Itil Foundation Presentation

  • Uploaded by: shahdeo
  • 0
  • 0
  • November 2019
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Itil Foundation Presentation as PDF for free.

More details

  • Words: 3,735
  • Pages: 84
ITIL Essentials for IT Service Management

1

The Philosophy of Service Management

IT is the business And The business is IT

2

Triple P To let the philosophy work, we need:

• People – Customers, Users, IT Staff & Top -Management • Processes – ITIL • Products – Tools and IT technology 3

IT Process

Decision Making Level: ITIL definition (s)

Objective

Result Activities

Operational Level

Department X

Department Y

Input

Department Z

Output Process

4

Deming Quality Circle

Maturity

Continuous Step by step improvement

Act Plan Check Do ty

li a Qu

Plan (Project Plan) Do (Project) Check (Audit) Act (New actions)

Time Scale 5

The Objective of Service Management • Align IT services in such a way that

they will always meet the business/ organization needs which will change in time • Quality Improvement of the IT services Provided • Reduce long-term costs of the IT services provided Service Management: is the delivery of customer-focused IT services, by using a process-oriented approach/ Method 6

ITIL (CCTA’s) Reference Model

IT Customer Relationship Management

Release Management Change Management Configuration Management

Service Level Management Financial Management for IT Services

Service Delivery

Service Support Problem Management Incident Management

Capacity Management IT Service Continuity Management

Service Desk

Availability Management

Security Management

7

ITIL Certification Program Serv ic e

Service Delivery

Mg t. 2

Service Mgt. 1

Service Support

Case Studies

ITIL Pr act itio ner s : -Configuration Management -Service Desk

+ Exam

-Problem Management -Change Management -Capacity Management -Availability Management -Financial Management For IT Services -Service Level management

IT IL Fou nd ati on (3 -d ay Cour se) 8

ITIL in a Nutshell (1) Bridge

IT

Business

GAP 9

ITIL in a Nutshell (2) Bridge =SLM

Supplier UC’S

GAP

Bridge =SLM

IT

Business

OLA’s

SLA’s

GAP 10

ITIL in a Nutshell (3) Bridge =SLM $ Pricing

Supplier UC’S

GAP Service Service

Bridge =SLM Service

IT

Business

OLA’s

SLA’s

GAP $ Charging 11

ITIL in a Nutshell (4) Bridge =SLM $ Pricing

Bridge =SLM Service

$

Profit Supplier UC’S

GAP Service Service

IT

Business

OLA’s

SLA’s

GAP $ Charging 12

ITIL in a Nutshell (5) Bridge =SLM $ Pricing

Bridge =SLM Service

Service

Profit Supplier UC’S

GAP Service Service

IT

Business

OLA’s

SLA’s

GAP $ Charging

Suppliers

Pricing

$ 13

 Goals of Configuration Management • Is to Provide information on the total IT



Infrastructure for: – ITIL processes – (IT) Management Keep in control of the IT infrastructure by monitoring, maintaining and updating information on: – All the resources needed to deliver services – Status and history of the Configuration Items(=CI’s) – Relationships of the CI’s 14

Configuration Item (CI) •A Configuration Item is: – needed to deliver service – uniquely identifiable – subject to change – Can be managed

15

• Asset •



Assets versus Configuration Items

– Element/ part of a business/ Organization process Configuration Item (CI) – Element/ part of an IT infrastructure - or an item associated with an IT infrastructure which is under the control of Configuration Management Configuration Management Database (CMDB) – A database, which contains all relevant details of each CI and details of the important relationships between CI’s NOTE: A CMDB contains RELATIONSHIPS BETWEEN CI’s , DOCUMENTATION and goes much further than an Asset DB 16 Tool

Configuration management Process

Plannin g Identification/ verification Register & Recoding of CI’s Status Accounting Controlling & Updating Auditin g

Configuration Items =(CI’s) Service s Environmen t HW/ SW

Detail (Attributes)

CMDB Scope (Category)

Documentatio n Procedure s Processes

Contract s SLA’s, OLA’s UC’s WI (= Work Instructions) Manuals Relationships between CI’s Baseline Models 17

er w k Po ea br

How to Determine IMPACT of Incidents through the Relationships between the CI’s

DB Virus Scanners

Security

Backup os

18

Baseline • Configuration Baseline – Configuration of a product or system established at a specific moment in time, which captures both the structure and details of the product or system – A snapshot or a position, which is recorded. Although the position may be updated later, the baseline remains unchanged and available as a reference of the original state and as a comparison against the current position 19

Life Cycle of a CI …



ir

Re pa

ti o

an ce

en

n w n

Do nt

e M ai

… Ar . ch iv ed



In

In

ok

Br

uc

od

st

Pr

Te

In

In

ed

ed

er

rd

O

nn

Detail of the CMDB

Pl a

Status of CI’s

Scope of the CMDB 20

 Goals of Incident Management • To restore the normal service operation(s) as quickly as possible according to the agreed SLA’s

• Minimize the impact on business operations • Ensuring that the best possible levels of service quality and availability are maintained according to the existing SLA’s

• Managing Incidents and Service Request’s from beginning till end and communicate about them till the moment they can be closed

21

Service Desk in an ITIL Environment • A more structured approach to controlling • • • • • • •

incidents Single Point Of Contact (=SPOC) The face of the IT organization Not a process but a functionality in the ITIL Methodology Initiating escalation procedures Reports of different types arrive at the Service Desk (= Service Requests & Incidents) Responsible for supplying first-line support and assistance in daily use of IT Services Local, Centralized & Virtual Service Desk(s)= Structures! 22

Terminology

• Incident Any event / interruption, which is not part of the standard operation of a Service or causes a reduction in the quality of that service • Work-Around Method/ temporary solution of avoiding an Incident, so that the normal standard operation can continue • Service Request Every Incident not being a failure in the IT Infrastructure (=Password redefinition) 23

Incident Management (=IM) Process Incident/ SRQ

Incident Management Service Desk =SPO Incident Detection and recording Classification of Incident(s) & Service Request(s) - Impact - Urgency

Users

C

Prioritization * High * Medium * Low

CMDB

Knowledge out of Configuration Management

Categorization - Hardware - Software

24

Service Requests are dealt within SRQ procedures Matching of Incidents

Outstanding Incidents DB K.E. / Workarounds DB

Knowledge out of Problem Management

Problem DB

Routing Incidents 1st Line-Support 2nd Line-Support 3rd Line-Support

Escalation Inform / Support (vertical escalation)

Service Desk

Knowledge (functional/horizontal escalation)

25

 Goals of Problem Management • To make sure that we minimize the

operational impact of Incidents and Problems, which are caused by errors within the IT Infrastructure

• To prevent repeated Incidents from

happening again, which are related to errors

• To Improve productive use of (IT)

resources, by knowing how to use them (Knowledge DB) 26

Terminology

• Problem – When the root cause (=underlying cause) of one or more incidents is not known • Known Error – A condition that exists after the successful diagnosis of the root cause of an Incident or Incidents, when it is confirmed that a CI is at fault. (We can remove the error by implementing a change) 27

Problem Management Process (1) Service Escalation of Incidents

Desk

Problem Management

Recording Escalated Incident(s) Assign Resources

Establish Workaround first Problem Record through PM SubProcesses 28

Sub-Processes Problem Management (2) Escalation Problem Record

Escalation Known Error Record

1 Problem

Identification and Control registration

Fi ot Ro nd use Ca

Assigning Resources Investigation and Diagnosis

Error Control Identification and Recording

T” ES “B n tio nd Fi Solu

Classification

Error

2

Error Assessment

Recording Error Resolution (RFC)

RFC

Successful completion

Error (Record) Closure Establish Known Error 29

From Reactive  Proactive Problem Management Prevention of

problems on/ in ITInfrastructure

Monitor Change Managemen t Initiating changes: • Fix Incidents • Control RFC Identify trends/ trend analysis Problem identification & diagnosis Delivering (2nd) & 3rd line support 30

 Goals of Change Management To implement changes which are approved and authorized by change management and which are proven efficient & effective, so that they can be implemented with acceptable risk in the existing IT-Infrastructure, or to the new IT Service(s)

31

Terminology • Change The addition of…, the modification of…, or the removal of…, approved and supported CI’s or baseline CI’s • Request for Change Form use to record details of a request for a change to any CI; can be submitted from each single ITIL Process • Forward Schedule of Changes Schedule that contains details of all the Changes authorized for implementation and their proposed implementation dates. It also shows the dependency of each change!!!

32

Impact of a Change • Standard

The change may be executed without contacting the Change Manager (Manual with standard Changes)

• Category 1

Small Business impact on the Services. The Change Manager is entitled to authorize this RFC

• Category 2

Medium Business Impact on the services. The RFC must be discussed in the CAB. The Change Manager requests advice on authorization and planning

• Category 3

Large Business Impact on the services. Management is involved in the decision process 33

Priority of a Change • Urgent Change necessary immediately, approval by CAB/Emergency Committee (CAB/CEC) • High Change needed as soon as possible • Medium Change will solve annoying errors or missing functionalities (can be scheduled) • Low Change leads to minor improvements (which is not contractually necessarily) 34

Change Management Process

Entering Change Managemen t Process

Projec t

Change Manager does Registration & Classification of RFC’s

RFC’s

Verification

Planning & Controlling the Project

Approval /Refusal by CAB (Change Advisory Board)

Roll Out BackOut

Implementa tion

Authorization /Refusal for Implementation by the Change Manager

Built Phase

Test Phase of Roll Back & Project 35

Periodic Audit within Change Management

P.I.R

Audit Carried out by External (independent) Organization 36

The Change Advisory Board (CAB)

Change Manager (Chair Man)

Release Manager

Service Level Manager

A A

R

A

Financial Manager

Incident Manager

Problem Manager

Configuration Manager

User /Dept. Manager

Business Representation

37

Clarification

Change Manager Release Manager

38

 Goals of Release Management • Plan and Manage the rollout of SW & HW • Design and implement efficient & effective procedures • Manage customer expectations during rollout • Agree upon the content and rollout plan for a release • To implement new software & hardware releases into the production environment • Secure all software masters in the definitive software library • Use the configuration management process to ensure that all hardware and licensed software which has been rolled out is 39 changed in the CMDB, secured & traceable

Definitive Software Library (DSL) Protection of all Authorized Software Versions Base for Releases

One or More Physical File Stores

DSL Linked with CMDB

Logical Storage Distribution

40

Definitive Hardware Store (DHS) Protection of Hardware Spares and Components Spares for Recovery

Linked with CMDB

DHS

Components for Changes

One or More Physical File Storages

41

Form of Releases Full, Package And Delta Release

Emergency Release Release Unit

Release policies Release Frequency

Version Numbering

42

 Goals of Capacity Management

To determine the right Capacity, against the right costs and justifiable considerations of IT resources. So that the agreed Service Levels with business are achieved at the right time and at the right moment.

43

Capacity Management Process Demand Management (INPUT)

Business Capacity Management

Service Capacity Management

Resource Capacity Management

Capacity Database (INPUT) Capacity Plan 44

Sizing and Modelling • Application Sizing Determining the hardware capacity required to support new (or adapted) applications, according to the agreed SLA’s

• Modelling – Trend analysis – Simulation modelling – Baseline models

45

 Goals of Availability Management • To predict…, plan for… and manage… the availability of services provided by ensuring that: – All services are sufficient, reliable and proper maintained, incl. CI’s – Where CI’s are not supported by the Internal IT Organization, then there must be appropriate underpinning contracts with suppliers – Request for Change’s must be submitted to prevent future loss of IT service(s)

46

Responsibilities of Availability Management • Optimize availability by monitoring, managing & reporting • Determine availability requirements in business needs • Predicting, planning & designing for expected levels of availability & security • Developing of the Availability Plan • Collecting, analyzing and managing data • Monitoring the availability levels to ensure that SLA’s & OLA’s are met • Continuously step by step improvement of the availability levels

47

Terminology – Availability = MTBF (Mean Time Between Failures= Up Time) – Maintainability = MTTR (Mean Time To Repair =Down Time) – Serviceability = MTTR (Mean Time To Repair =Down Time) – Reliability =MTBSI (Mean Time Between System Incidents) – Resilience (Redundancy) – Security = (Confidentiality, Integrity & Availability)

48

The Unavailability LifeCycle

T Unavailable=Downtime A M v i T a m il T B e a R F b l = e S A = e v U a rp ti v il m e a i

R W I T M e T I s M B t E S o I r = e R e l b c e il i

49

CRAMM= CCTA’s Risk Analysis Management Methodology

Threats Value of Assets

Risk Analysis

Vulnerabilit ies

Risk Management

Counter Measures

Planning for potential Outage

Managing an Outage

50

When Is a Service Available? “IT Service(s) is/ are not available to a customer if the function(s) required during Service Hours at that particular Location can not be used. This does not necessarily means that the agreed SLA conditions are not being met” To calculate the Availability we use the following formula: Availability=

(AST-DT) AST

X 100% 51

Availability Formula In Series

In Parallel Avail = 90%

Network Printer

Disk Y Print Server

Avail = 90%

Avail = 80%

Disk Z

Avail = 80%

Available only if both work =

Available = 1 - Not Available =

AxB =

1 - both down =

0.90 * 0.80 = 0.72 or 72%

1 - (Y Down) x (Z Down) = 1- 0.1 * 0.2 = 0.98 or 98% 52

Security Management

• The Process of managing a appropriate level of security on information and IT Services • Protection of Security in a more structural an organized manner • Managing and Controlling Security procedures

53

Structure of Security Management

S B S I e u L T c s A S u ri i e t n cy e u P

54

Security Definitions (1) CI A

E A C P S I v o n ar a n o s tf e u fti g eril a d u c ri b e n ati n g tri

55

Security Definitions(2) •Risks Analysis (Quantitative Process) & Risk Assessment (Qualitative Process); CRAMM •Security Policy; why security is done •Security Standard; What to do •Security Procedures; How to do IT •BS 7799 (Code of practice for Information Security Management) & ISO/IEC 17799 (Document Developed in the UK initially by the heads of six commercial Organizations, is not a Cookbook for Security) 56

Security Lifecycle

ti

c

e

t

ct D io e n

yut

nsre

isnoi a v d g no/ e Rt n

m cuevr acetr easoit nio

narperl h ae

R C P E D T R I oevr

d

57

Information Security Model (ISM) Information Security Policy Risk Analysis External Influence

Operational Measures

Business Drives

Planning

Evaluation & Audit 58

BS 7799 & ISO/IEC 17799

The 10 Control areas defined within ISO/IEC 17799 (British Standard BS 7799

The Code of Practice for Information Security Management Security Policy Security Organization Asset Classification and Control Personnel Security Physical & environmental Security Communications & Operations Management

Access Control Systems development & Maintenance Business Continuity Management Compliance 59

Security Activities • Assess (Analyze) Risk; Prerequisite to implement any security measures

•Manage Risk reactively; Quick action, Counter-measures •Develop Security Policy; document that is easy to read & assimulate

•Manage Risk Proactively; to modify the security regime to achieve the optimum level of security commensurate with its cost & impact

•Monitor Security; Security must be monitored on an appropriate basis and on regular times

•Report; Periodic and ad hoc reporting is an important aspect of keeping security in the forefront of the organization’s collective mind 60

Benefits • Corporate Management Receive Assurance • Business Continuity is assured • Risk Assessment is “Enforced” • Management attention is focused on Value • Everyone thinks differently about Information

61

Challenges • Expensive and no Benefits • The ‘Ostrich Approach’, or “IT’ll never happen • • •

2me!” You can not protect against all the threats Lack of Senior Management interest “Entropy Rules”; Security degrades over time!, Maintaining security at the agreed level is an imperative

• No ‘Security by Design’; Many ‘Legacy’ applications do not have security embedded in them.

• Locks on grass huts; There is no point securing one aspect of an information system or IT Infrastructure, if the rest is less secure. Similarly, failing in one small area of security is failing overall 62

Reporting • •

Risk Assessment Reports Security Breaches with details of:

3. 4. 5. 6. 7.

type of Breaches How caused Counter-measures in place (and why failed) Actions taken, and to what effect Recommendations for action to avoid repetition



Recommendations for Changes to:

9. 10. 11.

policy Procedures Standards



Recommendations for new guidelines 63

IT Service Continuity Management

Reduce Time of Recovery

Reduce Costs

Survival 64

ITSCM Process (1) Initiate Continuity MGT

Initiation

Business Impact Analysis

Requirements and Strategy

Risk Assessment Business Continuity Strategy Organization and Implementation Planning

Implementation

Implement Stand-by Arrangements

Implement Develop Risk Reduction Recovery Plans Measures

Develop Procedures Initial Testing

65

ITSCM Process (2) (=Operational)

Testing Review & Audit

Change Manageme nt

Education & Awareness

Training

Assurance 66

CRAMM= CCTA’s Risk Analysis Management Methodology (=based on Business Impact)

Threats Value of Assets

Risk Analysis

Vulnerabiliti es

Risk Management

Counter Measures

Planning for potential Disaster

Managing a Disaster 67

Recovery Options

Cold Standby

Gradual Recovery Warm Standby Intermediate Recovery HOT Standby

Immediate Recovery 68

Roles & Responsibilities in Normal Operation, Change during a Crisis Situation Does everybody know what role to play in a crisis situation Does everybody know what the roles are and to whom they belong during a crisis situation 69

Extensive Testing & Reviewing of the ITSCM Plan • Every 6 to 12 months and after each disaster! • Test it under realistic circumstances! • Move / protect any live services first! • Review and change ITSCM plan! • ALL change through the Change Advisory Board! (=Change Management Process) 70

Financial Management For IT Services Charge s Business IT Requirements

IT Operational Plan (Incl. Budgets) Financial Targets

Cost Analysis (IT Accounting) Cost Models

Charge s Charge s

Charging Policies

Feedback about proposed charges to Business 71

IT- Accounting • Base IT decisions on cost-effective

assessments, in such a way that it is measured service by service

• Provide Management with information to justify IT expenditures & investments to Business

• Plan and budget with confidence and Integrity, so that the ring of trust can not be broken

• Show under- or over-consumption of service(s) in financial terms to Business / Customers

72

Charging

• Customers paying the full costs of the IT services provided in a fair manner (“…what you use is what you pay for……”)

• Ensure that customers are aware of

the costs they spent on IT Services and influence customer behavior by advising them how to spend their IT Funds

• Make formal evaluations of IT

services and plan for investments, based on cost recovery and

73

Charging & Pricing Options Charging • No charging • Notional Charging / Differential Charging • Actual/Real Charging Pricing • Recover of costs • Cost price plus • Going Rate • Market prices • Fixed Price 74

Service Level Management Balance between:

Demand for IT services

&

Supply of IT services

How???: – Know the requirements of the business – Know the capabilities of the IT Organization 75

 Goals of Service Level Management • IT CRM (between customer and IT supplier)

• Better Customer understanding of IT services requirements

• More flexible and more responsiveness in IT services provision

• Balance customer demands against cost of services provision

• Measurable service levels

(SMART=Specific, Measurable, Achievable, Realistic, & Time Bound)

• Quality improvement (continuous review & Step by Step…)

76

Service Management Reports • Everything is measured from the

customers perspective • Data such as “reaction times, escalation times and IT Service support” should be made measurable • Reports should be produced on regular bases, and they should be used • Reports contains measuring values concerning the “NOW” supporting Service levels and the latest trend 77 developments in that Service(s)

Re vie AU w S DI LA TS 's Re vi Pr ew oc SL es M s

4

PERIODIC REVIEW

MANAGE THE ONGOING PROCESS

tio

OL Re A’ ate vie sa w nd ex UC’ s, ist in g SL A’ s Ag re e

Ne go ti

Dr aft

n

2

IMPLEMENT SLA’s

Re vie w

Re po rt

nt a

ESTABLISH FUNCTION

ito r

me

g

1

Mo n

ple

nin

an

Ca Se talog rvi ue ce s

Im

Pl

The Service Level Management Process Define Execute Control

3 78

Contracts:

II OLA’s C O S U n T e u L C t p A re’ s O v p s rt’ o s rli n a m g ci al e I n r T C (i D

79

Service Quality Plan (SQP) • Internal service description of

responsibilities and delivery times to meet the agreed service level(s)

• Must be Focused on IT staff (performance & delivery)

• Describes exactly what we need to do, to deliver the desired quality of service

• Description based on the actions to be take when we do not deliver the correct quality agreed in the service level(s) “Written upfront”

80

Service Improvement Program (SIP) • Objective: – Controlled improvement of the IT Service provided

• Used whenever there is a need in/ for – Deviation from agreed levels – Strategic choice – Continuous Improvement

• More than one SIP’s can run simultaneously

81

Elements of a Service Level Agreement General Introduction • Parties • Signatures • Service Description(s)

Reporting & reviewing • Content • Frequencies

Incentives & Penalties

Support Service Hours Support Change Procedures Escalation

Delivery Availability Reliability Throughput Transaction response times Batch turnaround times Contingency & Security Charging

82

Exam Preparation

83

BREAK A LEG!!!!!!! ITIL S N O I T A D N U O F

e World Wid d Recognize

84

Related Documents

Itil Foundation Presentation
November 2019 14
Itil Foundation
October 2019 16
Itil Foundation Samples 800
November 2019 19
Itil Foundation V4.docx
December 2019 17

More Documents from ""

Itil Foundation Presentation
November 2019 14