Lesson 6 - ITIL Management Practices
Lesson 6 - ITIL Management Practices
Lesson 6 - ITIL Management Practices
Based on AXELOS ITIL® material. Material is reproduced under licence from AXELOS. All rights reserved.
ITIL® is a registered trade mark of AXELOS Limited, used under permission of AXELOS Limited. All rights reserved.
IT Infrastructure Library® is a registered trade mark of AXELOS Limited used under permission of AXELOS Limited. All rights reserved.
AXELOS® is a registered trade mark of AXELOS Limited, used under permission of AXELOS Limited. All rights reserved.
The Swirl logo™ is a trade mark of AXELOS Limited, used under the permission of AXELOS Limited. All rights reserved.
ITIL Management Practices
Learning Objectives
Out of 34 practices, 15 practices are covered in this course. The practices with * are covered in detail.
Definitions of ITIL Terms
Term Definition
Known error A problem that has been analyzed but has not been resolved
Continual Improvement
Continual Improvement
Copyright © AXELOS Limited 2019. Used under permission of AXELOS Limited. All rights reserved, Page 37
Continual Improvement
The continual improvement model applies to the SVS in its entirety and to all of the
organization’s products, services, service components, and relationships.
Copyright © AXELOS Limited 2019. Used under permission of AXELOS Limited. All rights reserved, Page 66
Continual Improvement Practice
It aligns the organization’s practices and services with changing business needs through:
It is the development of improvement-related methods and techniques and the propagation of a continual
improvement culture across the organization, in alignment with the organization’s overall strategy.
Key activities:
• Encourage continual improvement across the
organization
• Secure time and budget for continual improvement
• Identify and log improvement opportunities
• Assess and prioritize improvement opportunities
• Make business cases for improvement action
• Plan and implement improvements
• Measure and evaluate improvement results
• Coordinate improvement activities across the
organization
Continual Improvement Practice
The practice is integral to the development and maintenance of every other practice as well as to
the complete lifecycle of all services and the SVS itself.
Figure 5.2 Heat map of the contribution of continual improvement to value chain activities
Copyright © AXELOS Limited 2019. Used under permission of AXELOS Limited. All rights reserved, Page 82
Information Security Management
Information Security Management
The purpose of the information security management practice is to protect the information needed
by the organization to conduct its business.
This includes understanding and managing risks to the confidentiality, integrity, and availability of information.
Information Security Management
The required security is established by means of policies, processes, behaviors, risk management, and
controls, which must maintain a balance between:
The figure shows the contribution of information security management to the service value chain, with
the practice being involved in all value chain activities.
Figure 5.3 Heat map of the contribution of information security management to value chain activities
Copyright © AXELOS Limited 2019. Used under permission of AXELOS Limited. All rights reserved, Page 84
Relationship Management
Relationship Management
The purpose of the relationship management practice is to establish and nurture the links between the
organization and its stakeholders at strategic and tactical levels.
Relationship Management
The figure shows the contribution of relationship management to the service value chain, with the
practice being involved in all value chain activities.
Figure 5.9 Heat map of the contribution of relationship management to value chain activities
Copyright © AXELOS Limited 2019. Used under permission of AXELOS Limited. All rights reserved, Page 97
Supplier Management
Supplier Management
The purpose of the supplier management practice is to ensure that the organization’s suppliers and their
performances are managed appropriately to support the seamless provision of quality products and services.
Supplier Management
The supplier strategy defines the organization’s plan for how it will leverage the contribution of
suppliers in the achievement of its overall service management strategy.
Different types of supplier relationships between an organization and its suppliers that need to be
considered as part of the organization’s sourcing strategy include:
Insourcing Outsourcing
Performance management
Supplier and contract negotiation
The purpose is to maximize the number of successful IT changes by ensuring that risks have been
properly assessed, authorizing changes to proceed, and managing the change schedule.
All changes should be assessed by people who are able to understand the risks and
the expected benefits.
Three Types of Change
These are low-risk, pre- These are changes that These are changes that
authorized changes that need to be scheduled, must be implemented as
are well understood and assessed, and authorized soon as possible; for
fully documented, and can in order to follow a example, to resolve an
be implemented without standard process. incident or implement a
any additional security patch.
authorization.
Contribution of Change Enablement
The contribution of change enablement to the service value chain, with the practice
being involved in all value chain activities is shown in the image.
Figure 5.19 Heat map of the contribution of change enablement to value chain activities
Copyright © AXELOS Limited 2019. Used under permission of AXELOS Limited. All rights reserved, Page 120
Incident Management
Incident Management
The purpose is to minimize the negative impact of incidents by restoring normal service operation
as quickly as possible.
The contribution of incident management to the service value chain, with the practice being applied mainly
to the engage, and deliver and support value chain activities is shown in the image.
Figure 5.20 Heat map of the contribution of incident management to value chain activities
Copyright © AXELOS Limited 2019. Used under permission of AXELOS Limited. All rights reserved, Page 123
IT Asset Management
IT Asset Management
The purpose of IT asset management practice is to plan and manage the complete lifecycle of all IT
assets to help the organization to:
● Maximize value
● Control costs
● Manage risks
● Support decision-making about purchase, re-
use, retirement, and disposal of assets
● Meet regulatory and contractual requirements
IT Asset Management
The scope of IT asset management includes all software, hardware, networking, cloud services, and
client devices. In some cases, it may also include non-IT assets such as buildings or information.
IT Asset Management
Asset management is a well-established practice that includes the acquisition, operation, care, and
disposal of organizational assets, particularly critical infrastructure.
The activities and requirements of IT asset management will vary for different types of assets:
Software assets must be protected from unlawful copying, which could result in unlicensed use.
Cloud-based assets must be assigned to specific products or groups so that the costs can be
managed.
Client assets must be assigned to individuals who take responsibility for their care.
IT Asset Management
IT asset management maintains information about the assets, their costs, and related contracts.
IT asset management typically includes the following activities:
Define, populate, and maintain the asset register in terms of structure and content, and the storage
facilities for assets and related media.
Control the asset lifecycle in collaboration with other practices and record all changes made to assets.
Provide current and historical data, reports, and support to other practices about IT assets.
Audit assets, related media, and conformity and drive corrective and preventive improvements to deal
with the detected issues.
IT Asset Management
The contribution of IT asset management to the service value chain, with the practice being applied
mainly to the design and transition, and obtain or build value chain activities.
Figure 5.21 Heat map of the contribution of IT asset management to value chain activities
Copyright © AXELOS Limited 2019. Used under permission of AXELOS Limited. All rights reserved, Page 127
Monitoring and Event Management
Monitoring and Event Management
The purpose is to systematically observe services and service components, and record and report
the selected changes of state, identified as events.
Monitoring and Event Management
The processes and procedures needed in the monitoring and event management practice must address the
key activities:
The figure shows the contribution of monitoring and event management to the service
value chain, with the practice being involved in all value chain activities except plan.
Figure 5.22 Heat map of the contribution of IT asset management to value chain activities
Copyright © AXELOS Limited 2019. Used under permission of AXELOS Limited. All rights reserved, Page 130
Problem Management
Problem Management
Problem management reduces the likelihood and impact of incidents by identifying the actual and
potential causes of incidents, and manages workarounds and known errors.
Problem:
It is a cause, or potential cause, of one or
more incidents.
Known error:
It is a problem that has been analyzed
but has not been resolved
Problem Management
Copyright © AXELOS Limited 2019. Used under permission of AXELOS Limited. All rights reserved, Page 131
Problem Management
When a problem cannot be resolved quickly, it is often useful to find and document a
workaround for future incidents.
This can be done at any stage and it doesn’t need to wait for the analysis to be complete.
Problem Management
The contribution of problem management to the service value chain, with the practice being applied
mainly to the improve, and deliver and support value chain activities.
Figure 5.24 Heat map of the contribution of problem management to value chain activities
Copyright © AXELOS Limited 2019. Used under permission of AXELOS Limited. All rights reserved, Page 133
Release Management
Release Management
The purpose is to make new and changed services and features available for use.
The figure shows how release management is handled in a traditional or waterfall environment. In these
environments, release management, and deployment may be combined and executed as a single process.
The contribution of release management to the service value chain, with the practice being
involved in all value chain activities
Figure 5.27 Heat map of the contribution of release management to value chain activities
Copyright © AXELOS Limited 2019. Used under permission of AXELOS Limited. All rights reserved, Page 136
Service Configuration Management
Service Configuration Management
The purpose is to ensure that accurate and reliable information about the configuration of services, and
the CIs that support them, is available when and where it is needed.
Service Configuration Management
The figure is a simplified diagram showing how multiple CIs contribute to an IT service.
The figure shows the contribution of configuration management to the service value chain, with
the practice being involved in all value chain activities
Figure 5.30 Heat map of the contribution of service configuration management to value chain activities
Copyright © AXELOS Limited 2019. Used under permission of AXELOS Limited. All rights reserved, Page 142
Service Desk
Service Desk
The purpose is to capture demand for incident resolution and service requests. It should also be
the entry point and single point of contact for the service provider with all its users.
Service desks provide a clear path for users to report issues, queries, and requests; and have
them acknowledged, classified, owned, and actioned.
Service Desk
Chat Email
Service portals and
Phone calls
mobile applications
The contribution of service desk to the service value chain, with the practice being
involved in all value chain activities.
Figure 5.33 Heat map of the contribution of service desk to value chain activities
Copyright © AXELOS Limited 2019. Used under permission of AXELOS Limited. All rights reserved, Page 151
Service Level Management
Service Level Management
The purpose is to set clear business-based targets for service levels, and to ensure the delivery of
services is properly assessed, monitored, and managed against these targets.
Service Level Management
Service level management provides the end-to-end visibility of the organization’s services.
Service level agreement is a documented agreement between a service provider and a customer that
identifies both services required and the expected level of service.
Service level management requires focus and effort to engage and listen to the requirements,
issues, concerns, and daily needs of customers:
Engagement Listening
Service level management involves collating and analyzing information from a number of
sources, including:
The contribution of service level management to the service value chain, with the
practice being involved in all value chain activities.
Figure 5.34 Heat map of the contribution of service level management to value chain activities
Copyright © AXELOS Limited 2019. Used under permission of AXELOS Limited. All rights reserved, Page 155
Service Request Management
Service Request Management
The purpose is to support the agreed quality of a service by handling all predefined, user-initiated
service requests in an effective and user-friendly manner
The contribution of service request management to the service value chain, with the practice being
involved in all service value chain activities except the plan activity.
Figure 5.35 Heat map of the contribution of service request management to value chain activities
Copyright © AXELOS Limited 2019. Used under permission of AXELOS Limited. All rights reserved, Page 157
Deployment Management
Deployment Management
The purpose is to move new or changed hardware, software, documentation, processes, or any other
component to live environments.
Deployment Management
There are a number of distinct approaches that can be used for deployment.
Many organizations use a combination of these approaches, depending on their specific services and
requirements as well as the release sizes, types, and impact.
Phased
deployment
Continuous
Pul deployment
delivery
Big bang
deployment
Deployment Management
Figure 5.37 Heat map of the contribution of deployment management to value chain activities
Copyright © AXELOS Limited 2019. Used under permission of AXELOS Limited. All rights reserved, Page 161
Key Takeaways
a. Supplier Management
b. Incident Management
a. Supplier Management
b. Incident Management
Information security management practice protects the information needed by the organization to conduct its
business.
Knowledge
Check
Which of the following is true about emergency changes?
2
a. Are pre-authorized
a. Are pre-authorized
a. Change of state that has significance for the management of a configuration item (CI) or IT
service
a. Change of state that has significance for the management of a configuration item (CI) or IT
service
An event is any change of state that has significance for the management of a configuration item (CI) or IT service.