User Guide - ITIL
User Guide - ITIL
SACM plan is necessary for any IT organization as it prompts information to the operational
managers about the operational activities in the five phases:
Known error is an error that is known to the IT infrastructure and that has occurred before,
and one that has a discovered solution (which is a work around but not a permanent fix). All
known errors are stored in a database called Known error database (KEDB).
Any record that encompasses the complete details of a known error is called known error
record.
Problem management is the standardized process for managing problems and known errors
by identifying the root cause of the issue, discovering a work around and permanent fix.
Proactive problem management identifies, analyzes, and develops a resolution plan for
recurring incidents or an incident that has no solution. Proactive problem management
identifies future issues through processes like event management, incident management,
availability management, and capacity management. Proactive problem management
analyzes events, incidents, availability, and capacity designs, and identifies vulnerabilities
that can turn into problems.
Reactive problem management does the post-mortem investigation, diagnosis, and develops
resolution plan after the breakdown of services.
Objectives:
Incident Management:
The Incident Owner resolves an incident by
giving a workaround in order to restore the
service as soon as possible as per the objective
of Incident Management, and the need for a
problem analysis of the incident is detected.
Symptoms
Incident Details
All incidents related to the Problem
must be linked to the Problem Record
3.0 Categorize and prioritize Service desk categorizes the tickets based on
the CTI. Then the problem tickets are
prioritized based on the urgency and impact of
the underlying incident.
Symptoms
Impact details
Any dependencies
Inputs
Outputs
The best way to implement ITIL processes is in a phased approach, for that first you would
need to understand what are the pain points in the IT, what is the most important process
applicable for IT operations, and the implementation methodology. Some of the popular
implementation methodologies can be defined as Deming cycle and Six sigma DMADV.
So here in this article, I am going to explain the ITIL implementation in PDCA approach.
Plan
Prepare the project charter, consisting of a business case, goal statement, project plan, project
scope, and roles and responsibilities.
Business case -should describe the benefits and opportunities of considering the following
areas:
What are the short-term benefits and long-term benefits of this project?
Does this new initiative align with other business processes, if any exist?
What impacts will this new initiative have on other business units and employees? Pros and
cons.
Should we have an explicit <Respective process> function ?
What are the risks and issues involved, what are the dependencies?
Business needs.
Estimations of costs on infrastructure assets (hardware, software, people-ware) and other
miscellaneous things.
Goal statement –should be closely associated with the prepared business case. Goals should
be SMART and mention:
Project interfaces - should define the boundaries, scope, relationships of the <Respective
process> .
Project plan - should show the timeline, milestones for various activities to establish
<Respective process> function in place and run the process.
Roles and responsibilities - should identify the required roles and hire the human resources.
Primary roles needed for <Respective process> , can be defined as:
Process manager
Process practitioner
Process owner
Operational roles
Develop
Develop the SOW for the <Respective process> process, defining the:
Hardware software
Check
Ensure that all unresolved issues are tracked and escalated to the next level of supervision in
consideration with SLAs.
Ensure all issues are registered, categorized, tracked, and closed in the <Respective process>
tool.
Update the IT contacts list regularly, with all the necessary contact details.
Ensure the operation is in consideration with metrics, and SLT's defined in SLAs.
Act
Now the next thing is ITIL v4, which is going to release in a year or 2 years, which would
have some new concepts focusing on the multi-supplier management, cyber security in
information security management, guidance on implementing and using ITIL with agile, lean
and devops methodologies, guidance for automation, guidance for adapting and adopting
ITIL.
ITIL v4 restructuring and redesigning is going to happen on six design principles, which will
focus on Provision of Value, Designs for human centred experience, Working holistically,
Progressing iteratively, Keeping the framework simple and collaborative.
ITIL v4 Principles
Modular: This principle allows different frequency of updates to the upcoming version.
Lean: This principle eliminates the unnecessary content in the core guidance.
Practical: This principle provides useful advice, examples, and templates in the core
guidance.
Evolutionary: This principle ensures the evolution is focusing on the new trends and patterns
in the business and technology.
Collaborative: This principle ensures that the ITIL v4 framework is co-developed by ITSM
professionals, not just by some folks from specific region or specific experience.
Flexible: This principle ensures that the ITIL v4 framework can be adapted and adopted as
per the new practices like agile, devops, lean and etc.
ITIL v3 focused on identifying operational goals, creating concepts, and fitting concepts to
users.
ITIL v4 focus would be on understanding humans, creating concepts, and building
operational systems.
ITIL v4 will focus more on understanding the customer and their experiences and driving
business decisions from the customer perspectives.
Cloud computing will have huge impact on many of the ITSM processes. For example,
change management, change requests in cloud environments can be triggered for various
reasons as mentioned below:
An end user currently uses Microsoft office cloud services like MS-Word, Powerpoint, Excel
and now needs to use Visio for 1 month; so he/she would place a change request to have
Visio access enabled for his/her login credentials.
As per country's new legal requirement all CSP's should follow the ISO/IEC20K standard for
managing the IT services
Change types in a cloud environment can be classified into three types as request for change
for new requirements (RFC-FNR), request for change for resolving incidents (RFC-FRI), and
request for change for routine operations (RFC-FRO).
Examples on RFC-FNR: As per country's new legal requirement all CSP's should follow the
ISO/IEC20K standard for managing the IT services
Examples on RFC-FRI: An error or failure that has occurred in a specific software/ hardware
with respect to cloud service.
Examples on RFC-FRO: An end user requests for more storage space on his virtual desktop
Multi-supplier management
In ITIL v3, there was vendor management which focused on managing the UC’s
(underpinning contracts) of the suppliers and Business Relationship Management to manage
the relationships with the customers, potential customers and competitors. ITIL v4 will define
practices and methods that will enable the organization to obtain different IT services from
different IT service providers, providing seamless service and ensuring the SLA’s are not
breached.
Cyber-security
In ITIL v3, there was no concept of cyber-security, but ITIL v4 provides explicit process
activities for risk, vulnerability and threat identification in application, information, network,
business continuity, operations, and end user. All these would be encapsulated in Information
Security Management which is generally defined in Service Design process area, aiming to
protect network, data and systems from cybercrimes.
Individuals who have passed their ITIL v3 foundation, intermediate and expert certifications
need not panic about their certifications validity. Professionals who have already done their
ITIL v3 foundation or intermediate or expert can do a bridge course and upgrade their
certifications to ITIL v4.
Organizations need not worry about the investments that they have made with respect to staff
training on ITIL, procurement of tools, ISO standards, etc. since the latest version will only
add some new concepts.
Organizations can be assured that ITIL will be cost-effective, value driven, focusing on the
latest trends and technologies in IT.
Change management
Change evaluation
Release and deployment management
Service asset & configuration management
Knowledge management
Transition planning and support
Service validation and testing
Change management:
Defines a standard procedure for managing the lifecycle of change requests, which can be
categorized into phases as registration & categorization, risk and impact assessment, approval
and deployment. Changes are generally categorized into normal, standard and emergency
changes.
Defines a standard procedure for managing the lifecycle of release requests, which can be
categorized into phases as planning, build and test, deployment, early life support and
closure. Release types can be categorized into two types as big-bang & phased approach.
Knowledge management:
Defines a standard procedure for creating and managing the knowledge articles, which can be
categorized into phases as creation, editorial review, technical review and publish.
Defines a standard procedure for managing the lifecycle of CI’s, which can categorized into
phases as management and planning, CI identification, CI control, CI status accounting and
reporting, and CI verification and audit.
Defines a standard procedure for planning and coordinating the resources needed for
transition.
Defines a standard procedure for validating and testing, here different types of testings are
performed based on the scope of the services.
Change evaluation:
ITIL service transition ensures the testing is done thoroughly, on the designed and developed
services in service design stage.
Objectives:
Ensure thorough planning, coordination of resources and capabilities while transitioning the
designed services.
Ensure thorough risk and impact analysis, testing, deployment, and early life support for the
transitioned services.
To prepare enough number of knowledge and reference materials for the new or changed
services.
To ensure all the new and changed services and its associated CI’s are updated in the CMDB.
Inputs:
SDP
Outputs:
Process owners
Change manager
Change analysts
Release and deployment manager
Build and test analyst
Service validation and test manager
Knowledge manager
Knowledge analysts
Service asset and configuration manager
Service asset and configuration analysts
Transition planning and support manager
Process owner:
Process manager:
Process analyst:
Be the operational process executer for his or her specific IT service, technology platform, or
organizational entity
Enter all relevant details into the change/CI/ release/ etc record and ensure that this data is
accurate
Ensure that the process is used correctly within all departments
Be informed of the objectives and activities of all support groups
Ensure correct closure and evaluation of change/ release / knowledge/ etc.
ITIL Event Management
Event management is a process which defines a standard and sequential procedure for
managing the lifecycle of events.
Event management is the process of monitoring, responding, and resolving the events
triggered in infrastructure through a lifecycle approach. Generic event’s lifecycle can be
represented through different phases starting from notification, registration, categorization,
prioritization, diagnosis, resolution, and closure.
Objectives:
Monitor CIs and services constantly and provide operational information about the
infrastructure.
To provide a proactive mechanism for early detection of incidents.
Sl
Procedure Description
No.
1. Events in the IT Infrastructure are detected by monitoring tools.
2. The two type of monitoring tools used are –
-Active monitoring tools that poll key CIs to determine their status and
Event Detection
1 availability. Any exceptions will generate an alert that needs to be
& Filtration
communicated to the appropriate tool or team for action.
-Passive monitoring tools that detect and correlate operational alerts or
communications generated by CIs. Filter the events, to decide whether to
continue treating the event or to discard it.
Inputs
Outputs
Trigger to Incident Management (which will in turn trigger Problem or Change Management)
Updated CMDB
Trigger to Availability Management
Trigger to Capacity Management
Be the operational process executer for his or her specific IT service, technology platform, or
organizational entity
Enter all relevant details into the Event record and ensure that this data is accurate
Ensure that the Event Management process is used correctly within all departments
Be informed of the objectives and activities of all support groups
Execute and coordinate Proactive & Reactive Event Management
Ensure correct closure and evaluation of Events
Daily log report is an operational level management report which details all the transactions,
interaction and operations that have happened in the IT operations.
This report will be sent to the mid-level management team daily. This report is generally
prepared by the IT operations manager ensuring all the data is accurate and signed by him/
her.
Below are some more detailed points elaborating the importance of daily log report:
Legend:
Informational message: Any message that provides an information about the CI’s.
Warning: Any alert informing that a specific is CI is about to breach.
Exception: Any alert informing that a specific CI has breached its defined conditions.
Standard change: Any change that is preauthorized and has defined models to manage the
lifecycle of change.
Normal change: Any change that requires detailed study with respect to planning, risk
assessment, approval and implementation.
Emergency change: Any change that is invoked when there is a major incident or
emergency situation.
It is the collection of requirements that is gathered by the IT service provider detailing the
service requirements with respect to description of the service, availability, capacity,
continuity, service level objectives, service level targets, suppliers needed, roles and
responsibilities needed, etc.
SLR’s are the initial documents prepared by the service provider, with reference to the
discussions made with the customer. Based on the SLR’s, service level objectives and service
level targets will be drafted, negotiated, agreed and consolidated into SLA’s.
Objectives:
To define the functionality and non-functional requirements of the IT service.
To define the core service, enabling service, and enticing services.
To define the utility and warranty specifications.
To capture all the customer requirements as defined without missing any information.
Transfiguration of SLR to SLA
o Service level management team
along with Supplier
management, IT service
continuity management,
Availability, Capacity,
Information Security
management teams will draft
Drafting, negotiating and standardizing the SLA’s.
5
SLA’s
o Then SLA’s are negotiated with
the customer.
Legend:
Service availability: Details the service availability for example:
Service availability during weekdays, weekends, timings
Release testing and validation contributes to quality control and assurance of a new
release that is Fit-for-Purpose and Fit-for-Use.
Release Testing & Verification provides objective evidence that a release of a new or
changed service and its service components will support both the customer’s business and the
stakeholders’ requirements, including agreed-to service levels. This activity assesses, and
addresses issues, errors, and risks identified throughout release life cycle.
Test strategy should define the methodology to test and allocate testing resources, which
needs to be developed with appropriate stakeholders with respect to the release. To do an
effective testing, release management should understand the precise requirements on
availability, capacity, performance, security, etc. to plan and design the test approach using
information from the service package, SLPs, and SDP.
Test models should define the test plans for different types of releases, which should describe
what is to be tested, how it is to be tested, and the test scripts defining how each feature and
aspect of a release will be tested. A test model defines some predefined and repeatable steps
for a release in an effective and efficient way.
Type of testing will vary depending on the scope, requirements, risks, constraints, etc. hence
there can be different approaches.
Some of the common release test types are service requirements testing, service level testing,
service testing, operations testing, deployment release testing, deployment installation testing,
and deployment verification testing.
Service requirements testing will verify and validate if the service provider has delivered the
service as per the customer requirements.
Service level testing will verify & validate if the service provider can deliver the
requirements as per the defined SLA’s.
Service testing will verify and validate if the service provider can manage the new or
changed service.
Operations testing will verify and validate if the operations teams like service desk,
application management, technical management, etc. can provide the support for new or
changed service.
Deployment release testing will verify and validate if the deployment team can deploy the
release into the environment in the defined SLA’s.
Deployment installation testing will verify and validate if the deployment team can do the
installation of the release components into the environment in the defined SLA’s.
Deployment verification testing will verify and validate if the deployment team has
successfully completed the deployment and meets the business requirements and customer
acceptance criteria.
Some of the common test types in functionality of a release would be component and
assembly testing, release package testing, operational readiness testing, and acceptance
testing.
Some of the common test types in non-functionality of a release would be usability,
accessibility, availability, security testing, etc.
Test execution
Service delivery status report is an top level service delivery management report which
highlights all the achievements, progress and issues happening in ITSM projects.
Service delivery status report has to be sent to the customer management team regularly
based on the agreed requirements like weekly/ monthly/ quarterly. This report has to be
prepared by the IT service provider’s team ensuring all the data is accurate and signed by all
the IT service provider’s top-level management.
Below are some more detailed points elaborating the importance of service delivery status
report:
Project management
Project management is the art of managing the project and fulfilling the goals of the project
as per the defined time, scope, cost, and quality targets.
Note: Project is any temporary work that has a defined starting time and end time with some
defined outputs.
Project management has become an integral practice in any organization, irrespective of the
industry (like banking, health care, chemical, manufacturing, hospitality, construction, etc.).
Project management can be broadly classified into 5 phases as initiation, planning, execution,
monitoring and closing.
Some of the prime processes that should be there in project management are scope
management, risk management, cost management, procurement management, quality
management, schedule management, communications management, etc.
Below are some more detailed points elaborating the importance of project management:
To ensure the project gets completed in time as promised to the customer
To ensure the project is not exceeding the planned budget
To ensure there is no scope creep.
To schedule the work in an appropriate order as per the priorities of customer
To identify the potential risks & dependencies in the project work
To provide a communication channel to the customer, who can provide the updates and
progress on the project status.
Some of the important project management methodologies which are currently popular are
Agile, Scrum, & Devops. Certifications that are available in project management are PMP
(Project Management Professional), PRINCE2 (Projects in controlled environment), etc.
Project management professionals can be primarily classified into two categories as project
manager and project management coordinator.
Project managers are accountable for delivering the project outcomes, this role will have to
plan and organize schemes, resources and people ensuring that the project work is on time, in
scope and in budget. This role will have to track the work to be completed, set deadlines and
delegate tasks to the project team, identifying any potential risks.
Project management coordinator/ officer works reporting to the project manager to assist and
support specific teams on a project. Project Coordinator plans, organizes, and administers
projects and coordinates the work assigned to associates on the project teams.
Project management will play a very important role in IT Service Management, because even
ITSM’s focus is on achieving outcomes that is customer satisfaction with respect to incident
resolution and closure, service request fulfilment and closure, change implementation and
closure, problem resolution and closure, etc. in defined timelines, cost, scope and quality
parameters.
As project management has five phases initiation, planning, execution, monitoring and
closure; in the same way, ITSM can be categorized into five phases as service strategy,
service design, service transition, service operations, and continual service improvement.
Though we cannot map the five phases of project management to IT service management, yet
the phases, processes, principles and best practices of project management can be
implemented in all the 26 processes and 4 functions of ITSM.
To implement incident management as a process and execute the operations, you would need
an incident manager and incident analysts as human resources, who can follow the resource
management process in project management. To maintain quality in incident management, IT
governance team can utilize the practices of project quality management from project
management.
To maintain good communication to all the internal (problem manager, change manager, etc)
and external stakeholders (like customer team), IT governance team can utilize and embed
the practices of project communications and stakeholder’s management from project
management.
Likewise, one can utilize other processes like risk management, integration management, cost
management into the operations of ITSM.
ITIL Service Delivery | Difference Between IT
Service Delivery & IT Service Support
Service Delivery
Service delivery has a specific definition and prominence in ITIL v2, focusing on the long-
term aspects of IT services like Financial Management, Availability Management, Capacity
Management, Service Level Management, and IT Service Continuity Management.
You do the above mentioned activities, once in a month or quarter or half a year, hence these
activities are focused on long term. Hence the processes Financial Management, Availability
Management, Capacity Management, Service Level Management, and IT Service Continuity
Management is categorized under Service Delivery.
Service Support
On the other side, there was Service support which focused on day to day operations. The
processes and functions covered in service support are Incident Management, Problem
Management, Change Management, Release Management, Configuration Management and
one function Service Desk.
Incidents, problems, changes, releases, configurations and interactions with service desk
happens regularly in day to day operations, hence these processes and function is categorized
in service support.
IT v3 Service Delivery
In ITIL v3, there is no specific definition for IT service delivery, as ITIL v3 is a lifecycle-
based approach which runs on the five process areas service strategy, service design, service
transition, service operations, continual service improvement.
Processes involved in service support are Processes involved in service delivery are
Financial Management, Availability
Incident management, problem management,
Management, Capacity Management, Service
change management, release management,
Level Management, and IT Service Continuity
configuration management.
Management.
Has one function – Service Desk.
No functions defined.
Lists 26 ITIL Processes & 4 ITIL Functions
ITIL Processes
ITIL v3 has 26 processes which have been segregated into five process areas service
strategy, service design, service transition, service operations, continual service improvement.
Process is a sequence of activities which has some inputs, triggers, outputs and delivers
specific outcomes to the customer.
This process has 4 sequential activities which can be mentioned as performing strategic
assessment, generating strategy, executing strategy, measurement and evaluation.
Demand management:
This process has 4 sequential activities which can be mentioned as identifying sources of
demand and forecasting, analysing the patterns of business activity and user profiles,
developing differentiated offerings and managing operational demand.
This process has 3 sequential activities which can be mentioned as budgeting, accounting and
charging.
This process has 3 sequential activities which can be mentioned as request and complaints
handling, opportunity identification, and managing business relationships.
This process has 4 sequential activities which can be mentioned as documenting service
definition and description, agreeing service catalogue contents, and finally producing and
maintaining service catalogue.
Availability management:
This process has 4 sequential activities which can be mentioned as monitoring availability,
analyse availability data, investigate service unavailability, availability planning, and finally
review availability and testing.
This process has 5 sequential activities which can be mentioned as understanding security
requirements, producing security policy, implementing security policy, assessing information
assets and risks, and finally reviewing security controls.
Capacity management:
This process has 5 sequential activities which can be mentioned as monitor capacity and
performance data, analyse the capacity data, investigate capacity issues, define and revise
capacity plans, and finally review and optimize/improve capacity.
Design coordination:
This process has 4 sequential activities which can be mentioned as defining policies and
methods, planning resources and capabilities, managing design risks, and finally improving
service design.
Supplier management:
This process has 5 sequential activities which can be mentioned as defining requirements,
evaluating suppliers, selection of suppliers, manage performance, and finally renew or
terminate contracts.
This process has 3 sequential activities which can be mentioned as develop requirements,
develop continuity plans, implement continuity plans, and finally invoking the continuity
plan.
This process has 5 sequential activities which can be mentioned as definition of transition
strategy, preparing for service transition, planning and coordinating service transition, and
finally monitoring and reporting progress.
Change management:
This process has 5 sequential activities which can be mentioned as registration and
categorization, risk and impact analysis, approval, coordinate change build and test, authorize
change deployment, and finally review and close change record.
Change evaluation:
This process has 3 sequential activities which can be mentioned as plan evaluation,
evaluation of predicted performance, and finally evaluating actual performance.
This process has 5 sequential activities which can be mentioned as release planning, build
and test release, deployment, early life support, and finally review and closure.
This process has 5 sequential activities which can be mentioned as management and
planning, CI identification, CI control, Status accounting and report, and finally verification
and accounting.
Service validation and testing:
This process has 5 sequential activities which can be mentioned as planning and designing
tests, verifying test plans and designs, preparing test environments, performing tests,
evaluating exit criteria, and finally cleaning test environments and closure.
Knowledge management:
This process has 5 sequential activities which can be mentioned as defining knowledge
management strategy, identify and gather data sources, draft knowledge, technical review,
editorial review, and finally publish.
Access management:
This process has 5 sequential activities which can be mentioned as access requisition,
verification and validation, provision of rights, monitoring the access, tracking the access and
finally deprovisioning the access.
Event management:
This process has 5 sequential activities which can be mentioned as event notification, event
detection, correlating and filtering events, categorization events, and finally event review and
closure.
This process has 5 sequential activities which can be mentioned as request registration,
validating request, categorize and prioritize request, review and authorize request, and finally
request closure.
Incident management:
This process has 5 sequential activities which can be mentioned as incident registration &
categorization, prioritization, investigation and diagnosis, resolution, and finally closure.
Problem management:
This process has 5 sequential activities which can be mentioned as problem detection and
logging, categorization, investigation and diagnosis, and finally resolution and closure of
problem.
ITIL Functions
4 ITIL v3 Functions
Service desk
This is a function who will be the first point or single point of contact for end user issues.
Application management
This is a function who will manage the application development and maintenance issues.
Technical management
This is a function who will manage the technical expertise for the ITSM processes and
operations.
Operations management
This is a function who will manage the day to day operations with respect to IT operations
control and IT facilities management.
Incident management can improve the quality of IT services by identifying the recurring
incidents, and logging problem tickets to identify the root cause of the incident/ incidents. If
there is any new incident which has no resolution, then a problem ticket is created to identify
the root cause and a fix.
By identifying the recurring incidents and its associated CI’s, availability management or
capacity management or information security management or continuity management can
redefine or revise the respective plans and procedures to improve the delivery of services.
Incident management team will communicate the progress of the major incidents to all the
necessary stakeholders from the moment it has been registered to the closure.
Incident management team keeps sending notifications regularly after every half an hour or
the defined timelines to all the relevant stakeholder giving information on the incident like:
Incident manager and management team will have to ensure the SLA doesn’t breach on any
of the incident ticket, for any reason like 3rd party involvement, negligence of the incident
management team, dependency on any other problem or change ticket.
Incident manager has to track the effectiveness of the incident management operations by
defining the metrics and KPI’s (Key Performance Indicators) like:
1. Number of incidents
2. Number of major incidents
3. Number of recurring incidents
4. Average time taken to resolve the incident
5. Average time taken to resolve the major incident
6. Incidents that triggered problem tickets
7. Incidents that triggered change tickets
Best practices are those real practices that have delivered efficient, effective, and excellent
results in the IT processes and real operations.
Best practices for Release and Deployment management processes and operations can
be defined as mentioned below:
Release analysts should do appropriate planning, before the release plans, packages and
builds are sent for testing to avoid wastage of time and efforts. Planning should involve
analysis on aspects like:
What requirements are there for the release, determine which release units to be included
in the release and to include complete application and related components into release to
ensure proper testing.
Release dates of major releases.
The release team must document the manual processes and procedures required to deploy the
release into production (or remove it as necessary) in addition to any technology solution,
along with the exact order of execution and success indicators of the steps.
The documentation created as part of the build stage should include details of how to monitor
and check the effectiveness of the release and how to recognize and react to problems.
Adequate testing on release is a mandatory activity that should happen without a miss. All the
testing work should happen in coordination with SVT process.
Once the build is ready, tests need to be performed to verify in the functionalities of the
release are in line with the change objectives. Depending on the nature of the change the test
requirements like System integration tests, functionality tests, and UAT/Pilot tests should be
performed defined by the SVT process.
Identifying the people (deployment stakeholders) who will be involved in the deployment,
Taking a baseline of the current configuration before the deployment can start on the
production Environment which will be useful when the roll-out fails.
Conducting post deployment test on the production environment and the test results to
review the release acceptance criteria.
Deployment Documentation
Release notes should be prepared with the content of known issues/bugs identified during the
testing and should coordinate with SACM team to strategize for the release documentation
updates in CMS/CMDB.
ELS team should provide the support to support staff by providing knowledge sessions and
training on the release and the technicalities involved in fixing issues. Also, known bugs,
known issues should be explained to resolve any knowledge transfer or training gaps.
Release closure
That all affected CIs (which were created/modified) during deployment are updated
correctly in CMDB.
That all related release documents are updated correctly in CMDB and are linked to
appropriate CIs.
All new KB articles prepared during the ELS phase are to be updated at the appropriate
location in the SKMS so that those can be easily reused later by the operations/support staff.
Analyze the Deployment and ELS Completion reports and results and discuss with the
release team to identify what went correct and what went wrong in the release cycle.
Request for Change (RFC) from the Change Management Process forms an input to Release
& Deployment Management process.
For all Releases, a Release ticket is raised in <<tool>> and is to be tagged to the RFC which
triggered the Release.
There may be many to one mapping between changes and releases (i.e. many changes can be
released together) or one to one mapping (i.e. one change can be released stand alone).
Release can be a normal release (Major or Minor) or an emergency Release.
For every release, the Release Manager will own the responsibility of preparing a Release
Plan. Release Manager coordinates with Change Management team and Build team regarding
the same.
The Release Plan will be submitted to the CAB.
Release Manager will assign the release activities in <<tool>> to the person responsible for
those activities.
These tasks are tracked and monitored by the Release Manager to monitor the release
status.
If a release needs a vendor involvement, then the ticket is assigned to the vendor queue in
<<tool>> and <<if tool integration exists it is routed to vendor’s tool via the B2B the ticket
gets created in their system>>.
Release Manager will then publish the release calendar based on the dates finalized in the
Release Plan.
Release Manager will ensure that releases are packaged and released in a controlled manner
as per the plan.
Release packaging includes assembling and integrating the release components as per the
dependencies identified.
Release Manager will coordinate with Build team to build the release and produce the build
document which will contain:
Release Manager will coordinate with Build and Change Management teams and ensure that
the build activity is completed as per the Release plan.
Build team will consider various aspects relating to version control, baseline management,
control of inputs and outputs from a build.
Creation of a configuration baseline which is recorded in the configuration management tool
for the release before and after installation, to provide a restore point in case of rollback is
initiated by the Release Manager along with the Change and Configuration Manager.
Build prepared by the build team is then moved into Test Environment for testing. Release
Manager will initiate testing as per the Release Plan. Service Validation & Testing team will
complete testing of the release and will provide test results to the Release Manager.
Build and Test activities will be completed in the stipulated time frame as per the Release
Plan. Time allocated to each activity will depend on the release type.
Release Manager will ensure that all mandatory tests are conducted and all tests are
successful before a release can be flagged off to production.
Once testing is successful, Release Manager will update the Release Plan and rollback plan as
required and circulate the same to Change Manager and other stakeholders.
Release Manager will also ensure that Rollback plan is properly prepared and is tested (or
verified wherever testing of rollback plan is not possible).
All releases will be subject to pre-implementation checks and the Release Manager will work
with the Change Manager for changing, reassessing, and rescheduling unsuccessful release
packages.
Release Manager will ensure that all the environments are ready for release and will send out
a communication to all stakeholders.
Acceptance criteria for the release are documented wherever relevant in the release ticket.
Successful release(s) with the positive test results is now moved to deployment phase.
Readiness assessment for the deployment group will be done to check for issues and risks in
delivering the current release that may affect the deployment.
For all non-major Releases, Delivery Manager will give Go/ No-Go decision regarding the
releases.
Deployment team will prepare the training plan, training material, training schedule and
training communication (for all major releases). Before the deployment they will ensure that
the users, relevant support teams and other concerned stakeholders are appropriately trained.
Step 11: Initiate backup
Release Manager will coordinate and ensure that the backup is taken for the current release.
This is to ensure that rollback to previous baseline is possible in case the deployment of the
release fails.
Release is deployed in the environment as per the deployment plan. Release Manager
broadcasts the down-time related information wherever necessary in advance.
Success of the deployment is tested during this activity. Health check will be conducted by
the Release Manager in coordination with the deployment team to verify the success of
deployment.
Change management process will own and perform the Post Implementation review (PIR).
During PIR Change Management will decide on the success or failure of the change.
If a release fails, Release Manager will authorize (on the advice of <<Customer>> Delivery
Manager or Change Manager) and initiate a Rollback of the release and restore the services to
normal stage.
A root cause analysis for the failure of the release may be triggered (on need basis) via the
Problem Management process.
Change Management will ensure update to the RFC and related updates to the requester.
Required communication regarding failure of change will be sent as per the Change
Management Process.
Release Manager will resolve the release ticket and pass on the status update and post-
implementation status to Change Management and update/ close the release ticket
accordingly.
Release Manger will update the RFC with release closure comments.
Release Manager will ensure that the CMDB is updated with new (or updated) configuration
details as per the release documentation and that a new baseline is created in the CMDB.
SACM
Configuration Manager will update the CMDB with the new or updated CI details.
Generic roles that are available in Release and deployment management are Release
manager, deployment engineer, and CAB (Change advisory board).
Deployment engineer
ELS Engineer
1. First, define the process, which will be a sequence of activities that will result in a specific
outcome with the help of some roles and capabilities. Here you need to define the different
roles needed for the process like release manager, build engineer, deployment engineer,
test engineer, etc.
2. Second, Identify the sequence of activities in a life-cycle based approach. For example: Raise
release request, Categorize the release request, etc.
3. Third, Identify the decisions in every activity. For example: Approve the build plan, Approve
the deployment plan, etc.
4. Fourth, each and every defined activity and decision should be tagged to a specific role.
5. Fifth, define the matrix with columns and rows. Naming the first column heading as
‘Activity’, and below it (that is Activity column) define the different activities in a sequenced
order. Define the other columns headings with the respective roles defined in the process.
6. Finally, populate the information ‘R’, ‘A’, ‘C’, ‘I’ in the rows and columns ensuring there is:
o One and only one ‘A’ (i.e. accountable role) for a specific task
o Every task should have one ‘R’ and can also have many ‘R’s (i.e. responsible roles)
based on the task
o Lastly, tasks can have one or more ‘C’s (i.e. consulted roles) and ‘I’’s (i.e. informed
roles) based on the task.
CAB
CAB Decision: a decision made by the CAB
CAB Comments: comments given by the CAB
ECAB Decision: decision made by the ECAB
ECAB comments: comments given by the ECAB
Change Manager: name of the change manager
Impact: The number of people that will be affected by change
Urgency: how soon the change has to be implemented
Priority: It will be based on impact and urgency
SLAs Associated: SLAs associated with change management
SLA Target Date and Time: date and time when the SLAs will be breached with respect to
the change
Major Change Review: This determines if it's a major change
Major Change Justification: This defines the business justification and why it should be
treated as a major change
Associated Incidents: the details of the incident tickets that are associated with this change
Associated Problems: the details of the problem tickets that are associated with this change
SLAs Breach Details: the description why the SLAs were breached, and by how many
minutes or hours did we breach the SLAs.
PIR: defines the lessons learnt
Emergency RFC
Emergency RFC Template
CAB
ECAB Decision: decision made by the ECAB
ECAB comments: comments given by the ECAB
Change Manager: name of the change manager
Impact: The number of people that will be affected by change
Urgency: how soon the change has to be implemented
Priority: It will be based on impact and urgency
SLAs Associated: SLAs associated with change management
SLA Target Date and Time: date and time when the SLAs will be breached with respect to
the change
Associated Incidents: the details of the incident tickets that are associated with this change
Associated Problems: the details of the problem tickets that are associated with this change
SLAs Breach Details: the description why the SLAs were breached, and by how many
minutes or hours did we breach the SLAs.
PIR: defines the lessons learnt
Role that is tagged as Responsible in RACI matrix, will perform the task/ tasks.
Role that is tagged as Accountable in RACI matrix, will have the complete authority , will
make decisions and will be answerable for the success or failure of the task.
Role that is tagged as Consulted in RACI matrix, will be like a subject matter expert who will
be approached for recommendations and feedback.
Role that is tagged as Informed in RACI matrix, will be a stakeholder who should be
communicated about the actions taken in performing the specific task.
Lack of matrix in ITSM operations will lead to ambiguity in performing respective duties,
blame games, and confusions at their work activities.
Roles and Responsibilities Template for Change
Management
Generic roles that are available in change management are change manager, change analyst,
and CAB (Change advisory board).
Change Manager
Maintaining change management system, including policies, processes, systems, metrics and
procedures that are used across the entire IT business and adheres to all regulatory
requirements.
Research & proactively identify opportunities to process, measurements, and systems in
order to improve the effectiveness and efficiency of change management services.
Work closely and communicate effectively with users and stakeholders of the change
process to drive the improvements.
Assure service quality objectives, governance compliance, and responsiveness through KPIs
and metrics.
Attends all CAB meetings.
Support the development and execution change management activities in partnership with
customer teams - including stakeholder engagement, communication, training, and
readiness and adoption measurement plans.
Collaborate with the team and key stakeholders to ensure timely delivery and quality of
assigned deliverables.
Identify possible issues/concerns, escalate risks and issues to management and project
leadership teams, and implement mitigation plans if necessary.
Identify training needs by analysis of common errors.
Keep the customers and internal stakeholders up to date on high priority changes through
timely and regular written and verbal communications.
Review the business case of all RFCs/change requests and formulate a plan of action for
handling the change based on area of expertise/responsibility.
Ensure change management documentation is updated.
Gather and analyze information on a variety of changes and develop action plans to contain
and control incidents.
Liaison with internal training and communications staff to produce user guidance and
bulletins explaining best practice and common issues.
Provide information and reports on change implementations, successful changes, and failed
changes.
Verify implemented changes.
Conduct PIR on successful and failed changes and conduct RCA.
Change Analyst
CAB
Responsible for making decisions on whether or not the RFC would bring positive results,
value to the organization, reduce the manual efforts, and reduce the costs.
Approve changes/reject the changes based on:
1. the risk to IT services and business services
2. impact of a change on availability, performance, security, compliance, and SLAs
3. provision of procedures
4. test plans defined
5. test results gathered
Ensure that the change is planned well and is equipped with all procedures to test and
implement.
Review the implemented changes
Discuss previously failed, rolled back, and backed out changes to understand what went
wrong
Participating in CAB meetings
Authority to represent a particular group or function
Preparing for CAB meetings by circulating RFCs within their own group and coordinating
feedback
Reviewing RFCs and recommending whether they should be authorized
Reviewing successful and failed changes
Reviewing unauthorized changes
Reviewing the change schedule and providing information to help identify conflicts or
resource issues
Reviewing the projected service outage and providing feedback on the impact of planned
outages.
1. First, define the process, which will be a sequence of activities that will result in a specific
outcome with the help of some roles and capabilities. Here you need to define the different
roles needed for the process like change manager, change implementer, CAB, etc.
2. Second, Identify the sequence of activities in a lifecycle based approach. For example: Raise
change request, Categorize the change request, Assess the change request, etc.
3. Third, Identify the decisions in every activity. For example: Approve the test plan, Approve
the rollback plan, etc.
4. Fourth, each and every defined activity and decision should be tagged to a specific role.
5. Fifth, define the matrix with columns and rows. Naming the first column heading as
‘Activity’, and below it (that is Activity column) define the different activities in a sequenced
order. Define the other columns headings with the respective roles defined in the process.
6. Finally, populate the information ‘R’, ‘A’, ‘C’, ‘I’ in the rows and columns ensuring there is:
o One and only one ‘A’ (i.e. accountable role) for a specific task
o Every task should have one ‘R’ and can also have many ‘R’s (i.e. responsible roles)
based on the task
o Lastly, tasks can have one or more ‘C’s (i.e. consulted roles) and ‘I’’s (i.e. informed
roles) based on the task.
Release management in agile and scrum methodologies manages the releases as per the tight
timelines and agile customer requirements.
So to understand a release in simple words, it is a collection of user stories from a single
product or multiple products which is created by a product owner. A release has a defined
time period with a start and end date.
Inputs for release planning and management in agile and scrum approaches would be team’s
velocity, project length, and prioritized product backlog and the output would be a release
plan which guides the scrum team during the release period.
Sequence of steps involved in agile and scrum release planning and management are:
Determining the conditions of satisfaction: It focuses towards business goals, which could
date driven or scope boxed.
Estimating the user stories: As a product backlog might have many stories, but in a release
you would need few stories which are needed; hence estimation of user stories is needed
(which can happen during the release planning or before the release planning). Estimating a
story is generally done using Fibonacci series which indicates its complexity and the size of
the story.
Selecting an iteration length: Iteration length can vary depending on the length of the
release, if you have high uncertain project with frequent changes, you will need to have
small iterations.
Estimating the velocity: Estimating the velocity can be done by the historical data, by
experimenting, and forecasting.
Prioritizing user stories: Prioritization of user stories is generally done by the product owner
by understanding the importance as per customer requirements based on Moscow analysis,
time needed for the stories, human resources needed, etc.
Selection of user stories and release dates: Team selects the user stories and the release
dates are calculated based team’s historical record.
Release management meetings in agile and scrum methodology provides the overall direction
for the agile projects to discuss the aspects on:
Opening, product vision and roadmap: Senior executives and product owner will give the
vision and roadmap which discusses the vision and roadmap for the project and products.
Conduction of satisfaction: Conditions of Satisfaction in simple words are story conditions
and constraints which will be given by the Product Owner to the team describing what the
user wants.
Planning data: Scrum master presents the velocity, iteration length, stories from backlog,
etc. to plan the release.
Issues and concern: Whatever issues have been identified till the release meeting will be
discussed by the stakeholders.
Prioritization of stories: Though stories get prioritized before the release meeting, they are
yet re-evaluated in the meeting.
Story mapping: Team will connect the dots in the stories and will visualize the stories to do
the mapping.
Release scheduling and iterations: Distribution of stories in the upcoming iterations is
defined here based on the velocity, iteration length, etc.
Present the release plan: Product owner will present the release plan
Retrospective and closure discussion: To understand the lessons learnt in the meeting, to
discuss the things that went well, and which went bad.
Change Trigger/Input
Emergency change is triggered when a major incident occurs or when an important issue is
about to happen (like a security upgrade, regulatory requirement, etc.)
Each and every emergency change ticket should be recorded so that it could be tracked,
monitored, and updated throughout its life cycle, no emergency changes can be implemented
based on verbal/ email communications.
Gather Requirements
If an Emergency Change is triggered, Change Owner will be ready with all functional &
technical requirements and then document the impact of Change if implemented along with
back out readiness.
Change Manager
<<Customer>> Service Manager
<<Customer>> <<Role>>
Major Incident Manager
Service Delivery Managers
ECAB Approval
E-CAB will consider the Change from an impact/cost perspective and either approve or do
not give their approval. Back-out plan has to be there and would be a mandatory requirement
for approving the change.
While a verbal approval may act as a trigger for the change to be built, it is mandatory to
attach an approval email to the RFC. Without a documented approval, an Emergency Change
should not be implemented.
Rollback
In case change is not successful it would be rolled back by the Change Owner.
PIR
The Change Manager triggers a Post Implementation Review meeting with the Change owner
and other key stakeholders, CAB, on <<Day>> to check the impact of Changes on the
environment and also to understand whether the Change met its goal or not.
Change successful?
Once the Change is implemented, Change Manager checks if the implementation is
successful or not.
Change Manager will work with Major Incident Manager and ensure that the service is
restored at the earliest.
Reclassify change
Change is reclassified as normal/ standard change. Change Manager would seek a business
approval to classify the change as a normal/ standard change.
Post Implementation review or post project review is the investigation that is done by
all the prime stakeholders of change management, after implementing the change.
After change is done to the project, Prime stakeholders investigate and do post project
review.
PIR should be done for both successful and failed changes, its main objective is to learn from
the experience and document them for future references.
PIR activity should be chaired by change manager setting the direction for PIR meeting.
The Post Project Review or PIR activity should be chaired by change manager setting the
direction for PIR meeting which generally starts with:
Deciding the date, time, location, stakeholders needed and the method how the meeting
will
be organized
Discussion on what went correct and what went wrong
Examining the planned versus the actual results with respect to test plans, backout plans,
remediation plans, impact analysis, change collisions, etc.
Lessons learnt from the implementation
Finally developing description of the action plan, action plan for the change manager,
change builder, change tester & implementer.
PIR should capture all the important information on a change request, detailing:
Change number
PIR number
RFC created date
RFC closed date
PIR meeting date
Change result
Change description
Change category
Stakeholders involved (Change analyst, implementer, CAB staff, Change manager)
Scheduled change implementation date and time
Actual change implementation date and time
List of CIs & Business Services that were impacted on account of the change
Test results
RCA if the change failed
What was done well and what are the things where we could have done better
Additional review comments/feedbacks
Lessons learned
Etc.
The purpose of SLM is to ensure that the service targets are created, negotiated, agreed,
documented, monitored, reviewed and reported to the customer. SLM acts like a liaison
between the customer and the service provider which sets the targets in terms of quality, time,
and scope as per the SLR and SAC.
The Service Level Management (SLM) process is responsible for seeking a realistic
compromise between the customers’ needs, expectations and the cost of associated services,
such that these are acceptable by both the customers and to the IT Organization. This also
aims to ensure that an agreed level of IT service is provided for all current IT services, and
that future services will delivered to agreed achievable targets. Service Level Management is
also responsible for ensuring that all appropriate Operational Level Agreements and
Underpinning Contracts are in place for monitoring the vendors and other groups.
Operational level agreement (SLA) is an agreement between the service provider and an
internal department of the same IT organization. OLAs define supporting services that has to
be provided by the service provider and its internal department. An OLA should describe the
services being delivered, service level targets, responsibilities of the IT Service Provider and
the internal department.
OLA definition process will also be the same like SLA definition process which can be
mentioned as Planning, Development, Piloting, Publish, SLA Activation & Monitoring.
Planning process involves:
vendor’s name
vendor id
vendor type (elite, large scale business, medium scale business, small scale business)
SLA id
OLA id
SLA name
SLA type
OLA name
service hours
start date and end date
description of the OLA
Piloting
When the internal department is not sure about the realistic conditions in operations; internal
department does the piloting before base-lining the OLAs for the next quarter or half a year.
When it’s a Greenfield project, internal department pilots operations and observes the trends,
issues, and patterns for few months and then baselines OLAs. The service provider should
keep revisiting the piloted OLAs and redefine them after the observations.
Publish
In this phase OLAs are standardized and published. Management and stakeholders are made
aware of the consolidated OLAs.
OLA activation
In this phase OLAs are activated for the live IT operations. IT operations take the defined
OLAs as a baseline, and execute the IT operations.
Monitor
Monitoring is the main focus of SLM, which involves:
Reactive monitoring: monitoring the weekly reports, monthly reports, quarterly reports and
evaluates the quality of services.
Proactive monitoring: This is proactively advising the operations and ensuring that there are
no OLA misses or breaches, preventing penalties, preventing customer escalations and
threats.
Given Ten IT Asset Management best practices in ITAM Process that will help you save
more costs and increase saving opportunities,boost overall productivity and good high
ROI on your IT assets.
IT Asset information should be in line with best practices and organizational security
policies
All IT asset information should be stored in one trusted source ensuring there are:
Reporting on compliance
Reporting on compliance will enable organization to see whether they are compliant or need
to take remedial action on aspects like:
Checks on EOL and retiring and disposing the assets as per the process
Reconciliation between licenses and installations and usage.
Software entitlements to ensure if there are enough licenses.
IT Asset Management stores all of the relevant information about that asset, such as user,
location, asset type, model, serial number and more. Important information such as cost or
leasing information, decommission or replacement date, history, maintenance, repair, change
and upgrade information are all held within the ITAM data repository. Once an IT asset is
disposed of, all of the historical information about that asset is stored within the IT Asset
Management solution.
IT Asset Management is not just about storing data, it extends to deploying that data
successfully to operations and the synchronization of tasks. The automation of procedures is
vital in the coordination of large-scale projects. Not only does it help operators in their daily
tasks, the collection of data throughout operational processes reduces the risk of double
entries and human error.
The ultimate goal of IT Asset Management is that an employee has the relevant information
in the most appropriate format, at the right time. The information can be used for
management reporting, financial reporting, auditing and planning purposes. Data can be
linked between systems, usually using a single source of data rather than unnecessary
duplication of the same information in multiple places.
Value to Business
Value to IT Organization
Reduce the time and effort required to gather information during audits
Provides information to internal and external auditors, that they require during audits as it
costs significant time and effort. Having the required information in a central repository and
being able to report on that easily will avoid reinventing the wheel every time, saving
significant amount of time and effort.
Service Report
Service reporting is a standard process for creating, maintaining, and managing the reports on
IT service management. Service reporting through Service Report Template brings
awareness and notifies the vital information to stakeholders about the service provider’s
operations through accomplishments, issues, breaches etc. These reports are created in
service report template to capture key information about IT operations, enabling the
stakeholders to make important decisions. Main deliverables of service reporting are report
templates and reports.
Service reporting produces different types of service reports for different levels of
management.
Reports for Operational Management should be very detailed and contain complete details
of every transaction associated with IT services. These reports will generally contain bulky
volumes of data, and these reports are normally produced daily.
Reports for Tactical Management should have very important details of IT services,
operations, and processes; these reports are produced weekly or monthly.
Reports for High Level Management should present vital information which should be easily
understandable, accessible, and should give a snapshot of the IT operations and processes.
Service reporting will produce a variety of reports like Informational Reports, Analytical
Reports, Compliance Reports, Persuasive Reports, Trend analysis reports, and standard
reports (which are ad-hoc, daily, monthly, quarterly and annual).
Data collection
Data processing, based on the audience
Review
Approval
Data Publishing and distribution
Purpose of Service reports are to give a summary of the overall quality, issues, risks,
compliments and complaints happening at the IT service delivery and operations.
Provide accurate & useful information on IT services to the requestors and stakeholders.
Provide consolidated summary on IT services and operations.
Help the management to make quick and wise decisions with the reports provided.
Data collection is the foundational activity for service reporting which involves collecting the
data about the organizational IT services and its associated information.
Data collection is performed through regular checks on IT services and its information from
different IT processes. Data collection can also be performed automatically through the usage
of automated tools and technology.
Data Processing
Data processing is the activity which organizes the data into a structure to present the data
into organized and useful information. Data processing also eliminates discrepancies, like
redundant information, inconsistencies, and inaccuracies in the drafted reports.
Data Review
Data review is the activity to verify and validate the data collected with respect to the
requiremnets made by the different stakeholders. It identifies and evaluates the ability of
processed information and determines whether if it fits the business needs. Reviews are
performed both technically and editorially.
Data Approval
Data approval is the activity which validates, authorizes, and approves the reports so that they
can be sent for distribution.
Data Distribution
Data distribution is the activity which publishes and distributes the data to the requestors and
management. This activity publishes the reports in appropriate formats, fonts, and structures
using different tools.
Financial management for IT assets which defines a standardized process for establishing
the budgeting, accounting, and charging goals, policies, and various other financial aspects of
IT assets.
IT Asset procurement which defines a standardized process for procuring IT assets from a
supplier at economic costs and with good quality.
IT Asset inventory which defines a standardized process for tracking, arranging and
managing the organization’s stock of valuable IT assets in structured way.
Software license management which defines a standard process to manage and optimize the
purchase, deployment, maintenance, utilization, and retirement of software within the
organization.
Asset Disposal which defines a standard process to decommissioning the IT assets (due to
damage/ loss/ theft/ EOL) as per the organizational, legal, and environmental requirements.
In Scope
Classifying the IT asset portfolio according to type, model, manufacturer, and so on, from
introduction to disposal whether in the productive or non-productive state
Managing the lifecycle of IT assets
Associating IT assets to people, places, things, cost center, cost type, purchase order and
contract
Tracking costs related to IT assets
Tracking contracts related to IT assets
Reconciling data on the IT asset identifier
Recording IT asset attributes useful for the Service Management processes
Out of Scope
Purely Configuration Management – configuration items (CIs) will be included within the
total number of assets managed but these will appear as physical items
Change or Release Management for configuration items
Associating CIs with CIs
Tracking changes related to CIs or the fixed asset register within accounting or enterprise
resource planning terminology
The central contract management solution
Reconciling data on the CI name
The Service Management solution
To give real time and accurate view on IT assets, creating an IT Asset repository that is up to
date and accurate information for decision making and establishing compliance with
regulations and policies.
To control assets under contracts ensuring the organization doesn’t use IT assets more than
what is licensed for, or pay for IT Assets which they no longer have or use.
To retire securely and effectively to ensure adherence to environmental regulations and
data security policies and improve IT asset reuse.
Step 1: IT Finance Manager creates Fixed Assets (Capital Assets) in the Fixed Asset Register
(FAR).
Step 2: IT Asset Manager relates the fixed asset number to the corresponding assets in the
Asset Management System (AMS).
Step 3: IT Asset Manager determines the book value and residual for assets.
Step 4: IT Finance Manager adjusts the Fixed Asset Register (FAR) based upon the
impairment information received from the IT Asset Manager.
Step 5: IT Finance Manager determines the book value for fixed assets.
Step 6: Accounts Payable receives the invoices sent by suppliers.
Step 7: IT Asset Accounts Payable Manager books all invoices. Invoices must be matched to
a contract or a purchase order and the individual PO Lines or Assets involved.
Step 8: The IT Accounts Payable Manager verifies against documents like purchase order,
receipt of assets, asset invoice, inspection of unpacked assets.
Step 9: Accounts Payable pays the invoice.
Step 1: IT Asset Coordinator reviews the IT asset request. Verify if the request and the
request lines containing the IT assets are valid.
Step 2: IT Asset Coordinator checks if decommissioning of IT Asset is required based upon
the individual request lines.
Step 3: IT Asset Coordinator identifies which type of IT Asset component need
decommissioning.
Step 4: IT Asset Coordinator checks whether the requested IT Hardware and Service Assets
can be delivered, are part of the IT Catalog, and that they are fit for purpose.
Step 5: IT Asset Coordinator updates the IT asset request stating if the IT Asset is a valid or
invalid based on the outcome of the IT Asset Planning and Portfolio Management activities.
Step 1: Software Asset Manager checks if sufficient licenses are available for the requested
software.
Step 2: Software Control and Distribution Manager processes the entitlement and/or license
for software.
Step 3: Software IT Asset Manager receives the proof of software license.
Step 4: The Software Control and Distribution Manager monitors the software entitlements
and types of licenses.
Step 5: Software Asset Manager audits the license, entitlement & usage pool.
Step 6: Software IT Asset Manager checks and determines if product de-installations or
license purchase is required to be compliant with both external legal regulations and internal
company policy. Accordingly Software License Analysts will revoke or de-install in order to
achieve compliancy.
Step 1: IT Asset Inventory Manager checks if the requested IT Assets are in stock.
Step 2: IT Asset Inventory Manager checks if Asset needs to be refurbished. If the asset
needs refurbishment, IT Asset Inventory Manager initiates the process to refurbish IT Assets.
Step 3: IT Asset Inventory Manager determines the minimal stock levels for the IT Catalog
items and replenishes stock as necessary.
Step 4: IT Asset Inventory Manager determines the suitable method of tracking
identification. Determine how and via which attributes IT Assets should be identified.
Step 5: IT Asset Inventory Manager tags the IT Asset. The IT Asset tag is used for tracking
the asset.
Step 6: IT Asset Inventory Manager notifies the IT Asset Manager that the IT Assets are
tagged and can be deployed within the organization when needed.
Step 7: IT Asset Inventory Manager audits the inventory of the entire organization both on
deployed assets (installed base) and operational stock assets.
1. Define the procedures for activities like budgeting, accounting, invoicing, etc.
2. Establish a database for tracking budget and costs associated with assets, accounting details,
invoicing details, and auditing details.
3. Define a budget for all assets, comprising software, hardware, facility assets, compliance
requirements, etc.
4. Define an invoice payment mechanism to capture the details of the invoices (invoice
number, vendor name, invoice date and time, purchase order number, invoice items,
quantity, unit price, total price and etc) and payments.
5. Perform accounting on fixed assets, current assets and intangible assets.
6. Develop depreciation calculation procedure for all hardware and software assets.
7. Consolidate asset values and replacement costs.
1. Define the policies and standards for all procurement internal activities.
2. Develop supplier management plans like:
o Escalation process
o Supplier contingency plan
o Supplier contract renewal and termination procedures
3. Define the templates for documentations like purchase request (PR), request for quotation
(RFQ), request for information (RFI), and request for proposal (RFP’s).
4. Establish a database for procurement which will track all the details and activities of the
asset procurement process.
5. Categorize the suppliers and their respective products.
6. Establish a bidding system, defining the procedure for contacting a list of suppliers and
selection.
7. Define and negotiate the contracts, service level agreements (SLA’s), and penalization
procedures. Key aspects to be considered in negotiation are:
o Payment frequency and procedure
o Asset acceptance criterion
o Contract closure formalities
8. Define a method to submit purchase requests (PR) to the supplier, capturing all the details of
the needed asset.
9. Define the conditions and criteria, when a PR should seek approvals from the Procurement
lead and IT Asset Manager.
10. Define a team to register, receive, and inspect the assets with respect to the purchase
requests submitted.
1. Classify and group the assets licenses into categories based on license type, agreements,
costs, and renewal dates, etc. to define an organized structure.
2. Identify the license life span, and define a mechanism to track the license expiration dates
and renewals dates.
3. Define a mechanism to get detailed information on purchased licenses and installed licenses.
4. Define a mechanism to get information on the unauthorized software in the organization.
5. Define a mechanism for tracking the proof of purchase on licenses.
6. Define a mechanism to notify the license expiry details.
7. Define a procedure for optimum utilization of licenses especially for instances like
transferred licenses.
8. Define procedures for license renewal and maintenance.
9. Define procedures for license entitlements.
10. Develop a procedure for associating the requested assets with its respective software
licenses and entitlements.
11. Develop a standard procedure for attributing software license entitlements and software
license installations to the requested assets.
Guidelines for IT Asset Inventory
1. Establish IMIS (Inventory Management Information System) which will track all the IT asset
details.
2. Develop the inventory documents like stock requisition, stock transfer receipt, stock return,
etc.
3. Define a method to group your assets which enables you to understand the context and to
manage them easily.
4. Define a method to track and identify the assets and its attributes:
o Record all hardware serial numbers, model numbers, etc.
o Record all software names, versions, and editions, etc.
5. Set up an assets handling team to receive and register the assets in IMIS (Inventory
Management Information System).
6. Define a procedure for communicating with other teams like financial management and
procurement in clearance of the invoices.
7. Define a procedure for the asset handling team to move the assets at the requestor’s
premises.
8. Define a procedure to reserve and ship the assets requested through the asset catalog.
9. Define a check-in and check-out policy for all assets being moved from inventory to live
environment and vice versa.
IT Asset manager is accountable for the whole asset management practice and its
encompassing processes and activities. IT asset manager administers, supports, and manages
the contracts for technology spending on IT assets across the organization. He/ She ensures:
1. Definition and facilitation of communication between the organization and its suppliers in
order to deliver products and services according to plan and within budget.
2. Providing advice to management and staff on IT asset management related processes,
models, improvements, and best practices.
3. Continuous improvement on the ITAM-process model framework and alignment with the
relevant departments to fine-tune the processes.
Responsibilities of IT Financial manager
Asset Financial Manager is accountable for the financial management for IT assets process
and operations. He/ She ensures:
IT Procurement Manager is accountable for the asset procurement process and operations.
He/ She ensures:
Software license manager is accountable for the software license management process and
operations. Software license manager has the goal to utilize software licenses as efficiently as
possible and ensure that the organization is in control of its software licenses. He/ She
ensures:
Asset Inventory manager is accountable for the complete asset inventory process and
operations. He/ She ensures:
Asset Disposal Manager is accountable for asset disposal process and operations. He/ She
ensures:
Service Catalogue
A service catalogue briefs the information about the services, services description, its costs,
and SLAs associated.
A service catalogue can be viewed from two perspectives, from the business department and
from technical departments, as:
The purpose of SLM is to provide an accurate and updated single point of view of current/
live or operational IT services that are available for IT stakeholders.
ITIL Service Catalog - Objectives
Provides an accurate and updated view of current IT services that are available.
Provides an easy interface, so that customers and internal users can select and order
items/services that are currently available in the IT infrastructure.
Design
Define the architecture and structure for service catalogue portal or database.
Define the service catalogue template.
Define the user groups that can access the service catalogue portal or database.
Draft
Information on the operational services and retired services is collected from different service
owners, process owners and IT staff. Information on all services is gathered, analyzed, and
consolidated as a draft in one place.
Classify
After defining the services, classification and categorization of services is done as per the
business needs and processes defined.
Services are usually classified based on category, impact, urgency, priority, financial value,
and frequently requested services.
After the services are classified and categorized, an association is established between:
Drafted services are verified to check that all accurate and complete details like price,
specifications of a service, delivery time, etc., are collected.
Then the drafted services are validated by checking the existence of identified IT services in
the operational environment.
Publish
After the services are verified and validated, the services are populated in the service
catalogue and published to different stakeholders as per their privileges.
Services published in the service catalogue will be visible only for the authorized users and
IT staff.
Mandatory details needed for this phase are:
service name.
service id.
description of the service.
cost of a service.
service owner.
quantity.
SLAs associated.
date requested.
impact of the service requested.
urgency of the service requested.
IT Service Management
IT Service Management (ITSM) is a branch of science in IT industry, which focuses on
management and delivery of IT services to the customer, adhering to time, cost, scope and
quality parameters defined by the customer. We will also look in detail difference between
two ITSM vs ITIL.
To set up a strong ITSM practice, an organization would require people with strong
knowledge in ITSM, ITSM processes (which can be referred from ITIL, MOF, ISM, etc.),
and ITSM tools which must be aligned to the business requirements of the organization.
In ITSM there are many practices that have incepted, some of the prominent are ITIL (IT
Infrastructure Library), MOF (Microsoft Operations Framework), ISM (Integrated Service
Management), and recently a new digital service management approach is VeriSM.
Value to Business
Value to IT
Imagine if a company called <Available > is managing and providing internet service to a
business/ residential customers
Or
Imagine if a company called <Use App> is developing an application and providing
application support services to another company
Or
Imagine if a company called <Data Manage> is managing a data center for another company
Here, all the above 3 instances, companies are involved in managing and delivering a service
(i.e.: Internet/ Application development and Support/ Managing a Data center) which means
they are involved in ITSM.
In order to achieve its goal, it needs to provide good internet service which is reliable,
available, with good bandwidth (performance), security, etc.
To provide good internet service with reliability, availability, with good bandwidth
(performance), security, etc. the company Available LLP should have:
Good helpdesk staff to provide support on phone calls / and onsite; and network engineers
who can configure the cables, routers, etc.
Good cabling system (supplied by company A), routers & wifi routers (supplied by company
B), gateways (supplied by company C), base station antenna (supplied by company D), etc.
configured with backup plans and continuity plans.
There should be good technicians and engineers, with defined processes and procedures to
do regular maintenance to check proactively and reactively
There should be defined roles who are accountable & responsible of doing specific tasks
Performing all these tasks is doing IT Service Management in internet service provision.
Data Manage LLP company is Data center company in US, and its goal is to be the best
data center company in the US.
To provide data hosting service with reliability, availability, security, etc. the company Data
Manage LLP should have :
Skilled resources and knowledge to manage the equipments in DC like racks, servers,
application delivery controllers, cables, WAN optimizers, routers, switches, bridges,
repeaters, SAN, NAS, etc.
Stocked spare parts
Execution of timely backups, restoration, and archival of data as per the defined SLA’s.
Followed change management approvals before making any changes in the data center
environment.
Defined governance structure, roles, and responsibilities.
Defined of escalation procedures & operations procedures
Performing all these tasks is doing IT Service Management in Data center to store all the data
at one place and disseminate as per the requests.
ITSM is a branch of science in IT, an approach for ITIL framework is owned by Axelos, which was
managing the IT services and it is not owned by earlier owned by UK Government. ITIL can be
anyone. adopted and adapted as per the requirements.
Service desk tools: To log and manage the lifecycle of service desk calls.
Backup and disaster recovery tools: To perform backup and recover data.
Self service portal: To help the end users to request/ order services or IT components, to find
information, to resolve issues, etc. Self help functionality acts as a front-end for end users to
be defined offering different menus, screens, buttons, etc providing direct interface to
request/ order services.
Configuration and build management tool: To identify, track and assign unique numbers
for software and hardware configurations.
Security management tools: To protect the integrity of the network, systems and
applications, guarding against intrusion and inappropriate access and usage.
Content management systems: To store all the content of the IT service provider in various
repositories like knowledge base, known errors, service catalogue, employee information, etc.
Email systems: To send, receive, backup, recover, etc. emails.
Project management tool: To manage the status of the projects in the IT organization.
Service Charter
IT Service Charter is a high-level document for any new or significantly modified services
and its approach to develop a new/ modified service. Customer Service Charter document
will consolidate all the necessary information on the purpose, requirements of the new/
modified service, scope, resources needed, roles and responsibilities, service acceptance
criteria, KPI’s and metrics, constraints, etc.
The Service Charter Template is the document that will provide clear communication to the
Service Design process area with all the necessary information for designing a new service.
Service charter documents the necessary information required by the service design manager
to design the service for transition and operations. Customer service charter is created during
the service strategy phase which will provide clear direction to design the service for the
benefit of service design process owners and managers.
The intended audience of the service charter template is the Service Design Manager, Service Design
Process owners and managers and Service Owners.
Objectives of Service Charter
Budgeting: This stage involves predicting the funds necessary for services to deliver the
agreed upon IT service. Budgets are allocated for every new IT service proposed.
Approval: In this stage, service portfolio manager makes the decision of approving services
or rejecting, after careful evaluation of the analysis.
Publish: In this phase, chartered service is documented with high level descriptions with
respect to availability, capacity, performance expected, security, continuity, etc. and are
standardized and published. Accordingly, the service charter is disseminated to all the
relevant stakeholders in service design process area (availability management, capacity
management, information security management, IT service continuity management, etc.)
The purpose of Service Level Management (SLM) is to ensure that the service targets are
created, negotiated, agreed, documented, monitored, reviewed and reported to the customer.
SLM acts like a liaison between the customer and the service provider which sets the targets
in terms of quality, time, and scope as per the SLR and SAC.
The Service Level Management (SLM) process is responsible for seeking a realistic
compromise between the customers’ needs, expectations and the cost of associated services,
such that these are acceptable by both the customers and to the IT Organization. Service
Level Management is also responsible for:
Service level agreement (SLA) is a document/agreement that describes the scope of services,
details of services, availability, quality, recovery times, etc.
Defining SLA should involve participation of all the service owners, process owners, and all
other stakeholders from the IT organization. This definition process can be mentioned as
Planning, Development, Piloting, Publish, SLA Activation & Monitoring.
vendor’s name
vendor id
vendor type (elite, large scale business, medium scale business, small scale business)
SLA id
SLA name
SLA type
service hours
start date and end date
description of the SLA
Piloting
When the service provider is not sure about the realistic conditions in operations; service
provider does the piloting before base-lining the SLAs for the next quarter or half a year.
When it’s a Greenfield project, service provider pilots operations and observes the trends,
issues, and patterns for few months and then baselines SLAs. The service provider should
keep revisiting the piloted SLAs and redefine them after the observations.
Publish
In this phase SLAs are standardized and published. Management and stakeholders are made
aware of the consolidated SLAs.
SLA activation
In this phase SLAs are activated for the live IT operations. IT operations take the defined
SLAs as a baseline, and execute the IT operations.
Monitor
Reactive monitoring:
monitoring the weekly reports, monthly reports, quarterly reports and evaluates the quality of
services.
Proactive monitoring:
This is proactively advising the operations and ensuring that there are no SLA misses or
breaches, preventing penalties, preventing customer escalations and threats.
ITIL Roles
Executive Sponsor
The Executive Sponsor is accountable for the framework implementation and responsible for
securing spending authority and resources to implement and manage the Services and
Processes. The Executive Sponsor is a vocal and visible champion who legitimizes goals and
objectives, involved in major activities, is the ultimate decision-maker, has final approval of
all scope changes, and signs off on approvals to proceed to each succeeding phase.
The primary responsibility of the Service Domain Owner is to ensure the processes within the
Service Domain provide support to the Service Owners, who have accountability for the
Services that are provided. The Service Domain Owner is accountable for all the Processes in
the Service Domain, the interfaces and Process interdependencies and for measuring and
maintaining Process maturity levels.
The Service Domain Owner ensures proper resourcing, the appointment of Process Owners,
and the strategy for each Service Domain. The Service Domain Owners work jointly to
ensure proper handoffs between the Service Domains. The Service Domain Owners represent
their Service Domain on the upper governance boards, while establishing governance boards
to handle Domain-specific matters related to policy, standards.
Service Domains are usually aligned with the stages in the Service Lifecycle.
Service Owner
Each Service needs an owner. The Service Owner is accountable for the Service without
regard for where the technology, processes, or other enablers reside. In short, the Service
Owner owns the end-to-end Service even if he or she relies on other Services to provide the
Service. For example, the Business Service supporting Accounting will rely on multiple
Infrastructure Services. The Service Owner will be the primary stakeholder in these
supporting Services. This owner wants to ensure that these supporting Services enable his or
her Service to be successful.
Service Manager
This role is responsible for managing the end-to-end lifecycle of one or more IT Services.
The Service Manager:
Provides leadership on the development of the business case and process architecture,
Service deployment and lifecycle management schedules,
Performs Service cost management activities in close partnership with other organizations
such as operations, engineering, and finance.
The Service Manager is also responsible for the controls built into the Service, both
supporting the processes and corporate controls (e.g., SOX).
Process Owner
As with the Service Owner, the Process Owner is the one individual accountable for the
success of the Process. The Process Owner will ensure the Process is being performed as
agreed and documented in the Process documentation. This Process Owner is concerned with
the overall quality and performance of the Process, especially the measuring of health and
performance of the Process.
This is obtained through the definition of Key Performance Indicators (KPIs) and frequently
reviewing the metrics, and acting as necessary. These metrics represent a scale of measuring
managed Services, Processes, and activities and are used to identify trends, productivity,
resources, and opportunities for improvement.
Process Manager
The Process Manager will manage the day-to-day activities of the Process. In matters that
pertain to the Process, the Process Manager is answerable to the Process Owner and performs
the day-to-day operational and managerial tasks demanded by the Process activities. While
there should be one Process Owner for each process, there may be multiple Process Managers
for that same Process. The Process Manager does not necessarily fall within the Process
Owner’s organizational chain of command.
Process Analyst
The Process Analyst is responsible for Process execution, supporting Process development,
design and implementation, implementing the process, and providing continuous process
improvement support.
Initiation process involves defining the ITSCM policy and communicating throughout the
organization so that all those concerned are aware of the need for ITSCM.
In the initiation phase, IT Service Continuity Manager will identify define the scope of
ITSCM and identifies the appropriate roles and responsibilities for ITSCM related activities.
S(he) will determine of the command and control structure required to support a business
interruption.
For the identified roles and responsibilities, the ITSCM manager will identify and allocate
resources and familiarize and/or train staff to accomplish the ITSCM related tasks, like BIA,
Risk
Assessment, etc.
Requirements analysis
Based on the business plans and business continuity plans, IT service continuity management
staff will do the Business Impact Analysis, and will identify the Vital Business Functions and
related IT services. They shall quantify the impact to the business due to loss of service (such
as it could be a ‘hard’ impact that can be precisely identified – such as financial loss – or
‘soft’ impact – such as public relations, morale, health and safety or loss of competitive
advantage).
Strategy development
Based on the BIA and Risk Assessment, IT service continuity management staff will prepare
the IT Continuity Strategy with an optimum balance of risk reduction and recovery or
continuity options.
Based on the ITSCM strategy, IT service continuity management will plan the
implementation of ITSCM by preparing detailed IT Plans, Recovery Plans and Procedures.
These include plans such as:
Operational management
In operational management, ITSCM manager and coordinator shall periodically review the IT
service continuity and DR training material for any updates. Further, they shall oversee and
ensure that the Trainings are being conducted as per the planned schedule.
Disaster Recovery
In this phase, ITSCM Manager will initiate the execution of the ITSCM & DR Plan and
closely monitor the execution till the services have returned to normal. After the services are
back to normal state, the ITSCM Manager will:
Produce a report of disaster recovery and mention what went right and what went wrong
during the execution.
Send the report to senior management for review.
Record any identified improvement opportunity in the CSI register.
If required, update ITSCM & DR plans (after due approvals from the Change management
and relevant stakeholders)
Metrics
Change Management focuses on transitioning new services or modifying the existing services
into IT operational environment ensuring the changes wouldn’t create any outages in the IT
environment.
Objectives
Respond to the customer’s changing business requirements while maximizing value and
reducing incidents, disruption and re-work.
Respond to the business and IT requests for change that will align the services with the
business needs
Ensure that changes are recorded and evaluated, and that authorized changes are
prioritized, planned, tested, implemented, documented and reviewed in a controlled
manner
Ensure that failed changes are analyzed and RCA’s done to reduce the reoccurrence of such
instances. Check points are enforced to understand the progress of change and to
understand the failures.
Ensure that all changes to configuration items are recorded in CMS
Optimize overall business risk
Scope
Architectures
Processes
Tools
Metrics
Documentation
IT services
Configuration Items
The Change management process interfaces with various other Service management
processes as shown in the diagram above. This diagram depicts how Change Management is
operated and the interfaces associated with it.
Change Trigger/Input
This process starts with Request for Change due to major or minor upgrade to an existing
service or a service request requiring a change.
Each change ticket or RFC is recorded so that it could be tracked, monitored, and updated
throughout its life cycle.
Sub processes involved in change management is defined below:
RFC logging and review
The objective is to filter out Requests for Change which do not contain all information
required for assessment or which are deemed impractical. The Change Initiator requests for a
Change to Service Desk who in turn; creates a Change record. Where tool access is available,
the Change Initiator raises a Change record himself.
Based on the initiator’s assessment and the Change Management policy/guidelines, the
change is classified as Emergency, Normal, Standard, Minor change.
Check RFC for completeness, practicability and perform initial assessment: Consider the
7R’s of the Change Management.
Change Initiator
Change Manager
Configuration Manager
Domain Owner(s) (As per Change requirements)
Depending on the nature of the change, Change manager determine the other members of
the ECAB.
Categorization
Categorization determines the required level of authorization for the assessment of a
proposed Change. Significant Changes are passed on to the CAB for assessment, while minor
Changes are immediately assessed and authorized by the Change Manager
Change Manager schedules CAB Meeting. The CAB reviews to RFC and related documents
to understand the requirements of the change. The CAB determines if a Formal Evaluation is
necessary for the proposed change.
CAB understands the effects of the change and identifies predicted performance. This can be
determined from the requirements mentioned in the RFC, acceptance criteria, discussing with
relevant stakeholders, etc.
CAB assesses risks and conducts feasibility analysis:
Feasibility analysis is performed with respect to different aspects to find if the proposed
change is a viable option. The analysis could include different factors like:
Based on the assessment findings, CAB either approves the change or rejects it.
This phase authorizes detailed Change and Release planning, and to assess the resulting
Project Plan prior to authorizing the Change Build phase.
It involves other tasks like
Preparing the FSC after considering all approved RFCs which are still open for
implementation. Also the ongoing RFC implementations are considered which preparing the
schedule of changes. Changes of similar kind are grouped together to help release planning.
The change window is reviewed with the Availability Management and ITSCM process plans
for consistency.
Depending on the nature of the RFC, a decision is made on the requirement of a formal
evaluation before the approval for build is provided.
Based on the criteria for evaluation after planning and before build, the project plan as well
as the test plan are reviewed and evaluated.
Deployment
Deployment assesses if all required Change components have been built and properly tested,
and to authorize the Change Deployment phase.
Deployment determines if a formal evaluation is required before the deployment can begin.
Accordingly, provide the related/relevant documents to the Change Evaluation Process and
request for a formal evaluation prior to deployment.
Verify that all components required for the change have been built
Verify that all components required for the change have been successfully tested
Verify that the test results indicate that the change will meet its objectives
Assess the Project Plan for conflicts with other planned/ongoing changes and to check
resource availability
Review the Evaluation Reports
Approve/Reject the change for deployment
Accordingly the change record is updated with the assessment findings of the CAB and the
status of the change as appropriate. The change schedule is also updated as necessary.
Post Implementation Review and Closure
PIR assesses the course of the change implementation and the achieved results, in order to
verify that a complete history of activities are present for future reference, and to make sure
that any mistakes are analyzed and lessons learned.
Strategy Management for IT Services defines service strategy as a standardized process for
building strategic assets with vision, strategic goals, innovation, value creation, and resilient
attitude for adapting new changes.
ITIL Service Strategy main focus is to define the market, propose the service offerings,
develop the service offerings as strategic assets, execute the developed offerings, also
measure and evaluate the strategies.
Strategy Generation for IT Services is the most critical process for long term sustainability of
the organization’s offerings.
The Business strategy manager identifies the organization strengths and weakness. This is
done by analyzing factors such as – existing services, resources, capabilities, projects,
finance, operations etc.
Next step is to identify the growth opportunities and threats. By analyzing external factors
such as - customer’s, supplier’s, partner’s, political trend’s, socio economic trend, technology
trend etc. organization gets fair idea of its current position in market and can formalize future
growth and
expansion plans.
Business strategy manager lists all market spaces where organization currently has hold and
also lists any new market space identified after internal and external analysis. To decide on
which market space to target it is important to define all critical success factor required for a
market. Based on this information a decision can be taken to cater to the market need or not.
High level objectives are set after discussion with steering committee, service management
director and service management process owners.
Business strategy manager defines the perspective to find out how objective can be achieved
in best possible way. Vision and mission statements are prepared in alignment with business
objective to be achieved.
To determine how the service provider will be differentiated from other service provider in
the industry the business strategy manager finalizes a position for organization.
Based on positioning strategy and objectives to be achieved the business strategy manager
finalizes on the type of service and the type of customer to be targeted. All services are
mapped to business outcomes and aligned with end organization objective.
Determine critical success factor, risk, assumption and dependencies to be considered while
preparing the strategic plan. Prepare the IT strategy and decide on actions to be taken to
achieve the objectives.
Identify budget requirements for developing new services identified as per IT strategy.
Perform
service valuation to check for feasibility of developing a service and if post program ROI is
required.
Prioritize IT strategy plans in the order of importance and ease of implementation.
Communicate the plan to stakeholders.
Business strategy manager lists down all available assets and their utilization pattern.
Organization services, process, skills, tools etc. are compared with competitors and the gap is
documented.
If an organization lack any of the critical success factor required being successful in
identified market space then such critical success factors are to be developed.
Investment options are prioritized and approved by senior management. Service offerings are
developed accordingly. The business strategy manager will work with other service
management
process owners to implement strategic plans and achieve desired outcome.
Metrics
Post Implementation Review TemplateThere are many ways to conduct these types of
reviews, either internally or by the help of a 3rd part auditor. Not each incident requires such
a review, and only ones who were deemed important enough to the organization’s continuous
growth are subject to a PIR.
The Post Implementation Review Template includes the following information and details
–
The source details of the incident (PIR) appear below them, and include –
Review Details
Authorization of PIR
The authorization of the PIR, including any future instructions as a result of the lessons
learned. This includes the name and role of the authorizer, their decision and when it was
approved. All of these are made official by the signature which comes last.
Since the cornerstone of the ITIL methodology is aligning the IT with the business needs of
the organization, constant improvements and learning from past mistakes is essential.
Conducting thorough reviews and suggesting improvements are vital for living up to this
goal, and the PIR is a major step in this direction.
The methodology doesn’t specify whether the PIR should be conducted internally or by an
independent party, but hiring an external 3rd party professional is better for recognizing faults
which an internal employee may deem as something that has “always been like this”. The
downside of this is that the process may be lengthier, and almost always more expensive.
This document defines the Incident Management Process. Incident management is the
most important process in ITSM process implementations. The process is based on the ITSM
best practices, and can be modified to reflect requirements specific to your organization.
The primary audience for this document is IT managers, process owners and process
managers responsible for the design, implementation, management, and continuous
improvement of this process. This incident management document may also be of interest to
IT staff members who execute a specific role within this process and business organizations
that want to better understand how the process has been defined within the IT organization.
Incident Management Process
Incident management is the most important process which can be considered like the face of
the IT service provider and it would be the first process which will implemented in ITSM
process implementations.
Objectives:
Objectives section defines the definition of term incident and the objectives of incident
management.
Scope:
Scope section defines the scope of incident management which includes any event which
disrupts, or which could disrupt, a service. It includes events which are communicated
directly by users, either through the service desk or through an interface from event
management to incident management tools.
Incident management activities and the lifecycle of incident record, can be briefly mentioned
as:
This section defines the incident management process interfaces with various other Service
management processes.
This section presents the visual representation and explanation of incident management
activities, its respective roles, how an incident is triggered, how its prioritized and
categorized, how investigation and diagnosis is done, how the tickets are handled with 3rd
party vendors, resolution and closure.
C
ritical incident management Process Flow
This section presents the visual representation and explanation of critical incident
management activities, responsible groups, and actions.
Key notes on critical incident:
Any Incident that results in significant Business disruption will be called as Major Incident
Major incidents require shorter resolution timescales and greater urgency due to its impact
on Business.
Definition of what is “Major” must be agreed and mapped onto the overall Incident
prioritization process.
May require a MI team under the leadership of the Incident Manager.
Should not divert the attention of the Service Desk Manager.
At times an Emergency change might be triggered to resolve a Major Incident.
Any change involves risk as an integral part, and these risks need to be a part of any RFC as
well.
The RFC is then presented to various people and boards across the organization, whose job it
is to understand the implications and risks, and determine whether the request should be
approved. Upon approving the RFC, a plan for its successful implementation is drawn up and
initiated.
The RFC template is filled out for each request and the requestors fill out the top table which
contains the following fields –
The reviewers fill out the table below, which has check boxes which track the RFC and also
contains the following fields –
Planning and reviewing any changes to the organization require planning and understanding
of the implications of it. The IT service desk should be a part of the decision making process,
in order to weigh in regarding the implications to them.
This will allow them to properly align themselves post change, in order to keep allowing the
business to grow and improve while relying on the IT systems to do so. Recording changes
will also help in understanding what the past was, and why it needed to change.
The basic incident catalogue template is a living document, which should have a minimum
number of employees in order to maintain uniformity in language and form.
The incidents themselves are listed next, while each one contains the following information –
1. The name of the incident, which succinctly describes the problem. This field also contains
the name of the user who raised the incident (if it is only one user)
2. The priority of dealing with the incident. This is usually one of the following four
possibilities: Urgent, High, Medium, Low
3. The name of the team who this incident falls under their purview
4. Who is the owner of the incident, and needs to solve it to the satisfaction of the user who
raised the incident to the service desk
5. The category of the incident. This will help in resolving future incidents of the same nature,
and rooting out major problems which have similar incidents
6. Whether an escalation is required. A simple Yes / No field which should be set to “Yes” if the
service desk need to purchase a service or product In order to resolve the issue (above a
certain amount)
7. The incident’s number: A unique number for follow-ups and documentation. If the service
desk work with an incident tracking system, clicking on the number will open up a detailed
record of the incident
8. The diagnosis of the incident, made by its owner. This includes the proposed solution and
the cost of implementing it. This is the heart of the incident’s log, and can be used in the
future to solve a similar incident
9. The escalation decision: only if the escalation was answered “Yes”
10. The status of the incident. This is usually one of the following three possibilities: Completed,
In Process or Cancelled
Learning from past mistakes and trying to recognize root problems are a big part of the ITIL
methodology, and maintain logs of past incidents allows the IT service desk to help the
business side of the organization to focus on their main goal: improving the operations and
the profitability of the company. A good log is often consulted before the incident is resolved.
Release Planning
Releasing a new version / software / system requires planning called Release Planning on all
fronts, including the IT department. The ITIL methodology defines a release as a set of
authorized changes to an IT service. The Release Plan Template presents and records the all
necessary details regarding a release plans.
Types of Release
The release plan template presents and records the following details regarding a release plan
The basic details of the plan appear at the top of the template, and present the description
of the release and the following details –
1. The owner of the plan. This is who will update the plan and the details on a periodic
timeline, and what their role is
2. When the release plans was submitted, and to whom (the approver of the plan)
3. The type of release (one of the three types listed above), and the number of release
4. The status of the plan (Approved, Pending Approval or Rejected) and its risk level (High,
Medium or Low). A High risk means that if the implementation is unsuccessful, the
organization will be impacted immensely
5. The owner of the release program (usually this is the Project Manager)
6. The start & finish dates, and the duration of the release plan
What the changes in the version will be: These include the major changes from the previous
version, or the last system which was used.
Who will be affected by the release: This can focus the internal users who will need to
adapt to the changes of the new release, and help them prepare accordingly.
Risks: Every change includes risks and a release plan must address these, otherwise they
may be overlooked. The risk should include mitigation plans as well, not just the potential
problem.
Who needs to approve any CR (Change Request): Any change to the release must be
submitted, reviewed, approved and documented. This section outlines what the chain for
these approvals is.
The timeline: This is usually a high-level plan for the release, and outlines what needs to be
done and by who, the status and any comments pertaining to the tasks. The format can be
Excel, MS-Project, etc.
A release must be planned and tracked, like with any work plan. Planning the release allows
the IT department to align its resources to the requirement of the organization, while making
sure that the business improves as a result. A release plan takes into consideration the
business needs, and allows the IT department to prepare a solid plan which will execute and
bring the release to fruition.
Deploying the release is followed by KPI’s (Key Performance Indicators) gathering, to
ascertain whether the new release did in fact help the business side of the organization and to
make any adjustments in order to continuously improve these.
The purpose of this policy is to ensure that any incidents that affect the daily operations of the
organization are managed through an established process.
Guidelines for incident management operations section defines the guidelines for the
recording, classifying, prioritizing, and communicating with IT stakeholders.
Guidelines to decide urgency section defines the guidelines for defining the urgency (urgency
is defined based on how criticality of services) which is defined as critical, normal and low.
RACI Matrix
RACI (Responsibility, Accountability, Consulted & Informed) matrix clearly provides the
segregation of roles and responsibilities as activities with respect to the incident management
roles (service desk, incident manager, L2, technical lead, service delivery manager, customer
service manager).
SLA’s defines the agreement between IT service provider and the customer. SLAs section,
defines how incidents have to be handled with priority P1/ P2/ P3, what should be the
response time, restoration time, closure notification time, resolution time, and communication
updates timing.
Reports
Reports - Incident Management Policy
Reports define the key findings, details, and useful information presented to the different
levels of management and users for making effective decisions and actions.
Reports section here talks about three types of reports like post incident report, weekly
reports, monthly reports, etc.
Meetings
Meetings section defines the types of meetings that should be conducted like daily meetings,
weekly meeting and monthly meetings, its agenda, expected meeting outcomes, etc.
Metrics for any IT/ Business process should drive the strategy of the organization, help the
management make decisions, and drive towards the goals, objectives and priorities of the
company.
The primary objective of incident management metrics is to ensure that the operations are
been carried out to provide good customer satisfaction and adhere to defined SLA’s.
Helps us understand what the end user/ customer feels about the service provided. It is the
most important metric for incident management operations.
Threshold value: <6
Target value: 8
Possible values: 0-10
Major Incidents that have been critical to business operations, which have incurred huge
financial losses/ reputation. It will help us understand the financial loss.
Threshold value: As per the defined SLA
Target value: As per the defined SLA
Possible values: As per the defined SLA
Incidents which are occurring again and again. It shows the inefficiency of resolutions
provided by incident management staff and problem management staff.
Threshold value: As per the defined SLAs
Target value: As per the defined SLAs
Possible values: As per the defined SLAs
Number of incidents that needed onsite human resources intervention
Incidents that needed human presence at the site or machines or systems. This metric
provides an opportunity to automate operations.
Threshold value: As per the defined SLAs
Target value: As per the defined SLAs
Possible values: As per the defined SLAs
Incidents that are resolved in the first attempt, it shows the efficiency and effectiveness of the
incident management staff in resolving the issues without reopening the incidents.
Threshold value: 75%
Target value: 90%
Possible values: 0-100%
When calls are registered in the ITSM tool, they are assigned to some assignment groups for
resolution. This metric shows how accurately the incidents are been assigned.
Threshold value: As per the defined SLAs
Target value: As per the defined SLAs
Possible values: As per the defined SLAs
Incident management function would have layers of support teams like L1/ L2/ L3; this
metric shows the efficiency of L1 support by the number of calls resolved.
Threshold value: As per the defined SLAs
Target value: As per the defined SLAs
Possible values: As per the defined SLAs
Incident management function would have layers of support teams like L1/ L2/ L3; this
metric shows the efficiency of L2 support by the number of calls resolved.
Threshold value: As per the defined SLAs
Target value: As per the defined SLAs
Possible values: As per the defined SLAs
This type of log can be used as a database for the service desk employees, whenever they
encounter an incident for the first time. Putting effort into a log like this may seem like a
waste of time at first, but once it saves the service desk time and effort (and money for the
organization) they will see the benefit of it. This means that they need to detail each and
every incident they encounter, and tag each one with the correct words.
[the_ad id="667"]
Template consists of the following information - Which team owns it and uses it (Division >
Team), who updated it last and when it was last updated.
The reference number of the complaint record, which is a unique reference number. If the log
is on a shared folder or SharePoint site, then clicking on the number will open up the full
complaint record thus allowing the service desk to review the entire complaint from start to
finish
The keywords of the complaint, which is basically the summary of the entire complaint into a
few keywords (between one and three usually). For example: SharePoint, Upload, Full
Memory to describe an issue a customer had while trying to upload a file to the SharePoint
site and failing due to the fact that the site reached its capacity
When the complaint was received: date and time. This will help in sorting the log, last entry
should appear at the top (Z to A)
When the complaint was resolved to the satisfaction of the complainer. This can aide in
understanding the required number of days to resolve certain incidents, and calculate which
ones exceeded their SLA (Service Level Agreement)
Comments: Free text where the owner of the incident can write any and all best practices,
suggestions and tips for future use and reference.
Continuous improvement is a cornerstone of the ITIL methodology, and keeping a log of past
complaints helps in refraining from repeating them. This is a major tool in analysing the
major problems of an organization, and allowing the business to grow with the help of the IT
services.
Over the years, ITIL has grown and evolved after being revised several times to keep up with
the fast-changing landscape of technology and its impact upon organizations.
Today, ITIL is in its third version, often referred to as v3. ITIL provides a method that
organizations can utilize to increase the efficacy of their IT services while reducing their cost.
Each of these five elements has a specific guideline, requirement, and process detailed for
each stage of the lifecycle phase. This allows organizations the ability to implement ITIL in
focused areas or in a comprehensive manner. The most effective implementation comes about
as a result of adopting the lifecycle principles in their entirety.
ITIL Service Lifecycle
ITIL Overview
1. Service Strategy
The cornerstone of the ITIL lifecycle is the service strategy. The service strategy contains the
financial models, requirements, and goals for the IT systems of an organization. In this
strategy, the full range of service operations is laid out, along with policies or principles for
consideration. Simply put, this element describes the overall goal of the services lifecycle.
2. Service Design
In the ITIL lifecycle, service design refers to the blueprint used by an organization to create
the IT infrastructure it needs to complete its service strategy. This aspect identifies the people
and resources necessary for the successful execution of that strategy. It also includes changes
relating to new rules and regulations.
3. Service Transition
After having determined the strategy and design phases, our organization must then focus on
service transition. The goal of this is to align operations with projects. Every aspect of our
service comes together to make sure it has been tested and integrated as a whole. Paying
adequate attention to the details of this phase can cut down on unexpected problems later on.
4. Service Operation
The purpose of service operation is to enable comprehensive practices that allow us to sustain
stable services. Our operational team handles incident management and takes feedback on
customer satisfaction.
The final phase of the ITIL lifecycle serves to integrate and maintain the other four.
Continual service improvement means that we are always aligning our services with the
needs of our business, seeking opportunities for improvement and changing practices
accordingly.
Guidance provided by ITIL is commonly used and recognized, making it an easy avenue of
communication between many organizations and individuals. Many high-profile companies
have turned to ITIL guidance for their business practices, including IBM, NASA, and HSBC.
Organizations around the world have proven the effectiveness of this model by adapting it to
their business models, leading to a continuous cycle of improvement.
A fundamental aspect of the success of ITIL is its requisite education and certification
schemes. These uniform requirements help companies to deliver quality service by having
their service personnel properly trained and educated.
ITIL allows us to create and maintain beneficial business relationships with our customers
and increase their satisfaction. It also enables us to discover the most efficient practices for
our teams to use in understanding and managing customer expectations.
The adoption of proven standards leads us to provide quality service on a consistent basis.
By using ITIL, we can incorporate changing elements of our customer’s needs while also
increasing stability and reducing risk. These processes allow us to act in accordance with
changing circumstances in short order. By aligning plans for services with plans for the
business, we can decrease the likelihood of unexpected deficiencies in business performance.
In short, the ITIL service lifecycle allows us to engage in a positive feedback loop. Our
service strategy, design, transition, and operation are integrated into continual service
improvement so that present and future challenges are met and adapted to with ease.
The WOM (word of mouth) rule states that a satisfied customer will sing the company’s
praises to three of their acquaintances, while a dissatisfied customer will let eleven of their
acquaintances know that the service / product wasn’t according to their expectations. This
rule makes it absolutely necessary for the company to allow its customers to complain about
their service or product, and the best format to achieve this is a complaint report or
customer complaint form. These reports are usually on the company’s website, but can also
be received via mail, fax or phone-call. Once a complaint is received, the sooner the
complaint is addressed the better.
This section allows the complainer to write any and all things which are perceived as not
according to the promised value for money.
Required Improvements
If any lessons were learned during the course of addressing the complaint, this section will
list them. This is to be filled in by the owner of the ticket (from the service desk), and to be
authorized (or declined) by the approver of the complaint resolution
Authorization
since any improvement measure has vast implications on the organization, it must be
approved before it is implemented. This is usually done by the service desk manager, or the
CIO of the organization.
Since some complaints have to do with the IT services of the organization, the ITIL tries to
ensure that the IT service desk handles all of the complaints which are aimed at the services
offered by them. The constant improvement and learning from past mistakes is a cornerstone
of the ITIL methodology, and this helps in aligning the IT services to the business goals of
the organization.
Since everyone wants to do well in any form of test, there is considerable pressure on the
auditor to provide a positive feedback regarding the tested subject. This requires integrity and
accountability from the auditor, as well as a strong moral compass.
The audit report includes advice and proposed solutions to any problems or issues which
may have risen during the course of the audit.
1. Timeframe of the audit: this is usually over a period of time, between a few days and a few
weeks (depending on the scope of the inspected team)
2. When the report was issued
3. Who conducted the audit and issued the report. This can be a team of auditors, depending
on the scope of the audit
4. The scope of the audit: What the auditors reviewed, and in which team / division of the
organization
This is the heart of the report, and includes three main sections
1. Documentation: this section details which documents were reviewed over the course of the
audit. Each document must be identified according to its specific sequence number, and
contain a short summary of what the document contains
2. Interviews: this section shows which employees of the audited team were interviewed,
what their role is and how they relate to the scope of the audit
3. Nonconformities: If any instances where the actual actions taken aren’t in line with the
official process of the organization, this section will highlight them. The usual structure of
these bullets is: the problem, the proposed solution, and who will implement the solution
(the owner of the solution, if it is approved).
This is the last section of the report, which details when the initial and final drafts were
reviewed and by whom (Name & Role). The section also lists who approved the proposed
solutions, and when this was done. This is usually done by one of the top management
officers of the organization. The last row presents the name and signature of the auditor.
An ITIL audit focuses on making sure that the IT services are aligned with the business
requirements of the organization, and that the processes and methodology of the service desk
come as close as possible to providing seamless continues IT services.
The auditor examines processes and past occurrences which may have not been in-line with
the methodology of the ITIL and the organizations goal, and suggests ways of fixing these
nonconformities.
After multiple incidents were reported to the service desk and a problem was recognized, the
ITIL methodology recommends to convene a MOM meeting in order to review the problem
and make recommendations on how to resolve it. During the ITIL MOM meeting similar
problems which occurred in the past are reviewed, in hope of using the same (or similar)
solution to resolve the current problem by using MOM Template.
The MoM (Minutes of Meeting) template records the following issues and details –
In order for the organization to be as efficient as can be, each problem should be reviewed
before its solution is authorized. This review should include past solutions to similar
problems, and brainstorming the recommended solution. Meeting in small groups can achieve
this goal, and the result of each meeting should be clear action items written in a MoM. The
service desk should always have a recommendation on how to solve the problem, and this
should serve as an agenda for the meeting. Of course the recommendation doesn’t necessarily
have to be approved.
1. The MoM should be displayed to all the participants during the meeting, so that the action
items are visible to all.
2. Any presentations or other relevant material should be distributed to the participants in
advance of the meeting
3. The group should be made of many different roles, in order to refrain from group thinking,
and to force the members to explain themselves in simple language.
The CAB should be made up of professionals from both the IT and the business side of the
organization, in order to ensure that the IT services are aligned with the business needs. This
also aims at ensuring that the proposed change doesn’t overlook any requirements of other
groups in the organization (accounting, HR, etc.). In order to achieve this, the change
advisory board members should be made up of employees from different sections/divisions of
the organization.
The MoM (Minutes of Meeting) change advisory board template of a CAB meeting captures
the following information –
1. At the top of the page is the company logo, and its name
2. The first section includes the basic details of the meeting –
1. When the meeting was held (date and time)
2. Where it was held (physical location and any other means of video / audio
conferencing)
3. When the MoM was sent out (by the recorder)
4. What the goal of the meeting was
3. The next section is the list of participants, where each participant is recognized by their
name, role and any other comment. For example: the chair of the meeting, the fact that they
participated via video conferencing, etc.
4. The agenda of the meeting appears next, where each topic has a specified timeframe and
presenter
5. The last and most important section of the MoM is the action items table. In this table all of
the action items are recorded and assigned to various employees (not only the ones who
participated in the meeting). The table includes the following information –
Number of the action item (In an ABC format). Usually a simple running number list
The action item itself. This is the main column of the table, and should explain in detail
exactly what needs to be done in order to solve the problem (or a part of it)
Due Date: Presents when the owner of the action item needs to complete it
Owner: Lists who is responsible for performing the action item. This may require more than
one person, but shouldn’t list more than one. In this case, the one owner is accountable for the
action item being completed. The owner may appear in name, or by role.
Comments: This column may be filled in during the meeting, or before the next one in which
it will be reviewed
The MoM should be displayed to all the participants during the meeting so that the action
items are visible to all. Any presentations or other relevant material should be distributed to
the participants in advance of the meeting.
The left side presents the following problem detail (from top to bottom) –
Record Date: When the record was written by the service desk.
Recorded by: Who wrote the record, and what their role in the organization is.
Problem Date: When the problem was reported to the service desk.
Duration: How long the problem lasted since it was first reported to the service desk, until it
was resolved by them.
Priority: This helps the service desk decide which problem to try and solve first. There are
usually three possible attributes: Low, Medium and High (some organizations add the fourth
“Critical” attribute). Since everyone who reported a problem want theirs to be resolved first,
this section is very sensitive issue. Most organizations only allow their senior service desk
employees to set this attribute in the record.
Category: This section contains the tags of the problem, which help in future searches. This
should be filled in with thought and attention, since it will aid in avoiding similar future
problems.
Description: This section is usually the largest in the left side details. It allows the service
desk to outline in a simple and professional language how the problem was reported,
analyzed and how the solution was reached.
The right side presents the how the problem was resolved after the diagnosis was reached,
and what (if any) future actions will be taken as a result of the problem. The following
problem details appear (from top to bottom) –
Corrective Actions: How the service desk corrected the problem, how long it took them to
do so and what the result was.
Lesson(s) Learned: What changed in the organization as a result of the problem, and when
this change should take place. Usually this is a periodical solution.
Authorization: Since most changes require some sort of funding, the added cost needs to be
authorized by a stakeholder within the organization. This section shows who authorized the
solution, what their role is, and what the financial implications are on the organization
(sometimes this is $0).
Recording the details of the root cause of a problem, and how it was solved aids the
organization in aligning the IT services with the business requirements. The record can also
be used to explain the need in certain monetary decisions, and helps the managers in
preparing their yearly fund requests.
Whenever the service desk encounters a major problem within its systems, there are eight
steps which it needs to perform in order to resolve the problem –
Detection
The first step is to identify the root cause of the problem, and not just the lone incident which
is only a symptom of the problem. This requires identifying incidents throughout the
organization, either proactively or by receiving multiple service requests.
Recording
Since a service desk usually has more than one employee, it is important to share all the
incidents. This will help in identifying the root cause of the problem, and will serve as a log
for lessons learned and future improvements.
Categorizing
Since each user fills in a service request a bit differently, it is important to categorize them as
they come in. This will help in modeling the incidents, which will allow the service desk to
collate as many incidents into one major problem and solve it. It is possible to have more than
one category. For example: Main category is “Communication”, whilst the secondary one is
“Desk Phone”.
Prioritizing
Once all the requests are recorded and categorized, it is important to prioritize them in order
of urgency and importance. Ideally the more important ones will be solved first, although
most organizations solve the urgent ones first.
Diagnosing
Now comes the hardest part, figuring out what the problem is and deciding on how to solve
it. This step of course requires the most amount of time, and it shouldn’t be rushed. Once the
problem has been diagnosed and the root problem is detected, the service desk needs to
suggest the best solution for rooting out the problem.
Workaround
If the suggestion in the previous step was approved, now the team needs to implement the
solution across the organization. This step requires the whole team to understand the
problem, the solution and to implement it in the same manner.
Documentation
After the problem has been solved, documenting the entire process (from stet #1 to #6) will
assist in resolving future issues. This should be done in a set template, which will help in
familiarizing the team with the process.
Lessons Learned
The final step is more often than not skipped, since most of the service desk employees don’t
see an immediate benefit in doing so. This task usually falls on the team lead of the service
desk, and is very important for the organization to grow and learn from its mistakes.
This process is crucial for the long-term success of the organization, and is the core
foundation of a robust service desk entity. The problem resolving collates many different
incident reports, and is internal as well as external facing.
Outline to the users which services are available, how to request any one of them and what
the standard duration is to fulfill these requests
To create a clear and simple procedure for handling any type of request
Detail which approvals a user needs for each type of request. For example who needs to
approve installing new software, procuring a license, etc.
Grant a platform for general requests, comments and tips for improvement
The process of resolving a submitted form should be straightforward, and usually is made up
of the following five steps –
Open a request
This is done by a user, and there is no place for pro activity here.
Assign
This can be done automatically by a simple load balancing system, which spreads the
requests amongst the service desk employees. Once a request is assigned, the responsible
party will see the request through to fruition.
This step is the most important one of the process, and is where the service desk shows its
value to the organization. The service desk must follow a procedure for fulfilling the request,
and if one doesn’t exist then an escalation should be used. In this case the supervisor of the
service desk needs to weigh in, and decide on how to continue from here.
Once the procedure has been fulfilled, the service desk needs to validate that the solution is
acceptable with the requester. If it is then continue to the next step, if not then go back to the
previous step.
This is the official closure of the request, and is important for evaluating the timeline of the
resolution to make sure that no SLA’s (Service Level Agreement) were breached.
KIS (Keep it Simple): Try and make it as easy as possible for the employees of the
organization to request anything that will make their lives easier and allow them to be more
productive.
Clearly communicate the SLA’s (Service Level Agreement): This will lower the
communication between the requestor and the service desk to a minimum, allowing both
sides to focus on more important things.
Request feedback: Ask the requestors for feedback after their request was fulfilled, this will
result in continuous improvement of the service desk.
Document the requests: Make sure that the service desk professionals don’t feel the need
to invent the wheel every time they receive a new request.
Incident Management in ITIL is the key process in Service Operation. Most Service
Providers are evaluated and assessed by the speed they respond and restore service
after an Incident has occurred. By definition, an Incident is an unplanned interruption
to an IT service or reduction in quality of an IT service.
It may also be the failure of a Configuration item (CI) that has not yet impacted service. The
simple explanation is an Incident is an unplanned disruption, or impending disruption, to an
IT service. If disk space is filling up quickly and the service CI will be out of space in three
hours, it is an Incident. If the network quality is degraded, it is an Incident. Incidents include
disruptions reported by users (either via calls to the Service Desk or imputed into the ITSM
tool), by technical staff, or automatically detected and reported by event monitoring tools.
The concept of Incidents disrupting a service is one most people are familiar. Think of your
household phone or internet service. When you moved into your residence and signed up for
service, your considered the service worth the price. If there is a disruption in the service, it
is painful to the customer and the goal should be quick resolution. The customer does not
want hours – or even days – without phone and internet. Even if the customer is rebated for
the outage, it still leaves a scar on the relationship. This is the same with the customer of an
IT service. They want as few Incidents as possible, lasting the shortest amount of time as
possible. The customer is paying for a service and wants it available when needed. The
business customers who are paying for the IT service do not care about the cause of the
disruption, just service restored as quickly as possible and the issue to not arise again.
o Impact is the measure of the effect of the Incident, Problem, Change, or other ITSM
record. Impact is usually measured on the impact to service levels.
o Urgency is the length of time until the Incident, Problem or Change has a significant
impact on the IT service. This is how quickly the Service Provider needs to act to
resolve on behalf of the business customer.
Most organizations utilize a Priority Matrix that is a 3-by-3 or 4-by-4 scale. For example,
high impact and high urgency would result in a Priority 1 Incident. Additionally, a low
impact and low urgency Incident would be the lowest Priority (some organizations call this
Priority 4 or Priority 5).
Most Service Providers, both internal and external, use this matrix to determine the response
and closure times for service levels. These service levels are agreed upon and documented to
form a Service Level Agreement (SLA) or Operating Level Agreement (OLA).
Users do not care the nature or the cause of the Incident, just how soon it can be resolved.
Problem Management will investigate root cause. Most organizations keep volume metrics
like number of Incidents broken down by Service Provider. Many track service metrics suck
as Mean Time to Restore Service (MTTRS) and Mean Time Between Service Interruptions
(MTBSI). The service metrics are great when reviewing service availability with the
business customer.
Advanced process metrics will include a view into the maturity of the Incident Management
process. This includes the percentage of Incidents logged, categorized, and prioritized
correctly, each with a separate metric tracked per Service Provider. The Service Desk will be
measured on first-call resolution, broken down per Service Desk agent.
Incident Management is the process that determines how business customers view the
performance of the service and the Service Provider. The performance against the SLAs and
OLAs will determine how the Service Provider is viewed by the business customer.
Major Problem Catalogue Template
The Problem
A problem is an unknown cause of multiple incidents, which stem from the same root cause.
Solving a problem includes understanding said cause, and resolving it in a manner which
resolves all of the incidents which stemmed from the problem. To use a simple analogy: If an
incident is like a symptom, than a problem is like a disease. The problem needs to be written
in a clear and simple language, which explains it in laymen terms.
Basic Details
The goal of this section is to list all the employees who raised an incident which stemmed
from the problem, and when they reported it. This will help in analysing the time when the
problem first appeared. The more incidents reported, the easier it will be to diagnose the
problem. Hence it is recommended to repeat similar incidents in the catalogue.
Symptoms
This part of the catalogue explains in detail what the employee encountered when trying to
access or use any information system in the organization. All of the incidents (symptoms)
need to be listed here, since the symptom list will help the service desk identify the problem
and decide on the required corrective actions. This part is like a doctor who tries to identify
the disease according to the list of symptoms detailed by their patients.
After the problem was diagnosed, the problem needs to be resolved. The corrective actions
taken are what the service desk decided to do in order to achieve this. The goal of this section
is to assist the service desk in resolving similar problems in the future. In case a false root
cause was thought to be the problem, this should also appear here, in order to rule it out in
future cases.
Problem Category
Like tagging in social media, this section will help in search queries in order to easily find
similar symptoms for future problems. The more tags, the easier it will be to locate it.
The main goal of the methodology is to allow the organization to focus on improving its
business results, while aligning the IT services with this goal. The report catalogue should be
used as a DB (data base) for the service desk to diagnose problems which impede this goal,
and thus allow the business to focus on improving their results over time.
At the top of the catalogue there is a short section which needs to filled in after each addition
to the catalogue. This includes the following information–