Configuration Management Process Guide
Configuration Management Process Guide
Configuration Management
Process Guide
Version 1.0
September 2012
Wipro Infotech
Page
I of 35
This document must not be copied in whole or in parts by any means, without
the written authorisation of the Head, Enterprise Quality Management, WI.
Wipro Infotech
Page
II of 35
This Change Management Process Guide, Version 1.0, is released for use in IT IS OU,
Wipro Infotech (WI) with effect from 7th Sep 2012.
This manual is subject to WI Document Control Procedure.
Softcopy of the latest version of the document is available in the Process Document
Repository.
Comments, suggestions or queries on this document should be addressed to the IT IS
Process Excellence Lead.
Approved By: _________________________ Date:
(Quality Head )
Authorised By: ________________________ Date:
(Program Delivery Head)
Wipro Infotech
Page
III of 35
Document Name:
Document No.
WI-Sanmar_group-XXX
Version No:
1.0
Owner
Revision
No.
Revision
Date
Wipro Infotech
Revision
Description
Page
Number
Rationale
for
change
Change Type
(Add/Modify/Delete)
Update
by
Page
Reviewed
by
1 of 35
Abbreviations
The following abbreviations have been used in the document:
Abbreviation
AMR
CAB
CI
CMDB
CSF
DML
ESM
IM
IT
IT IS
ITIL
ITSM
KPI
OLA
RFC / CR
SDM
SLA
SME
SOP
SPOC
Wipro Infotech
Expansion
Asset Management Repository
Change Advisory Board
Configuration Item
Configuration Management Database
Critical Success Factor
Definitive Media Library
Enterprise System Management
Incident Management
Information Technology
Information Technology Infrastructure Services
Information Technology Infrastructure Library
Information Technology Service Management
Key Performance Indicators
Operational Level Agreement
Request For Change / Change Request
Service Desk Manager
Service Level Agreement
Subject Matter Expert
Standard Operating Procedures
Single Point Of Contact
Page
2 of 35
TABLE OF CONTENTS
ABBREVIATIONS.................................................................................................................. 5
ABOUT THE DOCUMENT.....................................................................................8
PURPOSE........................................................................................................................... 8
TARGET AUDIENCE.............................................................................................................. 8
ORGANIZATION OF THE DOCUMENT......................................................................................... 8
SECTION 1 - HIGH LEVEL PROCESS DESCRIPTION....................................................9
PROCESS OBJECTIVES.......................................................................................................... 9
POLICY.............................................................................................................................. 9
ENTRY CRITERIA.................................................................................................................. 9
PROCESS FLOW DESCRIPTION.............................................................................................. 11
SECTION 2 - ROLES AND RESPONSIBILITIES.........................................................13
PROCESS ORGANIZATION.................................................................................................... 13
CONFIGURATION MANAGER.................................................................................................. 13
ASSET MANAGER.............................................................................................................. 14
SUBJECT MATTER EXPERT................................................................................................... 14
RACI CHART.................................................................................................................... 14
SECTION 3 - LEVEL 2 PROCESS DESCRIPTION.......................................................16
(1.0) CONFIGURATION PLANNING.........................................................................................16
(2.0) CONFIGURATION IDENTIFICATION..................................................................................18
(3.0) CONFIGURATION CONTROL..........................................................................................20
(4.0) CONFIGURATION STATUS ACCOUNTING AND REPORTING....................................................22
(5.0) CONFIGURATION VERIFICATION AND AUDIT.....................................................................24
EXIT CRITERIA.................................................................................................................. 25
THE PROCESS IS CONSIDERED COMPLETE WHEN THE AUTHORIZED AND IDENTIFIABLE CI INFORMATION IS
RECORDED ARE RECORDED AND CMDB IS UP TO DATE.............................................................25
SECTION 4 METRICS AND EFFECTIVENESS GUIDELINES........................................26
PROCESS METRICS............................................................................................................ 26
EFFECTIVE GUIDELINES....................................................................................................... 27
APPENDIX A CMDB TEMPLATE.........................................................................28
APPENDIX B CONFIGURATION MANAGEMENT PLAN GUIDELINE..............................29
APPENDIX C CI STATUS..................................................................................30
APPENDIX D CI ATTRIBUTES...........................................................................31
APPENDIX E STATUS ACCOUNTING REPORTS.....................................................32
APPENDIX F GUIDELINES FOR CMDB AUDIT........................................................33
APPENDIX G - RELATIONSHIP WITH OTHER PROCESSES..........................................34
LIST OF FIGURES
FIGURE 1: CONFIGURATION MANAGEMENT PROCESS FLOW....................................................10
Wipro Infotech
Page
3 of 35
LIST OF TABLES
TABLE 1: CONFIGURATION MANAGEMENT PROCESS FLOW......................................................11
TABLE 2: RESPONSIBILITY MATRIX FOR CONFIGURATION MANAGEMENT PROCESS............14
TABLE 3: CONFIGURATION PLANNING SUB-PROCESS................................................................17
TABLE 4: CONFIGURATION IDENTIFICATION SUB-PROCESS......................................................19
TABLE 5: CONFIGURATION CONTROL SUB-PROCESS.................................................................21
TABLE 6: CONFIGURATION STATUS ACCOUNTING AND REPORTING SUB-PROCESS..............23
TABLE 7: CONFIGURATION VERIFICATION AND AUDIT SUB-PROCESS......................................25
TABLE 8: PROCESS METRICS FOR CONFIGURATION MANAGEMENT PROCESS.....................26
Wipro Infotech
Page
4 of 35
Target Audience
The target audience for this document includes all Configuration Management process roles, Service
Desk Agents and Managers, other service management process owners (such as Incident Manager,
Change Manager, Release Manager, Capacity Manager, Asset Manager, Availability Manager,
Service Level Manager), Application Development and Maintenance staff involved in Configuration
Management, and Customers IT representatives.
Section Name
Description
Configuration
Management
Process Overview
Metrics and
Guidelines
Appendix A
CMDB Template
Appendix
B
Appendix
C
Appendix
D
Appendix
E
Appendix F
Configuration
Plan Guideline
CI Status
Appendix
G
Relationship
processes
Effectiveness
Management
CI Attributes
Wipro Infotech
with
other
Page
5 of 35
Policy
Configuration Management Process policies are guiding principles for creating, deploying and
managing the Configuration Management Process. The following are the policies on which this
Configuration Management Process is designed.
There will be one process that will be followed for Configuration Management
All configuration items should be managed within a CMDB database
All CIs, including their version and relationships must be documented and maintained in
accordance with the process and guidelines set out in the process document
There should be clear linkages between configuration items, incident records, problem
records, known errors and requests for change.
All changes to CIs are submitted to configuration management by the time that the RFC is
completed
CMDB will be updated for all changes to CI with the approval of Configuration Manager only
The CI will be baseline before any changes or updating
The CMDB will be baseline before any major changes or updating
All relevant IT assets and configurations within the organisation should be managed
CMDB will be audited at regular intervals
Configuration records need to be verified against the infrastructure and correction should be
applied to take care of any exceptions
CI Status Reports will be generated at regular intervals
Entry Criteria
Updates to configuration information are triggered by change requests, purchase orders, acquisitions
and service requests.
3.0
4.0
5.0
Configuration Configuration
Identification
Management
Plan
Established
CMDB with
various
interfaces
CI Naming
policy
New CI
Description
Design and establish CMDB database, tool(s) and
process
Decide of CI naming convention and structure
Configure various ESM tool, Discovery tools, Asset
Management system, Enterprise applications,
Document File Store system
Decide and design process interfaces
Design and establish Definitive Media Library (DML)
Use business rules based on data status for baseline
and status reporting of CI
Decide on archiving of data
Output
Configuration
Management
Plan
CMDB
database with
various
interfaces
designed and
established
Establish
DML
CI Naming
policy
CI details
updated in
CMDB
Updated CIs
Updated
CMDB
Status reports
Audit report
Erroneous
CIs
Stage Procedure
Input
schedule
Audit
guidelines
Description
Check the CMDB is consistent with all CIs and viceversa
Check all change and release records are authorised
and only authorised changes are implemented
Perform physical inspection of product and design
information; assure accuracy, consistency and
conformance with acceptable practices;
Log and report all exceptions
Output
Service Delivery
Owner
Incident
Manager
Configuration
Manager
Domain Lead
I
Domain Lead
II
Domain Lead
III
Team Member
Team Member
Team Member
Team Member
Team Member
Team Member
Team Member
Team Member
Team Member
Configuration Manager
Configuration Manager ensures that the Configuration Management Policy and Process are adhered
to and to control and manage Changes to CI through their lifecycle.
Responsibilities of Configuration Manager include:
Implements the organizations Configuration Management policy and standards.
Creates and manages the Configuration Management plan, principles and processes and their
implementation.
Proposes CI naming conventions.
Establishes interfaces with Change Management, Problem Management, Network
Management, Release Management, computer operations, logistics, finance and
administration functions.
Executes population of the CMDB. Manages and maintains CMDB, central libraries, tools,
common codes and data. Ensures regular housekeeping of the CMDB.
Provides reports, including management reports, impact analysis reports and configuration
status reports.
Uses the CMDB to facilitate impact assessment for RFCs and to ensure that implemented
Changes are as authorised. Ensures that the CMDB is updated when a Change is
implemented.
Performs configuration audits to check that the physical IT inventory is consistent with the
CMDB and initiates any necessary corrective action.
Asset Manager
The Asset Manager owns the integrity and accuracy of the Asset data. This ensures that information
provided is accurate.
Responsibilities include:
Maintaining Asset data and the Asset data model
Monitoring of lifecycle events of Assets
A point of escalation for the Configuration Management process
Reporting asset data
Reviewing all asset discrepancies, assessing and providing variance resolution
Assist in the definition of CI classes, types, and data requirements
RACI Chart
Table 2: Responsibility matrix for Configuration Management process
Function
CMDB planning and designing
Establish CI Naming policy and guidelines
Physical labelling of CI
Provide CI details
Establish CI relationships
Submit RFC for CI change
Analyzing Change request for changes in CI
details
Authorize Changes in CI details
Make Changes in CI details
Generate CI Status Accounting reports
Maintain and provide CI Baseline and Release
details
Maintain and provide CI history details
Raise request for audit
Collect details from CMDB, system log and by
physical inspection
Analyze details and record deviation details
Configuration
Manager
A/R
A/R
A
A/R
A/R
A
Asset
Manager
C
C
R
I
C
I
Subject Matter
Expert
C
C
I
C
C
R (Change Mgr)
A/R
A/R
A (Change Mgr)
R (Configuration
Librarian)
I
A/R
A/R
A
I
R
I
R
A/R
A/R
Function
Publish Audit report
Legend:
Configuration
Manager
A/R
Asset
Manager
I
Subject Matter
Expert
I
= Accountable for the action. There is only one person accountable for any given
action.
Procedure
Input
1.1
System
Design
Policy
document
1.2
Establish
DML
Policy and
process
document(s
)
1.3
CI
Naming
and
Status
Policy
OEM
naming
standards
Description
Analyze relevant existing Configuration Management
practices and their interfaces to the Service
Management processes, procurement and
development
Analyze interfaces with other systems like Document
File Store system, Enterprise Applications, various
Discovery tool(s), Asset Management tool, ESM tool
etc
Evaluate, select and deploy the CMDB and
Configuration Management tool
Configure existing tools and system to establish
various interfaces with other Service Management
Processes and third parties
Design policies for housekeeping, including license
management, archiving and the retention period for
CIs
Establish interfaces to other IT IS Change
Management, Release Management, other Service
Management processes, procurement and
development
Decide design and location(s) of Definitive Media
Library
Decide CIs to constitute of DML
Establish DML
Define interfaces with License Management and
Release Management
Define how the classes of assets and configuration
items are to be selected, grouped and classified and
defined by appropriate characteristics
Decide on the Level of CIs based on level of
independent changes
Define the approach for to identify, uniquely naming
and labelling all assets or service components
Output
Configuration
Management
Plan and
procedure
document
CMDB
database with
various
interfaces
designed and
established
Established
DML
CI naming
policy
Procedure
Input
Description
Output
2.1
Assign
Physical and
Logical ID
CI Naming
policy
CI labels
tagged
(physical as
well as logical)
2.2
Describe CI CI attribute
and
build template
relationship
2.3
Authorize CI
2.4
Commission
CI
CI details
Authorised
CI details
CI details
Authorised CI
details
CI installed
and
commissioned
3.2
3.3
Procedure
Analyze
Changes
CI
to
Authorize
Changes
CI details
to
Make
changes to CI
Input
Description
Output
RFC
System log
generated
by
discovery
tool(s)
Analyzed RFC
Analyzed
RFC
Approved
change
request
Approved
Change
request
Updated CI
details in
CMDB
Procedure
Receive/
Trigger
Report
Request
4.2
Create
Baseline,
Release
4.3
Maintain
History
for
CI
Input
Description
Output
Receive
request for
reports
Reporting
schedule
Acknowledge
ment of
Report
Request
Guidelines
for CI
baseline,
release
Acknowled
gement of
report
request
CI baseline
and release
created
CI baseline
and release
created
CI status
report
Procedure
Input
Description
Output
5.1
Collect and
Collate data
Request for
Audit
Audit
schedule
Audit
checklist
Agreed with
the scope of
audit
Actual CI data
collected
(automatic or
manual)
5.2
Extract Data
from CMDB
Scope of
audit
5.3
Analyze and
records
deviations
Audit
Checklist
5.4
Amend
CMDB,
infrastructure
details
Deviation /
exception
report
Audit report
CI data
collected from
CMDB
Deviation /
exception
report
Audit report
Updated
CMDB
RFC to update
infrastructure
Incident for
investigation
Exit Criteria
The process is considered complete when the authorized and identifiable CI information is recorded
are recorded and CMDB is up to date.
KPI
Number of
unauthorized CIs
Reduction in number
of unauthorized CIs
Number of missing
or duplicates CIs
Percentage of
incidents related to
unauthorized CIs
Accuracy
and
Integrity of CMDB
Process Usefulness
Measurement
A=Total no. of
unauthorized
CIs found
A=Missing or
duplicate CIs
found
A=Total no. of
incidents due to
unauthorized
CIs
Measurement
Calculatio
n
A
A
B=Total no. of
incidents reported
A/B * 100
Number of
incidents and
problems linked to
CI
A=Total no. of
incidents not
related to CI
B=Total no. of
incidents
A/B * 100
Number of failed
RFCs due to poor
impact assessment
A=Total no. of
failed changes
due to poor
change
assessment
B=Total no. of
changes
A/B * 100
Percentage
reduction in service
errors attributable
to wrong CI
information
A=total no. of
service error
A/B * 100
Increase in FCR%
A=FCR%
Reduction in AHT
Reduction in
misrouted incidents
Reduction in
incidents for which
priority changed at
the later stage
Reduction in
incomplete
incidents
A=Incident /
problem
Average
Handling Time
A=Total
bouncing back
tickets
A=Incidents for
which priority
changed
A=Total
incomplete
incidents
A
A
Reduction in wrong
or late escalation
reporting
Reduction in SLA
breaches due to
CMDB
Number of CMDB
audits completed
as plan
Effective
audit
CMDB
A=Total
instance of
wrong or late
escalation
reporting
A=Total no. of
SLA breaches
A=Total no. of
CMDB audits
completed
A/B * 100
Number of
exceptions reported
A=Total no. of
CI exceptions
Number of wasted
licenses
A=Total no. of
licenses being
wasted
Effective Guidelines
Documentation
Ensure that the:
Process documentation is owned and identified as a unique CI in the CMDB, and is
accessible by all delivery staff.
Changes to the process documentation are managed through the Change Management
process for e.g. Document control system
Adherence to Policies
Ensure the adherence to all process policies. For example:
All CIs should be recorded in a management system.
Access to CMDB is controlled rigidly.
CMDB Audit
Ensure that CMDB is audited and status reports with management information are delivered.
Variable
Description
CI Name
The number that uniquely identifies the particular instances of this CI - for
example, for software the copy number, for hardware the serial number.
Category
Type
Version Number
Location
The location of the CI, e.g. the library or media where the software CIs
reside, the site/room where a service is located.
Owner Responsible
The name and/or designation of the owner responsible for the CI.
10
Responsibility Date
11
Source/supplier
The source of the CI, e.g. developed in-house, bought in from company
xxxxx etc.
12
License
13
Supply Date
14
Accepted Date
15
Status (current)
The current status of the CI; e.g. under 'test', 'live', 'archived'.
16
Status (scheduled)
The next scheduled status of the CI (with the date or indication of the event
that will trigger the status change).
17
18
19
Relationships
The relationship of the CI with all CIs other than 'parent' and 'child' (e.g. this
CI 'uses' another CI, this CI 'is connected to' another CI, this CI is 'resident
on' another CI, this CI 'can access' another CI).
20
RFC Numbers
21
Change Numbers
24
Problem Numbers
25
Incident Numbers
26
Comment
Introduction Sets down the purpose, scope, and applicability of the CM Plan to the overall
project.
Organisation Describes the relationship and integration of CM with all organisations on the
project (including, Quality, Engineering, Customer, Management, and so on.)
Project Phases and Milestones Describes the evolution of the project with regard to CM and
the establishment of both developmental and formal baselines.
Configuration Identification Discusses the selection of artefacts or work products,
configuration identifiers, establishment of the project libraries, and naming or numbering
conventions.
Interface Management Describes the procedures for identification of interface requirements,
establishment of both internal and external interface agreement processes and procedures, and
how the project will participate in the interface control working groups.
Status Accounting Sets down how and when status accounting information will be recorded
and released for the project. Information contained in status accounting includes the current
release of work products and status of change.
Configuration Audits Describes the plans and procedures for performing audits and
verification of a product.
Subcontractor Management Describes the process and procedures to be used to ensure the
subcontractors compliance with project requirements.
Appendix C CI STATUS
Following are the possible states for a CI:
Registered: A new version of a CI has been identified (for example as part of the planning
process) and its potential existence has been recorded in an Inventory.
Draft: The version is under development, including whatever review process is appropriate.
Tested: Some types of CI will be subject to testing, to determine if they correspond to their
specifications.
Approved (Baseline): A version of a CI in this state is approved for end use and can be made
available via a release process.
Specified: Used only for composite CI to describe the circumstances when all of the lower level CI
have approved specifications. Also called the Specification Baseline.
Built: Used only for composite CI to describe the circumstances when the entire lower level CI
have approved specifications and have been built but not yet tested. Also called the Build
Baseline.
Superseded: A version of a CI may be superseded by a new version of the same item or by one
or more different artefacts.
Withdrawn: A version of a CI may no longer be required.
Destroyed: A version of a CI has been physically destroyed and is no longer available for
reference.
Appendix D CI ATTRIBUTES
The following is a non-exhaustive list of the CI attributes that can be captured, where applicable:
Location of artefact
Unique Identifier
Make
Model
Assigned User Name
Assigned User Telephone Number
Date of Purchase
Supplier Name
Supplier Telephone Number
Warranty Expiry Date
Maintenance Supplier Name
Licence Number
Hard Disk Capacity
Memory Capacity
Date First Entered into CMDB
Date of Last Update
Lifecycle State
Status
Owner
Input
to
Configuration
Management
New incidents linked with CI
Change Management
Problem Management
Asset Management
Capacity Management
Capacity details
Business continuity
requirements
Reporting schedules
Release
Deployment
Service
Management
and
Level
Output
from
Configuration
Management
Impact of incidents
Related incidents
Configuration Item details and
the relationship between various
Configuration Items
Impact of given change
Configuration Item details and
the relationship between various
Configuration Items
Impact of problems
Related incidents/ problem/
Known Error
Configuration Item details and
the relationship between various
Configuration Items
Configuration Item details for
various assets and the
relationship between various
Configuration Items
Capacity reports
Configuration Item details and
the relationship between various
Configuration Items
List of redundant/ resilient
systems/ services
Periodic reports generated for
measuring performance of IT
Services.
Impact of given release
New Baseline and Version
details
Configuration Item details and
the relationship between various
Configuration Items
Representation of the
infrastructure in the form of
Configuration Item details and
relationship between them