Module 6
Module 6
Course Timing
• Duration
Starts on 17th of Aug to 19th of May
from 6:00 PM to 9:00 PM EGY time
from 7:00 PM to 10:00 PM KSA time
Breaks
1 break for 15 mins at 8:30 PM and Back 8:45 PM
2
Course Contract
3
Module 6 : Other ITIL Practices
4
ITIL Practices Redefined
ITIL Practice: A set of organizational resources designed for
performing work or accomplishing an objective.
• Relationship Management
• Information Security Management
• Supplier Management
• Service Configuration Management
• IT Asset Management
• Monitoring and Event Management
• Release Management
• Deployment Management
6
Relationship Management
Based upon AXELOS ITIL® material. Material is reproduced under license from AXELOS Limited. All rights reserved.
7
Relationship Management
Based upon AXELOS ITIL® material. Material is reproduced under license from AXELOS Limited. All rights reserved.
8
Relationship Management
Based upon AXELOS ITIL® material. Material is reproduced under license from AXELOS Limited. All rights reserved.
9
Strategic BRM Role
13
Information Security Management
• Purpose: To protect the information needed by the
organization to conduct its business.
• Understand and manage risks to confidentiality, integrity
and availability of information, authentication, and non-
repudiation.
• Establish policies, processes, behaviors, risk management, and
controls, which must maintain a balance between:
• Prevention: Ensuring that security incidents don’t occur.
• Detection: Rapidly and reliably detecting incidents that
can’t be prevented.
• Correction: Recovering from incidents after they are
detected.
Information Security Management
• Information security management must be driven from the most senior level
in the organization, based on clearly understood governance requirements
and organizational policies.
• Most organizations have a dedicated information security team, which
carries out risk assessments and defines policies, procedures, and controls.
• Information security is critically dependent on the behavior of people
throughout the organization.
• Staff who have been trained well and pay attention to information security
policies and other controls can help to detect, prevent, and correct
information security incidents. Poorly trained or insufficiently motivated
staff can be a major vulnerability.
Activity
18
Supplier Management
Based upon AXELOS ITIL® material. Material is reproduced under license from AXELOS Limited. All rights reserved.
19
Supplier Management
• Key activities include:
• Create a single point of visibility and control to ensure
consistency.
• this should be across all products, services, service components, and
procedures provided or operated by internal and external suppliers,
including customers acting as suppliers.
• Maintain a supplier strategy, policy, and contract
management information.
• Negotiate and agree on contracts and arrangements:
• Agreements need to be aligned with business needs and service
targets. Contracts with external suppliers might need to be
negotiated or agreed through the legal, procurement, commercial,
or contracts functions of the organization. For an internal supplier
there will need to be an internal agreement.
Supplier Management
• Insourcing: Business practice in which work that would otherwise have been
contracted out is performed in house.
• Outsourcing: Outsourcing uses the developed workforce of an outside organization
to perform tasks and also the resources of an outside organization for services
and manufacturing products.
• Single-source/partnership : to outsource a single partner who will be responsible for
the entire process. They cannot blame others for non-performance or delay in
delivery. This sense of responsibility results in effective and efficient delivery of
product or service.
• Multi-sourcing : is an approach to outsourcing in which IT operations and
technology infrastructure are contracted to a number of vendors, usually in
combination with some internally provided elements of information technology.
Single-
Multi-
Insourcing Outsourcing source/
sourcing
partnership
Activity
23
Service Configuration Management
Configuration Item (CI): Any component that needs to be
managed in order to deliver an IT service.
25
Copyright © AXELOS Limited 2019. Used under permission of AXELOS Limited. All rights reserved. (Figure 5.29 ITIL® Foundation, ITIL 4
Edition, p. 140).
IT Asset Management
IT asset: Any financially valuable component that can
contribute to delivery of an IT product or service.
• Purpose: To plan and manage the full lifecycle of all IT assets, to help the
organization:
• Maximize value
• Control costs
• Manage risks
• Support decision-making about purchase, reuse, and retirement of assets
• Meet regulatory and contractual requirements
• Activities include:
• Define, populate, and maintain the asset register.
• Control the asset lifecycle in collaboration with other practices.
• Provide current and historical data, reports, and support to other practices.
• Audit assets, related media, and conformity.
Material in blue italic based on AXELOS ITIL® Glossary. Slide material based upon AXELOS ITIL® material. Material is26reproduced under license from
AXELOS Limited. All rights reserved.
Activity
27
Monitoring and Event Management
Material in blue italic based on AXELOS ITIL® Glossary. Slide material based upon AXELOS ITIL® material. Material is reproduced under license from
AXELOS Limited. All rights reserved.
28
Key Activities of Event Management
• What should be monitored, and establishing the monitoring strategy
• Implementing and maintaining monitoring
• Establishing and maintaining thresholds
• Establishing and maintaining policies for event handling
• Implementing processes and automations
Material based upon AXELOS ITIL® material. Material is reproduced under license from AXELOS Limited. All rights reserved.
29
Release Management
30
Material in blue italic based on AXELOS ITIL® Glossary. Slide material based upon AXELOS ITIL® material. Material is reproduced under license from
AXELOS Limited. All rights reserved.
Release Management in Traditional/Waterfall
Environments
Copyright © AXELOS Limited 2019. Used under permission of AXELOS Limited. All rights reserved. (Figure 5.25 ITIL® Foundation, ITIL 4
Edition, p. 135).
31
Release Management in Agile/DevOps
Environments
Copyright © AXELOS Limited 2019. Used under permission of AXELOS Limited. All rights reserved. (Figure 5.26 ITIL® Foundation, ITIL 4
Edition, p. 135).
32
Activity
33
Deployment Management
• Purpose: To move new or changed hardware, software, documentation,
processes, or any other component to live environments. It may also be
involved in deploying components to other environments for testing or
staging.
• Collaborates closely with Release Management and Change Control
practices.
• Encompasses hardware provisioning and software deployment.
• Deployment approaches:
• Phased deployment
• Continuous delivery
• Big bang deployment
• Pull deployment
• Secured locations for deployment:
• Definitive Media Library for software code
Definitive Hardware Store for physical hardware spares
®
•
Based upon AXELOS ITIL material. Material is reproduced under license from AXELOS Limited. All rights reserved.
Based upon AXELOS ITIL® material. Material is reproduced under license from AXELOS Limited. All rights reserved.
35
Activity
36