You are on page 1of 7

Feature

COBIT 5 Processes From a Systems


Myles Suer is a senior
manager for IT performance
management at HP. Suer
has 20 years of experience
leading new product
Management Perspective
initiatives at startups and
COBIT® 5 establishes a governance layer and This quote represents IT today. IT managers
large companies. He is also
does a good job of capturing stakeholder needs, do not deal with isolated problems. They deal
adjunct faculty at the John
driving enterprise, IT and enabler goals. COBIT 5 with messes of problems. IT leaders need to
Sperling School of Business at
fosters the use of balanced scorecards and goal recognize that the quality of solutions definition
the University of Phoenix.
cascades to help IT leaders show that IT is processes determines the quality of requirements
managing its ship for the good of the enterprise. created, the issues that are discovered in the
Chane Cullens is a director
This includes its metric recommendations for build, the bugs that are found in quality testing
of strategy in HP’s software
enterprise and IT goals. and the number of incidents that are in service
group. Cullens has been
COBIT® relates process to a life cycle of plan, delivery. All of these are related.
involved with IT management
design, build, operate, monitor and update. How
software and practices for
do COBIT’s 13 Align, Plan and Organize (APO) Figure 1—IT Management as a System
15 years. He was inducted
processes; 10 Build, Acquire and Implement
into the Oregon State
(BAI) processes; six Deliver, Service and Support
University’s Academy of
(DSS) processes; and three Monitor, Evaluate and
Distinguished Engineers.
Assess (MEA) processes relate to one another? Plan
IT’s primary goal is business services delivery; as
Don Brancato is the chief
important as it is to define each of these processes,
enterprise architect with
it is also important to understand how these
HP Software for its federal
processes relate to one another to optimize IT’s People
business. Brancato has more
ability to deliver the right service at the right time Improve Process Test
than 20 years of experience Technology
for the right price. For example, the management
and expertise as an enterprise
of service requests and incidents, and the
architect, software engineer,
management of change and change transition and
quality assurance engineer and
acceptance are intimately interrelated. Poor change
software manager/director.
management dramatically impacts the quality of
Run
the service request and incident processes.1
Systems thinking offers an answer to many
Do you have of these issues:
something The quality at each stage is determined by the
to say about In systems thinking, we must consciously confluence of people, process and technology
this article? recognize that everything we do has (figure 1). Together, these make answering most
Visit the Journal affected and does affect everything of the aforementioned issues difficult at best. For
pages of the ISACA else we have done or will do. Systems this reason, a systems viewpoint is a valuable
web site (www.isaca. thinking involves us moving away way to view the COBIT processes as interrelating
org/journal), find the from seeing single or isolated elements, and providing data for successful process layers.
article, and choose structures, functions and events to seeing Further, IT management is a system of systems or,
the Comments tab to the processes by which they interrelate at the very least, a system of processes.
share your thoughts. to one another…. It is this process All COBIT components can be viewed as a
Go directly to the article: of diagnosis and discovery that will single system or as interconnected value streams.3
ultimately give us a practical guide to
finding systems solutions to our systems’ VIEWING IT AS A CORPORATE VALUE CHAIN
problems. As leaders, we really do not Viewing IT as a corporate value chain requires
deal with problems today—we deal with that everything IT does be synthesized into a set
messes of problems which require more of core value-added functions. Figure 2 is a view
holistic or systems solutions.2 of this value chain.

1 ISACA JOURNAL VOLUME 2, 2014 ©2014 ISACA. All rights reserved. www.isaca.org
Figure 2—IT Value Chain

Financial Management
Su p p

Analytics and Insight Effic • Read Configuration Management: Using COBIT 5.


ortin

Enterprise Architecture www.isaca.org/configuration-


ienc
gA

Vendor Management management


y
ctivi

• Learn more about, discuss and collaborate on


Governance, Risk and Compliance
ties

information security management and COBIT 5 in


the Knowledge Center.
y
Deplo
ms

tfolio

www.isaca.org/knowledgecenter
Strea

ct
l
Fulfil

ty
nt to

Corre
o Por

Agili
ireme
e

est to

3. Servicing of end-user requests and issues relating to


egy t
Valu

ct to

subscribing to business capabilities, dispatching people to


Requ

Requ
Strat

Dete

fix client issues and instantiating business capabilities—


services and applications
HP has identified four value streams (figure 3) that cover
The primary activities that IT performs—the places where
the core process of the COBIT 5 process reference model
it adds value—can be summarized into three activities:
and, even more important, how these value streams relate to
1. Automation of business capabilities
the organization and to each other to create an end-to-end IT
2. Management of those capabilities once they have gone
management system.
into production

Figure 3—Value Streams Across the Service Life Cycle

Strategy to Requirement Request to Detect to


Portfolio to Deploy Fulfill Correct

Conceptual Service Logical Service Physical Service


Ord
s ere
Become d,
De
plo
yed
hed
Publis

d
eploye
sed, D
Relea

Plan Define Develop Build Test Release Deploy Operate

Business Enterprise Architect PMO Developers Testers IT Engineers IT Operations Users

©2014 ISACA. All rights reserved. www.isaca.org ISACA JOURNAL VOLUME 2, 2014 2
A key element of this is the notion of a conceptual model • Ensuring that the established budgets are transparent to
feeding a logical model, which, in turn, feeds a physical monitor implementation and use of innovation
service model. Once strategic demand enters the planned • Identifying opportunities, risk and constraints for IT to
portfolio, a conceptual service model needs to be developed enhance the business
against which requirements can be constructed and built. This • Collecting data to enable effective IT-related risk
includes drafting a proposed solution that reflects enterprise identification, analysis and reporting
needs/expectations and the laying out of service warranty The key COBIT processes directly linked to strategy to
expectations. Next, a logical service model that describes portfolio are:
what the components of the service are and, in turn, relates • APO02 Manage strategy
the model to existing capabilities needs to be developed. • APO03 Manage enterprise architecture
This should then be followed by an actual service model. By • APO04 Manage innovation
starting the service modeling early, it can drive up reuse of • APO08 Manage relationships
capabilities, technology and knowledge. In the end, agility • APO12 Manage risk
increases while cost and risk are reduced. • APO13 Manage security

STRATEGY TO PORTFOLIO LINKAGES Figure 4—Strategy to Portfolio


Strategy to portfolio (figure 4) defines how well the IT
portfolio of services matches the enterprise’s business Policy
strategy. IT leaders must recognize that they are not in the IT Management
business, but rather the business of their firm—e.g., banking,
insurance, manufacturing. The strategy-to-portfolio value stream Policy
is concerned with the quality of management of the portfolio,
the innovation that is being produced for the portfolio, the
quality of new solutions being identified, the management of
instantiation within programs and projects, and the effectiveness
Proposal
and efficiency of spend for services and innovation. Management
(Investment)
Strategy to portfolio includes COBIT 5 processes/activities
for APO02 (strategy), APO03 (enterprise architecture),
IT Contract
APO04 (innovation) and APO05 (portfolio). In this value
stream, enterprise architecture drives the current state of the
portfolio and all proposed additions to the portfolio. Additions
are captured as innovation proposals/contracts representing
Business Demand
demand and then integrated as demand management. These Architecture Management
are then added as development (to be procured) items to the Management
proposed portfolio. While not explicitly called out, goals are
Business
captured here in the form of proposals—a separate process Architecture Demand

manages the capture, reconciliation and realization of benefits.


The enterprise architect’s role involves applying standards and
governance; using COBIT, the enterprise architect is able to
measure the variance between the anticipated future state and IT Architecture
Management
the ongoing processes to get there.
In this integrated form, the key elements identified by
COBIT 5 are viewed as one system and include: IT Architecture
• Defining the strategic plan and road map where initiatives
are prioritized by enterprise need
• Selecting opportunities and solutions that are aligned to
business strategy
3 ISACA JOURNAL VOLUME 2, 2014 ©2014 ISACA. All rights reserved. www.isaca.org
REQUIREMENTS TO DEPLOYMENT and BAI06 (changes). Here, requirements are captured at
The requirements-to-deploy value stream (figure 5) describes the same time as a project is initiated. Part of assuming that
how well IT manages development and delivery—the delivery a quality level is part of the project is the establishment of
of strategic demand. This value chain is concerned with the a planned service agreement in what the IT Infrastructure
quality of the requirements process, the predictability of Library (ITIL) calls the service design phase. When this phase
programs and projects, the end-to-end quality delivered, the is completed, a deployment package is created and change
change process, and the use and measurement of performance acceptance and transitioning begins; this results in a change
against service agreements. Here, service designers create/ being created (i.e., a ticket).
negotiate service level agreements (SLAs)/operational level Again, in this integrated form, the key elements identified
agreements (OLAs) that evolve as the client and application by COBIT 5 are viewed as one system and include:
mature over time. • Integrating quality management into solutions for
The requirements-to-deploy value stream includes the development and service delivery
COBIT 5 processes of BAI01 (programs and project), BAI02 • Collecting and analyzing risk data
(requirements), APO09 (service agreements), APO11 • Developing and maintaining a project plan
(quality), BAI07 (change acceptance and transitioning), • Defining and maintaining business and technical requirements

Figure 5—Requirement to Deploy

Requirement Defect
Management Management

Requirement Defect

Project Delivery Test


Management Management

IT Project Test Case

Service Build
Development Management
Management

Source Deployment
Package

Service Design Release Deployment Change


Management Management Management Management

Design Package Release Package Service


Release Desired
Logical Service Blueprint Service CIs RFC
Blueprint Service Release

©2014 ISACA. All rights reserved. www.isaca.org ISACA JOURNAL VOLUME 2, 2014 4
• Designing, building and testing solution components Figure 6—Request to Fulfill
• Documenting, tracking, performing and reporting on change
The key COBIT processes directly linked to a requirement Catalog Subscription Billing and
Management Management Chargeback
to deploy are:
• APO11 Manage quality Offer
Chargeback
• APO12 Manage risk Service Catalog
Subscription
Record
Entry
• APO13 Manage security
• BAI01 Manage programs and projects
• BAI02 Manage requirements definition
• BAI03 Manage solutions identification and build Request and Usage
Routing Management
• BAI04 Manage availability and capacity Management
• BAI06 Manage changes
Fullfilment
• BAI07 Manage change acceptance and transitioning Request
Usage Record

REQUEST TO FULFILL
The request-to-fulfill value stream (figure 6) focuses on
Development Change
how well IT manages its overarching request and fulfillment Management Management
activities. This is clearly operational demand. The
Service
request-to-fulfill value stream aims to “increase user Release Desired
Blueprint Service CIs RFC
productivity and minimize disruptions through quick
resolution of user queries.”4 As a process, it touches multiple
IT disciplines including, but not limited to:
• Service requests There are also items that have been added here that are
• Change management not explicit in COBIT 5. These include catalog management,
• Asset management subscription management and usage management. These
• Configuration management support the rights aspects of asset management/software
• Supplier management (including cloud supplier management) compliance and the implications of request, budgeting and
Request to fulfill is built upon service requests and actual usage. In this integrated form, the key elements are
change processes, but adds functions to complete the end- already identified by COBIT 5, but here it is viewed as one
to-end processes. As indicated in figure 6, request to fulfill system and includes:
establishes the notion of a catalog and the notion of financial • Monitoring supplier performance and compliance
consumption in the form of subscription management, • Organizing, identifying, classifying and using knowledge
billing/chargeback and usage management. This is a choice • Managing data for the asset life cycle
IT organizations need to make; the current best practice is for • Managing user identity and logical access
it to be included. At this phase, the notion of service leasing The key COBIT processes directly linked to request to
should be envisioned, and its complement and elasticity fulfill are:
allowed to evolve: As services are requested, they either fall • APO10 Manage suppliers
into disuse or are abandoned altogether as business/mission • APO12 Manage risk
capability changes (i.e., business agility). IT must ensure • APO13 Manage security
efficiency by keeping systems highly utilized. • BAI06 Manage changes
• BAI08 Manage knowledge
• BAI09 Manage assets
• DSS05 Manage security services

5 ISACA JOURNAL VOLUME 2, 2014 ©2014 ISACA. All rights reserved. www.isaca.org
DETECT TO CORRECT Figure 7—Detect to Correct
The detect-to-correct value stream (figure 7) concerns how
well the IT organization prevents services and the supporting Problem Incident
Management Management
infrastructure from breaking down or degrading and how well
it manages issues or events when the inevitable happens—
something breaks. Simply put, this value chain aims to, as Problem Incident

COBIT 5 suggests, increase user productivity and minimize


disruptions. The detect-to-correct value stream touches many
IT activity categories, including:
• Capacity Diagnostics and Event
Remediation Management
• Availability
• Operations
• Incident Runbook Event
• Knowledge
• Problem
• Quality (CSI)
• Security Service
Monitoring
The goal is clearly process optimization. Instead of viewing
each area as discrete processes, they are viewed as part of one
system that aims to ensure that services perform as agreed and Service
Monitor
that issues are routinely and holistically resolved. This process
considers asset management and configuration management as
a single process.
In this integrated form, the key elements identified by Change Configuration
COBIT 5 are viewed as one system and include: Management Management
• Documenting, tracking, performing and reporting on change
• Monitoring internal and external IT services RFC
Actual Service CIs
• Identifying, investigating, resolving and closing events,
incidents and problems
• Monitoring for security-related issues
• Monitoring, collecting and analyzing performance and OVERARCHING VIEW
conformance data The previously described streams have been put together into
The key COBIT processes directly linked to detect to one flow that shows all the linkages among the processes and
correct are: how the processes touch one another (figure 8).
• APO12 Manage risk
• APO13 Manage security CONCLUSION
• BAI06 Manage changes Every IT approach has a unique viewpoint on helping IT be
• DSS01 Manage operations more agile and efficient at meeting the needs of the business.
• DSS02 Manage service requests and incidents The IT value chain viewpoint, which focuses on the data
• DSS03 Manage problems linkages across the service life cycle, complements the COBIT
• DSS05 Manage security services viewpoint of governance and management. This article has
• MEA01 Monitor, evaluate and assess performance described a systems approach to COBIT 5, using COBIT 5 as
and conformance the overarching system. Conscious recognition is given to the
concept that everything done in IT management has affected
and does affect everything else in IT management. The goal is to
provide an understanding of the challenges in IT management

©2014 ISACA. All rights reserved. www.isaca.org ISACA JOURNAL VOLUME 2, 2014 6
Figure 8—IT Value Chain Reference Architecture

Strategy to Portfolio Requirement to Deploy Request to Fulfill Detect to Correct


Policy Requirement Detect Problem Incident
Management Management Management Management Management

Policy Requirement Detect Problem Incident

Proposal Project Delivery Test Catalog Subscription Billing and Diagnostics and Event
Management Management Management Management Management Chargeback Remediation Management
(Investment)
Offer

IT Contract IT Project Test Case Subscription Chargeback Runbook Event


Service Catalog Record
Entry

Business Demand Service Build Request and Usage Service


Architecture Management Development Management Routing Management Monitoring
Management Management Management

Business Deployment Fullfilment Service


Demand Source Usage Record Monitor
Architecture Package Request

IT Architecture Service Service Design Release Deployemnt Change Configuration


Management Portfolio Management Management Management Management Management
Management
Design Package Release Package Service
Release Desired
Conceptual Conceptual Service CIs
Service Blueprint Logical Service Blueprint RFC
IT Architecture Blueprint Service Release Actual Service CIs

Functional Component–Key Service Model Data Artifact–Auxilliary


Functional Component–Auxilliary Data Artifact–Key Entity relationship

and the importance of how everything touches and affects one ENDNOTES
another. Clearly, the people, process and technology elements of 1
Based on a private case study of a major US financial
the IT management system cannot be viewed in isolation. The institution. Multiple additional sources.
value streams of strategy to portfolio, requirement to deploy, 2
Haines, Stephen G.; Strategic and Systems Thinking, 2007
request to fulfill and detect to correct align to support a singular 3
Michael Porter pioneered the value chain strategy several
value chain that supports business capability. The system has to years ago as a mechanism to evaluate business competitive
improve to improve any one part. advantage. According to Porter, a value chain is the
interlinking activities that a firm performs to deliver a
valuable product or service to the marketplace.
4
ISACA, COBIT 5, USA, 2012, www.isaca.org/cobit

7 ISACA JOURNAL VOLUME 2, 2014 ©2014 ISACA. All rights reserved. www.isaca.org

You might also like