8 Nisan 2016 Cuma

Strategy-Design

SERVICE STRATEGY


Service strategy shows organisations how to transform service management from an organisational capability into a strategic asset, and to then think and act in a strategic manner.
Service strategy helps clarify the relationships between various services, systems or processes and the business models, strategies or objectives they support.
The Objectives of Service Strategy
Service strategy shows organisations how to transform service management from an organisational capability into a strategic asset, and to then think and act in a strategic manner.
Service strategy helps clarify the relationships between various services, systems or processes and the business models, strategies or objectives they support.
Other objectives include:
- Provide business stakeholder value
 -Differentiate the organisation
 -Make solid cases for investment
 -Resolve conflicting demands for services
- Improve service quality by strategic planning
Value to the Organisation/Business of Service Strategy
 -Provides guidance on how to design, and put in place service management as a strategic asset
- Sets the principles for developing service management policies, guidelines and processes across the service lifecycle
 -Sets objectives and expectations of performance towards serving customers and market spaces
- Identifies and prioritises opportunities
 -Ensures that organisations can manage the costs and risks associated with their service portfolios
 -Asks questions and plans a strategy for how to do something before progressing
The Service Strategy volume provides guidance on how to design, develop, and implement service management not only as an organizational capability but also as a strategic asset. Guidance is provided on the principles underpinning the practice of service management that are useful for developing service management policies, guidelines and processes across the ITIL Service Lifecycle. Service Strategy guidance is useful in the context of Service Design, Service Transition, Service Operation, and Continual Service Improvement. Topics covered in Service Strategy include the development of markets, internal and external, service assets, Service Catalogue, and implementation of strategy through the Service Lifecycle. Financial Management, Service Portfolio Management, Organizational Development, and Strategic Risks are among other major topics. Organizations use the guidance to set objectives and expectations of performance towards serving customers and market spaces, and to identify, select, and prioritize opportunities. Service Strategy is about ensuring that organizations are in a position to handle the costs and risks associated with their Service Portfolios, and are set up not just for operational effectiveness but also for distinctive performance. Decisions made with respect to Service Strategy have far-reaching consequences including those with delayed effect.
Organizations already practising ITIL may use this publication to guide a strategic review of their ITIL-based service management capabilities and to improve the alignment between those capabilities and their business strategies. This volume of ITIL encourages readers to stop and think about why something is to be done before thinking of how. Answers to the first type of questions are closer to the customer’s business. Service Strategy expands the scope of the ITIL framework beyond the traditional audience of IT Service Management professionals.
The Following Processes are part of the ITIL Stage Service Strategy:
Strategy Management for IT Services

Process Objective: To assess the service provider’s offerings, capabilities, competitors as well as current and potential market spaces in order to develop a strategy to serve customers. Once the strategy has been defined, Strategy Management for IT Services is also responsible for ensuring the implementation of the strategy.
Service Portfolio Management
Process Objective: To manage the service portfolio. Service Portfolio Management ensures that the service provider has the right mix of services to meet required business outcomes at an appropriate level of investment.
Demand Management
Process Objective: To understand, anticipate and influence customer demand for services. Demand Management works with Capacity Management to ensure that the service provider has sufficient capacity to meet the required demand.
Financial Management for IT Services
Process Objective: To manage the service provider’s budgeting, accounting and charging requirements.
Business Relationship Management
Process Objective: To maintain a positive relationship with customers. Business Relationship Management identifies the needs of existing and potential customers and ensures that appropriate services are developed to meet those needs.
1. STRATEGY GENERATİON
For positive results, service provider needs to plan his services strategically. A good service strategy defines a unique approach for delivering better value.
Service Strategy Manager is the process owner of this process.
For long term success the service provider has to be able to think and act strategically. According to ITIL the service straregy proces incorporates four incorporates four fundamental activities:
·         Defining the market
·         Developing offerings
·         Developing strategic assets
·         Measuring and Preparation for implementation of strategy
Defining the market

It is necessary to take survey of services available in the market. It gives a clear perspective of cost and quality of services already present and what new service can be offered in competitive environment.
Developing offerings
In this service provider develops a portfolio which contain all the services that are visible and available for the customer. Service portfolio is developed in order to represent all binding service investments towards the market.
Developing strategic assets
It deals with buying new technologies, resources and capabilities to offer law-cost and high-value service to the customer.
Measuring and Preparation for implementation of strategy
In order to measure success or failure of the strategy, all critical success factors are measured. Also the completion in the market is observed and priorities are adjusted accordingly.



2.     DEMAND MANAGEMENT

Demand Management is very important and critical process in service strategy. It helps to understand customer demand for services so that appropriate capacity can be provisioned to meet those demands.
According to ITIL, the purpose of demand management is to understand, anticipate, and influence customer demand for services. As a process, it is part of the ITIL service strategy stage of the ITIL lifecycle. Service strategy determines which services to offer to prospective customers or markets. The decisions that are made in the service strategy stage affect the service catalog, the business processes, the service desk, the required capacity, and the financial requirements of the service provider.

            As part of the service strategy stage, demand management rationalizes and optimizes the use of IT resources. It ensures that the amount of technical and human resources that has been budgeted matches the expected demand for the service. If the prediction is too low, the agreed-upon service levels may not be delivered. If the predictions are too high, resources will have been allocated to a service that will not be used (or paid for). Demand management bridges the gap between service design, capacity management, and business relationship management to ensure that the predictions are accurate.

            Demand management is a process within ITIL that is more supportive of other processes than a self-contained process. Unlike incident management, for example, the activities inside demand management are not visible to the customer. When service demand is not properly balanced, it affects nearly every part of the ITIL lifecycle. 
Demand Management Objectives and Activities
The purpose of demand management is to detect and influence the demand that customers have on IT services. This process involves three main actions:
·          Analyzing current customer usage of IT services: The easiest way to do this is to analyze service desk data regarding incidents, requests, and problems. Network usage and uptime can be measured via a service dashboard, such as the kind used in a network operations center (NOC) environment.
·         Anticipating future customer demands for IT services: Here, the business relationship manager comes into play. He or she may speak with the customer directly about forecasted needs, will analyze trends in usage or tickets, and will make educated projections about future usage based on similar customers trends.
·         Influencing consumption as necessary by financial or technical means: For example, if a customer uses more service than anticipated in the SLA, a service provider may charge fees for the excessive consumption to offset the costs of the unforeseen demand. Demand management also makes sure that the appropriate costs are included in the service design.
3. SERVİCE  PORTFOLİO MANAGEMENT
What is Service Portfolio Management from an ITIL perspective?

A Service Portfolio describes the services of a provider (internal, outsourced etc) in terms of value to the business.
It is an ever changing method used to manage investments in Service Management across the organization, in terms of financial values.  Service Portfolio Management (SPM) enables Managers to assess the quality requirements and associated costs.
The primary goal of SPM is to realize maximum value whilst managing accompanying risks and costs.
So how can SPM help when decide what services clients require?  There are 5 basic questions that need to be answered:
§  Why should a client buy these services?
§  Why should a client buy these services from our organization?
§  What are the price and charge back models?
§  What are our strengths and weakness, priorities and risks?
§  How should our resources and capabilities be allocated?
Product Managers play a key role in Service Portfolio Management.  Their main responsibility is to manage services as products during their entire lifecycle.  Other roles include the co-ordination and focus of the organization as well as owning the Service Catalogue.
The Service Portfolio covers 3 subsets:
§  Service Pipeline-The service pipeline represents the strategic outlook that you, the service provider, should take. Services begin their lifecycle in the service pipeline, starting with the strategic assessment of the marketplace and/or customers to be  served. The pipeline includes the services that have been  requested and are currently being evaluated. Here, you  identify the requirements of the requested services. You  then define and analyze the services based on a number  of factors, including cost, risk, and expected business value. Based on the analysis, you either approve or reject requested services. Approved services proceed from the service pipeline to the service catalog. Service pipeline processes are defined in the ITIL V3 Service Strategy book.

§  Service Catalog-The service catalog is the subset of the service portfolio that is visible to customers. The service catalog includes all services that have been approved and are either in development or currently deployed.Services include outsourced, co-sourced, and managed services. ITIL V3 defines several attributes to be maintained by the service catalog for each service, such as the following:
v  Service description
v  Policies
v  SLAs
v  Ordering and request procedures
v  Support terms and conditions
v  Pricing and chargeback
Here, you assess the feasibility of the services that come into the service catalog from the service pipeline, and either charter or reject them. Chartered services move to the design and development phases. Developed services are then built, tested, released, and deployed. At this point, services become operational, and you engage resources to support them.The service catalog is used to develop requestable services that customers can purchase and consume. A mature service catalog is a very powerful tool for decision making. By analyzing the demand and fulfillment capabilities a service provides, a service portfolio management approach can
assist you in making decisions to expand a service or the marketplace to serve to meet future demands.
§   Retired Services – It is necessary to review the service portfolio periodically to determine whether any services should be retired. Services targeted for retirement may include those that are no longer needed by the business, those that have been superseded by other services, and those that are no longer cost-effective.Retire these services and identify them as “retired” in the service portfolio.
Finally, Service Portfolio provides input for refreshing services in the Service Catologue. 
Implementing and Leveraging the Service Portfolio

Solutions can facilitate the implementation and management of the service portfolio. For example, some include an automatic discovery capability that initially populates the CMDB and keeps it updated with changes. This ensures that your service catalog is always providing up-to-date information about available services. Solutions can be used to implement a business service catalog as well a technical service catalog and can provide tools to manage them. Gaining Control of Development Projects.Project portfolio management solutions leverage information in the service portfolio to permit more effective planning and management of service development projects. They can help you in a number of importantareas, including the following:
v  Project portfolio business value and risk analysis
v  Project portfolio prioritization
v  Project management with customizable processes and workflow
v  Project financials management
v  Program management
These solutions give you increased visibility into development projects across the enterprise. With this visibility, you can determine the most valuable projects to pursue, and you can execute those projects as efficiently as possible. In addition, you can make more accurate budget forecasts and build collaborative relationships with IT clients. As a result, you will achieve the optimum balance between market needs and your agility and ability to respond, and ultimately, can determine the Return on Investment (ROI) or Return on Value (ROV) of your projects.Automating Service Request Management. A major problem faced by many IT departments is that users do not know what services are available to them, let alone the details of those services, such as how to order them and what they cost. Typically, users contact the service desk to obtain this information, adding to an already high service desk workload.
Once users determine the services they want, they also havea difficult time procuring them, often because they need to deal with several different sources to complete a single business service. For example, a manager onboarding a new employee may have to deal with several departments to provision the employee with a furnished office, including computer equipment. After requesting services, the manager has to track delivery status across the multiple departments involved.Automated service request management systems can leverage the service catalog to provide automated service request management and fulfillment. The user consults an online service catalog to determine what services are available. The catalog contains all the information the user needs to know to order a service, such as service description,terms and conditions of use, performance and availability, warranties, price, and request procedure. A well-designed system displays only those services that the user is authorized to request, based on his or herrole.The user selects the service and enters the required information into the online service request form. The service request management system automatically triggers the required actions to process and fulfill the request. The system tracks the progress of each task and notifies the user when fulfillment has been successfully completed. In addition, the user can determine the status of a request at any time by consulting the system.It’scommon knowledge that 20 percent of all the services provide 80 percent of all the value and work effort. By automating these high-intensity services, you can create a very strong ROI. Automated service request management makes it easy for users to request a service. In addition, it incorporates best practices to help IT process requests in a timely manner, reducing service desk workload and enforcing company policies and standards. Extending Beyond IT Services Once you have put in place a strong IT service portfolio management capability, you can extend it beyond the management of IT services. This gives you the ability to apply service portfolio management principles and processes to other services that the enterprise provides and consumes, both internally and externally.


4. ITIL FINANCIAL MANAGEMENT

It is important to spend money wisely. Financial Management is a strategic tool that is relevant to all three service provider types. Increasingly, internal service providers are asked to operate with the same levels of financial visibility and accountability as their external counterparts. In the case of external service providers, the innovative provision of technology is the core revenue generating capability of their company.
Financial Management allows an organisation to understand the worth of their IT services in financial terms. It will also aid the understanding of the value of the assets provisioning those services and allows us to set realistic budgets. The key thing is to be able to attribute a value to the services being offered. This will cause a change in perception of IT and its value to the business.
As part of Financial Management we should be asking questions such as:
Which services cost us most to deliver and why?
What services are we offering, what is the demand for these services and how much does it cost us to provide them?
How efficient is the way we deliver service compared with the alternatives?
Where are our greatest service inefficiencies?
Which areas represent the highest priority opportunities for us to focus on in terms of Continual Service Improvement?
And after applying ITIL based financial management, both the client and the service provider aims to have the following capabilities:
* Enhanced decision making
* Speed of change
* Service portfolio management
* Financial compliance and control
* Operational control
* Value capture and creation
The Business Case
For each and every service offered there should be adequate business justification. A good business case will consider both qualitative and quantitative dimensions. In the case of the latter financial analysis is often key. A business case may take many forms but broadly speaking all will include objectives and impact and will take the following form:
An introduction
This serves to present the objectives addressed by the service. What is the proposal about and what do we hope to achieve?
Methods and assumptions
It is important to state any assumptions so that these may be compared later against reality. If there is a variance then this may identify why the expected outcome did not materialise. It is also important to document methods. These may help to identify scope, time periods and costs which will help with the evaluation. The likely beneficiary will also need to be identified.
The business impact.
This is where the beneficial outcomes, both financial and non-Âfinancial are identified. Clearly a commercial service provider will mostly be concerned with profitability of service whereas the not for profit organisation may propose a business case which focuses on altruism. Nevertheless both providers will need to show a degree of financial and organisational performance.
Risks and contingencies
The identification of possible alternate outcomes which might be experienced and the identification of ways of reducing the likelihood or accommodation of the outcome if it occurs.



SERVICE DESİGN


Provides a blueprint for the services. It not only includes designing of new service but also devises changes and improvements to existing ones.It also let the service provider know how the design capabilities for service management can be developed and acquired.
It is necessary for services to be adaptable to changing business requirements on dynamic basis. For this a balance must be maintained between following three factors:
·         Functionality with the required quality.
·         Resources i.e. staff, technologies, and available finances.
·         Timetable
Service Design focuses on the following aspects:
·         IT Services designed to meet business objectives.
·         Services designed to be both fit for purpose and fit for use.
·         Cost of ownership planed to achieve return on investment.
·         Balanced functionality, cost and performance.
·         IT services more stable and more predictable.
·         Potential risk mitigated, so the IT service is protected from security threats.
·         Design technology architectures, management architectures, and system management tools.
·         Design of the measurement systems, methods, and metrics for services, processes, architectures and underlying components.
·         Design of the service solution including all agreed functional requirements, resources and capabilities.



1. SUPPLIER MANAGEMENT

Supplier Management ensures that external services and configuration items, which are necessary for the service delivery, are available as requested and as agreed at the service level.

Supplier Management is responsible for consolidating requirements for external services and supplies, scanning the market for providers, negotiating with a chosen supplier, and for the contracting and monitoring of external services and service providers. Management of supplier relationships and supplier performance are additional tasks. Supplier Management is also responsible for establishing and updating the basic supplier framework, which is a Supplier Strategy and Supplier Policies.
Supplier Management is triggered from the Service Portfolio Management whenever a new supplier is necessary.
Supplier Management in

ITIL V3: part of Service Design
COBIT: part of Acquire and Implement
ISO/IEC 20000: Supplier Management

In ITIL V3, Supplier Management is part of the Service Design process to allow for a better integration into the Service Lifecycle - Supplier Management was covered within "ICT Infrastructure Management" in the previous ITIL version.
ITIL Supplier Management

Following the introduction of Design Coordination in ITIL 2011 the information flows have been adapted slightly. The process overview of ITIL Supplier Management (.JPG) is showing the most important interfaces (see Figure 1).
All suppliers and contracts are managed through the Supplier and Contract Management Information System (SCMIS), which in ITIL V3 was known as the Supplier & Contract Database (SCD).

2. SERVİCE CATALOG MANAGEMENT
Service Catalogue Management was added as a new process in ITIL V3.

In the previous ITIL version, the Service Level Management process mentioned the concept of a Service Catalogue.
ITIL V3 takes this concept further, introducing a dedicated process to ensure that the Service Catalogue is up-to-date and contains reliable information.
A clear distinction exists between Business Services in the Service Catalogue (services visible to the customer, defined by SLAs) and Supporting Services (services visible only inside the IT organization, defined by OLAs orUCs).
In ITIL 2011 the process interfaces have been adapted slightly following the introduction of the Design Coordination process. The process overview of Service Catalogue Management (.JPG) is showing the most important interfaces (see Figure 1).

Each service in the catalogue contains the following elements:
·         A identification label for the service
·         Description of services
·         Related service request types
·         Any supporting or underpinning services
·         Service categorization or type that allows it to be grouped with other similar services
·         Interfaces and dependencies between all services, and supporting components and configuration items (CIs) within the service catalogue and the CMS
·         Clear ownership of and accountability for the service
·         Associated costs
·         How to request the service and how its delivery is fulfilled
·         Escalation points and key contracts
·         Service level agreement (SLA) data

3. INFORMATION SECURITY MANAGEMENT

Description/Summary
Information Security Management deals with the implementation and monitoring of a predefined security level for the IT environment. In particular, it addresses areas such confidentiality, integrity and availability. Risk analysis, as the starting point, helps to define the customer requirements on a security level. An internal, minimal security requirement is named IT basic protection. Additional security requirements of the customer are to be defined on an individual basis.
Objectives
To introduce and maintain a required level of security, as defined by law, contracts or other agreements.
Information Security Management contributes to an integrated Service Management approach by achieving the following activities:
·         Identifying and defining the internal and external security requirements
·         Planning of security procedures
·         Creating a security chapter in the SLA and Service Description
·         Managing the implementation of security actions
·         Evaluating the security procedures and security measures
·         Security Reporting
·         Security Improvement
·          
Roles &Functions
Security Management specific roles
Static Process Roles

     Security Process Owner

Initiator of the process, accountable for defining the process strategic goals and allocating all required process resources. See Continual Process Improvement Management for a detailed description of these activities.

   Security Process Manager (Security Manager)
IT Security Management Process is controlled by the Security Manager. The Security Manager can delegate tasks to specialized staff. Should it be necessary to use external staff, an approval of the budget by the responsible person is required.
 
    IT Security Management Team
Team in Security Management perform mandatory tasks for the Security Manager.

Dynamic Process Roles
   Security Auditor
Security Auditor is providing the verification of security policies, processes and tools. Auditor should be altering an external and internal resource to provide independent and reliable audit.
Service Specific Roles
Roles depending on the affected service are found in the Service Description. The Service Description, including the service specific roles, is delivered from the Service Portfolio Management.
·         Service Expert/Service Specialist:
·         Service Owner:
·         Service User:
Customer Specific Roles
Roles depending on the affected customer(s) are found in the Service Level Agreement. The Service Level Agreement for the customer specific roles is maintained by the Service Level Agreement Management.

   Customer(s)
Customers of the affected service with a valid SLA
Information artifacts
Security Policy
The process depends on general security rules. Moreover, this process is responsible for the permanent improvement and adjustment of general security policies and rules.
Security Design Record
·         Security Design ID
·         Security Design Requester
·         Security Design Description
·         Security Design Agent
·         Security Design Owner
·         Service: The Service which has to be (re)designed
·         Service Integrity
·         Service Confidentiality
Security Transition Record
·         Security Transaction ID
·         Security Transition Requester
·         Security Transition Description
·         Security Transition Agent
·         Security Transition Owner
·         Service: Services affected by the Change
·         Configuration Items: CI affected by the Change
Security Verification record
·         Security Verification ID
·         Security Verification Requester
·         Security Verification Description
·         Security Verification Agent
·         Security Verification Owner
·         Security Verification Auditor
·         Service: Services affected by the Security Audit
·         Configuration Items: CI affected by the Security Audit
·         Customer: Customer affected by the Security Audit
·         User: User affected by the Security Audit
·         Expert/Specialists: Expert/Specialists affected by the Security Audit

Key Concepts
Availability
Information and the service must be accessible to authorised users.
Integrity
Information must not be modified by unauthorized users. Following levels of integrity are possible:
·         0: it can not be proven if integrity was violated
·         1: it can be proven if integrity was violated
·         2: it can be proved if integrity was violated and the violation can be reversed
Confidentiality
Information must not be accessible by unauthorized users. Following levels of confidentiality are possible:
·         public: information is available for all
·         confidential: information is available for authorised personnel only and assigned external partners
·         confidential - for intern use only: information is available for authorised personnel only
·         top secret: information is available for senior management only
The Confidentiality Levels can be expanded or adjusted.
Authentication
Verification of identity of a user or information.
Authorization
Methods and tools used to decide if user or information is allowed to have access other devices or sources of information.
Severity Breach Levels
Severity levels here indicate the importance of an optimization proposal or security incident. The following levels can be defined as:
Critical
The level "critical" needs to be implemented, including changes, as soon as possible.
High
The level "high" needs to be implemented, including changes, within next 2 days.
Low
The level "low" needs to be implemented, including changes, within next 7 days.



Process
Critical Success Factors
Critical Success Factors (CSF) define a limited amount of factors which influence the success of a process. For Security Management, the following factors can be defined as CSF:
·         Right dimension of security, by avoiding too strict or too lax security
·         Management support for security issues
·         Security awareness in the company
·         Definition of responsibilities between security implementation and security control activities and roles
Security Manager must review the CSFs and must define and implement measures to fulfill the process success.
Security Policy
High Level Process Flow Chart
This chart illustrates the Security Policy Creation and Control



Performance Indicators (KPI)
·         Number of changes to Security policy
·         Number of awareness programs
Process Trigger
Event Trigger
·         The process is is not time triggered
Time Trigger
·         Security Policy is activated periodically
Process Specific Rules
·         Each Change to the Security Policy has to be documented
·         Each Change to the Security Policy has to be published

Process Activities
Security Policy Definition
Security Policy Definition is dealing with definition of
·         Basic security rules collected in a Security Policy
Basic Security rules define the Security vision, organization and are business strategy aligned. Main orientation rule is the balance between high security standard for internal IT services, services provided and external supplied services and required services and good commercial “value for money” proposition.
Activity Specific Rules
·         Security Manager is set to the person who is responsible for security process
·         Security Process Owner Manager is set to the person who is accountable for security process
·         The Security Policy is created or updated
·         add new Rules
·         modify existing rules
·         delete unnecessary rules
·         The Security Policy is signed by the Senior Management and published
Security Policy Controlling
Security Policy Implementation and Monitoring is responsible for the implementation, communication, monitoring and update of security rules and policies.
Activity Specific Rules
·         Communicate Security Policy
·         Check for new Security Threats
·         trigger Security Policy update when necessary
·         Assure that staff understands and the rules by auditing and teaching staff
Security Design Assistance
Sub process Design in Security Management is responsible for the initial planing or planning of optimizations of the security process. If a change proposal on security process is classified the change needs to be planned as well. This is performed by an expert out of the responsible expert group in coordination with a member of the IT security staff. This sub process is triggered by Service Design. After the activity is finished, the status needs to be changed to planned.
The Process owner is the Security Manager. The Process agent is an expert assigned by "Security Staff".
High Level Process Flow Chart
This chart illustrates the Security Management Design process and its activities
Performance Indicators (KPI)

·         Number of new Security Design Assistance Requests
·         Number of "approved - successful" and "approved - unsuccessful" Security Design Assistance Requests
·         Ratio of "approved - successful" and "approved - unsuccessful" Security Design Assistance Requests
Process Trigger                                                                                             
Event Trigger
·         The process is initiated by the Change Management.
Time Trigger
·         Security Design Assistance is not time triggered
Process Specific Rules
·         Each Security Design assistance Request must be recorded
·         The Security Design Agent has to document the request and result of the design request
·         The Security Design Owner has to control the Agent
·         The Security Design Agent has to coordinate his work with other Design Agents
·         The Security Design Requester has to be informed
Process Activities
Design of Security Part in Service Design Package
Within this activity, the security section of the service design package is designed. This includes information on accessibility, security actions and measures, relevant passwords and policies etc.
Activity Specific Rules
·         set the Security Design Owner to a member of the IT security Management Staff
·         set the Security Design Agent to a member of the Service Expert or Specialist Group
·         Design Security according to the Security Requirements and the Security Policy
·         coordinate Security Design package with the activity "Service Design" and other relevant Service Designer
·         document in the Service Design package and fill out the Security Design Record
·         go to control activity "designed^"
Approval of Security Design Package
With this activity, the Security Manager approves the Security Design Package.
·         Security Design Package is finally neglected
·         Approval of the Security Design Package is temporarily refused and returned to the security expert for the improvement or optimization
·         Security Design Package is accepted.
Activity Specific Rules
·         set the Security Design Agent to Security Manager
·         Approval the Security Design Package and the documentation in the Security Design Record
·         If approval is posit iv go to control activity "approved - successful"
·         else
·         go to control activity "new" for a redesign of the Security Design Package
·         or "approved - unsuccessful" for final abortion


Security Transition Assistance
This activity, in cooperation with Change Management, supports the implementation and testing of security improvements by designing, testing, implementing and then testing the implementation again. These actions are headed by Change Management.
If a security improvement proposal is authorized and approved by Change Management, all action's functional descriptions and implementation procedures, which are described in the improvement proposal need to be detailed, tested and approved in cooperation with theChange Management. Afterwords the implementation should be assisted to provide help in case emergency or implementation issues.
A final PIR, conducted together with Change Management also includes testing.
High Level Process Flow Chart
This chart illustrates the Security Transition Assistance process and its 
Performance Indicators (KPI)

·         Number of Security Transition Assistance Request
·         throughput time (min/average/max) for a Transition Assistance Request until "assisted - closed"
Process Trigger
Event Trigger
·         Process is triggered by different activities in the Change Management.
Time Trigger
·         Security Transition Assistance is not time triggered
Process Specific Rules
·         Each Security Transition Assistance Request must be recorded
·         The Security Transition Agent has to document the request and result of the design request
·         The Security Transition Owner has to control the Agent
·         The Security Transition Agent has to coordinate his work with other Transition Agents
·         The Security Transition Requester from the Change Management has to be updated
Process Activities
Creation Risk Analysis and Feasibility Study
If a Security Transition Assistance is requested by Change Management the following 2 documents need to be defined:
·         Feasibility Study
·         Risk Analysis
Following aspects need to be addressed within a Feasibility Study:
·         Feasibility of proposal
·         Risk of implementation
·         Risk of neglecting proposal
·         Costs
A Feasibility Study is based on high level planning and should not address detailed planning because of the possibility that the proposed change will not be accepted. Detailed planning of the Change is part of the activity "Build - Implement - Test - Assistance " after the Change has been authorized.
A Feasibility Study is provided by an expert or specialist of the address service. Eventually additional requirements provided by other processes, such as Financial, Availability orCapacity Management will also need to be reviewed.
After the responsible expert finishes their contribution to the planning of the security actions, the status needs to be set on planned design package
Activity Specific Rules
·         set the "Security Transition Owner" to a member of the IT Security Management Staff
·         set the "Security Transition Agent" to a member of the Service Expert or Specialist Group
·         Create a Security Feasibility Study & Risk Analysis according to the Change Requirements and the Security Policy
·         coordinate Creation of the Security Feasibility Study & Risk Analysis package with others
·         document in the Security Feasibility Study & Risk Analysis Document as well as in the Security Transition Record
·         go to control activity "created^"
Build - Test - Implement - Assistance
If a security change is approved for implementation, Change Management will request assistance from Security Management, who in turn may request assistence from the sub-process Build, Test, Implement and Assistance.
This activity provides the following information:
·         A detailed definition of implementation instructions
·         A detailed definition of test procedures and documents
·         Support during implementation
·         Approval of the implementation
Within the change plan the order and time line of actions need to be described. Testing documentation must address the test design and ensure the effectiveness of the test.
The Test has to be executed before the live Change takes place and is split up into two main test areas:
·         1. Test of the implementation - "Does the provided document describe the right implementation actions in the right implementation order?"
·         2. Test the functionality of the new service in the test-system - "Does the system perform the functions defined in Change?". This test is performed according to the defined testing documentation. The result has to be documented an the Change Management has to be informed.
Implementation activities are fulfilled and lead by Change ManagementSecurity Management only assists and supports with regards to the security aspects and functions.
Activity Specific Rules
·         support creation of the implementation plan including fallback plan
·         support creation of the test plan
·         support test of the implementation plan including fallback plan
·         support implementation
·         document activities and Test results
·         coordinate work with Change Management
·         go to control activity "assisted"
Evaluation and Closure Assistance
In coordination with the Post Implementation Review of the Change, Security Managment helps to test the implementation from the security point of view. In cases of a failed tests, the Change Management has to decide if the fallback plan has to be executed or the implementation can be accepted despite any issues in testing.
Activity Specific Rules
·         support Post Implementation Review and tests
·         consult Change Managment about Fallback Execution
·         support fallback implementation if nessecary
·         document Activities and Security Test results & Fallback Implementation
·         go to control activity "assisted - closed"
Security Verification
This activity is performed by the Security Manager. The target of the activity is to verify, if implemented, that security optimization fulfills the planned results - Verification uses the "Four-Eye Principle".
If actions do not provide the results planned, the status can be set to re-designed. Planning activity needs to be started again. If it is decided that a security improvement action is not approved, then the status should be set to cancelled. If the Security Management approved that decision, the status is being set to OK. In the perspective of Security Management, these actions are approved and can be implemented once the Change Management has authorized the actions.

High Level Process Flow Chart
This chart illustrates the Security Management Verification process and its activities
Performance Indicators (KPI)

·         Number of security incidents per audit by breach level
·         Number of external security audits
·         Number of internal security audits
·         Top Ten services with the most security incidents
Process Trigger
Event Trigger
·         Any request for a Security Audit
·         from any Process Manager or Process Owner
·         from any Service Owner
·         from Senior Management
·         from Customer and Customer Owner (Account Manager)
Time Trigger
·         Security Audits are often time triggered and processed on regular base. Regular Security Audits are defined in
·         Security Policy
·         the Process Description
·         the Service Description
·         Servie Level Agreements (SLA)
·         Operational Level Agreements (OLA)
·         Underpinning Contracts
Process Specific Rules
Process Activities
Planning of Verification Activities
This activity plans the audit activities. Issues to be addressed by the planning:
·         Which services need to be audited regrading security issues?
This depends on the number of security incidents and the severity of security incidents per service as well as the importance of a service.
·         What is the scope of the audit?
What is the extend of the audit: full audit or just the check of few indicators?
·         Auditing method?
Audit to be fulfilled by checks, real life tests or just an questionnaire?
·         How often is the audit needed?
This depends on the number of security incidents and the severity of security incidents per service as well as the importance of a service and how exposed a service is to external and internal threads.
·         Who is performing the audits?
Auditors need to be alternated often to assure that the auditor is independent, not influenced by options or customer relationship and by the will to keep the auditing contract.
Result of this activity is a audit plan, that need to be communicated.
Activity Specific Rules
·         set Security Verification Agent to member of IT Security Management Staff
·         set Security Verification Owner to Security Manager
·         set Security Verification Requester
·         create Security Verification Description
·         select Security Verification Auditor according to the Security Policy
·         document Service affected by the Security Audit
·         document Configuration Items affected by the Security Audit
·         document Customer affected by the Security Audit
·         document User affected by the Security Audit
·         document Expert/Specialists affected by the Security Audit
·         create audit plan
·         go to control activity "planed"
Performing Verification Activities
Based on an audit plan, the audit is performed by the Security Verification Auditor
Activity Specific Rules
·         set Security Verification Agent to Security Verification Auditor
·         set Security Verification Owner to Security Manager
·         documet result in Security Verification Record
·         go to control activity "performed"
Review of Verification Results
Results of the audit need to be checked. If Security incidents occur these need to be classified in severity breach levels and handled by the Process Manager. In case of minor changes the Change Management is addressed, in case of major changes, the process is started with a redesign of new design of e Security Package.
Activity Specific Rules
·         set Security Verification Agent to Security Verification Auditor
·         evaluation & classification of each Security Incident
·         trigger Incident, Problem or Change Management where necessary
·         document result in Security Verification Record
·         go to control activity "reviewed"



4. CAPACITY MANAGEMENT
ITIL capacity management is responsible for ensuring that adequate capacity is available at all times to meet the agreed needs of the business in a cost-effective manner. The capacity management process works closely with service level management to ensure that the business’ requirements for capacity and performance can be met. Capacity management also serves as a focal point for any capacity issues in IT Service Management. Capacity management supports the service desk and incident and problem management in the resolution of incidents and problems related to capacity.
Successful capacity management requires a thorough understanding of how business demand influences demand for services, and how service demand influences demand on components. This is reflected by the three subprocesses of capacity management: business capacity management, service capacity management, and component capacity management. It is required that capacity management develop a capacity plan, which addresses both current capacity and performance issues, as well as future requirements. The capacity plan should be used throughout IT Service Management for planning and budgeting purposes.

Capacity management is responsible for defining the metrics to be captured during service operation to measure performance and use of capacity. This includes monitoring tools, which can provide input to the event management process. Capacity management may be called upon to perform tactical demand management, which involves using techniques such as differential charging to change users’ behavior so that demand does not exceed supply. Other activities of Capacity management include sizing (working with developers to understand capacity requirements of new services) and modeling (building statistical representations of systems).
Capacity Management Definitions
Before implementing capacity management, it’s important everyone is on the same page. One way for an organization to accomplish this is to learn and own the definition. Capacity management introduces new ideas and terms that should be discussed before they are implemented, including component, capacity plan, capacity report, capacity management information system, and performance.

A component is the underlying structure behind a service. For example, it is the database behind the application or the server underneath the website. It is a component that must be purchased, built, maintained, and monitored. Improving performance often involves a replacement, upgrade, or load balancing of the individual component.

The capacity plan contains different scenarios for predicted business demand and offers costed options for delivering the service-level targets as specified. This plan allows service designers to make the best choices about how to provide quality service at an affordable price point.

The capacity report is a document that provides other IT management with data regarding service and resource usage and performance. This is used to help other managers make service-level decisions or decisions regarding individual components.

The capacity management information system (CMIS) is the virtual repository used to store capacity data. Dashboards are one way to store and report on capacity data.

Performance is how quickly a system responds to requests. For example, how quickly an application processes data and returns a new screen is one indicator of its performance. 
The Purpose of Capacity Management
The purpose of capacity management is to determine how much capacity should be provided based on the information from demand management regarding what should be provided. In particular, capacity management is concerned with speed and efficiency. If IT capacity forecasts are accurate and the amount of IT capacity in place meets business needs, the capacity management process is a success.
Capacity Management Activities
This process involves constant measurement, modeling, management, and reporting. More specifically, these activities include:
·         Designing a service so that it meets service-level agreement (SLA) objectives once implemented
·         Managing resource performance so that services meet SLA objectives
·         Assisting with the diagnosis of performance-related incidents and problems
·         Creating and maintaining a capacity plan that aligns with the organization’s budget cycle, paying particular attention to costs against resources and supply versus demand
·         Continually reviewing current service capacity and service performance
·         Gathering and assessing data regarding service usage, and documenting new requirements as necessary
·         Guiding the implementation of changes related to capacity

In practice, implementing this from scratch would involve the same steps as for other projects. For example, implementation might follow these broad steps:
1. Gather the data
Work with business to determine the service-level need. Determine what this means relative to service availability and service capacity. Identify the individual components necessary. Work with demand management resources to predict demand based on user roles. Work with the financial management team to determine the costs.
2. Design a service and reach agreement
Once you've identified the services and the level of performance needed, the cost, and the expected demand, you'll be able to work with ITIL service level management to build an SLA that everyone can agree to. You will also have designed a service at this point.

3. Build the service
The next step is to build the service. This involves purchasing the components and building the IT infrastructure, processes, and documentation necessary to support the new service/s. Capacity management should continue to monitor the business needs and any new data to ensure that the service being built will have the necessary capacity for quality performance. Financial management will be involved at this stage to facilitate purchasing of components and other resources. 
4. Operation
Once you have built the service, and everyone agrees it will meet demand, capacity, and availability requirements, it's go-live time. This is when service operation takes over. Capacity management then supports service operation to deliver services that meet targets.
Monitoring and managing services and their individual components are most easily done via monitoring dashboards that provide data on multiple components in one location. Gathering the data manually from each service or component adds to the total time it takes to produce service-capacity reports.
Capacity Management Processes
This process is built on several sub-processes, including business capacity management, service capacity management, component capacity management, and capacity management reporting. These processes share common activities, such as modeling, workload management, analysis, and optimization.

Business capacity management is the sub-process that turns the needs of the business into IT service requirements. It is involved in service strategy and service design, reviewing the data to ensure that there will be not be any changes in demand before the IT service is implemented. This sub-process works with demand management to ensure that the service is meeting business needs. Other sub-processes make sure that the service meets service-level targets; this sub-process ensures that the service-level targets meet the business needs. A thorough understanding of the business and the service-level agreements is necessary to effectively perform the activities in this sub-process.

Service capacity management is the sub-process that focuses on the operation of the service. Unlike component capacity management, this process focuses solely on the service itself. It ensures that the end-to-end service provided meets agreed-upon service-level targets. For example, this process would monitor, control, and predict a ticketing system to ensure it was up and running efficiently.

Component capacity management focuses on the technology that provides the performance and capacity to the IT service. Components are things like hard disks, phones, and databases. This sub-process requires knowledge of how each component individually contributes to service performance. It manages, controls, and predicts performance usage and capacity of individual components rather than the service as a whole (as seen in service capacity management). The goal of this sub-process is to reduce the total amount of service downtime by monitoring current performance and predicting future performance. Component capacities are designed around service capacities and not the other way around.

Capacity management reporting is the final sub-process. It gathers and then provides other stages with the data related to service capacity, service usage, and service performance. The output of this sub-process is the service capacity report.
Capacity Management and Other ITIL Processes
Capacity management must interface with other processes within ITIL, including demand management, availability management, service-level management, and financial management. When the business has a service need, it comes from demand management. It's then relayed to the business continuity management team, which then translates it into an SLA and capacity terms. Service-level management helps with this. Once the service is deployed, service capacity management and component capacity management come in to keep everything at peak performance. Availability management works hand-in-hand with capacity management to keep services running and prevent downtime. Financial management comes into play when individual components must be estimated, purchased, maintained, and replaced. Not working closely with financial management can result in either untimely drops in uptime or organizational budget losses.


5. AVAILABILITY MANAGEMENT
Is one of five components in the ITIL Service Delivery area. It is responsible for ensuring application systems are up and available for use according to the conditions of the Service Level Agreements (SLAs).
The Availability Management team reviews business process availability requirements and ensures the most cost effective contingency plans are put in place and tested on a regular basis to ensure business needs are met. For example, Internet applications supporting online ordering systems may have 30-minute or less recovery requirements, so they may be provisioned with infrastructure components providing several levels of redundancy. Less critical, non-customer-facing applications used by a few users in small offices with a 5-day recovery period may be provisioned on less expensive infrastructure with limited redundancy capabilities.
Availability Management is also the lead in Component Failure Impact Analysis and Service Outage Analysis initiatives, determining cause, analyzing trends and taking any appropriate actions to ensure service availability meets SLAs.
Availability Management activities include:
·         Ensuring service availability meets SLAs
·         Determining the cause of availability failures
·         Reviewing business requirements for availability of business systems
·         Cataloging business requirements
·         Ensuring proper contingency plans are in place and tested
·         Establishing high-availability, redundant systems to support mission-critical applications
  Benefits to implementing Availability Management processes include:
·         Services are available for use during expected timeframes as specified in SLAs.
·         Services are provisioned on specific infrastructure depending upon their availability needs. This avoids unnecessary costs due to provisioning services with longer recovery times on more expensive high-availability platforms.
·         Potential service availability issues are identified and corrected before they negatively impact services.
Availability Management processes are tightly integrated with Service Level Management, Capacity Management, IT Service Continuity Management, and Incident Management.
TeamQuest Predictor allows you to run multiple scenarios to show business units the impact of various availability management decisions, helping to determine the optimal performance levels needed to meet business unit goals while ensuring that these metrics can be tracked and reported on an ongoing basis.
TeamQuest Analyzer allows you to monitor availability metrics of a large number of systems through color indicators. It also provides detailed diagnostic capabilities to quickly determine the probable cause of an outage, and more importantly, how to keep the problem from recurring. TeamQuest Analyzer also captures historical data for trend reporting, allowing IT to proactively predict potential issues and address them before they become problems.
TeamQuest Surveyor automatically publishes reports containing availability metrics taken from not only the TeamQuest CMIS, but other performance databases as well. You can customize availability reports for different audiences by organizing and annotating them, choosing appropriate charts and graphs, adding a corporate logo, and arranging it all with appropriate explanations and labeling.
TeamQuest tools support Availability Management by:
·         Gathering historical and real-time data on service performance
·         Providing the performance data required to make informed decisions regarding IT's ability to meet SLAs
·         Allowing you to experiment with multiple scenarios to determine resources needed to meet business unit goals
·         Determining the cause of outages
·         Preventing availability problems from recurring
·         Proactively identifying potential availability issues so they can be resolved before they impact users
·         Tracking and reporting availability metrics on an ongoing basis


6. SERVICE LEVEL MANAGEMENT


Is the process by which the quality of the IT services offered is defined, negotiated and supervised. Is responsible for finding a realistic compromise between the customers' needs and expectations and the costs of associated services, such that these are acceptable to both the customer and to the IT organisation.
Service Level Management must:
·         Document all the IT services offered.
·         Present the services in a way that is comprehensible to the customer.
·         Focus on the customer and the customer's business and not the technology.
·         Work closely with the customer to propose realistic IT services that match the customer's needs.
·         Establish the necessary agreements with customers and suppliers in order to offer the services required.
·         Define the key IT service performance indicators.
·         Monitor the quality of the agreed services with the overall goal of improving them at a cost acceptable to the customer.
·         Prepare reports on the quality of service and service improvement plans (SIP).
The main benefits of good Service Level Management are:
·         The IT services are designed with the real goal in mind: meeting the customer's needs.
·         Communication with customers is enhanced and misunderstanding about the characteristics and quality of the services offered are avoided.
·         Clear and measurable objectives are set.
·         The respective responsibilities of the customer and the service providers are clearly established.
·         Customers know and accept the quality levels offered and clear protocols of action are put in place which can be used to tackle any deterioration in service.
·         The constant monitoring of the service allows the weakest links in the chain to be identified so they can be improved.
·         IT management knows and understands the services offered, facilitating agreements with suppliers and subcontractors.
·         The Service Desk personnel has the necessary documentation (SLAsOLAs,etc.) to enable fluid dealings with customers and suppliers.
·         The SLAs help IT management to calculate costs and justify prices to customers.
In the long term this results in improved service and the resulting satisfaction of customers and users.


The main difficulties when implementing Service Level Management may be summarised as:
·         A lack of good communications with customers and users, which means the SLAsagreed do not meet their real needs.
·         The service level agreements are based more on the customer's wishes and expectations than on services that the IT infrastructure can offer with an adequate level of quality.
·         IT services are not properly aligned with the customer's business processes.
·         The SLAs are excessively long and technical, thus failing to fulfil their primary objective.
·         Insufficient resources are dedicated to service level management as the management views it an extra cost and not an integral part of the service offered.
·         Communication problems: not all the users know about the characteristics of the service and the levels of quality agreed.
·         Compliance with SLAs is not monitored adequately or consistently, making it difficult to improve the quality of service.
·         There is no genuine commitment in the organisation to the quality of the IT service offered.