ITIL Foundation: STRICTLY For Internal Use

Download as ppt, pdf, or txt
Download as ppt, pdf, or txt
You are on page 1of 133

ITIL Foundation Overview

HP Global Delivery - AS Satish Matukumalli

STRICTLY for Internal use


2004 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice

Objectives

Understanding ITIL & HP reference models

Understanding relevance of Service Management to your organization & customers


Gain implementation knowledge

ITIL Foundation Certification

March 15, 2012

Background
IT plays a critical role in satisfying business requirements. In the current organization paradigm, IT provides essential services for the organization to support its business. Beyond the need to manage IT technology is the need to establish and employ best practices processes to optimize IT services.

ITIL (IT Infrastructure Library) is the most widely accepted approach to IT Service Management in the world. ITIL provides a cohesive set of best practice, drawn from the public and private sectors internationally.
March 15, 2012

ITSM is a set of process that detail best practices based on ITIL standards to enable and optimize IT services in order to satisfy business requirements and manage the IT infrastructure both tactically and strategically.
3

What is ITIL?

Information Technology Infrastructure Library Owned by Office of Government Commerce - OGC Created to improve IT Service Management at UK central Govt. Proven in practice Supported by tools World wide de facto standard for IT Service Management Comprehensive and consistent set of best practices from users Appreciates the business requirements and bridge between IT and business

March 15, 2012

Why Implement Service Management?


Align IT with business and to meet customer demands in a better way. Improve the quality of IT services Reduce the long-term cost of service provision Focus on benefits to the customer/business Decision making metrics Clear points of contact Focus on continuous improvement Avoid reinventing the wheel Long term survival!
March 15, 2012 5

ISO 20000

Is a Quality Standard for IT Service Management


Defines the requirements for an organization to deliver Managed Services of acceptable quality to its customers. Is based on industry Best Practices for managing complex IT environment.

March 15, 2012

The ITIL Model


Service Support
Problem Management Incident Management

IT Customer Relationship Management

Release Management Change Management Configuration Management

Service Level Management Financial Management for IT Services

Capacity Management IT Service Continuity Management Availability Management Service Desk

Service Delivery
Security Management

March 15, 2012

ITSM Reference Model

Service planning Security management IT strategy and architecture planning Customer management IT business assessment Service-level management Change management Problem management Incident and service request management Operations management Configuration management Service build and test Release to production Continuity management Availability management Capacity management Financial management

March 15, 2012

CORE Processes
S e r v i c e S u p p o r t
Availability Management

IT Service Continuity Management Capacity Management IT Financial Management Service Level Management

S e r v i c e D e li v e r y

Configuration Management Release Management Change Management Problem Management Incident Management

March 15, 2012

10

Service Desk
Its

a function, not a process for all user requests, queries, complaints

SPOC

Facilitate Deliver

the restoration of normal operational service


an interface to other processes of framework

quality services to achieve business goals

Provides

Drive

and improve services of customers / users

March 15, 2012

11

Responsibilities

First point of contact and Liaison with customers Receiving, Recording, Prioritizing service calls Monitoring and status tracking of all registered calls Escalation and referral to other parts of the organizations Reporting about calls on quality of the desk Regularly inform customers about service call progress Coordinating next-line (s) support groups Closing incidents with the confirmation from the customer Manage incident life-cycle Service call related reporting to management Verify the solutions provided by other groups on customer behalf
March 15, 2012 12

Different Desks
Call Center
Handling large volumes of calls and referring them to other groups within service provider organization

Service desk

Help desk
Mainly resolving incidents, as quickly as possible

Not only resolving incidents like help desk, but also provides necessary details to other IT Service Management processes

March 15, 2012

13

Different Structures
Local Service Desk
Language Culture Infrastructure cost silo Mgmt reporting

Central Service Desk


Operational costs Mgmt reporting

Language & culture Physical presence

Virtual Service Desk


Operational costs Transparent to users
March 15, 2012

Incident ownership Physical presence


14

Local Service Desk


Users from same location

User 1

User 2

User 3

User N

LSD

Second-line support
March 15, 2012

Third-party support
15

Central Service Desk


Users from different location

Location1 User

Location2 User

Location3 User

Location N User

CSD

Second-line support
March 15, 2012

Third-party support
16

Virtual Service Desk


Location1 User Location2 User Location3 User Location N User

VSD
Regional Service Desk Regional Service Desk

Regional Service Desk

Regional Service Desk

March 15, 2012

Second-line support

Third-party support
17

Staff skill-set

Interpersonal Skills Sound business knowledge Customer focused Articulate and methodical Commitment and ownership Understanding customer culture (where necessary) Understanding customer issues from their perspective Empathy

March 15, 2012

18

March 15, 2012

19

What is the primary responsibility of the Service desk?

a) First point of contact for the customers b) Restore services ASAP c) Escalate unresolved incidents to next level d) Communicate to the customers on the status of the incidents

March 15, 2012

20

Which of the following is a department and NOT a process?

a) Incident Management b) Application Management c) Service Desk d) Problem Management

March 15, 2012

21

Which of the following is NOT the responsibility of the Service desk?

a) Regular updates to customers b) Management reporting

c) Investigate into underlying cause of incidents


d) Raising RFCs

March 15, 2012

22

Service Support

March 15, 2012

23

Incident Management

any event which is not part of the standard operation of a service and which causes, or may cause, an interruption to, or a reduction in, the quality of that service.
March 15, 2012 24

Goals
Restore service to normal ASAP while minimizing impact on business

Ensuring best possible levels of service quality

March 15, 2012

25

Life Cycle / Responsibilities


Simulate the incident

Customer / user Incident Detection and Recording


Update user regularly on the status of incidents

Confirm, it exists Note down the Incident details

Confirm with user Close the incident

Categorize based on predefined categories Check KB for known solution Provide work around

Incident closure

Identify the solution Test and verify Communicate to user

Ownership, monitoring, tracking and communication

Classification and initial support

Resolution and recovery


March 15, 2012

Investigation and diagnosis

Check the application Investigate / identify the issue


26

Some Important concepts


Incident handling
Service Desk is the owner of all the incidents Mostly reactive process Incidents may be assigned to specialist groups that cant be resolved immediately If a third-party organization is involved in incident resolution, incident record updates should be monitored closely

Support Lines
Service Desk is referred to as First-line support Specialist support groups other than service desk are referred to as Second / third- line support Third or n-line support often includes external suppliers

Escalation is a mechanism calling for attention for timely resolutions Transferring incidents from one line of support to another is Functional escalation When the incident resolution may likely breach the SLA or resolution is not satisfactory, Hierarchical escalation takes place.

Escalation s

March 15, 2012

27

The Journey from Incident to RFC


Incidents
Recurring incidents / single incident causing significant damage to business

Infrastructure /applications

Problem s
Solution into production / Live Identify underlying cause and discover workaround

RFC
March 15, 2012

Known Errors
28

Service desk role


All incident reporting to Service desk All incident registration by service desk 85% (approx) incidents resolved by service desk Monitoring incident progress and resolution

March 15, 2012

29

Metrics

Number of incidents received and resolved Number of incidents resolved within SLA Number of open incidents

Number of backlog incidents


Number of incidents escalated to other teams Number of proactive resolutions

Resolution time Vs Effort


Cost of solution

March 15, 2012

30

March 15, 2012

31

What is the goal of Incident management?

a) Restore services with minimal downtime to business b) Restore normal service operations ASAP c) Restore normal service operations within SLA d) Restore services immediately following disruption

March 15, 2012

32

What is the first step to be followed by Incident Management when an Incident occurs?

a) Report incident b) Record incident

c) Restore service
d) Close incident

March 15, 2012

33

Which of the following can be used to measure effectiveness of Incident Management?

a) Incidents Closed b) Incidents resolved within SLA

c) Open incidents
d) Incident Volume

March 15, 2012

34

INCIDENT Management
Fire fighting

PROBLEM Management Fire prevention

March 15, 2012

35

Problem Management

March 15, 2012

36

Goals
To prevent recurrence of incidents related to errors To minimize the adverse impact of incidents and problems on the business that are caused by errors within the IT infrastructure Improve productive use of resources

March 15, 2012

37

Responsibilities

Problem Control

Error Control

Help incident management on major incidents

Proactive problem management

Major problem reviews

Management information

March 15, 2012

38

Terminology
Problem The unknown root cause of one or more incidents
Error A problem for which the root cause is known Known Error A problem for which both root cause and a solution exists.
March 15, 2012 39

Problem Control
Determine the problem Create problem record Categorize problems Assign right resources to work Investigate & diagnose Arrive at error

To Error Control

March 15, 2012

40

Error Control
Determine the Error
Record error KEDB

Categorize errors
Assign right resources to work Investigate & diagnose

Close known error

Raise RFC

Arrive at known error

March 15, 2012

41

Proactive problem management

Trend Analysis

Target preventive action

Identify and fix the problems before the incidents occur

March 15, 2012

42

Major problem reviews

How to prevent problems from happening again

How to prevent that happening next time


What was done correctly

What was done incorrectly

Expected to carry out after major problems are completed

March 15, 2012

43

Metrics

Number of incidents resulted in problem records Number of proactive resolutions Number of RFC raised

Number of RFC rejected by CAB


Number of RFC successfully implemented Number of KEDB updates

March 15, 2012

44

March 15, 2012

45

State whether the following is TRUE or FALSE? All Known Errors need to be closed FALSE

March 15, 2012

46

Which of the following process is responsible for raising an RFC?

a) Problem Management b) Problem Control c) Error Control

March 15, 2012

47

Targeting preventive action is part of

a) Proactive problem Management b) Problem Control c) Error Control

March 15, 2012

48

Configuration Management

any event which is not part of the standard operation of a service and which causes, or may cause, an interruption to, or a reduction in, the quality of that service.
March 15, 2012 49

Goals
Account for all the IT assets and their configuration details Provide configuration details to other service management processes Provide strong foundation for incident, problem, change and release management processes Cross check configuration details against assets and correct if found different

March 15, 2012

50

Responsibilities
Planning

Audit and verification

Configuration Management

Identificatio n

Status accounting
March 15, 2012

Control

51

Configuration management database


CMDB

Similar to a database Contains CI s and their links Can be searched for CI details Has links to other process databases Cover legal aspects related to licenses

March 15, 2012

52

CONFIGURATION ITEM (CI)


Should be identified uniquely

Subject to change
Required to deliver services attributes category Name nested

Attributes

CI

relationships

Category Location Service Details

status Unique Appropriate Suit the services provided


March 15, 2012 53

Naming

CI life cycle
Plan Order Procure Build Test Production
Maintain
Archive

March 15, 2012

54

Configuration Baseline

Configuration of a system established at specific point in time Serves as reference for other activities Also a snapshot, remains fixed

Used to compare with current position

March 15, 2012

55

Metrics

Number of CIs by Category

Number of CIs by lifecycle stages


Number of CIs by priority (Normal, Urgent, Major, Minor)

Numner of CIs by scope (Local, Test, Individual, Application, Infrastructure, etc.)


Number of CIs by reason for Change (Upgrade, Requirements, Technology, Usability, etc.) Number of CIs by CC/DU/BU/Region/Country Number of CIs by service
March 15, 2012 56

March 15, 2012

57

Which of the following is NOT a CI?

a) SLA Document b) CEO Laptop c) DB Server d) Username

March 15, 2012

58

Who is responsible for updates to the CMDB?

a) Change Manager b) Configuration Manager c) Release Manager d) Service Level Manager

March 15, 2012

59

Process of moving from one defined state and another

Change Management

March 15, 2012

60

Goals
To ensure standard methods are used to handle changes promptly and efficiently To ensure changes are build effectively with tolerable amount of risk To minimize the impact of change related incidents on service quality

March 15, 2012

61

Activities
Change logging and filtering Allocation of priorities Change categorization Change scheduling Change approval Post Implementation review Change authorization

Impact analysis Change build Change Testing Change Implementation


March 15, 2012

Back-out

62

Change Advisory Board (CAB)

A board to approve changes and assist change management in the assessment and prioritization of changes.

Will be composed according to the changes being considered.


CAB/EC (Emergency committee) is convened when emergency decisions are required to make. Change procedures should specify the composition of CAB and CAB/EC.

March 15, 2012

63

Terminology
Forward Schedule of Changes

FSC contains details of all the changes approved for implementation and their proposed implementation dates
Projected Service Availability

PSA contains details of Changes to agreed SLAs and service availability because of the currently planned FSC
Standard Change

SC is a change where the necessary approvals are obtained in advance


March 15, 2012 64

Changes - Priorities

Immediate: Causing loss of service or severe usability problems to a larger number of Users, a mission-critical system, or some equally serious problem. Immediate action required. Urgent CAB or CAB/EC meetings may need to be convened. Resources may need to be allocated immediately to build such authorized Changes. High: Severely affecting some Users, or impacting upon a large number of Users. To be given highest priority for Change building, testing and implementation resources. Medium: No severe impact, but rectification cannot be deferred until the next scheduled Release or upgrade. To be allocated medium priority for resources. Low: A Change is justified and necessary, but can wait until the next scheduled Release or upgrade. To be allocated resources accordingly.
March 15, 2012 65

Metrics

Number of RFC by status


Logged CAB pending Approved Build Test Authorize Implementation

Number of RFC by category Number of RFC backed out CAB Effort per RFC Effort per RFC from logged to implementation
March 15, 2012 66

March 15, 2012

67

Which of the following aspect is NOT covered when Testing a Change?

a) Performance b) Reliability c) Security d) Usability

March 15, 2012

68

Which of the following is NOT a KPI of Change management?

a) Number of changes implemented b) Reduction of incidents traced back to changes c) Reduced number of changes backed-out d) Low number of urgent changes

March 15, 2012

69

collection of authorized Changes to an IT service

Release Management

March 15, 2012

70

Goals
Plan and oversee rollout of SW & HW

Design & implement distribution & installation procedures

Ensure SW & HW changes are traceable

Work closely with Configuration Management & Change Management during implementations

March 15, 2012

71

Activities
Release Policy & Planning
Design, build & configuration

Distribution & Installation

Release Management

Release acceptance

Communication & training

Rollout planning

March 15, 2012

72

Types of release
FULL DELTA includes only those CIs that have actually changed or are new since the last full or delta Release

all CIs are built, tested, distributed and implemented.

PACKAGE
To provide longer periods of stability for the live environment by reducing the frequency of Releases, individual Releases (full units, delta Releases or both) are grouped together
March 15, 2012 73

Definitive Software Library


A secure compound in which the definitive authorized versions of all software CIs are stored and protected

include definitive copies of purchased software (along with licence documents or information), as well as software developed on site

DSL

one or more software libraries or file-storage areas

contains the master copies of all controlled software in an organisation


March 15, 2012 74

Definitive Hardware Store


An area set aside for the secure storage of definitive hardware spares

One or more physical areas

DHS

spare components and assemblies that are maintained at the same level as the comparative systems within the live environment.

These can then be used when needed for additional systems / recovery from major Incidents
March 15, 2012 75

Back-out Plan

Actions to be taken in case of release failure to restore the services, are documented.

Change management is responsible for producing back-out plan for each change.
Release management ensure a release back-out plan is created for all the changes in the release.

Should be tested as part of the process of verifying the rollout process (during release acceptance)

March 15, 2012

76

Metrics

No of releases
Major Minor Hot fixes patches

No of new problems attributed to new release (s) Schedule variance

Effort variance

March 15, 2012

77

March 15, 2012

78

Which of the following aspect is NOT covered when Testing a Change?

a) Performance b) Reliability c) Security d) Usability

March 15, 2012

79

Service Delivery

March 15, 2012

80

Service Level Management

March 15, 2012

81

Goals
Maintain and improve IT Service quality.

Take necessary actions on SLA breaches

Eradicate poor service in-line with business or cost justification

March 15, 2012

82

Responsibilities
Produce and maintain service catalogue

Manage Customer relationshi p

Responsible for establishing, reviewing and revising Contracts SLA, OLA & UC

SLM

Service Improvement Programs


March 15, 2012

Monitor, report and review service levels

Service Quality Plan


83

Multi-level SLAs
Corporate Level covering all the generic SLM issues appropriate to every Customer throughout the organization. Customer Level covering all SLM issues relevant to the particular Customer group, regardless of the service being used. Service Level covering all SLM issues relevant to the specific service, in relation to this specific Customer group (one for each service covered by the SLA).
March 15, 2012 84

Contracts
Between service provider organization Support teams and internal departments Between Customer and service provider organization

Service provider Organization


Between service provider organization and 3rd party suppliers
March 15, 2012 85

SLA Elements
Introduction Service hours Support terms Service levels reporting and reviewing Change procedures Escalation mechanisms IT Service Continuity and security Charging Incentives and penalties Availability Reliability Throughput Transaction response times Batch turnaround times
March 15, 2012 86

Service Improvement Programme

Targeted to bring improvements in the services being provided Driven generally through service reviews Undertaken as a formal project Process
Identify the underlying difficulty Trace the underlying cause in conjunction with problem management and availability management Develop an action plan for improvements and execute Verify the results with the targets and revise the plans

Focus on other areas too like service delivery, automations, technology betterments etc., Generally done through Plan-Do-Check-Act cycle
March 15, 2012 87

Metrics

Number of Service targets missed (SLA breaches) Number of SIP


Initiated WIP Completed

Number of service outages and their duration Number of users affected by service outage Customer satisfaction index

March 15, 2012

88

March 15, 2012

89

Which of the following is an iterative process?

a) SLA b) SLR c) OLA d) SLM

March 15, 2012

90

Which of the following is NOT part of Service Level Management process?

a) SLR b) OLA c) SLM

March 15, 2012

91

IT Financial Management

March 15, 2012

92

Goals
To provide cost-effective stewardship of the IT assets and resources used in providing IT Services. To be able to account fully for the spend on IT Services and to attribute these costs to the services delivered to the organization's customers. To assist management decisions on IT investment by providing detailed business cases for Changes to IT Services.

March 15, 2012

93

Concepts
Budgeting

Predicting and controlling the spending of money within the organization and consists of a periodic negotiation cycle to set budgets and the day-today monitoring of the current budgets

Accounting Set of processes that enable the IT organization to account fully for the way its money is spent

Charging

Set of processes required to bill customers for the services supplied to them
March 15, 2012 94

IT Finance Cycle
Business IT requirements IT operational plan (Inc budgets) Cost analysis (Accounting) Charges

$ $
Financial targets Costing models

Charging policies

Feedback of proposed charges to business


March 15, 2012 95

Budgeting
Process of ensuring the correct monies are available for the provision of IT services. Monitor and control performance against predefined targets

Minimize the risk of overspending

Ensure the actual spends can be compared against predicted

March 15, 2012

96

IT Accounting
Provides cost details of providing services to meet business requirements Includes budgeting guidelines charging policies investment guidelines

Track actual costs against budgets

Provides details to justify the IT investments and expenditure

March 15, 2012

97

Cost Types/ elements


Software Operating systems Scheduling tools Applications Databases Effort tracking tools Monitoring tools Analysis packages External Service Security services Disaster recovery options Outsourcing services HR overhead
March 15, 2012

Hardware Servers Disk Storage Peripherals WAN PCs Workstations Laptops

People Payroll costs Perquisites Relocation costs Overtime Consultancy

Accommodation
Office space Storage Secure areas Utilities

Transfer Internal charges from other cost centers within the organization
98

Classification of Cost Elements


Fixed irrespective of resource usage
Corporate software license Server maintenance contract

vary with some factor, such as usage or time


Out-of-hours coverage Equipment re-location

Invested in purchasing fixed assets


Computer equipment Software Buildings

Fixed Variable Direct Indirect Capital Operational

Directly attributed to a single Customer or group of Customers


Excessive usage of server by a single customer

Day-to-day costs of running IT services


Staff cost Software license fee Electricity, water, gas Consumables
March 15, 2012

Apportioned across multiple customers


Cost of operations staff

99

Charging
make formal evaluations of IT Services and plan for investment based on cost recovery and business benefits

balance the quantity of IT Services with the needs and resources of the customers.

Has to be simple, fair and realistic

Influences customer behavior

March 15, 2012

100

Charging options
No Charging This form is used for communicating the cost involved in delivering the service Real Charging This form is used to raise an invoice which customer has to pay Notional Charging This form is used as an opportunity to get more experience and tune the invoices being generated

March 15, 2012

101

Pricing methods
Deciding factors
Demand for the service in the market Choice of the service availability outside Legal, regulatory and tax issues

Accurate determination of direct & indirect costs Cost Cost-plus Going rate Market price Fixed price
March 15, 2012 102

Exercise 8
Q1 Explain the benefit of Notional charging Q2 What do you mean by differential charging?

Q3 Give a couple of examples for all Cost elements

March 15, 2012

103

Capacity Management

March 15, 2012

104

Goal

To ensure that cost justifiable IT Capacity always exists and that it is matched to the current and future identified needs of the business

March 15, 2012

105

Sub processes
responsible for ensuring that the future business requirements for IT Services are considered, planned and implemented in a timely fashion.

Business Capacity

Service Capacity
responsible for ensuring that the performance of all services, as detailed in the targets in the SLAs and SLRs, is monitored and measured

responsible for ensuring that all components within the IT Infrastructure that have finite resource are monitored and measured
106

Resource Capacity

March 15, 2012

Proactive tasks

pre-empt performance Problems by taking the necessary actions before the Problems occur produce trends of the current resource utilization and estimate the future resource requirement model the predicted Changes in IT Services, and identify the Changes that need to be made to the component parts of the IT Infrastructure to ensure that appropriate resource is available to support these services ensure that upgrades are budgeted, planned and implemented before SLAs are breached or performance Problems occur. actively seek to improve the service provision.
March 15, 2012 107

Capacity Data Base

Corner stone of a successful capacity management

Used by all sub-processes of capacity management


holds a number of different types of data business, service, technical, financial and utilization data

Unlikely to be a single database and probably exists in several physical locations

March 15, 2012

108

Activities

Monitoring

Analysis
Tuning Implementation

Demand Management
Modeling Application Sizing Produce Capacity Plan

March 15, 2012

109

Tuning

The analysis of the monitored data may identify areas of the configuration that could be tuned to better utilize the system resource or improve the performance of the particular service. Techniques
Balancing workloads Balancing disk-traffic Efficient use of memory

March 15, 2012

110

Application Sizing

Objective is to estimate the resource requirements to support a proposed application Change or new application, to ensure that it meets its required service levels. The sizing of the application should be refined as the development process progresses. The resources to be utilized by the application are likely to be shared with other services and potential threats to existing SLA targets must be recognized and managed.

March 15, 2012

111

Demand Management

Objective is to influence the demand for computing resource and the use of that resource. Influences the customer behavior Short-term Demand Management may occur when there has been a partial failure of a critical resource in the IT Infrastructure. Long-term Demand Management may be required when it is difficult to cost-justify an expensive upgrade.

March 15, 2012

112

Modeling

Objective is to predict the behavior of IT Services under a given volume and variety of work.
Trend Analysis Analytical modeling Simulation Baseline models

March 15, 2012

113

Exercise 9
Q1 Describe demand management Q2 What could be the content of CDB?

Q3 Differentiate CBD and CMBD

March 15, 2012

114

IT Service Continuity Management

March 15, 2012

115

Goal

to support the overall Business Continuity Management process by ensuring that the required IT technical and services facilities can be recovered within required, and agreed, business timescales.

March 15, 2012

116

BCM & ITSCM


ITSCM

BCM

focused on the Continuity of IT Services to the business.

concerned with the management of Business Continuity that incorporates all services upon which the business depends, one of which is IT.
March 15, 2012 117

Business Continuity Life Cycle

March 15, 2012

118

Business Impact Analysis


Assets C o u n t e r m e a s u r e s

Threats

Vulnerabilities

Risk Assessment
CCTA Risk Analysis and Management Methodology
March 15, 2012

Risk Management

119

Recovery Options

Do nothing

Gradual recovery

Manual workarounds

Intermediate recovery

Reciprocal arrangements

Immediate recovery

March 15, 2012

120

Exercise 10
Q1 List out 3 important benefits of ITSCM Q2 Describe various recovery options

March 15, 2012

121

Availability Management

March 15, 2012

122

Goals

to optimize the capability of the IT Infrastructure, services and supporting organization to deliver a Cost effective and sustained level of Availability that enables the business to satisfy its business objectives .

March 15, 2012

123

Responsibilities

Gather, maintain and analyze the data related to IT infrastructure. Determine the availability levels required from a business perspective. Monitor and report the availability and optimize thereby. Monitor and improve the availability to meet the SLA (& OLA) requirements. Ensure the required security levels are provided. Create and maintain availability plan
March 15, 2012 124

Terminology
Availability
ability of an IT Service or component to perform its required function at a stated instant or over a stated period of time

Maintainability
ability of an IT Infrastructure component to be retained in, or restored to, an operational state

Reliability
ability of an IT Service or component to perform its required function for a given period of time

Serviceability
describes the contractual arrangements made with Third Party IT Service providers.

Security
The Confidentiality, Integrity and Availability (CIA) of the data associated with a service; an aspect of overall Availability Vital Business Functions The business critical elements of the Business process supported by an IT Service.
March 15, 2012

Resilience
ability of an IT Service or component to keep working even when one or more components fail

R e c o v e r a b i l i t y

125

Calculations
Availability % =
AST Agreed Service Time DT Down Time

AST - DT AST

X 100

Components - serial configuration Availability % = A x B

Components parallel configuration Availability % = 1 (downtime of A) x (downtime of B)

March 15, 2012

126

Methods & Techniques


Component Failure Impact Analysis (CFIA) can be used
to predict and evaluate the impact on IT Service arising from component failures within the IT Infrastructure.

Systems Outage Analysis (SOA) is a technique designed


to provide a structured approach to identifying the underlying causes of service interruption to the User.

Fault Tree Analysis (FTA) is


a technique that can be used to determine the chain of events that causes a disruption to IT Services.

Technical Observation Post (TOP) is a prearranged


gathering of specialist technical support staff from within the IT support organization brought together to focus on specific aspects of IT Availability.

CRAMM can be used to identify


new risks and provide appropriate countermeasures associated with any Change to the business Availability requirement and revised IT Infrastructure design.
March 15, 2012

127

Incident Lifecycle - Expanded


MTBSI
I n c i d e n t R e s t o r e I n c i d e n t

MTTR

MTBF

MTTR - Mean Time To Repair (Downtime) MTBF Mean Time Between Failures (Uptime) MTBSI Mean Time Between System Incidents (Reliability)
March 15, 2012 128

Security

Availability

Confidentiality

Integrity

Information Security protects information from a wide range of threats in order to ensure Business Continuity, minimize business damage and maximize return on investments and business opportunity.
March 15, 2012 129

Exercise 11
Q1 Describe various Availability techniques Q2 List the parameters of security management

Q3 What do you mean by recoverability

March 15, 2012

130

ITIL Foundation Exam


Objective Type

1 Hour duration
Passing score 26 out of 40 No negative marking

Online / Paper-based

March 15, 2012

131

References

OGC Publications
BLUE BOOK (IT Service Support) RED BOOK (IT Service Delivery)

HP Ref Model 3.0.2

March 15, 2012

132

Template Version History


Slide to be deleted before using this template for the first time
Version No. Version Date Prepared By Reviewed By Approved By Summary of Change Draft 1374 PIF No.

0.1 1.0

23 June 2006 27 June 2006

Satish Matukumalli Satish Matukumalli

March 15, 2012

133

March 15, 2012

134

You might also like