SlideShare a Scribd company logo
1 of 5
ITIL Stage Processes
Service Strategy
 Strategy Management for IT Services
 Provide business stakeholder value
 Differentiate the organisation
 Make solid cases for investment
 Resolve conflicting demands for services
 Service Portfolio Management
 Include the complete set of services managed by a service
provider
 Manage the entire lifecycle of all services
 Service pipeline (proposed or in development)
 Service catalogue (live or available for deployment)
 Retired services (decommissioned services)
 Demand Management
 Analysing patterns of activity and user profiles
 Provisioning capacity in line with strategic objectives
 Financial Management for IT Services
 To provide cost effective stewardship of the IT assets and
resources used in providing IT services
 To assist management decisions on IT investment by providing
detailed cost analysis regarding changes to IT services
 Budgeting and IT Accounting
 Business Relationships Management
 Identify Service Requirements
 Customer Satisfaction Survey
 Handle Customer Complaints
 Monitor Customer Complaints
Service Design
 Design Coordination
 New or changed services
 Service management systems and tools, especially the service
portfolio, including the service catalogue
 Technology architecture and management systems
 The processes required
 Measurement methods and metrics
 Service Catalogue Management
 Define, document, agree, monitor, measure, report and review the
level of IT services provided
 Provide and improve the relationship and communication with the
business/customer
 Ensure that specific and measurable targets are developed for all
IT services
 Monitor and improve customer satisfaction
 Ensure that IT and the customers have a clear and unambiguous
understanding of the level of service to be
 Delivered
 Ensure that improvements to the levels of service are
implemented wherever the service is failing, and the
 that these improvements are cost justified
 Service Level Management
1. Identification
 Analysing current services and service level requirements
 Recording the current service provision in a service catalogue
2. Definition
 Matching and customising (with the customer) of the right service
provision against the right costs:
 Service catalogue
 Demands of the customer (service level requirements)
3. Agreement (defining and signing SLAs)
 Service Level Agreements, supported by: Operational Level
Agreements (OLA’s) and underpinning contracts
4. Monitoring
 Measuring the actual service levels against the agreed service
levels
5. Reporting
 Reporting on the service provision (to the customer and the IT
organisation)
6. Evaluation (review)
 Evaluate the service provision with the customer
 Match and customise: adjust service provision if required?
(service improvement plan/programme, service quality plan)
 Match and customise: adjust SLA if required
 Risk Management
 Capacity Management
The capacity managementprocessunderstandsthe businessrequirements
(the requiredservice delivery),the organisation’soperation(the current
service delivery) andthe ITinfrastructure (the meansof service delivery).It
ensuresthatall the current andfuture capacityand performance aspectsof
the businessrequirementsare provided costeffectively.
 Demand management
 Application sizing
 Modelling
 Capacity management database
 Capacity plan
 AvailabilityManagement
 Ensure that appropriate design and planning of availability takes
place for all new services
 Planning, design and improvement of availability
 Providing cost effective availability improvements that can deliver
business and customer benefits
 Ensuring agreed level of availability is provided
 Produce and maintain an availability plan
 IT Service Continuity Management
1. Initiation
o „ Linkwithbusinesscontinuityplan
o „ Policysetting
o „ Termsof reference andscope
o „ Allocate resources
2. Requirements and strategy
o Input from availability management and security management (risk
assessment)
o Business impact analysis
o Discuss recovery options (link to SLM)
3. Implementation
o „ Write continuity plans, including:
 Emergency response plan
 Damage assessment plan
 Salvage plan
 Crisis management and PR plan
 „ Implement standby arrangements
 „ Implement recovery options
 „ Test the plans
 „ Develop and implement procedures and working
instructions
4. Operational management
 „ Link ITSCM to change management to keep plans and
recovery options up to date
 „ IT staff need to be aware and trained to use the plans
 „ Continuous improvement of the process through review
and testing
 Information Security Management
 Production, review and revision of an overall information
security policy and a set of supporting specific
 Policies
 Communication, implementation and enforcement of the
security policies
 Assessment and clarification of all information assets and
documentation
 Implementation, review, revision and improvement of a set
of security controls and risk assessment and
 responses
 Monitoring and management of all security breaches and
major security incidents
 Schedule and completion of security reviews, audits and
penetration tests
 Supplier Management
 Obtain value for money from suppliers and contracts
 Work with SLM to ensure UCs support and are aligned with
business needs, SLRs and SLAs
 Negotiate and agree UCs and manage through their lifecycle
 Manage supplier relationships and performance
 Maintain a supplier policy and a Supplier and Contract
Database (SCD)
Service Transition
 Change Management
 To control the lifecycle of all Changes. The primary objective
of Change Management is to enable beneficial Changes to be
made, with minimum disruption to IT services.
 Change Evaluation
 Process Objective: To assess major Changes, like the
introduction of a new service or a substantial change to an
existing service, before those Changes are allowed to proceed
to the next phase in their lifecycle.
 Project Management (Transition Planning and Support)
 To plan and coordinate the resources to deploy a major
Release within the predicted cost, time and quality estimates.
 Application Development
 To make available applications and systems which provide the
required functionality for IT services. This process includes the
development and maintenance of custom applications as well
as the customization of products from software vendors.
 Release and Deployment Management
 To plan, schedule and control the movement of releases to
test and live environments. The primary goal of Release
Management is to ensure that the integrity of the live
environment is protected and that the correct components are
released.
 Service Validation and Testing
 To ensure that deployed Releases and the resulting services
meet customer expectations, and to verify that IT operations is
able to support the new service.
 Service Asset and Configuration Management
 To maintain information about Configuration Items required
delivering an IT service, including their relationships.
 Knowledge Management
 To gather, analyse, store and share knowledge and information within
an organization. The primary purpose of Knowledge Management is to
improve efficiency by reducing the need to rediscover knowledge.
Service Operation
 Event Management
 To make sure CIs and services are constantly monitored, and
to filter and categorize Events in order to decide on
appropriate actions.
 Incident Management
 To manage the lifecycle of all Incidents. The primary objective
of Incident Management is to return the IT service to users as
quickly as possible.
 Request Fulfilment
 To fulfil Service Requests, which in most cases are minor
(standard) Changes (e.g. requests to change a password) or
requests for information.
 Access Management
 To grant authorized users the right to use a service, while
preventing access to non-authorized users. The Access
Management processes essentially execute policies defined in
Information Security Management. Access Management is
sometimes also referred to as Rights Management or Identity
Management.
 Problem Management
 To manage the lifecycle of all Problems. The primary
objectives of Problem Management are to prevent Incidents
from happening, and to minimize the impact of incidents that
cannot be prevented. Proactive Problem Management
analyses Incident Records, and uses data collected by other
IT Service Management processes to identify trends or
significant Problems.
 IT Operations Control
 To monitor and control the IT services and their underlying
infrastructure. The process IT Operations Control executes
day-to-day routine tasks related to the operation of
infrastructure components and applications. This includes job
scheduling, backup and restore activities, print and output
management, and routine maintenance.
 Facilities Management
 To manage the physical environment where the IT
infrastructure is located. Facilities Management includes all
aspects of managing the physical environment, for example
power and cooling, building access management, and
environmental monitoring.
 Application Management
 Application Management is responsible for managing
applications throughout their lifecycle.
 Technical Management
 Technical Management provides technical expertise and support for
the management of the IT infrastructure.
Continual Service
Improvement
 Service Review
 To review business services and infrastructure services on a
regular basis. The aim of this process is to improve service
quality where necessary, and to identify more economical
ways of providing a service where possible.
 Process Evaluation
 To evaluate processes on a regular basis. This includes
identifying areas where the targeted process metrics are not
reached, and holding regular benchmarking, audits, maturity
assessments and reviews.
 Definition of CSI Initiatives
 To define specific initiatives aimed at improving services and
processes, based on the results of service reviews and
process evaluations. The resulting initiatives are either internal
initiatives pursued by the service provider on his own behalf,
or initiatives which require the customer’s cooperation.
 Monitoring of CSI Initiatives
 To verify if improvement initiatives are proceeding according to plan,
and to introduce corrective measures where necessary.

More Related Content

What's hot

Chap2 2007 Cisa Review Course
Chap2 2007 Cisa Review CourseChap2 2007 Cisa Review Course
Chap2 2007 Cisa Review CourseDesmond Devendran
 
A Best Practices Guide to Quality Management
A Best Practices Guide to Quality ManagementA Best Practices Guide to Quality Management
A Best Practices Guide to Quality ManagementVERSE Solutions
 
Integrated Management System Manual Template (Preview)
Integrated Management System Manual Template (Preview)Integrated Management System Manual Template (Preview)
Integrated Management System Manual Template (Preview)Centauri Business Group Inc.
 
02. cobit 41 dan iso 17799
02. cobit 41 dan iso 1779902. cobit 41 dan iso 17799
02. cobit 41 dan iso 17799Mulyadi Yusuf
 
Senior Manager - IT, Deepak
Senior Manager - IT, DeepakSenior Manager - IT, Deepak
Senior Manager - IT, DeepakDeepak Sharma
 
Chap3 2007 Cisa Review Course
Chap3 2007 Cisa Review CourseChap3 2007 Cisa Review Course
Chap3 2007 Cisa Review CourseDesmond Devendran
 
CISA Domain 1 - IS Auditing (day 1)
CISA Domain 1 - IS Auditing (day 1)CISA Domain 1 - IS Auditing (day 1)
CISA Domain 1 - IS Auditing (day 1)Cyril Soeri
 
ISO TC 176
ISO TC 176ISO TC 176
ISO TC 176kellary1
 
Business continuity planning
Business continuity planningBusiness continuity planning
Business continuity planningSandeep Kashyap
 
Offering Booklet Draft - Generic
Offering Booklet Draft - GenericOffering Booklet Draft - Generic
Offering Booklet Draft - GenericWalter Taraska
 
Teti Ediscovery Presentation 060810
Teti Ediscovery Presentation 060810Teti Ediscovery Presentation 060810
Teti Ediscovery Presentation 060810cmteti
 
Structured Approach To Implementing Information And Records Management (Idrm)...
Structured Approach To Implementing Information And Records Management (Idrm)...Structured Approach To Implementing Information And Records Management (Idrm)...
Structured Approach To Implementing Information And Records Management (Idrm)...Alan McSweeney
 
Implementing quality management system
Implementing quality management systemImplementing quality management system
Implementing quality management systemselinasimpson341
 
Implementing an Integrated Quality Management System in SharePoint
Implementing an Integrated Quality Management System in SharePointImplementing an Integrated Quality Management System in SharePoint
Implementing an Integrated Quality Management System in SharePointMontrium
 

What's hot (20)

ISO 14001.2015 EMS Manual Template (preview)
ISO 14001.2015 EMS Manual Template (preview)ISO 14001.2015 EMS Manual Template (preview)
ISO 14001.2015 EMS Manual Template (preview)
 
Chap2 2007 Cisa Review Course
Chap2 2007 Cisa Review CourseChap2 2007 Cisa Review Course
Chap2 2007 Cisa Review Course
 
A Best Practices Guide to Quality Management
A Best Practices Guide to Quality ManagementA Best Practices Guide to Quality Management
A Best Practices Guide to Quality Management
 
Integrated Management System Manual Template (Preview)
Integrated Management System Manual Template (Preview)Integrated Management System Manual Template (Preview)
Integrated Management System Manual Template (Preview)
 
02. cobit 41 dan iso 17799
02. cobit 41 dan iso 1779902. cobit 41 dan iso 17799
02. cobit 41 dan iso 17799
 
Senior Manager - IT, Deepak
Senior Manager - IT, DeepakSenior Manager - IT, Deepak
Senior Manager - IT, Deepak
 
CISA Training - Chapter 4 - 2016
CISA Training - Chapter 4 - 2016CISA Training - Chapter 4 - 2016
CISA Training - Chapter 4 - 2016
 
Chap3 2007 Cisa Review Course
Chap3 2007 Cisa Review CourseChap3 2007 Cisa Review Course
Chap3 2007 Cisa Review Course
 
Service quality management
Service quality managementService quality management
Service quality management
 
CISA Training - Chapter 3 - 2016
CISA Training - Chapter 3 - 2016CISA Training - Chapter 3 - 2016
CISA Training - Chapter 3 - 2016
 
CISA Domain 1 - IS Auditing (day 1)
CISA Domain 1 - IS Auditing (day 1)CISA Domain 1 - IS Auditing (day 1)
CISA Domain 1 - IS Auditing (day 1)
 
ISO TC 176
ISO TC 176ISO TC 176
ISO TC 176
 
des
desdes
des
 
CISA Training - Chapter 1 - 2016
CISA Training - Chapter 1 - 2016CISA Training - Chapter 1 - 2016
CISA Training - Chapter 1 - 2016
 
Business continuity planning
Business continuity planningBusiness continuity planning
Business continuity planning
 
Offering Booklet Draft - Generic
Offering Booklet Draft - GenericOffering Booklet Draft - Generic
Offering Booklet Draft - Generic
 
Teti Ediscovery Presentation 060810
Teti Ediscovery Presentation 060810Teti Ediscovery Presentation 060810
Teti Ediscovery Presentation 060810
 
Structured Approach To Implementing Information And Records Management (Idrm)...
Structured Approach To Implementing Information And Records Management (Idrm)...Structured Approach To Implementing Information And Records Management (Idrm)...
Structured Approach To Implementing Information And Records Management (Idrm)...
 
Implementing quality management system
Implementing quality management systemImplementing quality management system
Implementing quality management system
 
Implementing an Integrated Quality Management System in SharePoint
Implementing an Integrated Quality Management System in SharePointImplementing an Integrated Quality Management System in SharePoint
Implementing an Integrated Quality Management System in SharePoint
 

Viewers also liked

Copy writing by goigi
Copy writing by goigiCopy writing by goigi
Copy writing by goigigoiginivedita
 
Optimization of a multistorey building by optimum
Optimization of a multistorey building by optimumOptimization of a multistorey building by optimum
Optimization of a multistorey building by optimumeSAT Publishing House
 
Compare and contrast
Compare and contrastCompare and contrast
Compare and contrastMable2003
 
Track Maven - the huge list of 127 marketing tools
Track Maven - the huge list of 127 marketing toolsTrack Maven - the huge list of 127 marketing tools
Track Maven - the huge list of 127 marketing toolsBrooke Tolzmann, OMCP®
 
Content writing by goigi
Content writing by goigiContent writing by goigi
Content writing by goigigoiginivedita
 
Transport layer protocol for urgent data
Transport layer protocol for urgent dataTransport layer protocol for urgent data
Transport layer protocol for urgent dataeSAT Publishing House
 
중고차를 추천받아 쉽게 사는 서비스 츄카(chucar)를 소개합니다!
중고차를 추천받아 쉽게 사는 서비스 츄카(chucar)를 소개합니다!중고차를 추천받아 쉽게 사는 서비스 츄카(chucar)를 소개합니다!
중고차를 추천받아 쉽게 사는 서비스 츄카(chucar)를 소개합니다!chucar
 
Finger vein based biometric security system
Finger vein based biometric security systemFinger vein based biometric security system
Finger vein based biometric security systemeSAT Publishing House
 
Computer integrated
Computer integratedComputer integrated
Computer integratednirmal304
 
Art bank presentation-credit_card_products
Art bank presentation-credit_card_productsArt bank presentation-credit_card_products
Art bank presentation-credit_card_productsART BANK
 
tamer Ali-technical sales-V4
tamer Ali-technical sales-V4tamer Ali-technical sales-V4
tamer Ali-technical sales-V4tamer ali
 
Novatti voucher management brochure
Novatti voucher management brochureNovatti voucher management brochure
Novatti voucher management brochureselnekave
 
VC와 사회문제
VC와 사회문제VC와 사회문제
VC와 사회문제ejw1346
 
Cahit 8-equitability of coronas cn○k1
Cahit 8-equitability of coronas cn○k1Cahit 8-equitability of coronas cn○k1
Cahit 8-equitability of coronas cn○k1eSAT Publishing House
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabseSAT Publishing House
 
Pa geh tanpa nama
Pa geh tanpa namaPa geh tanpa nama
Pa geh tanpa namafahrisyah
 

Viewers also liked (20)

Copy writing by goigi
Copy writing by goigiCopy writing by goigi
Copy writing by goigi
 
Optimization of a multistorey building by optimum
Optimization of a multistorey building by optimumOptimization of a multistorey building by optimum
Optimization of a multistorey building by optimum
 
Compare and contrast
Compare and contrastCompare and contrast
Compare and contrast
 
Track Maven - the huge list of 127 marketing tools
Track Maven - the huge list of 127 marketing toolsTrack Maven - the huge list of 127 marketing tools
Track Maven - the huge list of 127 marketing tools
 
Content writing by goigi
Content writing by goigiContent writing by goigi
Content writing by goigi
 
Transport layer protocol for urgent data
Transport layer protocol for urgent dataTransport layer protocol for urgent data
Transport layer protocol for urgent data
 
중고차를 추천받아 쉽게 사는 서비스 츄카(chucar)를 소개합니다!
중고차를 추천받아 쉽게 사는 서비스 츄카(chucar)를 소개합니다!중고차를 추천받아 쉽게 사는 서비스 츄카(chucar)를 소개합니다!
중고차를 추천받아 쉽게 사는 서비스 츄카(chucar)를 소개합니다!
 
Finger vein based biometric security system
Finger vein based biometric security systemFinger vein based biometric security system
Finger vein based biometric security system
 
Tenggelam
TenggelamTenggelam
Tenggelam
 
Computer integrated
Computer integratedComputer integrated
Computer integrated
 
Art bank presentation-credit_card_products
Art bank presentation-credit_card_productsArt bank presentation-credit_card_products
Art bank presentation-credit_card_products
 
Actividad nro 1
Actividad nro 1Actividad nro 1
Actividad nro 1
 
Patch Review
Patch ReviewPatch Review
Patch Review
 
tamer Ali-technical sales-V4
tamer Ali-technical sales-V4tamer Ali-technical sales-V4
tamer Ali-technical sales-V4
 
Novatti voucher management brochure
Novatti voucher management brochureNovatti voucher management brochure
Novatti voucher management brochure
 
VC와 사회문제
VC와 사회문제VC와 사회문제
VC와 사회문제
 
Cahit 8-equitability of coronas cn○k1
Cahit 8-equitability of coronas cn○k1Cahit 8-equitability of coronas cn○k1
Cahit 8-equitability of coronas cn○k1
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabs
 
Pa geh tanpa nama
Pa geh tanpa namaPa geh tanpa nama
Pa geh tanpa nama
 
Asharani
AsharaniAsharani
Asharani
 

Similar to ITIL Processes V2.0D

It Service Management Implementation Overview
It Service Management Implementation OverviewIt Service Management Implementation Overview
It Service Management Implementation OverviewAlan McSweeney
 
ITIL Introduction
ITIL IntroductionITIL Introduction
ITIL IntroductionRavi Kiran
 
ITIL Practical Guide - Service Operation
ITIL Practical Guide - Service OperationITIL Practical Guide - Service Operation
ITIL Practical Guide - Service OperationAxios Systems
 
ITIL 2011 Overview ppt.pptx
ITIL 2011 Overview ppt.pptxITIL 2011 Overview ppt.pptx
ITIL 2011 Overview ppt.pptxLeTri32
 
Sd hdi 042008
Sd hdi 042008Sd hdi 042008
Sd hdi 042008mhormech
 
ITIL presentation
ITIL presentationITIL presentation
ITIL presentationmhormech
 
Itil & Process Concepts Awareness Tadawul 5 Of March 2007
Itil & Process Concepts Awareness Tadawul 5 Of March 2007Itil & Process Concepts Awareness Tadawul 5 Of March 2007
Itil & Process Concepts Awareness Tadawul 5 Of March 2007Abdulaziz AlFaify
 
Introduction to ITIL v3 Foundation exam
Introduction to ITIL v3 Foundation examIntroduction to ITIL v3 Foundation exam
Introduction to ITIL v3 Foundation examKadimil
 
RDrew ITIL Presentation
RDrew ITIL PresentationRDrew ITIL Presentation
RDrew ITIL PresentationRon Drew
 
Assess and Eliminate Dependencies with ITSM Implementation.pdf
Assess and Eliminate Dependencies with ITSM Implementation.pdfAssess and Eliminate Dependencies with ITSM Implementation.pdf
Assess and Eliminate Dependencies with ITSM Implementation.pdfAelum Consulting
 
ITIL V3 Overiview Introduction
ITIL V3 Overiview IntroductionITIL V3 Overiview Introduction
ITIL V3 Overiview IntroductionShafiq_Hamid
 
Applying the CMMI for Services to the Process Group (Physician, Heal Thyself!)
Applying the CMMI for Services to the Process Group (Physician, Heal Thyself!)Applying the CMMI for Services to the Process Group (Physician, Heal Thyself!)
Applying the CMMI for Services to the Process Group (Physician, Heal Thyself!)rhefner
 
Iti Lprocessmgmt
Iti LprocessmgmtIti Lprocessmgmt
Iti Lprocessmgmtparamalways
 
Mountainview ITSM: ITIL Edition 2007 Process Poster
Mountainview ITSM: ITIL Edition 2007 Process PosterMountainview ITSM: ITIL Edition 2007 Process Poster
Mountainview ITSM: ITIL Edition 2007 Process PosterJerry Kopan
 

Similar to ITIL Processes V2.0D (20)

It Service Management Implementation Overview
It Service Management Implementation OverviewIt Service Management Implementation Overview
It Service Management Implementation Overview
 
Itil V3
Itil V3Itil V3
Itil V3
 
ITIL Introduction
ITIL IntroductionITIL Introduction
ITIL Introduction
 
ITIL Practical Guide - Service Operation
ITIL Practical Guide - Service OperationITIL Practical Guide - Service Operation
ITIL Practical Guide - Service Operation
 
Itsm
ItsmItsm
Itsm
 
Itil Service Level Mgmnt
Itil Service Level MgmntItil Service Level Mgmnt
Itil Service Level Mgmnt
 
About itil v3
About itil v3About itil v3
About itil v3
 
Dit yvol3iss47
Dit yvol3iss47Dit yvol3iss47
Dit yvol3iss47
 
ITIL 2011 Overview ppt.pptx
ITIL 2011 Overview ppt.pptxITIL 2011 Overview ppt.pptx
ITIL 2011 Overview ppt.pptx
 
Sd hdi 042008
Sd hdi 042008Sd hdi 042008
Sd hdi 042008
 
ITIL presentation
ITIL presentationITIL presentation
ITIL presentation
 
Itil & Process Concepts Awareness Tadawul 5 Of March 2007
Itil & Process Concepts Awareness Tadawul 5 Of March 2007Itil & Process Concepts Awareness Tadawul 5 Of March 2007
Itil & Process Concepts Awareness Tadawul 5 Of March 2007
 
Introduction to ITIL v3 Foundation exam
Introduction to ITIL v3 Foundation examIntroduction to ITIL v3 Foundation exam
Introduction to ITIL v3 Foundation exam
 
RDrew ITIL Presentation
RDrew ITIL PresentationRDrew ITIL Presentation
RDrew ITIL Presentation
 
Assess and Eliminate Dependencies with ITSM Implementation.pdf
Assess and Eliminate Dependencies with ITSM Implementation.pdfAssess and Eliminate Dependencies with ITSM Implementation.pdf
Assess and Eliminate Dependencies with ITSM Implementation.pdf
 
ITIL V3 Overiview Introduction
ITIL V3 Overiview IntroductionITIL V3 Overiview Introduction
ITIL V3 Overiview Introduction
 
Applying the CMMI for Services to the Process Group (Physician, Heal Thyself!)
Applying the CMMI for Services to the Process Group (Physician, Heal Thyself!)Applying the CMMI for Services to the Process Group (Physician, Heal Thyself!)
Applying the CMMI for Services to the Process Group (Physician, Heal Thyself!)
 
ITIL V3
ITIL V3ITIL V3
ITIL V3
 
Iti Lprocessmgmt
Iti LprocessmgmtIti Lprocessmgmt
Iti Lprocessmgmt
 
Mountainview ITSM: ITIL Edition 2007 Process Poster
Mountainview ITSM: ITIL Edition 2007 Process PosterMountainview ITSM: ITIL Edition 2007 Process Poster
Mountainview ITSM: ITIL Edition 2007 Process Poster
 

ITIL Processes V2.0D

  • 1. ITIL Stage Processes Service Strategy  Strategy Management for IT Services  Provide business stakeholder value  Differentiate the organisation  Make solid cases for investment  Resolve conflicting demands for services  Service Portfolio Management  Include the complete set of services managed by a service provider  Manage the entire lifecycle of all services  Service pipeline (proposed or in development)  Service catalogue (live or available for deployment)  Retired services (decommissioned services)  Demand Management  Analysing patterns of activity and user profiles  Provisioning capacity in line with strategic objectives  Financial Management for IT Services  To provide cost effective stewardship of the IT assets and resources used in providing IT services  To assist management decisions on IT investment by providing detailed cost analysis regarding changes to IT services  Budgeting and IT Accounting  Business Relationships Management  Identify Service Requirements  Customer Satisfaction Survey  Handle Customer Complaints  Monitor Customer Complaints Service Design  Design Coordination  New or changed services  Service management systems and tools, especially the service portfolio, including the service catalogue  Technology architecture and management systems  The processes required  Measurement methods and metrics  Service Catalogue Management  Define, document, agree, monitor, measure, report and review the level of IT services provided  Provide and improve the relationship and communication with the business/customer  Ensure that specific and measurable targets are developed for all IT services  Monitor and improve customer satisfaction  Ensure that IT and the customers have a clear and unambiguous understanding of the level of service to be  Delivered  Ensure that improvements to the levels of service are implemented wherever the service is failing, and the
  • 2.  that these improvements are cost justified  Service Level Management 1. Identification  Analysing current services and service level requirements  Recording the current service provision in a service catalogue 2. Definition  Matching and customising (with the customer) of the right service provision against the right costs:  Service catalogue  Demands of the customer (service level requirements) 3. Agreement (defining and signing SLAs)  Service Level Agreements, supported by: Operational Level Agreements (OLA’s) and underpinning contracts 4. Monitoring  Measuring the actual service levels against the agreed service levels 5. Reporting  Reporting on the service provision (to the customer and the IT organisation) 6. Evaluation (review)  Evaluate the service provision with the customer  Match and customise: adjust service provision if required? (service improvement plan/programme, service quality plan)  Match and customise: adjust SLA if required  Risk Management  Capacity Management The capacity managementprocessunderstandsthe businessrequirements (the requiredservice delivery),the organisation’soperation(the current service delivery) andthe ITinfrastructure (the meansof service delivery).It ensuresthatall the current andfuture capacityand performance aspectsof the businessrequirementsare provided costeffectively.  Demand management  Application sizing  Modelling  Capacity management database  Capacity plan  AvailabilityManagement  Ensure that appropriate design and planning of availability takes place for all new services  Planning, design and improvement of availability  Providing cost effective availability improvements that can deliver business and customer benefits  Ensuring agreed level of availability is provided  Produce and maintain an availability plan  IT Service Continuity Management 1. Initiation o „ Linkwithbusinesscontinuityplan o „ Policysetting
  • 3. o „ Termsof reference andscope o „ Allocate resources 2. Requirements and strategy o Input from availability management and security management (risk assessment) o Business impact analysis o Discuss recovery options (link to SLM) 3. Implementation o „ Write continuity plans, including:  Emergency response plan  Damage assessment plan  Salvage plan  Crisis management and PR plan  „ Implement standby arrangements  „ Implement recovery options  „ Test the plans  „ Develop and implement procedures and working instructions 4. Operational management  „ Link ITSCM to change management to keep plans and recovery options up to date  „ IT staff need to be aware and trained to use the plans  „ Continuous improvement of the process through review and testing  Information Security Management  Production, review and revision of an overall information security policy and a set of supporting specific  Policies  Communication, implementation and enforcement of the security policies  Assessment and clarification of all information assets and documentation  Implementation, review, revision and improvement of a set of security controls and risk assessment and  responses  Monitoring and management of all security breaches and major security incidents  Schedule and completion of security reviews, audits and penetration tests  Supplier Management  Obtain value for money from suppliers and contracts  Work with SLM to ensure UCs support and are aligned with business needs, SLRs and SLAs  Negotiate and agree UCs and manage through their lifecycle  Manage supplier relationships and performance  Maintain a supplier policy and a Supplier and Contract Database (SCD) Service Transition  Change Management  To control the lifecycle of all Changes. The primary objective of Change Management is to enable beneficial Changes to be made, with minimum disruption to IT services.  Change Evaluation  Process Objective: To assess major Changes, like the introduction of a new service or a substantial change to an existing service, before those Changes are allowed to proceed to the next phase in their lifecycle.  Project Management (Transition Planning and Support)  To plan and coordinate the resources to deploy a major Release within the predicted cost, time and quality estimates.
  • 4.  Application Development  To make available applications and systems which provide the required functionality for IT services. This process includes the development and maintenance of custom applications as well as the customization of products from software vendors.  Release and Deployment Management  To plan, schedule and control the movement of releases to test and live environments. The primary goal of Release Management is to ensure that the integrity of the live environment is protected and that the correct components are released.  Service Validation and Testing  To ensure that deployed Releases and the resulting services meet customer expectations, and to verify that IT operations is able to support the new service.  Service Asset and Configuration Management  To maintain information about Configuration Items required delivering an IT service, including their relationships.  Knowledge Management  To gather, analyse, store and share knowledge and information within an organization. The primary purpose of Knowledge Management is to improve efficiency by reducing the need to rediscover knowledge. Service Operation  Event Management  To make sure CIs and services are constantly monitored, and to filter and categorize Events in order to decide on appropriate actions.  Incident Management  To manage the lifecycle of all Incidents. The primary objective of Incident Management is to return the IT service to users as quickly as possible.  Request Fulfilment  To fulfil Service Requests, which in most cases are minor (standard) Changes (e.g. requests to change a password) or requests for information.  Access Management  To grant authorized users the right to use a service, while preventing access to non-authorized users. The Access Management processes essentially execute policies defined in Information Security Management. Access Management is sometimes also referred to as Rights Management or Identity Management.  Problem Management  To manage the lifecycle of all Problems. The primary objectives of Problem Management are to prevent Incidents from happening, and to minimize the impact of incidents that cannot be prevented. Proactive Problem Management analyses Incident Records, and uses data collected by other IT Service Management processes to identify trends or significant Problems.  IT Operations Control  To monitor and control the IT services and their underlying infrastructure. The process IT Operations Control executes day-to-day routine tasks related to the operation of infrastructure components and applications. This includes job scheduling, backup and restore activities, print and output management, and routine maintenance.  Facilities Management  To manage the physical environment where the IT
  • 5. infrastructure is located. Facilities Management includes all aspects of managing the physical environment, for example power and cooling, building access management, and environmental monitoring.  Application Management  Application Management is responsible for managing applications throughout their lifecycle.  Technical Management  Technical Management provides technical expertise and support for the management of the IT infrastructure. Continual Service Improvement  Service Review  To review business services and infrastructure services on a regular basis. The aim of this process is to improve service quality where necessary, and to identify more economical ways of providing a service where possible.  Process Evaluation  To evaluate processes on a regular basis. This includes identifying areas where the targeted process metrics are not reached, and holding regular benchmarking, audits, maturity assessments and reviews.  Definition of CSI Initiatives  To define specific initiatives aimed at improving services and processes, based on the results of service reviews and process evaluations. The resulting initiatives are either internal initiatives pursued by the service provider on his own behalf, or initiatives which require the customer’s cooperation.  Monitoring of CSI Initiatives  To verify if improvement initiatives are proceeding according to plan, and to introduce corrective measures where necessary.