CMDB AND C ONFIGURATION M ANAGEMENT P ROCESS, S OFTWARE T OOLS C REATION AND M AINTENANCE, P LANNING AND I MPLEMENTATION G UIDE
|
|
- Phebe Dalton
- 5 years ago
- Views:
Transcription
1
2 CMDB AND C ONFIGURATION M ANAGEMENT P ROCESS, S OFTWARE T OOLS C REATION AND M AINTENANCE, P LANNING AND I MPLEMENTATION G UIDE Gerard Blokdijk Notice of Rights: Copyright The Art of Service. All rights reserved. No part of this book may be reproduced or transmitted in any form by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of the publisher. Notice of Liability: The information in this book is distributed on an As Is basis without warranty. While every precaution has been taken in the preparation of the book, neither the author nor the publisher shall have any liability to any person or entity with respect to any loss or damage caused or alleged to be caused directly or indirectly by the instructions contained in this book or by the products described in it. Trademarks: Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and the publisher was aware of a trademark claim, the designations appear as requested by the owner of the trademark. All other product names and services identified throughout this book are used in editorial fashion only and for the benefit of such companies with no intention of infringement of the trademark. No such use, or the use of any trade name, is intended to convey endorsement or other affiliation with this book.
3 W RITE A R EVIEW & R ECEIVE A B ONUS E MEREO EB OOK OF Y OUR C HOICE: U P TO $99 RRP FREE! If you recently bought this book we would love to hear from you! Submit a review of this purchase and you ll receive an additional free ebook of your choice from our catalog at How Does it Work? Submit your review of this title via the online store where you purchased it. For example, to post a review on Amazon, just log in to your account and click on the Create Your Own Review button (under Customer Reviews) on the relevant product page (you ll find plenty of example product reviews on Amazon). If you purchased from a different online store, simply follow their procedures. What Happens When I Submit my Review? Once you have submitted your review, send us an via review@emereo.org, and include a link to your review and a link to the free ebook you d like as our thank-you (from choose any book you like from the catalog, up to $99 RRP). You will then receive a reply back from us, complete with your bonus ebook download link. It's that simple.
4 Table of Contents 1 INTRODUCTION ROADMAP PRESENTATION ONE PRESENTATION TWO SUPPORTING DOCUMENTS VERIFICATION AND AUDIT PLAN FOR CONFIGURATION MANAGEMENT BUSINESS AND IT SERVICE MAPPING FOR CONFIGURATION ITEMS BUSINESS JUSTIFICATION MINDMAPS CMDB DESIGN DOCUMENT ROLES AND RESPONSIBILITIES INVOLVED WITH THE CMDB DATABASE COMMUNICATION PLAN EXAMPLE OF ASSET AND CONFIGURATION MANAGEMENT PLAN CONTENTS IDENTIFICATION GUIDELINES PLANNING AND IMPLEMENTATION FOR CONFIGURATION MANAGEMENT OBJECTIVES / GOALS OTHER CMDB MAINTENANCE CONSIDERATIONS POLICIES, OBJECTIVES AND SCOPE REPORTS AND KPI TARGETS STATUS ACCOUNTING GUIDELINES DESCRIPTION OF ASSET TYPES FURTHER READING Page 3
5 Page 4
6 1 INTRODUCTION ROADMAP Many organizations are looking to implement a CMDB as a way to improve the structure and quality of the business. This section describes the contents of the CMDB and Configuration Management Creation and Maintenance Guide. The information found within the guide is based on the ITIL Version 3 framework, focusing on the process of Service Asset and Configuration Management. There are also valuable insights into managing and maintaining a CMDB within Project Management, for example, the increasingly popular PRINCE 2 and PEMBOK methodologies. The guide is designed to answer a lot of the questions about creating and maintaining a CMDB and provides you with useful guides and user-friendly templates. Presentations can be used to educate or be used as the basis for management presentations or when making business cases for CMDB implementation. The additional information will enable you to improve your organizations knowledge base and provide practical, usable examples and templates for you to use in the creation and maintenance of your CMDB. The book serves to act as a starting point. It will give you a clear path to travel. It is designed to be a valuable source of information and activity. The CMDB and Configuration Management Creation and Maintenance Guide: Flows logically, Is scalable, Provides presentations, templates and documents, Saves you time. Page 5
7 Step 1 Start by reviewing the presentations in the following order: 1. Service Asset and Configuration Management ITIL V3 2. Configuration Management Project Management These presentations will give you a good knowledge and understanding of all the terms, activities and concepts required within Configuration Management. They can also be used as the basis for management presentations or when making a formal business case for a CMDB implementation. Make sure you pay close attention to the notes pages, as well as the slides, as references to further documents and resources are highlighted here. Page 6
8 Step 2 If you did not look at the supporting documents and resources when prompted during the presentations, do this now. Below is an itemized list of the supporting documents and resources for easy reference. You can use these documents and resources within your own organization or as a template to help you in prepare your own bespoke documentation. Service Asset & Configuration Management ITIL V3: 1. Types of Service Assets concise description of what constitutes a service asset. 2. Example Configuration Management System ITIL Version 3 example diagram. 3. Example Service Asset and Configuration Management Plan Contents -a detailed overview of the criteria to be included in the contents of a Service Asset and Configuration Management Plan. 4. CMDB Roles and Responsibilities this is an extremely useful document that includes suggested position description contents. Configuration Management Project Management 1. Suggested Contents of the Configuration Management Plan - a detailed overview of the criteria to be included in the contents of a Project Management Configuration Plan. 2. Typical contents of a CI Record - a detailed overview of the criteria to be included in the contents of a Project Management Configuration Record. Alternatively, continue by working through the CMDB MindMaps and the CMDB Design document with the focus on your organization. This will help you ascertain the Configuration Management maturity for your organization. You will able to identify gaps and areas of attention and/or improvement. The supporting documents and resources found within the guide will help you fill these gaps by giving you a focused, practical and user-friendly approach to creating and maintaining your CMDB. Page 7
9 Page 8
10 2 PRESENTATION ONE Service Asset & Configuration Management GOAL: To support the agreed IT service provision by managing, storing and providing information about Configuration Items (CI s) and Service Assets throughout their life cycle. This process manages the Service Assets and Configuration Items in order to support the other Service Management processes. Page 9
11 Service Asset & Configuration Basic Concepts - Terminology Attribute CI configuration baseline Service Assets CI Level Status Accounting Configuration Item (CI): ANY component that supports an IT service (except people). IT component or associated items such as Request for Changes, Incident Records, Service Level Agreements Attribute: Specific information about CI s. Example: Size of RAM, hard drive, bandwidth Service Assets: Any capability or resource of a service provider. A detailed description of different Types of Service Assets, is available in a separate document within this book. CI Level: Recording and reporting of CI s at the level that the business requires. Status Accounting: Reporting of all current and historical data about each CI throughout its lifecycle. Example: Status = Under Development, being tested, live, withdrawn etc Configuration Baseline: Configuration established at a specific point in time, captures both the structure and details of a configuration. Used as a reference point for later comparison (e.g. after major changes, disaster recovery etc) Page 10
12 Configuration Management Terms & Concepts CMDB Configuration Baseline Software & Document Libraries DSL License Management The Configuration Management Database (CMDB): is the data store for CI information. Most organizations already have a series of spreadsheets and small databases on infrastructure within the IT department. In larger organizations, the growing size and complexity of the infrastructure has forced the use of technology to manage all the associated information. The CMDB can hold a variety of information including details on users, customers, user groups, business units (Caution: consider privacy legislation at this point). The CMDB is also demonstrable and as an auditable concept it can be used as a compliance mechanism for legal requirements. CI information relating to incidents, problems, known errors, changes, releases; as well as inter CI relationships will be stored in the database. Configuration Baseline: Configuration of a product or system established at a specific point in time, which captures both the structure and details of that product or system, and enables that product or system to be rebuilt at a later date. A snapshot or a position which is recorded. Although the position may be updated later, the baseline remains unchanged and available as a reference of the original state and as a comparison against the current position. Continued from page 14 Page 11
13 Configuration Management Terms & Concepts CMDB Configuration Baseline Software & Document Libraries DSL License Management Software and Document Libraries: Consists of; Collection of software and documents of known status. Controlling mechanism for software release. The Definitive Software Library (DSL): is the logical storage location for master copies of software. The word definitive means ultimate, perfect, best. License management: business people now face harsh financial penalties if they are found to be unable to control and monitor their software usage/licenses. Configuration Management is a crucial process in assisting in the control of software licenses. Page 12
14 Service Asset & Configuration Scope of IT Infrastructure Configuration Items CI s Include Software & Documentation!! Relationships CI Attributes Hard disk space Serial number Owner Location Ram CI Level Scope Service Asset and Configuration Management may cover non-it assets, work products used to develop the services and configuration items required to support the service that are not formally classified as assets. The scope covers interfaces to internal and external service providers where there are assets and configuration items that need to be controlled e.g. shared assets. There is a diagram of an ITIL Version 3 Example Configuration Management System available within this book. Page 13
15 Service Asset & Configuration Activities Identification Control Management & Planning Status Accounting Verification & Audit Reporting Source: the Art of Service Notice how Management & Planning are the central activities. Good, sound Service Asset & Configuration Management requires thorough planning. Page 14
16 Service Asset & Configuration Activities - Planning Planning consists of Defining the strategy, policy, scope, objectives, processes and procedures Roles and responsibilities Location of storage areas and libraries used to hold hardware, software and documentation CMDB Design CI naming conventions Housekeeping including license management and archiving of CI s Identification Control Status Accounting Planning Verification & Audit Reporting There is an ITIL Version 3 Example Asset and Configuration Management Plan Contents available as a separate document within this book. Page 15
17 Service Asset & Configuration Activities - Identification The selection, identification, labelling and registration of CIs. Identification can take place for: Hardware and Software include OS Business systems custom built Packages off the shelf Physical databases Feeds between databases and links Configuration baselines Software releases Identification Documentation Control Planning Status Accounting Verification & Audit Reporting Criteria for CI information to be valuable: It facilitates the management of Change The control of Incidents and Problems Or the control of assets that can be independently moved, copied or changed. Page 16
18 Service Asset & Configuration Activities - Control Ensures that only authorized and identifiable CIs are recorded from receipt to disposal in order to protect the integrity of configurations. Control occurs for: Registration of all new CI s and versions Update of CI records and licence control Updates in connection with RFC s and Change Management Update the CMDB after periodic checking of physical items Identification Control Status Accounting Planning Verification & Audit Reporting Configuration Management needs to understand the CI lifecycle and have procedures in place to ensure proper control over its CI s, throughout their lifecycle. Page 17
19 Service Asset & Configuration Activities - Status Accounting Is the reporting of all current and historical data concerned with each CI throughout its lifecycle Provides information on Configuration baselines Latest software item versions The person responsible for status change CI change history CI incident / problem history Identification Control Status Accounting Planning Verification & Audit Reporting Each asset or CI will have one or more states throughout its lifecycle. The significance of each state is defined by asking the question: What use can be made of the Asset or CI, while in that state? An example of this lifecycle is: Development or draft denoting that the CI is under development and that no particular reliance should be placed on it. Approved meaning that the CI may be used as a basis for further work Under Change is currently being modified by Change Management, may be unreliable until Change completed. Withdrawn meaning withdrawn from use, either because the CI is no longer fit for the purpose or because there is no further use for it. Page 18
20 Service Asset & Configuration Activities - Verification and Audit Reviews and audits verify the existence of CI s, checking that they are correctly recorded in the CMDB and that there is conformity between the documented baselines and the actual business to which they refer. Configuration Audits should occur at the following times: Before and after major changes to the IT infrastructure Following recovery from disaster In response to the detection of an unauthorised CI Identification At regular intervals Control Status Accounting Planning Verification & Audit Reporting Key point: Automate audits where possible through software tools Page 19
TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS
Target2-Securities Project Team TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Reference: T2S-07-0270 Date: 09 October 2007 Version: 0.1 Status: Draft Target2-Securities - User s TABLE OF CONTENTS
More informationISEB Practitioner Certificate in IT Service Management: Specialising in Release and Control
Syllabus and Qualification Framework This qualification covers the Service Management disciplines of Configuration Management, Change Management and Release Management that together comprise Release and
More informationPart 1: Overview and concepts
Provläsningsexemplar / Preview INTERNATIONAL STANDARD ISO/IEC 19086-1 First edition 2016-09-15 Information technology Cloud computing Service level agreement (SLA) framework Part 1: Overview and concepts
More informationThe ITIL v.3. Foundation Examination
The ITIL v.3. Foundation Examination ITIL v. 3 Foundation Examination: Sample Paper 4, version 3.0 Multiple Choice Instructions 1. All 40 questions should be attempted. 2. There are no trick questions.
More informationITSM20F_Umang. Number: ITSM20F Passing Score: 800 Time Limit: 120 min File Version: 4.0. Exin ITSM20F
ITSM20F_Umang Number: ITSM20F Passing Score: 800 Time Limit: 120 min File Version: 4.0 http://www.gratisexam.com/ Exin ITSM20F IT Service Management Foundation based on ISO/IEC 20000 (ITSM20F.EN) Version:
More informationOG0-091 Q&As TOGAF 9 Part 1
CertBus.com OG0-091 Q&As TOGAF 9 Part 1 Pass The Open Group OG0-091 Exam with 100% Guarantee Free Download Real Questions & Answers PDF and VCE file from: 100% Passing Guarantee 100% Money Back Assurance
More informationTest Environment Configuration and Management using ITIL principles
Test Environment Configuration and Management using ITIL principles Mark Crowther Empirical Pragmatic Tester About this slide pack. This slide pack provides a brief overview of how to approach defining
More informationVISUAL QUICKSTART GUIDE QUICKTIME PRO 4. Judith Stern Robert Lettieri. Peachpit Press
VISUAL QUICKSTART GUIDE QUICKTIME PRO 4 Judith Stern Robert Lettieri Peachpit Press Visual QuickStart Guide QuickTime Pro 4 Judith Stern Robert Lettieri Peachpit Press 1249 Eighth Street Berkeley, CA 94710
More informationInformation technology Security techniques Information security controls for the energy utility industry
INTERNATIONAL STANDARD ISO/IEC 27019 First edition 2017-10 Information technology Security techniques Information security controls for the energy utility industry Technologies de l'information Techniques
More informationThe ITIL Foundation Examination
The ITIL Foundation Examination Sample Paper A, version 5.1 Multiple Choice Instructions 1. All 40 questions should be attempted. 2. All answers are to be marked on the answer grid provided. 3. You have
More informationSIMS TERMS AND CONDITIONS OF USE AGREEMENT
SIMS TERMS AND CONDITIONS OF USE AGREEMENT 1. These Terms and Conditions ("the Terms and Conditions") govern your ("the User") use of the Website and Web application and the information thereon, known
More informationAuditing The Oracle Database
Auditing The Oracle Database PFCATK A Toolkit to Help 1 Legal Notice Auditing The Oracle Database Published by PeteFinnigan.com Limited 9 Beech Grove Acomb York England, YO26 5LD Copyright 2017 by PeteFinnigan.com
More informationISO/IEC 8348 INTERNATIONAL STANDARD. Information technology Open Systems Interconnection Network service definition
INTERNATIONAL STANDARD ISO/IEC 8348 Third edition 2002-11-01 Information technology Open Systems Interconnection Network service definition Technologies de l'information Interconnexion des systèmes ouverts
More informationGuide to IREE Certification
Guide to IREE Certification Certification Congratulations on your decision to pursue Investor Ready Energy Efficiency (IREE) Certification for your project! As a building owner, by choosing to pursue IREE
More informationData Protection. Practical Strategies for Getting it Right. Jamie Ross Data Security Day June 8, 2016
Data Protection Practical Strategies for Getting it Right Jamie Ross Data Security Day June 8, 2016 Agenda 1) Data protection key drivers and the need for an integrated approach 2) Common challenges data
More informationImprove testing for customer services and service management
Improve testing for customer services and service management Shirley Lacy www.connectsphere.com Material Copyright ConnectSphere Limited 2013 1 Topics Introduction ITIL concepts for service design and
More informationState Government Digital Preservation Profiles
July 2006 2006 Center for Technology in Government The Center grants permission to reprint this document provided this cover page is included. This page intentionally left blank. Introduction The state
More informationMANDATORY CRITERIA. Comments: Yes. The contract screen identifies SLA s and associated CI s.
MANDATORY CRITERIA *CMDB= Configuration Management Database *CI= Configuration Items *SLA= Service Level Agreement *RFC= Request For Change 1. Does the tool facilitate the registration and management of
More information2 The IBM Data Governance Unified Process
2 The IBM Data Governance Unified Process The benefits of a commitment to a comprehensive enterprise Data Governance initiative are many and varied, and so are the challenges to achieving strong Data Governance.
More informationROLE DESCRIPTION IT SPECIALIST
ROLE DESCRIPTION IT SPECIALIST JOB IDENTIFICATION Job Title: Job Grade: Department: Location Reporting Line (This structure reports to?) Full-time/Part-time/Contract: IT Specialist D1 Finance INSETA Head
More informationUsing ZENworks with Novell Service Desk
www.novell.com/documentation Using ZENworks with Novell Service Desk Novell Service Desk 7.1 April 2015 Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or
More informationProficy* Historian S IMULATION D ATA C OLLECTOR G UIDE. Version 6.0 June 2015
Proficy* Historian S IMULATION D ATA C OLLECTOR G UIDE Version 6.0 June 2015 Disclaimer of Warranties and Liability The information contained in this manual is believed to be accurate and reliable. However,
More informationProficy* Historian OSI PI C OLLECTOR G UIDE. Version 6.0 June 2015
Proficy* Historian OSI PI C OLLECTOR G UIDE Version 6.0 June 2015 Disclaimer of Warranties and Liability The information contained in this manual is believed to be accurate and reliable. However, GE Intelligent
More informationConfiguration Management Databases (CMDBs) and Configuration Management System (CMS) are both elements of what larger entity?
ITIL Foundation mock exam 3 1. Configuration Management Databases (CMDBs) and Configuration Management System (CMS) are both elements of what larger entity? A) The Asset Register B) The Service Knowledge
More informationIT MANAGER PERMANENT SALARY SCALE: P07 (R ) Ref:AgriS042/2019 Information Technology Manager. Reporting to. Information Technology (IT)
DESIGNATION Reporting to Division Office Location IT MANAGER PERMANENT SALARY SCALE: P07 (R806 593.00) Ref:AgriS042/2019 Information Technology Manager CEO Information Technology (IT) Head office JOB PURPOSE
More informationCertificate Software Asset Management Essentials Syllabus. Version 2.0
Certificate Software Asset Management Essentials Syllabus Version 2.0 June 2010 Certificate in Software Asset Management Essentials Leaning Objectives Holders of the ISEB Certificate in SAM Essentials
More informationFree ITIL Foundation Exam Paper 40 Questions 60 Minutes Allowed. Minimum of 26/40 to Pass. With the Compliments of www.itservicesuccess.com Good Luck!! GIVE YOURSELF THE UNFAIR ADVANTAGE! MULTIPLE CHOICE
More informationIETF TRUST. Legal Provisions Relating to IETF Documents. Approved November 6, Effective Date: November 10, 2008
IETF TRUST Legal Provisions Relating to IETF Documents Approved November 6, 2008 Effective Date: November 10, 2008 1. Background The IETF Trust was formed on December 15, 2005, for, among other things,
More informationWORKSHARE SECURITY OVERVIEW
WORKSHARE SECURITY OVERVIEW April 2016 COMPANY INFORMATION Workshare Security Overview Workshare Ltd. (UK) 20 Fashion Street London E1 6PX UK Workshare Website: www.workshare.com Workshare Inc. (USA) 625
More informationThis document is a preview generated by EVS
INTERNATIONAL STANDARD ISO/IEC 19770-5 Second edition 2015-08-01 Information technology IT asset management Overview and vocabulary Technologies de l information Gestion de biens de logiciel Vue d ensemble
More informationWELCOME TO ITIL FOUNDATIONS PREP CLASS AUBREY KAIGLER
WELCOME TO ITIL FOUNDATIONS PREP CLASS AUBREY KAIGLER 2 Demand Management Demand management: The process used to make investmentrelated decisions across the enterprise. Pattern Pattern of of Business Activity
More informationINTERNATIONAL STANDARD
INTERNATIONAL STANDARD ISO/IEC 90003 First edition 2004-02-15 Software engineering Guidelines for the application of ISO 9001:2000 to computer software Ingénierie du logiciel Lignes directrices pour l'application
More informationISO/IEC INTERNATIONAL STANDARD. Software engineering Software measurement process. Ingénierie du logiciel Méthode de mesure des logiciels
INTERNATIONAL STANDARD ISO/IEC 15939 First edition 2002-07-15 Software engineering Software measurement process Ingénierie du logiciel Méthode de mesure des logiciels Reference number ISO/IEC 15939:2002(E)
More information6 Tips to Help You Improve Configuration Management. by Stuart Rance
6 Tips to Help You Improve Configuration Management by Stuart Rance Introduction Configuration management provides information about what assets you own, how they are configured, and how they are connected
More informationInformation technology Service management. Part 11: Guidance on the relationship between ISO/IEC :2011 and service management frameworks: ITIL
Provläsningsexemplar / Preview TECHNICAL REPORT ISO/IEC TR 20000-11 First edition 2015-12-15 Information technology Service management Part 11: Guidance on the relationship between ISO/IEC 20000-1:2011
More informationIETF TRUST. Legal Provisions Relating to IETF Documents. February 12, Effective Date: February 15, 2009
IETF TRUST Legal Provisions Relating to IETF Documents February 12, 2009 Effective Date: February 15, 2009 1. Background The IETF Trust was formed on December 15, 2005, for, among other things, the purpose
More informationISO/IEC INTERNATIONAL STANDARD. Information technology Code of practice for information security management
INTERNATIONAL STANDARD ISO/IEC 17799 First edition 2000-12-01 Information technology Code of practice for information security management Technologies de l'information Code de pratique pour la gestion
More informationISO/IEC INTERNATIONAL STANDARD
INTERNATIONAL STANDARD ISO/IEC 15945 First edition 2002-02-01 Information technology Security techniques Specification of TTP services to support the application of digital signatures Technologies de l'information
More informationQuality Assurance Procedure Use of Accreditation Body & FP Certification FZE Marks, Logos and Symbols
Index 1.0 Purpose 2.0 Scope 3.0 References 4.0 Definitions 5.0 Responsibilities 6.0 Procedure 7.0 Records FP Certification Template Rev 002 1.0 Purpose 1.1 This procedure describes the applicable, rules
More informationISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION
ISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION Cathy Bates Senior Consultant, Vantage Technology Consulting Group January 30, 2018 Campus Orientation Initiative and Project Orientation Project
More informationSymantec ServiceDesk 7.1 SP1 Implementation Guide
Symantec ServiceDesk 7.1 SP1 Implementation Guide Symantec ServiceDesk 7.1 SP1 Implementation Guide The software described in this book is furnished under a license agreement and may be used only in accordance
More informationCorporate Information Security Policy
Overview Sets out the high-level controls that the BBC will put in place to protect BBC staff, audiences and information. Audience Anyone who has access to BBC Information Systems however they are employed
More informationThis document is a preview generated by EVS
INTERNATIONAL STANDARD ISO 15489-1 Second edition 2016-04-15 Information and documentation Records management Part 1: Concepts and principles Information et documentation Gestion des documents d activité
More informationTechnical Security Standard
Technical Security Standard Title: Minimum Controls TSS Version: 1.1 Effective Date July 2018 This Standard defines the minimum baseline security controls and Summary: processes required for a given Information
More informationThis document is a preview generated by EVS
INTERNATIONAL STANDARD ISO/IEC 29151 First edition 2017-08 Information technology Security techniques Code of practice for personally identifiable information protection Technologies de l'information Techniques
More informationVulnerability Scan Service. User Guide. Issue 20 Date HUAWEI TECHNOLOGIES CO., LTD.
Issue 20 Date 2018-08-30 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Ltd. 2018. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any
More informationInformation Security Policy
April 2016 Table of Contents PURPOSE AND SCOPE 5 I. CONFIDENTIAL INFORMATION 5 II. SCOPE 6 ORGANIZATION OF INFORMATION SECURITY 6 I. RESPONSIBILITY FOR INFORMATION SECURITY 6 II. COMMUNICATIONS REGARDING
More informationPROPOSED DRAFT FOR TRIAL USE AND DISCUSSION ONLY secretariat PROPOSED DRAFT AES24-2-TU 99/02/2818:41
STANDARDS The AES Standards Committee is the organization responsible for the standards program of the Audio Engineering Society. It publishes technical standards, information documents and technical reports.
More informationEvaluating and Improving Cybersecurity Capabilities of the Electricity Critical Infrastructure
Evaluating and Improving Cybersecurity Capabilities of the Electricity Critical Infrastructure March 2015 Pamela Curtis Dr. Nader Mehravari Katie Stewart Cyber Risk and Resilience Management Team CERT
More informationMasterCard NFC Mobile Device Approval Guide v July 2015
MasterCard NFC Mobile Device Approval Guide v2.0 30 July 2015 Notices Following are policies pertaining to proprietary rights, trademarks, translations, and details about the availability of additional
More informationSAP Policy Management, group insurance add-on 1.1
Security Guide Document Version: 1.1 2017-05-03 1.1 Typographic Conventions Type Style Example Description Words or characters quoted from the screen. These include field names, screen titles, pushbuttons
More informationSERVERS / SERVICES AT DATA CENTER AND CO-LOCATION POLICY
SERVERS / SERVICES AT DATA CENTER AND CO-LOCATION POLICY National Video Conferencing Network Version 1.0 Released January 01, 2014 HIGHER EDUCATION COMMISSION, PAKISTAN 1 GENERAL The Higher Education Commission
More informationTEL2813/IS2820 Security Management
TEL2813/IS2820 Security Management Security Management Models And Practices Lecture 6 Jan 27, 2005 Introduction To create or maintain a secure environment 1. Design working security plan 2. Implement management
More informationISO/IEC INTERNATIONAL STANDARD
INTERNATIONAL STANDARD ISO/IEC 14143-2 First edition 2002-11-15 Information technology Software measurement Functional size measurement Part 2: Conformity evaluation of software size measurement methods
More informationNORTH AMERICAN ELECTRIC RELIABILITY CORPORATION
NORTH AMERICAN ELECTRIC RELIABILITY CORPORATION NARUC Energy Regulatory Partnership Program The Public Services Regulatory Commission of Armenia and The Iowa Utilities Board Janet Amick Senior Utility
More informationINCLUDING MEDICAL ADVICE DISCLAIMER
Jordan s Guardian Angels Terms and Conditions of Use INCLUDING MEDICAL ADVICE DISCLAIMER Your use of this website and its content constitutes your agreement to be bound by these terms and conditions of
More informationBITDEFENDER HERE GENERIC COURSES. Training Certifications
BITDEFENDER HERE GENERIC COURSES Training Certifications LEGAL NOTICE All rights reserved. No part of this book may be reproduced or transmitted in any form or by any means, electronic or mechanical, including
More informationThis document is a preview generated by EVS
TECHNICAL REPORT ISO/IEC TR 24722 Second edition 2015-12-15 Information technology Biometrics Multimodal and other multibiometric fusion Technologies de l information Biométrie Fusion multimodale et autre
More informationAustralian Standard. Records Management. Part 2: Guidelines AS ISO ISO TR
AS ISO 15489.2 2002 ISO TR 15489-2 AS ISO 15489.2 Australian Standard Records Management Part 2: Guidelines [ISO title: Information and documentation Records management Part 2: Guidelines] This Australian
More informationISO INTERNATIONAL STANDARD
INTERNATIONAL STANDARD ISO 20022-1 First edition 2004-12-15 Financial services UNIversal Financial Industry message scheme Part 1: Overall methodology and format specifications for inputs to and outputs
More informationPLAINSCAPITAL BANK SAMSUNG PAY TERMS AND CONDITIONS - PERSONAL
PLAINSCAPITAL BANK SAMSUNG PAY TERMS AND CONDITIONS - PERSONAL Last Modified: 3/12/2018 These terms and conditions ( Terms and Conditions ) are a legal agreement between you and PlainsCapital Bank that
More informationAmazon Marketing Services User Guide
Contents Register Your Brand...2 Add Additional Users and Brands...2 Add a new brand...2 Add a brand user to AMS...3 Change the permission level for a brand user...3 Amazon Pages...4 Begin working with
More informationISO/IEC/ IEEE Systems and software engineering Content of life-cycle information items (documentation)
This is a preview - click here to buy the full publication INTERNATIONAL STANDARD ISO/IEC/ IEEE 15289 Second edition 2015-05-15 Systems and software engineering Content of life-cycle information items
More informationBCS EXIN ITAMOrg Software Asset Management Specialist Syllabus Version 1.1 December 2016
BCS EXIN ITAMOrg Software Asset Management Specialist Syllabus Version 1.1 December 2016 This professional certification is not regulated by the following United Kingdom Regulators - Ofqual, Qualification
More informationITSM Configuration Coordinators
ITSM Configuration Coordinators Role and Responsibilities Revision Date February 8, 2018 Version Number 6.0 Page 1 Document Ownership Document Owner Maury Collins Revision History ITSM Role, Department
More informationSwedish National Data Service, SND Checklist Data Management Plan Checklist for Data Management Plan
Swedish National Data Service, SND Checklist Data Management Plan 2017-10-16 Checklist for Data Management Plan Content Checklist for Data Management Plan... 1 Introduction to SND:s Checklist for Data
More informationInformation technology Security techniques Application security. Part 5: Protocols and application security controls data structure
This is a preview - click here to buy the full publication INTERNATIONAL STANDARD ISO/IEC 27034-5 First edition 2017-10 Information technology Security techniques Application security Part 5: Protocols
More informationISO27001:2013 The New Standard Revised Edition
ECSC UNRESTRICTED ISO27001:2013 The New Standard Revised Edition +44 (0) 1274 736223 consulting@ecsc.co.uk www.ecsc.co.uk A Blue Paper from Page 1 of 14 Version 1_00 Date: 27 January 2014 For more information
More informationINTERNATIONAL STANDARD
INTERNATIONAL STANDARD ISO 15188 First edition 2001-07-15 Project management guidelines for terminology standardization Lignes directrices pour la gestion de projets de normalisation terminologique Reference
More informationEbook Niche Explorer User Manual
Ebook Niche Explorer User Manual 2012 James J. Jones, LLC. Need help or support, or just not sure about a feature? Submit a Support Ticket at: http://www.tnrsupport.com/support/index.php?/tickets/submit
More informationADMIN 3.4. V e r s i o n 4. Paul Daly CEO RISSB
ADMIN 3.4 V e r s i o n 4 Paul Daly CEO RISSB 01 November 2017 DOCUMENT CONTROL Identification Document Title Number Version Date Document ADMIN 3.4 1 23/11/2007 Document ADMIN 3.4 2 04/02/2010 Document
More informationISO/IEC INTERNATIONAL STANDARD. Information technology Software asset management Part 2: Software identification tag
INTERNATIONAL STANDARD ISO/IEC 19770-2 First edition 2009-11-15 Information technology Software asset management Part 2: Software identification tag Technologies de l'information Gestion de biens de logiciel
More informationOCTOSHAPE SDK AND CLIENT LICENSE AGREEMENT (SCLA)
OCTOSHAPE SDK AND CLIENT LICENSE AGREEMENT (SCLA) This is a License Agreement (the "Agreement") for certain code (the Software ) owned by Akamai Technologies, Inc. ( Akamai ) that is useful in connection
More informationISO/IEC INTERNATIONAL STANDARD. Information technology Security techniques Code of practice for information security management
INTERNATIONAL STANDARD ISO/IEC 17799 Second edition 2005-06-15 Information technology Security techniques Code of practice for information security management Technologies de l'information Techniques de
More informationPCI Policy Compliance Using Information Security Policies Made Easy. PCI Policy Compliance Information Shield Page 1
PCI Policy Compliance Using Information Security Policies Made Easy PCI Policy Compliance Information Shield Page 1 PCI Policy Compliance Using Information Security Policies Made Easy By David J Lineman
More informationEnterprise - Control System Integration Part 2: Object Model Attributes
ISA Draft 95.00.02 Draft Standard Enterprise - Control System Integration Part 2: Object Model Attributes Draft 9 May 2001 Deleted: 8 Deleted: April This document is a draft that represents work being
More informationAUTHORIZED DOCUMENTATION. Using ZENworks with Novell Service Desk Novell Service Desk February 03,
AUTHORIZED DOCUMENTATION Using ZENworks with Novell Service Desk 6.5.4 Novell Service Desk 6.5.4 February 03, 2012 www.novell.com Legal Notices Novell, Inc. makes no representations or warranties with
More informationEnabler Release Definition for Converged Personal Network Service
Enabler Release Definition for Converged Personal Network Service Approved Version 1.0 23 Oct 2012 Open Mobile Alliance OMA-ERELD-CPNS-V1_0-20121023-A OMA-ERELD-CPNS-V1_0-20121023-A Page 2 (16) Use of
More informationCERTIFIED MAIL LABELS TERMS OF USE and PRIVACY POLICY Agreement
CERTIFIED MAIL LABELS TERMS OF USE and PRIVACY POLICY Agreement Welcome to Certified Mail Envelopes and Certified Mail Labels web sites (the Site ) a website, trademark and business name owned and operated
More informationInformation Security Management Criteria for Our Business Partners
Information Security Management Criteria for Our Business Partners Ver. 2.1 April 1, 2016 Global Procurement Company Information Security Enhancement Department Panasonic Corporation 1 Table of Contents
More informationORACLE DATABASE LIFECYCLE MANAGEMENT PACK
ORACLE DATABASE LIFECYCLE MANAGEMENT PACK ORACLE DATABASE LIFECYCLE MANAGEMENT PACK KEY FEATURES Auto Discovery of hosts Inventory tracking and reporting Database provisioning Schema and data change management
More informationEJBCA Enterprise Cloud Edition CloudHSM Integration Guide
EJBCA Enterprise Cloud Edition CloudHSM Integration Guide PRINT DATE: 2019-03-26 Copyright 2019 PrimeKey Solutions Published by PrimeKey Solutions AB Solna Access, Sundbybergsvägen 1 SE-171 73 Solna, Sweden
More informationInstallation Guide. Copyright 2011 Bitdefender
Installation Guide Copyright 2011 Bitdefender Bitdefender Total Security 2012 Installation Guide Publication date 2011.07.15 Copyright 2011 Bitdefender Legal Notice All rights reserved. No part of this
More informationTechnical Specification MEF 14. Abstract Test Suite for Traffic Management Phase 1. November, 2005
Technical Specification Abstract Test Suite for Traffic Management Phase 1 November, 2005 Disclaimer The information in this publication is freely available for reproduction and use by any recipient and
More informationISO/IEC Information technology Security techniques Code of practice for information security management
This is a preview - click here to buy the full publication INTERNATIONAL STANDARD ISO/IEC 17799 Second edition 2005-06-15 Information technology Security techniques Code of practice for information security
More informationBuilding Information Modeling and Digital Data Exhibit
Document E203 2013 Building Information Modeling and Digital Data Exhibit This Exhibit dated the day of in the year is incorporated into the agreement (the Agreement ) between the Parties for the following
More informationISO/IEC INTERNATIONAL STANDARD. Information technology Guideline for the evaluation and selection of CASE tools
INTERNATIONAL STANDARD ISO/IEC 14102 Second edition 2008-11-01 Information technology Guideline for the evaluation and selection of CASE tools Technologies de l'information Lignes directrices pour l'évaluation
More informationWeb Point and Print White Paper
07/26/2010 Technical Information: White Paper Document Version 1.0 Copyright 2010 RICOH Americas Corporation. All rights reserved. Page 1 of 9 Visit our Knowledgebase at: http://tsrc.ricoh-usa.com/ref/faq.asp
More informationInformation technology Security techniques Telebiometric authentication framework using biometric hardware security module
INTERNATIONAL STANDARD ISO/IEC 17922 First edition 2017-09 Information technology Security techniques Telebiometric authentication framework using biometric hardware security module Technologies de l information
More informationAdministrative Guideline. SMPTE Metadata Registers Maintenance and Publication SMPTE AG 18:2017. Table of Contents
SMPTE AG 18:2017 Administrative Guideline SMPTE Metadata Registers Maintenance and Publication Page 1 of 20 pages Table of Contents 1 Scope 3 2 Conformance Notation 3 3 Normative References 3 4 Definitions
More informationNavigating through the Risks and Challenges of implementing Green IT Projects
Navigating through the Risks and Challenges of implementing Green IT Projects Jerry Kopan, ITIL V3 Expert, V2 Service Manager, PMP, CMC, B.Sc. ITSM Project Manager and ITIL Trainer Page 1 Abstract Implementing
More informationPolicy Document. PomSec-AllSitesBinder\Policy Docs, CompanyWide\Policy
Policy Title: Binder Association: Author: Review Date: Pomeroy Security Principles PomSec-AllSitesBinder\Policy Docs, CompanyWide\Policy Joseph Shreve September of each year or as required Purpose:...
More informationInformation Technology Branch Organization of Cyber Security Technical Standard
Information Technology Branch Organization of Cyber Security Technical Standard Information Management, Administrative Directive A1461 Cyber Security Technical Standard # 1 November 20, 2014 Approved:
More informationLightweight Machine to Machine Architecture
Lightweight Machine to Machine Architecture Candidate Version 1.0 10 Dec 2013 Open Mobile Alliance OMA-AD-LightweightM2M-V1_0-20131210-C OMA-AD-LightweightM2M-V1_0-20131210-C Page 2 (12) Use of this document
More informationNICC ND 1610 V4.1.1 ( )
NICC Document Next Generation Networks; Release Definition c/o TWP ACCOUNTING LLP, The Old Rectory, Church Street, Weybridge, Surrey KT13 8DE Tel.: +44(0) 20 7036 3636 Registered in England and Wales under
More informationImplementing ITIL v3 Service Lifecycle
Implementing ITIL v3 Lifecycle WHITE PAPER introduction GSS INFOTECH IT services have become an integral means for conducting business for all sizes of businesses, private and public organizations, educational
More informationMaximo 7.5 System Administration Basics. A learning guide with discussion and exercises IBM Maximo 7.5 for Asset Management and IT
Maximo 7.5 System Administration Basics A learning guide with discussion and exercises IBM Maximo 7.5 for Asset Management and IT Prepared by: 510 King Street, Suite 200 Alexandria, Virginia 22314 (703)
More informationSERVICE MANAGEMENT TRAINING PRODUCTS AND SERVICES ENDORSEMENT SCHEME. Rules and Guidance for Providers
SERVICE MANAGEMENT TRAINING PRODUCTS AND SERVICES ENDORSEMENT SCHEME Rules and Guidance for Providers Change control: Version Status Author Date Comments 0.1 First Draft Helen Sussex 27 th November First
More informationAdministration and Data Retention. Best Practices for Systems Management
Administration and Data Retention Best Practices for Systems Management Agenda Understanding the Context for IT Management Concepts for Managing Key IT Objectives Aptify and IT Management Best Practices
More informationVeritas Enterprise Vault Setting up SharePoint Server Archiving 12.2
Veritas Enterprise Vault Setting up SharePoint Server Archiving 12.2 Veritas Enterprise Vault: Setting up SharePoint Server Archiving Last updated: 2017-08-10. Legal Notice Copyright 2017 Veritas Technologies
More information