Tuesday, 18 December 2018

CSI Overview

Continuous Service Improvement (CSI) deals with measures to be taken to improve the quality of services by learning from past successes and failures. Its purpose is to align and realign IT Services to the changing needs by identifying and implementing improvements to the changing business needs.

Objectives

Here are the serveral objectives of Continual Service Improvement −
  • Review and analyze improvement opportunities in each lifecycle phase
  • Review and analyze Service Level achievement results
  • Improve cost effectiveness of delivering IT services without sacrificing customer satisfaction
  • Identify and implement individual activities to improve IT service quality
  • Ensures applicable quality management methods are used to support continual improvement activities

Activities Supporting CSI

The activities that support CSI do not happen automatically and thus required to be owned within IT organization which is capable of handling the responsibilities and processes the appropriate authority to make things happen. Here are the activities supporting Continual Service Improvement.
itil_tutorial

CSI Process Model

The steps involved in CSI are self explanatory as described in the following diagram
itil_tutorial

Perspectives of Benefits

Here are the four perspectives of benefits that are taken into consideration while discussing outcomes of CSI −

Improvement

This is comparison of result of current state of service to previous.

Benefits

It is the gain achieved through realization of improvements.

Return on Investment

It is the difference between benefits and amount expanded to achieve that benefit.

Value on Investment

It is the extra value created by establishment of benefits that include non-monetary or long-term outcomes.

ITIL - Access Management

Overview

Access Management deals with granting access to authorized access while preventing access to non-authorized users.
Access Manager is the process owner of this process.
Key Points −
  • Access Management is also known as ‘rights management’ or ‘identity management’
  • Access Management process is executed by technical and application management functions.
  • Access Management can be initiated by Service Request through Service Desk

Value to business

Access Management adds value to business in following ways −
  • Employees have right level of access to execute their jobs effectively
  • The ability to audit use of services and to trace the abuse of services
  • Controlled access to services ensures that organization is able to maintain more effectively the confidentiality of its information

Access Management Process

Activates involved in Access Management are self explanatory as shown in the following diagram
itil_tutorial

ITIL - Access Management

Overview

Access Management deals with granting access to authorized access while preventing access to non-authorized users.
Access Manager is the process owner of this process.
Key Points −
  • Access Management is also known as ‘rights management’ or ‘identity management’
  • Access Management process is executed by technical and application management functions.
  • Access Management can be initiated by Service Request through Service Desk

Value to business

Access Management adds value to business in following ways −
  • Employees have right level of access to execute their jobs effectively
  • The ability to audit use of services and to trace the abuse of services
  • Controlled access to services ensures that organization is able to maintain more effectively the confidentiality of its information

Access Management Process

Activates involved in Access Management are self explanatory as shown in the following diagram
itil_tutorial

ITIL - Problem Management

Overview

In ITIL, Problem is defined as unknown cause of one or more incident.
Problem Management ensures identification of problems and performs Root Cause Analysis. It also ensures that recurring incidents are minimized and problems can be prevented.
Problem Manager is the process owner of this process.
Key Points −
  • Problem Management comprises of activities required to diagnose the root cause of the incident and to determine the resolution to those problems
  • When a problem is resolved after root cause analysis, it becomes known error
  • Problem Management also records information regarding problems in a system called Known Error Database (KED)
Problem Management consists of following two processes −
  • Reactive Problem Management is executed as part of service operation
  • Proactive Problem Management initiated in service operation but generally driven as part of Continual Service Improvement

Problem Management Process

The following diagram describes activities involved in Problem Management −
itil_tutorial

Problem detection

Problem can be detected in following ways −
  • Analysis of incident by technical support group
  • Automated detection of an infrastructure or application fault, using alert tools automatically to raise an incident which may reveal the need for problem management
  • A notification from supplier that a problem exists that has to be resolved

Problem logging

Problem should be fully logged and contains the following details −
  • User details
  • Service details
  • Equipment details
  • Priority and categorization details
  • Date/time initially logged

Problem categorization

In order to trace true nature of Problem, It is must to categorize the Problems in same way as Incidents.

Problem Prioritization

Problems must be categorized in the same way as incidents to identify how serious the Problem is from an infrastructure perspective.

Workarounds

It is temporary way to overcome the difficulties. Details of workaround should always be documented within Problem record.

Raising a Known Error Record

Known error must be raised and placed in Known Error Database for future reference.

Problem Resolution

Once resolution is found, it must be applied and documented with the problem details.

Problem closure

At time of closure, a check should be performed to ensure that record contains full historical descriptions of all events.

Major Problem Review

A review of following things should be made −
  • Those things that were done correctly
  • Those things that were done wrong
  • What could be done better in future
  • How to prevent recurrence

Incident Management and Request Fulfillment

Overview

Incident is defined as any disruption in IT service. Incident can be reported either through the Service Desk or through an interface from event management to incident management tools.
Incident Management deals with handling incident and ensures to restore IT service soon as possible.
Incident Manager is the process owner of this process.

Incident Models

There are always some incidents which are not new. They may happen again over a period of time. Therefore it is best practice to have pre-defined model to handle such incidents.
An incident models should include −
  • Steps that should be taken to handle the incident
  • Chronological order these steps should be taken in, with any dependences or co-processing defined
  • Responsibilities − who should do what
  • Timescales and thresholds for completion of the actions
  • Escalation procedures; who should be contacted and when
  • Any necessary evidence-preservation activities

Incident Management Process

Following diagram shows several standard steps to be taken when an incident occurs −
itil_tutorial

Incident Logging

All incidents should be fully logged and date/time stamped.

Incident Categorization

It is important later when looking at incident types/frequencies to establish trends for use in Problem Management.

Incident Prioritization

It deals with severity of an incident − Low, Medium or High.

Incident Diagnosis

Service Desk analyst must carry out initial diagnosis while the user is on call and try to discover the full symptoms of the incident and to determine exactly what has gone wrong and how to correct it.

Incident Escalation

Function escalation
When it becomes clear that Service Desk is unable to resolve the incident or target time for Service Desk has been exceeded, the incident must be escalated immediately for further support.
Hierarchic escalation
Hierarchic escalation is done when either incident is serious in nature or ‘Investigation and Diagnosis’ is taking too long time.

Investigation and diagnosis

It includes the following activities −
  • Understanding what exactly has gone wrong
  • Understanding chronological order of the events
  • Confirming the full impact of the incident
  • Identifying any events that could have triggered the incident
  • Searching for previous similar kind of incidents

Resolution and recovery

A potential resolution need to be identified, applied and tested.

Incident closure

Before closing an incident, Service desk should ask the user whether he is satisfied and agree to close the incident.

Request Fulfilment

Service Request refers to demand by the users. These requests can be regarding small changes, changing the password, installing additional software application, requesting information etc.
Incident is unplanned event but Service Request can be planned.
Key Points −
  • Depending upon number of Service Requests, an organization usually has, a specialized teams can be formed to fulfil those requests.
  • For frequently recurring requests, a predefined model can be devised to fulfil the requests.

ITIL - Event Management

Overview

Event is defined as detectable occurrence that has significance for the delivery of IT service. Events are created by Configuration Item (CI) or the monitoring tools.
Event Management ensures that all CIs are constantly monitored and define a process to categorize these events so that appropriate action can be taken if required.
IT Operation Manager is the process owner of this process.
Event Management can be applied on the following aspects −
  • Configuration Items (CIs)
  • Security
  • Environment Conditions ( e.g. fire and smoke detections)
  • Normal activity (e.g. tracking the use of an application or performance of a server)
  • Software licence monitoring for usage to ensure legal licence utilization and allocation
There are two types of monitoring tools as described below −
  • Active monitoring tools monitor CIs for their status and availability. Any deviation from normal operation is communicated the appropriate team for action
  • Passive monitoring tools detect and correlate operational alerts or communications generated by CIs.

Event Management Process

The Event Management Process is self descriptive as shown in the following diagram −
itil_tutorial

Benefits

Here are the several benefits of Event Management −
  • It helps to detect incidents at early stage. Thus incident can be assigned to appropriate team before any service outage occurs
  • It removes need for expensive and resource intensive monitoring
  • It can also be applied on some service management processes such as Availability management or capacity management. It automatically generates signal when status changes that allow appropriate team to perform early response
  • Since it is automates, hence provides increased efficiency

ITIL - Service Operation Overview

Service operation ensures that services are being provided efficiently and effectively as per SLAs. It includes monitoring services, resolving incidents, fulfilling requests and carrying out operational tasks.

Key Points −

  • Service Operation includes five process and four functions
  • Service operation deals with day-to-day activities and infrastructure that are being used to deliver the services
  • Service Operations is where all design and transition plans are executed and measured
  • From customer point of view, Service Operation is where actual value is seen

Service Operation Processes

Service operations include total five processes as described in the following table −
Sr.No.Process & Description
1
Event Management
The objective of this process is to make sure all CIs are monitored constantly. It also filter and categorize the events in order to decide on appropriate actions.
2
Incident Management
The purpose of Incident Management is to restore the service to the previous stage as early as possible.
3
Request Fulfillment
This process deals with handling requests such as change password, create new user and create email id etc.
4
Access Management
This process deals with granting rights to authorized user to use the service.
5
Problem Management
This process deals with finding root cause of the problem and prevent incident to occur again.

Service Operation Functions

Service Operation comprises of four functions as shown in the following diagram
itil_tutorial

Service Desk

Service Desk is the first and single point of contact. It plays vital role in customer satisfaction. It coordinates activities between end user and IT service provider team. It also own the logged requests and ensures closure of these requests.
There are four types of Service Desk −

Central Service Desk

In this, there is only one central Service Desk.

Local or distributed Service Desk

It is costly but closer to the user. It’s difficult to manage and maintain.

Virtual Service Desk

It is very costly and result in fast processing.

Specialized Service Desk

It includes dedicated skilled staff for specific queries.

IT Operation Management

This function is responsible for managing organization’s day-to-day operational activities

Technical Management

Technical Management staff includes technical expertises that are responsible for management of overall IT infrastructure.

Application Management

Application Management is responsible for managing applications and software throughout the lifecycle of the service.