Implementing a CMDB. The Top 5 Lessons Learnt, 3 years after Implementation. Process Team. Configuration Management. Configuration CMDB CMDB

Size: px
Start display at page:

Download "Implementing a CMDB. The Top 5 Lessons Learnt, 3 years after Implementation. Process Team. Configuration Management. Configuration CMDB CMDB"

Transcription

1 Process Team Configuration Configuration Management Management CMDB CMDB Implementing a CMDB The Top 5 Lessons Learnt, 3 years after Implementation Author: Author: Date: Date: Harvey Davison Harvey Davison March 2008 March 2008

2 01. Configuration Different Data Sets & Interfaces View Cost View Workflow Events Events Incidents Problems Incidents Changes Problems Changes Cost Cost Owners Owners Vendors Vendors Budget Budget Availability Availability s s Hours Contacts Hours Approvers Contacts Approvers Contracts Contracts Maintenance Maintenance Support Licence Support Licence Common Common Data Data Server Cabinet Cabinet Plan Plan Specifications Specifications CPU Memory CPU Memory Disk Disk Settings Settings IP Address IP Domain Address Domain Locations Locations Cabinets Cabinets Environment Environment Air Conditioning Air Power Conditioning Power Floor Floor Plan Plan N View () View (Physical)

3 02. Lesson Learnt #1 1. Define your Objective vs. Cost

4 03. Requirements - ITIL Guidelines for Change Management ITIL Process Objectives Managing Managing co-ordinating co-ordinating Change Change implementation implementation impact, impact, cost, cost, benefit benefit risk risk of of proposed proposed s s Developing Developing business business justification justification obtaining obtaining Approval Approval

5 04. Requirements - Breakdown Discrete Activities ITIL Process Objectives Process Activity Managing Managing co-ordinating co-ordinating Change Change implementation implementation conflicts conflicts Hours Hours impact, impact, cost, cost, benefit benefit risk risk of of proposed proposed s s impact impact Technical Technical approach approach Developing Developing business business justification justification obtaining obtaining Approval Approval Approve Approve

6 05. Requirements - Define Required Capabilities ITIL Objectives Process Activity Required Capability Managing Managing co-ordinating co-ordinating Change Change implementation implementation conflicts conflicts Identify Change Conflicts 1 Hours Hours Identify Hours 1 impact, impact, cost, cost, benefit benefit risk risk of of proposed proposed s s impact impact Identify ors ½ Technical Technical approach approach Identify Technical ors ½ Developing Developing business business justification justification obtaining obtaining Approval Approval Approve Approve Identify Change Approvers 0

7 06. Lesson Learnt #2 2. Define your Cusmers & Requirements ITIL ITIL Reqs Reqs Cusmers Cusmers 1. Define your Objective vs. Cost

8 07. Prioritise Scope - Item Type Type Servers (Directly Aligned) Servers (Non-Directly Aligned) Simpler Infrastructure (e.g. Srage) Complex Infrastructure (e.g. Network)

9 08. Prioritise Scope - Item Role Type Servers (Directly Aligned) Servers (Non-Directly Aligned) Simpler Infrastructure (e.g. Srage) Complex Infrastructure (e.g. Network) Role In Scope Maybe in Scope? Maybe out of Scope Production Test Development

10 09. Prioritise Scope - Item Status Type Servers (Directly Aligned) Servers (Non-Directly Aligned) Simpler Infrastructure (e.g. Srage) Complex Infrastructure (e.g. Network) Role In Scope Maybe in Scope? Maybe out of Scope Production Test Development Status Maybe in Scope? In Scope Maybe in Scope? Maybe out of Scope? Proposed Proposed Implementation Implementation Active Active Inactive Inactive Redundant Redundant Decommissioned Decommissioned

11 10. Scope Start Simple & Add Complexity Later Cost Cost Management Management Scope Scope Production Management Management Scope Scope Role Test Post-Active Development Active Pre-Active Status Networks Srage Servers Type

12 11. Lesson Learnt #3 2. Define your Cusmers & Requirements 3. Manage your Scope ITIL ITIL Reqs Reqs Cusmers Cusmers 1. Define your Objective vs. Cost

13 12. Structure - Using Hierarchy show Risk Internet Internet Mortgage Mortgage? Internet Internet Website Website Cusmer Cusmer Mortgage Mortgage Administration Administration Virtual Virtual Server B Server B Physical Unix Server 1 Unix Server 1 Windows Windows Server 3 Server 3

14 13. Attributes Identify Change Approvers example ITIL Process Objectives Process Activity Required Capability Managing Managing co-ordinating co-ordinating Change Change implementation implementation conflicts conflicts Identify Change Conflicts Hours Hours Identify Hours impact, impact, cost, cost, benefit benefit risk risk of of proposed proposed s s impact impact Technical Technical approach approach Identify ors Identify Technical ors Developing Developing business business justification justification obtaining obtaining Approval Approval Approve Approve Identify Change Approvers

15 14. Attributes - Applying Input / Output Test Input - Known Data Data Output - Required Data CMDB Approval based on Item Approver { Manager} Approver {Application Support Mgr} Name Appserver123 Barcode Serial no. LTSB12345 XYZ45678 Physical Physical Approver {Infrastructure Support} Mgr Remote Control ID Endpoint15.c.31a Change Mgt Ref Data Approval based on Task Task Type Maintain Cryp-keys Change Task List Change Task List Approver {Task Owner}

16 15. Lesson Learnt #4 2. Define your Cusmers & Requirements 3. Manage your Scope ITIL ITIL Reqs Reqs Cusmers Cusmers 1. Define your Objective vs. Cost 4. Design your Data Model

17 16. Process Identifying Your Definitive Data Cusmer Cusmer Physical

18 17. Process Identifying Your Definitive Data Item Detail SLA SLA Design Design Cusmer Cusmer Invenry Invenry Scan Scan Tool Tool Data Data Centre Centre Invenry Invenry Physical

19 18. Process Identifying Your Definitive Data Item Detail Item Status SLA SLA Manager Design Design Manager Cusmer Cusmer Invenry Invenry Scan Scan Tool Tool Manager Data Data Centre Centre Invenry Invenry Data Centre Manager Physical

20 19. Process Identifying Your Definitive Data Item Detail Item Status Relationships SLA SLA Manager Manager Design Design Manager Cusmer Cusmer Invenry Invenry Scan Scan Tool Tool Manager Application Application Scan Scan Tool Tool Manager Data Data Centre Centre Invenry Invenry Data Centre Manager Design Design Support Tech Physical

21 20. Process Design Best Way from A B Item Detail Item Status Relationships Manager Manager Manager Manager Manager Manager Cusmer Cusmer s Mgt Scan Scan Manager Support Tech Hardware Release Invenry Invenry Manager Physical

22 21. Lessons Learnt 2. Define your Cusmers & Requirements 3. Manage your Scope ITIL ITIL Reqs Reqs Cusmers Cusmers 1. Define your Objective Process Dependency Source Source vs. Cost 5. Define your Process 4. Design your Data Model

Bringing Service Awareness To Data Centres

Bringing Service Awareness To Data Centres Bringing Service Awareness To Data Centres Contents: How can Service Asset, Configuration & Knowledge Management Help? November 2008 Who am I Who are my Customers & what do they want? What s important

More information

Determining Best Fit for ITIL Implementation

Determining Best Fit for ITIL Implementation Determining Best Fit for ITIL Implementation Presentation to the DC SPIN October 4, 2006 www.davidconsultinggroup.com Agenda Introduction to ITIL Preparing for ITIL Best Fit Analysis Relationship of ITIL

More information

The ITIL Foundation Examination

The ITIL Foundation Examination The ITIL Foundation Examination Sample Paper A, version 5.1 Multiple Choice Instructions 1. All 40 questions should be attempted. 2. All answers are to be marked on the answer grid provided. 3. You have

More information

HARTREE CENTRE SERVICE NOW SELF- SERVICE PORTAL

HARTREE CENTRE SERVICE NOW SELF- SERVICE PORTAL HARTREE CENTRE SERVICE NOW SELF- SERVICE PORTAL User Guide Name Amendment Version Reviewed by. Approved by. Lisa Whimperley Initial document Peter Kane Peter Kane creation. 31/10/2017 The Hartree Centre

More information

ServiceNow Release Notes

ServiceNow Release Notes ServiceNow Release Notes Release Number: RLSE0010066 - SN 1.1 Release Date: 2/20/14 Feature Category: Change FETR0010642 Improve integration between Change Management module and Configuration Management

More information

Chapter 8: SDLC Reviews and Audit Learning objectives Introduction Role of IS Auditor in SDLC

Chapter 8: SDLC Reviews and Audit Learning objectives Introduction Role of IS Auditor in SDLC Chapter 8: SDLC Reviews and Audit... 2 8.1 Learning objectives... 2 8.1 Introduction... 2 8.2 Role of IS Auditor in SDLC... 2 8.2.1 IS Auditor as Team member... 2 8.2.2 Mid-project reviews... 3 8.2.3 Post

More information

ITIL Service Lifecycle Strategy

ITIL Service Lifecycle Strategy ITIL Service Lifecycle Strategy Course Details Course Code: Duration: Notes: ITILSL-Str 5 days This course syllabus should be used to determine whether the course is appropriate for the students, based

More information

WELCOME TO ITIL FOUNDATIONS PREP CLASS AUBREY KAIGLER

WELCOME TO ITIL FOUNDATIONS PREP CLASS AUBREY KAIGLER WELCOME TO ITIL FOUNDATIONS PREP CLASS AUBREY KAIGLER 2 Demand Management Demand management: The process used to make investmentrelated decisions across the enterprise. Pattern Pattern of of Business Activity

More information

Saving the Project Brief document under its own name

Saving the Project Brief document under its own name HOW TO USE THIS TEMPLATE: Introduction The template reflects the steps set out in the PRINCE2 Method and is designed to prompt the Project Manager and help in the creation of the. The information for the

More information

Automating for Agility in the Data Center. Purnima Padmanabhan Jeff Evans BMC Software

Automating for Agility in the Data Center. Purnima Padmanabhan Jeff Evans BMC Software Automating for Agility in the Data Center Purnima Padmanabhan Jeff Evans BMC Software 9/5/2006 Agenda The Situation Challenges Objectives BMC Solution for Data Center Closed-Loop Change Data Center Optimization

More information

IT risks and controls

IT risks and controls Università degli Studi di Roma "Tor Vergata" Master of Science in Business Administration Business Auditing Course IT risks and controls October 2018 Agenda I IT GOVERNANCE IT evolution, objectives, roles

More information

Configuration Management Databases (CMDBs) and Configuration Management System (CMS) are both elements of what larger entity?

Configuration Management Databases (CMDBs) and Configuration Management System (CMS) are both elements of what larger entity? ITIL Foundation mock exam 3 1. Configuration Management Databases (CMDBs) and Configuration Management System (CMS) are both elements of what larger entity? A) The Asset Register B) The Service Knowledge

More information

Best Practices for Managing Data Centres

Best Practices for Managing Data Centres Best Practices for Managing Data Centres David Cuthbertson Square Mile Systems david.cuthbertson@squaremilesystems.com www.squaremilesystems.com Tel 0870 950 4651 Mob 07717 883177 Best Practices? Guidelines?

More information

The ITIL v.3. Foundation Examination

The ITIL v.3. Foundation Examination The ITIL v.3. Foundation Examination ITIL v. 3 Foundation Examination: Sample Paper 4, version 3.0 Multiple Choice Instructions 1. All 40 questions should be attempted. 2. There are no trick questions.

More information

Annexure 08 (Profile of the Project Team)

Annexure 08 (Profile of the Project Team) Annexure 08 (Profile of the Project Team) 1. Project Director (1) 2. Transition / Delivery Manager (1) 3. Project Manager Software (1) 4. Project Manager SLA (1) 5. Project Manager Information Security

More information

Change Management MANDATORY CRITERIA

Change Management MANDATORY CRITERIA MANDATORY CRITERIA 1. Does the tool facilitate the recording and storage of Request for Changes (RFC) in an easily accessible format? Comments: Yes. The recording tool provides easy input formats. Main

More information

Server Security Procedure

Server Security Procedure Server Security Procedure Reference No. xx Revision No. 1 Relevant ISO Control No. 11.7.1 Issue Date: January 23, 2012 Revision Date: January 23, 2012 Approved by: Title: Ted Harvey Director, Technology

More information

CASE STUDY: RELOCATE THE DATA CENTER OF THE NATIONAL SCIENCE FOUNDATION. Alan Stuart, Managing Director System Infrastructure Innovators, LLC

CASE STUDY: RELOCATE THE DATA CENTER OF THE NATIONAL SCIENCE FOUNDATION. Alan Stuart, Managing Director System Infrastructure Innovators, LLC CASE STUDY: RELOCATE THE DATA CENTER OF THE NATIONAL SCIENCE FOUNDATION Alan Stuart, Managing Director National Science Foundation s New Headquarters in Alexandria, Virginia 1. Introduction to the National

More information

ITIL Capacity Management Deep Dive

ITIL Capacity Management Deep Dive ITIL Capacity Management Deep Dive Chris Molloy IBM Distinguished Engineer International Business Machines Agenda IBM Global Services ITIL Business Model ITIL Architecture ITIL Capacity Management Introduction

More information

UC Health Managed Services Federated Process for Incidents, Requests & Changes

UC Health Managed Services Federated Process for Incidents, Requests & Changes UC Health Managed Services Federated Process for Incidents, Requests & Changes UCSF IT Service Management Office http://itsm.ucsf.edu / v1.4 UCSF Service Management Office Content: Federated Model Key

More information

6 Tips to Help You Improve Configuration Management. by Stuart Rance

6 Tips to Help You Improve Configuration Management. by Stuart Rance 6 Tips to Help You Improve Configuration Management by Stuart Rance Introduction Configuration management provides information about what assets you own, how they are configured, and how they are connected

More information

itsmf ITIL V3: Accelerate Success with Tools Maria A Medvedeva, PMP, ITIL Regional Director CA, Inc. itsmf Middle East Board of Directors

itsmf ITIL V3: Accelerate Success with Tools Maria A Medvedeva, PMP, ITIL Regional Director CA, Inc. itsmf Middle East Board of Directors itsmf ITIL V3: Accelerate Success with Tools Maria A Medvedeva, PMP, ITIL Regional Director CA, Inc. itsmf Middle East Board of Directors Dubai, June 11, 2007 Challenging Questions > Should we slow down

More information

IT CONTINUITY, BACKUP AND RECOVERY POLICY

IT CONTINUITY, BACKUP AND RECOVERY POLICY IT CONTINUITY, BACKUP AND RECOVERY POLICY IT CONTINUITY, BACKUP AND RECOVERY POLICY Effective Date May 20, 2016 Cross- Reference 1. Emergency Response and Policy Holder Director, Information Business Resumption

More information

1. You should attempt all 40 questions. Each question is worth one mark.

1. You should attempt all 40 questions. Each question is worth one mark. Sample Paper D Question Booklet Multiple Choice Exam Duration: 60 minutes Instructions 1. You should attempt all 40 questions. Each question is worth one mark. 2. Mark your answers on the answer sheet

More information

Leveraging ITIL to improve Business Continuity and Availability. itsmf Conference 2009

Leveraging ITIL to improve Business Continuity and Availability. itsmf Conference 2009 Leveraging ITIL to improve Business Continuity and Availability Samuel Lo MBA, MSc, CDCP, PMP, CISSP, CISA Data Centre Services Manager COL Limited Strictly Business itsmf Conference 2009 25 February 2009

More information

ITSM Configuration Coordinators

ITSM Configuration Coordinators ITSM Configuration Coordinators Role and Responsibilities Revision Date February 8, 2018 Version Number 6.0 Page 1 Document Ownership Document Owner Maury Collins Revision History ITSM Role, Department

More information

ISO/IEC overview

ISO/IEC overview ISO/IEC 20000 overview Overview 1. What is ISO/IEC 20000? 2. ISO/IEC 20000 and ITIL 2 BS 15000 BS15000 started in UK and first launched on July 1, 2003. Which was replaced by ISO/IEC 20000 after formal

More information

Project Management Pre-Implementation Project status reporting Post Implementation Assessment Phase Solidify Project Scope

Project Management Pre-Implementation Project status reporting Post Implementation Assessment Phase Solidify Project Scope Project Management 321 days 10/22/01 01/30/03 Pre-Implementation 14 days 10/22/01 11/08/01 Detailed Scope / Deliverable definition 5 days 10/22/01 10/26/01 Complete Work Breakdown Structure 1 day 10/22/01

More information

ITD SERVER MANAGEMENT PROCEDURE

ITD SERVER MANAGEMENT PROCEDURE ITD SERVER MANAGEMENT PROCEDURE PURPOSE This procedure ensures the operation and maintenance of all ITD servers in a safe and effective fashion. This is achieved by the routine monitoring and timely update

More information

Welcome. Closing The Gap Between The Service Desk And The Data Centre. Service Desk - The Techy View

Welcome. Closing The Gap Between The Service Desk And The Data Centre. Service Desk - The Techy View Closing The Gap Between The Desk And The Data Centre Martyn Hobbs and Asset Management Specialist 9 th July 2008 Welcome This session will discuss how it is essential in today s customer service IT Support

More information

Automating the Software-Defined Data Center with vcloud Automation Center

Automating the Software-Defined Data Center with vcloud Automation Center Automating the Software-Defined Data Center with vcloud Automation Center 10 June 2014 Chris Alleaume Senior Systems Engineer 2014 VMware Inc. All rights reserved. The Impact of the Accelerating Pace of

More information

OFFICIAL COMMISSIONING OF SECURITY SYSTEMS AND INFRASTRUCTURE

OFFICIAL COMMISSIONING OF SECURITY SYSTEMS AND INFRASTRUCTURE Title of document ONR GUIDE COMMISSIONING OF SECURITY SYSTEMS AND INFRASTRUCTURE Document Type: Unique Document ID and Revision No: Nuclear Security Technical Assessment Guide CNS-TAST-GD-4.4 Revision

More information

REPORT 2015/186 INTERNAL AUDIT DIVISION

REPORT 2015/186 INTERNAL AUDIT DIVISION INTERNAL AUDIT DIVISION REPORT 2015/186 Audit of information and communications technology operations in the Secretariat of the United Nations Joint Staff Pension Fund Overall results relating to the effective

More information

EX0-101_ITIL V3. Number: Passing Score: 800 Time Limit: 120 min File Version: 1.0. Exin EX0-101

EX0-101_ITIL V3.  Number: Passing Score: 800 Time Limit: 120 min File Version: 1.0. Exin EX0-101 EX0-101_ITIL V3 Number: 000-000 Passing Score: 800 Time Limit: 120 min File Version: 1.0 http://www.gratisexam.com/ Exin EX0-101 ITIL Foundation V 3.0 & ITIL Foundation Version: 8.0 Exin EX0-101 Exam Topic

More information

The Common Controls Framework BY ADOBE

The Common Controls Framework BY ADOBE The Controls Framework BY ADOBE The following table contains the baseline security subset of control activities (derived from the Controls Framework by Adobe) that apply to Adobe s enterprise offerings.

More information

Rejuvenating BCM - Infrastructure. Business Continuity Awareness Week March 2009

Rejuvenating BCM - Infrastructure. Business Continuity Awareness Week March 2009 Rejuvenating BCM - Infrastructure Business Continuity Awareness Week 23 27 March 2009 Brigitte Theuma MBCI, CBCMMA, CBCMP, CBCITP, MIAEM 23 March 2009 Total of 5 pages Table of Contents I. ICT Service

More information

Update on the Key Initiatives Recommended by NTT Data regarding the Agency Cyber Security Framework

Update on the Key Initiatives Recommended by NTT Data regarding the Agency Cyber Security Framework Update on the Key Initiatives Recommended by NTT Data regarding the Agency Cyber Security Framework Texas Higher Education Coordinating Board Zhenzhen Sun Assistant Commissioner Information Solutions and

More information

WORKING WITH ESTATES AT BANGOR UNIVERSITY

WORKING WITH ESTATES AT BANGOR UNIVERSITY IT and Estates - working together WORKING WITH ESTATES AT BANGOR UNIVERSITY IT and Estates - working together UCISA - Networking Group 29 February 2012 Austin Court, Birmingham Who am I? Simone Barbaresi

More information

ISEB Practitioner Certificate in IT Service Management: Specialising in Release and Control

ISEB Practitioner Certificate in IT Service Management: Specialising in Release and Control Syllabus and Qualification Framework This qualification covers the Service Management disciplines of Configuration Management, Change Management and Release Management that together comprise Release and

More information

<Project Name> Scope Management Plan. <Author> <Date> Name Date Reason For Changes Version <author> initial draft 1.0 draft1

<Project Name> Scope Management Plan. <Author> <Date> Name Date Reason For Changes Version <author> initial draft 1.0 draft1 Scope Management Plan 1.0 Revision History Name Date Reason For Changes Version initial draft 1.0 draft1 2.0 Statement of Purpose The purpose of this document

More information

Welcome to your Complementary Download Report. This complementary download report accompanies the free online ITIL training course.

Welcome to your Complementary Download Report. This complementary download report accompanies the free online ITIL training course. Welcome to your Complementary Download Report This complementary download report accompanies the free online ITIL training course. The report summarises all of the key information from the course, and

More information

IT Service Quality amidst a World Gone Cloud. June 2012 V: 2.0

IT Service Quality amidst a World Gone Cloud. June 2012 V: 2.0 IT Service Quality amidst a World Gone Cloud June 2012 V: 2.0 Agenda A World Gone Cloud (federal perspective) Impacts to IT Infrastructures Impacts to ITIL-based Service/Quality Retooling ITIL Quality

More information

Policy. Business Resilience MB2010.P.119

Policy. Business Resilience MB2010.P.119 MB.P.119 Business Resilience Policy This policy been prepared by the Bi-Cameral Business Risk and Resilience Group and endorsed by the Management Boards of both Houses. It is effective from December to

More information

SUMMIT Availability Management DATA SHEET

SUMMIT Availability Management DATA SHEET SUMMIT Availability Management DATA SHEET SUMMIT, Symphony SUMMIT, the Symphony SUMMIT logo, and all other Symphony SUMMIT product, brand or service names are registered trademarks or trademarks of Symphony

More information

Automating the Software-Defined Data Center with vcloud Automation Center

Automating the Software-Defined Data Center with vcloud Automation Center Automating the Software-Defined Data Center with vcloud Automation Center Alex Tanner EM Specialist SE July 2014 2014 VMware Inc. All rights reserved. The Impact of the Accelerating Pace of Business The

More information

Networks - Technical specifications of the current networks features used vs. those available in new networks.

Networks - Technical specifications of the current networks features used vs. those available in new networks. APPENDIX V TECHNICAL EVALUATION GUIDELINES Where applicable, the following guidelines will be applied in evaluating the system proposed by a service provider: TABLE 1: HIGH LEVEL COMPONENTS Description

More information

INFORMATION SECURITY. One line heading. > One line subheading. A briefing on the information security controls at Computershare

INFORMATION SECURITY. One line heading. > One line subheading. A briefing on the information security controls at Computershare INFORMATION SECURITY A briefing on the information security controls at Computershare One line heading > One line subheading INTRODUCTION Information is critical to all of our clients and is therefore

More information

The secret of the service catalogue. Panel discussion 9 th April 2014

The secret of the service catalogue. Panel discussion 9 th April 2014 The secret of the service catalogue Panel discussion 9 th April 2014 The panellists Colin Rudd: is a leading author of the ITIL guidance and is one of the most experienced service management professionals

More information

2012 Microsoft Corporation. All rights reserved. Microsoft, Active Directory, Excel, Lync, Outlook, SharePoint, Silverlight, SQL Server, Windows,

2012 Microsoft Corporation. All rights reserved. Microsoft, Active Directory, Excel, Lync, Outlook, SharePoint, Silverlight, SQL Server, Windows, 2012 Microsoft Corporation. All rights reserved. Microsoft, Active Directory, Excel, Lync, Outlook, SharePoint, Silverlight, SQL Server, Windows, Windows Server, and other product names are or may be registered

More information

MANDATORY CRITERIA. Comments: Yes. The contract screen identifies SLA s and associated CI s.

MANDATORY CRITERIA. Comments: Yes. The contract screen identifies SLA s and associated CI s. MANDATORY CRITERIA *CMDB= Configuration Management Database *CI= Configuration Items *SLA= Service Level Agreement *RFC= Request For Change 1. Does the tool facilitate the registration and management of

More information

Support and Management for AWS

Support and Management for AWS Support and Management for AWS Free your valuable resource to focus on delivering new projects, letting Proact manage your cloud environment 24x7 02 Optimal performance from your AWS infrastructure Support

More information

PeopleSoft Finance Access and Security Audit

PeopleSoft Finance Access and Security Audit PeopleSoft Finance Access and Security Audit City of Minneapolis Internal Audit Department September 20, 2016 1 Contents Page Background... 3 Objective, Scope and Approach... 3 Audit Results and Recommendations...

More information

When the template is complete, the whole Project Initiation Document can be printed and approved.

When the template is complete, the whole Project Initiation Document can be printed and approved. HOW TO USE THIS TEMPLATE: Introduction The template reflects the steps set out in the PRINCE2 Method and is designed to prompt the Project Manager and help in the creation of the Project Initiation Document

More information

IT SECURITY RISK ANALYSIS FOR MEANINGFUL USE STAGE I

IT SECURITY RISK ANALYSIS FOR MEANINGFUL USE STAGE I Standards Sections Checklist Section Security Management Process 164.308(a)(1) Information Security Program Risk Analysis (R) Assigned Security Responsibility 164.308(a)(2) Information Security Program

More information

ITIL overview Service Delivery. Jaroslav Procházka

ITIL overview Service Delivery. Jaroslav Procházka ITIL overview Service Delivery Jaroslav Procházka Content Service Delivery processes Service Level Management IT Financial Management Capacity Management Availability Management IT Service Continuity Management

More information

Corporate Information Security Policy

Corporate Information Security Policy Overview Sets out the high-level controls that the BBC will put in place to protect BBC staff, audiences and information. Audience Anyone who has access to BBC Information Systems however they are employed

More information

SERVICE OPERATION ITIL INTERMEDIATE TRAINING & CERTIFICATION

SERVICE OPERATION ITIL INTERMEDIATE TRAINING & CERTIFICATION SERVICE OPERATION ITIL INTERMEDIATE TRAINING & CERTIFICATION WHAT IS ITIL SO? The intermediate level of ITIL offers a role based hands-on experience and in-depth coverage of the contents. Successful implementation

More information

Virginia State University Policies Manual. Title: Change/Configuration Management Policy: 6810 A. Purpose

Virginia State University Policies Manual. Title: Change/Configuration Management Policy: 6810 A. Purpose A. Purpose Virginia State University (VSU) management in an effort to preserve the integrity and stability of its systems and infrastructure has established a change management policy that will govern

More information

IT S TIME FOR DATA CENTRE SUPPORT

IT S TIME FOR DATA CENTRE SUPPORT IT S TIME FOR DATA CENTRE SUPPORT Knowing that your Data Centre is functioning effectively is critical to IT availability. Design, maintenance, operations and speedy fault resolution are key requirements

More information

Supporting the Cloud Transformation of Agencies across the Public Sector

Supporting the Cloud Transformation of Agencies across the Public Sector SOLUTION SERVICES Supporting the Cloud Transformation of Agencies across the Public Sector BRIEF Digital transformation, aging IT infrastructure, the Modernizing Government Technology (MGT) Act, the Datacenter

More information

RSA Data Loss Prevention: Policy to Remediation

RSA Data Loss Prevention: Policy to Remediation RSA Data Loss Prevention: Policy to Remediation Christian Hewitt, CISSP 1 RSA Security Management & Compliance Vision Delivering Visibility, Intelligence and Governance 2 Problem Definition You have a

More information

PROFILE. Daniel Buchanan. Trilby Misso Lawyers since Dec Prince2 Practitioner. MSP Practitioner. Extensive experience in:

PROFILE. Daniel Buchanan. Trilby Misso Lawyers since Dec Prince2 Practitioner. MSP Practitioner. Extensive experience in: PROFILE Daniel Buchanan Trilby Misso Lawyers since Dec 2007 Prince2 Practitioner MSP Practitioner Extensive experience in: Microsoft desktop and server infrastructure Citrix XenDesktop Cisco Unified Communications

More information

Track 4: Session 6 Cybersecurity Program Review

Track 4: Session 6 Cybersecurity Program Review Track 4: Session 6 Cybersecurity Program Review Challenges in Implementing an Agency-wide Adv Metering System: IT Security & Support Needs Karen Curran GSA Office of Facilities Management Energy Division

More information

Cyber Transformation at CNS Pantex & Y-12

Cyber Transformation at CNS Pantex & Y-12 Cyber Transformation at CNS Pantex & Y-12 v Craig D. Thomas Craig.D.Thomas@cns.doe.gov @CUCraigT Director, Chief Information Security Officer 1 Agenda About Me Goals & Approach Lessons Learned Q&A 2 About

More information

SUBJECT: REQUEST FOR PROPOSALS FOR HARBOR DEPARTMENT CLOUD COMPUTING SERVICES

SUBJECT: REQUEST FOR PROPOSALS FOR HARBOR DEPARTMENT CLOUD COMPUTING SERVICES DATE: May 30, 2017 SUBJECT: REQUEST FOR PROPOSALS FOR HARBOR DEPARTMENT CLOUD COMPUTING SERVICES Pursuant to the Harbor Department Cloud Computing Services Request for Proposals (RFP), all proposers were

More information

Company X. Outsourced Information Technology Services for Desktop and LAN Services. Managed Services Monthly Management Report.

Company X. Outsourced Information Technology Services for Desktop and LAN Services. Managed Services Monthly Management Report. Company X Outsourced Information Technology Services for Desktop and LAN Services Version Status Editor Creation Date Release Date Managed Services Monthly Management Report May 20xx 1 EXECUTIVE SUMMARY...

More information

NIC- Computer Emergency Response Team (CERT) Information Security Incident Management Policy

NIC- Computer Emergency Response Team (CERT) Information Security Incident Management Policy NIC- Computer Emergency Response Team (CERT) Information Security Incident Management Policy Document Control Document Title Information Security Incident Management Policy Document Type Policy Draft Document

More information

Once your Project Plan Document is completed check the document against the following Quality Criteria:

Once your Project Plan Document is completed check the document against the following Quality Criteria: HOW TO USE THIS TEMPLATE: Introduction The template reflects the steps set out in the PRINCE2 Method and is designed to prompt the Project Manager and help in the creation of the. The information for the

More information

David Jenkins (QSA CISA) Director of PCI and Payment Services

David Jenkins (QSA CISA) Director of PCI and Payment Services David Jenkins (QSA CISA) Director of PCI and Payment Services PCI and the Cloud, where is my Atlas Agenda About Cognosec PCI DSS 3.0 and CSPs SLA Considerations Technical considerations Auditing About

More information

Communications Room Policy

Communications Room Policy Information Security Policies Communications Room Policy Author : David Rowbotham Date : 01/07/2014 Version : 1.1 Status : Initial Release MAG Information Security IT Policies Page: 1 1 Table of contents

More information

Automating the Software-Defined Data Center with vcloud Automation Center

Automating the Software-Defined Data Center with vcloud Automation Center Automating the Software-Defined Data Center with vcloud Automation Center Aviv Waiss, lead Cloud management Specialist 2014 VMware Inc. All rights reserved. The Impact of the Accelerating Pace of Business

More information

epldt Web Builder Security March 2017

epldt Web Builder Security March 2017 epldt Web Builder Security March 2017 TABLE OF CONTENTS Overview... 4 Application Security... 5 Security Elements... 5 User & Role Management... 5 User / Reseller Hierarchy Management... 5 User Authentication

More information

IT Service Management: Southeast Area Practice Gary West Solution director Business Service Optimization

IT Service Management: Southeast Area Practice Gary West Solution director Business Service Optimization IT Service Management: Southeast Area Practice Gary West Solution director Business Service Optimization IT Under Attack IT costs are now more than 50% of the average Fortune 500 company s capital costs

More information

DCIM Software and IT Service Management - Perfect Together

DCIM Software and IT Service Management - Perfect Together DCIM Software and IT Service Management - Perfect Together A White Paper from Raritan 2015 Raritan Inc Overview Information Technology is so fundamental to every business today that every organization

More information

Problem Management MANDATORY CRITERIA

Problem Management MANDATORY CRITERIA MANDATORY CRITERIA 1. Does the tool facilitate the creation, modification, and closure of Problem records? Comments: Yes. The tool provides two (2) methods in which to create a problem record. The record

More information

CyberSecurity Situational Awareness Monitoring & Reporting Platform Pharos. Cyber Security Showcase Wednesday, 29 February 2012 Brussels, Belgium

CyberSecurity Situational Awareness Monitoring & Reporting Platform Pharos. Cyber Security Showcase Wednesday, 29 February 2012 Brussels, Belgium CyberSecurity Situational Awareness Monitoring & Reporting Platform Pharos Cyber Security Showcase Wednesday, 29 February 2012 Brussels, Belgium The Cyber Security Problem Domain Attack Profiling The Fast

More information

The ITIL Process Map for Microsoft Visio. Examples and Overview of Contents

The ITIL Process Map for Microsoft Visio. Examples and Overview of Contents The ITIL Process Map for Microsoft Visio Examples and Overview of Contents Contents Structure of the ITIL Process Map Page 3 ITIL Process Diagrams Examples Page 4 Index of Process Diagrams contained in

More information

Customer s journey into the private cloud with Cisco Enterprise Cloud Suite

Customer s journey into the private cloud with Cisco Enterprise Cloud Suite Customer s journey into the private cloud with Cisco Enterprise Cloud Suite Peter Charpentier, Senior Solution Architect, Cisco AS Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker

More information

Cloud Operations for Oracle Cloud Machine ORACLE WHITE PAPER MARCH 2017

Cloud Operations for Oracle Cloud Machine ORACLE WHITE PAPER MARCH 2017 Cloud Operations for Oracle Cloud Machine ORACLE WHITE PAPER MARCH 2017 Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only, and

More information

REPORT 2015/149 INTERNAL AUDIT DIVISION

REPORT 2015/149 INTERNAL AUDIT DIVISION INTERNAL AUDIT DIVISION REPORT 2015/149 Audit of the information and communications technology operations in the Investment Management Division of the United Nations Joint Staff Pension Fund Overall results

More information

Don t You Just Care that Your Food Tastes Good...and that you can afford it! ITIL

Don t You Just Care that Your Food Tastes Good...and that you can afford it! ITIL Don t You Just Care that Your Food Tastes Good...and that you can afford it! ITIL ITSM Executive Overview PMI Southwest Ohio Mega Keith D. Sutherland April, 2016 Acknowledgements Service Management Dynamix,

More information

10 Reasons Why Your DR Plan Won t Work

10 Reasons Why Your DR Plan Won t Work 10 Reasons Why Your DR Plan Won t Work Jim Damoulakis CTO, GlassHouse Technologies, Inc. Sept. 29, 2005 DR Vision Imagine Prepared to handle multiple categories of disaster Clearly documented policies

More information

Purchasing Activities Suggesting a New Vendor

Purchasing Activities Suggesting a New Vendor Purchasing Activities Suggesting a New Vendor Overview: Understanding the Suggesting a New Vendor Process This tutorial shows the step-by-step processes for suggesting a new vendor while creating a Requisition

More information

System Center 2012 R2 Lab 4: IT Service Management

System Center 2012 R2 Lab 4: IT Service Management System Center 2012 R2 Lab 4: IT Service Management Hands-On Lab Step-by-Step Guide For the VMs use the following credentials: Username: Contoso\Administrator Password: Passw0rd! Version: 1.5.5 Last updated:

More information

Clearswift Managed Security Service for

Clearswift Managed Security Service for Clearswift Managed Security Service for Email Service Description Revision 1.0 Copyright Published by Clearswift Ltd. 1995 2019 Clearswift Ltd. All rights reserved. The materials contained herein are the

More information

Administration and Data Retention. Best Practices for Systems Management

Administration and Data Retention. Best Practices for Systems Management Administration and Data Retention Best Practices for Systems Management Agenda Understanding the Context for IT Management Concepts for Managing Key IT Objectives Aptify and IT Management Best Practices

More information

Management s Response to the Auditor General s Review of Management and Oversight of the Integrated Business Management System (IBMS)

Management s Response to the Auditor General s Review of Management and Oversight of the Integrated Business Management System (IBMS) APPENDI 2 ommendation () () 1. The City Manager in consultation with the Chief Information Officer give consideration to the establishment of an IBMS governance model which provides for senior management

More information

CMDB AND C ONFIGURATION M ANAGEMENT P ROCESS, S OFTWARE T OOLS C REATION AND M AINTENANCE, P LANNING AND I MPLEMENTATION G UIDE

CMDB AND C ONFIGURATION M ANAGEMENT P ROCESS, S OFTWARE T OOLS C REATION AND M AINTENANCE, P LANNING AND I MPLEMENTATION G UIDE CMDB AND C ONFIGURATION M ANAGEMENT P ROCESS, S OFTWARE T OOLS C REATION AND M AINTENANCE, P LANNING AND I MPLEMENTATION G UIDE Gerard Blokdijk Notice of Rights: Copyright The Art of Service. All rights

More information

ICT DISASTER RECOVERY PLAN. FIRST DRAFT: ET 2015#11 (21 October 2015) None to Date

ICT DISASTER RECOVERY PLAN. FIRST DRAFT: ET 2015#11 (21 October 2015) None to Date POLICY: ICT DISASTER RECOVERY PLAN FIRST DRAFT: ET 2015#11 (21 October 2015) ADOPTED: BR 2016#01 (16 March 2016) AMENDMENTS: None to Date REVIEW: March 2021 Contents 1.0 Review... 3 2.0 Goal of Disaster

More information

ITIL Foundation Exam Study Guide

ITIL Foundation Exam Study Guide ITIL Foundation Exam Study Guide Gallacher, L ISBN-13: 9781119942757 Table of Contents Introduction xvii Assessment Test xxvii Chapter 1 Service Management as a Practice 1 Best-Practice Approaches and

More information

Bootstrapping Enterprise Standards A Real World Approach

Bootstrapping Enterprise Standards A Real World Approach Bootstrapping Enterprise Standards A Real World Approach The Open Group Enterprise Architecture Practitioners Conference July 22 th 2008 Dan Hughes, Principal Consultant, Systems Flow, Inc Graham Williams,

More information

Security Camp 2016 Cloud Security. August 18, 2016

Security Camp 2016 Cloud Security. August 18, 2016 Security Camp 2016 Cloud Security What I ll be discussing Cloud Security Topics Cloud overview The VPC and structures Cloud Access Methods Who owns your data? Cover your Cloud trail? Protection approaches

More information

Advanced Aspects of IT-Infrastructures in Healthcare

Advanced Aspects of IT-Infrastructures in Healthcare Advanced Aspects of IT-Infrastructures in Healthcare Einführung Vorlesung WS 2012 29.11.2012 Dr. Andreas Ehringfeld INSO - Industrial Software Institut für Rechnergestützte Automation Fakultät für Informatik

More information

Information Systems Analysis and Design CSC340. XXV. Other Phases

Information Systems Analysis and Design CSC340. XXV. Other Phases XXV. Other Phases Implementation Phase Testing and Installation Phase Post-Installation Tasks Course Summary 2002 John Mylopoulos Other Phases -- 1 The Software Lifecycle Revisited Survey project scope

More information

"Charting the Course to Your Success!" MOC Planning, Deploying and Managing Microsoft System Center Service Manager 2010.

Charting the Course to Your Success! MOC Planning, Deploying and Managing Microsoft System Center Service Manager 2010. Description Course Summary This course provides students with knowledge and skills to install and configure System Center. The course focuses on implementing, configuring and integrating with other System

More information

How to measure your SOC efficiency: the Devil is in details

How to measure your SOC efficiency: the Devil is in details How to measure your SOC efficiency: the Devil is in details SOC Forum 2017 22.11.2017 wayray.com 2 #whoami Mona Arkhipova CSO/CIO at WayRay Past: Unit manager of infrastructure security and monitoring

More information

The Evolution of IT Service Management

The Evolution of IT Service Management The Evolution of IT Service Management IT Service Management And Convergence of ITIL, ASL, ISO, and COBIT BCS Rideau Presentation March 21 st 2007 Phil Mustaphi Discussion Topics Introduction ITIL why,

More information

Visualising Your CMDB With Visio

Visualising Your CMDB With Visio Visualising Your CMDB With Visio David Cuthbertson Square Mile Systems Square Mile Overview Develop AssetGen toolsets, training and techniques for operational management of complex IT infrastructure Focus

More information

Symantec ServiceDesk 7.1 SP1 Implementation Guide

Symantec ServiceDesk 7.1 SP1 Implementation Guide Symantec ServiceDesk 7.1 SP1 Implementation Guide Symantec ServiceDesk 7.1 SP1 Implementation Guide The software described in this book is furnished under a license agreement and may be used only in accordance

More information

Technology Services. FY Budget Presentation

Technology Services. FY Budget Presentation FY 2018-19 Budget Presentation Goals and Accomplishments Overall, completed 74 projects, fulfilled 8,676 service/incident requests, and held uptime of 99.96% Application Consolidation/Reduction initiative-

More information