ITIL
Information Technology Infrastructure Library (ITIL)
Information Technology Infrastructure Library (ITIL)
ITSM (IT Service Management) Roadmap that Balances Business Value and Flexibility:
BLUF: (1) To deliver business value while adapting to changing requirements and technological advancements. (2) To support business continuity by ensuring the required IT resources (computer systems, networks, etc.) can be resumed within the agreed timeframe.
Roadmap & Strategy: (5)
Define Business Goals and Needs:
Start with the "why." Identify your organization's strategic goals and how IT services can contribute.
Conduct workshops with key stakeholders from business units and IT to understand their pain points, needs, and expectations.
Focus on measurable objectives. Translate business goals into specific, measurable, achievable, relevant, and time-bound (SMART) objectives for your ITSM roadmap.
Assess the current state:
Evaluate existing ITSM processes. Identify gaps, inefficiencies, and areas for improvement.
Assess the maturity of your current ITSM practices. Frameworks like COBIT or ITIL can provide a reference point for this evaluation.
Consider user experience. Understand how employees currently interact with IT services and identify areas for improvement.
Prioritize Initiatives:
Align initiatives with business goals. Prioritize initiatives that will deliver the most significant business value based on your objectives.
Consider quick wins. Include some initiatives that can be implemented quickly to demonstrate value and build momentum.
Balance long-term and short-term needs. The roadmap should consider both long-term strategic improvements and short-term tactical fixes.
Develop and Document the Roadmap:
Define a clear timeline. Set realistic timeframes for each initiative with clear milestones for tracking progress.
Outline the resources required. Identify the people, skills, and budget needed to execute the roadmap.
Communicate the roadmap. Share the roadmap with stakeholders to ensure buy-in and alignment.
Maintain flexibility. Recognize that priorities might change, so build in a mechanism to review and adapt the roadmap as needed.
Implement and continuously improve:
Phased approach. Implement initiatives in a phased manner, starting with high-value priorities.
Change Management. Develop a change management plan to address user concerns and ensure smooth adoption of new processes.
Monitor and measure progress. Track progress against your objectives and adapt your approach based on what you learn.
Regularly review and update the roadmap. As your organization's needs and technology landscape evolve, revisit and update the roadmap to maintain its effectiveness.
Ensuring Flexibility: (4)
Agile approach. Consider adopting an agile approach to ITSM, which allows for iterative development and adaptation based on feedback.
Standardization with flexibility. Establish standardized processes while allowing for customization for the specific needs of different business units.
Focus on automation. Automate repetitive tasks to free up IT resources for more strategic activities and improve service delivery speed.
Invest in monitoring and analytics. Gain real-time insights into IT service performance and user behavior to inform future roadmap decisions.
Change Management (CM): (9)
BLUF:
From an ITIL perspective, it is the maturity of people, processes, and technology at the "project level."
A structured approach to handling any modifications that could affect IT services within an organization.
Goals: (3)
Minimize risks associated with changes
Ensure smooth implementation with minimal disruption
Deliver changes that bring business value
Steps to implement ITIL Change Management: (6)
Categorize the Change: Assess the change and categorize it based on its complexity, risk, and impact. This could be a standard change (low-risk, pre-approved), a normal change (requiring review and approval), or an emergency change (immediate action needed).
Submit a Change Request: A formal change request is submitted, outlining the details of the change, justification, and potential impacts.
Review and Approval: The request goes through a review process, which may involve the Change Advisory Board (CAB) for standard and normal changes. The CAB assesses the risks and approves or rejects the change.
Implementation and Testing: If approved, the change is implemented according to plan, which may involve testing in a staging environment to minimize risk.
Deployment and Review: The change is deployed into the production environment. The impact is monitored, and a review is conducted to assess the success of the change and identify any lessons learned.
Closure: Once the review is complete, the change record is closed.
Organizational Change Management (OCM):
BLUF:
From an ITIL perspective, it is the maturity of people, processes, and technology at the "program level," commonly focusing on the "people side" through the transformation.
Incident Management (ITIL) (9):
9 Steps -- (1) Incident Identification - Identify and log incidents as soon as possible after they occur. (2) Incident Logging - Record all relevant information about the incident, including date, time, affected service, and any other relevant details. (3) Incident Categorization - Categorize incidents based on their impact, urgency, and priority. (4) Incident Prioritization - Prioritize incidents based on their impact and urgency, ensuring that the most critical incidents are addressed first. (5) Incident Diagnosis - Investigate and diagnose the root cause of the incident to determine the best course of action. (6) Incident Resolution - Take the necessary steps to resolve the incident, either restoring service to its normal state or implementing a workaround. (7) Incident Closure - Once the incident has been resolved, document the resolution, close the incident record, and notify any stakeholders affected by the incident. (8) Incident Review - Conduct a review of the incident to identify any lessons learned (KBA) and determine if any improvements can be made to prevent similar incidents in the future. (9) Incident Reporting - Prepare and distribute incident reports summarizing the details of the incident, its resolution, and any steps taken to prevent future occurrences.
Cyber Incident Management (NIST & CISA): -- NIST and CISA provide a collaborative framework for handling cyber incidents.
NIST Process (4): -- NIST SP 800-61 Rev. 2: [NIST SP 800-61: Computer Security Incident Handling Guide ON National Institute of Standards and Technology (NIST).
Preparation:
NIST Special Publication 800-61 Rev. 2 (SP 800-61r2) lays the foundation, outlining steps for developing an incident response plan. This plan should define roles, procedures, and communication channels for handling cyber incidents.
Reporting potential incidents to CISA is crucial. CISA offers a reporting form on their website to report incidents as defined by SP 800-61r2.
Detection and Analysis:
When a suspected incident is identified, the incident response plan kicks in.
The focus is on gathering evidence and understanding the scope of the incident. This might involve analyzing logs, identifying affected systems, and determining the potential impact.
Containment and Eradication:
The goal is to stop the ongoing attack and prevent further damage. This could involve isolating infected systems, patching vulnerabilities, and containing the threat.
Recovery and Post-Incident Activities:
Restoring affected systems and data to functionality is the priority.
This might involve backups, data restoration procedures, and system rebuilds.
Reviewing the incident and updating the response plan to improve future preparedness is crucial.
CISA Process: (2)
CISA provides assistance and resources to organizations dealing with cyber incidents, particularly critical infrastructure sectors and government entities. They offer:
Technical expertise and guidance
Assistance in determining incident severity
Collaboration on threat analysis and information sharing
Reporting:
Federal civilian agencies (FCEBs) must report all cyber incidents to CISA, regardless of severity.
Major incidents are reported to both CISA and the Office of Management and Budget (OMB).
Resources: (3)
CISA National Cyber Incident Scoring System (NCISS): [CISA National Cyber Incident Scoring System (.gov) cisa.gov]
Federal Government Cybersecurity Incident & Vulnerability Response Playbooks: [Federal Government Cybersecurity Incident & Vulnerability Response Playbooks (.gov) cisa.gov]
Report to CISA: https://www.cisa.gov/report
Problem Management (ITIL v4) (9):
-- BLUF:
A problem is defined as "the unknown cause of one or more incidents."
Problem Management is responsible for the control and lifecycle of all problems. It works closely with Incident Management but focuses on prevention rather than immediate resolution.
The objective is to prevent problems and incidents, eliminate repeating incidents, and minimize the impact of incidents that cannot be prevented.
Example:
Problem Management: Your car is using a spare tire and needs to be replaced soon. (The Known Error)
Risk Management: The spare has a risk to pop at any time. When will it pop, who knows? (Workaround, Mitigation Plan: To reduce a problem)
Incident Management: The spare tire popped unexpectedly and needs to be serviced as-soon-as-possible. (What is the Root Cause?)
Steps to Implement. (6)
Problem Identification:
Analyze incident records to identify trends or recurring issues.
Look for patterns that suggest a deeper underlying cause.
Utilize data from other ITIL processes to spot potential problems.
Implement automated tools for event monitoring and problem detection.
Problem Logging and Categorization:
Create a central repository to log and track identified problems.
Categorize problems based on urgency, impact, or underlying system.
Investigation and Diagnosis:
Assign a problem owner to investigate the root cause.
Conduct a root cause analysis using appropriate methods like the 5 Whys or fishbone diagram.
Collaborate with technical teams to diagnose the issue.
Workaround and Resolution:
If possible, develop a workaround to mitigate the problem's impact while a permanent solution is found.
Define a resolution plan to address the root cause. This may involve changes to infrastructure, configuration, or procedures.
Known Error Record and Closure:
Document the root cause, workaround (if any), and permanent resolution in a Known Error Record (KER) for future reference.
Close the problem record once the resolution is verified and implemented.
Review and Improvement
Regularly review problem management processes to identify areas for improvement.
Analyze trends in problem data to identify potential weaknesses in IT services.
Key Point.
ITIL 4 emphasizes identifying both real and probable root causes of problems.
Effective Problem Management requires collaboration between various IT teams.