components
for Changes

41
Form of Releases

Full, Package
And Delta Release

Emergency
Release
Release Unit

Release
policies Version
Numbering
Release
Frequency

42
 Goals of Capacity Management

To determine the right Capacity,


against the right costs and
justifiable considerations of IT
resources. So that the agreed
Service Levels with business are
achieved at the right time and at the
right moment.

43
Capacity Management Process
Demand Management (INPUT)

Business Service Resource


Capacity Capacity Capacity
Management Management Management

Capacity
Database
(INPUT)
Capacity
Plan
44
Sizing and Modelling

• Application Sizing
Determining the hardware capacity required to
support new (or adapted) applications,
according to the agreed SLA’s

• Modelling
– Trend analysis
– Simulation modelling
– Baseline models

45
 Goals of Availability
Management

• To predict…, plan for… and


manage… the availability of
services provided by ensuring that:
– All services are sufficient, reliable and
proper maintained, incl. CI’s
– Where CI’s are not supported by the
Internal IT Organization, then there
must be appropriate underpinning
contracts with suppliers
– Request for Change’s must be
submitted to prevent future loss of IT
service(s) 46
Responsibilities of Availability
Management
• Optimize availability by monitoring,
managing & reporting
• Determine availability requirements in
business needs
• Predicting, planning & designing for
expected levels of availability & security
• Developing of the Availability Plan
• Collecting, analyzing and managing data
• Monitoring the availability levels to
ensure that SLA’s & OLA’s are met
• Continuously step by step improvement
of the availability levels
47
Terminology
– Availability = MTBF (Mean Time Between
Failures= Up Time)

– Maintainability = MTTR (Mean Time To Repair


=Down Time)

– Serviceability = MTTR (Mean Time To Repair


=Down Time)

– Reliability =MTBSI (Mean Time Between System


Incidents)

– Resilience (Redundancy)

– Security = (Confidentiality, Integrity &


Availability) 48
The Unavailability Life-
Cycle

T
R
W
I
Unavailable=Downtime
T
MA
M
i
v
eT
T
Ima

sT
B
eil
M
BR
F
a
t
E
S=
b
l
o
IS
Ae
=
r
=e
v
U

e
Rrp
a
ti
v
il
m
eai
e
l
b
c
i
e
il 49
CRAMM= CCTA’s Risk Analysis
Management Methodology

Threats
Value of Vulnerabilit
Assets ies
Risk Analysis

Risk Management

Managing an
Counter Planning for potential Outage
Measures Outage

50
When Is a Service
Available?

“IT Service(s) is/ are not available to a customer if


the function(s) required during Service Hours at
that particular Location can not be used. This
does not necessarily means that the agreed SLA
conditions are not being met”

To calculate the Availability we use the following


formula:

(AST-DT)
Availability= X 100%
AST
51
Availability Formula

In Series In Parallel
Avail = 90%
Network Disk Y
Printer
Print
Server
Disk Z
Avail = 90% Avail = 80%
Avail = 80%

Available only if both work = Available = 1 - Not Available =


AxB = 1 - both down =
0.90 * 0.80 = 0.72 or 72% 1 - (Y Down) x (Z Down) =
1- 0.1 * 0.2 = 0.98 or 98%
52
Security Management

• The Process of managing a appropriate


level of security on information and IT
Services
• Protection of Security in a more
structural an organized manner
• Managing and Controlling Security
procedures

53
Structure of
Security Management

B
S
SI
e
u
L
Tc
s
A
Su
i
ri
e
t
n
cy
e
u
P 54
Security Definitions (1)
CI A

A
C
E
P
S I
v
o
n
ar
a
n
o
stf
e
u fti
eril
g
a
d
u
cri
b
e
ati
n
n
gtri 55
Security Definitions(2)

•Risks Analysis (Quantitative Process) & Risk


Assessment (Qualitative Process); CRAMM
•Security Policy; why security is done
•Security Standard; What to do
•Security Procedures; How to do IT

•BS 7799 (Code of practice for Information Security


Management) & ISO/IEC 17799 (Document Developed
in the UK initially by the heads of six commercial
Organizations, is not a Cookbook for Security)
56
Security Lifecycle

oevr
T
R
DIR
C
P
E
ae
h
narperl
cuevr
m
acetr
nio
easoit
a
v
d
g
no/
isnoi
e
Rt
n
nsre
d
yut
ct
ioD
ne
t
e
c
ti 57
Information Security Model
(ISM)
Information Security Policy

Risk Analysis

External Influence
Business Drives
Planning

Operational Measures

Evaluation & Audit

58
BS 7799 & ISO/IEC 17799
The Code of Practice for Information Security
Management

Security Policy
ISO/IEC 17799 (British Standard BS 7799
The 10 Control areas defined within

Security Organization
Asset Classification and Control
Personnel Security
Physical & environmental Security
Communications & Operations Management
Access Control
Systems development & Maintenance
Business Continuity Management
Compliance
59
Security Activities

• Assess (Analyze) Risk; Prerequisite to implement any


security measures
•Manage Risk reactively; Quick action, Counter-measures
•Develop Security Policy; document that is easy to read &
assimulate
•Manage Risk Proactively; to modify the security regime to
achieve the optimum level of security commensurate with its
cost & impact
•Monitor Security; Security must be monitored on an
appropriate basis and on regular times
•Report; Periodic and ad hoc reporting is an important
aspect of keeping security in the forefront of the
organization’s collective mind
60
Benefits

• Corporate Management Receive Assurance


• Business Continuity is assured
• Risk Assessment is “Enforced”
• Management attention is focused on Value
• Everyone thinks differently about Information

61
Challenges
• Expensive and no Benefits
• The ‘Ostrich Approach’, or “IT’ll never happen
2me!”
• You can not protect against all the threats
• Lack of Senior Management interest
• “Entropy Rules”; Security degrades over time!, Maintaining
security at the agreed level is an imperative
• No ‘Security by Design’; Many ‘Legacy’ applications do
not have security embedded in them.
• Locks on grass huts; There is no point securing one
aspect of an information system or IT Infrastructure, if the rest
is less secure. Similarly, failing in one small area of security is
failing overall

62
Reporting

• Risk Assessment Reports


• Security Breaches with details of:
3. type of Breaches
4. How caused
5. Counter-measures in place (and why failed)
6. Actions taken, and to what effect
7. Recommendations for action to avoid repetition
• Recommendations for Changes to:
9. policy
10. Procedures
11. Standards
• Recommendations for new guidelines
63
IT Service Continuity
Management

Reduce Time of Recovery Reduce Costs

Survival
64
ITSCM Process (1)

Initiate
Initiation
Continuity MGT

Business Impact
Analysis

Requirements and Strategy Risk Assessment

Business Continuity
Strategy

Organization and
Implementation
Planning
Implement Implement
Develop
Stand-by Risk Reduction
Implementation Arrangements Recovery Plans Measures

Develop Procedures

Initial Testing

65
ITSCM Process (2)
(=Operational)

Testing
Review & Change
Audit Manageme
nt
Education & Training
Awareness

Assurance

66
CRAMM= CCTA’s Risk Analysis
Management Methodology
(=based on Business Impact)

Threats
Value of Vulnerabiliti
Assets es
Risk Analysis

Risk Management

Managing a
Counter Planning for potential Disaster
Measures Disaster

67
Recovery Options

Cold Standby
Gradual Recovery
Warm
Standby
Intermediate Recovery

HOT Standby
Immediate Recovery
68
Roles & Responsibilities in Normal
Operation, Change during a Crisis
Situation

Does everybody know what role to play


in a crisis situation
Does everybody know what the roles
are and to whom they belong during a
crisis situation

69
Extensive Testing &
Reviewing of the ITSCM Plan

• Every 6 to 12 months and after each


disaster!

• Test it under realistic circumstances!

• Move / protect any live services first!

• Review and change ITSCM plan!

• ALL change through the Change Advisory


Board! (=Change Management Process)
70
Financial Management For
IT Services

Charge
s

Business IT IT Charge
Cost Analysis
Requirements Operational s
(IT
Plan (Incl. Accounting)
Budgets) Charge
Financial Cost
Targets Models s
Charging Policies

Feedback about proposed charges to


Business
71
IT- Accounting

• Base IT decisions on cost-effective


assessments, in such a way that it is measured
service by service

• Provide Management with information to justify


IT expenditures & investments to Business

• Plan and budget with confidence and Integrity,


so that the ring of trust can not be broken

• Show under- or over-consumption of service(s)


in financial terms to Business / Customers

72
Charging
• Customers paying the full costs of
the IT services provided in a fair
manner (“…what you use is what
you pay for……”)
• Ensure that customers are aware of
the costs they spent on IT Services
and influence customer behavior by
advising them how to spend their
IT Funds
• Make formal evaluations of IT
services and plan for investments,
based on cost recovery and 73
Charging & Pricing Options
Charging
• No charging
• Notional Charging / Differential Charging
• Actual/Real Charging

Pricing
• Recover of costs
• Cost price plus
• Going Rate
• Market prices
• Fixed Price

74
Service Level
Management

&
Balance between:

Demand for Supply of


IT services IT services

How???:
– Know the requirements of the business
– Know the capabilities of the IT Organization
75
 Goals of Service Level
Management

• IT CRM (between customer and IT


supplier)
• Better Customer understanding of IT
services requirements
• More flexible and more responsiveness in
IT services provision
• Balance customer demands against cost
of services provision
• Measurable service levels
(SMART=Specific, Measurable,
Achievable, Realistic, & Time Bound)
• Quality improvement (continuous review
76
& Step by Step…)
Service Management
Reports
• Everything is measured from the
customers perspective
• Data such as “reaction times,
escalation times and IT Service
support” should be made measurable
• Reports should be produced on
regular bases, and they should be
used
• Reports contains measuring values
concerning the “NOW” supporting
Service levels and the latest trend
developments in that Service(s) 77
Pl
an
nin
g
Re
vie Im
AU w S ple
me
DI LA
TS 's nt a 1
tio
Re n
vi
ESTABLISH FUNCTION
Pr ew
oc SL Ca
es M
s Se talog
rvi ue
ce
s

Dr
aft
Process

3
4
Ne

PERIODIC REVIEW
OL go
2

A’ Re ti
ate
sa vie
nd w
ex UC’
s,
MANAGE THE ONGOING PROCESS
ist
IMPLEMENT SLA’s

in
g
SL
A’
s
Mo
n ito Ag
r re
e

Re
po
rt

Re
vie
w
Define

Control
The Service Level Management

78
Execute
Contracts:

OLA’s
C
O
S
U II
n
T
e
u
L
C
t
p
A
s
re’
O
v
p
s rt’
o
s
n rli
a
m
g
ci
al
e
I
n
r
T
C
D (i 79
Service Quality Plan
(SQP)
• Internal service description of
responsibilities and delivery times to meet
the agreed service level(s)

• Must be Focused on IT staff (performance


& delivery)

• Describes exactly what we need to do, to


deliver the desired quality of service

• Description based on the actions to be take


when we do not deliver the correct quality
agreed in the service level(s) “Written
upfront” 80
Service Improvement Program
(SIP)

• Objective:
– Controlled improvement of the IT
Service provided

• Used whenever there is a need in/ for


– Deviation from agreed levels
– Strategic choice
– Continuous Improvement

• More than one SIP’s can run


simultaneously
81
Elements of a Service Level
Agreement

General Support Delivery


Introduction Service Hours Availability
• Parties Support Reliability
• Signatures Change Procedures Throughput
• Service Description(s)
Escalation Transaction response times
Reporting & reviewing Batch turnaround times
• Content
Contingency & Security
• Frequencies
Charging
Incentives & Penalties

82
Exam Preparation

83
BREAK A LEG!!!!!!!

ITIL
FO U N D A T I O N S

e
World Wid
d
Recognize

84

You might also like