CMDB AND C ONFIGURATION M ANAGEMENT P ROCESS, S OFTWARE T OOLS C REATION AND M AINTENANCE, P LANNING AND I MPLEMENTATION G UIDE

Size: px
Start display at page:

Download "CMDB AND C ONFIGURATION M ANAGEMENT P ROCESS, S OFTWARE T OOLS C REATION AND M AINTENANCE, P LANNING AND I MPLEMENTATION G UIDE"

Transcription

1

2 CMDB AND C ONFIGURATION M ANAGEMENT P ROCESS, S OFTWARE T OOLS C REATION AND M AINTENANCE, P LANNING AND I MPLEMENTATION G UIDE Gerard Blokdijk Notice of Rights: Copyright The Art of Service. All rights reserved. No part of this book may be reproduced or transmitted in any form by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of the publisher. Notice of Liability: The information in this book is distributed on an As Is basis without warranty. While every precaution has been taken in the preparation of the book, neither the author nor the publisher shall have any liability to any person or entity with respect to any loss or damage caused or alleged to be caused directly or indirectly by the instructions contained in this book or by the products described in it. Trademarks: Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and the publisher was aware of a trademark claim, the designations appear as requested by the owner of the trademark. All other product names and services identified throughout this book are used in editorial fashion only and for the benefit of such companies with no intention of infringement of the trademark. No such use, or the use of any trade name, is intended to convey endorsement or other affiliation with this book.

3 W RITE A R EVIEW & R ECEIVE A B ONUS E MEREO EB OOK OF Y OUR C HOICE: U P TO $99 RRP FREE! If you recently bought this book we would love to hear from you! Submit a review of this purchase and you ll receive an additional free ebook of your choice from our catalog at How Does it Work? Submit your review of this title via the online store where you purchased it. For example, to post a review on Amazon, just log in to your account and click on the Create Your Own Review button (under Customer Reviews) on the relevant product page (you ll find plenty of example product reviews on Amazon). If you purchased from a different online store, simply follow their procedures. What Happens When I Submit my Review? Once you have submitted your review, send us an via review@emereo.org, and include a link to your review and a link to the free ebook you d like as our thank-you (from choose any book you like from the catalog, up to $99 RRP). You will then receive a reply back from us, complete with your bonus ebook download link. It's that simple.

4 Table of Contents 1 INTRODUCTION ROADMAP PRESENTATION ONE PRESENTATION TWO SUPPORTING DOCUMENTS VERIFICATION AND AUDIT PLAN FOR CONFIGURATION MANAGEMENT BUSINESS AND IT SERVICE MAPPING FOR CONFIGURATION ITEMS BUSINESS JUSTIFICATION MINDMAPS CMDB DESIGN DOCUMENT ROLES AND RESPONSIBILITIES INVOLVED WITH THE CMDB DATABASE COMMUNICATION PLAN EXAMPLE OF ASSET AND CONFIGURATION MANAGEMENT PLAN CONTENTS IDENTIFICATION GUIDELINES PLANNING AND IMPLEMENTATION FOR CONFIGURATION MANAGEMENT OBJECTIVES / GOALS OTHER CMDB MAINTENANCE CONSIDERATIONS POLICIES, OBJECTIVES AND SCOPE REPORTS AND KPI TARGETS STATUS ACCOUNTING GUIDELINES DESCRIPTION OF ASSET TYPES FURTHER READING Page 3

5 Page 4

6 1 INTRODUCTION ROADMAP Many organizations are looking to implement a CMDB as a way to improve the structure and quality of the business. This section describes the contents of the CMDB and Configuration Management Creation and Maintenance Guide. The information found within the guide is based on the ITIL Version 3 framework, focusing on the process of Service Asset and Configuration Management. There are also valuable insights into managing and maintaining a CMDB within Project Management, for example, the increasingly popular PRINCE 2 and PEMBOK methodologies. The guide is designed to answer a lot of the questions about creating and maintaining a CMDB and provides you with useful guides and user-friendly templates. Presentations can be used to educate or be used as the basis for management presentations or when making business cases for CMDB implementation. The additional information will enable you to improve your organizations knowledge base and provide practical, usable examples and templates for you to use in the creation and maintenance of your CMDB. The book serves to act as a starting point. It will give you a clear path to travel. It is designed to be a valuable source of information and activity. The CMDB and Configuration Management Creation and Maintenance Guide: Flows logically, Is scalable, Provides presentations, templates and documents, Saves you time. Page 5

7 Step 1 Start by reviewing the presentations in the following order: 1. Service Asset and Configuration Management ITIL V3 2. Configuration Management Project Management These presentations will give you a good knowledge and understanding of all the terms, activities and concepts required within Configuration Management. They can also be used as the basis for management presentations or when making a formal business case for a CMDB implementation. Make sure you pay close attention to the notes pages, as well as the slides, as references to further documents and resources are highlighted here. Page 6

8 Step 2 If you did not look at the supporting documents and resources when prompted during the presentations, do this now. Below is an itemized list of the supporting documents and resources for easy reference. You can use these documents and resources within your own organization or as a template to help you in prepare your own bespoke documentation. Service Asset & Configuration Management ITIL V3: 1. Types of Service Assets concise description of what constitutes a service asset. 2. Example Configuration Management System ITIL Version 3 example diagram. 3. Example Service Asset and Configuration Management Plan Contents -a detailed overview of the criteria to be included in the contents of a Service Asset and Configuration Management Plan. 4. CMDB Roles and Responsibilities this is an extremely useful document that includes suggested position description contents. Configuration Management Project Management 1. Suggested Contents of the Configuration Management Plan - a detailed overview of the criteria to be included in the contents of a Project Management Configuration Plan. 2. Typical contents of a CI Record - a detailed overview of the criteria to be included in the contents of a Project Management Configuration Record. Alternatively, continue by working through the CMDB MindMaps and the CMDB Design document with the focus on your organization. This will help you ascertain the Configuration Management maturity for your organization. You will able to identify gaps and areas of attention and/or improvement. The supporting documents and resources found within the guide will help you fill these gaps by giving you a focused, practical and user-friendly approach to creating and maintaining your CMDB. Page 7

9 Page 8

10 2 PRESENTATION ONE Service Asset & Configuration Management GOAL: To support the agreed IT service provision by managing, storing and providing information about Configuration Items (CI s) and Service Assets throughout their life cycle. This process manages the Service Assets and Configuration Items in order to support the other Service Management processes. Page 9

11 Service Asset & Configuration Basic Concepts - Terminology Attribute CI configuration baseline Service Assets CI Level Status Accounting Configuration Item (CI): ANY component that supports an IT service (except people). IT component or associated items such as Request for Changes, Incident Records, Service Level Agreements Attribute: Specific information about CI s. Example: Size of RAM, hard drive, bandwidth Service Assets: Any capability or resource of a service provider. A detailed description of different Types of Service Assets, is available in a separate document within this book. CI Level: Recording and reporting of CI s at the level that the business requires. Status Accounting: Reporting of all current and historical data about each CI throughout its lifecycle. Example: Status = Under Development, being tested, live, withdrawn etc Configuration Baseline: Configuration established at a specific point in time, captures both the structure and details of a configuration. Used as a reference point for later comparison (e.g. after major changes, disaster recovery etc) Page 10

12 Configuration Management Terms & Concepts CMDB Configuration Baseline Software & Document Libraries DSL License Management The Configuration Management Database (CMDB): is the data store for CI information. Most organizations already have a series of spreadsheets and small databases on infrastructure within the IT department. In larger organizations, the growing size and complexity of the infrastructure has forced the use of technology to manage all the associated information. The CMDB can hold a variety of information including details on users, customers, user groups, business units (Caution: consider privacy legislation at this point). The CMDB is also demonstrable and as an auditable concept it can be used as a compliance mechanism for legal requirements. CI information relating to incidents, problems, known errors, changes, releases; as well as inter CI relationships will be stored in the database. Configuration Baseline: Configuration of a product or system established at a specific point in time, which captures both the structure and details of that product or system, and enables that product or system to be rebuilt at a later date. A snapshot or a position which is recorded. Although the position may be updated later, the baseline remains unchanged and available as a reference of the original state and as a comparison against the current position. Continued from page 14 Page 11

13 Configuration Management Terms & Concepts CMDB Configuration Baseline Software & Document Libraries DSL License Management Software and Document Libraries: Consists of; Collection of software and documents of known status. Controlling mechanism for software release. The Definitive Software Library (DSL): is the logical storage location for master copies of software. The word definitive means ultimate, perfect, best. License management: business people now face harsh financial penalties if they are found to be unable to control and monitor their software usage/licenses. Configuration Management is a crucial process in assisting in the control of software licenses. Page 12

14 Service Asset & Configuration Scope of IT Infrastructure Configuration Items CI s Include Software & Documentation!! Relationships CI Attributes Hard disk space Serial number Owner Location Ram CI Level Scope Service Asset and Configuration Management may cover non-it assets, work products used to develop the services and configuration items required to support the service that are not formally classified as assets. The scope covers interfaces to internal and external service providers where there are assets and configuration items that need to be controlled e.g. shared assets. There is a diagram of an ITIL Version 3 Example Configuration Management System available within this book. Page 13

15 Service Asset & Configuration Activities Identification Control Management & Planning Status Accounting Verification & Audit Reporting Source: the Art of Service Notice how Management & Planning are the central activities. Good, sound Service Asset & Configuration Management requires thorough planning. Page 14

16 Service Asset & Configuration Activities - Planning Planning consists of Defining the strategy, policy, scope, objectives, processes and procedures Roles and responsibilities Location of storage areas and libraries used to hold hardware, software and documentation CMDB Design CI naming conventions Housekeeping including license management and archiving of CI s Identification Control Status Accounting Planning Verification & Audit Reporting There is an ITIL Version 3 Example Asset and Configuration Management Plan Contents available as a separate document within this book. Page 15

17 Service Asset & Configuration Activities - Identification The selection, identification, labelling and registration of CIs. Identification can take place for: Hardware and Software include OS Business systems custom built Packages off the shelf Physical databases Feeds between databases and links Configuration baselines Software releases Identification Documentation Control Planning Status Accounting Verification & Audit Reporting Criteria for CI information to be valuable: It facilitates the management of Change The control of Incidents and Problems Or the control of assets that can be independently moved, copied or changed. Page 16

18 Service Asset & Configuration Activities - Control Ensures that only authorized and identifiable CIs are recorded from receipt to disposal in order to protect the integrity of configurations. Control occurs for: Registration of all new CI s and versions Update of CI records and licence control Updates in connection with RFC s and Change Management Update the CMDB after periodic checking of physical items Identification Control Status Accounting Planning Verification & Audit Reporting Configuration Management needs to understand the CI lifecycle and have procedures in place to ensure proper control over its CI s, throughout their lifecycle. Page 17

19 Service Asset & Configuration Activities - Status Accounting Is the reporting of all current and historical data concerned with each CI throughout its lifecycle Provides information on Configuration baselines Latest software item versions The person responsible for status change CI change history CI incident / problem history Identification Control Status Accounting Planning Verification & Audit Reporting Each asset or CI will have one or more states throughout its lifecycle. The significance of each state is defined by asking the question: What use can be made of the Asset or CI, while in that state? An example of this lifecycle is: Development or draft denoting that the CI is under development and that no particular reliance should be placed on it. Approved meaning that the CI may be used as a basis for further work Under Change is currently being modified by Change Management, may be unreliable until Change completed. Withdrawn meaning withdrawn from use, either because the CI is no longer fit for the purpose or because there is no further use for it. Page 18

20 Service Asset & Configuration Activities - Verification and Audit Reviews and audits verify the existence of CI s, checking that they are correctly recorded in the CMDB and that there is conformity between the documented baselines and the actual business to which they refer. Configuration Audits should occur at the following times: Before and after major changes to the IT infrastructure Following recovery from disaster In response to the detection of an unauthorised CI Identification At regular intervals Control Status Accounting Planning Verification & Audit Reporting Key point: Automate audits where possible through software tools Page 19

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Target2-Securities Project Team TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS Reference: T2S-07-0270 Date: 09 October 2007 Version: 0.1 Status: Draft Target2-Securities - User s TABLE OF CONTENTS

More information

ISEB Practitioner Certificate in IT Service Management: Specialising in Release and Control

ISEB Practitioner Certificate in IT Service Management: Specialising in Release and Control Syllabus and Qualification Framework This qualification covers the Service Management disciplines of Configuration Management, Change Management and Release Management that together comprise Release and

More information

Part 1: Overview and concepts

Part 1: Overview and concepts Provläsningsexemplar / Preview INTERNATIONAL STANDARD ISO/IEC 19086-1 First edition 2016-09-15 Information technology Cloud computing Service level agreement (SLA) framework Part 1: Overview and concepts

More information

The ITIL v.3. Foundation Examination

The ITIL v.3. Foundation Examination The ITIL v.3. Foundation Examination ITIL v. 3 Foundation Examination: Sample Paper 4, version 3.0 Multiple Choice Instructions 1. All 40 questions should be attempted. 2. There are no trick questions.

More information

ITSM20F_Umang. Number: ITSM20F Passing Score: 800 Time Limit: 120 min File Version: 4.0. Exin ITSM20F

ITSM20F_Umang.   Number: ITSM20F Passing Score: 800 Time Limit: 120 min File Version: 4.0. Exin ITSM20F ITSM20F_Umang Number: ITSM20F Passing Score: 800 Time Limit: 120 min File Version: 4.0 http://www.gratisexam.com/ Exin ITSM20F IT Service Management Foundation based on ISO/IEC 20000 (ITSM20F.EN) Version:

More information

OG0-091 Q&As TOGAF 9 Part 1

OG0-091 Q&As TOGAF 9 Part 1 CertBus.com OG0-091 Q&As TOGAF 9 Part 1 Pass The Open Group OG0-091 Exam with 100% Guarantee Free Download Real Questions & Answers PDF and VCE file from: 100% Passing Guarantee 100% Money Back Assurance

More information

Test Environment Configuration and Management using ITIL principles

Test Environment Configuration and Management using ITIL principles Test Environment Configuration and Management using ITIL principles Mark Crowther Empirical Pragmatic Tester About this slide pack. This slide pack provides a brief overview of how to approach defining

More information

VISUAL QUICKSTART GUIDE QUICKTIME PRO 4. Judith Stern Robert Lettieri. Peachpit Press

VISUAL QUICKSTART GUIDE QUICKTIME PRO 4. Judith Stern Robert Lettieri. Peachpit Press VISUAL QUICKSTART GUIDE QUICKTIME PRO 4 Judith Stern Robert Lettieri Peachpit Press Visual QuickStart Guide QuickTime Pro 4 Judith Stern Robert Lettieri Peachpit Press 1249 Eighth Street Berkeley, CA 94710

More information

Information technology Security techniques Information security controls for the energy utility industry

Information technology Security techniques Information security controls for the energy utility industry INTERNATIONAL STANDARD ISO/IEC 27019 First edition 2017-10 Information technology Security techniques Information security controls for the energy utility industry Technologies de l'information Techniques

More information

The ITIL Foundation Examination

The ITIL Foundation Examination The ITIL Foundation Examination Sample Paper A, version 5.1 Multiple Choice Instructions 1. All 40 questions should be attempted. 2. All answers are to be marked on the answer grid provided. 3. You have

More information

SIMS TERMS AND CONDITIONS OF USE AGREEMENT

SIMS TERMS AND CONDITIONS OF USE AGREEMENT SIMS TERMS AND CONDITIONS OF USE AGREEMENT 1. These Terms and Conditions ("the Terms and Conditions") govern your ("the User") use of the Website and Web application and the information thereon, known

More information

Auditing The Oracle Database

Auditing The Oracle Database Auditing The Oracle Database PFCATK A Toolkit to Help 1 Legal Notice Auditing The Oracle Database Published by PeteFinnigan.com Limited 9 Beech Grove Acomb York England, YO26 5LD Copyright 2017 by PeteFinnigan.com

More information

ISO/IEC 8348 INTERNATIONAL STANDARD. Information technology Open Systems Interconnection Network service definition

ISO/IEC 8348 INTERNATIONAL STANDARD. Information technology Open Systems Interconnection Network service definition INTERNATIONAL STANDARD ISO/IEC 8348 Third edition 2002-11-01 Information technology Open Systems Interconnection Network service definition Technologies de l'information Interconnexion des systèmes ouverts

More information

Guide to IREE Certification

Guide to IREE Certification Guide to IREE Certification Certification Congratulations on your decision to pursue Investor Ready Energy Efficiency (IREE) Certification for your project! As a building owner, by choosing to pursue IREE

More information

Data Protection. Practical Strategies for Getting it Right. Jamie Ross Data Security Day June 8, 2016

Data Protection. Practical Strategies for Getting it Right. Jamie Ross Data Security Day June 8, 2016 Data Protection Practical Strategies for Getting it Right Jamie Ross Data Security Day June 8, 2016 Agenda 1) Data protection key drivers and the need for an integrated approach 2) Common challenges data

More information

Improve testing for customer services and service management

Improve testing for customer services and service management Improve testing for customer services and service management Shirley Lacy www.connectsphere.com Material Copyright ConnectSphere Limited 2013 1 Topics Introduction ITIL concepts for service design and

More information

State Government Digital Preservation Profiles

State Government Digital Preservation Profiles July 2006 2006 Center for Technology in Government The Center grants permission to reprint this document provided this cover page is included. This page intentionally left blank. Introduction The state

More information

MANDATORY CRITERIA. Comments: Yes. The contract screen identifies SLA s and associated CI s.

MANDATORY CRITERIA. Comments: Yes. The contract screen identifies SLA s and associated CI s. MANDATORY CRITERIA *CMDB= Configuration Management Database *CI= Configuration Items *SLA= Service Level Agreement *RFC= Request For Change 1. Does the tool facilitate the registration and management of

More information

2 The IBM Data Governance Unified Process

2 The IBM Data Governance Unified Process 2 The IBM Data Governance Unified Process The benefits of a commitment to a comprehensive enterprise Data Governance initiative are many and varied, and so are the challenges to achieving strong Data Governance.

More information

ROLE DESCRIPTION IT SPECIALIST

ROLE DESCRIPTION IT SPECIALIST ROLE DESCRIPTION IT SPECIALIST JOB IDENTIFICATION Job Title: Job Grade: Department: Location Reporting Line (This structure reports to?) Full-time/Part-time/Contract: IT Specialist D1 Finance INSETA Head

More information

Using ZENworks with Novell Service Desk

Using ZENworks with Novell Service Desk www.novell.com/documentation Using ZENworks with Novell Service Desk Novell Service Desk 7.1 April 2015 Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or

More information

Proficy* Historian S IMULATION D ATA C OLLECTOR G UIDE. Version 6.0 June 2015

Proficy* Historian S IMULATION D ATA C OLLECTOR G UIDE. Version 6.0 June 2015 Proficy* Historian S IMULATION D ATA C OLLECTOR G UIDE Version 6.0 June 2015 Disclaimer of Warranties and Liability The information contained in this manual is believed to be accurate and reliable. However,

More information

Proficy* Historian OSI PI C OLLECTOR G UIDE. Version 6.0 June 2015

Proficy* Historian OSI PI C OLLECTOR G UIDE. Version 6.0 June 2015 Proficy* Historian OSI PI C OLLECTOR G UIDE Version 6.0 June 2015 Disclaimer of Warranties and Liability The information contained in this manual is believed to be accurate and reliable. However, GE Intelligent

More information

Configuration Management Databases (CMDBs) and Configuration Management System (CMS) are both elements of what larger entity?

Configuration Management Databases (CMDBs) and Configuration Management System (CMS) are both elements of what larger entity? ITIL Foundation mock exam 3 1. Configuration Management Databases (CMDBs) and Configuration Management System (CMS) are both elements of what larger entity? A) The Asset Register B) The Service Knowledge

More information

IT MANAGER PERMANENT SALARY SCALE: P07 (R ) Ref:AgriS042/2019 Information Technology Manager. Reporting to. Information Technology (IT)

IT MANAGER PERMANENT SALARY SCALE: P07 (R ) Ref:AgriS042/2019 Information Technology Manager. Reporting to. Information Technology (IT) DESIGNATION Reporting to Division Office Location IT MANAGER PERMANENT SALARY SCALE: P07 (R806 593.00) Ref:AgriS042/2019 Information Technology Manager CEO Information Technology (IT) Head office JOB PURPOSE

More information

Certificate Software Asset Management Essentials Syllabus. Version 2.0

Certificate Software Asset Management Essentials Syllabus. Version 2.0 Certificate Software Asset Management Essentials Syllabus Version 2.0 June 2010 Certificate in Software Asset Management Essentials Leaning Objectives Holders of the ISEB Certificate in SAM Essentials

More information

Free ITIL Foundation Exam Paper 40 Questions 60 Minutes Allowed. Minimum of 26/40 to Pass. With the Compliments of www.itservicesuccess.com Good Luck!! GIVE YOURSELF THE UNFAIR ADVANTAGE! MULTIPLE CHOICE

More information

IETF TRUST. Legal Provisions Relating to IETF Documents. Approved November 6, Effective Date: November 10, 2008

IETF TRUST. Legal Provisions Relating to IETF Documents. Approved November 6, Effective Date: November 10, 2008 IETF TRUST Legal Provisions Relating to IETF Documents Approved November 6, 2008 Effective Date: November 10, 2008 1. Background The IETF Trust was formed on December 15, 2005, for, among other things,

More information

WORKSHARE SECURITY OVERVIEW

WORKSHARE SECURITY OVERVIEW WORKSHARE SECURITY OVERVIEW April 2016 COMPANY INFORMATION Workshare Security Overview Workshare Ltd. (UK) 20 Fashion Street London E1 6PX UK Workshare Website: www.workshare.com Workshare Inc. (USA) 625

More information

This document is a preview generated by EVS

This document is a preview generated by EVS INTERNATIONAL STANDARD ISO/IEC 19770-5 Second edition 2015-08-01 Information technology IT asset management Overview and vocabulary Technologies de l information Gestion de biens de logiciel Vue d ensemble

More information

WELCOME TO ITIL FOUNDATIONS PREP CLASS AUBREY KAIGLER

WELCOME TO ITIL FOUNDATIONS PREP CLASS AUBREY KAIGLER WELCOME TO ITIL FOUNDATIONS PREP CLASS AUBREY KAIGLER 2 Demand Management Demand management: The process used to make investmentrelated decisions across the enterprise. Pattern Pattern of of Business Activity

More information

INTERNATIONAL STANDARD

INTERNATIONAL STANDARD INTERNATIONAL STANDARD ISO/IEC 90003 First edition 2004-02-15 Software engineering Guidelines for the application of ISO 9001:2000 to computer software Ingénierie du logiciel Lignes directrices pour l'application

More information

ISO/IEC INTERNATIONAL STANDARD. Software engineering Software measurement process. Ingénierie du logiciel Méthode de mesure des logiciels

ISO/IEC INTERNATIONAL STANDARD. Software engineering Software measurement process. Ingénierie du logiciel Méthode de mesure des logiciels INTERNATIONAL STANDARD ISO/IEC 15939 First edition 2002-07-15 Software engineering Software measurement process Ingénierie du logiciel Méthode de mesure des logiciels Reference number ISO/IEC 15939:2002(E)

More information

6 Tips to Help You Improve Configuration Management. by Stuart Rance

6 Tips to Help You Improve Configuration Management. by Stuart Rance 6 Tips to Help You Improve Configuration Management by Stuart Rance Introduction Configuration management provides information about what assets you own, how they are configured, and how they are connected

More information

Information technology Service management. Part 11: Guidance on the relationship between ISO/IEC :2011 and service management frameworks: ITIL

Information technology Service management. Part 11: Guidance on the relationship between ISO/IEC :2011 and service management frameworks: ITIL Provläsningsexemplar / Preview TECHNICAL REPORT ISO/IEC TR 20000-11 First edition 2015-12-15 Information technology Service management Part 11: Guidance on the relationship between ISO/IEC 20000-1:2011

More information

IETF TRUST. Legal Provisions Relating to IETF Documents. February 12, Effective Date: February 15, 2009

IETF TRUST. Legal Provisions Relating to IETF Documents. February 12, Effective Date: February 15, 2009 IETF TRUST Legal Provisions Relating to IETF Documents February 12, 2009 Effective Date: February 15, 2009 1. Background The IETF Trust was formed on December 15, 2005, for, among other things, the purpose

More information

ISO/IEC INTERNATIONAL STANDARD. Information technology Code of practice for information security management

ISO/IEC INTERNATIONAL STANDARD. Information technology Code of practice for information security management INTERNATIONAL STANDARD ISO/IEC 17799 First edition 2000-12-01 Information technology Code of practice for information security management Technologies de l'information Code de pratique pour la gestion

More information

ISO/IEC INTERNATIONAL STANDARD

ISO/IEC INTERNATIONAL STANDARD INTERNATIONAL STANDARD ISO/IEC 15945 First edition 2002-02-01 Information technology Security techniques Specification of TTP services to support the application of digital signatures Technologies de l'information

More information

Quality Assurance Procedure Use of Accreditation Body & FP Certification FZE Marks, Logos and Symbols

Quality Assurance Procedure Use of Accreditation Body & FP Certification FZE Marks, Logos and Symbols Index 1.0 Purpose 2.0 Scope 3.0 References 4.0 Definitions 5.0 Responsibilities 6.0 Procedure 7.0 Records FP Certification Template Rev 002 1.0 Purpose 1.1 This procedure describes the applicable, rules

More information

ISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION

ISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION ISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION Cathy Bates Senior Consultant, Vantage Technology Consulting Group January 30, 2018 Campus Orientation Initiative and Project Orientation Project

More information

Symantec ServiceDesk 7.1 SP1 Implementation Guide

Symantec ServiceDesk 7.1 SP1 Implementation Guide Symantec ServiceDesk 7.1 SP1 Implementation Guide Symantec ServiceDesk 7.1 SP1 Implementation Guide The software described in this book is furnished under a license agreement and may be used only in accordance

More information

Corporate Information Security Policy

Corporate Information Security Policy Overview Sets out the high-level controls that the BBC will put in place to protect BBC staff, audiences and information. Audience Anyone who has access to BBC Information Systems however they are employed

More information

This document is a preview generated by EVS

This document is a preview generated by EVS INTERNATIONAL STANDARD ISO 15489-1 Second edition 2016-04-15 Information and documentation Records management Part 1: Concepts and principles Information et documentation Gestion des documents d activité

More information

Technical Security Standard

Technical Security Standard Technical Security Standard Title: Minimum Controls TSS Version: 1.1 Effective Date July 2018 This Standard defines the minimum baseline security controls and Summary: processes required for a given Information

More information

This document is a preview generated by EVS

This document is a preview generated by EVS INTERNATIONAL STANDARD ISO/IEC 29151 First edition 2017-08 Information technology Security techniques Code of practice for personally identifiable information protection Technologies de l'information Techniques

More information

Vulnerability Scan Service. User Guide. Issue 20 Date HUAWEI TECHNOLOGIES CO., LTD.

Vulnerability Scan Service. User Guide. Issue 20 Date HUAWEI TECHNOLOGIES CO., LTD. Issue 20 Date 2018-08-30 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Ltd. 2018. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any

More information

Information Security Policy

Information Security Policy April 2016 Table of Contents PURPOSE AND SCOPE 5 I. CONFIDENTIAL INFORMATION 5 II. SCOPE 6 ORGANIZATION OF INFORMATION SECURITY 6 I. RESPONSIBILITY FOR INFORMATION SECURITY 6 II. COMMUNICATIONS REGARDING

More information

PROPOSED DRAFT FOR TRIAL USE AND DISCUSSION ONLY secretariat PROPOSED DRAFT AES24-2-TU 99/02/2818:41

PROPOSED DRAFT FOR TRIAL USE AND DISCUSSION ONLY secretariat PROPOSED DRAFT AES24-2-TU 99/02/2818:41 STANDARDS The AES Standards Committee is the organization responsible for the standards program of the Audio Engineering Society. It publishes technical standards, information documents and technical reports.

More information

Evaluating and Improving Cybersecurity Capabilities of the Electricity Critical Infrastructure

Evaluating and Improving Cybersecurity Capabilities of the Electricity Critical Infrastructure Evaluating and Improving Cybersecurity Capabilities of the Electricity Critical Infrastructure March 2015 Pamela Curtis Dr. Nader Mehravari Katie Stewart Cyber Risk and Resilience Management Team CERT

More information

MasterCard NFC Mobile Device Approval Guide v July 2015

MasterCard NFC Mobile Device Approval Guide v July 2015 MasterCard NFC Mobile Device Approval Guide v2.0 30 July 2015 Notices Following are policies pertaining to proprietary rights, trademarks, translations, and details about the availability of additional

More information

SAP Policy Management, group insurance add-on 1.1

SAP Policy Management, group insurance add-on 1.1 Security Guide Document Version: 1.1 2017-05-03 1.1 Typographic Conventions Type Style Example Description Words or characters quoted from the screen. These include field names, screen titles, pushbuttons

More information

SERVERS / SERVICES AT DATA CENTER AND CO-LOCATION POLICY

SERVERS / SERVICES AT DATA CENTER AND CO-LOCATION POLICY SERVERS / SERVICES AT DATA CENTER AND CO-LOCATION POLICY National Video Conferencing Network Version 1.0 Released January 01, 2014 HIGHER EDUCATION COMMISSION, PAKISTAN 1 GENERAL The Higher Education Commission

More information

TEL2813/IS2820 Security Management

TEL2813/IS2820 Security Management TEL2813/IS2820 Security Management Security Management Models And Practices Lecture 6 Jan 27, 2005 Introduction To create or maintain a secure environment 1. Design working security plan 2. Implement management

More information

ISO/IEC INTERNATIONAL STANDARD

ISO/IEC INTERNATIONAL STANDARD INTERNATIONAL STANDARD ISO/IEC 14143-2 First edition 2002-11-15 Information technology Software measurement Functional size measurement Part 2: Conformity evaluation of software size measurement methods

More information

NORTH AMERICAN ELECTRIC RELIABILITY CORPORATION

NORTH AMERICAN ELECTRIC RELIABILITY CORPORATION NORTH AMERICAN ELECTRIC RELIABILITY CORPORATION NARUC Energy Regulatory Partnership Program The Public Services Regulatory Commission of Armenia and The Iowa Utilities Board Janet Amick Senior Utility

More information

INCLUDING MEDICAL ADVICE DISCLAIMER

INCLUDING MEDICAL ADVICE DISCLAIMER Jordan s Guardian Angels Terms and Conditions of Use INCLUDING MEDICAL ADVICE DISCLAIMER Your use of this website and its content constitutes your agreement to be bound by these terms and conditions of

More information

BITDEFENDER HERE GENERIC COURSES. Training Certifications

BITDEFENDER HERE GENERIC COURSES. Training Certifications BITDEFENDER HERE GENERIC COURSES Training Certifications LEGAL NOTICE All rights reserved. No part of this book may be reproduced or transmitted in any form or by any means, electronic or mechanical, including

More information

This document is a preview generated by EVS

This document is a preview generated by EVS TECHNICAL REPORT ISO/IEC TR 24722 Second edition 2015-12-15 Information technology Biometrics Multimodal and other multibiometric fusion Technologies de l information Biométrie Fusion multimodale et autre

More information

Australian Standard. Records Management. Part 2: Guidelines AS ISO ISO TR

Australian Standard. Records Management. Part 2: Guidelines AS ISO ISO TR AS ISO 15489.2 2002 ISO TR 15489-2 AS ISO 15489.2 Australian Standard Records Management Part 2: Guidelines [ISO title: Information and documentation Records management Part 2: Guidelines] This Australian

More information

ISO INTERNATIONAL STANDARD

ISO INTERNATIONAL STANDARD INTERNATIONAL STANDARD ISO 20022-1 First edition 2004-12-15 Financial services UNIversal Financial Industry message scheme Part 1: Overall methodology and format specifications for inputs to and outputs

More information

PLAINSCAPITAL BANK SAMSUNG PAY TERMS AND CONDITIONS - PERSONAL

PLAINSCAPITAL BANK SAMSUNG PAY TERMS AND CONDITIONS - PERSONAL PLAINSCAPITAL BANK SAMSUNG PAY TERMS AND CONDITIONS - PERSONAL Last Modified: 3/12/2018 These terms and conditions ( Terms and Conditions ) are a legal agreement between you and PlainsCapital Bank that

More information

Amazon Marketing Services User Guide

Amazon Marketing Services User Guide Contents Register Your Brand...2 Add Additional Users and Brands...2 Add a new brand...2 Add a brand user to AMS...3 Change the permission level for a brand user...3 Amazon Pages...4 Begin working with

More information

ISO/IEC/ IEEE Systems and software engineering Content of life-cycle information items (documentation)

ISO/IEC/ IEEE Systems and software engineering Content of life-cycle information items (documentation) This is a preview - click here to buy the full publication INTERNATIONAL STANDARD ISO/IEC/ IEEE 15289 Second edition 2015-05-15 Systems and software engineering Content of life-cycle information items

More information

BCS EXIN ITAMOrg Software Asset Management Specialist Syllabus Version 1.1 December 2016

BCS EXIN ITAMOrg Software Asset Management Specialist Syllabus Version 1.1 December 2016 BCS EXIN ITAMOrg Software Asset Management Specialist Syllabus Version 1.1 December 2016 This professional certification is not regulated by the following United Kingdom Regulators - Ofqual, Qualification

More information

ITSM Configuration Coordinators

ITSM Configuration Coordinators ITSM Configuration Coordinators Role and Responsibilities Revision Date February 8, 2018 Version Number 6.0 Page 1 Document Ownership Document Owner Maury Collins Revision History ITSM Role, Department

More information

Swedish National Data Service, SND Checklist Data Management Plan Checklist for Data Management Plan

Swedish National Data Service, SND Checklist Data Management Plan Checklist for Data Management Plan Swedish National Data Service, SND Checklist Data Management Plan 2017-10-16 Checklist for Data Management Plan Content Checklist for Data Management Plan... 1 Introduction to SND:s Checklist for Data

More information

Information technology Security techniques Application security. Part 5: Protocols and application security controls data structure

Information technology Security techniques Application security. Part 5: Protocols and application security controls data structure This is a preview - click here to buy the full publication INTERNATIONAL STANDARD ISO/IEC 27034-5 First edition 2017-10 Information technology Security techniques Application security Part 5: Protocols

More information

ISO27001:2013 The New Standard Revised Edition

ISO27001:2013 The New Standard Revised Edition ECSC UNRESTRICTED ISO27001:2013 The New Standard Revised Edition +44 (0) 1274 736223 consulting@ecsc.co.uk www.ecsc.co.uk A Blue Paper from Page 1 of 14 Version 1_00 Date: 27 January 2014 For more information

More information

INTERNATIONAL STANDARD

INTERNATIONAL STANDARD INTERNATIONAL STANDARD ISO 15188 First edition 2001-07-15 Project management guidelines for terminology standardization Lignes directrices pour la gestion de projets de normalisation terminologique Reference

More information

Ebook Niche Explorer User Manual

Ebook Niche Explorer User Manual Ebook Niche Explorer User Manual 2012 James J. Jones, LLC. Need help or support, or just not sure about a feature? Submit a Support Ticket at: http://www.tnrsupport.com/support/index.php?/tickets/submit

More information

ADMIN 3.4. V e r s i o n 4. Paul Daly CEO RISSB

ADMIN 3.4. V e r s i o n 4. Paul Daly CEO RISSB ADMIN 3.4 V e r s i o n 4 Paul Daly CEO RISSB 01 November 2017 DOCUMENT CONTROL Identification Document Title Number Version Date Document ADMIN 3.4 1 23/11/2007 Document ADMIN 3.4 2 04/02/2010 Document

More information

ISO/IEC INTERNATIONAL STANDARD. Information technology Software asset management Part 2: Software identification tag

ISO/IEC INTERNATIONAL STANDARD. Information technology Software asset management Part 2: Software identification tag INTERNATIONAL STANDARD ISO/IEC 19770-2 First edition 2009-11-15 Information technology Software asset management Part 2: Software identification tag Technologies de l'information Gestion de biens de logiciel

More information

OCTOSHAPE SDK AND CLIENT LICENSE AGREEMENT (SCLA)

OCTOSHAPE SDK AND CLIENT LICENSE AGREEMENT (SCLA) OCTOSHAPE SDK AND CLIENT LICENSE AGREEMENT (SCLA) This is a License Agreement (the "Agreement") for certain code (the Software ) owned by Akamai Technologies, Inc. ( Akamai ) that is useful in connection

More information

ISO/IEC INTERNATIONAL STANDARD. Information technology Security techniques Code of practice for information security management

ISO/IEC INTERNATIONAL STANDARD. Information technology Security techniques Code of practice for information security management INTERNATIONAL STANDARD ISO/IEC 17799 Second edition 2005-06-15 Information technology Security techniques Code of practice for information security management Technologies de l'information Techniques de

More information

PCI Policy Compliance Using Information Security Policies Made Easy. PCI Policy Compliance Information Shield Page 1

PCI Policy Compliance Using Information Security Policies Made Easy. PCI Policy Compliance Information Shield Page 1 PCI Policy Compliance Using Information Security Policies Made Easy PCI Policy Compliance Information Shield Page 1 PCI Policy Compliance Using Information Security Policies Made Easy By David J Lineman

More information

Enterprise - Control System Integration Part 2: Object Model Attributes

Enterprise - Control System Integration Part 2: Object Model Attributes ISA Draft 95.00.02 Draft Standard Enterprise - Control System Integration Part 2: Object Model Attributes Draft 9 May 2001 Deleted: 8 Deleted: April This document is a draft that represents work being

More information

AUTHORIZED DOCUMENTATION. Using ZENworks with Novell Service Desk Novell Service Desk February 03,

AUTHORIZED DOCUMENTATION. Using ZENworks with Novell Service Desk Novell Service Desk February 03, AUTHORIZED DOCUMENTATION Using ZENworks with Novell Service Desk 6.5.4 Novell Service Desk 6.5.4 February 03, 2012 www.novell.com Legal Notices Novell, Inc. makes no representations or warranties with

More information

Enabler Release Definition for Converged Personal Network Service

Enabler Release Definition for Converged Personal Network Service Enabler Release Definition for Converged Personal Network Service Approved Version 1.0 23 Oct 2012 Open Mobile Alliance OMA-ERELD-CPNS-V1_0-20121023-A OMA-ERELD-CPNS-V1_0-20121023-A Page 2 (16) Use of

More information

CERTIFIED MAIL LABELS TERMS OF USE and PRIVACY POLICY Agreement

CERTIFIED MAIL LABELS TERMS OF USE and PRIVACY POLICY Agreement CERTIFIED MAIL LABELS TERMS OF USE and PRIVACY POLICY Agreement Welcome to Certified Mail Envelopes and Certified Mail Labels web sites (the Site ) a website, trademark and business name owned and operated

More information

Information Security Management Criteria for Our Business Partners

Information Security Management Criteria for Our Business Partners Information Security Management Criteria for Our Business Partners Ver. 2.1 April 1, 2016 Global Procurement Company Information Security Enhancement Department Panasonic Corporation 1 Table of Contents

More information

ORACLE DATABASE LIFECYCLE MANAGEMENT PACK

ORACLE DATABASE LIFECYCLE MANAGEMENT PACK ORACLE DATABASE LIFECYCLE MANAGEMENT PACK ORACLE DATABASE LIFECYCLE MANAGEMENT PACK KEY FEATURES Auto Discovery of hosts Inventory tracking and reporting Database provisioning Schema and data change management

More information

EJBCA Enterprise Cloud Edition CloudHSM Integration Guide

EJBCA Enterprise Cloud Edition CloudHSM Integration Guide EJBCA Enterprise Cloud Edition CloudHSM Integration Guide PRINT DATE: 2019-03-26 Copyright 2019 PrimeKey Solutions Published by PrimeKey Solutions AB Solna Access, Sundbybergsvägen 1 SE-171 73 Solna, Sweden

More information

Installation Guide. Copyright 2011 Bitdefender

Installation Guide. Copyright 2011 Bitdefender Installation Guide Copyright 2011 Bitdefender Bitdefender Total Security 2012 Installation Guide Publication date 2011.07.15 Copyright 2011 Bitdefender Legal Notice All rights reserved. No part of this

More information

Technical Specification MEF 14. Abstract Test Suite for Traffic Management Phase 1. November, 2005

Technical Specification MEF 14. Abstract Test Suite for Traffic Management Phase 1. November, 2005 Technical Specification Abstract Test Suite for Traffic Management Phase 1 November, 2005 Disclaimer The information in this publication is freely available for reproduction and use by any recipient and

More information

ISO/IEC Information technology Security techniques Code of practice for information security management

ISO/IEC Information technology Security techniques Code of practice for information security management This is a preview - click here to buy the full publication INTERNATIONAL STANDARD ISO/IEC 17799 Second edition 2005-06-15 Information technology Security techniques Code of practice for information security

More information

Building Information Modeling and Digital Data Exhibit

Building Information Modeling and Digital Data Exhibit Document E203 2013 Building Information Modeling and Digital Data Exhibit This Exhibit dated the day of in the year is incorporated into the agreement (the Agreement ) between the Parties for the following

More information

ISO/IEC INTERNATIONAL STANDARD. Information technology Guideline for the evaluation and selection of CASE tools

ISO/IEC INTERNATIONAL STANDARD. Information technology Guideline for the evaluation and selection of CASE tools INTERNATIONAL STANDARD ISO/IEC 14102 Second edition 2008-11-01 Information technology Guideline for the evaluation and selection of CASE tools Technologies de l'information Lignes directrices pour l'évaluation

More information

Web Point and Print White Paper

Web Point and Print White Paper 07/26/2010 Technical Information: White Paper Document Version 1.0 Copyright 2010 RICOH Americas Corporation. All rights reserved. Page 1 of 9 Visit our Knowledgebase at: http://tsrc.ricoh-usa.com/ref/faq.asp

More information

Information technology Security techniques Telebiometric authentication framework using biometric hardware security module

Information technology Security techniques Telebiometric authentication framework using biometric hardware security module INTERNATIONAL STANDARD ISO/IEC 17922 First edition 2017-09 Information technology Security techniques Telebiometric authentication framework using biometric hardware security module Technologies de l information

More information

Administrative Guideline. SMPTE Metadata Registers Maintenance and Publication SMPTE AG 18:2017. Table of Contents

Administrative Guideline. SMPTE Metadata Registers Maintenance and Publication SMPTE AG 18:2017. Table of Contents SMPTE AG 18:2017 Administrative Guideline SMPTE Metadata Registers Maintenance and Publication Page 1 of 20 pages Table of Contents 1 Scope 3 2 Conformance Notation 3 3 Normative References 3 4 Definitions

More information

Navigating through the Risks and Challenges of implementing Green IT Projects

Navigating through the Risks and Challenges of implementing Green IT Projects Navigating through the Risks and Challenges of implementing Green IT Projects Jerry Kopan, ITIL V3 Expert, V2 Service Manager, PMP, CMC, B.Sc. ITSM Project Manager and ITIL Trainer Page 1 Abstract Implementing

More information

Policy Document. PomSec-AllSitesBinder\Policy Docs, CompanyWide\Policy

Policy Document. PomSec-AllSitesBinder\Policy Docs, CompanyWide\Policy Policy Title: Binder Association: Author: Review Date: Pomeroy Security Principles PomSec-AllSitesBinder\Policy Docs, CompanyWide\Policy Joseph Shreve September of each year or as required Purpose:...

More information

Information Technology Branch Organization of Cyber Security Technical Standard

Information Technology Branch Organization of Cyber Security Technical Standard Information Technology Branch Organization of Cyber Security Technical Standard Information Management, Administrative Directive A1461 Cyber Security Technical Standard # 1 November 20, 2014 Approved:

More information

Lightweight Machine to Machine Architecture

Lightweight Machine to Machine Architecture Lightweight Machine to Machine Architecture Candidate Version 1.0 10 Dec 2013 Open Mobile Alliance OMA-AD-LightweightM2M-V1_0-20131210-C OMA-AD-LightweightM2M-V1_0-20131210-C Page 2 (12) Use of this document

More information

NICC ND 1610 V4.1.1 ( )

NICC ND 1610 V4.1.1 ( ) NICC Document Next Generation Networks; Release Definition c/o TWP ACCOUNTING LLP, The Old Rectory, Church Street, Weybridge, Surrey KT13 8DE Tel.: +44(0) 20 7036 3636 Registered in England and Wales under

More information

Implementing ITIL v3 Service Lifecycle

Implementing ITIL v3 Service Lifecycle Implementing ITIL v3 Lifecycle WHITE PAPER introduction GSS INFOTECH IT services have become an integral means for conducting business for all sizes of businesses, private and public organizations, educational

More information

Maximo 7.5 System Administration Basics. A learning guide with discussion and exercises IBM Maximo 7.5 for Asset Management and IT

Maximo 7.5 System Administration Basics. A learning guide with discussion and exercises IBM Maximo 7.5 for Asset Management and IT Maximo 7.5 System Administration Basics A learning guide with discussion and exercises IBM Maximo 7.5 for Asset Management and IT Prepared by: 510 King Street, Suite 200 Alexandria, Virginia 22314 (703)

More information

SERVICE MANAGEMENT TRAINING PRODUCTS AND SERVICES ENDORSEMENT SCHEME. Rules and Guidance for Providers

SERVICE MANAGEMENT TRAINING PRODUCTS AND SERVICES ENDORSEMENT SCHEME. Rules and Guidance for Providers SERVICE MANAGEMENT TRAINING PRODUCTS AND SERVICES ENDORSEMENT SCHEME Rules and Guidance for Providers Change control: Version Status Author Date Comments 0.1 First Draft Helen Sussex 27 th November First

More information

Administration and Data Retention. Best Practices for Systems Management

Administration and Data Retention. Best Practices for Systems Management Administration and Data Retention Best Practices for Systems Management Agenda Understanding the Context for IT Management Concepts for Managing Key IT Objectives Aptify and IT Management Best Practices

More information

Veritas Enterprise Vault Setting up SharePoint Server Archiving 12.2

Veritas Enterprise Vault Setting up SharePoint Server Archiving 12.2 Veritas Enterprise Vault Setting up SharePoint Server Archiving 12.2 Veritas Enterprise Vault: Setting up SharePoint Server Archiving Last updated: 2017-08-10. Legal Notice Copyright 2017 Veritas Technologies

More information