SlideShare une entreprise Scribd logo
1  sur  23
Lec-3: ITIL
Mr. Islahuddin Jalal
MS (Cyber Security) – UKM Malaysia
Research Title – 3C-CSIRT Model for Afghanistan
BAKHTAR UNIVERSITY ‫باخترپوهنتون‬ ‫د‬
Outlines to be discussed…..
• ITSCM-DRM
• Information Security Management
• Change Management
• Service Transitions
ITSCM – DRM
• IT Service Continuity Management
• Ensures resumption of services within agreed
timescale
• Business Impact Analysis informs decisions about
resources
• E.g. Stock Exchange can’t afford 5 minutes downtime but 2
hours downtime probably wont badly affect a
departmental accounts office or a college bursary
Standby for liftoff...
• Cold
• Accommodation and environment ready but no IT
equipment
• Warm
• As cold plus backup IT equipment to receive data
• Hot
• Full duplexing, redundancy and failover
Information Security Management
• Confidentiality
• Making sure only those authorised can see data
• Integrity
• Making sure the data is accurate and not corrupted
• Availability
• Making sure data is supplied when it is requested
Change Management
• A change is a modification, addition, or removal of anything that
could impact IT services.
• This includes
• Addition
• Modification
• Removal of approved, supported or base lined H.W
• Network
• software
• application
• environment
• system
• desktop build or associated documentation
Reasons for Changes
Purpose of Change Management
• Control the lifecycle of all changes
• Help in making beneficial changes with minimum disruption to IT
services
Objectives of CM
• Respond to business and IT requests to ensure alignment of services
with business needs
• Ensure that changes are introduced in a controlled manner, thus
optimizing business risk
• Implement changes timely and successfully to meet business needs
• Use the standard processes and record every change
Scope of CM
• Any changes to all architecture , tools, metrics, processes and
documentation
• Addition, removal or modification of a service or a configuration item
or an associated documentation
• Changes to any of the five aspects of service design
• Build
• Deployment
• Testing
• User acceptance
• Bed-in (optimize)
Change Model
• A change model refers to pre-defined set of steps, policies and
procedures for assessing, authorizing and executing a specific type of
change. Change models should include the following:
• The steps to handle the change
• The chronological order of the steps
• Defined roles and responsibilities
• Thresholds and timescales for completion of the actions
• Escalation procedures
Change Management
 Respond to customers changing business
requirements
 Respond to business and IT requests for change that
will align the services with the business needs
 Roles
 Change Manager
 Change Authority
 Change Advisory Board (CAB)
 Emergency CAB (ECAB)
 80% of service interruption is caused by operator
error or poor change control (Gartner)
Change Types
• Normal
• Non-urgent, requires approval
• Standard
• Non-urgent, follows established path, no approval needed
• Emergency
• Requires approval but too urgent for normal procedure
Change Advisory Board
 Change Manager (VITAL)
 One or more of
 Customer/User
 User Manager
 Developer/Maintainer
 Expert/Consultant
 Contractor
CAB Considers 7R’s of Change Management
For proper impact assessment and understanding of benefits to risk,
answers to the following seven questions are important.
• Who raised the change?
• What is the reason for the change?
• What is the return required from the change?
• What are the risks involved in the change?
• What resources are required to deliver the change?
• Who is responsible for the build, test and implementation of the change?
• What is the relationship between this change and other changes?
Key Terminologies of CM
• Remediation planning: it refers to a recovery plan to a known state
after a failed change or release
• Service change: refers to the addition, modification or removal of an
authorized, planned or supported service component and its
associated documentation
• Request for change: it is a formal request for a service change and it
can be raised or issued by anyone involved in the service.
• Change proposal: it is raised for major changes with significant
organizational or financial effects
Change Proposal
Change management process-Change flow
Change Manager- Responsibilities
• Ensures process is followed and authorizes minor changes
• Identifies key stakeholders, coordinates and runs CAB Meeting
• Produces change schedule
• Coordinates change, build, test and implementation
• Reviews or closes changes
• Initiates post implementation review meetings.
Change Metrics
Service Transition
• Build
• Deployment
• Testing
• User acceptance
• Bed-in (optimize)
Good service transition
 Set customer expectations
 Enable release integration
 Reduce performance variation
 Document and reduce known errors
 Minimise risk
 Ensure proper use of services
 Some things excluded
 Swapping failed device
 Adding new user
 Installing standard software
Thank You
For Your Patience

Contenu connexe

Tendances

Sumedh-CURRICULAM VITAE
Sumedh-CURRICULAM VITAESumedh-CURRICULAM VITAE
Sumedh-CURRICULAM VITAE
Sumedh Thorat
 
ITIL v3 overview from Kent State University
ITIL v3 overview from Kent State UniversityITIL v3 overview from Kent State University
ITIL v3 overview from Kent State University
gulciny07
 
Fehmida Sayed - IT Head, Senior Manager-Infra and Infosec
Fehmida Sayed - IT Head, Senior Manager-Infra and InfosecFehmida Sayed - IT Head, Senior Manager-Infra and Infosec
Fehmida Sayed - IT Head, Senior Manager-Infra and Infosec
Fehmida Sayed
 
Presilient Worldwide IT Operations Center
Presilient Worldwide IT Operations CenterPresilient Worldwide IT Operations Center
Presilient Worldwide IT Operations Center
Krystanne
 
Ronald Lopez Resume
Ronald Lopez ResumeRonald Lopez Resume
Ronald Lopez Resume
Ronald Lopez
 
TSI Managed Network Services and IT Support
TSI Managed Network Services and IT SupportTSI Managed Network Services and IT Support
TSI Managed Network Services and IT Support
Jeffery Walker
 

Tendances (20)

Hi600 u07_inst_slides
Hi600  u07_inst_slidesHi600  u07_inst_slides
Hi600 u07_inst_slides
 
Sumedh-CURRICULAM VITAE
Sumedh-CURRICULAM VITAESumedh-CURRICULAM VITAE
Sumedh-CURRICULAM VITAE
 
Managed IT Solutions
Managed IT SolutionsManaged IT Solutions
Managed IT Solutions
 
ITIL v3 overview from Kent State University
ITIL v3 overview from Kent State UniversityITIL v3 overview from Kent State University
ITIL v3 overview from Kent State University
 
ITIL(v3): A Beginers Guide
ITIL(v3): A Beginers GuideITIL(v3): A Beginers Guide
ITIL(v3): A Beginers Guide
 
Itilv3
Itilv3Itilv3
Itilv3
 
Itilv3
Itilv3Itilv3
Itilv3
 
Service operations
Service operationsService operations
Service operations
 
Fehmida Sayed - IT Head, Senior Manager-Infra and Infosec
Fehmida Sayed - IT Head, Senior Manager-Infra and InfosecFehmida Sayed - IT Head, Senior Manager-Infra and Infosec
Fehmida Sayed - IT Head, Senior Manager-Infra and Infosec
 
Proactive IT-Management
Proactive IT-ManagementProactive IT-Management
Proactive IT-Management
 
ITIL® and 5 stages of Service Lifecycle
ITIL® and 5 stages of Service LifecycleITIL® and 5 stages of Service Lifecycle
ITIL® and 5 stages of Service Lifecycle
 
Break down the tech mentality of it vs user - Jeff Stokes
Break down the tech mentality of it vs user - Jeff StokesBreak down the tech mentality of it vs user - Jeff Stokes
Break down the tech mentality of it vs user - Jeff Stokes
 
CISA Training - Chapter 3 - 2016
CISA Training - Chapter 3 - 2016CISA Training - Chapter 3 - 2016
CISA Training - Chapter 3 - 2016
 
CISA Training - Chapter 4 - 2016
CISA Training - Chapter 4 - 2016CISA Training - Chapter 4 - 2016
CISA Training - Chapter 4 - 2016
 
6 service operation
6 service operation6 service operation
6 service operation
 
Presilient Worldwide IT Operations Center
Presilient Worldwide IT Operations CenterPresilient Worldwide IT Operations Center
Presilient Worldwide IT Operations Center
 
Noc and soc deck
Noc and soc deckNoc and soc deck
Noc and soc deck
 
Ronald Lopez Resume
Ronald Lopez ResumeRonald Lopez Resume
Ronald Lopez Resume
 
TSI Managed Network Services and IT Support
TSI Managed Network Services and IT SupportTSI Managed Network Services and IT Support
TSI Managed Network Services and IT Support
 
AMS Audit tool
AMS Audit toolAMS Audit tool
AMS Audit tool
 

Similaire à ITIL # Lecture 3

Kapil_Resume_Change Manager
Kapil_Resume_Change ManagerKapil_Resume_Change Manager
Kapil_Resume_Change Manager
Kapil Sharma
 
Assisit with devlopment.pptx
Assisit with devlopment.pptxAssisit with devlopment.pptx
Assisit with devlopment.pptx
TadeseBeyene
 
ITIL V3 by Jisu Dasgupta
ITIL V3 by Jisu DasguptaITIL V3 by Jisu Dasgupta
ITIL V3 by Jisu Dasgupta
Jisu Dasgupta
 
Requirement change management
Requirement change managementRequirement change management
Requirement change management
Abdul Basit
 
503-Cathy Kirch Releasing Release Management-Final
503-Cathy Kirch Releasing Release Management-Final503-Cathy Kirch Releasing Release Management-Final
503-Cathy Kirch Releasing Release Management-Final
Cathy Kirch
 
Requirement management traceability.ppt
Requirement management  traceability.pptRequirement management  traceability.ppt
Requirement management traceability.ppt
ubaidullah75790
 
Requirments management traceability.ppt
Requirments  management traceability.pptRequirments  management traceability.ppt
Requirments management traceability.ppt
ubaidullah75790
 
Change Management
Change ManagementChange Management
Change Management
ramikanso
 

Similaire à ITIL # Lecture 3 (20)

The five core processes: Service transition
The five core processes: Service transitionThe five core processes: Service transition
The five core processes: Service transition
 
Kapil_Resume_Change Manager
Kapil_Resume_Change ManagerKapil_Resume_Change Manager
Kapil_Resume_Change Manager
 
Requirements management
Requirements managementRequirements management
Requirements management
 
Introduction to itil v3/ITSM Processes and Functions
Introduction to itil v3/ITSM Processes and FunctionsIntroduction to itil v3/ITSM Processes and Functions
Introduction to itil v3/ITSM Processes and Functions
 
Change and Release Management_V1.pdf
Change and Release Management_V1.pdfChange and Release Management_V1.pdf
Change and Release Management_V1.pdf
 
ITIL Best Practice for Software Companies
ITIL Best Practice for Software CompaniesITIL Best Practice for Software Companies
ITIL Best Practice for Software Companies
 
ITIL - introduction to ITIL
ITIL - introduction to ITILITIL - introduction to ITIL
ITIL - introduction to ITIL
 
Itil v3 foundation study guide service transition
Itil v3 foundation study guide   service transitionItil v3 foundation study guide   service transition
Itil v3 foundation study guide service transition
 
5 service transition
5 service transition5 service transition
5 service transition
 
5 service transition
5 service transition5 service transition
5 service transition
 
Assisit with devlopment.pptx
Assisit with devlopment.pptxAssisit with devlopment.pptx
Assisit with devlopment.pptx
 
ITIL V3 by Jisu Dasgupta
ITIL V3 by Jisu DasguptaITIL V3 by Jisu Dasgupta
ITIL V3 by Jisu Dasgupta
 
Requirement change management
Requirement change managementRequirement change management
Requirement change management
 
503-Cathy Kirch Releasing Release Management-Final
503-Cathy Kirch Releasing Release Management-Final503-Cathy Kirch Releasing Release Management-Final
503-Cathy Kirch Releasing Release Management-Final
 
Requirement management traceability.ppt
Requirement management  traceability.pptRequirement management  traceability.ppt
Requirement management traceability.ppt
 
Requirments management traceability.ppt
Requirments  management traceability.pptRequirments  management traceability.ppt
Requirments management traceability.ppt
 
Optimize your Change Management Process
Optimize your Change Management ProcessOptimize your Change Management Process
Optimize your Change Management Process
 
Change Management
Change ManagementChange Management
Change Management
 
Delivering Professional IT Services: Change, an Underestimated Value
Delivering Professional IT Services: Change, an Underestimated ValueDelivering Professional IT Services: Change, an Underestimated Value
Delivering Professional IT Services: Change, an Underestimated Value
 
A Brief Introduction to ITIL - IT Infrastructure Library
A Brief Introduction to ITIL - IT Infrastructure LibraryA Brief Introduction to ITIL - IT Infrastructure Library
A Brief Introduction to ITIL - IT Infrastructure Library
 

Plus de Kabul Education University

Plus de Kabul Education University (20)

Cryptography and Network security # Lecture 8
Cryptography and Network security # Lecture 8Cryptography and Network security # Lecture 8
Cryptography and Network security # Lecture 8
 
ITIL # Lecture 9
ITIL # Lecture 9ITIL # Lecture 9
ITIL # Lecture 9
 
Cryptography and Network security # Lecture 7
Cryptography and Network security # Lecture 7Cryptography and Network security # Lecture 7
Cryptography and Network security # Lecture 7
 
Cryptography and Network security # Lecture 6
Cryptography and Network security # Lecture 6Cryptography and Network security # Lecture 6
Cryptography and Network security # Lecture 6
 
Cryptography and Network security # Lecture 5
Cryptography and Network security # Lecture 5Cryptography and Network security # Lecture 5
Cryptography and Network security # Lecture 5
 
Cyber Security # Lec 5
Cyber Security # Lec 5Cyber Security # Lec 5
Cyber Security # Lec 5
 
Cyber Security # Lec 4
Cyber Security # Lec 4 Cyber Security # Lec 4
Cyber Security # Lec 4
 
Cyber Security # Lec 3
Cyber Security # Lec 3 Cyber Security # Lec 3
Cyber Security # Lec 3
 
Cryptography and Network security # Lecture 4
Cryptography and Network security # Lecture 4Cryptography and Network security # Lecture 4
Cryptography and Network security # Lecture 4
 
Cyber Security # Lec 2
Cyber Security # Lec 2Cyber Security # Lec 2
Cyber Security # Lec 2
 
Cryptography and Network security # Lecture 3
Cryptography and Network security # Lecture 3Cryptography and Network security # Lecture 3
Cryptography and Network security # Lecture 3
 
Cryptography and Network Security # Lecture 2
Cryptography and Network Security # Lecture 2Cryptography and Network Security # Lecture 2
Cryptography and Network Security # Lecture 2
 
Network security # Lecture 2
Network security # Lecture 2Network security # Lecture 2
Network security # Lecture 2
 
Network security # Lecture 1
Network security # Lecture 1Network security # Lecture 1
Network security # Lecture 1
 
Cyber security # Lec 1
Cyber security # Lec 1Cyber security # Lec 1
Cyber security # Lec 1
 
Searching and seizing Computer according to Afghanistan law
Searching and seizing Computer according to Afghanistan lawSearching and seizing Computer according to Afghanistan law
Searching and seizing Computer according to Afghanistan law
 
Lect 6 computer forensics
Lect 6 computer forensicsLect 6 computer forensics
Lect 6 computer forensics
 
Csc342 lec 7 network security des
Csc342  lec 7 network security desCsc342  lec 7 network security des
Csc342 lec 7 network security des
 
Lect 5 computer forensics
Lect 5 computer forensicsLect 5 computer forensics
Lect 5 computer forensics
 
Network Security Goals
Network Security GoalsNetwork Security Goals
Network Security Goals
 

Dernier

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Dernier (20)

Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 

ITIL # Lecture 3

  • 1. Lec-3: ITIL Mr. Islahuddin Jalal MS (Cyber Security) – UKM Malaysia Research Title – 3C-CSIRT Model for Afghanistan BAKHTAR UNIVERSITY ‫باخترپوهنتون‬ ‫د‬
  • 2. Outlines to be discussed….. • ITSCM-DRM • Information Security Management • Change Management • Service Transitions
  • 3. ITSCM – DRM • IT Service Continuity Management • Ensures resumption of services within agreed timescale • Business Impact Analysis informs decisions about resources • E.g. Stock Exchange can’t afford 5 minutes downtime but 2 hours downtime probably wont badly affect a departmental accounts office or a college bursary
  • 4. Standby for liftoff... • Cold • Accommodation and environment ready but no IT equipment • Warm • As cold plus backup IT equipment to receive data • Hot • Full duplexing, redundancy and failover
  • 5. Information Security Management • Confidentiality • Making sure only those authorised can see data • Integrity • Making sure the data is accurate and not corrupted • Availability • Making sure data is supplied when it is requested
  • 6. Change Management • A change is a modification, addition, or removal of anything that could impact IT services. • This includes • Addition • Modification • Removal of approved, supported or base lined H.W • Network • software • application • environment • system • desktop build or associated documentation
  • 8. Purpose of Change Management • Control the lifecycle of all changes • Help in making beneficial changes with minimum disruption to IT services
  • 9. Objectives of CM • Respond to business and IT requests to ensure alignment of services with business needs • Ensure that changes are introduced in a controlled manner, thus optimizing business risk • Implement changes timely and successfully to meet business needs • Use the standard processes and record every change
  • 10. Scope of CM • Any changes to all architecture , tools, metrics, processes and documentation • Addition, removal or modification of a service or a configuration item or an associated documentation • Changes to any of the five aspects of service design • Build • Deployment • Testing • User acceptance • Bed-in (optimize)
  • 11. Change Model • A change model refers to pre-defined set of steps, policies and procedures for assessing, authorizing and executing a specific type of change. Change models should include the following: • The steps to handle the change • The chronological order of the steps • Defined roles and responsibilities • Thresholds and timescales for completion of the actions • Escalation procedures
  • 12. Change Management  Respond to customers changing business requirements  Respond to business and IT requests for change that will align the services with the business needs  Roles  Change Manager  Change Authority  Change Advisory Board (CAB)  Emergency CAB (ECAB)  80% of service interruption is caused by operator error or poor change control (Gartner)
  • 13. Change Types • Normal • Non-urgent, requires approval • Standard • Non-urgent, follows established path, no approval needed • Emergency • Requires approval but too urgent for normal procedure
  • 14. Change Advisory Board  Change Manager (VITAL)  One or more of  Customer/User  User Manager  Developer/Maintainer  Expert/Consultant  Contractor
  • 15. CAB Considers 7R’s of Change Management For proper impact assessment and understanding of benefits to risk, answers to the following seven questions are important. • Who raised the change? • What is the reason for the change? • What is the return required from the change? • What are the risks involved in the change? • What resources are required to deliver the change? • Who is responsible for the build, test and implementation of the change? • What is the relationship between this change and other changes?
  • 16. Key Terminologies of CM • Remediation planning: it refers to a recovery plan to a known state after a failed change or release • Service change: refers to the addition, modification or removal of an authorized, planned or supported service component and its associated documentation • Request for change: it is a formal request for a service change and it can be raised or issued by anyone involved in the service. • Change proposal: it is raised for major changes with significant organizational or financial effects
  • 19. Change Manager- Responsibilities • Ensures process is followed and authorizes minor changes • Identifies key stakeholders, coordinates and runs CAB Meeting • Produces change schedule • Coordinates change, build, test and implementation • Reviews or closes changes • Initiates post implementation review meetings.
  • 21. Service Transition • Build • Deployment • Testing • User acceptance • Bed-in (optimize)
  • 22. Good service transition  Set customer expectations  Enable release integration  Reduce performance variation  Document and reduce known errors  Minimise risk  Ensure proper use of services  Some things excluded  Swapping failed device  Adding new user  Installing standard software
  • 23. Thank You For Your Patience

Notes de l'éditeur

  1. Cis: Configuration Items
  2. Service transition is one of the component of ITIL service life cycle component