Professional Documents
Culture Documents
Copyright Notice
Copyright 2009 IBM Corporation, including this documentation and all software. All rights
reserved. May only be used pursuant to a Tivoli Systems Software License Agreement, an IBM Software License Agreement, or Addendum for Tivoli Products to IBM Customer or License Agreement.
No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system,
or translated into any computer language, in any form or by any means, electronic, mechanical,
magnetic, optical, chemical, manual, or otherwise, without prior written permission of IBM Corporation. IBM Corporation grants you limited permission to make hardcopy or other reproductions of any
machine-readable documentation for your own use, provided that each such reproduction shall carry
the IBM Corporation copyright notice. No other rights under copyright are granted without prior written permission of IBM Corporation. The document is not intended for production and is furnished as
is without warranty of any kind. All warranties on this document are hereby disclaimed, including the
warranties of merchantability and fitness for a particular purpose.
Note to U.S. Government UsersDocumentation related to restricted rightsUse, duplication or
disclosure is subject to restrictions set forth in GSA ADP Schedule Contract with IBM Corporation.
Trademarks
The following are trademarks of IBM Corporation or Tivoli Systems Inc.: IBM, Tivoli, AIX, Cross-Site,
NetView, OS/2, Planet Tivoli, RS/6000, Tivoli Certified, Tivoli Enterprise, Tivoli Ready, TME. In Denmark, Tivoli is a trademark licensed from Kjbenhavns Sommer - Tivoli A/S.
Microsoft, Windows, Windows NT, and the Windows logo are trademarks of Microsoft Corporation in
the United States, other countries, or both.
UNIX is a registered trademark of The Open Group in the United States and other countries.
C-bus is a trademark of Corollary, Inc. in the United States, other countries, or both.
Java and all Java-based trademarks are trademarks of Sun Microsystems, Inc. in the United States,
other countries, or both.
Lotus is a registered trademark of Lotus Development Corporation.
PC Direct is a trademark of Ziff Communications Company in the United States, other countries, or
both and is used by IBM Corporation under license.
ActionMedia, LANDesk, MMX, Pentium, and ProShare are trademarks of Intel Corporation in the
United States, other countries, or both.
SET and the SET Logo are trademarks owned by SET Secure Electronic Transaction LLC. For further information, see http://www.setco.org/aboutmark.html.
Other company, product, and service names may be trademarks or service marks of others.
Notices
References in this publication to Tivoli Systems or IBM products, programs, or services do not imply
that they will be available in all countries in which Tivoli Systems or IBM operates. Any reference to
these products, programs, or services is not intended to imply that only Tivoli Systems or IBM products, programs, or services can be used. Subject to valid intellectual property or other legally protectable right of Tivoli Systems or IBM, any functionally equivalent product, program, or service can
be used instead of the referenced product, program, or service. The evaluation and verification of
operation in conjunction with other products, except those expressly designated by Tivoli Systems or
IBM, are the responsibility of the user. Tivoli Systems or IBM may have patents or pending patent
applications covering subject matter in this document. The furnishing of this document does not give
you any license to these patents. You can send license inquiries, in writing, to the IBM Director of
Licensing, IBM Corporation, North Castle Drive, Armonk, New York 10504-1785, U.S.A.
Printed in Ireland.
Table of Contents
Table of Contents
Preface
Course Description . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . XIV
Audience . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . XIV
IBM Tivoli Technical Education . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . XIV
Tivoli User Group Community . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . XV
Course Objectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . XV
Course Outline . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . XV
Typographical Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . XVII
Product Information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . XVII
Product Documentation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . XVII
1-21
1-22
1-23
1-24
1-25
1-26
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Table of Contents
2-26
2-27
2-28
2-30
2-32
2-34
2-36
2-37
2-38
2-39
2-40
2-41
2-41
2-41
2-41
2-42
2-42
2-44
2-45
2-47
2-48
2-49
2-49
2-50
2-50
2-50
2-51
2-51
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Table of Contents
2-54
2-55
2-56
2-57
2-58
2-59
2-61
2-62
2-63
2-64
2-64
2-65
2-65
2-65
2-65
2-66
2-66
2-67
2-68
2-68
2-68
2-70
2-71
2-72
2-73
2-74
3-17
3-19
3-20
3-21
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
III
Table of Contents
3-22
3-23
3-25
3-26
3-28
3-30
3-32
3-33
3-34
3-36
3-37
3-38
3-39
3-40
3-41
3-42
3-44
3-45
3-47
3-49
3-51
3-53
3-54
3-56
3-57
3-58
3-60
3-60
3-60
3-61
3-61
3-61
3-62
3-63
3-64
3-65
3-67
3-69
3-71
3-72
3-73
3-75
3-76
3-77
3-78
3-79
3-80
3-81
3-82
3-83
3-84
3-85
3-86
3-87
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Table of Contents
3-110
3-111
3-112
3-114
3-115
3-116
3-117
3-118
3-120
3-121
3-122
3-123
3-125
3-127
3-128
3-129
3-130
3-131
3-133
3-135
3-136
3-137
3-138
3-140
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Table of Contents
4-15
4-16
4-17
4-18
4-20
4-21
4-21
4-22
4-22
4-24
4-25
4-26
4-29
4-30
4-31
4-32
4-33
4-34
4-36
4-37
4-38
4-39
4-41
4-42
4-43
4-44
4-46
4-48
4-50
4-52
4-53
4-55
4-57
4-58
4-59
4-61
4-62
4-63
4-64
4-65
4-67
4-68
4-69
4-70
4-71
4-72
4-73
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Table of Contents
4-75
4-76
4-77
4-78
4-79
4-80
4-82
4-83
4-85
4-86
4-88
4-90
4-104
4-105
4-106
4-107
4-108
4-109
4-110
4-111
4-113
4-114
4-115
4-116
4-117
4-120
4-120
4-120
4-121
4-122
4-123
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
VII
Table of Contents
5-19
5-21
5-23
5-24
5-26
5-28
5-29
5-31
5-33
5-34
5-35
5-36
5-36
5-36
5-37
5-37
5-38
5-40
5-41
5-42
5-44
5-45
5-46
5-47
5-49
5-49
5-50
5-51
5-53
5-55
5-57
5-59
5-60
5-62
5-64
5-65
5-66
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Table of Contents
5-67
5-68
5-69
5-71
5-72
5-74
5-76
5-78
5-80
5-81
5-82
5-83
5-84
5-85
5-86
5-88
5-90
5-91
5-92
5-106
5-108
5-109
5-110
5-110
5-110
5-111
5-111
5-112
5-113
5-115
5-117
5-118
5-119
5-121
5-122
5-123
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
IX
Table of Contents
6-22
6-24
6-26
6-27
6-30
6-31
6-32
6-33
6-34
6-35
6-37
6-38
6-39
6-40
6-41
6-42
6-53
6-55
6-56
6-57
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Table of Contents
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
XI
Table of Contents
XII
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Preface
Student Guide
20 08 IBM Corporation
XIII
Preface
Course Description
This course presents the basic concepts in ITIL Service Management. The course is
designed to prepare the student for a the ITIL Foundation certificate in IT Service
Management.
The purpose of the ITIL Foundation certificate in IT Service Management is to obtain
knowledge of the ITIL terminology, structure, and basic concepts and to comprehend the
core principles of ITIL practices for Service Management.
The ITIL Foundation certificate in IT Service Management is not intended to enable the
holders of the certificate to apply the ITIL practices for Service Management
independently.
Audience
The target group of the ITIL Foundation certificate in IT Service Management is:
Individuals who require a basic understanding of the ITIL framework and how it
may be used to enhance the quality of IT service management within an
organization.
IT professionals who are working within an organization that has adopted and
adapted ITIL and who need to be informed about and thereafter contribute to an
ongoing service improvement program.
The target group may include, but is not limited to, IT professionals, business managers,
and business process owners.
XIV
Americas: tivamedu@us.ibm.com
EMEA: tived@uk.ibm.com
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Preface
Course Objectives
IBM Software Group | Tivoli software
Course Objectives
Upon completion of this course, you will be able to:
Course Outline
The following outline is a high-level description of the contents of this course. Each unit
has an overview presentation, and most have a series of student exercises designed to
reinforce the concepts presented. The course contains the following units:
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
XV
Preface
XVI
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Preface
Typographical Conventions
In this course, the following typographical conventions are used.
Convention
Usage
Bold
Italics
Bold Italics
Monospace
>
Product Information
Product Documentation
In some cases IBM Tivoli product documentation is available in the classroom or on the
Instructor Resources CD. For access to documentation outside the classroom environment,
visit the IBM Web site.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
XVII
Preface
XVIII
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
20 08 IBM Corporation
1-1
Introduction
This unit defines service and explains the concept of Service Management as a practice.
Objectives
IBM Software Group | Tivoli software
Objectives
Upon completion of this unit, you will be able to:
Define and explain the concept of a service
Define and explain the concept of Service Management
Define and distinguish between functions, roles, and
processes
List the characteristics of processes
Explain the process model
Explain the Service Lifecycle
1-2
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
20 08 IBM Corporation
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
1-3
History of ITIL
IBM Software Group | Tivoli software
History of ITIL
Developed in the United Kingdom in the 1980s by what is
now called the Office of Government Commerce (OGC)
Further development incorporated public and private
sector best practices (IBM, Microsoft, HP, and others)
ITIL promotes a quality approach to achieving business efficiency and effectiveness in the
use of information systems. ITIL best practices are applicable to all IT organizations, no
matter what their size or what technology they use. Today, ITIL is one of the most widely
accepted approaches to IT Service Management in the world.
Information Technology Infrastructure Library (ITIL) Version 1 contained over 40 books,
which were consolidated into seven books between 1999 and 2006 in ITIL Version 2. ITIL
Version 3 currently consists of five core books. ITIL V3 builds upon ITIL V2 but focuses
on the lifecycle of a service that should be aligned to business needs.
1-4
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Each book addresses capabilities having direct impact on the performance of a service
provider.
The structure of the ITIL core is in the form of a lifecycle.
The ITIL core is expected to provide structure, stability, and strength to service
management capabilities with durable principles, methods, and tools.
The best practices guidance in ITIL can be adapted for changes used in various business
environments and organizational strategies.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
1-5
The ITIL library is a set of books that describe internationally accepted best practices for
IT Service Management, including these practices:
1-6
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
ITIL promotes a quality approach to achieving business efficiency and effectiveness in the
use of information systems. ITIL best practices are applicable to all IT organizations, no
matter what their size or what technology they use. ITIL is one of the most widely accepted
approaches to IT Service Management in the world.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
1-7
The ITIL Core documents form the Service Lifecycle. Each publication addresses
capabilities that have direct effect on the performance of a service provider. The ITIL core
is expected to provide structure, stability, and strength to Service Management capabilities
with durable principles, methods, and tools.
The ITIL Lifecycle serves to protect investments and provide the necessary basis for
measurement, learning, and improvement.
1-8
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Strategy
Design service
Transition
Test service
Deploy release
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
1-9
Support service
Manage requests
1-10
Identify ROI
Improve services
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
10
The ITIL Qualification Scheme gives credits for each exam taken. Candidates who have
accumulated a sufficient number of credits can achieve the ITIL Expert in IT Service
Management.Foundation Level.
The Foundation level focuses on knowledge and comprehension to provide a good
grounding in the key concept, terminology, and processes of ITIL.
There are two streams in the Intermediate Level. Both assess your ability to analyze and
apply the concepts of ITIL. Candidates can take units from either of the Intermediate
streams to gain credits towards the Expert Level. The two streams are the Intermediate
Lifecycle Stream and the Intermediate Capability Stream.
The Intermediate Lifecycle Stream includes five individual certificates built around the
following books:
Service Strategy
Service Design
Service Transition
Service Operation
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
1-11
The focus of these modules is on the introduction and implementation of the specific
Lifecycle phase in addition to coverage of the principles, processes, and related activities.
The Intermediate Capability Stream includes four individual certificates loosely based
on the V2 Clustered Practitioner qualifications, but broader in scope in line with the
updated V3 content. It focuses on detailed process implementation and management within
the following cluster groupings:
1-12
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Lesson 2: Services
Lesson 2: Services
20 08 IBM Corporation
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
1-13
12
1-14
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Services
IBM Software Group | Tivoli software
Services
Service is a way to deliver value to customers by helping
them obtain goals without their ownership of specific
costs and risks
Deliver value to customers
Facilitate outcomes
Result in an increase in the probability of expected
outcome
13
Services deliver value to customers by giving customers what they want without the
ownership of specific costs and risks.
Services facilitate outcomes by enhancing the performance of associated tasks and
reducing the effect of constraints.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
1-15
Service Management
IBM Software Group | Tivoli software
Service Management
A set of specialized organizational capabilities that take
the form of:
Processes
Functions
Roles
14
1-16
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
20 08 IBM Corporation
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
1-17
Process Owners
IBM Software Group | Tivoli software
Process Owners
Responsible for ensuring that their processes are
performed according to the agreed-upon and documented
process
Must ensure that the processes meet the aims of their
definitions
16
1-18
Defining the Key Performance Indicators (KPIs) to evaluate the effectiveness and
efficiency of the process.
Ensuring all relevant staff have the required training in the process and are aware
of their role in the process.
Interacting with line management to ensure that the process receives the needed
staff resources. Line management and Process Owners have complementary tasks.
They must work together to ensure efficient and effective processes. Often line
management ensures the required training of staff.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Service Owners
IBM Software Group | Tivoli software
Service Owners
The Service Owner is responsible to the customer for the
initiation, transition, and ongoing maintenance and
support of a particular service.
17
Act as primary customer contact for all service-related enquiries and issues.
Ensure that the ongoing service delivery and support meet agreed-upon customer
requirements.
Identify opportunities for service improvements, discuss them with the customer,
and raise the RFC for assessment, if appropriate.
Interact with the appropriate Process Owners throughout the Service Management
Lifecycle.
Solicit required data, statistics, and reports to analyze and to facilitate effective
service monitoring and performance.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
1-19
Lesson 4: Processes
Lesson 4: Processes
20 08 IBM Corporation
1-20
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Processes
IBM Software Group | Tivoli software
Processes
A structured set of activities designed to accomplish a
specific objective
A process takes one or more inputs and turns them into
defined outputs
A process includes all of the roles, responsibilities, tools,
and management controls required to reliably deliver the
outputs
19
Processes should be defined, documented, and controlled. After they are under control, they
can be repeated, and they become manageable.
Processes are closed-loop systems because they have the following characteristics:
It is important to consider the entire process and how one process fits into another.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
1-21
Characteristics of Processes
IBM Software Group | Tivoli software
Characteristics of Processes
Measurable
Specific results
Respond to a specific event or are triggered at specific
times
Deliver its primary results to a customer or stakeholder
20
Processes are measurable and driven by performance. Managers want to measure cost,
quality, and other factors. Practitioners are concerned with duration and productivity.
The reason a process exists is to deliver a specific result. This result must be individually
identifiable and countable. For example, changes can be counted, but it is impossible to
count how many Service Desks were completed.
Every process delivers a primary result to a customer or stakeholder.
A process can be ongoing or iterative, and it should be traceable to a specific trigger.
Functions are often mistaken for processes.
1-22
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
21
The objectives of any IT process should be defined in measurable terms. They should also
be expressed in terms of business benefits and underpinning business strategy and goals.
Service Design should assist each process owner to ensure the following objectives:
All processes integrate with each other to provide end-to-end integration across all
areas.
If the activities of the process occur with a minimum use of resources, the process is
considered efficient. Process analysis, results, and metrics should be incorporated in regular
management reports and process improvements.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
1-23
Data enters the process, is processed, and produces output. The outcome is measured and
reviewed.
A process is always organized around a set of objectives. The main outputs from the process
should be driven by the objectives and should always include process measurements
(metrics), reports, and process improvement.
1-24
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
ITIL Processes
IBM Software Group | Tivoli software
ITIL Processes
Version 3 ITIL books focus on the following items:
Sets of processes
The lifecycle of a service
Working with defined processes is the foundation of ITIL
23
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
1-25
24
Degrees of control over processes can be defined. Then, process measurement and metrics
can be built into the process to control and improve it.
1-26
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Lesson 5: Functions
Lesson 5: Functions
20 08 IBM Corporation
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
1-27
Functions
IBM Software Group | Tivoli software
Functions
General units of organizations
Specialized to perform certain type work
Responsible for specific outcomes
Self-contained
Capabilities
Resources necessary for performance and outcomes
26
Capabilities include work methods that are internal to the functions. Sample functions
include Technical Management and the Service Desk. These functional units facilitate
multiple processes.
Functions have their own body of knowledge, which is accumulated from experience of the
functional organization.
Functions provide structure and stability to organizations.
1-28
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Lesson 6: Roles
Lesson 6: Roles
20 08 IBM Corporation
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
1-29
Roles Defined
IBM Software Group | Tivoli software
Roles
A role refers to a set of connected behaviors or actions
that are performed by a person, team, or group in a
specific context
The scope of their roles, and what triggers them to play
those roles, are defined by the relevant process and
agreed to by their line manager
28
A technical management department can perform the role of Problem Management when
diagnosing the root cause of incidents. This same department could also function in other
roles at different times. For example, they may assess the impact of changes (Change
Management role) or manage the performance of devices under their control (Capacity
Management role).
1-30
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Lesson 7: Risk
Lesson 7: Risk
20 08 IBM Corporation
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
1-31
Risk
IBM Software Group | Tivoli software
Risk
Risk is the uncertainty of outcome, whether positive
opportunity or negative threat
Managing risks requires:
Identification of the risk
Control of the exposure to risk, which can affect the
achievement of the business objectives of an
organization
30
The aim is to support better decision-making through a good understanding of risks and
their likely impact.
1-32
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Phases of Risk
IBM Software Group | Tivoli software
Phases of Risk
The two phases of risk include:
1. Risk Analysis
2. Risk Management
31
Risk Analysis is concerned with gathering information about exposure to risk so that the
organization can make appropriate decisions and manage risk appropriately.
Risk Management involves making the following plans:
Having the right balance of control in place to deal with those risks
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
1-33
1-34
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Review Questions
1.
2.
Risk management
b.
Service management
c.
Process management
d.
Operation management
3.
b.
c.
d.
4.
b.
Specific results
c.
Customers
d.
5.
b.
c.
Service Management
d.
Service Operation
By reducing cost for the customers so they will pay less for the same product
c.
By giving customers what they want without the ownership of specific costs
and risks
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
1-35
d.
6.
By making the products of better quality and testing them more rigorously
7.
b.
Process
c.
Function
d.
Role
8.
b.
Process
c.
Function
d.
Role
Which of the following choices is a set of connected behaviors or actions that are
performed by a person, team, or group in a specific context?
a.Element
1-36
b.
Process
c.
Function
d.
Role
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
1-37
Review Answers
1.
2.
3.
4.
5.
6.
7.
8.
Which of the following choices is a set of connected behaviors or actions that are
performed by a person, team, or group in a specific context?
d. Role
1-38
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Summary
IBM Software Group | Tivoli software
Summary
You should now be able to:
Define and explain the concept of a service
Define and explain the concept of Service Management
Define and distinguish between functions, roles, and
processes
List the characteristics of processes
Explain the process model
Explain the Service Lifecycle
33
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
1-39
1-40
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
20 08 IBM Corporation
2-1
Introduction
In this Unit, you will learn more about Service Strategy.
Objectives
IBM Software Group | Tivoli software
Objectives
Upon completion of this unit, you will be able to:
Explain the purpose of Service Strategy
Explain the two elements of value: utility and warranty
Describe the three types of service providers
Explain how to choose between service provider types
Describe the key principles of Service Strategy
Discuss the main Service Strategy processes and
associated activities
2-2
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
20 08 IBM Corporation
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
2-3
A healthy business model will describe the defined objectives of the business. A clear
strategy for accomplishing the objectives must be clearly stated to the customer. Otherwise,
the customer will not recognize the increase in value. The Service Strategy defines a clear
path to delivering value to the customer.
Customers are looking for ways to strategically improve their business models. They want
solutions that will break through existing performance barriers. They want to increase
performance without an increase in cost. This kind of improvement provides an opportunity
to offer a solution by providing improved products and services.
2-4
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
2-5
2-6
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Service Model
IBM Software Group | Tivoli software
Service Model
A Service Model performs the following tasks:
Codifies the Service Strategy for a market space
Outlines process and functions needed to create value
Describes how service assets create value for a given
portfolio of contracts
Increases effectiveness in Continual Service
Improvement
Purpose of Service Model:
Define the value to be created in the form of the utility
and the warranty provided to customers.
7
Service Agreements specify the terms and conditions under which such interaction occurs
with commitments and expectations on each side. Interaction means demand connects with
the capacity to serve.
Service Transition evaluates the options or paths for improvements and recommends
solutions that are cost-effective and low risk.
Service Models continually evolve, based on external feedback received from customers
and internal feedback from Service Management processes.
Continual Service Improvement (CSI) processes ensure the feedback to the strategy,
design, transition, and operation processes. Improvements can be made to the structure, the
dynamics of a model, or to both.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
2-7
Business Case
IBM Software Group | Tivoli software
Business Case
A business case is a decision support tool and planning
tool that projects the likely consequences of a business
action
The elements of a business case include:
Introduction: Presents business objectives addressed by service
management initiative
Methods and Assumptions: Defines boundaries of business
case, such as time period
Business Impacts: The financial and non-financial business case
results
Risks and Contingencies: The probability that alternative results
will engage
Recommendations: Specific actions recommended
8
2-8
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
2-9
10
After a service provider has a thorough understanding of its service objectives, it is ready
to begin the service lifecycle. The entry points to service strategy are referred to as the Four
Ps. These points identify the different forms a service strategy might take.
A strategic perspective articulates the business philosophy and manner in which services
are provided. CIOs might determine that their businesses most value a certain type of
service provider.
An internal service provider (Type I) restricted to serving one business unit might adopt a
position based on:
2-10
Product knowledge
Customer responsiveness
Value
Cost
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
A service provider who continually offers specific services with deep expertise is
adopting a high-value or high-end service strategy.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
2-11
Service Automation
IBM Software Group | Tivoli software
Automation can have a significant effect on the performance of service assets such as
management, organization, people, process, knowledge, and information.
Service management can benefit from automation in the following areas:
2-12
Service catalog
Optimization
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
20 08 IBM Corporation
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
2-13
Service Providers
IBM Software Group | Tivoli software
Service Providers
Internal Service Provider, Type I
Shared Services Provider, Type II
External Service Provider, Type III
13
2-14
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Duplication and waste occur when Type I providers are replicated within the enterprise.
To take advantage of both economy of scale and economy, Type I providers of similar
characteristics are consolidated into a corporate business function.
Internal Service Providers might include functions such as:
Finance
Administration
Logistics
Human resources
IT
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
2-15
15
2-16
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Shared Service Units (SSUs) can create, grow, and sustain an internal market for their
services and model themselves along the lines of service providers in the open market.
Like corporate business functions, they can use opportunities across the enterprise and
spread their costs and risks across a wider base. However, SSUs have fewer protections in
the areas of strategic value and core competence.
Type II providers benefit from a relatively captive internal market for their services.
However, their customers might still evaluate them in comparison with external service
providers.
Poorly performing Type II providers face the threat of substitution, putting pressure on the
leadership to adopt industry best practices and strive for operational effectiveness.
Industry-leading shared services units have been successfully spun off from their parent
companies as independent businesses competing in the external marketplace.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
2-17
17
2-18
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
The experience of Type III providers is not limited to any one enterprise or market.
The breadth and depth of such experience is often the single-most distinctive source of
value for customers.
The breadth comes from serving multiple types of customers or markets.
The depth comes from serving multiples of the same type.
Security is always an issue in shared services environments. When the Type III provider
also provides services to competitors, security becomes a larger concern.
As a counterbalance, Type III providers might reduce systemic risks by transferring them
to external service providers, who spread those risks across a larger value network.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
2-19
19
2-20
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
20
Examples of transaction costs might include, but are not limited to, the costs of the
following activities:
Defining requirements
Negotiating agreements
Measuring performance
Resolving disputes
Some questions an organization might ask when choosing Service Provider Types:
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
2-21
2-22
How complex is the activity? Is it simple and routine? Is it stable over time with
few changes?
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
2-23
2-24
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
20 08 IBM Corporation
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
2-25
Strategy Generation
IBM Software Group | Tivoli software
Strategy Generation
Use existing opportunities: Customers who are not wellsupported represent opportunities for services to be
offered as solutions.
23
Defining the market and understanding the customer includes the following activities:
For example:
A software vendor might decide to offer software as a service. The vendor combines their
capabilities in software development with new capabilities in service management. The
vendor also makes use of their capabilities in maintaining software applications to bundle
technical support as part of the core service. By adopting a service-oriented approach
supported by service management capabilities, the vendor has transformed itself into a
service business.
This approach has also been adopted by internal software engineering groups who have
changed from being cost centers to being profit centers.
2-26
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
24
Business needs and requirements should be the driving force behind all service solutions
and activities. In addition, Service Strategy must also reflect the strategies and policies of
the service provider organization,
Service Strategy consists of:
Strategies
Policies
The key to any successful Service Strategy is to focus on fully satisfying the customers
needs at a sufficient value to the customer.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
2-27
25
Business outcomes that justify the expense of a service from the customer
perspective of the customer
This problem leads to poor designs, ineffective operation, and lackluster performance in
service contracts. Service improvements are difficult when it is not clear what
improvements are truly required. Customers can understand and appreciate improvements
only within the context of their own business assets, performances, and outcomes. A correct
definition of services takes into account the context in which customers perceive value from
the services.
An outcome-based definition of services ensures that managers plan and implement all
aspects of Service Management. These activities should be completed entirely from the
perspective of what is valuable to the customer. Such an approach ensures that services not
only create value for customers but also capture value for the service provider.
2-28
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Solutions that enhance the performance of the customer assets indirectly support positive
outcomes generated by those assets. Such solutions and propositions hold utility for the
business.
Customers perceive benefits in a continued relationship and trust the provider to increase
value and add possibilities of new customers and market spaces. These benefits justify
further investments in Service Management in terms of capabilities and resources which
have a tendency to reinforce each other. Stakeholders might initially trust the provider with
low-value contracts or noncritical services. Service Management responds by delivering
the performance expected of a strategic asset. The performance is rewarded with contract
renewals, new services, and customers. Together these rewards represent a larger value of
business. To handle this increase in value, Service Management must invest further in
assets such as process, knowledge, people, applications, and infrastructure. Successful
learning and growth aids commitments of higher service levels as Service Management is
conditioned to handle bigger challenges. Over time, this cycle results in higher capability
levels and maturity in Service Management, leading to a higher return on assets for the
service provider.
Unless correctly defined, the cost of service assets spent in support of customers assets
might be difficult to account for and recover. Incorrect cost definition leads to situations
where adequate value is created for the customer, but inadequate value is captured for the
provider.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
2-29
26
2-30
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Strategic planning and review includes examining opportunities for growth within current
customers and services.
The best opportunities for service providers lie in areas where an important customer need
is not satisfied. Service portfolios should be extended to support such areas of opportunity.
Extension typically means that there is a need for services to provide certain levels of utility
and warranty. However, managers should not overlook the costs and risks in such areas.
There are typically strong reasons why certain needs of customers remain unfulfilled.
Breakthrough performance and innovation are usually required to successfully deliver
value in underserved areas of opportunity.
Strategic planning and review includes examining opportunities for growth within current
customers and services. Growth in a market space is dependent upon demonstrated ability
to deliver value and a strong record with existing customers.
Differentiation in market spaces is normally created by the following techniques:
With various combinations of factors, there are many ways to create differentiation. Service
Management leads to differentiation in every supported market space by making decisions
on the following topics:
Service design
Transition
Operation
Improvement
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
2-31
27
Service management as a strategic asset identifies the key relationships and interactions to
have better visibility and control over the systems and processes they operate.
Customers perceive benefits in a continued relationship and trust the provider to increase
value and add possibilities of new customers and market spaces. These benefits justify
further investments in Service Management in terms of capabilities and resources that have
a tendency to reinforce each other. Stakeholders might initially trust the provider with lowvalue contracts or noncritical services.
Service Management responds by delivering the performance expected of a strategic asset.
The performance is rewarded with contract renewals, new services, and customers.
Together these rewards represent a larger value of business. To handle this increase in
value, Service Management must invest further in assets such as process, knowledge,
people, applications, and infrastructure. Successful learning and growth enables
commitments of higher service levels as Service Management is conditioned to handle
bigger challenges. Over time, this cycle results in higher capability levels and maturity in
Service Management, leading to a higher return on assets for the service provider.
Unless properly defined, the cost of service assets spent in support of customers assets can
be difficult to account for and recover. This difficulty leads to situations where adequate
value is created for the customer, but inadequate value is captured for the provider
2-32
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
2-33
28
The capabilities and resources (service assets) of a service provider represent the service
potential available to customers through a set of services. Projects that develop or improve
capabilities and resources increase the service potential.
Implementation of a Configuration Management system (CMS) leads to improved
visibility and control over the productive capacity of service assets. These assets include
networks, storage, and servers. The configuration management system also helps to quickly
restore such capacity in the event of failures or outages. Those assets are used more
efficiently, and service potential is increased because of capability improvements in
Configuration Management.
Through Configuration Management, all service assets should be identified with the name
of the services to which they add service potential. This identification helps decision
makers arrive at decisions related to service improvement and asset management. Clear
relationships make it easier to ascertain the impact of changes, make business cases for
investments in service assets, and identify opportunities for scale of and scope of
economies. The Configuration Management system identifies critical service assets across
the service portfolio for a given customer or market space.
The services offered by a service provider represent the potential to increase the
performance of customer assets. Without this potential, customers cannot justify procuring
the services. Performance potential of services needs to be defined so that management
decisions are rooted in creating value for customers. This practice avoids many problems
of service businesses where value for customers is harder to define and control. Working
2-34
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
backwards from the performance potential of customers ensures that service providers are
always aligned with business needs, regardless of how often those needs change.
The performance potential of services is increased primarily by having the right mix of
services. In addition, it is increased by designing those services to have an impact on the
businesses of the customers.
The productive capacity of service assets is transformed into the productive capacity of
customer assets. An important aspect of delivering value for customers through services is
reducing risks for customers. By deciding to use a service, customers often are seeking to
avoid certain risks and costs. Therefore, the performance potential of services also arises
from removing costs and risks from the businesses of the customers.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
2-35
Strategic Assessment
IBM Software Group | Tivoli software
Strategic Assessment
Analyze External Factors
Establish Objectives
Analyze Internal Factors
29
Established service providers frequently do not understand their unique differentiators. The
differentiation can come in many forms:
2-36
Barriers to entry, such as the knowledge of the organization regarding the business
of the customer or the broadness of service offerings
Product knowledge
Regulatory compliance
Provisioning speeds
Technical capabilities
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Setting Objectives
IBM Software Group | Tivoli software
Setting Objectives
Objectives represent the results expected from pursuing
strategies.
Strategies represent the actions to be taken to
accomplish objectives.
Clear objectives provide for consistent decision making,
minimizing any future conflicts. They set forth priorities
and serve as standards.
30
Determine how best to satisfy the important but under served outcomes
From this understanding, the organization can create metrics to measure how well a service
is performing. These data sources are the primary means by which a service provider
creates value.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
2-37
customer needs
business trends
competition
regulatory environment
suppliers
Standards
technologies
31
Identifying critical success factors for a market space is an essential aspect of strategic
planning and development. In each market space, service providers require a core set of
assets in order to support a Customer Portfolio using a Service Portfolio. For example, in
the market space for high-volume, real-time data processing, such as those required by the
financial services industry, service providers must have:
Secure facilities
Without these assets, such service units cannot provide the utility and warranty demanded
by customers in that market space.
The dynamic nature of markets, business strategies, and organizations requires critical
success factors be reviewed periodically. In addition, significant events such as changes to
customer portfolios, expansion into new market spaces, changes in the regulatory
environment, and disruptive technologies need to be monitored. For example, the health
care industry has new legislation on the portability and privacy of patient data. This change
alters the critical success factors for all service providers operating in health care market
spaces.
2-38
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
32
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
2-39
33
2-40
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
34
Service Owner
The Service Owner of each service record contains the role or function currently
accountable for the service, but not for the Service Portfolio Management process.
Service Sponsor
The Service Sponsor is the person or board responsible for budgets and costs related to a
specific service.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
2-41
Requirements Requester
The Requirements Requester is the person or group of persons expressing new demands
and requirements to be fulfilled by the IT service provider.
2-42
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
20 08 IBM Corporation
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
2-43
36
2-44
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
The Service Portfolio represents all the resources presently engaged or being released in
various phases of the Service Lifecycle. Entry, progress, and exit are approved only with
approved funding and a financial plan for recovering costs or showing profit, as necessary.
The portfolio should have the right mix of services in the pipeline and catalog to secure the
financial viability of the service provider. The Service Catalog is the only part of the
Service Portfolio that recovers costs or earns profits. The Service Portfolio represents the
commitments and investments made by a service provider across all customers and market
spaces. It represents present contractual commitments, new service development, and
ongoing service improvement programs initiated by Continual Service Improvement.
Service Portfolio Management (SPM) is about maximizing value while managing risks and
costs. The value realization is derived from better service delivery and better customer
experiences. SPM begins by documenting the standardized services of the organization and
therefore has strong links to Service Level Management, particularly the Service Catalog.
Portfolio management helps managers prioritize investments and improve the allocation of
resources. Portfolios instill a certain financial discipline necessary to avoid making
investments that will not yield value. Service portfolios represent the ability and readiness
of a service provider to serve customers and market spaces.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
2-45
Through SPM, managers are better able to understand quality requirements and related
delivery costs. They can then seek to reduce costs by alternative means while maintaining
service quality. The SPM journey begins by documenting the standardized services of the
organization and therefore has strong links to Service Level Management, particularly the
Service Catalog.
2-46
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
The purpose of Service Portfolio Management is to create, manage and improve a service
portfolio containing a detailed design package for each IT service.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
2-47
39
2-48
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
40
Define
Collect information from all existing services as well as every proposed service. Every
proposed service would include those in a conceptual phase. For example, all services the
organization would provide if it had unlimited resources, capabilities and time. The purpose
of this exercise is to understand the opportunity costs of the existing portfolio. A service
provider needs to understand its limitations. In this way, it is better able to assess if it should
keep doing what it is doing or reallocate its resources and capabilities.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
2-49
Analyze
In this phase, the intent of the strategy is designed. During this activity, the following
questions should be answered:
What capabilities and resources are required for the organization to achieve those
services?
The answers to these questions guide the analysis and the desired outcomes of SPM. The
ability to satisfactorily answer these questions requires the involvement of senior leaders
and subject matter experts.
Approve
In this phase, deliberate approvals or disapprovals of the proposed portfolio take place. In
addition, the corresponding authorization for new services and resources occurs in this
phase.
Charter
In this phase decisions are communicated, resources are allocated, and services are
chartered. This phase should begin with a list of decisions and action items. These are to be
communicated to the organization clearly and unambiguously. These decisions should be
correlated to budgetary decisions and financial plans. Budget allocations should enforce the
allocation of resources.
2-50
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
41
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
2-51
Service Agent
The Service Agent of each service record contains the role or function responsible for the
current activity or task within the process of Service Portfolio Management. The Service
agent can be changed through a functional escalation, if allowed. This following role is
assigned for each new instance of the Service Portfolio Management process and usually
exist for the entire lifetime of one process instance. Changes in the assignment of this role
is possible. However, the change applies only to a specific process instance, and not to the
process in general.
2-52
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
20 08 IBM Corporation
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
2-53
Financial Management
IBM Software Group | Tivoli software
Financial Management
Financial Management as a strategic tool is equally
applicable to all three service provider types
Financial Management consists of the following benefits:
Enhanced decision making
Speed of change
Service Portfolio Management
Financial compliance and control
Operational control
Value capture and creation
43
Financial Management consists of the function and processes responsible for managing an
IT service providers budgeting, accounting, and charging requirements.
Internal service providers are increasingly asked to operate with the same levels of financial
visibility and accountability as their business unit and external counterparts. Moreover,
technology and innovation have become the core revenue-generating capabilities of many
companies.
Financial Management quantifies, in financial terms, the value of IT Services and the assets
underlying the provisioning of services. In addition, Financial Management provides the
qualification of operational forecasting. A significant portion of Financial Management is
working with IT and the business to identify, document, and agree on the value of the
services being received. Financial Management also contributes to service demand
modeling and management.
2-54
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
44
Speed of change
Operational control
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
2-55
45
Direct costs are those that are directly attributable to a specific service. Indirect
costs are those that are shared among multiple services. These costs should be
analyzed to identify line items that should be maintained. The data available and
the level of effort required should be considered in this decision.
Labor costs are another key expenditure requiring consideration. Analyzing labor
costs can be difficult because of the complexity and accuracy of time-tracking
systems. Sometimes tracking labor resources assigned across services is not
available. In this case, rules and assumptions must be created for allocation of
these costs. In its simplest form, organizing personnel costs across financial
centers based on a service orientation is a viable method for aligning personnel
costs to services.
Variable cost elements include expenditures that are not fixed. They vary
according to factors such as the number of users or the number of running
instances.
Translation from cost account data to service value is only possible after costs are attributed
to services. Pricing the perceived value portion of a service involves analysis of historical
costs, perceived value-added, and planned demand variances.
2-56
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
46
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
2-57
Plan
IBM Software Group | Tivoli software
Plan
Address critical questions about the business and IT
culture
Assess the corporate culture and regulatory and
compliance considerations
Identify all internal and external contacts that provide or
receive IT financial information
Clarify IT and business expectations such as:
Deliverables
Chargeback system
Service Catalog implementation and pricing
47
Plan (Continued)
Determine systems that require Financial Management
data
Determine the funding or operating model to be used
Assign responsibilities for the deliverables
Outline activities to be performed
Prepare the organization chart based on activities, size of
data to be, and tools
Prepare policy and operating procedures list
48
2-58
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Analyze
IBM Software Group | Tivoli software
Analyze
Gather details around the planning and funding of identified items
Make certain that all processes and information required to produce
deliverables are accounted for
Become familiar with current expenses in preparation for creating
new valuation and funding documents
After completing an accounting of all IT expenditures, perform service
valuation, including:
Producing reports that provide for the first element of valuation pricing of
service assets
Adding that value to each service to calculate the total price for an IT
service
Analyzing and calculating the value-add price
Make certain that all processes and information required to produce deliverables
are accounted for.
IT or the business might hold expectations regarding deliverables. Therefore,
analyze backward to make certain all information required to produce the
expected deliverables are accounted for. This process is part of Financial
Management responsibilities.
Become familiar with current expenses in preparation for creating new valuation
and funding documents.
There might be issues that become apparent after reviewing expenditures. For
example, it might become evident that not all IT payments are collected into one
financial center. However, in order to report and account for services costs, IT
expenditures must be centralized.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
2-59
2-60
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Design
IBM Software Group | Tivoli software
Design
Processes
Valuation Models
Accounting processes
Chargeback methods
Procedures
Roles and responsibilities
50
The design phase creates the outputs that are expected from a Financial Management
implementation. Working with key contributors and service economics supporters is
essential during this phase. Design is completed using data inputs and translations, reports,
methodologies and models.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
2-61
Implement
IBM Software Group | Tivoli software
Implement
Activation of planned processes
Input initially comes from corporate financial systems and
Change Management processes
51
2-62
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Measure
IBM Software Group | Tivoli software
Measure
Measures of success should to be provided on financial
trends within funding, valuing and accounting
Audit for any credibility gap between the value being
received and price being paid
Perform regular audits
52
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
2-63
53
Service Valuation
Financial Management collects data inputs from across the enterprise. It uses this data to
assist in generating and disseminating information as an output. This information feeds
critical decisions and activities such as service valuation. Service Valuation quantifies, in
financial terms, the funding sought by the business and IT for services delivered, based on
the agreed value of those services. Financial Management calculates and assigns a cost
value to a service or service component. Then, they can be disseminated across the
enterprise once the business customer and IT identify what services are actually desired.
Service Valuation focuses on two key concepts: Provisioning Value and Service Value
Potential. Provisioning Value is the actual underlying cost to IT related to provisioning a
service. This cost includes both tangible and intangible elements. Input comes from
financial systems, and consists of payment for actual resources consumed by IT in the
provisioning of a service. Service Value Potential is the value added component based on
customer perceptions of what it could achieve using its own assets against what the service
organization can provide.
2-64
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Demand Modeling
Through the application of Financial Management, the Service Catalog is able to provide
customers with the capability to regulate their demand and prepare budgets. Demand
modeling uses service oriented financial information with factors of demand and supply in
order to model anticipated usage by the business, and provisioning requirements by IT. This
is for identifying funding requirements, variations and drivers of those variations, and to
assist in the management of service demand. In this context, inputs for managing service
demand include pricing and incentive adjustments that are intended to alter customer
consumption patterns.
Planning Confidence
Financial Management tries to ensure that the delivery and consumption of services
receives appropriate funding. Financial Management Planning focuses on demand and
supply variances resulting from business strategy, capacity inputs and forecasting. It does
not focus on individual line item expenditures or business cost accounts. As with planning
for any other business organization, input should be collected from all areas of the IT
organization and the business. The financial requirements act as inputs to critical business
decision making.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
2-65
Accounting
Financial Management works with corporate financial systems and service management.
This type of service oriented accounting provides far greater detail regarding service
provisioning and consumption. In addition, it results in generation of data that feeds
directly into the planning process. The functions and accounting characteristics that occur
include:
Cost types: The higher level expenses categories such as hardware, software,
labor, and administration.
Cost classifications: The classifications within services that designate the end
purpose of the cost.
Direct costs are charged directly to a service since it is the only consumer of
the expense.
Indirect or shared costs are allocated across multiple services since each
service can consume a portion of the expense.
Cost units: This is the identified unit of consumption that is accounted for a
particular service or service asset.
Compliance
Compliance relates to the ability to demonstrate that proper and consistent accounting
methods and practices are being employed. This relates to areas such as financial asset
valuation, capitalization practices, revenue recognition, access and security controls.
2-66
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Delivery mechanisms
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
2-67
54
Financial Manager
The Financial Manager is responsible for managing an IT service providers budgeting,
accounting and charging requirements.
IT Financial Administrator
The IT Financial Administrator is responsible for:
2-68
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
20 08 IBM Corporation
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
2-69
Demand Management
IBM Software Group | Tivoli software
Demand Management
Essential that Demand Management techniques be used
Demand Management includes techniques such as:
Off-peak pricing
Volume discounts
Differentiated service levels
56
2-70
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
57
Business processes are the primary source of demand for services. Patterns of business
activity (PBA) influence the demand patterns seen by the service providers. It is very
important to study the business activity of the customer to identify, analyze and codify such
patterns. This will provide sufficient basis for Capacity Management. Examine the business
activity and plans of the customer in terms of the demand for supporting services.
Business activities drive demand for services. Customer assets such as People, Processes,
and Applications generate patterns of business activity (PBA). Since PBA generate
revenue, income and costs they account for a large proportion of business outcomes.
Patterns of business activity (PBA) are identified, codified, and shared across process for
clarity and completeness of detail.
One or more attributes such as frequency, volume, location and duration describe business
activity. They are associated with requirements such as security, privacy and latency or
tolerance for delays. This profile of business activity can change over time with changes
and improvements in business processes, people, organization, applications and
infrastructure. PBA are placed under change control.
Each PBA has to be substantially different from another PBA in order to be coded with a
unique reference. Codifying patterns helps multidimensional analysis, using criteria such
as likeness and nearness. This provides efficiency and robustness in developing a catalog
patterns with simplification and standardization. This, in turn, reduces the number of
patterns, makes analysis easier, and avoids complicated solutions.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
2-71
58
2-72
Off-peak pricing
Volume discounts
Predicting demand for services in the service catalog that support the process
Predicting demand for underlying service assets that support those services
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
User profiles (UP) are based on roles and responsibilities within organizations for people,
and functions and operations for processes and applications. Business processes and
applications are treated as users in many business contexts. Many processes are not actively
executed or controlled by staff or personnel.
Process automation allows for processes to consume services on their own. Processes and
applications can have user profiles.
You construct user profiles using one or more predefined PBAs UPs represent patterns that
are persistent and correlated.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
2-73
60
Some of the benefits for analyzing PBAs are in the form of inputs to service management
functions and processes such as:
2-74
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
2-75
Review Questions
1.
2.
b.
Determining how to carry out the activities and processes required to deliver
services
c.
d.
Which of the following activities are included in defining the market and
understanding the customer?
a.Service strategies are developed for services offered.
3.
b.
c.
d.
A software vendor decides to offer software as a service. The vendor combines the
capabilities in software development with new capabilities in service
management. The vendor also uses of the capabilities in maintaining software
applications to bundle technical support as part of the core service. By adopting a
service-oriented approach supported by service management capabilities, the
vendor has transformed into a service business. Of which of the following Service
Strategies is this situation an example?
a.Developing Service Offering
4.
b.
c.
d.
2-76
b.
c.
d.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
5.
Which is the only part of the Service Portfolio that recovers costs or earns profits?
a.Service Catalog
6.
b.
Service Pipeline
c.
Customers
d.
Service Concepts
Which of the following choices represents all the resources presently engaged or
being released in various phases of the Service Lifecycle?
a.Service Catalog
7.
b.
Service Operation
c.
Service Transition
d.
Service Portfolio
Which of the following choices is the virtual projection of the actual and present
capabilities of the service provider?
a.Service Catalog
8.
b.
Service Operation
c.
Service Transition
d.
Service Portfolio
Which of the following choices is not true about the Service Catalog?
a.It contains items that can be configured.
9.
b.
It is invisible to customers.
c.
d.
c.
d.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
2-77
Review Answers
1.
2.
Which of the following activities are included in defining the market and
understanding the customer?
d. All of the above
3.
A software vendor decides to offer software as a service. The vendor combines the
capabilities in software development with new capabilities in service
management. The vendor also uses of the capabilities in maintaining software
applications to bundle technical support as part of the core service. By adopting a
service-oriented approach supported by service management capabilities, the
vendor has transformed into a service business. Of which of the following Service
Strategies is this situation an example?
b. Defining the market
4.
5.
Which is the only part of the Service Portfolio that recovers costs or earns profits?
a. Service Catalog
6.
Which of the following choices represents all the resources presently engaged or
being released in various phases of the Service Lifecycle?
d. Service Portfolio
7.
Which of the following choices is the virtual projection of the actual and present
capabilities of the service provider?
a. Service Catalog
8.
Which of the following choices is not true about the Service Catalog?
b. It is invisible to customers.
9.
2-78
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Summary
IBM Software Group | Tivoli software
Summary
You should now be able to:
Explain the purpose of Service Strategy
Explain the two elements of value: utility and warranty
Describe the three types of service providers
Explain how to choose between service provider types
Describe the key principles of Service Strategy
Discuss the main Service Strategy processes and
associated activities
62
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
2-79
2-80
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
20 08 IBM Corporation
3-1
Introduction
In this unit, you will learn about Service Design.
Objectives
IBM Software Group | Tivoli software
Objectives
Upon completion of this unit, you will be able to:
Explain the key principles and concepts related to
Service Design
Discuss Service Design processes and associated
activities
Describe the Service Design roles
3-2
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
20 08 IBM Corporation
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
3-3
Design and development of a new application should not be done in isolation. It should
consider the impact on the following elements:
Overall service
Architectures
Technology
Such consideration ensures that the functional elements are addressed by the design. In
addition, all of the management and operational requirements will be addressed as a
fundamental part of the design. They will not be added as an afterthought.
When any of the individual elements of design are changed or amended, all other aspects
are considered.
3-4
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
The Service Design stage starts with a set of new or changed business requirements and
ends with the development of a service solution. This solution is designed to meet the
documented needs of the business.
This developed solution with its Service Design Pack (SDP) is then passed to Service
Transition. Service Transition will evaluate, build, test, and deploy the new or changed
service. When these transition activities are completed, control of the new or changed
service is transferred to the Service Operation stage of the service lifecycle.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
3-5
Service Design
The Business: Separate businesses or business clients with their individual structures and
processes.
SLA: A Service Level Agreement (SLA) is a formal negotiated agreement between
customers and their service provider, or between service providers. It records the common
understanding about services, priorities, responsibilities, and guarantee, with the main
purpose to agree on the level of service.
IT Services: Services rendered for computer-based information systems.
Support Teams: Provide support for hardware, software, and employees. This support
might include supporting local machines and servers.
Service Improvement: Aligns and realigns IT services to changing business needs. This
alignment is accomplished by identifying and implementing improvements to IT services.
At the same time, it strives to make processes more effective and cost efficient.
3-6
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Service Strategy: Design and develop Service Management as a strategic asset. It provides
a wider range of solutions to the problem of creating, maintaining, and increasing value.
Service Transition: Sets customer expectations on how the performance and use of new or
changed services can be used to promote business change. In addition, it reduces known
errors and minimizes risks from transitioning new or changed services into production.
Service Operation: Coordinates the activities and processes required to deliver, support,
and manage services at agreed upon levels to business users and customers.
Service Portfolio: Identifies the agreed-upon scope of service
SLM: Service Level Management (SLM) ensures an agreed-upon level of IT service is
provided for all current IT services. In addition, it makes certain that future services are
delivered to agreed-upon targets.
SCM: Service Continuity Management (SCM) is the assessment of business impact and
risk and the provision of resilience, failover, and recovery mechanisms.
Suppliers: Typically external vendors who provide services to the Service Provider.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
3-7
Many designs, plans, and projects fail because of a lack of preparation and management.
3-8
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
The Service Design Package should be produced during the design stage for each new
service, major change to a service, or removal of a service.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
3-9
Contents of SDP
IBM Software Group | Tivoli software
Contents of SDP
Business Requirements
Service Functional Requirements
Service Level Requirements
Organizational Readiness Assessment
Service Lifecycle Plan
3-10
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
10
Service Design can not be successful unless the roles and responsibilities for each of the
activities are clearly defined. If roles and responsibilities are not clearly defined, the
decision-making process falls apart. One tool that is useful to facilitate clear decision
making processes is the RACI model.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
3-11
RACI-VS
IBM Software Group | Tivoli software
RACI-VS
Verifies: Person or group who confirms the accurate
completion of acceptance criteria
Signs Off: Person who finally approves and authorizes
before product release
11
Some organizations use an expanded version of RACI, called RACI-VS. The VS stands for:
Verifies: the person or group that confirms the accurate completion of acceptance criteria
Signs Off: The person with final approval and authorization before product release.
Some organizations use a RASCI model in which the S signifies Supportive. The supportive
role is available when additional resources are necessary to complete the task.
RACI and other decision-making models and tools are important because they can help to
avoid conflicts. In addition, they can save time because roles are defined before the decision
needs to be made.
The roles of the RACI model are placed on a chart with activities, roles, and codes
identified. The following steps should be used to build a RACI chart:
3-12
Identify any gaps or overlaps for example, where there are two Vs or no Vs
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
3-13
Technology Considerations
IBM Software Group | Tivoli software
12
When choosing tools for Service Management, it is important to remember that the tool
should support the process. Often times, organizations try to change their processes to fit
the tool. Although it might be necessary to make a few changes in design, the tool should
support the defined process.
Some factors that should be considered when evaluating Service Management tools are:
3-14
Integration of components from various vendors, and the future need to apply new
components
Usability
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
3-15
20 08 IBM Corporation
3-16
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
14
Service Catalog Management (SCM) process ensures that a Service Catalog is produced
and maintained. The catalog contains accurate information about all operational services
and those being prepared to be run. SCM provides a single source of consistent information
on all of the agreed-upon services. It also ensures that the catalog is widely available to
those approved to access it.
The catalog should contain:
Levels and quality of service the customer can expect for each service
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
3-17
The Portfolio should contain all of the future requirements for services. The Service
Portfolio is produced as part of Service Strategy and should include participation by those
involved in Service Design, Transition, Operation, and Improvement. After a service is
chartered, being developed for use by customers, Service Design produces the
specifications for the service. At this point the service should be added to the Service
Catalog.
The SCM process produces and maintains the Service Catalog to ensure:
A record of the status of all operational services or services being moved to the
live environment
3-18
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
15
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
3-19
16
3-20
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
The Service Catalog Management (SCM) process ensures that a Service Catalog is
produced and maintained. The catalog contains accurate information about all operational
services and those being prepared to be run. SCM provides a single source of consistent
information on all of the agreed-upon services. It also ensures that the catalog is widely
available to those approved to access it.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
3-21
18
Business strategy
IT strategy
Business plans
Financial plans
Information on their current and future requirements from the Service Portfolio
The Business Impact Analysis provides information on the impact, priority, and risk
associated with each service or changes to service requirements.
The business requirements provide details of any agreed, new, or changed business
requirements from the Service Portfolio.
3-22
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
19
Many sources of information are relevant to the Service Catalog Management (SCM)
process. These should include:
Business information from the business and IT strategy, plans, and financial plans
of the organization
Business impact analysis providing information about the impact, priority, and
risk associated with each service or change to service requirements
Triggers for the SCM process, which are changes in the business requirements
and services. One of the main triggers is a Request For Change (RFC). The
Change Management process includes new services, changes to existing services,
and services being retired.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
3-23
Updates to the Service Portfolio which should contain the current status of all
services and requirements for services
3-24
Details of every active service provided by the service provider or service being
moved into the production environment
Interface dependencies
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
20
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
3-25
21
3-26
Poor acceptance and usage of the Service Catalog and Service Portfolio
Inaccuracy of service information received from the business, IT and the Service
Portfolio
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Poor access to and support of appropriate and accurate CMS and SKMS
Information that is either too detailed too high a level to maintain or be of any
value
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
3-27
22
The main role of the Service Catalog Management Process is Service Catalog Manager.
The Service Catalog Manager has responsibility for producing and maintaining the Service
Catalog.
3-28
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
20 08 IBM Corporation
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
3-29
SLM is the name given to the processes of planning, coordinating, drafting, agreeing upon,
monitoring, and reporting of Service Level Agreements (SLAs). It is the ongoing review of
service achievements to ensure that the required and cost-justifiable service quality is
maintained and gradually improved. SLM is concerned with:
Ensuring that new or changed services and SLAs are developed to match the
business needs and expectations
Service Level Agreements (SLAs) provide the basis for managing the relationship between
the service provider and the customer. SLM provides that central point of focus for a group
of customers, business units or lines of business.
SLM is also responsible for ensuring that all targets and measures agreed upon in SLAs
with the business have the following support:
3-30
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
External partners
External suppliers
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
3-31
25
3-32
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
3-33
3-34
Service-based SLA: This is an agreement that covers one service, for all the
customers of that service
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Corporate level: Covering all the generic SLM issues appropriate to every
customer throughout the organization
Customer level: Covering all SLM issues relevant to the particular customer
group or business unit, regardless of the service being used
Service level: Covering all SLM issues relevant to the specific service, in
relation to a specific customer group
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
3-35
28
An OLA should contain targets that underpin those within an SLA to ensure that targets will
not be breached by failure of the supporting activity.
Formal contracts are appropriate for external supply arrangements that significantly
contribute to the business. Contracts provide binding legal commitments between customer
and supplier. Contracts cover the obligations each organization has to the other from the
first day of the contract. Often contractual obligations extend beyond the end of the
contract. A contract is used as the basis for external supplier agreements where an
enforceable commitment is required. High-value relationships, strategic relationships, or
both are underpinned by formal contracts. The formality and binding nature of a contract
are not at odds with the culture of a partnership agreement, but rather form the basis on
which trust in the relationship might be founded.
3-36
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Underpinning Contracts
IBM Software Group | Tivoli software
Underpinning Contracts
Provide binding legal commitments between customer
and supplier
Cover the obligations each organization has to the other
from the first day of the contract
Likely to be structured with the following sections:
Main body containing commercial and legal clauses
Elements of a service agreement
Other related documents, such as schedules
29
Security requirements
Disclosure agreements
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
3-37
30
The SLM process works to ensure that all operational services and their performance are
measured in a consistent, professional manner throughout the IT organization. In addition,
it works to guarantee that the services and the reports produced meet the needs of the
business and the customers.
3-38
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
SLM Objectives
IBM Software Group | Tivoli software
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
3-39
SLM Benefits
IBM Software Group | Tivoli software
32
Service Level Management (SLM) provides a consistent interface to the business for all
service-related issues. It provides the business with the agreed-upon service targets and the
required management information to ensure that those targets have been met. When targets
are breached, SLM should provide feedback on the cause of the breach. In addition, it
should give details of the actions taken to prevent the breach from recurring. Therefore,
SLM provides a reliable communication channel and a trusted relationship with the
appropriate customers and business representatives.
3-40
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
SLM Concerns
IBM Software Group | Tivoli software
SLM Concerns
Ensuring that current services and SLAs are managed
Ensuring that new requirements are captured
Ensuring that new or changed services and SLAs are
developed to match the business needs and expectations
33
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
3-41
Review meetings must be held on a regular basis with customers to review the service
achievement in the last period and to preview any issues for the coming period. It is normal
to hold such meetings monthly or, as a minimum, quarterly.
Customers and appropriate IT managers should receive reports a few days before service
level reviews. These reports will help facilitate the resolution of any queries or
disagreements before the review meeting. These reports should incorporate details of
performance against all SLA targets and any actions being undertaken to improve service
quality.
The report can include a SLA Monitoring (SLAM) chart at the front to provide an overview
of how achievements have measured up against targets. These are most effective if color
coded red, amber, and green (RAG).
These service reports should detail current performance against targets and historic
information on past performance and trends. Therefore, the impact of improvement actions
can be measured and predicted.
The key activities within the SLM process should include:
3-42
Determine, negotiate, document, and agree upon requirements for new or changed
services in SLRs
Manage and review the requirements throughout the Service Lifecycle into SLAs
for operational services
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Review and revise SLAs, service scope OLAs, contracts, and any other
underpinning agreements
Develop and document contacts and relationships with the business, customers,
and stakeholders
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
3-43
35
Many sources of information are relevant to the Service Level Management process. These
should also include:
3-44
Business Impact Analysis that providing information about the impact, priority,
risk, and number of users associated with each service
Advice, information, and input from any of the other processes (such as
Incident Management, Capacity Management, and Availability Management)
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Service Reports: Reports that provide details of the service levels achieved in
relation to the targets contained within SLAs. These reports should contain details
of all aspects of the service and its delivery, including:
Major events
Changes planned
Customer feedback
Improvement plans
Activities
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
3-45
3-46
Service Quality Plan: Plan that encompasses documenting and planning the
overall improvement of service quality.
Service Level Agreements (SLAs): Set of targets and responsibilities that should
be documented and agreed to within an SLA for each operational service.
Reports on OLAs: Reports based on the service levels promised in the operating
level agreement and underpinning contracts.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
37
Key Performance Indicators (KPIs) and metrics can be used to judge the efficiency and
effectiveness of the SLM activities and the progress of the SIP. These metrics should be
developed from the service, customer, and business perspective and should cover both
subjective and objective measurements.
Objective measurements include the following items:
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
3-47
difficulties and restore service quality. SIP initiatives might also focus on such issues as
user training, service and system testing, and documentation. In these cases, the relevant
people need to be involved and adequate feedback given to make improvements for the
future. At any time, a number of separate initiatives that form part of the SIP might be
running in parallel to address difficulties.
If an organization is outsourcing its Service Delivery to an external vendor, the issue of
service improvement should be discussed at the outset. In addition, it should be covered and
budgeted for in the contract. Otherwise, the supplier has no incentive during the lifetime of
the contract to improve service targets. Incentive is especially lacking if contractual
obligations are already being met and additional expenditure is needed to make the
improvements.
3-48
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
SLM Challenges
Serviceability: Ensure that the Service Provider can
actually meet the terms of the SLAs
Utility: Ensure the requirements presented actually
represent the customer needs
Identifying suitable customer representatives with whom
to negotiate who are genuinely able to represent the
views of the customer community
Existing service issues interfere with establishing the
longer term requirements
Staffing at different levels within the customer community
may have different objectives and perceptions
38
One challenge faced by SLM is that of identifying suitable customer representatives with
whom to negotiate. Who owns the service? In some cases, this answer might be obvious. A
single customer manager might be willing to act as the signatory to the agreement. In other
cases, it might require negotiating or cajoling to find a representative volunteer. Volunteers
often want to express their personal views rather than represent a consensus. It might be
necessary for all customers to sign the agreement.
Sometimes customer representatives can genuinely represent the views of the customer
community. Perhaps they frequently meet with a wide selection of customers. This situation
is ideal. Unfortunately, often representatives are from the head office and seldom meet
service customers. In the worst case, SLM might have to perform their own program of
discussions and meetings with customers to ensure that true requirements are identified.
An example of differing needs of an organization:
Regarding negotiating the current and support hours for a large service, an
organization found a discrepancy. This discrepancy was in the required time of
usage between Head Office and the customers of a field office. Head Office (with
a limited user population) wanted service hours covering 8:00 a.m. to 6:00 p.m.,
whereas the field office (with at least 20 times the user population) stated that
starting an hour earlier would be better. However, all offices closed to the public
by 4:00 p.m. at the latest, and would not require a service much after 4:00 p.m.
Head Office was given preference, and so the 8:00 a.m. to 6:00 p.m. hours of
operation were set. The service was put into use and monitored. It was found that
Copyright IBM Corp. 2009
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
3-49
service extensions were typically requested by the field office to cover the extra
hour in the morning. Actual usage figures showed that the service was not used
after 5:00 p.m., except on very rare occasions. The Service Level Manager was
blamed by the IT staff for having to cover a late shift. In addition, the customer
representative blamed the Service Level Manager for charging for an unused
service that included staff and running costs.
Care should be taken when opening discussions on service levels for the first time. It is
likely that current issues (the failure that occurred yesterday) or long-standing grievances
(that old printer that the company has been trying to get replaced for ages) are likely to be
aired at the outset. Important though these might be, they must not be permitted to interfere
with establishing the longer-term requirements. However, that you might have to address
any issues raised at the outset before you gain the credibility to progress further.
If there has been no previous experience of SLM, then start with a draft SLA. A decision
should be made regarding which service or customers are to be used for the draft. It is
helpful if the selected customer is enthusiastic and wants to participate, perhaps because
they are anxious to see improvements in service quality. The results of an initial customer
perception survey might give pointers to a suitable initial draft SLA.
One difficulty sometimes encountered is that staff at different levels within the customer
community might have different objectives and perceptions. For example, a senior manager
might rarely use a service. The manager might be more interested in issues such as value
for money and output. However, a junior staff member staff might use the service
throughout the day and might be more interested in issues such as responsiveness, usability,
and reliability. It is important that all of the appropriate and relevant customer requirements,
at all levels, are identified and incorporated in SLAs.
The Service Design Package is passed from Service Design to Service Transition. The SDP
details all aspects and requirements of the service. These details are provided through all of
the subsequent stages of the lifecycle of the service.
3-50
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
The main role of the SLM Process is that of the Service Level Manager. The Service Level
Manager ensures that the aims of Service Level Management are met.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
3-51
20 08 IBM Corporation
3-52
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Capacity Management
IBM Software Group | Tivoli software
Capacity Management
Process that extends across the Service Lifecycle
Supported initially in Service Strategy where decisions
and analysis of business requirements customer
outcomes influence the development of:
Patterns of business activity (PBA)
Levels of service (LOS)
Service level packages (SLPs)
41
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
3-53
42
To ensure that capacity is matched to the current and future agreed-upon needs of
the business in a timely manner
3-54
The current business operation and its requirements, through the patterns of
business activity
The future business plans and requirements using the Service Portfolio
The service targets and the current IT service operation though SLAs and
Standard Operating Procedures
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
3-55
43
3-56
Create and maintain a valid Capacity Plan reflecting the current and future needs
of the business
Give guidance to all other areas of the business and IT on capacity and
performance-related issues
Assess the impact of changes on performance and capacity of all services and
resources
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
44
Capacity Management ensures that IT resources are appropriately planned and scheduled.
Therefore, the service organization can provide a consistent level of service that is matched
to the current and future needs of the business. These needs are agreed and documented
within SLAs and OLAs.
In conjunction with the business and their plans, Capacity Management provides a
Capacity Plan. This plan outlines the IT resources and funding needed to support the
business plan and a cost justification of that expenditure.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
3-57
45
Capacity Management contains activities that are both proactive and reactive. The
proactive activities include:
3-58
Preventing performance issues by taking the necessary actions before they occur
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Using trend information to estimate future requirements, and plan for upgrades
and enhancements
Ensuring that upgrades are budgeted, planned and implemented before SLAs and
service targets or performance issues
Responding to all events that involve capacity, and instigating corrective action
All of the information accumulated during these activities should be stored in the Capacity
Management Information System (CMIS). process. Information contained within the
CMIS is stored and analyzed by all the sub-processes of Capacity Management. It is a
repository that holds a number of different types of data, including business, service,
resource or utilization, and financial data, from all areas of technology. The CMIS is
unlikely to be a single database, and probably exists in several physical locations. The data
stored in the CMIS include the following types:
Business data
Service data
Financial data
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
3-59
46
Baselining
The first stage in modeling is to create a baseline model that accurately reflects
performance. When this baseline model has been created, predictive modeling can be done.
If the baseline model is accurate, then the accuracy of the result of the potential failures and
changes can be trusted. Effective Capacity Management, together with modeling
techniques, facilitates Capacity Management to answer questions about what could happen
in various circumstances. For example: What if the throughput of Service A doubles?
Trend Analysis
Trend analysis can be done on the resource utilization and service performance information
that has been collected by the Capacity Management process. Typically, trend analysis only
provides estimates of future resource utilization information.
3-60
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Analytical Modeling
Analytical models are representations of the behavior of computer systems using
mathematical techniques. The technique of analytical modeling requires less time and
effort than simulation modeling, but typically it gives less accurate results.
Simulation Modeling
Simulation involves the modeling of discrete events. An example of this is, transaction
arrival rates against a given hardware configuration. This type of modeling can be very
accurate in sizing new applications or predicting the effects of changes on existing
application. However, it can also be very time-consuming and costly.
Application Sizing
The main objective of application sizing is to estimate the resource requirements to support
a proposed change or new service. This estimate will ensure that it meets its required
service levels. To achieve this goal, application sizing has to be an integral part of the
Service Lifecycle.
Application sizing has a finite life span. It is initiated at the design stage for a new service,
or when there is a major change to an existing service, and is completed when the
application is accepted into the live operational environment. Sizing activities should
include all areas of technology related to the applications, and not just the applications
themselves. These areas should include the infrastructure, environment, and data.
Application sizing will often use modeling and trending techniques.
The sizing of the application should be refined as the design and development process
progresses.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
3-61
3-62
Information on the relationships between the business, the services, the supporting
services and the technology from the CMS
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Forecasts and predictive reports: used by all areas to analyze, predict and forecast
particular business and IT scenarios and their potential solutions
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
3-63
49
3-64
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
50
Combining all of the CCM data into an integrated set of information that can be
consistently analyzed to provide usage details for all components of the services
Analyzing the huge amounts of information produced by BCM, SCM and CCM
A lack of appropriate information from the business on future plans and strategies
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
3-65
3-66
The processes focus too much on the technology (CCM) and not enough on the
services (SCM) and the business (BCM)
The reports and information provided do not give the appropriate information to
the customers and the business
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Capacity Manager
IBM Software Group | Tivoli software
Capacity Manager
Ensure there is adequate IT capacity to meet required levels of
service
Ensure senior IT management is correctly advised on how to match
capacity and demand
Ensure use of existing capacity is optimized
Identify, with the Service Level Manager, capacity requirements
through discussions with the business users
Understand current usage of infrastructure and IT services
Understand the maximum capacity of each component
Perform sizing on all proposed new services and systems to identify
capacity requirements
Forecast capacity requirements based on business plans, usage
trends, and sizing of new services
51
The main role for the Capacity Management process is that of Capacity Manager. A
Capacity Manager is responsible for ensuring that the goals of Capacity Management are
met.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
3-67
20 08 IBM Corporation
3-68
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Availability Management
IBM Software Group | Tivoli software
Availability Management
The Availability Management process ensures that the
level of service availability delivered in all services
matches or exceeds the agreed upon levels in a cost
effective manner
Availability Management provides a point of focus and
management for all availability related issues
Availability Management ensures that availability targets
in all areas are measured and achieved
53
Ensuring that the level of service availability delivered in all services matches or
exceeds the current and future agreed-upon needs of the business in a costeffective manner
Providing a point of focus and management for all availability-related issues for
both services and resources
Ensuring that availability targets in all areas are measured and achieved
Provide advice and guidance to all other areas of the business and IT on all
availability-related issues
Ensure that service availability objectives meet or exceed all of their agreed-upon
targets by managing services and resources related to availability performance
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
3-69
Like Capacity Management, the Availability Management process and planning must be
involved in all stages of the service lifecycle. The appropriate availability and resilience
should be designed into services and components from the initial design stages. This early
design will ensure that the availability of any new or changed service meet expected targets.
In addition, it will ensure that all existing services and components continue to meet all of
their targets. This concept is the basis of stable service provision.
3-70
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
The reliability of the service can be improved by increasing the reliability of individual
components. In addition, it can be improved by increasing the resilience of the service to
individual component failure. An example is increasing the component redundancy by
using load-balancing techniques. The reliability of the service is often measured and
reported as Mean Time Between Service Incidents (MTBSI) or Mean Time Between
Failures (MTBF).
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
3-71
55
3-72
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
A market space represents a set of opportunities for service providers to deliver value to the
business of a customer through one or more services. Often it is unclear how services create
value for customers. Services are often defined in the terms of resources made available for
customers to use. Service definitions lack clarity on two points:
Business outcomes that justify the expense of a service from the customers
perspective
This problem leads to poor designs, ineffective operation, and lackluster performance in
service contracts. Service improvements are difficult when it is not clear where
improvements are truly required. Customers can understand and appreciate improvements
only within the context of their own business assets, performances, and outcomes. A correct
definition of services takes into account the context in which customers perceive value from
the services.
An outcome-based definition of services ensures that managers plan and carry out all
aspects of service management. Service management is performed entirely from the
perspective of what is valuable to the customer. Such an approach ensures that services not
only create value for customers but also capture value for the service provider.
Copyright IBM Corp. 2009
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
3-73
The Availability Management process continually works to ensure that all operational
services meet their agreed-upon availability targets. In addition it strives to ensure that new
or changed services are designed appropriately to meet their intended targets. Furthermore
these goals are accomplished without compromising the performance of existing services.
In order to achieve this goal, Availability Management should perform the reactive and
proactive activities.
Solutions that enhance the performance of the customer assets indirectly support the
achievement of the outcomes generated by those assets. Such solutions and propositions
hold utility for the business. When that utility is backed by a suitable warranty, customers
are ready to buy. Services are a means of delivering value to customers by facilitating
outcomes customers want without owning specific costs and risks.
3-74
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Availability
IBM Software Group | Tivoli software
Availability
Availability is the ability of a service, component, or configuration item (CI) to perform its
agreed-upon function when required. It is often measured and reported as a percentage.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
3-75
Availability Terms
3-76
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Reliability
IBM Software Group | Tivoli software
Reliability
Reliability is a measure of how long a service, component, or CI can perform its agreedupon function without interruption. The reliability of the service can be improved by
increasing the reliability of individual components. In addition reliability can be improved
by increasing the resilience of the service to individual component failure. An example is
increasing the component redundancy by using load-balancing techniques.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
3-77
Maintainability
IBM Software Group | Tivoli software
Maintainability
3-78
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
3-79
62
3-80
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Availability Objectives
IBM Software Group | Tivoli software
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
3-81
64
3-82
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Ensuring that the level of service availability delivered in all services matches or
exceeds the current and future agreed-upon needs of the business in a costeffective manner
Providing a point of focus and management for all availability-related issues for
both services and resources
Ensuring that availability targets in all areas are measured and achieved
Like Capacity Management, the Availability Management process and planning must be
involved in all stages of the service lifecycle. All stages include strategy and design through
transition and operation to improvement. The appropriate availability and resilience should
be designed into services and components from the initial design stages. This early design
will ensure that the availability of any new or changed service meet expected targets. It will
also ensure that all existing services and components continue to meet all of their targets.
These accomplishments are the basis of stable service provision.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
3-83
66
3-84
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
67
Technology information from the CMS on the topology and the relationships
between the components and the assessment of the capabilities of new technology
Past performance from previous measurements, achievements and reports and the
Availability Management Information System (AMIS)
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
3-85
3-86
The Projected Service Outage (PSO) in conjunction with Change and Release
Management
Details of the proactive availability techniques and measures that will be deployed
to provide additional resilience to prevent or minimize the impact of component
failures on the IT service availability
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
69
Effective review and follow-up of all SLA, OLA and underpinning contract
breaches
KPIs that help to satisfy business needs for access to IT services include:
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
3-87
KPIs that help identify availability of IT infrastructure achieved at optimum costs include:
3-88
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
70
The main Critical Success Factors for the Availability Management process are:
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
3-89
3-90
The processes focuses too much on the technology and not enough on the services
and the needs of the business
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Availability Manager
IBM Software Group | Tivoli software
Availability Manager
Ensures all existing services deliver the levels of
availability agreed with the business in SLAs
Assists with investigation and diagnosis of all incidents
and problems that cause availability issues or
unavailability of services or components
Participates in the IT infrastructure design, including the
specification of the availability requirements for hardware
and software
Proactively improves service availability wherever
possible and optimizes availability of IT infrastructure
Assists with the assessment and management of risk
71
The main role for the Availability Management process is that of Availability Manager. The
Availability Manager has responsibility for ensuring that the aims of Availability
Management are met.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
3-91
20 08 IBM Corporation
3-92
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Most business processes rely heavily on technology. Therefore, it is critical that IT maintain
a high level of availability. To keep technology available, it is essential to establish risk
reduction measures and recovery options. The purpose of IT Service Continuity
Management (ITSCM) is to maintain the necessary ongoing recovery capability within the
IT services and their supporting components.
ITSCM provides a crucial role in supporting the Business Continuity Planning process. In
many organizations, it is used to increase awareness of continuity and recovery
requirements. In addition, it is often used to justify and implement a Business Continuity
Planning process and Business Continuity Plans.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
3-93
ITSCM Objectives
IBM Software Group | Tivoli software
ITSCM Objectives
Maintain IT Service Continuity and IT recovery plans
Complete regular Business Impact Analysis exercises
Conduct regular Risk Analysis and Management exercises
Provide continuity and recovery advices to other areas
Ensure continuity and recovery mechanisms are put in place
Assess impact of all changes on continuity and recovery
plans
Ensure proactive plans are in place when necessary
Negotiate contracts with recovery capability suppliers
74
ITSCM focuses on those events that the business considers significant enough to be
considered a disaster. Less significant events will be dealt with as part of the Incident
Management process. What constitutes a disaster will vary from organization to
organization. The scope of ITSCM within an organization is determined by the
organizational structure, culture, and strategic direction (both business and technology).
This scope is identified in terms of the services provided and how these develop and change
over time.
3-94
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
75
ITSCM provides an important role in supporting the Business Continuity Planning process.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
3-95
ITSCM Activities
IBM Software Group | Tivoli software
ITSCM Activities
Agree on scope of ITSCM process and policies
Conduct Business Impact Analysis (BIA) of loss of IT
service
Conduct Risk Analysis (RA) to identify possibility and
likelihood of threats to continuity
Develop overall ITSCM strategy
Develop ITSCM plan
Test plans
Operate and maintain plans
76
3-96
Set the policy. This step should be established and communicated to all affected
members of the organization.
Specify terms of reference and scope: This step includes defining the scope and
responsibilities of all staff in the organization.
Allocate the resources. In this step financial and manpower resources are
allocated.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
How the degree of damage or loss is likely to escalate and the time and
severity of the service disruption
The time within which minimum levels of staffing, facilities and services
should be recovered
The time within which all required business processes and supporting staff,
facilities and services should be fully recovered
Strategy: Following the requirements analysis, the strategy should document the
required risk reduction measures and recovery options to support the business.
This is an assessment of the level of threat and the extent to which an organization
is vulnerable to that threat. Risk Analysis can also be used in assessing and
reducing the chance of normal operational incidents and is a technique used by
Availability Management to ensure the required availability and reliability levels
can be maintained.
Stages one and two are mostly Business Continuity Management (BCM) activities. ITSCM
should only be involved in these stages for the following reasons:
As a result of these initial Business Impact Analysis and Risk Analysis activities, BCM
should produce a Business Continuity Strategy. The first real ITSCM task is to produce an
ITSCM strategy that supports the BCM strategy and its needs.
The Business Continuity Strategy should focus on business processes and associated issues
(for example, business process continuity, staff continuity, buildings continuity).
Stage 3: Implementation
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
3-97
You can develop an ITSCM strategy that supports the Business Continuity Strategy after
the following tasks have been completed:
You have identified the role that IT services will provide within the strategy.
Therefore, cost-effective decisions can be made, considering all the resources needed to
deliver a business process. After the strategy has been approved, the IT Service Continuity
Plans must be produced in line with the Business Continuity Plans. Be sure to properly test
these plans before final implementation.
Stage 4: Ongoing Operation
This stage consists of the following activities:
3-98
Review
Testing
Change Management
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
ITSCM Interfaces
IBM Software Group | Tivoli software
ITSCM Interfaces
Incident and Problem Management
IT Service Continuity Management (ITSCM)
Service Level Management (SLM)
Change Management
Legal and Human Resources (HR) Department
Configuration Management
Capacity Management
Financial Management
Supplier Management
77
Incident and Problem Management: This provides assistance with the resolution and
subsequent, justification, and correction of security incidents and problems. The Incident
Management process must include the ability to identify and deal with security incidents.
Service Desk and Service Operation staff must recognize a security incident.
IT Service Continuity Management (ITSCM): ITSCM deals with the assessment of
business impact and risk and the provision of resilience, failover, and recovery
mechanisms. Security is a major issue when continuity plans are tested or invoked. A
working ITSCM plan is a mandatory requirement for ISO27001.
Service Level Management (SLM): SLM provides assistance with the determining of
security requirements and responsibilities. It also ensures their inclusion within SLRs and
SLAs. In addition, SLM promotes the investigation and resolution of service and
component security breaches.
Change Management: ISM should help assess every change for impact on security and
security controls. Also ISM can provide information about unauthorized changes.
Legal and Human Resources (HR) Department: Legal and HR issues must be
considered when investigating security issues.
Configuration Management: Configuration Management gives the ability to provide
accurate asset information to assist with security classifications. Having an accurate
Configuration Management System (CMS) is therefore an extremely useful ISM input.
Copyright IBM Corp. 2009
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
3-99
3-100
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
ITSCM Inputs
IBM Software Group | Tivoli software
ITSCM Inputs
Business information
IT information
A Business Continuity Strategy and a set of Business
Continuity Plans
Service information
Financial information
Configuration Management System
Business Continuity Management and Availability
Management testing schedules
IT Service Continuity Plans and test reports
78
There are many sources of input required by the ITSCM process. Some of them are:
Business information from the business strategy, plans, financial plans, and
current and future requirements
A Business Continuity Strategy and a set of Business Continuity Plans from all
areas of the business
IT Service Continuity Plans and test reports from supplier and partners, where
appropriate
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
3-101
ITSCM Outputs
IBM Software Group | Tivoli software
ITSCM Outputs
A revised ITSCM policy and strategy
A set of ITSCM plans
Supporting plans and contracts with recovery service
providers
Business Impact Analysis exercises and reports
Risk Analysis and Management reviews and reports
An ITSCM testing schedule
ITSCM test scenarios
ITSCM test reports and reviews
79
Business Impact Analysis exercises and reports are produced in conjunction with Business
Continuity Management and the business.
Risk Analysis and Management reviews and reports are produced in conjunction with the
business, Availability Management, and Security Management.
3-102
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
ITSCM KPIs
IBM Software Group | Tivoli software
80
Regular audits of the ITSCM Plans to ensure that, at all times, the agreed recovery
requirements of the business can be achieved
All service recovery targets are agreed and documented in SLAs and are
achievable within the ITSCM Plans
Regular reviews are undertaken of the business and IT continuity plans with the
business areas
Negotiation and management of all necessary ITSCM contracts with third party
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
3-103
3-104
That all IT service areas and staff are prepared and able to respond to an
invocation of the ITSCM Plans
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
ITSCM Challenges
providing appropriate plans when there is no BCM
process
ensuring that accurate information is obtained from the
BCM process on the needs, impact and priorities of the
business
ensuring that the ITSCM information and plans are
aligned and integrated with those of the business
keeping them aligned by management and control of
business and IT change
81
The main Critical Success Factors for the ITSCM process are:
Lack of commitment from the business to the ITSCM processes and procedures
The processes focus too much on the technology issues and not enough on the IT
services and the needs and priorities of the business
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
3-105
3-106
Risk Analysis and Management are conducted in isolation and not in conjunction
with Availability Management and Security Management
ITSCM plans and information become out-of-date and lose alignment with the
information and plans of the business and BCM
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
The main role for the ITSCM process is that of IT Service Continuity Manager. The IT
Service Continuity Manager has responsibility for ensuring that the aims of ITSCM
Management are met.
Further responsibilities for this role include:
Assessing potential service continuity issues and invoking the Service Continuity
Plan if necessary
Performing post mortem reviews of service continuity tests and invocations, and
instigating corrective actions where required
Developing and managing the ITSCM plans to ensure that, at all times, the
recovery objectives of the business can be achieved
Ensuring that all IT service areas are prepared and able to respond to an
invocation of the continuity plans
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
3-107
3-108
Undertaking quality reviews of all procedures and ensuring that these are
incorporated into the testing schedule
Undertaking regular reviews, at least annually, of the Continuity Plans with the
business areas to ensure that they accurately reflect the business needs
Assessing changes for their impact on Service Continuity and Continuity Plans
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
20 08 IBM Corporation
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
3-109
84
The term information is used in a general way and includes data stores, databases, and
metadata. Information security protects the interests of those relying on information, and
the systems and communications that deliver the information. It protects the interests from
harm resulting from failures of availability, confidentiality, and integrity.
To be effective, security must address entire business processes from end to end and cover
the physical and technical aspects. ISM raises the awareness of the need for security within
all IT services and assets throughout the organization. ISM manages all aspects of IT and
information security within all areas of IT and Service Management activity.
ISM provides assurance of business processes by enforcing appropriate security controls in
all areas of IT. In addition, it manages IT risk in line with business and corporate risk
management processes and guidelines.
3-110
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Security Framework
IBM Software Group | Tivoli software
Security Framework
Information Security Policy (ITP) and specific security
policies that address each aspect of strategy, controls,
and regulation
Information Security Management System (ISMS),
containing the standards, management procedures and
guidelines supporting the information security policies
A comprehensive security strategy closely linked to the
business objectives, strategies, and plans
A set of security controls to support the ITP
Monitoring processes to ensure compliance and provide
feedback on effectiveness
Training and awareness strategy and plan
85
The Information Security Management process and framework will typically consist of the
following items:
An Information Security Policy (ITP) and specific security policies that address
each aspect of strategy, controls and regulation
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
3-111
3-112
An overall ITP
An e-mail policy
An Internet policy
An antivirus policy
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
These policies should be widely available to all customers and users. All SLRs, SLAs,
contracts, and agreements should refer to compliance with these policies. The policies
should be authorized by top executive management within the business and IT. Compliance
should be endorsed on a regular basis. All security policies should be reviewed and, when
necessary, revised on at least an annual basis.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
3-113
3-114
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
88
The goal of the Information Security Management (ISM) process is to align IT security
with business security. In addition, it ensures that information security is effectively
managed in all service and Service Management activities.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
3-115
3-116
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
90
Monitoring and management of all security breaches and major security incidents
Analysis, reporting, and reduction of the volume and impact of security breaches
and incidents
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
3-117
91
Incident and Problem Management: This provides assistance with the resolution and
subsequent, justification, and correction of security incidents and problems. The Incident
Management process must include the ability to identify and deal with security incidents.
Service Desk and Service Operation staff must recognize a security incident.
IT Service Continuity Management: ITSCM deals with the assessment of business impact
and risk and the provision of resilience, failover, and recovery mechanisms. Security is a
major issue when continuity plans are tested or invoked. A working ITSCM plan is a
mandatory requirement for ISO27001.
Service Level Management: SLM provides assistance with the determining of security
requirements and responsibilities. It also ensures their inclusion within SLRs and SLAs. In
addition, SLM promotes the investigation and resolution of service and component security
breaches.
Change Management: ISM should help assess every change for impact on security and
security controls. Also ISM can provide information about unauthorized changes.
Legal and Human Resources Department: Legal and HR issues must be considered
when investigating security issues.
Configuration Management: Configuration Management gives the ability to provide
accurate asset information to assist with security classifications. Having an accurate
Configuration Management System (CMS) is therefore an extremely useful ISM input.
3-118
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
3-119
3-120
Business information from the business strategy, plans, financial plans, and
current and future requirements
Service information from the SLM process with details of the services from the
Service Portfolio and the Service Catalog, SLAs, and SLRs
Risk Analysis processes and reports from ISM, Availability Management, and
ITSCM
Details of all security events and breaches from all areas of IT and SM, especially
Incident Management and Problem Management
Change information from the Change Management process to assess all changes
for their impact on security policies, plans, and controls
Details of partner and supplier access from Supplier Management and Availability
Management on external access to services and systems
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
A set of security controls with details and risks of the operation and maintenance
Security test schedules and plans, including security penetration tests and other
security tests and reports
Policies, processes, and procedures for managing partners and suppliers and their
access to services and information
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
3-121
3-122
Increase in the number of services and processes that conform with security
procedures and controls
Increased awareness of the security policy and its contents, throughout the
organization
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
3-123
3-124
Growing potential for misuse and abuse of information systems affecting privacy
and ethical values
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Security Manager
IBM Software Group | Tivoli software
Security Manager
Managing all aspects of the Information Security Policy
Identifying and classifying IT and information assets
Performing security risk analysis and risk management
Monitoring and managing all security breaches
Reducing impact and volume of security incidents
Ensuring all changes are assessed for impact on security
Ensuring confidentiality, integrity, and availability are
maintained
Ensuring access to services subject to contractual agreements
Acting as a focal point for security issues
96
Monitoring and managing all security breaches and handling security incidents
and taking remedial action to prevent recurrence wherever possible
Reporting, analyzing, and reducing the impact and volumes of all security
incidents in conjunction with Problem Management
Ensuring that all changes are assessed for impact on all security aspects
Ensuring that the confidentiality, integrity, and availability of the services are
maintained at the levels agreed upon in the SLAs
Ensuring that all access to services by external partners and suppliers is subject to
contractual agreements and responsibilities
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
3-125
20 08 IBM Corporation
3-126
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Supplier Management
IBM Software Group | Tivoli software
Supplier Management
Supplier Management process manages suppliers and
the services they supply, to provide seamless quality of IT
service to the business, ensuring value for money is
obtained
Supplier Management ensures the provision of end-toend, seamless, quality IT services are delivered to the
business and aligned to their expectation
The Supplier and Contracts Database (SCD) records all
supplier and contract details, together with details of the
type of services or products provided by each supplier
98
Supplier Management process manages suppliers and the services they supply. It
provides seamless quality of IT service to the business, ensuring value for money
is obtained.
The Supplier and Contracts Database (SCD) records all details about suppliers,
contracts, and the type of service or products provided by each supplier.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
3-127
The Supplier Management process manages suppliers and the services they supply. It
provides seamless quality of IT service to the business, ensuring value for money is
obtained. Supplier Management ensures the provision of end-to-end, seamless, quality IT
services are delivered to the business and aligned to their expectation. The Supplier and
Contracts Database (SCD) records all details about suppliers, contracts, and the type of
service or products provided by each supplier.
The purpose of the Supplier Management process is to receive value for money from
suppliers. In addition, it ensures that suppliers perform to the targets contained within their
contracts and agreements, while conforming to the terms and conditions.
The goal of Supplier Management is to manage suppliers and their services ensuring that
high quality and value is achieved.
3-128
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
3-129
101
3-130
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
102
Selecting and negotiating contracts, targets, and the terms and conditions
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
3-131
3-132
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
103
Requests from other areas, particularly SLM and Security Management for
assistance with supplier issues
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
3-133
The key interfaces that Supplier Management with other processes are:
3-134
ISM: In the management of suppliers and their access to service and systems and
their responsibilities with regards to conformance to ISM policies and
requirements.
Service Portfolio Management: To ensure that all supporting services and their
details and relationships are accurately reflected within the Service Portfolio.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Business information from the business strategy, plans, financial plans, and
current and future requirements
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
3-135
3-136
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
106
Increase in the number of suppliers meeting the targets within the contract
Supporting services and their targets align with business needs and targets
Increase in the number of service and contractual reviews held with suppliers
Increase in the number of supplier and contractual targets aligned with SLA
and SLR targets
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
3-137
The Supplier Management process has the following critical success factors:
3-138
Supporting services and their targets must align with business needs and targets
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Lack of resources
Inability for suppliers to meet targets or terms and conditions of the contract
Upset due to suppliers being are taken over and the resulting changes
Excess of bureaucracy
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
3-139
Supplier Manager
IBM Software Group | Tivoli software
Supplier Manager
Assisting in the development and review of SLAs,
contracts, and agreements
Ensuring IT suppliers and contracts provide value for
money
Ensuring IT supplier processes are consistent and meet
expectations
Maintaining and monitoring a Supplier and Contracts
Database (SCD)
Monitoring all suppliers and contracts on a regular basis
Ensuring that underpinning contracts, agreements, and
SLAs are aligned with those of the business
108
The main role for the Supplier Management process is that of Supplier Manager. The
Supplier Manager has responsibility for ensuring that the aims of Information Supplier
Management are met.
3-140
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Ensuring that all roles and relationships between lead and any sub-contracted
suppliers are properly documented
Ensuring changes are assessed for impact on suppliers, supporting services, and
contracts
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
3-141
20 08 IBM Corporation
3-142
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
IT Planner
IBM Software Group | Tivoli software
IT Planner
Develop IT plans Manage the implementation progress of
all IT strategies and plans
Develop and maintain the overall set of IT standards,
policies, plans, and strategies
Manage all aspects of IT standards, policy, and strategy
implementation
Recommend policy for the effective use of IT throughout
the organization
Review IT costs
Manage, plan and coordinate IT systems and services
110
Manage the planning for the provision and use of IT architectures, products, and
services
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
3-143
111
The Service Design Manager is responsible for the overall coordination and deployment of
quality solution designs for services and processes.
3-144
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
functional
infrastructure
environment applications
data management
Producing quality and stable designs that meet agreed current and future IT
requirements for:
technology architecture
processes
measurement systems
designs
plans
architectures
policies
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
3-145
The 4 Ps need to be considered in the creation and definition of single services. The 4 Ps
also need to be considered in the load and level of the effort.
When designing the services, it is important to establish the level of that service and how it
will be monitored and measured. When considering the PC refresh, it might be critical to
monitor approval times, delivery from the supplier, and delivery to the users. In addition, it
will be important to check time and accuracy. For example, check how many incidents or
issues the user needs to resolve with support from the Service desk, or IMAC rework team.
Surveys can be another metric to get feedback from the users to indicate how smoothly the
process was for them. Because all of these can be metrics, it will be important to accompany
them with SLAs to ensure the delivery is meeting expectations. An example would be
delivery being completed 2 weeks from request, with 1 day of interruption of user work
time.
SLAs can often blend together with Availability Management. In this scenario, availability
can be measured or monitored as the level of impact the swap from old PCs to new PC
impacts the users. For example, to have an impact of no more than 8 hours of lost work
time. Another example might be moving to proactive availability, such as pushing a
communication with all necessary data to users that contains a link. This link might provide
a means for the users to agree to a swap out date. Additionally, users might enter the
information about the software and data they expect moved to the new PCs.
3-146
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
As you learned in this unit, information security management becomes important in the
services portfolio. For example, in this case, the data will be cleared from the retiring PC
(person data). In addition, the management of software licenses of, for example, spyware,
or antivirus software is also a big consideration. Furthermore, ensuring PC security of the
old and new PCs is also necessary.
Within Service Design, it is essential to understand how the Process Owners and Service
Owners work into and manage the services throughout their lifecycle. Consider the Process
Owners of Configuration Management, Asset Management, Desktop or IMAC mobility
team, and Change Management. Because this example is a PC process, it might be very
likely be owned by the Desktop Manager.
Because this service interacts with suppliers, it is involved in managing the supplier process
which is actually part of service design. Lastly, it might be necessary to ensure
collaboration with the managers of other areas. For example, if this process was provided
before, but manually and with out proactive processes, then other roles might need to be
involved. These roles help provide automation and ensure effective and fast service to the
user.
If an organization uses services such as PC refresh, they can be combined to create a
complementary set of services that make up the portfolio.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
3-147
Review Questions
1.
Which of the following choices is the main purpose of the Service Design stage?
a.Minimizes the risks from transitioning the new or changed services to production
2.
b.
c.
d.
Which of the following choices is not one of the five individual aspects of Service
Design?
a.Design of the technology architecture and management systems
3.
b.
c.
d.
What type of approach should be adopted for all service design areas to ensure
consistency and integration?
a.Holistic
4.
b.
Transitional
c.
Isolated
d.
Adaptive
Which of the following choices describes the value Service Design provides to the
business?
a.Provides a consistent interface to the business for all service-related issues
5.
b.
c.
d.
3-148
Processes
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
6.
c.
Products
d.
Partners
e.
7.
b.
c.
Availability Management
d.
Capacity Management
Which of the following choices is not part of the Service Level Management
Process?
a.Ensure that availability targets in all areas are measured and achieved.
8.
b.
c.
d.
9.
b.
Ensuring that all of the information within the Service Catalog is consistent
with the information in the service portfolio
c.
d.
Ensuring that the current and future service requirements of customers are
identified, understood, and document in SLA and SLR documents
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
3-149
10.
c.
d.
Which of the following processes has the goal of aligning IT security with
business security and ensure that information security is effectively managed in
all service and Service Management Activities?
a.Information Security Management
11.
b.
Capacity Management
c.
Availability Management
d.
3-150
b.
Supplier Management
c.
Availability Management
d.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
3-151
Review Answers
1.
Which of the following choices is the main purpose of the Service Design stage?
c. design of new or changed services being introduced into the production
environment
2.
Which of the following choices is not one of the five individual aspects of Service
Design?
b. Response to the business and IT requests for change
3.
What type of approach should be adopted for all service design areas to ensure
consistency and integration?
a. Holistic
4.
Which of the following choices describes the value Service Design provides to the
business?
d. All of the above
5.
6.
7.
Which of the following choices is not part of the Service Level Management
process?
a. Ensure that availability targets in all areas are measured and achieved.
8.
9.
3-152
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
10.
Which of the following processes has the goal of aligning IT security with
business security and ensure that information security is effectively managed in
all service and Service Management Activities?
a. Information Security Management
11.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
3-153
Summary
IBM Software Group | Tivoli software
Summary
You should now be able to:
Explain the key principles and concepts related to
Service Design
Discuss Service Design processes and associated
activities
Describe the Service Design roles
113
3-154
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
20 08 IBM Corporation
4-1
Introduction
In this unit, you will learn about Service Transition.
Objectives
IBM Software Group | Tivoli software
Objectives
Upon completion of this unit, you will be able to:
Explain the key principles and concepts related to
Service Transition
Discuss Service Transition processes and associated
activities
Describe the Service Transition roles
4-2
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
20 08 IBM Corporation
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
4-3
Service Transition uses all the processes described in the other ITIL parts of the Service
Lifecycle. It uses all the processes because it is responsible for testing them. This testing
occurs either as part of a new or changed service or as part of testing changes to the Service
Management processes.
Service level management is important to ensure that customer expectations are managed
during Service Transition. Incident and problem management are important for handling
incidents and problems during testing, pilot, and deployment activities.
4-4
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
To ensure that the new or changed services can be used in accordance with the
requirements and constraints specified within the service requirements
To increase the customer, user, and Service Management staff satisfaction with the
Service Transition practices, including:
Communications
Release documentation
Training
Knowledge transfer
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
4-5
4-6
To increase proper use of the services and underlying applications and technology
solutions
To provide clear and comprehensive plans that enable the customer and business
change projects to align their activities with the Service Transition plans
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Plan and manage the capacity and resources required to package, build, test, and
deploy a release into production.
Provide a consistent framework for evaluating the service capability and risk
profile before a new or changed service is deployed.
Establish and maintain the integrity of all identified service assets and
configurations as they evolve through the Service Transition stage.
Ensure that the service can be managed, operated, and supported within the
Service Design requirements and constraints.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
4-7
4-8
Records of peripheral matters, for example, weather, user numbers, user behavior,
and performance figures of an organization
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
SKMS Data
IBM Software Group | Tivoli software
SKMS Data
Gathered within
CMDB
Fed through the
CMS
Goes into the
SKMS
Supports the
informed decision
making process
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
4-9
Includes:
Purpose
Scope
Criteria
Schedule of milestones
Financial requirements
Context
Applicable standards requirements
4-10
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
10
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
4-11
11
Enterprise-wide tools that support the broader systems and processes within
which Service Transition delivers support
4-12
Storage
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Protection
Archiving
Classification
Retirement
Storage
Protection
Archiving
Classification
Retirement
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
4-13
20 08 IBM Corporation
4-14
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
13
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
4-15
14
4-16
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
15
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
4-17
The Service Design Package includes the following information that is required by the
Service Transition team:
The architectural design required to deliver the new or changed Service including
constraints
The detailed design of how the service components will be assembled and
integrated into a release package
The types of release should be defined as this helps to set customer and stakeholder
expectations about the planned releases.
4-18
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Major Releases: This type usually contains large areas of new functionality. They
can include those releases that eliminate temporary fixes to problems. A major
upgrade or release usually supersedes all preceding minor upgrades, releases, and
emergency fixes.
Minor Releases: This type usually contains small enhancements and fixes, some
of which might already have been issued as emergency fixes. A minor upgrade or
release usually supersedes all preceding emergency fixes.
Emergency releases: This type usually contains the corrections to a small number
of known errors. Sometimes it contains an enhancement to meet a high priority
business requirement.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
4-19
17
4-20
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
18
The Transition Planning and Support process consists of the following activities.
Context
Scope
Criteria
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
4-21
People
Approach
The Service Design Plan should define the lifecycle stages for a Service
Transition:
Deployment
Review and acceptance of inputs from the other service lifecycle stages
4-22
Develop a Service Transition Plan. A Service Transition plan describes the tasks
and activities required to release and deploy into the test environments and
production.
Maintain an integrated set of transition plans that are linked to lower-level plans
such as release, build and test plans.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Provide support for all stakeholders regarding the Service Transition framework
of processes and supporting systems and tools.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
4-23
19
4-24
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
20
Reduction in time and resource to develop and maintain integrated plans and
coordination activities
Project and service team satisfaction with the Service Transition practices
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
4-25
21
4-26
Publishing Service Transition performance statistics and identifying key areas for
improvement
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
4-27
20 08 IBM Corporation
4-28
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
23
Service Change will deal primarily with Service Operational Changes, but organizations
can use the service. Change process for strategic changes or portfolio changes if they
choose.
Changes that lie outside the scope of a service change process of an organization might
include:
Changes with significantly wider impacts than service changes, for example,
departmental organization, policies, business operations. These changes will
produce Requests for Change (RFCs) to generate consequential service changes.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
4-29
Service Request
IBM Software Group | Tivoli software
Service Request
A generic description for many varying types of demands
that are placed upon the IT department by the users
The scale and frequent, low-risk nature means that
service requests are better handled by a separate
process, rather than being allowed to congest and
obstruct the normal incident and Change Management
processes
24
Many service requests are actually small changes. Service Requests have the following
characteristics:
Low risk
Frequently occurring
Low cost
4-30
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Change Request
IBM Software Group | Tivoli software
Change Request
A formal communication seeking an alteration to one or
more Configuration Items
Change requests can take several forms
Different types of change may require different types of
change requests
25
An organization needs to ensure that appropriate procedures and forms are available to
cover the anticipated requests.
Avoiding a bureaucratic approach to documenting a minor change removes some of the
cultural barriers to adopting the change management process.
Some of the forms might be:
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
4-31
Change Types
IBM Software Group | Tivoli software
Change Types
Normal
Standard
Emergency
26
4-32
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
27
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
4-33
28
4-34
The change typically has a low risk and always a well-understood risk
Standard Changes should be identified early when building the Change Management
process to promote efficiency. Otherwise, a Change Management implementation can
create unnecessarily high levels of administration and resistance to the Change
IT Infrastructure Library (ITIL) Foundations v3
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Management process. All changes, including Standard Changes, will have details of the
change recorded. For some Standard Changes this record might be different from normal
change records.
Some Standard Changes to Configuration Items (CIs) might be tracked on the asset or CI
lifecycle, particularly where a comprehensive Change Management System (CMS)
provides:
Reports of changes
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
4-35
29
The number of emergency changes should be kept to an absolute minimum, because they
are generally more disruptive and prone to failure.
Occasions will occur when emergency changes are essential. Consequently, procedures
should be devised to deal with them quickly, without sacrificing normal management
controls.
If emergency changes are not designed carefully and tested before use, the impact of the
emergency change might be greater than the original.
4-36
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Release Unit
IBM Software Group | Tivoli software
Release Unit
Portion of a service or IT infrastructure that is normally
released together according to the release policy of the
organization
The unit can vary, depending on the type or items of
service asset or service component, such as software and
hardware
30
An organization might, for example, decide that the Release Unit for business critical
applications is the complete application. It might do so to ensure that testing is
comprehensive.
The same organization might decide that a more appropriate Release Unit for a Web site is
at the page level.
A release unit to upgrade to a small portion of a sales application might require the entire
site contents to be packaged and released together.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
4-37
31
The questions for the Seven Rs of Change Management must be answered for all changes.
Without this information, the impact assessment cannot be completed, and the balance of
risk and benefit to the live service will not be understood. Without this understanding, the
change might not deliver all of the possible or expected business benefits. The change
might even have an unexpected detrimental effect on the live service.
4-38
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
32
The change management process should ensure that changes are recorded and then
evaluated, authorized, prioritized, planned, tested, implemented, documented, and
reviewed in a controlled manner.
Changes arise for a variety of reasons:
Proactive changes. For example, seeking business benefits such as reducing costs
or improving services, or increasing the ease and effectiveness of support.
To optimize risk exposure (supporting the risk profile required by the business)
To make an appropriate response to all Requests for Change, Change Management should
include an assessment of:
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
4-39
Change impact
Resource requirements
Change authorization
Business benefit
This assessment is essential to maintain the required balance between the need for change
and the impact of the change.
Each organization should define the changes that lie outside the scope of their service
change process, which typically might include the following changes:
4-40
Changes with significantly wider impacts than service changes, for example,
departmental organization, policies, business operations. These changes will
produce RFCs to generate consequential service changes.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
By managing changes, you manage much of the potential risk that changes can introduce.
Service and infrastructure changes can have a negative impact on the business by disrupting
service and delaying the identification of business requirements. However, Change
Management enables the service provider to perform the following tasks:
Tracking changes through the Service Life Cycle and to the assets of its customers
Reducing the Mean Time to Restore Service (MTRS) through quicker and more
successful implementations of corrective changes
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
4-41
4-42
Aligning the service change management process with business, project, and
stakeholder change management processes
Establishing a single focal point for changes in order to minimize the probability
of conflicting changes and potential disruption to the production environment
Establishing performance measures for the process, for example, efficiency and
effectiveness
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Remediation
IBM Software Group | Tivoli software
Remediation
Before approval, all changes should address the question
of what to do if the change is not successful
There should be a back-out plan, which will restore the
organization to its initial situation
often done through the reloading of a baseline set of CIs, especially
software and data
35
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
4-43
36
4-44
Assess and evaluate the business justification, impact, cost, benefits, and risk of
changes
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Communicate the decision with all stakeholders, in particular the initiator of the
request for change
Plan updates
Collate the change documentation, for example, baselines and evaluation reports
Throughout all the previous process activities and those described within this section,
information is gathered, recorded in the CMS, and then reported.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
4-45
37
Supplier management
Occasionally a proposed change will potentially have a wider impact on other parts of the
organization (for example, facilities or business operations), or vice versa. Then service
change process must interface appropriately with other processes involved.
Service Management processes might require change and improvements. Many will also
be involved in the impact assessment and implementation of service changes.
Asset and Configuration Management: The Configuration Management System
provides reliable, quick, and easy access to accurate configuration information. This
information helps stakeholders and staff assess the impact of proposed changes and to track
workflow. This information enables the correct asset and service component versions to be
released to the appropriate party or into the correct environment. As changes are
4-46
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
implemented, the configuration management information is updated. The CMS might also
identify:
Related CI and assets that will be affected by the change, but not included in the
original request
Problem Management: Changes are often required to implement workarounds and to fix
known errors. Problem Management is one of the major sources of Requests for Changes
(RFCs) and also often a major contributor to Change Advisory Board (CAB) discussion.
IT Service Continuity: Procedures and plans should be updated through change
management to ensure that they are accurate, up to date, and distributed to stakeholders.
Security Management: Changes required by security will go through the change
management process and security will be a key contributor to CAB discussion on many
services. Every significant change will be assessed for its potential impact on the security
plan.
Capacity and Demand Management: Poorly managed demand is a source of costs and
risk for service providers because uncertainty is always associated with the demand for
services. Capacity management has an important role in assessing proposed changes, not
only the individual changes but the total impact of changes on service capacity. Changes
arising form capacity management, including those set out in the capacity plan, will be
initiated as RFCs through the change process.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
4-47
38
Change proposal
4-48
Change
Transition
Release
Deployment
Test
Evaluation
Remediation
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Rejected RFCs
Approved RFCs
Change schedule
Revised PSO
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
4-49
Change Management must ensure that measures that have specific meaning. It is relatively
easy to count the number of incidents that eventually generate changes. However, it is more
valuable to examine the underlying cause of such changes and identify trends. The
following options would be even better:
Measure the speed and effectiveness with which the IT infrastructure responds to
identified business needs
Measures taken should be linked to business goals, wherever practical, and to cost, service
availability, and reliability. Any predictions should be compared with actual measurements.
The Key Performance Indicators for Change Management include the following
measurements:
4-50
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Reduction in the number and percent of unplanned changes and emergency fixes.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
4-51
Change Manager
IBM Software Group | Tivoli software
Change Manager
Receive, log, and allocate a priority, in collaboration with the initiator,
to all Requests for Change (RFCs). Reject any totally impractical
RFCs.
Chair all Change Advisory Board (CAB) and Emergency Change
Advisory Board (ECAB) meetings, table all RFCs for a CAB meeting,
issue an agenda, and circulate all RFCs to CAB members before
meetings to allow prior consideration.
Determine meeting invitations and allocate specific RFCs (depending
on the nature of the RFC, the changes, and areas of expertise of the
personnel).
After consideration of the advice given b y the CAB or ECAB,
authorize acceptable changes.
Issue Change Schedules through the Service Desk.
Review all implemented changes to ensure that they have met their
objectives. Refer back any that have been reversed or have failed.
40
The main role in Change Management is that of the Change Manager. Some of the main
duties of the Change Manager can be delegated.
4-52
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
41
The Change Advisory Board (CAB) is a body that exists to support the authorization of
changes. The CAB also assists Change Management in the assessment and prioritization of
changes. When a CAB is convened, members should be chosen who are capable of
ensuring that all changes within the scope of the CAB are adequately assessed. These
assessments should come from both a business and a technical viewpoint. When the need
for emergency change arises, there might not be time to convene the full CAB. It is
necessary to identify a smaller organization with authority to make emergency decisions.
This body is the Emergency Change Advisory Board (ECAB).
The CAB might be asked to consider and recommend the adoption or rejection of changes
appropriate for higher level authorization. Then recommendations will be submitted to the
appropriate change authority
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
4-53
20 08 IBM Corporation
4-54
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Service Asset and Configuration Management (SACM) is used for the following reasons:
To protect the integrity of service assets and configuration items (and where
appropriate, those of its customers) through the Service Lifecycle
To ensure the integrity of the assets and configurations required to control the
services and IT infrastructure by establishing and maintaining and accurate a
complete Configuration Management system
The goal of Service Asset and Configuration Management is to provide a logical model of
the IT infrastructure. This model correlates IT services and the various IT components
(physical, logical, and so on) needed to deliver these services. It does this by defining and
controlling the components of services and infrastructure and maintaining accurate
configuration records.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
4-55
Service Asset and Configuration Management optimizes the performance of service assets
and configurations. In addition, it improves the overall service performance. Furthermore,
it optimizes costs and risks caused by poorly managed assets such as service outages, fines,
correct licence fees, and failed audits.
SACM provides visibility of accurate representations of a service, release, or environment
that ensure the following events occur:
4-56
Warranties to be delivered
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Configuration Management delivers a required logical model of the services, assets, and the
infrastructure by recording the relationships between configuration items. The real power
of the logical model of the infrastructure of configuration management is that it is the main
model. It is a single common representation used by all parts of IT Service Management,
and beyond, such as Human Resources, Finance, suppliers, and customers.
The configuration items and related configuration information can be at various levels of
detail. For example, it can include an overview of all the services or a detailed view of a
service component specification.
A more detailed level of Configuration Management should be used when the service
provider requires tight control, traceability, and tight coupling of configuration
information.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
4-57
Configuration Items
IBM Software Group | Tivoli software
Configuration Items
A Configuration Item (CI) is an asset, service component,
or other item which is, or will be, under the control of
configuration management
Configuration Items can vary widely in complexity, size,
and type
CIs can be an entire service or system including all hardware,
software, documentation, and support staff, a single software
module, or a minor hardware component
A Configuration Item is an asset, service component, or other item which is, or will be,
under the control of configuration management. Configuration Items might vary widely in
complexity, size, and type, ranging from an entire service or system including all hardware,
software, documentation, and support staff to a single software module or a minor hardware
component.
Configuration Items might be grouped and managed together. An example is a set of
components might be grouped into a release. Configuration Items should be selected using
established selection criteria. In addition, they should be grouped, classified, and identified
to be manageable and traceable throughout the Service Lifecycle.
4-58
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
46
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
4-59
There will be a variety of CIs; the following categories can help identify them:
4-60
Service Lifecycle CIs: Include the business case, Service Management plans,
Service Lifecycle plans, Service Design Package, Release and Change plans, Test
plans. They provide a picture of:
The cost
Service Model
Service Package
Release Package
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
47
Some of these items will have related specifications or files that contain the contents of the
item such as software, documents, or a photograph.
For example, a Service CI will include the details such as:
Supplier
Cost
Purchase date
Note: Asset data held in a CMS (CMDB data) might be made available to external financial
Asset Management systems. These systems will perform specific asset management
process reporting outside of Configuration Management.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
4-61
The library can consist of one or more software libraries or file-storage areas, separate from
development, test, or active file-storage areas.
4-62
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Configuration Baseline
IBM Software Group | Tivoli software
Configuration Baseline
The configuration of a service, product, or infrastructure
that has been formally reviewed and agreed upon
Serves as the basis for further activities and can be
changed only through formal change procedures
Captures the structure, contents, and details of a
configuration
Represents a set of configuration items that are related to
each other
49
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
4-63
SACM Benefits
IBM Software Group | Tivoli software
SACM Benefits
Optimizes the performance of service assets and
configurations
Improves the overall service performance
Optimizes the costs and risks caused by poorly managed
assets such as:
Service outages
Fines
Correct license fees
Failed audits
50
4-64
Warranties to be delivered
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
SACM Activities
IBM Software Group | Tivoli software
SACM Activities
Management and Planning
Configuration Identification
Configuration Control
Status Accounting and Reporting
Verification and Audit
51
Configuration Control: This activity ensures that there are adequate control
mechanisms over CIs. During this activity, a record of changes to CIs, versions,
location, and ownership is maintained.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
4-65
4-66
Verification and Audit: The activities include a series of reviews or audits to:
Ensure there is conformity between the documented baselines and the actual
business environment
Check that the records in the CMS match the physical infrastructure
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
SACM Interfaces
IBM Software Group | Tivoli software
SACM Interfaces
Change Management
Financial management
IT Service Continuity Management
Problem and Incident Management
Availability Management
52
SACM is the single virtual repository of data and information for IT service management.
Consequently, SACM supports and interfaces with every other process and activity to some
degree. Some of the more noteworthy interfaces are as follows:
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
4-67
SACM KPIs
Percentage improvement in maintenance scheduling over
the life of an asset
Degree of alignment between provided maintenance and
business support
Assets identified as the cause of service failures
Improved speed for incident management to identify faulty
CIs and restore service
Impact of incidents and errors affecting specific CI types
53
4-68
Ratio of used licenses against paid for licences (should be close to 100%)
Achieved accuracy in budgets and charges for the assets utilized by each customer
or business unit
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
SACM Challenges
Convincing technical support staff to adopt a check in and
check out policy
Attracting and justifying funding for SACM,
Overcoming an overemphasis on data collection
Gaining commitment and support from management who
do not understand the importance of SACM to other
processes
54
Establishing valid justification for collecting and maintaining data at the agreed
level of detail
Making use of enabling technology to automate the CMS practices and enforce
SACM policies
Over emphasis on a technical focus, rather than a service and business focus
Degradation configuration information accuracy over time that can cause errors
and be difficult and costly to correct
Not keeping the CMS up to date due to the movement of hardware assets by nonauthorized staff
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
4-69
4-70
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Configuration Manager
Configuration Manager
Evaluates existing Configuration Management Systems (CMS) and
their design
Agrees to CIs to be uniquely identified with naming conventions.
Ensures that staff comply with identification standards for object
types, environments, processes, lifecycles, documentation, versions,
formats, baselines, releases, and templates
Proposes interfaces to and agrees to interfaces with Change
Management, Problem Management, Network Management, Release
Management, computer operations, logistics, finance, and
administration functions
Plans population of the CMS. Manages CMS, central libraries, tools,
common codes and data. Ensures regular maintenance of the CMS
Provides reports, including management reports (indicating
suggested action to deal with current or foreseen shortcomings),
impact analysis reports, and configuration status reports
56
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
4-71
Configuration Analyst
IBM Software Group | Tivoli software
Configuration Analyst
Proposes scope of the processes and recorded information Develops
Asset and Configuration Management standards, plans, and
procedures
Trains Asset and Configuration Management specialists
Creates Asset and Configuration Management processes and
procedures
Assists in uniquely identifying CIs with naming conventions
Ensures that developers and configuration system users comply with
identification standards
Liaises with the configuration administrator and librarian on
population of the CMS
Manages asset and CMS, central libraries, common codes and data
Uses or provides the asset and CMS to facilitate impact assessment
for RFCs
57
4-72
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Accepts and records the receipt of new or revised configurations into the
appropriate library
Works with other configuration libraries where CIs are common to other systems
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
4-73
20 08 IBM Corporation
4-74
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
60
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
4-75
4-76
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
62
Release and Deployment Management is important to ensure that there are clear release and
deployment plans. In addition, Release and Deployment Management makes sure that
skills and knowledge are transferred to operations and support staff. Furthermore, Release
and Deployment Management makes certain there is minimal unpredicted impact on
production services.
The release process commences with receipt of an approved RFC to deploy a productionready Release Package. Deployment commences with receipt of an approved RFC to
deploy a Release Package to a target deployment group or environment. Examples include
a business unit, customer group, or service unit.
Deployment is completed with a transfer of the new or changed service to Operations. This
transfer occurs when Change Management successfully completes a post implementation
review of the deployment.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
4-77
63
The ease and amount of change necessary to release and deploy a Release unit
The amount of resources and time needed to build, test, distribute, and implement
a release unit
The complexity of interfaces between the proposed unit and the rest of the
services and IT infrastructure
The storage available in the build, test, distribution, and live environments.
Releases should be uniquely identified according to a scheme defined in the release policy.
The release identification should include a reference to the CIs that it represents and a
version number that will often have two or three parts, for example, emergency fix releases:
Payroll_System v.1.1.1, v.1.1.2, v.1.1.3.
4-78
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
64
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
4-79
Planning:
Deployment planning
4-80
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Delivering rehearsals
Documenting rehearsals
Conducting pilots
Conducting assessments
Transferring services
Deploying services
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
4-81
Service V Model
The left side of the diagram represents the specification of the service requirements down
through the detailed service design.
The right side focuses on the validation activities that are performed using the
specifications defined on the left side.
At each stage on the left side, the equivalent group on the right side is directly involved.
4-82
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
67
The release process begins with receipt of an approved RFC to deploy a production-ready
release package. Deployment begins when an approved request to deploy a release package
to a target deployment group or environment is received
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
4-83
4-84
Authorized RFC
Service design package, including service model and service acceptance criteria
(SAC)
Exit and entry criteria for each stage of release and deployment
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
68
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
4-85
Some of the critical success factors in Release and Deployment Management are:
The new or changed service capability and resources are built in the target
environment or deployment group
The new or changed service has been tested against the Service Design
Re-usable test models are developed that can be used for regression testing in
future releases
4-86
Uncommitted staff
Incompetent management
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Poor communication
Poor design
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
4-87
70
Release Packaging and Build Management is the flow of work to deliver applications and
infrastructure that meet the Service Design requirements. The flow of work includes:
Establish requirements
Design
Build
Test
Deploy
Operate
Optimize
The Release Packaging and Build Manager cannot perform this role in isolation. This role
will have significant interaction with the following functions, among others:
4-88
Capacity Management
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Availability Management
Incident Management
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
4-89
Deployment Manager
IBM Software Group | Tivoli software
Deployment Manager
Coordinates release documentation and communications,
including training, and customer documentation, service
management, and technical release notes
Plans the deployment in conjunction with Change and
Service Knowledge Management Systems (SKMS) and
Service Asset Configuration Management (SACM)
Provides technical and application guidance and support
throughout the release process, including known errors
and workarounds
Provides feedback on the effectiveness of the release
Records metrics for deployment to ensure within agreedupon Service Level Agreements (SLAs)
71
4-90
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
20 08 IBM Corporation
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
4-91
73
Service Validation and Testing ensures that all new and changed services will successfully
achieve their purpose and use. If services are not adequately tested, prior to being
introduced into the live environment, it could lead to a rise in:
4-92
Incidents
Costs
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
In addition to these objectives, any errors or variances should be remedied early in the
Service Lifecycle, a considerably cheaper option than fixing errors in production.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
4-93
75
For testing to be successful, all parties must understand that it does not give any guarantees.
However, validation and testing provides a measured degree of confidence. The required
degree of confidence varies depending on the business requirements and pressures of an
organization.
4-94
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
76
Validation and Testing activities are not undertaken in a sequence. Service Validation and
Testing activities include:
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
4-95
4-96
Test Planning and Design: This activity begins early in the lifecycle. These
activities include:
Ensuring that the test model delivers adequate and appropriate test coverage
for the risk profile of the service
Verifying that the test model covers the key integration aspects and interfaces
Prepare the Test Environment: The release and deployment processes should
also be used to prepare the test environment when appropriate.
Perform Tests: Carry out and record the results of all tests according to test plans.
All results should be documented.
Evaluate Exit Criteria and Report: Compare actual results to predicted results.
Summarize the results of the test metrics.
Test Clean Up and Closure: Ensure that the test environments are cleaned up or
initialized. Identify areas for improvement.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
77
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
4-97
78
The direct output from testing is the report delivered to service evaluation. This report
covers the following information:
4-98
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
79
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
4-99
80
4-100
Encouraging a risk management culture where people share information and take
a pragmatic approach to risk
Building quality into every stage of the service lifecycle using a structured
framework such as the V-model
Testing provides evidence that the service assets and configurations have been
built and implemented correctly
Developing test models that can be used again for regression testing in future
releases
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Lack of understanding of the risks means that testing is not targeted at critical
elements
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
4-101
Test Manager
IBM Software Group | Tivoli software
Test Manager
Define the test strategy
Design and plan testing conditions, test scripts, and test data sets to
ensure appropriate and adequate coverage and control
Allocate and oversee test resources while implementing test policies
Provide management reporting on test progress, test outcomes,
success rates, issues, and risks
Conduct tests as defined in the test plans and design
Record, analyze, diagnose, report, and manage test events
Manage test environment requirements \
Verify tests conducted by release and deployment teams
Administer test assets and components
81
4-102
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
20 08 IBM Corporation
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
4-103
Evaluation
IBM Software Group | Tivoli software
Evaluation
The process responsible for assessing a new or changed
IT service to ensure that risks have been managed
Help determine whether to proceed with the change
83
4-104
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Objectives of Evaluation
IBM Software Group | Tivoli software
Objectives of Evaluation
Evaluate the intended effects and unintended effects
(depending on constraints) of a service change
Provide good quality outputs so that Change
Management can expedite decision about service change
approval
84
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
4-105
Evaluation Benefits
IBM Software Group | Tivoli software
Evaluation Benefits
Information will allow a more accurate focus on value in
future service development and Change Management
Continual Service Improvement can use evaluation to
analyze future improvements to the process of change
Enable predictions and measurement of service change
performance
85
4-106
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Evaluation Activities
IBM Software Group | Tivoli software
Evaluation Activities
Evaluation of predicted performance
Analyze test plan results
Evaluate risk
Evaluation of actual performance
Develop evaluation report
Complete evaluation report
86
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
4-107
87
4-108
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Evaluation KPIs
IBM Software Group | Tivoli software
Evaluation KPIs
Variance from service performance required by
customers (minimal and reducing)
Number of incidents against the service (low and
reducing)
Number of failed designs that have been transitioned
(zero)
Cycle time to perform an evaluation (low and reducing)
88
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
4-109
Evaluation Challenges
IBM Software Group | Tivoli software
Evaluation Challenges
Developing standard performance measures and methods across
projects and suppliers
Dealing with projects and suppliers inaccurately estimating delivery
dates
Understanding the different stakeholder perspectives that strengthen
effective risk management for the evaluation activities
Assessing the balance between managing and taking risks as it
affects service delivery
Demonstrating less variation in predictions during and after transition
Taking a pragmatic and measured approach to risk
Building a thorough understanding of risks that have impacted or
might impact successful Service Transition
Encouraging a risk management culture where people share
information
89
4-110
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
90
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
4-111
20 08 IBM Corporation
4-112
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
92
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
4-113
4-114
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
94
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
4-115
DIKW
IBM Software Group | Tivoli software
DIKW
Knowledge Management is usually displayed within the
DatatoInformationtoKnowledgetoWisdom (DIKW)
structure.
Data is a set of discrete facts about events.
Information comes from providing context to data.
Knowledge is composed of the tacit experiences, ideas,
insights, values, and judgments of individuals.
Wisdom gives the ultimate discernment of the material
and having the application and contextual awareness to
provide a strong common sense judgment.
95
4-116
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
4-117
Establishing the designated data and information items, content, form, and reason
Encouraging the use of common and uniform content and format requirements
Identifying changes
4-118
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
4-119
97
Effective Service Knowledge Management depends on the support and delivery by most,
if not all, of those working in and around IT Service Management. Service Knowledge
Management has the following specific inputs and outputs.
Service Operations
Service Knowledge Management will record and analyze errors within the service detected
during transition. These errors, along with consequences and workarounds, will be
communicated to Service Operations.
Operations Staff
Incident management staff, on service desk and second-line support, are the point of
capture for much of the everyday IT Service Management data. They must report their
actions completely in order for Service Knowledge Management to be effective. Problem
management staff will be key users of collected knowledge. They are typically responsible
for the normalization of data capture by means of developing and maintaining scripts
supporting data capture within incident management.
4-120
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Transition Staff
Service Transition staff capture data of relevance through all lifecycle phases. Therefore,
they need to be aware of the importance of collecting it accurately and completely.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
4-121
4-122
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
99
Identifies, controls and stores pertinent information not available by any other
means
Ensures all knowledge items are accessible to those who need them
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
4-123
4-124
Reason: Current application is not providing the level of financial support to the
business as needed.
Return: Employee efficiencies within the finance team and to the overall business
from Sales to Payroll capabilities
Risks: New system might not be accepted easily; resources will need retraining;
IT team is understaffed and will struggle to implement. Cost analysis was
inaccurate, and it will require added cost to get to production.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Resources Required: Hardware, software, subject matter experts with the new
tool set. Resources trained in main frame for change of processes, project team
such as project manager, application designer, and database manager.
As you learned, service transition does not end at change management. It also encompasses
release and service asset configuration management. Change provides the controls that are
necessary to bring a new application into an organization. However, release and service
asset configuration helps the organization to determine how this will be accomplished. For
example, a release unit of the new system might be payroll versus payables. The purpose
of this release unit is to minimize external facing risks for the first release of the tool set. In
addition, it will also help the organization to quickly revert back to the previous system if
redundancy was planned for at least first release.
As you can imagine, the roles involved in a service change such as this are extensive. The
unit describes the general ITIL service change roles. A more specific example is the
training team assigned to determine necessary training. A further example is the
communications team assigned to help advise the whole organization about the changes to
the new system. Consider other roles such as database administrators who oversee a new
system, or security to ensure system lock down and availability.
This scenario is one example of how Service Transition might be used in an organization.
Most organizations are already performing these types of tasks and efforts. However, it is
typically not structured, regimented, or controlled in the manner that ITIL v3 introduces.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
4-125
Review Questions
1.
Which of the following are objectives of Service Transition? Choose all that
apply.
a.Ensure that IT and the customers have a clear and unambiguous expectation of the
level of service to be delivered.
2.
b.
Set customer expectations on how the performance and use of the new or
changed service can be used to facilitate business change
c.
Help the business change project or customer to integrate a release into their
business processes and services.
d.
Which of the following describes the value Service Transition provides to the
business? Check all that apply.
a.Improves predictions of service levels and warranties for new and changed
services
3.
b.
c.
Aids understanding the level of risk during and after change, for example,
service outage, disruption, and rework
d.
4.
b.
Standard Change
c.
Emergency Change
d.
Service Change
4-126
b.
Standard Change
c.
Emergency Change
d.
Simple Change
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
5.
6.
b.
Change Request
c.
Configuration Item
d.
Release Unit
7.
b.
c.
d.
Which is the correct order for service activities in the Service V model?
a.Define Customer and Business Requirements, Design Service Release, Define
Service Requirements, Design Service Solution, Develop Service Solution
8.
b.
c.
d.
Which is the correct order for validation activities in the Service V model?
a.Validate Service Packages, Offerings, and Contracts, Service Acceptance Test,
Service Release Package Test, Component and Assembly Test, Service
Operational Readiness Test
b.
c.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
4-127
d.
9.
10.
b.
Change Request
c.
Service Request
d.
Service Change
11.
b.
Change Request
c.
Service Request
d.
Service Change
Which of the following choices is the goal to provide a logical model of the IT
infrastructure correlating IT services and components needed to deliver these
services? It completes this goal by defining and controlling the components of
services and infrastructure and maintaining accurate configuration records.
a.Service Asset and Configuration Management
12.
b.
c.
Change Management
d.
Which of the following choices is the goal of deploying releases into production
and ensuring effective use of the service to deliver value to the customer?
a.Service Asset and Configuration Management
4-128
b.
c.
Change Management
d.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
4-129
Review Answers
1.
Which of the following are objectives of Service Transition? Choose all that
apply.
b. Set customer expectations on how the performance and use of the new or
changed service can be used to facilitate business change
AND
c. Help the business change project or customer to integrate a release into their
business processes and services.
2.
Which of the following describes the value Service Transition provides to the
business? Check all that apply.
d. All of the above
3.
4.
5.
6.
7.
Which is the correct order for service activities in the Service V model?
b. Define Customer and Business Requirements, Define Service Requirements,
Design Service Solution, Design Service Release, Develop Service Solution
8.
Which is the correct order for validation activities in the Service V model?
c. Validate Service Packages, Offerings, and Contracts, Service Acceptance Test,
Service Operational Readiness Test, Service Release Package Test, Component
and Assembly Test
4-130
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
9.
10.
11.
Which of the following choices is the goal to provide a logical model of the IT
infrastructure correlating IT services and components needed to deliver these
services? It completes this goal by defining and controlling the components of
services and infrastructure and maintaining accurate configuration records.
a. Service Asset and Configuration Management
12.
Which of the following choices is the goal of deploying releases into production
and ensuring effective use of the service to deliver value to the customer?
b. Release and Deployment Management
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
4-131
Summary
IBM Software Group | Tivoli software
Summary
You should now be able to:
Explain the key principles and concepts related to
Service Transition
Discuss Service Transition processes and associated
activities
Describe the Service Transition roles
101
4-132
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
20 08 IBM Corporation
5-1
Introduction
In this unit, you will learn about Service Operation.
Objectives
IBM Software Group | Tivoli software
Objectives
Upon completion of this unit, you will be able to:
Explain the key principles and concepts related to
Service Operation
Discuss Service Operation processes and associated
activities
Describe the Service Operation roles
5-2
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
20 08 IBM Corporation
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
5-3
Service Operation
IBM Software Group | Tivoli software
Service Operation
The purpose of Service Operations is to coordinate and
to carry out activities and processes required to deliver
and manage services at agreed-upon levels to business
users and customers
5-4
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Many ITIL processes (such as Change Management and Capacity Management) originate
at the Service Design or Service Transition stage of the Service Lifecycle. However, these
processes are in use continually in Service Operation. Some processes are not included
specifically in Service Operation, such as Strategy Definition, the actual design process
itself. These processes focus more on longer-term planning and improvement activities.
Therefore, they are outside the direct scope of Service Operation. However, Service
Operation provides input and influences these regularly as part of the lifecycle of Service
Management.
All services require some form of technology to deliver them. Managing this technology is
not a separate issue, but an integral part of the management of the services themselves.
Regardless of what services, processes, and technology are managed, people determine the
demand for the services and products of organizations. Ultimately, people manage the
technology, processes, and services and are a key part of Service Operation.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
5-5
Any activity that forms part of a service is included in Service Operation. It does not matter
if the activity is performed by the Service Provider, an external supplier, or the user or
customer of that service.
5-6
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
However, a challenge to Service Operations exists. A service is expected to run within the
budget established earlier in the lifecycle. In reality, however, very few organizations plan
effectively for the costs of ongoing management of services.
Difficulty occurs obtaining funding during the operational phase to fix design flaws or
unforeseen requirements.
Design issues are often left to Incident and Problem Management to resolve, as though they
were purely operational issues.
It can be difficult to obtain funding for tools or actions, including training, that are aimed
at improving the efficiency of Service Operations.
Attempts to optimize the service or manage it more effectively are only seen as successful
if the service has had problems in the past. Some services are taken for granted.
Improvements are perceived as unnecessary and fixing services that are not broken.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
5-7
The possibility exists that a conflict might develop between maintaining the status quo and
adapting to changes in the business and technological environments.
Resolving the conflict and moving toward a best practice approach represents an
opportunity for growth and improvement.
5-8
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
External View of IT
IBM Software Group | Tivoli software
External View of IT
External view is based on services that are delivered. It
is the way in which services are experienced by users
and customers. These people might not always
understand, nor care about, the details of the technology
used to manage those services. All that concerns them is
that the services are delivered as required and agreed
upon.
Potential Weakness: Focusing only on business
requirements results in making promises that cannot be
kept
Focusing on business requirements without considering the methods and logistics required
to deliver the requirements results in making promises that can not be kept.
Service Operations should maintain a balance between an internal IT view and an external
business view.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
5-9
Internal View of IT
IBM Software Group | Tivoli software
Internal View of IT
The internal view of IT is the way in which IT components
and systems are managed to deliver the services
Potential Weakness: Focusing only on internal systems
results in expensive services that deliver little value
10
5-10
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
11
The function, performance, and architecture of a platform might change over a number of
years. With each change comes an opportunity to provide better levels of service to the
business.
Other changes happen quickly and sometimes under extreme pressure. For example, a
business unit acquires a large contract that requires additional IT services, more capacity,
and faster response times.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
5-11
5-12
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
13
Reactive Risks: Each project is dealt with as though it is the first occurrence. Therefore,
responding to business needs and incidents only after they are reported can cause delivery
of new services to take a long time. Staff turnover tends to be high and morale low, as IT
staff move from project to project without achieving a lasting, stable set of IT services.
Proactive Risks: Proactive behavior is typically seen as positive. However, being too
proactive can be expensive and can result in staff being distracted. Discouraging effort
investment in proactive Service Management can ultimately increase the effort and cost of
reactive activities and further risk stability and consistency in services.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
5-13
14
5-14
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
15
An integrated ITSM technology is needed that includes the following core functions:
Self-help capabilities
Integrated CMS
Remote control
Diagnostic utilities
Reporting
Dashboards
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
5-15
Integrated CMS
5-16
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Telephony
Diagnostic scripts
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
5-17
20 08 IBM Corporation
5-18
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Event Management
An event can be defined as any significant detectable
occurrence.
An occurrence is significant if it affects the management
of the IT infrastructure or the delivery of IT service.
Events are typically notifications created by an IT Service,
Configuration Item (CI), or monitoring tool.
17
Effective Service Operation depends on knowing the status of the infrastructure and
detecting any deviation from normal or expected operation. It is provided by good
monitoring and control systems, which are based on two types of tools:
Active monitoring tools that poll key CIs to determine their status and availability.
Any exceptions will generate an alert that needs to be communicated to the
appropriate tool or team for action.
The ability to detect events, make sense of them, and determine their appropriate control
action is provided by Event Management. Event Management is, therefore, the basis for
Operational Monitoring and Control. In addition, if these events are programmed to
communicate operational information, warnings, and exceptions, they can be used as a
basis for automating many routine Operations Management activities. Some examples of
Event Management:
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
5-19
5-20
The entry point for the execution of many Service Operation processes and
activities
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
5-21
Events that signify unusual, but not exceptional, operation. These indicate that the
situation might require closer monitoring. In some cases the condition will resolve
itself. An example is an unusual combination of workloads. As the workloads are
completed, normal operation is restored. In other cases, operator intervention
might be required if the situation is repeated or if it continues for too long. These
rules or policies are defined in the monitoring and control objectives for that
device or service. Examples of this type of event are:
5-22
Each example relies on the sending and receipt of a message of some type. These
are generally referred to as Event Notifications, and they do not happen without
previous configuration. The next section will explore exactly how events are
defined, generated, and captured.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
19
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
5-23
The Event Management process is initiated by an event. Event Management contains the
following activities:
Occurrence of event
Notification of event
Most CIs generate Event notifications using an open standard such as SNMP
(Simple Network Management Protocol).
Detection of event
The event is detected by an agent running on the same system, or transmitted
directly to a management tool that will read and interpret the event.
Event filtering
It is determined whether the event is informational, a warning, or an exception.
5-24
Categorization of event
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Informational: Informational refers to an event that does not require any action
and does not represent an exception.
Correlation of event
The significance of the event and the actions that should be taken is determined.
Initiation of a trigger
If a response is required, it is initiated using a trigger. For example, if a change is
required, a Change Trigger will initiate a Request for Change.
Selection of response: In this activity, responses to the event are chosen. They
could include:
Opening an RFC
Review of actions
Significant events or exceptions are handled and tracked appropriately.
Closing of event
Most events are not opened or closed. However, events that generated an incident,
problem, or change should be formally closed. A link to the appropriate record
from the other process should be included.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
5-25
21
Event Management can be initiated by any type of occurrence. The key is to define which
of these occurrences is significant and which need to be acted upon. Triggers include:
Event Management can interface to any process that requires monitoring and control. It is
especially effective for those processes that do not require real-time monitoring. However,
these processes do require some form of intervention following an event or group of events.
5-26
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
The primary IT Service Management (ITSM) relationships are with Incident Management,
Problem Management, and Change Management.
Capacity Management and Availability Management are critical in defining which events
are significant. In addition, they define what appropriate thresholds should be and how to
respond to them. In return, Event Management will improve the performance and
availability of services. It will respond to events when they occur and by reporting on actual
events and patterns of events. The reports will be used to determine (by comparison to SLA
targets and KPIs) if some aspect of the infrastructure design or operation can be improved.
Configuration Management can use events to determine the current status of any CI in the
infrastructure. Comparing events with the authorized baselines in the Configuration
Management System (CMS) will help to determine whether unauthorized activity is taking
place in the organizations.
Asset Management can use Event Management to determine the lifecycle status of assets.
For example, an event can be generated to signal that a new asset has been successfully
configured and is now operational.
Events can be a rich source of information that can be processed for inclusion in Knowledge
Management systems. For example, patterns of performance can be correlated with
business activity and used as input into future design and strategy decisions.
Event Management can play an important role in ensuring that potential impact on SLAs is
detected early. In addition, it can ensure that any failures are rectified as soon as possible
so that impacts on service targets are minimized.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
5-27
22
5-28
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
23
The main critical success factors for effective Event Management include:
Achieving the correct level of filtering. There are three keys to the correct level of
filtering:
Planning effectively for the rollout of the monitoring agent software across the
entire IT Infrastructure.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
5-29
5-30
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
24
The Service Desk is responsible for communicating information about this type of incident
to the relevant Technical or Application Management team and, where appropriate, the
user.
Technical and Application Management participates in the instrumentation of the service,
classify events, update correlation engines, and ensure that any auto responses are defined
during Service Design. During Service Transition, they will test the service to ensure that
events are properly generated. In addition, they will ensure that the defined responses are
appropriate. During Service Operation, Technical and Application Management will
typically perform Event Management for the systems under their control.
It is common for Event Monitoring and first-line response to be delegated to IT Operations
Management. Operators for each area are tasked with monitoring events, responding as
required, or ensuring that Incidents are created as appropriate.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
5-31
20 08 IBM Corporation
5-32
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Incidents Defined
IBM Software Group | Tivoli software
Incidents Defined
Unplanned interruption to an IT service
Reduction in the quality of an IT service
Failure of a configuration item that has not yet affected
service
26
An incident includes failure of a configuration item that has not yet affected service is also
an incident. An example is the failure of one disk from a mirror set.
Incident Management can include handling failures, questions, or queries reported by the
users. Examples of ways incidents can be reported include:
Incidents can also be reported, logged, or both, by technical staff. For example, technical
staff notice something unusual with a hardware or network component,. They can report or
log an incident and refer it to the Service Desk. However, all events are not necessarily
incidents. Many classes of events are not related to disruptions at all, but are indicators of
normal operation or are simply informational.
Although both incidents and Service Requests are reported to the Service Desk, they are not
the same. Service Requests do not represent a disruption to agreed-upon service. They
provide a way to meet the needs of the customers and can address an agreed-upon target in
a Service Level Agreement. Service Requests are dealt with by the Request Fulfillment
process.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
5-33
Incident Management
IBM Software Group | Tivoli software
Incident Management
Incident Management restores normal service operation
as quickly as possible and minimizes the adverse impact
on business operations, therefore ensuring that the best
possible levels of service quality and availability are
maintained
Normal service operation is defined as service operation
within Service Level Agreement (SLA) limits
27
Incident Management is the process for dealing with all incidents. This process can include:
Failures
Questions
Queries
Incident Management includes any event that disrupts, or that might disrupt, a service. It
includes events which are communicated directly by users, either through the Service Desk
or through an interface from Event Management to Incident Management tools.
5-34
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
28
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
5-35
29
Time Scales
Time scales must be agreed upon for all incident-handling stages. These will differ,
depending upon the priority level of the incident. Time scales will be captured as resolution
targets within Operational Level Agreements and Underpinning Contracts. All support
groups should be made fully aware of these time scales. Service management tools should
be used to automate time scales and escalate the incident as required based on predefined
rules.
Incident Modules
Many incidents are not new. They involve deal with something that has happened before
and might happen again. For this reason, many organizations find it helpful to predefine
standard incident models and apply them to appropriate incidents when they occur. An
incident model is a way of predefining the steps that should be taken to handle a process in
an agreed-upon way. Support tools can then be used to manage the required process. This
process will ensure that standard incidents are handled in a predefined path and within
predefined time scales.
5-36
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Major Incidents
A separate procedure, with shorter time scales and greater urgency, must be used for major
incidents. A definition of what constitutes a major incident must be agreed upon. In
addition, it must be ideally mapped to the overall incident prioritization system. Then, this
type of incident will be dealt with through the major incident process.
People sometimes use loose terminology or confuse a Major Incident with a problem. In
reality an incident remains an incident forever. It might grow in impact or priority to
become a Major Incident, but an incident never becomes a problem. A problem is the
underlying cause of one or more incidents and always remains a separate entity.
When necessary, the major incident procedure should include the dynamic establishment
of a separate major incident team under the direct leadership of the Incident Manager. This
team is formulated to concentrate on this incident alone to ensure adequate resources and
focus are provided to finding a swift resolution. Sometimes the Service Desk Manager also
fulfills the role of Incident Manager (for example, in a small organization). To avoid time
or priority conflicts, a separate person might need to be designated to lead the team. That
person should ultimately report back to the Incident Manager.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
5-37
All incidents must be fully logged and stamped with date and time, regardless of their
origin. They might be raised through a Service Desk telephone call or automatically
detected through an event alert. A separate Incident Record must be logged for each
additional incident handled. This record ensures that an historical record is kept and credit
is given for the work performed. All relevant information relating to the nature of the
incident must be logged so that a full historical record is maintained. If the incident has to
be referred to other support groups, they will have all the relevant information to assist
them.
The information needed for each incident is likely to include the following items:
5-38
Incident categorization (often broken down into between two and four levels of
subcategories)
Incident urgency
Incident impact
Incident prioritization
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Description of symptoms
Closure category
Part of the initial logging must allocate suitable incident categorization coding so that the
exact type of the call is recorded. This code will be important later when looking at incident
types and frequencies. Therefore, trends for use in Problem Management, Supplier
Management, and other ITSM activities can be established. Multilevel categorization is
available in most tools, typically to three or four levels of granularity. For example, an
incident might be defined as one of the following categories:
Hardware
Server
Memory Board
Software
Application
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
5-39
31
5-40
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
32
The ability to detect and resolve incidents results in lower downtime to the
business, which in turn means higher availability of the service. The business is
then able to use the functionality of the service as designed.
The Service Desk can, during their handling of incidents, identify additional
service or training requirements found in IT or the business.
Incident Management is highly visible to the business. It is, therefore, easier to demonstrate
the value than most areas in Service Operation. For this reason, Incident Management is
often one of the first processes to be implemented in Service Management projects. An
added benefit is that Incident Management can be used to highlight other areas that need
attention. Therefore, justification for expenditure on implementing other processes is
provided.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
5-41
33
Incident Identification
Incident Logging
All incidents must be fully logged, date stamped, and time stamped. Logging
should occur for incidents that are raised through a Service Desk call and
those automatically detected by an event alert.
Incident Categorization
Initial logging should include allocation of suitable incident categorization coding
so that the exact type of the call is recorded.
Incident Prioritization
Logging the incident must include agreement and allocation of an appropriate
prioritization code.
5-42
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Escalation
The Service Desk should keep the user informed of any relevant escalation that
takes place. It should ensure the Incident Record is updated accordingly to keep a
full history of actions.
Incident Closure
The Service Desk should check that the incident is fully resolved. In addition, it
should be determined that users are satisfied and willing to agree that the incident
can be closed.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
5-43
Incident Prioritization
IBM Software Group | Tivoli software
Incident Prioritization
Prioritization can normally be determined by taking into
account both:
The urgency of the incident (how quickly the business
needs a resolution)
The level of impact it is causing
34
Every incident should have an appropriate prioritization code. This code will determine
how the incident is handled both by support tools and support staff.
An indication of impact is often, but not always, the number of users being affected. In
some cases, the loss of service to a single user can have a major business impact. It all
depends upon who is trying to do what. Therefore, numbers alone are not enough to
evaluate overall priority.
5-44
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Incident Priorities
IBM Software Group | Tivoli software
Priorities
35
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
5-45
Impact
The extent to which an incident leads to a departure from
expected service operations, such as the number of users or CIs
affected
Urgency
The required speed of resolving an Incident
36
5-46
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
If the incident has been routed through the Service Desk, the Service Desk Operator must
carry out initial diagnosis. This diagnosis typically occurs while the user is still on the
telephone. If the call is raised in this way, the operator tries to discover the full symptoms
of the incident. In addition, the operator tries to determine exactly what has gone wrong and
how to correct it. It is at this stage that diagnostic scripts and known error information can
be most valuable in facilitating earlier and accurate diagnosis.
If possible, the Service Desk Operator will resolve the incident while the user is still on the
telephone. In addition, the operator will close the incident if the resolution is successful.
Sometimes the Service Desk Operator cannot resolve the incident while the user is still on
the telephone. However, there is a prospect that the Service Desk might be able to resolve
it within the agreed-upon time limit without assistance from other support groups. In this
case, they should inform the user of their intentions, give the user the incident reference
number, and attempt to find a resolution.
In some incidents the user is just seeking information. In this case, the Service Desk should
be able to provide the information fairly quickly and resolve the service request. However,
if a fault is being reported, it is an incident and likely to require some degree of investigation
and diagnosis.
Each of the support groups involved with the incident handling will investigate and
diagnose what has gone wrong. All such activities (including details of any actions taken
to try and resolve or re-create the incident) should be fully documented in the incident
Copyright IBM Corp. 2009
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
5-47
record. This documentation ensures that a complete historical record of all activities is
maintained at all times.
Valuable time can often be lost if investigative and diagnostic action (or indeed resolution
or recovery actions) are performed serially. Where possible, such activities should be
performed in parallel to reduce overall time scales, and support tools should be designed
and selected to permit this parallel action. However, care should be taken to coordinate
activities, particularly resolution or recovery activities. Otherwise, the actions of different
groups might conflict or further complicate a resolution.
5-48
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Incident Escalation
IBM Software Group | Tivoli software
Incident Escalation
Functional Escalation
Hierarchical Escalation
38
Functional Escalation
Sometimes it becomes clear that the Service Desk cannot resolve the incident themselves.
In addition, sometimes the target times for first point resolution have been exceeded. In
either case, the incident must be immediately escalated for further support. If the
organization has a second-level support group, the Service Desk should refer the incident
to them. However, sometimes it is obvious that the incident will need deeper technical
knowledge. Also, there are times when the second-level group has not been able to resolve
the incident within agreed-upon target times. In either of these cases, the incident must be
immediately escalated to the appropriate third-level support group.
Note: Third-level support groups might be internal, but they might also be third parties such
as software suppliers or hardware manufacturers.
The rules for escalation and handling of incidents must be agreed upon in Operational Level
Agreements (OLAs) and Underpinning Contracts (UCs). Rules must exist for internal and
external support groups.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
5-49
Hierarchic Escalation
If incidents are of a serious nature (for example, priority 1 incidents), the appropriate IT
managers must be notified, for informational purposes at least. Hierarchic escalation is also
used if the Investigation and Diagnosis or Resolution and Recovery steps are taking too
long. They are also used if the steps are proving to be too difficult. Hierarchic escalation
should continue up the management chain so that senior managers are aware, can be
prepared, and take any necessary action, such as allocating additional resources or
involving suppliers. Hierarchic escalation is also used when there is contention about to
whom the Incident is allocated. Hierarchic escalation can be initiated by the affected users
or customer management as they see fit. Therefore, it is important to make IT managers
aware so that they can anticipate and prepare for any such escalation.
The exact levels and time scales for both functional and hierarchic escalation need to:
Be agreed upon
The tools can then be used to police and control the process flow within agreed-upon time
scales.
The Service Desk should keep the user informed of any relevant escalation that takes place.
In addition, the service desk should ensure the incident record is updated accordingly. This
record will keep a full history of actions.
5-50
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
When a potential resolution has been identified this should be applied and tested. The
specific recovery actions and the people who will be involved them might vary, depending
upon the nature of the fault.
In some cases it might be necessary for two or more groups to take separate, though perhaps
coordinated, recovery actions for a resolution. In such cases, Incident Management must
coordinate the activities and interact with all parties involved.
Regardless of the actions taken, or who does them, the incident record must be updated
accordingly. The update should include all relevant information and details. This update
ensures that a full history is maintained. The resolving group should pass the incident back
to the Service Desk for closure action.
The Service Desk should check that the incident is fully resolved. In addition it should
check that the users are satisfied and willing to agree that the incident can be closed.
Some organizations might use an automatic closure period on specific, or even all,
incidents. For example, the incident will be automatically closed after two working days if
no further contact is made by the user. When this approach is considered, it must first be
fully discussed and agreed upon with the users. It also needs to be widely publicized so that
all users and IT staff are aware of the method. It might be inappropriate to use this method
for certain types of incidents, such as Major Incident or those involving VIPs. Despite all
adequate care, sometimes incidents recur, even though they have been formally closed.
Because of such cases, it is wise to have predefined rules regarding if and when an incident
Copyright IBM Corp. 2009
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
5-51
can be re-opened. It might make sense, for example, to agree that if the incident recurs
within one working day then it can be reopened. However, beyond this point a new incident
must be raised, but it should be linked to the previous incidents.
5-52
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
40
Problem Management: Incident Management forms part of the overall process of dealing
with problems in the organization. Incidents are often caused by underlying problems,
which must be solved to prevent the incident from recurring. Incident Management
provides a point where incidents are reported.
Configuration Management: This role provides the data used to identify and track the
progress of solving incidents. Uses of the Configuration Management System (CMS)
include:
The CMS contains information about which categories of incident should be assigned to
which support group. In turn, Incident Management can maintain the status of faulty CIs.
It can also assist Configuration Management to audit the infrastructure when working to
resolve an incident.
Change Management: Where a change is required to implement a workaround or
resolution, the change needs to be logged as a Request for Change (RFC). It is then sent
through Change Management. In turn, Incident Management is able to detect and resolve
incidents that arise from failed changes.
Copyright IBM Corp. 2009
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
5-53
5-54
Impact definitions
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
41
Most information used in Incident Management comes from the following sources:
Incident categories
Diagnostic scripts
Incident classification
Name and identity of the person recording and updating the Incident Record
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
5-55
5-56
Closure details
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
42
The metrics that should be monitored and reported upon to judge the efficiency and
effectiveness of the Incident Management process, and its operation, will include:
Percentage of Incidents handled within agreed response time (incident responsetime targets might be specified in SLAs, for example, by impact and urgency
codes)
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
5-57
Number and percentage of Incidents resolved remotely, without the need for a
visit
Reports should be produced under the authority of the Incident Manager. This person
should draw up a schedule and distribution list. These actions should be done in
collaboration with the Service Desk and support groups handling incidents. Distribution
lists should at least include IT services management and specialist support groups.
Consider also making the data available to users and customers, for example, through SLA
reports.
5-58
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
43
Skilled and customer oriented support staff at all stages of the process.
Well defined agreements that influence and shape the correct behavior of all
support staff.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
5-59
Incident Manager
IBM Software Group | Tivoli software
Incident Manager
Driving the efficiency and effectiveness of the Incident Management
process
Producing management information
Managing the work of incident support staff (first line and second line)
Monitoring the effectiveness of Incident Management and making
recommendations for improvement
Developing and maintaining the Incident Management systems
Managing major incidents
Developing and maintaining the Incident Management process and
procedures
44
The main role of Incident Management is that of the Incident Manager. In many
organizations the role of Incident Manager is assigned to the Service Desk supervisor. In
larger organizations with high volumes, a separate role might be necessary. In both cases,
it is important to give the Incident Manager the authority to manage incidents effectively
through the first, second, and third lines.
5-60
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
20 08 IBM Corporation
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
5-61
Request Fulfillment
IBM Software Group | Tivoli software
Request Fulfillment
Request Fulfillment is the process of dealing with Service
Requests from the users
Service Requests are a generic description for varying
types of demands that are placed upon the IT department
by the users
The scale and frequent, low-risk nature of Service
Requests mean that they are better handled by a process
separate from Change Management or Incident
Management
46
The term Service Request is used as a generic description for varying types of demands that
are placed upon the IT department by the users. Many of these demands are actually small
changes that are low risk, frequently occurring, and low cost. Examples of these changes
are:
Their scale and frequent, low-risk nature means that they are better handled by a separate
process. Otherwise, they might congest and obstruct the normal incident and change
management processes.
Request Fulfillment is the processes of dealing with service requests from the users. The
objectives of Request Fulfillment process include:
5-62
To provide a channel for users to request and receive standard services for which a
predefined approval and qualification process exists
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
The value of Request Fulfillment is to provide quick and effective access to standard
services. Business staff can use these services to improve their productivity or the quality
of business services and products.
Request Fulfillment effectively reduces the bureaucracy involved in requesting and
receiving access to existing or new services. Therefore, it also reducing the cost of
providing these services. Centralizing fulfillment also increases the level of control over
these services. This in turn can help reduce costs through centralized negotiation with
suppliers, and can also help to reduce the cost of support.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
5-63
47
5-64
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
5-65
5-66
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
50
Menu Selection:
Users should be offered a menu type selection using a web interface to select and
input details of Service Requests from a pre-defined list. Then, appropriate
expectations can be set by giving target delivery or implementation target dates.
Financial Approval:
The cost of fulfilling the request must first be established.
Other Approval:
In some cases, further approval might be needed.
Fulfillment:
Some simpler requests might be completed by the Service Desk. Others might
have to be forwarded to specialist groups or suppliers for fulfillment
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
5-67
51
5-68
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
52
The Request Fulfillment process requires input from the following sources:
The date and time when the request was logged as well as the date and time of
all actions taken
Closure details
Requests for Change when the Request Fulfillment process is initiated by an RFC
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
5-69
5-70
The Service Portfolio which will identify the scope of the agreed Service Request
to be identified
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
5-71
54
Agreement about the services that will be standardized, the authorization process,
and the cost
Identification of a single point of contact which can be used to request the service
5-72
Poorly defined scope, where people are unclear about exactly what the process is
expected to handle
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Badly designed or operated back-end fulfillment processes that can't handle the
requests being made
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
5-73
55
5-74
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
20 08 IBM Corporation
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
5-75
Problem Management
IBM Software Group | Tivoli software
Problem Management
A problem is the unknown cause of one or more incidents
Problem Management includes the activities required to
diagnose the root cause of incidents and to determine the
resolution to those problems
Problem Management will also maintain information about
problems and the appropriate workarounds and resolutions
Problem Management works together with Incident
Management and Change Management to ensure that IT
service availability and quality is increased
57
5-76
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
5-77
58
Creating a Known Error Record in the Known Error Database ensures quicker diagnosis.
In addition, the creation of a Problem Model for handling such problems in the future might
be helpful. This concept is similar to the idea of Incident Models, but applied to problems
and incidents.
The Known Error record should hold exact details of the fault and the symptoms that
occurred. It should also contain precise details of any workaround or resolution that can
restore the service and resolve the problem. An incident count will also be useful to
determine the frequency with which incidents are likely to recur and influence priorities.
Care should be taken to avoid duplication of records, the same problem described in two or
more ways as separate records. To avoid repetition, the Problem Manager should be the
only person able to enter a new record. Other support groups should be permitted, indeed
encouraged, to propose new records. However, these should be examined by the Problem
Manager before entry to the KEDB.
5-78
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
The KEDB should be used during the incident and problem diagnosis phases to speed up
the resolution process. New records should be added as quickly as possible when a new
problem has been identified and diagnosed. All support staff should be fully trained and
know the value that the KEDB can offer and the way it should be used. They should be able
to readily retrieve and use data.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
5-79
Workaround
IBM Software Group | Tivoli software
Workaround
A workaround is a temporary way of overcoming a
difficulty
When a workaround is found, it is therefore important that
the:
Problem record remains open
Details of the workaround are documented within the problem
record
59
In some cases it might be possible to find a workaround to the incidents caused by the
problem.
An example of a workaround would be:
A manual amendment is made to an input file to permit a program to complete the
run successfully. In addition, it ensures the billing process completes
satisfactorily. However, it is important that work on a permanent resolution
continues when justified. In this example, the reason why the file became
corrupted in the first place must be found and corrected to prevent this situation
from happening again.
5-80
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
5-81
Notice how the Reactive side of the illustration tends to be solving current problems.
Toward the right on the continuum, the Proactive approach to problem management has
more management and strategies to avoid problems.
5-82
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
This chart shows the Problem Management process flow. Though there can be variations
depending on the problems, most problems will be managed through a similar flow process.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
5-83
63
5-84
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
64
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
5-85
5-86
Problem Logging: Regardless of the detection method, all the relevant details of
the problem must be recorded so that a full historic record exists. This must be
date and time stamped to allow suitable control and escalation.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Problem Closure: When any change has been completed and reviewed, and the
resolution has been applied, the Problem Record should be formally closed
Major Problem Review: After every major problem, while memories are still
fresh, a review should be conducted to learn any lessons for the future
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
5-87
5-88
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
5-89
5-90
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
68
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
5-91
Problem Manager
IBM Software Group | Tivoli software
Problem Manager
Smaller organizations might not be able to justify a fulltime employee for this role.
It can be combined with other roles in such cases.
The role of Problem Management must not be left only to
technical staff.
A single point of coordination and an owner of the
Problem Management process is essential.
69
This role will coordinate all problem management activities and will have specific
responsibility for the following duties:
5-92
Works with all problem resolution groups to ensure swift resolution of problems
within SLA targets.
Owns the Known Error Database. Acts as the gatekeeper for the inclusion of all
Known Errors and management of search algorithms.
Works with suppliers and contractors to ensure that external vendors fulfill their
contractual obligations to resolve problems.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
20 08 IBM Corporation
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
5-93
Access Management
IBM Software Group | Tivoli software
Access Management
Access Management is the process of controlling which
users can and cannot use a service
Some organizations refer to it as Rights Management or
Identity Management
Access Management is the process that helps users use
the services that are documented in the Service Catalog.
71
The Access Management process and the related policies are likely to be defined and
maintained by Information Security Management. It is completed by the various Service
Operation functions.
5-94
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
72
Access: The level and extent of a services operation or data that a user is entitled to use.
Identity: The information about a user that distinguishes that person as a unique individual
and which verifies their status within the organization.
Rights or privileges: The actual settings whereby a user is provided access to a service or
group of services. Typical rights, or levels of access, include read, write, execute, change,
delete.
Services or service groups: It is not effective to provide access to each service for each
user separately. It is more efficient to grant each user, or group of users, access to a set of
services at the same time.
Directory Services: A specific type of tool that is used to manage access and rights.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
5-95
5-96
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
5-97
75
Verifying Access: Access Management needs to verify every request for access to an IT
service from two perspectives:
That the user requesting access is who they say they are
Providing Rights: Access Management does make IT service access decisions, but
executes the policies and regulations defined during Service Strategy and Service Design
5-98
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Monitoring Identity Status: As users work in the organization, their roles change and so
also do their needs to access services. Examples of changes include:
Job changes
Promotions or demotions
Transfers
Resignation or death
Retirement
Disciplinary action
Dismissals
Removing or Restricting Rights: Access Management will execute the decisions and
policies made during Service Strategy and Design and also decisions made by managers in
the organization
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
5-99
76
Access Management is triggered by a request for a user or users to access a service or group
of services. This could originate from any of the following:
An RFC
A Service Request
Access Management should be linked to the Human Resource processes to verify the
identity of the users. In addition, this interface can ensure that they are entitled to the
services being requested.
Information Security Management is a key driver for Access Management as it will provide
the security and data protection policies and tools needed to execute Access Management.
Change Management plays an important role as the means to control the actual requests for
access. This is because any request for access to a service is a change, although it is usually
processed as a Standard Change or Service Request. SLM maintains the agreements for
access to each service including:
5-100
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
The level of access that will be will be granted to different types of user
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
5-101
77
5-102
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
78
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
5-103
5-104
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
20 08 IBM Corporation
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
5-105
Service Desk
IBM Software Group | Tivoli software
Service Desk
A Service Desk deals with a variety of service events,
often made through telephone calls, Web interface, or
automatically reported infrastructure events
The nature, type, size, and location of a Service Desk will
vary, depending upon the type of business, number of
users, geography, complexity of calls, scope of services,
and many other factors
81
A Service Desk is a functional unit made up of a dedicated number of staff responsible for
dealing with a variety of service events. These events are often made through telephone
calls, Web interface, or automatically reported infrastructure events. The Service Desk is a
vitally important part of the IT Department of an organization. The Service Desk should be
the single point of contact for IT users on a day-to-day basis. The Service Desk will handle
all incidents and service requests, typically using specialist software tools to log and
manage all such events.
A good Service Desk can often compensate for deficiencies elsewhere in the IT
organization. However, a poor Service Desk, or the lack of one, can give a poor impression
of an IT organization.
Providing the correct caliber of staff for the Service Desk is important. To improve staff
retention, IT managers should do their best to make the desk an attractive place to work.
The exact nature, type, size, and location of a Service Desk will vary, depending upon the
many factors, including those listed:
5-106
Type of business
Number of users
Geography
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Complexity of calls
Scope of services
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
5-107
82
The primary aim of the Service Desk is to restore normal service to the users as quickly as
possible. In this context, restore normal service is meant in the widest possible sense. For
example, restoration can involve fixing a technical fault, fulfilling a service request, or
answering a query. The phrase means to do anything that is needed to ensure the users to
satisfactorily return to work.
Specific responsibilities will include:
5-108
Logging all relevant incident and service request details, allocating categorization
and prioritization codes
Resolving all the incidents and service requests that they can
Escalating incidents and service requests that they cannot resolve within the
agreed-upon time scales
Conducting customer and user satisfaction callbacks and surveys as agreed upon
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
83
The main function of the Service Desk is to restore the normal service to the users as
quickly as possible. Restoring to normal service can include repairing a technical fault, or
fulfilling a service request, or answering a query. It involves whatever is needed to help the
users to return to an agreed-upon level of work.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
5-109
84
5-110
Staff can develop higher skill levels. More frequent occurrence of events provides
greater familiarization with their resolution.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
It might still be necessary to maintain some form of local presence to handle physical
support requirements. However, such staff can be managed and deployed from the central
desk.
Off-shoring
Outsourcing
Note: Safeguards are needed in all of these circumstances to ensure consistency and
uniformity in service quality and cultural terms.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
5-111
This image illustrates types of Service Desks and covers Local, Centralized, and Virtual
applications of the Service Desk.
Local Service Desk: Service desk is co-located within or physically close to the user
community it serves. This location often aids communication and gives a clearly visible
presence. Some users like this approach. However, it can often be inefficient and expensive
to resource. Staff are tied up waiting to deal with incidents when the volume, and arrival
rate of calls might not be justified.
Centralized Service Desk: Service desks are merged into a single location or into a smaller
number of locations. This merging is done by drawing the staff into one or more centralized
Service Desk structures. This setup can be more efficient and cost-effective. It leads to
fewer overall staff to deal with a higher volume of calls. It can also lead to higher skill levels
through great familiarization because of more frequent occurrence of events.
Virtual Service Desk: Virtual Service Desk uses technology, particularly the Internet, and
the use of corporate support tools. It is possible to give the impression of a single,
centralized Service Desk. In fact, the personnel might be spread or located in any number
or type of geographical or structural locations.
Local User: A user who is at the same physical location as the Service Desk.
Remote User: This user and the Service Desk are at physically separate locations.
5-112
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
An organization must ensure that the correct number of staff are available at any time to
match business demand. Call rates can be volatile. Often in the same day, the arrival rate
might go from very high to very low and back again. An organization must decide on the
level and range of skills it requires of service desk staff. It must then ensure that these skills
are available at the appropriate times. A range of skill options are possible. These options
include:
A technical service desk including the most technically skilled staff in the
organization
All Service Desk staff should be adequately trained before they take calls. IT managers
need to recognize the importance of the Service Desk and its staff and give the Service Desk
special attention. Any significant loss of staff can be disruptive and lead to inconsistent
service. Therefore, efforts should be made to make the Service Desk an attractive place to
work.
Many organizations find it useful to appoint or designate a number of Super Users
throughout the user community. These Super Users act as liaison points with IT in general
and the Service Desk in particular. Super Users can be given some additional training and
awareness and used as a conduit for communications flow in both directions. They can filter
requests and issues raised by the user community, in some cases even going as far as to raise
incidents or requests themselves. This practice can help prevent incident storms, when a
Copyright IBM Corp. 2009
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
5-113
key service or component fails and affects many users. Super Users can also transmit
information from the Service Desk outward quickly.
5-114
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
87
Metrics should be established so that the performance of the Service Desk can be evaluated
at regular intervals. Regular evaluation is important to assess the health, maturity,
efficiency, and effectiveness of Service Desk operations. In addition, it helps awareness of
opportunities to improve Service Desk operations.
Detailed metrics are needed and must be examined over a period of time. These will include
the call-handling statistics previously mentioned in telephony, and the following metrics:
The first-line resolution rate: the percentage of calls resolved at first line, without
the need for escalation to other support groups
The number of calls broken down by time of day and day of week, combined with
average call time, is a critical in determining the number of staff required
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
5-115
20 08 IBM Corporation
5-116
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Technical Management
IBM Software Group | Tivoli software
Technical Management
Technical Management ensures that the knowledge
required to design, test, manage, and improve IT services
is identified, developed, and refined
Technical Management ensures that resources are
effectively trained and deployed to design, build,
transition, operate, and improve the technology required
to deliver and support IT services
89
By performing these two roles, Technical Management is able to ensure that the
organization has access to the right type and level of human resources to manage
technology. Therefore, it is able to meet business objectives. Part of this role is also to
ensure a balance between the skill level, utilization, and the cost of these resources.
Technical Management has an additional but important role. It is to provide guidance to IT
Operations regarding how best to maintain the ongoing operational management of
technology.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
5-117
90
The objectives of Technical Management are to help plan, implement, and maintain a stable
technical infrastructure to support the business processes of the organization through:
5-118
The swift use of technical skills to quickly diagnose and resolve any technical
failures that do occur
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Application Management
IBM Software Group | Tivoli software
Application Management
Application Management plays a role in all applications,
whether purchased or developed in-house.
One of the key decisions to which they contribute is the
decision of whether to buy an application or build it.
After that decision is made, Application Management
performs a dual role.
91
In the first role, Application Management is the custodian of technical knowledge and
expertise related to managing applications. In this role Application Management, working
together with Technical Management, ensures that the knowledge required to design, test,
manage, and improve IT services is identified, developed, and refined.
In the second role, Application Management provides the actual resources to support the IT
Service Management Lifecycle. In this role Application Management ensures that
resources are effectively trained and deployed to perform the following functions when
developing technology required to deliver and support IT services:
Design
Build
Transition
Operate
Improve
By performing these two roles, Application Management is able to ensure that the
organization has access to the right type and level of human resources to manage
applications. Therefore, the organization is able to meet business objectives. This function
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
5-119
starts in Service Strategy, expands in Service Design, is tested in Service Transition, and is
refined in Continual Service Improvement.
5-120
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
92
The assurance that the necessary functionality is available to achieve the required
business outcome
Swift use of technical skills to quickly diagnose and resolve any technical failures
that do occur
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
5-121
Operations Management
IBM Software Group | Tivoli software
Operations Management
The Operations Management function implements the
ongoing activities and procedures required to manage
and maintain the IT infrastructure.
These activities facilitate the delivery and support IT
services at the agreed-upon levels
93
5-122
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
94
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
5-123
Log an incident
Gain information
A frequent example is users stating they cannot log in to their e-mail. This Service Request
can be an incident, depending on the issue. This situation can become a problem if the
incident is not quickly solved or proves to be shown of a greater challenge. Examples are:
If the user can not log in because a disk is out of space and system is shut down
Alternatively, perhaps the user is a contractor hired to assist with the installation of the
financial system. The user might have called to acquire an e-mail account. The user was
then told to request a service. ITIL v3 calls this a Service Offering.
Events that are typically driven through automated system alerts can also be classified as
an incident. Examples:
The security software or spyware sent a red alert to the incident tool set to alert of
a concern
The e-mail database server sent an alert of disk space running out
These alerts are then worked or moved through automation to a team assigned to work the
issue. This team must bring service back into the availability mandated by the Service Level
Agreement.
5-124
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
This unit described problem management. Consider for a moment the examples here and
what might bring them into focus or scrutiny by the problem team. Perhaps it is the
frequency for which they have occurred. For example, the e-mail system has run out of
space before, or the spyware has alerted the system several days before. In these cases, if
the problem team was focused on analysis and proactive problem management, they will
see frequency as an issue. Perhaps it is time to allocate additional disk space or to change
archive settings. Or, perhaps the spyware has located an exposed hacker risk, or is simply
not adequate for the current version. These things being investigated through a problem
record for research and resolution will move into the Problem Management space.
Service Operations consist of standard roles within organizations such as service desk
manager and service desk staff. However, not all organizations have problem managers.
Some organizations have size and staff issues. Some are not yet mature in their ITIL
adoption to have established true ITIL problem management. As an organization develops
and begins the path to Service Operations, it is critical to establish roles and ownership.
These roles ensure that the business benefits from the full value of the processes. They will
be able to move into the continual service improvement processes, when they have aligned
the organizations roles towards ITIL.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
5-125
Review Questions
1.
The goal of which of the following choices is to deploy releases into production
and to ensure effective use of the service in order to deliver value to the customer?
a.Service Asset and Configuration Management
2.
b.
c.
Change Management
d.
3.
b.
c.
d.
Which of the following choices deals with any occurrence that has significance
for the management of the IT infrastructure or the delivery of IT service?
a.Event Management
4.
b.
Problem Management
c.
Incident Management
d.
Access Management
5-126
b.
Problem Management
c.
Incident Management
d.
Access Management
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
5.
Which of the following roles deals with the unknown cause of one or more
incidents?
a.Event Management
6.
b.
Problem Management
c.
Incident Management
d.
Access Management
Which of the following roles manages the overall desk activities and acts as
further escalation point for the supervisors?
a.Problem Manager
7.
b.
Incident Manager
c.
d.
Which of the following roles provides first-level support through taking calls and
handling the resulting incidents or service requests?
a.Problem Manager
8.
b.
Incident Manager
c.
d.
9.
b.
Incident Manager
c.
d.
Which of the following roles owns the Known Error Database and acts as the
gatekeeper for the inclusion of all Known Errors?
a.Problem Manager
b.
Incident Manager
c.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
5-127
d.
10.
11.
b.
c.
d.
12.
b.
c.
d.
Which of the following management functions has the role of implementing the
ongoing activities and procedures required to manage and maintain the IT
infrastructure?
a.Application Management Function
5-128
b.
c.
d.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
5-129
Review Answers
1.
The goal of which of the following choices is to deploy releases into production
and to ensure effective use of the service in order to deliver value to the customer?
b. Release and Deployment Management
2.
Which of the following are conflicting balances in Service Operation? Select all
that apply.
a. Quality versus Cost of Service
b. Stability versus Responsiveness
c. Reactive versus Proactive
d. IT Services versus Technology Components
3.
Which of the following choices deals with any occurrence that has significance
for the management of the IT infrastructure or the delivery of IT service?
a. Event Management
4.
5.
Which of the following roles deals with the unknown cause of one or more
incidents?
b. Problem Management
6.
Which of the following roles manages the overall desk activities and acts as
further escalation point for the supervisors?
c. Service Desk Manager
7.
Which of the following roles provides first-level support through taking calls and
handling the resulting incidents or service requests?
d. Service Desk Analyst
8.
9.
5-130
Which of the following roles owns the Known Error Database and acts as the
gatekeeper for the inclusion of all Known Errors?
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
a. Problem Manager
10.
11.
12.
Which of the following management functions has the role of implementing the
ongoing activities and procedures required to manage and maintain the IT
infrastructure?
b. IT Operations Management Function
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
5-131
Summary
IBM Software Group | Tivoli software
Summary
You should now be able to:
Explain the key principles and concepts related to
Service Operation
Discuss Service Operation processes and associated
activities
Describe the Service Operation roles
96
5-132
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
20 08 IBM Corporation
6-1
Introduction
In this unit, you will learn about Continual Service Improvement.
Objectives
IBM Software Group | Tivoli software
Objectives
Upon completion of this unit, you will be able to:
Explain the key principles and concepts related to
Continual Service Improvement
Discuss Continual Service Improvement processes and
associated activities
Describe the Continual Service Improvement roles
6-2
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
20 08 IBM Corporation
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
6-3
The dominant pattern in the lifecycle is the sequential progress. This progress goes from
Service Strategy through Service Design, Service Transition, Service Operation and back
to Service Strategy through CSI. However, that is not the only pattern of action. Every
element of the lifecycle provides points for feedback and control, which are channeled
through CSI.
6-4
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
6-5
CSI Objectives
IBM Software Group | Tivoli software
6-6
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
6-7
6-8
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Financial Benefits
IBM Software Group | Tivoli software
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
6-9
IT Organization Benefits
IBM Software Group | Tivoli software
10
6-10
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
11
Goals and Objectives: the inputs and outputs of a process are identified
Baselines: the current performance of the process is recorded as a starting point or baseline
level
Key Performance Indicators (KPIs): set to measure against and determine the quality of
the service
Metrics: measurements are taken and compared to the determined KPIs
Governance: External and internal requirements for services which help shape goals and
objectives
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
6-11
12
It is important to remember that there are three types of metrics that an organization will
need to collect to support CSI activities as well as other process activities. The types of
metrics are:
6-12
Technology metrics: These metrics are often associated with component and
application based metrics such as performance and availability.
Process metrics: These metrics are captured in the form of CSFs, KPIs, and
activity metrics for the service management processes. These metrics can help
determine the overall health of a process. Four key questions that KPIs can help
answer are around quality, performance, value, and compliance of following the
process. CSI would use these metrics as input in identifying improvement
opportunities for each process.
Service metrics: These metrics are the results of the end-to-end service.
Component metrics are used to compute the service metrics.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
CSI Principles
IBM Software Group | Tivoli software
CSI Principles
For all services and the underlying ITSM processes,
service improvement must focus on:
Increasing the efficiency
Maximizing the effectiveness
Optimizing the cost
13
The only way to focus on these principles is to ensure that improvement opportunities are
identified throughout the entire service lifecycle.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
6-13
14
The primary purpose of CSI is to continually align and realign IT services to the changing
business needs. This alignment is done by identifying and implementing improvements to
IT services that support business processes. These improvement activities support the
lifecycle approach through Service Strategy, Service Design, Service Transition and
Service Operation. In effect, CSI searches for ways to improve process effectiveness,
efficiency, and cost effectiveness.
6-14
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
The goal of CSI in using the Deming Cycle is steady, ongoing improvement.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
6-15
16
At implementation, all four stages of the Deming Cycle are used. With ongoing
improvement, CSI draws on the check and act stages to monitor, measure, review and
implement initiatives.
6-16
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
The Deming Cycle consists of cycles of Planning, Acting, Checking the results, and Doing
actions that improve the process. Over time the goal of the Deming Cycle is steady
improvement of processes.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
6-17
CSI: Governance
IBM Software Group | Tivoli software
18
Enterprise governance describes a framework that covers both the corporate governance
and the business management aspects of the organization. Enterprise governance also
considers the whole picture to ensure that strategic goals are aligned and good management
is achieved.
The most recent and highly visible example of a renewed emphasis on corporate
governance is the Sarbanes-Oxley Act (SOX) of 2002 in the United States. Created in the
aftermath of fraudulent behavior by corporate giants, SOX includes the following
provisions:
IT governance ensures that the IT of an organization sustains and extends the strategies and
objectives of that organization.
IT departments and organizations must now comply with new rules and legislation and
continually demonstrate their compliance through successful independent audits by
external organizations.
6-18
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
19
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
6-19
6-20
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
20 08 IBM Corporation
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
6-21
21
The 7-Step Improvement Process for Continual Service Improvement ensures that you
identify what you actually measure and where you find that information. The 7-Step
Improvement Process consists of the following steps:
6-22
1.
2.
3.
4.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
consistent, and gaps in data are identified. The goal is to sort and compare data
from many sources. After the data is rationalized, analysis can begin. This step
includes answering questions about frequency, format, system, and accuracy.
5.
6.
Present and use the information for assessment, summary, and action plans.
In this step, the results of the improvement efforts are presented to all the
stakeholders. In addition, suggestions for future endeavors are suggested.
7.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
6-23
In order to support improvement activities it is important to have CSI integrated within each
lifecycle stage including the underlying processes residing in each lifecycle phase. Some of
the integration of the process with the lifecycle stages and Service Management processes
include:
Service Strategy: Responsible for monitoring the progress of strategies, standards, policies
and architectural decisions that have been made and implemented.
Service Design: Monitors and gathers data associated with creating and modifying (design
efforts) of services and service management processes.
Service Transition: Develops the monitoring procedures and criteria to be used during and
after implementation.
Service Operation: Responsible for the actual monitoring of services in the production
environment. Service Operation plays a large part in the processing activity. It provides
input into what can be measured and processed into logical groupings as well as doing the
actual processing of the data.
Service Level Management: SLM plays a key role in the data gathering activity as SLM
is responsible for not only defining business requirements but also the capabilities of IT to
achieve them.
6-24
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
6-25
23
It is recommended that in the early stages of a CSI program only two to three KPIs for each
CSF are defined, monitored and reported. As the maturity of a service and service
management processes increase, additional KPIs can be added. Based on what is important
to the business and IT management, the KPIs can change over a period of time. Also, keep
in mind that as service management processes are implemented this will often change the
KPIs of other processes.
Contributions from the key roles identified in Service Design, Service Transition and
Service Operation, each of which has very specific goals to meet. Ultimately, the quality of
the service will be determined by how well each role meets its goals, and by how well those
sometimes conflicting goals are managed along the way. That makes it crucial that
organizations find some way of measuring performance by applying a set of metrics to
each goal.
6-26
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
24
Step 1: Define what you should measure: Roles for this step include individuals involved
with decision making from IT and the business. These individuals understand the internal
and external factors that influence the measured elements to support the business,
governance, and regulatory legislation. Titles for these roles might be: service manager,
service owner, service level manager, CSI manager, process owner, process managers,
customers, business and IT analysts, and senior IT managers.
Step 2: Define what you can measure: Roles for this step internal and external providers
who understand the capabilities of the measuring processes, procedures, tools and staff.
Titles for these roles might be: service manager, service owner, process owner, process
managers, internal and external providers.
Step 3: Gathering the data: Roles for this step include individuals involved in day-to-day
process activities within the Service Transition and Service Operation lifecycle phases.
Titles for these roles might be: service desk staff, technical management staff, application
management staff, IT security staff.
Step 4: Processing the data: Roles for this step include individuals involved in day-to-day
process activities within the Service Transition and Service Operation lifecycle phases.
Titles for these roles might be: service desk staff, technical management staff, application
management staff, IT security staff.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
6-27
Step 5: Analyzing the data: Roles for this step include internal and external providers who
understand the capabilities of the measuring processes, procedures, tools, and staff. Titles
for these roles might be: service owner, process owner, process managers, business/IT
analysts, senior IT analysts, supervisors, and team leaders.
Step 6: Presenting and using the information: Roles for this step include internal and
external providers who understand the capabilities of the service and the underpinning
processes and possess good communication skills. Key personnel involved with decision
making from both IT and the business. Titles for these roles might be: CSI manager, service
owner, service manager, service level manager, process owner, process managers,
customers, business and IT analysts, senior IT managers, internal and external providers.
Step 7: Implementing corrective action: Roles for this step include internal and external
service providers. Titles for these roles might include: CSI manager, service owner, service
manager, service level manager, process owner, process managers, customers, business and
IT analysts, senior IT managers, internal and external providers.
6-28
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
20 08 IBM Corporation
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
6-29
26
6-30
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Implementing Reporting
IBM Software Group | Tivoli software
Implementing Reporting
Target audiences and the related business views on the
service delivered
Agree on what to measure and report
Agree on definitions of all terms and boundaries
Define basis of all calculations
Define reporting schedules
Provide access to reports and medium to be used
Schedule meetings to review and discuss reports
27
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
6-31
28
6-32
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
29
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
6-33
30
The key to effect Service Reporting is to take the time to define and agree on how reporting
will be implemented with the business and Service Design.
6-34
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Reporting Analyst
IBM Software Group | Tivoli software
Reporting Analyst
Participates in CSI meetings and Service Level
Management meetings
Consolidates data
Produces trends
Produces reports on service or system performance
31
One of the key roles for CSI is that of Reporting Analyst. The Reporting Analyst will often
work in concert with the Service Level Management roles. The reporting analyst reviews
and analyzes data from components, systems and sub-systems in order to obtain a true endto-end service achievement. The reporting analyst identifies trends and establishes if the
trends are positive or negative. This information is then used in the presenting of the data.
The Reporting Analyst has the following responsibilities:
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
6-35
20 08 IBM Corporation
6-36
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Service Measurement
IBM Software Group | Tivoli software
Service Measurement
Service Measurement is the ability to predict and report
service performance against the established target of
achievements of an end-to-end service
Service Measurement requires someone to:
Take the individual measurements
Combine individual measurements to provide a view of the true
customer experience
33
Service Measurement is the ability to predict and report service performance against the
established target of achievements of an end-to-end service.
One of key set of activities of the Continual Service Improvement is to measure, analyze,
and report on IT services and ITSM results. Measurements will, of course, produce data.
This data should be analyzed over time to produce a trend. The trend will tell a story that
can be positive or negative.
Measurements of this kind must have ongoing relevance. Information that was important
to know last year might not be pertinent this year.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
6-37
34
The four basic reasons to monitor and measure lead to three key questions:
1.
2.
3.
Every time you produce a report, ask yourself, Is this report still needed and used by
anyone? Reasons to continue producing a report might include:
6-38
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Baselines
IBM Software Group | Tivoli software
Baselines
An important beginning point for highlighting improvement
is to establish baselines as markers or starting points for
later comparison
Baselines are also used to establish an initial data point
to determine if a service or process needs to be improved
Baselines must be documented, recognized, and
accepted throughout the organization
35
Baselines must be established at each level: strategic goals and objectives, tactical process
maturity, operational metrics, and Key Performance Indicators (KPIs).
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
6-39
Types of Metrics
IBM Software Group | Tivoli software
Types of Metrics
Technology metrics
Process metrics
Service metrics
36
6-40
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
37
Service measurement requires someone to take the individual measurements and combine
them to provide a view of the true customer experience.
For services most organizations use three basic measurements:
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
6-41
38
Service levels
Customer satisfaction
Business impact
Supplier performance
Setting targets
Targets set by management are quantified objectives to be attained. They express the aims
of the service or process at any level and provide the basis for the identification of problems
and early progress towards solutions and improvement opportunities.
6-42
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Compliance
Quality
Performance
Value
Identify whether the results that are being shown make sense.
Do not jump to conclusions without analyzing the possible causes for the results.
Reports and scorecards should be linked to overall strategy and goals. Using a
Balanced Scorecard approach is one way to manage this alignment.
When creating reports it is important to know their purpose and the details that are
required.
Before starting the design of any report it is also important to know the following:
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
6-43
6-44
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
20 08 IBM Corporation
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
6-45
40
It is important to recognize that an investment in CSI, and realizing its benefits, can vary.
They can depend on the customer base, size of IT, and the maturity of the ITIL process
implemented. In addition, benefits will cross existing organizational boundaries and true
benefits can only be captured in collaboration with the users, customers, and ITIL process
owners.
A baseline must be established for all future measurements to be meaningful.
Measurements can often reflect a single picture or point in time. However, analyzing these
pictures over time will help identify trends. These trends, in turn, help identify areas of
improvement. The first measurement is the baseline. It is essential that the same
measurements be used consistently to establish trend patterns.
While the initial identification of benefits is an estimate of those likely to be realized by the
proposed process improvement initiative, there is also a need to subsequently measure the
benefits actually achieved.
6-46
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
41
The activities associated with the Return on Investment process are creating and ROI
statement, establishing the business case, and measuring the beneifits achieved.
Creating an ROI Statement
Calculating internal resource costs. These costs will be internal resource costs,
tool costs, consulting costs, and others.
Defining what the organization will gain. These returns are often difficult to
define.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
6-47
Time to market
Customer retention
Market share
6-48
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
20 08 IBM Corporation
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
6-49
Service Manager
IBM Software Group | Tivoli software
Service Manager
Provides leadership on development of business case
and product line strategy and architecture, new service
deployment, and lifecycle management schedules
Performs Service Cost Management activities
Manages various objectives to achieve goals and
financial commitments of organization
Creates an imaginative organization
43
6-50
Provide leadership on the development of business case and product line strategy
and architecture, new service deployment and lifecycle management schedules.
Manage various and sometimes conflicting objectives to achieve the goals and
financial commitments of the organization.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
44
The key responsibilities of the Continual Service Improvement Manager are as follows:
Works with the Service Level Manager to ensure that monitoring requirements are
defined
Defines and reports on CSI Critical Success Factors, Key Performance Indicators,
and CSI activity metrics
Identifies other frameworks, models, and standards that will support CSI activities
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
6-51
CSI facilitates adjustments to processes for better data gathering at the appropriate steps. In
the previous example of the financial system being implemented, CSI should be put in place
immediately at point of production. One task will be to review or document how the users
are actually using the tool set. Another task will be to see if any gaps of usability were
missed during design and testing.
CSI can assist the business to implement processes in a semi-automated fashion. Then the
review process can determine where automation truly can assist and improve efficiencies
and reduce manual activities. These types of reviews help drive resources to seek ways to
reduce cost and focus spending on what will facilitate increased revenue. Returning to the
financial system example, after it is put in place, a CSI is set up to review the payables
functions. The review might bring out that today a payables resource must enter suppliers
manually. Although that was appropriate at the initial stages, business has expanded and
additional suppliers and vendors are being added at a very strong pace. Through CSI, it is
determined that it is time to automate an interface to the system. This automation will help
suppliers to enter their own information through a secured Web site or link. This
automation will reduce manual entry and facilitate better control for payment. Then, pay
out will not occur too soon or too late. Thus, contract breaches and penalties are avoided.
6-52
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Review Questions
1.
2.
b.
c.
d.
Which of the following choices represent the business value for performing
measurements?
a.Validate
3.
b.
Direct
c.
Justify
d.
Intervene
e.
Which of the following choices are used to establish an initial data point to
determine if a service or process needs to be improved?
a.Measurements
4.
b.
Baselines
c.
Reports
d.
KPIs
Process
c.
Service
d.
Management
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
6-53
5.
Which type of metrics can help answer questions about quality, performance,
value, and compliance in following the process?
a.Technology
6.
b.
Process
c.
Service
d.
Management
6-54
b.
Process
c.
Service
d.
Management
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
6-55
Review Answers
1.
2.
Which of the following choices represent the business value for performing
measurements?
e. All of the Above
3.
Which of the following choices are used to establish an initial data point to
determine if a service or process needs to be improved?
b. Baselines
4.
5.
Which type of metrics can help answer questions about quality, performance,
value, and compliance in following the process?
b. Process
6.
6-56
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Summary
IBM Software Group | Tivoli software
Summary
You should now be able to:
Explain the key principles and concepts related to
Continual Service Improvement
Discuss Continual Service Improvement processes and
associated activities
Describe the Continual Service Improvement roles
46
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
6-57
6-58
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
A-1
ITIL V3 Glossary
Acceptance: Formal agreement that an IT Service, Process, Plan, or other Deliverable is
complete, accurate, Reliable and meets its specified Requirements. Acceptance is usually
preceded by Evaluation or Testing and is often required before proceeding to the next stage
of a Project or Process. See Service Acceptance Criteria.
Access Management (Service Operation) The Process responsible for allowing Users to
make use of IT Services, data, or other Assets. Access Management helps to protect the
Confidentiality, Integrity and Availability of Assets by ensuring that only authorized Users
are able to access or modify the Assets. Access Management is sometimes referred to as
Rights Management or Identity Management.
Account Manager (Service Strategy) A Role that is very similar to Business Relationship
Manager, but includes more commercial aspects. Most commonly used when dealing with
External Customers.
Accounting (Service Strategy) The Process responsible for identifying actual Costs of
delivering IT Services, comparing these with budgeted costs, and managing variance from
the Budget.
Accredited Officially authorized to carry out a Role. For example an Accredited body may
be authorized to provide training or to conduct Audits.
Active Monitoring (Service Operation) Monitoring of a Configuration Item or an IT
Service that uses automated regular checks to discover the current status. See Passive
Monitoring.
Activity A set of actions designed to achieve a particular result. Activities are usually
defined as part of Processes or Plans, and are documented in Procedures.
Agreed Service Time (Service Design) A synonym for Service Hours, commonly used in
formal calculations of Availability. See Downtime.
Agreement A Document that describes a formal understanding between two or more
parties. An Agreement is not legally binding, unless it forms part of a Contract. See Service
Level Agreement, Operational Level Agreement.
Alert (Service Operation) A warning that a threshold has been reached, something has
changed, or a Failure has occurred. Alerts are often created and managed by System
Management tools and are managed by the Event Management Process.
Analytical Modeling (Service Strategy) (Service Design) (Continual Service
Improvement) A technique that uses mathematical Models to predict the behavior of a
Configuration Item or IT Service. Analytical Models are commonly used in Capacity
Management and Availability Management. See Modeling.
A-2
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Application Software that provides Functions that are required by an IT Service. Each
Application may be part of more than one IT Service. An Application runs on one or more
Servers or Clients. See Application Management, Application Portfolio.
Application Management (Service Design) (Service Operation) The Function responsible
for managing Applications throughout their Lifecycle.
Application Portfolio (Service Design) A database or structured Document used to
manage Applications throughout their Lifecycle. The Application Portfolio contains key
Attributes of all Applications. The Application Portfolio is sometimes implemented as part
of the Service Portfolio, or as part of the Configuration Management System.
Application Service Provider (ASP) (Service Design) An External Service Provider that
provides IT Services using Applications running at the Service Provider's premises. Users
access the Applications by network connections to the Service Provider.
Application Sizing (Service Design) The Activity responsible for understanding the
Resource Requirements needed to support a new Application, or a major Change to an
existing Application. Application Sizing helps to ensure that the IT Service can meet its
agreed Service Level Targets for Capacity and Performance.
Architecture (Service Design) The structure of a System or IT Service, including the
Relationships of Components to each other and to the environment they are in. Architecture
also includes the Standards and Guidelines which guide the design and evolution of the
System.
Assembly (Service Transition) A Configuration Item that is made up from a number of
other CIs. For example a Server CI may contain CIs for CPUs, Disks, Memory etc.; an IT
Service CI may contain many Hardware, Software and other CIs. See Component CI,
Build.
Assessment Inspection and analysis to check whether a Standard or set of Guidelines is
being followed, that Records are accurate, or that Efficiency and Effectiveness targets are
being met. See Audit.
Asset (Service Strategy) Any Resource or Capability. Assets of a Service Provider include
anything that could contribute to the delivery of a Service. Assets can be one of the
following types: Management, Organization, Process, Knowledge, People, Information,
Applications, Infrastructure, and Financial Capital.
Asset Management (Service Transition) Asset Management is the Process responsible for
tracking and reporting the value and ownership of financial Assets throughout their
Lifecycle. Asset Management is part of an overall Service Asset and Configuration
Management Process. See Asset Register.
Asset Register (Service Transition) A list of Assets, which includes their ownership and
value. The Asset Register is maintained by Asset Management.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
A-3
A-4
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
A Performance Baseline can be used to measure changes in Performance over the lifetime
of an IT Service
A Configuration Management Baseline can be used to enable the IT Infrastructure to be
restored to a known Configuration if a Change or Release fails
Benchmark (Continual Service Improvement) The recorded state of something at a
specific point in time. A Benchmark can be created for a Configuration, a Process, or any
other set of data. For example, a benchmark can be used in:
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
A-5
A-6
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Business Process A Process that is owned and carried out by the Business. A Business
Process contributes to the delivery of a product or Service to a Business Customer. For
example, a retailer may have a purchasing Process which helps to deliver Services to their
Business Customers. Many Business Processes rely on IT Services.
Business Relationship Management (Service Strategy) The Process or Function
responsible for maintaining a Relationship with the Business. BRM usually includes:
Ensuring that the IT Service Provider is satisfying the Business needs of the
Customers This Process has strong links with Service Level Management.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
A-7
identify Best Practices to help increase Process Maturity. CMM was developed at the
Software Engineering Institute (SEI) of Carnegie Mellon University. In 2000, the SWCMM was upgraded to CMMI (Capability Maturity Model Integration). The SEI no
longer maintains the SW-CMM model, its associated appraisal methods, or training
materials.
Capability Maturity Model Integration (CMMI) (Continual Service Improvement)
Capability Maturity Model Integration (CMMI) is a process improvement approach
developed by the Software Engineering Institute (SEI) of Carnegie Melon University.
CMMI provides organizations with the essential elements of effective processes. It can be
used to guide process improvement across a project, a division, or an entire organization.
CMMI helps integrate traditionally separate organizational functions, set process
improvement goals and priorities, provide guidance for quality processes, and provide a
point of reference for appraising current processes. See http://www.sei.cmu.edu/cmmi/ for
more information. See CMM, Continuous Improvement, Maturity.
Capacity (Service Design) The maximum Throughput that a Configuration Item or IT
Service can deliver whilst meeting agreed Service Level Targets. For some types of CI,
Capacity may be the size or volume, for example a disk drive.
Capacity Management (Service Design) The Process responsible for ensuring that the
Capacity of IT Services and the IT Infrastructure is able to deliver agreed Service Level
Targets in a Cost Effective and timely manner. Capacity Management considers all
Resources required to deliver the IT Service, and plans for short, medium and long term
Business Requirements.
Capacity Management Information System (CMIS) (Service Design) A virtual
repository of all Capacity Management data, usually stored in multiple physical locations.
See Service Knowledge Management System.
Capacity Plan (Service Design) A Capacity Plan is used to manage the Resources required
to deliver IT Services. The Plan contains scenarios for different predictions of Business
demand, and costed options to deliver the agreed Service Level Targets.
Capacity Planning (Service Design) The Activity within Capacity Management
responsible for creating a Capacity Plan.
Capital Expenditure (CAPEX) (Service Strategy) The Cost of purchasing something that
will become a financial Asset, for example computer equipment and buildings. The value
of the Asset is Depreciated over multiple accounting periods.
Capital Item (Service Strategy) An Asset that is of interest to Financial Management
because it is above an agreed financial value.
Capitalization (Service Strategy) Identifying major Cost as capital, even though no Asset
is purchased. This is done to spread the impact of the Cost over multiple accounting
periods. The most common example of this is software development, or purchase of a
software license.
A-8
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Category A named group of things that have something in common. Categories are used
to group similar things together. For example Cost Types are used to group similar types of
Cost. Incident Categories are used to group similar types of Incident, CI Types are used to
group similar types of Configuration Item.
Certification Issuing a certificate to confirm Compliance to a Standard. Certification
includes a formal Audit by an independent and Accredited body. The term Certification is
also used to mean awarding a certificate to verify that a person has achieved a qualification.
Change (Service Transition) The addition, modification or removal of anything that could
have an effect on IT Services. The Scope should include all IT Services, Configuration
Items, Processes, Documentation etc.
Change Advisory Board (CAB) (Service Transition) A group of people that advises the
Change Manager in the Assessment, prioritization and scheduling of Changes. This board
is usually made up of representatives from all areas within the IT Service Provider, the
Business, and Third Parties such as Suppliers.
Change Case (Service Operation) A technique used to predict the impact of proposed
Changes. Change Cases use specific scenarios to clarify the scope of proposed Changes and
to help with Cost Benefit Analysis. See Use Case.
Change History (Service Transition) Information about all changes made to a
Configuration Item during its life. Change History consists of all those Change Records that
apply to the CI.
Change Management (Service Transition) The Process responsible for controlling the
Lifecycle of all Changes. The primary objective of Change Management is to enable
beneficial Changes to be made, with minimum disruption to IT Services.
Change Model (Service Transition) A repeatable way of dealing with a particular Category
of Change. A Change Model defines specific pre-defined steps that will be followed for a
Change of this Category. Change Models may be very simple, with no requirement for
approval (e.g. Password Reset) or may be very complex with many steps that require
approval (e.g. major software Release). See Standard Change, Change Advisory Board.
Change Record (Service Transition) A Record containing the details of a Change. Each
Change Record documents the Lifecycle of a single Change. A Change Record is created
for every Request for Change that is received, even those that are subsequently rejected.
Change Records should reference the Configuration Items that are affected by the Change.
Change Records are stored in the Configuration Management System.
Change Request Synonym for Request for Change.
Change Schedule (Service Transition) A Document that lists all approved Changes and
their planned implementation dates. A Change Schedule is sometimes called a Forward
Schedule of Change, even though it also contains information about Changes that have
already been implemented.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
A-9
Change Window (Service Transition) A regular, agreed time when Changes or Releases
may be implemented with minimal impact on Services. Change Windows are usually
documented in SLAs.
Charging (Service Strategy) Requiring payment for IT Services. Charging for IT Services
is optional, and many Organizations. choose to treat their IT Service Provider as a Cost
Center.
Chronological Analysis (Service Operation) A technique used to help identify possible
causes of Problems. All available data about the Problem is collected and sorted by date and
time to provide a detailed timeline. This can make it possible to identify which Events may
have been triggered by others.
CI Type (Service Transition) A Category that is used to Classify CIs. The CI Type
identifies the required Attributes and Relationships for a Configuration Record. Common
CI Types include: hardware, Document, User etc.
Classification The act of assigning a Category to something. Classification is used to
ensure consistent management and reporting. CIs, Incidents, Problems, Changes etc. are
usually classified.
Client A generic term that means a Customer, the Business or a Business Customer. For
example Client Manager may be used as a synonym for Account Manager. The term client
is also used to mean:
The part of a Client-Server Application that the User directly interfaces with. For
example an email Client.
Closed (Service Operation) The final Status in the Lifecycle of an Incident, Problem,
Change etc. When the Status is Closed, no further action is taken.
Closure (Service Operation) The act of changing the Status of an Incident, Problem,
Change etc. to Closed.
COBIT (Continual Service Improvement) Control Objectives for Information and related
Technology (COBIT) provides guidance and Best Practice for the management of IT
Processes. COBIT is published by the IT Governance Institute. See http://www.isaca.org/
for more information.
Code of Practice A Guideline published by a public body or a Standards Organization.,
such as ISO or BSI. Many Standards consist of a Code of Practice and a Specification. The
Code of Practice describes recommended Best Practice.
Cold Standby Synonym for Gradual Recovery.
Commercial off the Shelf (COTS) (Service Design) Application software or Middleware
that can be purchased from a Third Party.
A-10
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
A-11
information into the CMDB. Configuration Identification is also responsible for labeling
the CIs themselves, so that the corresponding Configuration Records can be found.
Configuration Item (CI) (Service Transition) Any Component that needs to be managed
in order to deliver an IT Service. Information about each CI is recorded in a Configuration
Record within the Configuration Management System and is maintained throughout its
Lifecycle by Configuration Management. CIs are under the control of Change
Management. CIs typically include IT Services, hardware, software, buildings, people, and
formal documentation such as Process documentation and SLAs.
Configuration Management (Service Transition) The Process responsible for
maintaining information about Configuration Items required to deliver an IT Service,
including their Relationships. This information is managed throughout the Lifecycle of the
CI. Configuration Management is part of an overall Service Asset and Configuration
Management Process.
Configuration Management Database (CMDB) Service Transition) A database used to
store Configuration Records throughout their Lifecycle. The Configuration Management
System maintains one or more CMDBs, and each CMDB stores Attributes of CIs, and
Relationships with other CIs.
Configuration Management System (CMS) (Service Transition) A set of tools and
databases that are used to manage an IT Service Provider's Configuration data. The CMS
also includes information about Incidents, Problems, Known Errors, Changes and
Releases; and may contain data about employees, Suppliers, locations, Business Units,
Customers and Users. The CMS includes tools for collecting, storing, managing, updating,
and presenting data about all Configuration Items and their Relationships. The CMS is
maintained by Configuration Management and is used by all IT Service Management
Processes. See Configuration Management Database, Service Knowledge Management
System.
Configuration Record (Service Transition) A Record containing the details of a
Configuration Item. Each Configuration Record documents the Lifecycle of a single CI.
Configuration Records are stored in a Configuration Management Database.
Configuration Structure (Service Transition) The hierarchy and other Relationships
between all the Configuration Items that comprise a Configuration.
Continual Service Improvement (CSI) (Continual Service Improvement) A stage in the
Lifecycle of an IT Service and the title of one of the Core ITIL publications. Continual
Service Improvement is responsible for managing improvements to IT Service
Management Processes and IT Services. The Performance of the IT Service Provider is
continually measured and improvements are made to Processes, IT Services and IT
Infrastructure in order to increase Efficiency, Effectiveness, and Cost Effectiveness. See
Plan-Do-Check-Act.
Continuous Availability (Service Design) An approach or design to achieve 100%
Availability. A Continuously Available IT Service has no planned or unplanned Downtime.
A-12
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
A-13
Cost Element (Service Strategy) The middle level of category to which Costs are assigned
in Budgeting and Accounting. The highest level category is Cost Type. For example a Cost
Type of people? could have cost elements of payroll, staff benefits, expenses, training,
overtime etc. Cost Elements can be further broken down to give Cost Units. For example
the Cost Element expenses? could include Cost Units of Hotels, Transport, Meals etc.
Cost Management (Service Strategy) A general term that is used to refer to Budgeting and
Accounting, sometimes used as a synonym for Financial Management
Cost Type (Service Strategy) The highest level of category to which Costs are assigned in
Budgeting and Accounting. For example hardware, software, people, accommodation,
external and Transfer. See Cost Element, Cost Type.
Cost Unit (Service Strategy) The lowest level of category to which Costs are assigned,
Cost Units are usually things that can be easily counted (e.g. staff numbers, software
licenses) or things easily measured (e.g. CPU usage, Electricity consumed). Cost Units are
included within Cost Elements. For example a Cost Element of expenses? could include
Cost Units of Hotels, Transport, Meals etc. See Cost Type.
Countermeasure Can be used to refer to any type of Control. The term Countermeasure
is most often used when referring to measures that increase Resilience, Fault Tolerance or
Reliability of an IT Service.
Course Corrections Changes made to a Plan or Activity that has already started, to ensure
that it will meet its Objectives. Course corrections are made as a result of Monitoring
progress.
CRAMM A methodology and tool for analyzing and managing Risks. CRAMM was
developed by the UK Government, but is now privately owned. Further information is
available from http://www.cramm.com/
Crisis Management The Process responsible for managing the wider implications of
Business Continuity. A Crisis Management team is responsible for Strategic issues such as
managing media relations and shareholder confidence, and decides when to invoke
Business Continuity Plans.
Critical Success Factor (CSF) Something that must happen if a Process, Project, Plan, or
IT Service is to succeed. KPIs are used to measure the achievement of each CSF. For
example a CSF of "protect IT Services when making Changes" could be measured by KPIs
such as "percentage reduction of unsuccessful Changes", "percentage reduction in Changes
causing Incidents" etc.
Culture A set of values that is shared by a group of people, including expectations about
how people should behave, ideas, beliefs, and practices. See Vision.
Customer Someone who buys goods or Services. The Customer of an IT Service Provider
is the person or group who defines and agrees the Service Level Targets. The term
Customers is also sometimes informally used to mean Users, for example "this is a
Customer focused Organization.".
A-14
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
A-15
A-16
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
A-17
A-18
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
A-19
Function A team or group of people and the tools they use to carry out one or more
Processes or Activities. For example the Service Desk. The term Function also has two
other meanings:
A-20
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Identity (Service Operation) A unique name that is used to identify a User, person or Role.
The Identity is used to grant Rights to that User, person, or Role. Example identities might
be the username SmithJ or the Role "Change manager".
Immediate Recovery (Service Design) A Recovery Option which is also known as Hot
Standby. Provision is made to Recover the IT Service with no loss of Service. Immediate
Recovery typically uses mirroring, load balancing and split site technologies.
Impact (Service Operation) (Service Transition) A measure of the effect of an Incident,
Problem or Change on Business Processes. Impact is often based on how Service Levels
will be affected. Impact and Urgency are used to assign Priority.
Incident (Service Operation) An unplanned interruption to an IT Service or a reduction in
the Quality of an IT Service. Failure of a Configuration Item that has not yet impacted
Service is also an Incident. For example Failure of one disk from a mirror set.
Incident Management (Service Operation) The Process responsible for managing the
Lifecycle of all Incidents. The primary Objective of Incident Management is to return the
IT Service to Users as quickly as possible.
Incident Record (Service Operation) A Record containing the details of an Incident. Each
Incident record documents the Lifecycle of a single Incident.
Indirect Cost (Service Strategy) A Cost of providing an IT Service which cannot be
allocated in full to a specific Customer. For example Cost of providing shared Servers or
software licenses. Also known as Overhead. See Direct Cost.
Information Security Management (ISM) (Service Design) The Process that ensures the
Confidentiality, Integrity and Availability of an Organization.'s Assets, information, data
and IT Services. Information Security Management usually forms part of an Organizational
approach to Security Management which has a wider scope than the IT Service Provider,
and includes handling of paper, building access, phone calls etc., for the entire
Organization.
Information Security Management System (ISMS) (Service Design) The framework of
Policy, Processes, Standards, Guidelines and tools that ensures an Organization. can
achieve its Information Security Management Objectives.
Information Security Policy (Service Design) The Policy that governs the
Organization.s approach to Information Security Management.
Information Technology (IT) The use of technology for the storage, communication or
processing of information. The technology typically includes computers,
telecommunications, Applications and other software. The information may include
Business data, voice, images, video, etc. Information Technology is often used to support
Business Processes through IT Services.
Infrastructure Service An IT Service that is not directly used by the Business, but is
required by the IT Service Provider so they can provide other IT Services. For example
Directory Services, naming services, or communication services.
Copyright IBM Corp. 2009
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
A-21
A-22
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Invocation (Service Design) Initiation of the steps defined in a plan. For example initiating
the IT Service Continuity Plan for one or more IT Services.
Ishikawa Diagram (Service Operation) (Continual Service Improvement) A technique
that helps a team to identify all the possible causes of a Problem. Originally devised by
Kaoru Ishikawa, the output of this technique is a diagram that looks like a fishbone.
ISO 9000 A generic term that refers to a number of international Standards and Guidelines
for Quality Management Systems. See http://www.iso.org/ for more information. See ISO.
ISO 9001 An international Standard for Quality Management Systems. See ISO 9000,
Standard.
ISO/IEC 17799 (Continual Service Improvement) ISO Code of Practice for Information
Security Management. See Standard.
ISO/IEC 20000 ISO Specification and Code of Practice for IT Service Management. ISO/
IEC 20000 is aligned with ITIL Best Practice.
ISO/IEC 27001 (Service Design) (Continual Service Improvement) ISO Specification for
Information Security Management. The corresponding Code of Practice is ISO/IEC 17799.
See Standard.
IT Directorate (Continual Service Improvement) Senior Management within a Service
Provider, charged with developing and delivering IT services. Most commonly used in UK
Government departments.
IT Infrastructure All of the hardware, software, networks, facilities etc. that are required
to Develop, Test, deliver, Monitor, Control or support IT Services. The term IT
Infrastructure includes all of the Information Technology but not the associated people,
Processes and documentation.
IT Operations (Service Operation) Activities carried out by IT Operations Control,
including Console Management, Job Scheduling, Backup and Restore, and Print and
Output Management. IT Operations is also used as a synonym for Service Operation.
IT Operations Control (Service Operation) The Function responsible for Monitoring and
Control of the IT Services and IT Infrastructure. See Operations Bridge.
IT Operations Management (Service Operation) The Function within an IT Service
Provider which performs the daily Activities needed to manage IT Services and the
supporting IT Infrastructure. IT Operations Management includes IT Operations Control
and Facilities Management.
IT Service A Service provided to one or more Customers by an IT Service Provider. An IT
Service is based on the use of Information Technology and supports the Customer's
Business Processes. An IT Service is made up from a combination of people, Processes and
technology and should be defined in a Service Level Agreement.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
A-23
A-24
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
The lifecycle of a Server may include: Ordered, Received, In Test, Live, Disposed
etc.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
A-25
Line of Service (LOS) (Service Strategy) A Core Service or Supporting Service that has
multiple Service Level Packages. A line of Service is managed by a Product Manager and
each Service Level Package is designed to support a particular market segment.
Live (Service Transition) Refers to an IT Service or Configuration Item that is being used
to deliver Service to a Customer.
Live Environment (Service Transition) A controlled Environment containing Live
Configuration Items used to deliver IT Services to Customers.
Maintainability (Service Design) A measure of how quickly and Effectively a
Configuration Item or IT Service can be restored to normal working after a Failure.
Maintainability is often measured and reported as MTRS. Maintainability is also used in
the context of Software or IT Service Development to mean ability to be Changed or
Repaired easily.
Major Incident (Service Operation) The highest Category of Impact for an Incident. A
Major Incident results in significant disruption to the Business.
Managed Services (Service Strategy) A perspective on IT Services which emphasizes the
fact that they are managed. The term Managed Services is also used as a synonym for
Outsourced IT Services.
Management Information Information that is used to support decision making by
managers. Management Information is often generated automatically by tools supporting
the various IT Service Management Processes. Management Information often includes the
values of KPIs such as "Percentage of Changes leading to Incidents", or "first time fix rate".
Management of Risk (MoR) The OGC methodology for managing Risks. MoR includes
all the Activities required to identify and Control the exposure to Risk which may have an
impact on the achievement of an Organization.s Business Objectives. See http://www.mo-r.org/ for more details.
Management System The framework of Policy, Processes and Functions that ensures an
Organization. can achieve its Objectives.
Manual Workaround A Workaround that requires manual intervention. Manual
Workaround is also used as the name of a Recovery Option in which The Business Process
Operates without the use of IT Services. This is a temporary measure and is usually
combined with another Recovery Option.
Marginal Cost (Service Strategy) The Cost of continuing to provide the IT Service.
Marginal Cost does not include investment already made, for example the cost of
developing new software and delivering training.
Market Space (Service Strategy) All opportunities that an IT Service Provider could
exploit to meet business needs of Customers. The Market Space identifies the possible IT
Services that an IT Service Provider may wish to consider delivering.
A-26
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
A-27
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Transaction. For example loading a magnetic tape, accepting money at a point of sale, or
reading data from a disk drive.
Operational The lowest of three levels of Planning and delivery (Strategic, Tactical,
Operational). Operational Activities include the day-to-day or short term Planning or
delivery of a Business Process or IT Service Management Process. The term Operational is
also a synonym for Live.
Operational Cost Cost resulting from running the IT Services. Often repeating payments.
For example staff costs, hardware maintenance and electricity (also known as "current
expenditure" or "revenue expenditure"). See Capital Expenditure.
Operational Expenditure (OPEX) Synonym for Operational Cost.
Operational Level Agreement (OLA) (Service Design) (Continual Service
Improvement) An Agreement between an IT Service Provider and another part of the same
Organization. An OLA supports the IT Service Provider's delivery of IT Services to
Customers. The OLA defines the goods or Services to be provided and the responsibilities
of both parties. For example there could be an OLA:
between the Service Desk and a Support Group to provide Incident Resolution in
agreed times. See Service Level Agreement.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
A-29
A-30
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
A-31
Priority (Service Transition) (Service Operation) A Category used to identify the relative
importance of an Incident, Problem or Change. Priority is based on Impact and Urgency,
and is used to identify required times for actions to be taken. For example the SLA may
state that Priority2 Incidents must be resolved within 12 hours.
Proactive Monitoring (Service Operation) Monitoring that looks for patterns of Events to
predict possible future Failures. See Reactive Monitoring.
Proactive Problem Management (Service Operation) Part of the Problem Management
Process. The Objective of Proactive Problem Management is to identify Problems that
might otherwise be missed. Proactive Problem Management analyses Incident Records,
and uses data collected by other IT Service Management Processes to identify trends or
significant Problems.
Problem (Service Operation) A cause of one or more Incidents. The cause is not usually
known at the time a Problem Record is created, and the Problem Management Process is
responsible for further investigation.
Problem Management (Service Operation) The Process responsible for managing the
Lifecycle of all Problems. The primary Objectives of Problem Management are to prevent
Incidents from happening, and to minimize the Impact of Incidents that cannot be
prevented.
Problem Record (Service Operation) A Record containing the details of a Problem. Each
Problem Record documents the Lifecycle of a single Problem.
Procedure A Document containing steps that specify how to achieve an Activity.
Procedures are defined as part of Processes. See Work Instruction.
Process A structured set of Activities designed to accomplish a specific Objective. A
Process takes one or more defined inputs and turns them into defined outputs. A Process
may include any of the Roles, responsibilities, tools and management Controls required to
reliably deliver the outputs. A Process may define Policies, Standards, Guidelines,
Activities, and Work Instructions if they are needed.
Process Control The Activity of planning and regulating a Process, with the Objective of
performing the Process in an Effective, Efficient, and consistent manner.
Process Manager A Role responsible for Operational management of a Process. The
Process Manager's responsibilities include Planning and co-ordination of all Activities
required to carry out, monitor and report on the Process. There may be several Process
Managers for one Process, for example regional Change Managers or IT Service Continuity
Managers for each data center The Process Manager Role is often assigned to the person
who carries out the Process Owner Role, but the two Roles may be separate in larger
Organizations.
Process Owner A Role responsible for ensuring that a Process is Fit for Purpose. The
Process Owners responsibilities include sponsorship, Design, Change Management and
continual improvement of the Process and its Metrics. This Role is often assigned to the
A-32
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
same person who carries out the Process Manager Role, but the two Roles may be separate
in larger Organizations.
Production Environment Synonym for Live Environment.
Profit Center (Service Strategy) A Business Unit which charges for Services provided. A
Profit Center can be created with the objective of making a profit, recovering Costs, or
running at a loss. An IT Service Provider can be run as a Cost Center or a Profit Center
Pro-forma A template, or example Document containing example data that will be
replaced with the real values when these are available.
Program A number of Projects and Activities that are planned and managed together to
achieve an overall set of related Objectives and other Outcomes.
Project A temporary Organization., with people and other Assets required to achieve an
Objective or other Outcome. Each Project has a Lifecycle that typically includes initiation,
Planning, execution, Closure etc. Projects are usually managed using a formal methodology
such as PRINCE2.
Projected Service Outage (PSO) (Service Transition) A Document that identifies the
effect of planned Changes, maintenance Activities and Test Plans on agreed Service
Levels.
Projects IN Controlled Environments (PRINCE2) See PRINCE2
Qualification (Service Transition) An Activity that ensures that IT Infrastructure is
appropriate, and correctly configured, to support an Application or IT Service. See
Validation.
Quality The ability of a product, Service, or Process to provide the intended value. For
example, a hardware Component can be considered to be of high Quality if it performs as
expected and delivers the required Reliability. Process Quality also requires an ability to
monitor Effectiveness and Efficiency, and to improve them if necessary. See Quality
Management System.
Quality Assurance (QA) (Service Transition) The Process responsible for ensuring that
the Quality of a product, Service or Process will provide its intended Value.
Quality Management System (QMS) (Continual Service Improvement) The set of
Processes responsible for ensuring that all work carried out by an Organization. is of a
suitable Quality to reliably meet Business Objectives or Service Levels. See ISO 9000.
Quick Win (Continual Service Improvement) An improvement Activity which is expected
to provide a Return on Investment in a short period of time with relatively small Cost and
effort. See Pareto Principle.
RACI (Service Design) (Continual Service Improvement) A Model used to help define
Roles and Responsibilities. RACI stands for Responsible, Accountable, Consulted and
Informed. See Stakeholder.
Copyright IBM Corp. 2009
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
A-33
A-34
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
A-35
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
of a Review is to ensure that all Deliverables have been provided, and to identify
opportunities for improvement. See Post Implementation Review.
Rights (Service Operation) Entitlements, or permissions, granted to a User or Role. For
example the Right to modify particular data, or to authorize a Change.
Risk A possible Event that could cause harm or loss, or affect the ability to achieve
Objectives. A Risk is measured by the probability of a Threat, the Vulnerability of the Asset
to that Threat, and the Impact it would have if it occurred.
Risk Assessment The initial steps of Risk Management. Analyzing the value of Assets to
the business, identifying Threats to those Assets, and evaluating how Vulnerable each
Asset is to those Threats. Risk Assessment can be quantitative (based on numerical data) or
qualitative.
Risk Management The Process responsible for identifying, assessing and controlling
Risks. See Risk Assessment.
Role A set of responsibilities, Activities and authorities granted to a person or team. A Role
is defined in a Process. One person or team may have multiple Roles, for example the Roles
of Configuration Manager and Change Manager may be carried out by a single person.
Rollout (Service Transition) Synonym for Deployment. Most often used to refer to
complex or phased Deployments or Deployments to multiple locations.
Root Cause (Service Operation) The underlying or original cause of an Incident or
Problem.
Root Cause Analysis (RCA) (Service Operation) An Activity that identifies the Root
Cause of an Incident or Problem. RCA typically concentrates on IT Infrastructure failures.
See Service Failure Analysis.
Running Costs Synonym for Operational Costs
Scalability The ability of an IT Service, Process, Configuration Item etc. to perform its
agreed Function when the Workload or Scope changes.
Scope The boundary, or extent, to which a Process, Procedure, Certification, Contract etc.
applies. For example the Scope of Change Management may include all Live IT Services
and related Configuration Items, the Scope of an ISO/IEC 20000 Certificate may include
all IT Services delivered out of a named data center
Second-line Support (Service Operation) The second level in a hierarchy of Support
Groups involved in the resolution of Incidents and investigation of Problems. Each level
contains more specialist skills, or has more time or other Resources.
Security See Information Security Management
Security Management Synonym for Information Security Management
Copyright IBM Corp. 2009
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
A-37
A-38
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Service Design (Service Design) A stage in the Lifecycle of an IT Service. Service Design
includes a number of Processes and Functions and is the title of one of the Core ITIL
publications. See Design.
Service Design Package (Service Design) Document(s) defining all aspects of an IT
Service and its Requirements through each stage of its Lifecycle. A Service Design
Package is produced for each new IT Service, major Change, or IT Service Retirement.
Service Desk (Service Operation) The Single Point of Contact between the Service
Provider and the Users. A typical Service Desk manages Incidents and Service Requests,
and also handles communication with the Users.
Service Failure Analysis (SFA) (Service Design) An Activity that identifies underlying
causes of one or more IT Service interruptions. SFA identifies opportunities to improve the
IT Service Provider's Processes and tools, and not just the IT Infrastructure. SFA is a time
constrained, project-like activity, rather than an ongoing process of analysis. See Root
Cause Analysis.
Service Hours (Service Design) (Continual Service Improvement) An agreed time period
when a particular IT Service should be Available. For example, "Monday-Friday 08:00 to
17:00 except public holidays". Service Hours should be defined in a Service Level
Agreement.
Service Improvement Plan (SIP) (Continual Service Improvement) A formal Plan to
implement improvements to a Process or IT Service.
Service Knowledge Management System (SKMS) (Service Transition) A set of tools and
databases that are used to manage knowledge and information. The SKMS includes the
Configuration Management System, as well as other tools and databases. The SKMS
stores, manages, updates, and presents all information that an IT Service Provider needs to
manage the full Lifecycle of IT Services.
Service Level Measured and reported achievement against one or more Service Level
Targets. The term Service Level is sometimes used informally to mean Service Level
Target.
Service Level Agreement (SLA) (Service Design) (Continual Service Improvement) An
Agreement between an IT Service Provider and a Customer. The SLA describes the IT
Service, documents Service Level Targets, and specifies the responsibilities of the IT
Service Provider and the Customer. A single SLA may cover multiple IT Services or
multiple Customers. See Operational Level Agreement.
Service Level Management (SLM) (Service Design) (Continual Service Improvement)
The Process responsible for negotiating Service Level Agreements, and ensuring that these
are met. SLM is responsible for ensuring that all IT Service Management Processes,
Operational Level Agreements, and Underpinning Contracts, are appropriate for the agreed
Service Level Targets. SLM monitors and reports on Service Levels, and holds regular
Customer reviews.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
A-39
Service Level Package (SLP) (Service Strategy) A defined level of Utility and Warranty
for a particular Service Package. Each SLP is designed to meet the needs of a particular
Pattern of Business Activity. See Line of Service.
Service Level Requirement (SLR) (Service Design) (Continual Service Improvement) A
Customer Requirement for an aspect of an IT Service. SLRs are based on Business
Objectives and are used to negotiate agreed Service Level Targets.
Service Level Target (Service Design) (Continual Service Improvement) A commitment
that is documented in a Service Level Agreement. Service Level Targets are based on
Service Level Requirements, and are needed to ensure that the IT Service design is Fit for
Purpose. Service Level Targets should be SMART, and are usually based on KPIs.
Service Maintenance Objective (Service Operation) The expected time that a
Configuration Item will be unavailable due to planned maintenance Activity.
Service Management Service Management is a set of specialized organizational
capabilities for providing value to customers in the form of services.
Service Management Lifecycle An approach to IT Service Management that emphasizes
the importance of coordination and Control across the various Functions, Processes, and
Systems necessary to manage the full Lifecycle of IT Services. The Service Management
Lifecycle approach considers the Strategy, Design, Transition, Operation and Continuous
Improvement of IT Services.
Service Manager A manager who is responsible for managing the end-to-end Lifecycle of
one or more IT Services. The term Service Manager is also used to mean any manager
within the IT Service Provider. Most commonly used to refer to a Business Relationship
Manager, a Process Manager, an Account Manager or a senior manager with responsibility
for IT Services overall.
Service Operation (Service Operation) A stage in the Lifecycle of an IT Service. Service
Operation includes a number of Processes and Functions and is the title of one of the Core
ITIL publications. See Operation.
Service Owner (Continual Service Improvement) A Role which is accountable for the
delivery of a specific IT Service.
Service Package (Service Strategy) A detailed description of an IT Service that is available
to be delivered to Customers. A Service Package includes a Service Level Package and one
or more Core Services and Supporting Services.
Service Pipeline (Service Strategy) A database or structured Document listing all IT
Services that are under consideration or Development, but are not yet available to
Customers. The Service Pipeline provides a Business view of possible future IT Services
and is part of the Service Portfolio which is not normally published to Customers.
A-40
Service Portfolio (Service Strategy) The complete set of Services that are managed by a
Service Provider. The Service Portfolio is used to manage the entire Lifecycle of all
Services, and includes three Categories: Service Pipeline (proposed or in Development);
IT Infrastructure Library (ITIL) Foundations v3
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Service Catalogue (Live or available for Deployment); and Retired Services. See Service
Portfolio Management, Contract Portfolio.
Service Portfolio Management (SPM) (Service Strategy) The Process responsible for
managing the Service Portfolio. Service Portfolio Management considers Services in terms
of the Business value that they provide.
Service Potential (Service Strategy) The total possible value of the overall Capabilities and
Resources of the IT Service Provider.
Service Provider (Service Strategy) An Organization. supplying Services to one or more
Internal Customers or External Customers. Service Provider is often used as an
abbreviation for IT Service Provider. See Type I Service Provider, Type II Service
Provider, Type III Service Provider.
Service Provider Interface (SPI) (Service Strategy) An interface between the IT Service
Provider and a User, Customer, Business Process, or a Supplier. Analysis of Service
Provider Interfaces helps to coordinate end-to-end management of IT Services.
Service Provisioning Optimization (SPO) (Service Strategy) Analyzing the finances and
constraints of an IT Service to decide if alternative approaches to Service delivery might
reduce Costs or improve Quality.
Service Reporting (Continual Service Improvement) The Process responsible for
producing and delivering reports of achievement and trends against Service Levels. Service
Reporting should agree the format, content and frequency of reports with Customers.
Service Request (Service Operation) A request from a User for information, or advice, or
for a Standard Change or for Access to an IT Service. For example to reset a password, or
to provide standard IT Services for a new User. Service Requests are usually handled by a
Service Desk, and do not require an RFC to be submitted. See Request Fulfillment
Service Sourcing (Service Strategy) The Strategy and approach for deciding whether to
provide a Service internally or to Outsource it to an External Service Provider. Service
Sourcing also means the execution of this Strategy. Service Sourcing includes:
Traditional Sourcing - Full Service Outsourcing using a Type III Service Provider.
Service Strategy (Service Strategy) The title of one of the Core ITIL publications. Service
Strategy establishes an overall Strategy for IT Services and for IT Service Management.
Service Transition (Service Transition) A stage in the Lifecycle of an IT Service. Service
Transition includes a number of Processes and Functions and is the title of one of the Core
ITIL publications. See Transition.
Copyright IBM Corp. 2009
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
A-41
Service Utility (Service Strategy) The Functionality of an IT Service from the Customer's
perspective. The Business value of an IT Service is created by the combination of Service
Utility (what the Service does) and Service Warranty (how well it does it). See Utility.
Service Validation and Testing (Service Transition) The Process responsible for
Validation and Testing of a new or Changed IT Service. Service Validation and Testing
ensures that the IT Service matches its Design Specification and will meet the needs of the
Business.
Service Valuation (Service Strategy) A measurement of the total Cost of delivering an IT
Service, and the total value to the Business of that IT Service. Service Valuation is used to
help the Business and the IT Service Provider agree on the value of the IT Service.
Service Warranty (Service Strategy) Assurance that an IT Service will meet agreed
Requirements. This may be a formal Agreement such as a Service Level Agreement or
Contract, or may be a marketing message or brand image. The Business value of an IT
Service is created by the combination of Service Utility (what the Service does) and Service
Warranty (how well it does it). See Warranty.
Serviceability (Service Design) (Continual Service Improvement) The ability of a Third
Party Supplier to meet the terms of their Contract. This Contract will include agreed levels
of Reliability, Maintainability or Availability for a Configuration Item.
Shift (Service Operation) A group or team of people who carry out a specific Role for a
fixed period of time. For example there could be four shifts of IT Operations Control
personnel to support an IT Service that is used 24 hours a day.
Simulation Modeling (Service Design) (Continual Service Improvement) A technique that
creates a detailed Model to predict the behavior of a Configuration Item or IT Service.
Simulation Models can be very accurate but are expensive and time consuming to create.
A Simulation Model is often created by using the actual Configuration Items that are being
modeled, with artificial Workloads or Transactions. They are used in Capacity
Management when accurate results are important. A simulation model is sometimes called
a Performance Benchmark.
Single Point of Contact (Service Operation) Providing a single consistent way to
communicate with an Organization. or Business Unit. For example, a Single Point of
Contact for an IT Service Provider is usually called a Service Desk.
Single Point of Failure (SPOF) (Service Design) Any Configuration Item that can cause
an Incident when it fails, and for which a Countermeasure has not been implemented. A
SPOF may be a person, or a step in a Process or Activity, as well as a Component of the IT
Infrastructure. See Failure.
SLAM Chart (Continual Service Improvement) A Service Level Agreement Monitoring
Chart is used to help monitor and report achievements against Service Level Targets. A
SLAM Chart is typically color coded to show whether each agreed Service Level Target
has been met, missed, or nearly missed during each of the previous 12 months.
A-42
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
A-43
Storage Management (Service Operation) The Process responsible for managing the
storage and maintenance of data throughout its Lifecycle.
Strategic (Service Strategy) The highest of three levels of Planning and delivery (Strategic,
Tactical, Operational). Strategic Activities include Objective setting and long term
Planning to achieve the overall Vision.
Strategy (Service Strategy) A Strategic Plan designed to achieve defined Objectives.
Super User (Service Operation) A User who helps other Users, and assists in
communication with the Service Desk or other parts of the IT Service Provider. Super Users
typically provide support for minor Incidents and training.
Supplier (Service Strategy) (Service Design) A Third Party responsible for supplying
goods or Services that are required to deliver IT services. Examples of suppliers include
commodity hardware and software vendors, network and telecom providers, and
Outsourcing Organizations. See Underpinning Contract, Supply Chain.
Supplier and Contract Database (SCD) (Service Design) A database or structured
Document used to manage Supplier Contracts throughout their Lifecycle. The SCD
contains key Attributes of all Contracts with Suppliers, and should be part of the Service
Knowledge Management System.
Supplier Management (Service Design) The Process responsible for ensuring that all
Contracts with Suppliers support the needs of the Business, and that all Suppliers meet their
contractual commitments.
Supply Chain (Service Strategy) The Activities in a Value Chain carried out by Suppliers.
A Supply Chain typically involves multiple Suppliers, each adding value to the product or
Service. See Value Network.
Support Group (Service Operation) A group of people with technical skills. Support
Groups provide the Technical Support needed by all of the IT Service Management
Processes. See Technical Management.
Support Hours (Service Design) (Service Operation) The times or hours when support is
available to the Users. Typically this is the hours when the Service Desk is available.
Support Hours should be defined in a Service Level Agreement, and may be different from
Service Hours. For example, Service Hours may be 24 hours a day, but the Support Hours
may be 07:00 to 19:00.
Supporting Service (Service Strategy) A Service that enables or enhances a Core Service.
For example a Directory Service or a Backup Service. See Service Package.
SWOT Analysis (Continual Service Improvement) A technique that reviews and analyses
the internal strengths and weaknesses of an Organization. and the external opportunities
and threats which it faces SWOT stands for Strengths, Weaknesses, Opportunities and
Threats.
A-44
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
System A number of related things that work together to achieve an overall Objective. For
example:
System Management The part of IT Service Management that focuses on the management
of IT Infrastructure rather than Process.
Tactical The middle of three levels of Planning and delivery (Strategic, Tactical,
Operational). Tactical Activities include the medium term Plans required to achieve
specific Objectives, typically over a period of weeks to months.
Tag (Service Strategy) A short code used to identify a Category. For example tags EC1,
EC2, EC3 etc. might be used to identify different Customer outcomes when analyzing and
comparing Strategies. The term Tag is also used to refer to the Activity of assigning Tags
to things.
Technical Management (Service Operation) The Function responsible for providing
technical skills in support of IT Services and management of the IT Infrastructure.
Technical Management defines the Roles of Support Groups, as well as the tools, Processes
and Procedures required.
Technical Observation (TO) (Continual Service Improvement) A technique used in
Service Improvement, Problem investigation and Availability Management. Technical
support staff meet to monitor the behavior and Performance of an IT Service and make
recommendations for improvement.
Technical Service Synonym for Infrastructure Service.
Technical Support Synonym for Technical Management.
Tension Metrics (Continual Service Improvement) A set of related Metrics, in which
improvements to one Metric have a negative effect on another. Tension Metrics are
designed to ensure that an appropriate balance is achieved.
Terms of Reference (TOR) (Service Design) A Document specifying the Requirements,
Scope, Deliverables, Resources and schedule for a Project or Activity.
Test (Service Transition) An Activity that verifies that a Configuration Item, IT Service,
Process, etc. meets its Specification or agreed Requirements. See Service Validation and
Testing, Acceptance.
Test Environment (Service Transition) A controlled Environment used to Test
Configuration Items, Builds, IT Services, Processes etc.
Copyright IBM Corp. 2009
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
A-45
Third Party A person, group, or Business who is not part of the Service Level Agreement
for an IT Service, but is required to ensure successful delivery of that IT Service. For
example a software Supplier, a hardware maintenance company, or a facilities department.
Requirements for Third Parties are typically specified in Underpinning Contracts or
Operational Level Agreements.
Third-line Support (Service Operation) The third level in a hierarchy of Support Groups
involved in the resolution of Incidents and investigation of Problems. Each level contains
more specialist skills, or has more time or other Resources.
Threat Anything that might exploit a Vulnerability. Any potential cause of an Incident can
be considered to be a Threat. For example a fire is a Threat that could exploit the
Vulnerability of flammable floor coverings. This term is commonly used in Information
Security Management and IT Service Continuity Management, but also applies to other
areas such as Problem and Availability Management.
Threshold The value of a Metric which should cause an Alert to be generated, or
management action to be taken. For example "Priority1 Incident not solved within 4 hours",
"more than 5 soft disk errors in an hour", or "more than 10 failed changes in a month".
Throughput (Service Design) A measure of the number of Transactions, or other
Operations, performed in a fixed time. For example 5000 emails sent per hour, or 200 disk
I/Os per second.
Total Cost of Ownership (TCO) (Service Strategy) A methodology used to help make
investment decisions. TCO assesses the full Lifecycle Cost of owning a Configuration
Item, not just the initial Cost or purchase price. See Total Cost of Utilization.
Total Cost of Utilization (TCU) (Service Strategy) A methodology used to help make
investment and Service Sourcing decisions. TCU assesses the full Lifecycle Cost to the
Customer of using an IT Service. See Total Cost of Ownership.
Total Quality Management (TQM) (Continual Service Improvement) A methodology for
managing continual Improvement by using a Quality Management System. TQM
establishes a Culture involving all people in the Organization. in a Process of continual
monitoring and improvement.
Transaction A discrete Function performed by an IT Service. For example transferring
money from one bank account to another. A single Transaction may involve numerous
additions, deletions and modifications of data. Either all of these complete successfully or
none of them is carried out.
Transition (Service Transition) A change in state, corresponding to a movement of an IT
Service or other Configuration Item from one Lifecycle status to the next.
A-46
Transition Planning and Support (Service Transition) The Process responsible for
Planning all Service Transition Processes and coordinating the resources that they require.
These Service Transition Processes are Change Management, Service Asset and
Configuration Management, Release and Deployment Management, Service Validation
and Testing, Evaluation, and Knowledge Management.
IT Infrastructure Library (ITIL) Foundations v3
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Trend Analysis (Continual Service Improvement) Analysis of data to identify time related
patterns. Trend Analysis is used in Problem Management to identify common Failures or
fragile Configuration Items, and in Capacity Management as a Modeling tool to predict
future behavior It is also used as a management tool for identifying deficiencies in IT
Service Management Processes.
Tuning The Activity responsible for Planning Changes to make the most efficient use of
Resources. Tuning is part of Performance Management, which also includes Performance
Monitoring and implementation of the required Changes.
Type I Service Provider (Service Strategy) An Internal Service Provider that is embedded
within a Business Unit. There may be several Type I Service Providers within an
Organization.
Type II Service Provider (Service Strategy) An Internal Service Provider that provides
shared IT Services to more than one Business Unit.
Type III Service Provider (Service Strategy) A Service Provider that provides IT Services
to External Customers.
Underpinning Contract (UC) (Service Design) A Contract between an IT Service
Provider and a Third Party. The Third Party provides goods or Services that support
delivery of an IT Service to a Customer. The Underpinning Contract defines targets and
responsibilities that are required to meet agreed Service Level Targets in an SLA.
Unit Cost (Service Strategy) The Cost to the IT Service Provider of providing a single
Component of an IT Service. For example the Cost of a single desktop PC, or of a single
Transaction.
Urgency (Service Transition) (Service Design) A measure of how long it will be until an
Incident, Problem or Change has a significant Impact on the Business. For example a high
Impact Incident may have low Urgency, if the Impact will not affect the Business until the
end of the financial year. Impact and Urgency are used to assign Priority.
Usability (Service Design) The ease with which an Application, product, or IT Service can
be used. Usability Requirements are often included in a Statement of Requirements.
Use Case (Service Design) A technique used to define required functionality and
Objectives, and to Design Tests. Use Cases define realistic scenarios that describe
interactions between Users and an IT Service or other System. See Change Case.
User A person who uses the IT Service on a day-to-day basis. Users are distinct from
Customers, as some Customers do not use the IT Service directly.
User Profile (UP) (Service Strategy) A pattern of User demand for IT Services. Each User
Profile includes one or more Patterns of Business Activity.
Utility (Service Strategy) Functionality offered by a Product or Service to meet a particular
need. Utility is often summarized as "what it does". See Service Utility.
Copyright IBM Corp. 2009
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
A-47
A-48
Vision A description of what the Organization. intends to become in the future. A Vision
is created by senior management and is used to help influence Culture and Strategic
Planning.
IT Infrastructure Library (ITIL) Foundations v3
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Vital Business Function (VBF) (Service Design) A Function of a Business Process which
is critical to the success of the Business. Vital Business Functions are an important
consideration of Business Continuity Management, IT Service Continuity Management
and Availability Management.
Vulnerability A weakness that could be exploited by a Threat. For example an open
firewall port, a password that is never changed, or a flammable carpet. A missing Control
is also considered to be a Vulnerability.
Warm Standby Synonym for Intermediate Recovery.
Warranty (Service Strategy) A promise or guarantee that a product or Service will meet
its agreed Requirements. See Service Validation and Testing, Service Warranty.
Work in Progress (WIP) A Status that means Activities have started but are not yet
complete. It is commonly used as a Status for Incidents, Problems, Changes etc.
Work Instruction A Document containing detailed instructions that specify exactly what
steps to follow to carry out an Activity. A Work Instruction contains much more detail than
a Procedure and is only created if very detailed instructions are needed.
Workaround (Service Operation) Reducing or eliminating the Impact of an Incident or
Problem for which a full Resolution is not yet available. For example by restarting a failed
Configuration Item. Workarounds for Problems are documented in Known Error Records.
Workarounds for Incidents that do not have associated Problem Records are documented
in the Incident Record.
Workload The Resources required to deliver an identifiable part of an IT Service.
Workloads may be Categorized by Users, groups of Users, or Functions within the IT
Service. This is used to assist in analyzing and managing the Capacity, Performance and
Utilization of Configuration Items and IT Services. The term Workload is sometimes used
as a synonym for Throughput.
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
A-49
A-50
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
1. Service Owner
3. Process Owner
a. 1 and 2 only
b. 1 and 3 only
c. All of the above
d. 2 and 3 only
B-1
2. The Service Desk is always the owner of the Incident Management process.
a. 2 only
b. 1 only
c. All of the above
d. None of the above
7. How does an organization use resources and capabilities in creating value?
a. They are used to create value in the form of output for Production
Management.
b. They are used to create value in the form of goods and services.
c. They are used to create value to the IT organization for Service Support.
d. They are used to create value to the IT organization for Service Delivery.
B-2
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
8. In which core publication can you find detailed descriptions of the following
items?
Demand Management
Financial Management
a. Service Operations
b. Service Strategy
c. Service Transition
d. Continual Service Improvement
9. Which of the following statements best describes the role of communication
during Service Operation?
a. Communication is defined as part of all processes and is performed in Service
Operation.
b. Communication is a separate process that must be defined and executed with
Service Operation.
c. Good communication is essential for successful Service Operation, just as it
is for any other phase of the lifecycle.
d. Communication is more important in Service Operation than in any other
stage of the Service Lifecycle.
10. A Process Owner is responsible for which of the following items?
a. Purchasing tools to support the process
b. Ensuring that targets specified in an SLA are met
c. Carrying out activities defined in the process
d. Monitoring and improving the process
11. For what purpose is Demand Management primarily used?
a. Increase customer value
b. Eliminate excess capacity needs
c. Increase the value of IT
d. Align business with IT cost
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
B-3
a. 1, 2, and 3 only
b. All of the above
c. 1 and 3 only
d. 1, 3 and 4 only
14. Which of the following questions is not answered by Service Portfolio
Management?
a. How should the resources and capabilities be allocated?
b. What opportunities are there in the market?
c. Why should a customer buy these services?
d. What are the pricing or chargeback models?
B-4
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
15. Which of the following statements are not included in Access Management?
a. 2 and 4 only
b. 1 and 3 only
c. 2 and 3 only
d. 1 and 2 only
16. What task is not the responsibility of Application Management?
a. Documenting and maintaining the technical skills required to manage and
support applications
b. Managing applications through their lifecycle
c. Assisting in the decision to build or buy new software
d. Developing operational functionality required by the business
17. If something cannot be measured, it should not be documented within which of
the following items?
a. The Glossary of Terms
b. A Service Level Agreement
c. An Incident Management record
d. A Configuration Item (CI)
18. What is the purpose of the Request Fulfillment process?
a. Dealing with Service Requests from the users
b. Making sure all requests within an IT organization are fulfilled
c. Ensuring fulfillment of Change Requests
d. Making sure the Service Level Agreement is met
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
B-5
19. Which of the following areas can technology help to support during the Service
Transition phase of the lifecycle?
4. Process Design
a. 1, 2, and 3 only
b. 1, 3, and 4 only
c. 2, 3, and 4 only
d. All of the above
20. Which of the following statements is correct about good practice?
a. It can be used to drive an organization forward.
b. It is something that is in wide industry use.
c. It is always documented in international standards.
d. It is always based on ITIL.
B-6
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
1. Service Owner
3. Process Owner
a. 1 and 2 only
b. 1 and 3 only
c. All of the above
d. 2 and 3 only
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
B-7
2. The Service Desk is always the owner of the Incident Management process.
a. 2 only
b. 1 only
c. All of the above
d. None of the above
7. How does an organization use resources and capabilities in creating value?
a. They are used to create value in the form of output for Production
Management.
b. They are used to create value in the form of goods and services.
c. They are used to create value to the IT organization for Service Support.
d. They are used to create value to the IT organization for Service Delivery.
B-8
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
8. In which core publication can you find detailed descriptions of the following
items?
Demand Management
Financial Management
a. Service Operations
b. Service Strategy
c. Service Transition
d. Continual Service Improvement
9. Which of the following statements best describes the role of communication
during Service Operation?
a. Communication is defined as part of all processes and is executed in Service
Operation.
b. Communication is a separate process that needs to be defined and executed
with Service Operation.
c. Good communication is essential for successful Service Operation, just as it
is for any other phase of the lifecycle.
d. Communication is more important in Service Operation than in any other
stage of the Service Lifecycle.
10. A Process Owner is responsible for which of the following items?
a. Purchasing tools to support the process
b. Ensuring that targets specified in an SLA are met
c. Carrying out activities defined in the process
d. Monitoring and improving the process
11. For what purpose is Demand Management primarily used?
a. Increase customer value
b. Eliminate excess capacity needs
c. Increase the value of IT
d. Align business with IT cost
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
B-9
a. 1, 2, and 3 only
b. All of the above
c. 1 and 3 only
d. 1, 3, and 4 only
14. Which of the following questions is not answered by Service Portfolio
Management?
a. How should the resources and capabilities be allocated?
b. What opportunities are there in the market?
c. Why should a customer buy these services?
d. What are the pricing or chargeback models?
B-10
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
15. Which of the following statements are not included in Access Management?
a. 2 and 4 only
b. 1 and 3 only
c. 2 and 3 only
d. 1 and 2 only
16. What task is not the responsibility of Application Management?
a. Documenting and maintaining the technical skills required to manage and
support Applications
b. Managing applications through their lifecycle
c. Assisting in the decision to build or buy new software
d. Developing operational functionality required by the business
17. If something cannot be measured, it should not be documented within which of
the following items?
a. The Glossary of Terms
b. A Service Level Agreement
c. An Incident Management record
d. A Configuration Item (CI)
18. What is the purpose of the Request Fulfillment process?
a. Dealing with Service Requests from the users
b. Making sure all requests within an IT organization is fulfilled
c. Ensuring fulfillment of Change Requests
d. Making sure the Service Level Agreement is met
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
B-11
19. Which of the following areas can technology help to support during the Service
Transition phase of the lifecycle?
4. Process Design
a. 1, 2, and 3 only
b. 1, 3, and 4 only
c. 2, 3, and 4 only
d. All of the above
20. Which of the following statements is correct about good practice?
a. It can be used to move an organization forward.
b. It is something that is in wide industry use.
c. It is always documented in international standards.
d. It is always based on ITIL.
B-12
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.
Role-based Certification
All IBM certifications are based on job roles. They focus on a job a person must do with a
product, not just the products features and functions. The job roles used by Tivoli
Professional Certification include:
II
Course materials may not be reproduced in whole or in part without the prior written permission of IBM.