Professional Documents
Culture Documents
CERTIFICATION COURSE
1
Copyright All Right Reserved
2
Copyright All Right Reserved
Introduction
Name
Professional Experience
Current Assignment
Expectations from this workshop
Agreement
What is ITIL?
What is ITIL?
ITIL goals
11
7
Copyright All Right Reserved
8
Copyright All Right Reserved
Duration
Proctored
Yes
Pass Score
Where?
What is a Service ?
A means of delivering value to customers by facilitating
outcomes customer want to achieve, without the ownership of
specific costs or risks.
14
Copyright All Right Reserved
IT Service Management
IT Service Management (ITSM): The implementation and
management of quality IT services that meet the needs of the
business. IT service management is performed by IT service
providers through and appropriate mix of people, process and
information technology
23
Copyright All Right Reserved
Characteristics of Processes
Measurable
Specific results
Customers
A
process
delivers
customer/stakeholder
its
primary
result
to
Functions
Function
A team or group of people and the tools they use to carry out one or
more processes or activities
Service Owner:
Process owner
Assisting with process design
Documenting the process
Ensuring that the process is being performed as documented
Ensuring that the process is meeting its aims
Monitoring and improving the process over time
Service Owner
To act as prime customer contact for all service related enquiries
and issues
To ensure that the on-going service delivery and support meet
agreed customer requirements
To identify opportunities for service improvements, discuss with
the customer and to initiate changes for improvements if
appropriate
To liaise with the appropriate process owners throughout the
service management lifecycle
To solicit required data, statistics and reports for analysis and to
facilitate effective service monitoring and performance
Responsible The person or people responsible for getting the job done
Accountable Only one person can be accountable for each task
Consulted The people who are consulted and whose opinions are sought
Informed The people who are kept up-to-date on progress
Service
Owner
Process
Owner
C
A
I
Activities
Security
Manager
IT
Head
Chief
Architect
A/R
A/R
R
A/R
I
C
I
C
R
I
I
C
I
I
I
R
A
C
R
A/R
C
I
R
C
I
I
R
C
A/R
Process
Manager
29
Copyright All Right Reserved
Type I
Internal Service Provider
An internal service provider
that is embedded within a
business unit, e.g. one IT
organization within each of
the business units. The key
factor is that the IT services
provide a source of
competitive advantage in the
market space in which the
business exists.
Type II
Shared Service Provider
An internal service provider
that provides shared IT
service to more than one
business unit,
e.g. one IT organization to
service all businesses in an
umbrella organization. IT
services typically dont
provide a source of
competitive advantage, but
instead support effective and
efficient business processes.
Type III
External Service Provider
A service provider that
provides IT services to
external customers, i.e.
outsourcing.
30
Copyright All Right Reserved
36
Copyright All Right Reserved
The purpose of the service strategy stage of the service lifecycle is to define the
perspective, position, plans and patterns that a service provider needs to be able
to execute to meet an organization's business outcomes.
The objectives of service strategy include providing:
An understanding of what strategy is
A clear identification of the definition of services and the customers who use
them
The ability to define how value is created and delivered
A means to identify opportunities to provide services and how to exploit them
A clear service provision model, that articulates how services will be delivered
and funded, and to whom they will be delivered and for what purpose
The means to understand the organizational capability required to deliver the
strategy
Documentation and coordination of how service assets are used to deliver
services, and how to optimize their performance
Processes that define the strategy of the organization, which services will
achieve the strategy, what level of investment will be required, at what levels of
demand, and the means to ensure a working relationship exists between the
customer and service
provider.
ITIL
is a Registered Trade Mark of AXELOS Limited
The Swirl logo is a Trade Mark of the AXELOS Limited
Prepared by Prashant Pokarna
Scope:
Defining a strategy whereby a service provider will deliver
services to meet a customers business outcome.
Defining a strategy for how to manage those services.
UTILITY
Performance
supported?
Constraints
removed?
T/F
OR
Fit for
purpose?
AND
Available enough?
Capacity enough?
Continuous
enough?
Secure enough?
Fit for
use?
AN
D
T/F
T/F
Valuecreated
T: True
F: False
WARRANTY
Warranty
an
Business outcomes
2.
Customers preferences
3.
Customers perception
Business
outcomes
Value
Preferences
Perceptions
Perceptions
are
influenced
by
attributes of a service, present or prior
experiences with similar attributes and
relative capability of competitors, other
peers, self image, position in the
market
ITIL is a Registered Trade Mark of AXELOS Limited
The Swirl logo is a Trade Mark of the AXELOS Limited
Prepared by Prashant Pokarna
49
Copyright All Right Reserved
Service Packages
50
Copyright All Right Reserved
Business Case
A decision support and planning tool that projects the likely
consequences of a business action
Justification for a significant item of expenditure
Includes information about costs, benefits, options, issues,
risks and possible problems
Uses qualitative and quantitative terms
Types of business case structures
Risk
Risk is defined as uncertainty of outcome, whether positive
opportunity or negative threat.
There are two distinct phases: Risk Analysis and Risk
Management.
Risk analysis is concerned with gathering information about
exposure to risk so that the organization can make appropriate
decisions and manage risk appropriately.
Risk management supports critical decision making process, in
terms of evaluating and selecting controls.
Management of risk covers a wide range of topics, including
business
continuity
management
(BCM),
security,
program/project risk management and operational service
management.
59
Copyright All Right Reserved
User Profile
Activities
Budgeting
Accounting
Chargeback
Demand
Modelling
Service Design
91
Copyright All Right Reserved
93
Copyright All Right Reserved
94
Copyright All Right Reserved
Service Catalogue
Service Level
Agreement (SLA)
Operational
Level Agreement
(OLA)
Underpinning
Contract (UC)
SLAM Chart
96
Copyright All Right Reserved
97
Copyright All Right Reserved
Supplier Management
Purpose
To manage suppliers and to obtain value for money from suppliers, to
provide seamless quality of IT service to the business.
Ensure that underpinning contracts and agreements with suppliers are
aligned to business needs and they meet their contractual commitments.
Objective
Manage relationships with suppliers.
Negotiate and agree contracts with suppliers.
Manage supplier performance.
Maintain a supplier policy and a supporting supplier and contract database
(SCMIS).
Scope
Management of all suppliers and contracts needed to support the provision
of IT services to the business
To ensure that suppliers provide value for money and meet their service
target.
To ensure that relationships are developed in a consistent manner and that
suppliers performance is appropriately reviewed and managed.
ITIL is a Registered Trade Mark of AXELOS Limited
The Swirl logo is a Trade Mark of the AXELOS Limited
Prepared by Prashant Pokarna
Supplier
Strategy
& Policy
Supplier and
Contracts
Evaluation
Supplier &
Supplier Categorization and
Maintenance of the SCMIS
Establish New
Suppliers and
Contracts
Contract
Management
Information
system
Supplier & Contract
Management &
Performance
Contract Renewal
and/or Termination
99
Copyright All Right Reserved
Capacity Management
Purpose
To ensure that cost-justifiable IT capacity in all areas of IT always exists
and is matched to the current and future agreed needs of the business,
in a timely manner.
Objective
Produce and maintain an appropriate and up-to-date capacity plan.
Provide advice and guidance to the business and IT on
all capacity and performance-related issues.
Ensure that service performance achievements meet or exceed all of
their agreed performance targets.
Scope
Considers all resources required to deliver the IT service, and plans for
short-, medium- and long-term business requirements.
Scheduling of human resources, staffing levels, skill levels and
capability levels are included within the scope of capacity management.
102
Copyright All Right Reserved
Capacity Performance
Reports
& Data
Forecasts
103
Copyright All Right Reserved
Service Capacity
Management
Management, control and prediction of the end-toend performance and capacity of the live,
operational IT services usage and workloads.
Ensure that the performance of all services, as
detailed in service targets within SLAs and SLRs, is
monitored and measured, and that the collected
data is recorded, analyzed and reported.
Component
Capacity
Management
Availability Management
Purpose
To ensure that the level of service availability delivered in all services is
matched to or exceeds the current and future business requirements, in a
cost-effective and timely manner.
To ensure both the current and future availability need of the business are
met.
Objective
Provide a point of focus and management for all availability- related issues.
Produce and maintain an appropriate and up-to-date
availability plan.
Ensure that proactive measures to improve the availability of services are
implemented wherever it is cost-justifiable to do so.
Scope
Current business processes, their operation and requirements.
106
Copyright All Right Reserved
Availability
Reliability
Maintainability
Serviceability
Vital Business
Functions (VBFs)
Service
Availability
Component
Availability
109
Copyright All Right Reserved
Business
Impact
Analysis
(BIA)
Vital
Business
Functions
(VBFs)
Risk
Assessment
Risk
Management
IT Security Management
Purpose
To align IT security with business security and ensure that information
security is effectively managed in all service and IT service
management activities.
Objective
To protect the interests of those relying on information, and the systems
and communications that deliver the information, from harm resulting
from failures of availability, confidentiality and integrity.
Scope
Input from business security policy and plans
Current business operation and its security requirements
Future business plans and requirements
Legislative and regulatory requirements
Obligations with regard to security contained within SLAs
The business and IT risks and their management
112
Copyright All Right Reserved
Confidentiality
Integrity
Availability
Information Security
Framework
Information
Security
Strategy
Information
Security
organization
Information
Security Controls
114
Copyright All Right Reserved
Audience for
Security Policy
These policies should be
widely available to all
customers and users,
and their compliance
should be referred to in
all SLRs, SLAs, contracts
and agreements.
115
Copyright All Right Reserved
Interested
Parties
(Customers,
Suppliers,
etc.)
Information
Security
Requirements
& Expectations
Learn
Improve
Plan
Implement
Implement
Awareness,
Classification
Personnel Security
Physical Security
Systems Security
Security Incident
Procedures
Control
Managed
Information
Security
Organise
Establish Framework
Allocate Responsibilities
Maintain
Evaluate
Internal Audit
External Audit
Self-Assessments
Security Incidents
Interested
Parties
(Customers,
Suppliers,
etc.)
116
Copyright All Right Reserved
117
Copyright All Right Reserved
Service Transition
120
Copyright All Right Reserved
Value to Business
The capacity of the business to respond quickly and adequately
to changes in the market improves.
Changes in the business as a result of takeovers, contracting,
etc. are well managed.
More successful changes and releases for the business.
Better compliance of business and governing rules.
Less deviation between planned budgets and the actual costs.
Better insight into the possible risks during and after the input of
a service into production.
Higher productivity of customer staff.
Change management;
Knowledge management.
127
Copyright All Right Reserved
Record
RFC
Review
RFC
Change
authorization
Assess and
evaluate
change
Co-ordinate
Change
implementation
Change
review and
closure
138
Copyright All Right Reserved
Between Cis
With incident, problem, change records, etc.
Quality checked
Basic Concepts
DML and CMDB
143
Copyright All Right Reserved
SKMS
Informed Decision
CMS
CMDB
145
Copyright All Right Reserved
Scope
Authorise
Authorise
Release
Release
Planning
Planning
Release and
Deployment
Planning
Auth
Authorise
Authorise
Build
Buildand
and
Test
Test
Auth
Auth
Authorise
Deployment/
Transfer/
Treatment
Authorise
Authorise
Check-in
Check-into
to
DML
DML
Deployment
Release,
Release,
Build
Build
and
and
Test
Test
Deployment
PostImplementation
Review
Review
and
Close
Transfer
Auth
Change
ChangeManagement
ManagementAuthorisation
Authorisation
Retirement
151
Copyright All Right Reserved
Knowledge Management
Purpose
The purpose of the knowledge management process is to
share perspectives, ideas, experience and information.
To ensure that these are available in the right place, right
time to enable informed decisions and to improve efficiency by
reducing the need to rediscover knowledge.
Objective
Improve quality of management decision making by ensuring that
reliable and secure information and data is available throughout the
service lifecycle.
Ensure that the right information is delivered to the appropriate
place or person at the right time to enable informed decisions.
Maintain a service knowledge management system (SKMS)
that provides controlled access to knowledge, information and
data that is appropriate for each audience.
152
Copyright All Right Reserved
154
Copyright All Right Reserved
Service Operations
Objectives:
Communications in SO
Types of Event
Informational
An event that does not require any action, regular operation
Example: Notification that a scheduled workload has completed
Warning
Exception
Service Request
A request from a User for information, or advice, or for a
Standard Change or for Access to an IT Service.
Service Requests are usually handled by a Service Desk, and do
not require an RFC to be submitted.
Their scale, frequency, low cost and low nature means it can be
handled by a separate process rather then congesting and
obstructing the incident management process and change
management process
Problem
Cause of one or more incidents
Cause is usually not know at the time a problem record is
created and problem management process is further responsible
for the investigation
Impact
Urgency
Priority
167
Copyright All Right Reserved
Event Management
Incident Management
Problem Management
Request Fulfilment
Access Management
Event Management
Purpose
The purpose of event management is to manage events throughout
their lifecycle. The activities are to detect events, make sense of
them and determine that the appropriate control action is
coordinated by the event management process.
Objective
Detect all changes of state that have significance for the
management of a CI or IT service.
Determine the appropriate control action or events and ensure these
are communicated to the appropriate functions.
Provide the means to compare actual operating performance and
behavior against design standards and SLAs.
Provide a basis for service assurance and reporting; and service
improvement.
169
Copyright All Right Reserved
Event Occurs
Detected, Filtered, Notified
Event Significance: Informational, Exceptional, Warning
Event Correlation
Event Response
Review & Closure
Do any one or
combination of
Incident/
Problem/
Change
Problem
management
Change
management
Warning
Event
Alert
Human
intervention
Auto
response
Informational
Event
Log
174
Copyright All Right Reserved
Incident Management
Definition
The process responsible for managing the lifecycle of all incidents. Incident
management ensures that normal service operation is restored as quickly as
possible and the business impact is minimized.
Purpose
The purpose of incident management process is to restore normal service
operation as quickly as possible and thereby minimize the adverse impact on
business operations, thus ensuring that the best possible levels of service
quality and availability are maintained. Normal service operation implies
services operating as per the committed SLAs.
Objective
Ensure that standardized methods and procedures are used for efficient and
prompt response, analysis, documentation, on-going management and
reporting of incidents.
Increase visibility and communication of incidents to business and IT support
staff.
Align incident management activities and priorities with those of the business.
ITIL is a Registered Trade Mark of AXELOS Limited
The Swirl logo is a Trade Mark of the AXELOS Limited
Prepared by Prashant Pokarna
175
Copyright All Right Reserved
Major Incident
177
Copyright All Right Reserved
Problem Management
Definition
The problem management process is responsible for managing the
lifecycle of all problems.
Purpose
Problem management seeks to identify and remove the root cause
of incidents in the IT infrastructure.
Minimize the adverse impact of incidents and problems on the
business that are caused by underlying errors.
Eliminate recurring incidents and minimize the impact of incidents
that can not be prevented.
Objective
To prevent problems and resulting incidents from happening and to
eliminate recurring incidents
To minimize the impact of incidents that cannot be prevented.
ITIL is a Registered Trade Mark of AXELOS Limited
The Swirl logo is a Trade Mark of the AXELOS Limited
Prepared by Prashant Pokarna
179
Copyright All Right Reserved
Problem
Categorization
& Prioritization
Problem
Investigation &
Diagnosis
Problem
Resolution &
Closure
Workarounds &
Raising Known
Error Records
Major
Problem
Reviews
Errors from
Development/
Suppliers
Known
Error
Database
182
Copyright All Right Reserved
183
Copyright All Right Reserved
Access Management
Purpose
The purpose of access management is to grant access to
authorized users the right to use a service, while preventing access
to non-authorized users.
In practice, access management is the operational enforcement of
the policies defined by information security management and
availability management.
Objective
To grant authorized users the right to use a service and deny
access to unauthorized users
To execute policies and actions defined in security and availability
management
185
Copyright All Right Reserved
Service Desk
Definition
A service desk is a functional unit made up of a dedicated number
of staff responsible for dealing with a variety of service events,
often made via telephone calls, web interface, or automatically
reported infrastructure events.
Acts as daily single point of contact for IT users.
Objective
To restore the normal service to the users as quickly as possible.
Operate as level 1 for incident management and request fulfilment,
i.e. log calls, do initial diagnosis and investigation and if possible
resolve and close.
Manage incidents throughout its lifecycle, which also includes user
communication and technical & hierarchical escalations.
Conducting customer/user satisfaction survey.
ITIL is a Registered Trade Mark of AXELOS Limited
The Swirl logo is a Trade Mark of the AXELOS Limited
Prepared by Prashant Pokarna
189
Copyright All Right Reserved
Description
1. Local
2. Centralised
3. Virtual
4. Follow-the-sun
5. Specialized
191
Copyright All Right Reserved
192
Copyright All Right Reserved
193
Copyright All Right Reserved
194
Copyright All Right Reserved
Minimum qualifications
SDF Metrics
Periodic evaluations of health, maturity, efficiency,
effectiveness and any opportunity to improve
Realistic and carefully chosen - total number of calls is not itself
good or bad
First-line resolution rate
Average time to resolve and/or escalate an incident
Total costs for the period divided by total call duration minutes
The number of calls broken by time of day and day of week,
combined with the average call time
Customer/user satisfaction surveys
Objectives
IT Operations Management
Purpose
Objectives
Objectives
CSI Register
Service Measurement
The ability to predict and report service performance against
targets of an end- to-end service is known as service
measurement.
Will require someone to take the individual measurements
and combine them to provide a view of the customer
experience.
This data can be analyzed over a period of time to produce a
trend.
This data can be collected at multiple levels (for example,
CIs, processes, services).
ITIL is a Registered Trade Mark of AXELOS Limited
The Swirl logo is a Trade Mark of the AXELOS Limited
Copyright All Right Reserved
To Validate
To Direct
To Justify
Types of metrics
Technology metrics
Process metrics
metrics
for
the
service
Service metrics
Plan:
Do:
Check:
Monitor and measure processes
and product against policies,
objectives and requirements for the
product and report the results.
P
A
D
C
Act:
Take actions to continually improve
process performance.
213
Copyright All Right Reserved
Wisdom
Act
Plan
Check
Do
Information
Knowledge
217
Copyright All Right Reserved
CSI Model
What is the vision?
How do we keep
the momentum going?
Where do we want
to be?
Business vision,
mission, goals and
objectives
Baseline
assessments
Measurable
targets
Measurements &
metrics
220
Copyright All Right Reserved